Determine the disadvantages of socks protocol, Computer Networking

Determine the disadvantages of SOCKS protocol

The main problem with SOCKS is that it lacks transparency to software developers and users.

Implementation requires a change to all existing client-based software so that all of them use the SOCKS libraries. This process of changing the client code is known as "socksifying". This could be extremely cumbersome since it is also expected that at both sides similar level of programming should be available since the entire process takes place at the sessions layer (i.e., at the level of routers).

SOCKS combine powerful features of circuit-level proxies without the programming overhead of traditional application-level firewalls. A number of companies, including IBM, DEC, Cyber guard, etc. have commercial firewall products deploying the SOCKS protocol.


Posted Date: 9/28/2013 3:21:15 AM | Location : United States

Related Discussions:- Determine the disadvantages of socks protocol, Assignment Help, Ask Question on Determine the disadvantages of socks protocol, Get Answer, Expert's Help, Determine the disadvantages of socks protocol Discussions

Write discussion on Determine the disadvantages of socks protocol
Your posts are moderated
Related Questions
Drawback of  Repeaters. Repeater  has no filtering capability as it forwards  every frame. Repeater shell  be placed  at accurate distance  before  actual  signal becomes

Allows for transmission and receiving of data concurrently

Q. TCP-IP and OSI Differences - TCP/IP combines the Presentation and Application Layers - TCP/IP combines the OSI Data Link and Physical Layers into 1 Layer - TCP/IP app

Managing and Securing the Web Utility of the Router Step 1: Configure web access. Navigate to the Administration section. Change the router password to cisco. For Web Uti

Describe unbound transmission media. Unbound transmission media are the media of transmitting data without using any cables. These are not bounded by any physical geography. Ex

Control Frames for Lost Tokens If station goes down ... token lost Predecessor listens for data frame or token Noticing none, retransmits token Sends whofoll

hii i want to make a assignment from you. please help me.

Pretty much any end-user program is an best example of the Application Layer.

TWO DIFFERENT KINDS OF TOPOLOGIES: LOGICAL TOPOLOGY:  It is described by the specific network technology. PHYSICL TOPOLOGY: It relays on the wiring scheme. NE