Disadvantages - point to point , Computer Networking

Disadvantages

You typically  would  not use a packet filter  as your  only security solution for your network  packets filters have two  major  disadvantages.

a.Low security : Packet filters do not  look  at eh data portion of the packets so attacks  can flow  right  through  them.

b.No advanced protocol  support : Since these  filters  do not keep  track of  connection  there is no way  to support  dynamic  protocols .

Posted Date: 3/19/2013 12:20:50 AM | Location : United States







Related Discussions:- Disadvantages - point to point , Assignment Help, Ask Question on Disadvantages - point to point , Get Answer, Expert's Help, Disadvantages - point to point Discussions

Write discussion on Disadvantages - point to point
Your posts are moderated
Related Questions
Access Networks and Physical Media Access  networks  are the  physical  links(S) that connect  an end  systems to its edge  router. Which  is the  first router on a path  fr

DNS Message There are  the only  two kinds  of DNS message DNS query and reply messages. Further mote both query  and reply message have  the same  format  as shown in figure.

Q. Describe Flow and Error Control Mechanisms? Flow and Error Control Mechanisms - Stop and Wait ARQ - Go-Back ARQ - Selective Repeat ARQ

What is the main purpose of OSPF? OSPF, or Open Shortest Path First, is a link-state routing protocol that uses routing tables to verify the best possible path for data exchang

What are the responsibilities of Application Layer? The Application Layer enables the user, whether human or software, to access the network. It gives user interfaces and suppo

Network Data Storage 1. What is the Small Computer System Interface Architecture 2. Describe the various Fibre Channel standards. 3. What is the difficulties in building

In 3-tier Client/Server systems, the application logic (or process) lives in the middle tier and it is removed from the data and the user interface. In theory, the 3-tier Client/Se

Mesh It is of two dimensional network.  In this every processing elements are arranged in a two dimensional grid. The processor are in rows i and column j are denoted by PEi

With an object server, the Client/Server application is written as a set of communicating objects. Client object commune with server objects using an Object Request Broker (ORB). T

Throughput is a calculate of the rate at which data can be transmit through the network. The throughput capability of the underlying hardware is known bandwidth. Because every fram