Firewalls, Computer Networking

Firewalls

Firewalls emerged as a new technology in 1990s but its idea was present near two decades back. Historical context of "Firewall" is quite literal. It was in use to describe a barrier that separates a portion of a building dealing with fire, like a stove or a kitchen, from the rest of the structure. Later firewall found its use in connection with steam engines. It was described as a wall which separates an engine fire from passenger cars. Firewall ideas were greatly matured when Jeff Mogul from Digital Equipment Corporation published his papers in 1988 . His work described various processes that could be used to make networks secure. It was Marcus Ranum of AT&T Bell Laboratories who proposed the design of firewall and its components. He also coined the term "Firewall" for this quickly maturing technology. His work got much attention in 1990 and firewalls gained commercial popularity

 

Posted Date: 9/13/2012 5:36:07 AM | Location : United States







Related Discussions:- Firewalls, Assignment Help, Ask Question on Firewalls, Get Answer, Expert's Help, Firewalls Discussions

Write discussion on Firewalls
Your posts are moderated
Related Questions
By entering a 16 as the hop count, the other routers recognize that the destination is unreachable.

Simplicity The advantage of this approach is the simplicity  of receiver buffering. The  receiver need not  buffer out of  order packets the sender must maintain the upper an

Q. Explain about Mesh Topology? - Dedicated point-to-point links to each other device - n (n-1)/2 links an every device will have n-1 I/O ports - Advantages - Dedic

Q. Explain the process of piggybacking? When a data frame arrives in its place of immediately sending a separate control frame and the receiver restrains itself and waits until

different framing methods

Work-Sharing Constructs A work-sharing construct distributes the implementation of the associated region between the members of the team that encounters it. A work-sharing cons

how to implement chord connection as the network management system ?

Question: a) The cpio utility has three operating modes. What are they? b) The characters of the permission string are broken up into three groups of three characters. Ex

a transperent switch is inserted between two local area networks ABC and XYZ.network ABC has workstation 1,2,and 3 and Network XYZ has workstation 4,5, and 6. show the contents of

Question: (a) Show by means of a diagram the Ethernet frame structure and describe the six fields of the Ethernet frame structure. (b) Explain the operation of the Carrier S