Determine the disadvantages of socks protocol, Computer Networking

Determine the disadvantages of SOCKS protocol

The main problem with SOCKS is that it lacks transparency to software developers and users.

Implementation requires a change to all existing client-based software so that all of them use the SOCKS libraries. This process of changing the client code is known as "socksifying". This could be extremely cumbersome since it is also expected that at both sides similar level of programming should be available since the entire process takes place at the sessions layer (i.e., at the level of routers).

SOCKS combine powerful features of circuit-level proxies without the programming overhead of traditional application-level firewalls. A number of companies, including IBM, DEC, Cyber guard, etc. have commercial firewall products deploying the SOCKS protocol.


Posted Date: 9/28/2013 3:21:15 AM | Location : United States

Related Discussions:- Determine the disadvantages of socks protocol, Assignment Help, Ask Question on Determine the disadvantages of socks protocol, Get Answer, Expert's Help, Determine the disadvantages of socks protocol Discussions

Write discussion on Determine the disadvantages of socks protocol
Your posts are moderated
Related Questions
Flash It is also permanent storage device. It stores the compressed form of Cisco IOS software image and the NVRAM data. Device structure One flash socket Support 80

Transport Layer In computer networking it the transport  layer is where  sessions are  exchanged between  hosts. This layer resides  between  the application layer and  networ

You are logged into a router, what command would represent you the IP addresses of routers linked to you? Ans)show cdp neighbors detail

Q. Illustrate the Drawbacks of stop and wait? Drawbacks of stop and wait - Only one frame is able to be in transit at a time - After every frame sent the host must wai

TCP Segment Structure Figure shows the format of the TCP segment. The  header consists  of a 20 bytes  fixed  part  plus a variable size  options fields. The description  o

Screened Host Architecture This architecture consists of two host machines: a Screening Router and a Screening Host. Screening Router is placed between a local network and the

Introduction of DNS While discussing about the Internet, one things comes automatically in the n=mind and hence it is directly or indirectly depended on DNS. The DNS which sta