Firewalls, Computer Networking

Firewalls

Firewalls emerged as a new technology in 1990s but its idea was present near two decades back. Historical context of "Firewall" is quite literal. It was in use to describe a barrier that separates a portion of a building dealing with fire, like a stove or a kitchen, from the rest of the structure. Later firewall found its use in connection with steam engines. It was described as a wall which separates an engine fire from passenger cars. Firewall ideas were greatly matured when Jeff Mogul from Digital Equipment Corporation published his papers in 1988 . His work described various processes that could be used to make networks secure. It was Marcus Ranum of AT&T Bell Laboratories who proposed the design of firewall and its components. He also coined the term "Firewall" for this quickly maturing technology. His work got much attention in 1990 and firewalls gained commercial popularity

 

Posted Date: 9/13/2012 5:36:07 AM | Location : United States







Related Discussions:- Firewalls, Assignment Help, Ask Question on Firewalls, Get Answer, Expert's Help, Firewalls Discussions

Write discussion on Firewalls
Your posts are moderated
Related Questions
Categories of traditional Ethernet a)  Baseband - digital signals using Manchester encoding b) 10Base2, 10-Base-T, 10Base5, 10Base-FL c)  First number signifies data rate

Q. How to connect Remote LANs? - Remote bridges acting as connecting devices to connect LANs and point-to-point networks such as leased telephone lines or ADSL lines

Which NetWare protocol provides link-state routing? Ans) NetWare Link Services Protocol (NLSP) gives link-state routing. SAP (Service Advertisement Protocol) advertises network

PING - Packet Internet Gopher A utility that shows connections to one or more remote hosts. The ping command uses the ICMP echo request and echo reply packets to verify whether

what are the terms CSU, DSU and TSU?

Synchronous Synchronous traffic is able to consume a portion of the 100 Mbps total bandwidth of an FDDI network while asynchronous traffic can consume the rest. Synchronous

Illustrate the Bellman-Ford algorithm The Bellman-Ford algorithm uses only on information from its neighbours and knowledge of its link costs, to update it costs and paths. Dij

802.11g OFDM a) Uses OFDM with same 2.4 GHz band b) Achieves a 54-Mbps data rate c) Works with same 802.11b equipment

Q. Show VPNs Security and the Internet Model? - VPN's Security and the Internet Model - Application layer - provide for each application protocol (other layers may be left v

Static and Dynamic Interconnection Network In a static network, the connection amid input and output nodes is permanent and can't be changed. Static interconnection network can