Disadvantages - point to point , Computer Networking

Disadvantages

You typically  would  not use a packet filter  as your  only security solution for your network  packets filters have two  major  disadvantages.

a.Low security : Packet filters do not  look  at eh data portion of the packets so attacks  can flow  right  through  them.

b.No advanced protocol  support : Since these  filters  do not keep  track of  connection  there is no way  to support  dynamic  protocols .

Posted Date: 3/19/2013 12:20:50 AM | Location : United States







Related Discussions:- Disadvantages - point to point , Assignment Help, Ask Question on Disadvantages - point to point , Get Answer, Expert's Help, Disadvantages - point to point Discussions

Write discussion on Disadvantages - point to point
Your posts are moderated
Related Questions
implementing cnet sliding window protocol with 6 nodes

You need to enable both arpa and snap encapsulation on single router interface. How do you do this? Ans)Assign two network numbers, one for every encapsulation type.

how to implement chord connection as the network management system ?

Full Duplex - Capability for simultaneous data transmission among a sending station and a receiving station. It needs a workstation be attached to a switch, the NIC must support it


TYPES OF PARALLEL PROGRAMMING There are several parallel programming models in common use. Some of these are: Message Passing; Data Parallel programming; Shared

#questi Scenario: Your Case Study must be based on the information provided. There will be no additional information. This must be submitted in a .doc, or .pdf format. If you sen

Consider a simple wireless data link using channel bandwidth of 40 kHz. The transmit power level is 20 dBm, the link attenuation is 40 dB and the SNRdB at the receiver is 20 dB.

1) The school has implemented a pilot MPLS VPN which is being evaluated to replace the Bell South Frame Relay solution that provides connectivity to the Bascom Palmer Eye-Institute

Question: Consider that you have to configure a small WLAN of 8 computers using Wired Equivalent Privacy (WEP) and that you have to best make use of its available security f