Disadvantages of ip sec tunnelling mode, Computer Networking

Disadvantages of IP sec  Tunnelling mode

IP sec  tunnelling  mode has the  following  disadvantage

a.Encryption of  small  packets  generates a lot  networks  over head  thus  reducing  network  performance.

b.IP sec is  complicate and  complex with many  features. This complexity increased the probability  of loopholes  being  discovered by hackers.

c.The data  encryption standard  algorithm is very  susceptible to brute force  attacks  using  readily available  software  on the internet.

Posted Date: 3/19/2013 12:15:25 AM | Location : United States







Related Discussions:- Disadvantages of ip sec tunnelling mode, Assignment Help, Ask Question on Disadvantages of ip sec tunnelling mode, Get Answer, Expert's Help, Disadvantages of ip sec tunnelling mode Discussions

Write discussion on Disadvantages of ip sec tunnelling mode
Your posts are moderated
Related Questions
How many types of twisted pair cable are there We can find two types of twisted pair cables, namely: Unshielded Twisted Pair Cable (UTP) and Shielded Twisted Pair Cable (STP).

How to Perform Basic Switch Configurations Step : Complete basic configuration of switches S1, S2, and S3. Configure the S1, S2, and S3 switches according to the following

In collective message passing, all the processes of a set participate in communication. MPI gives a number of functions to execute the collective message passing. Some of them are

Determine about the proxy servers There are proxy servers that act as good firewall protection for the entire Intranet system. In some cases, firewall comes as a separate serv

Q. Describe about Domain Name Space ? - Structure for systematize the name space in which names are defined in an inverted-tree structure with the root at the top - Every l

Hub A hub  is a  small box that  connects  individual devices on network  so that  these devices  can  communicate  with each  other. Hub  is an inexpensive device. It is comm

Q. What is Peripheral Connect Interface? PCI signify Peripheral Connect Interface. It's the revolutionary high speed expansion bus presented by Intel.  With the growing signifi

ETHERNET FIELDS:  In Ethernet fields the preamble and CRC is usually not given in frame. The destination address of each is the broadcast address. There is special value reser

Question 1: a) Give three examples of Shells in Linux. b) Differentiate between the Join command and the Paste command in Linux, use an example to support your answer.

Sole Access Protocol The atomic operations, which have conflicts, are handled using sole access protocol. The process used for synchronization in this protocol is given below: