Disadvantages - point to point , Computer Networking


You typically  would  not use a packet filter  as your  only security solution for your network  packets filters have two  major  disadvantages.

a.Low security : Packet filters do not  look  at eh data portion of the packets so attacks  can flow  right  through  them.

b.No advanced protocol  support : Since these  filters  do not keep  track of  connection  there is no way  to support  dynamic  protocols .

Posted Date: 3/19/2013 12:20:50 AM | Location : United States

Related Discussions:- Disadvantages - point to point , Assignment Help, Ask Question on Disadvantages - point to point , Get Answer, Expert's Help, Disadvantages - point to point Discussions

Write discussion on Disadvantages - point to point
Your posts are moderated
Related Questions
State about the communications network 1) The communications network may only accept blocks of data up to a specific size.   (2) Error control might be more effective with a

The grouped SQL statements are known as Transactions (or) A transaction is a collection of actions embused with ACID properties.

Computer Networks 1. Write about different network structures in use. 2. Explain the architecture and usage of ISDN. 3. Describe the concept of framing in Data Link Layer

This ICT-related issue that has been raised in the contemporary media, and the article is required to be included as part of the essay: Undertake further research about this top

Q. Define RS232 Interface? - Indicates the interface between DTE and DCE: V.28 mechanical as well as electrical characteristics V.24: functional as well as procedur

Has a central core conductor covered in an insulating sheath encased in an outer conductor of metal foil  RG numbers indicate physical specs such as thickness and type of insula

SWITCHING: A switched LAN has a single electronic device that sends frames among the connected devices. A hub with several ports simulates a single shared phase. However a swi

- Lost as well as delayed ACKs - Bidirectional transmission both side needs both sending and receiving windows Note: In selective repeat ARQ the size of the sender and rece

This  is one of the models based on PRAM. In this, the processors access the memory location parallel for reading while exclusively for writing operations. In the algorithm which u