Firewalls, Computer Networking

Firewalls

Firewalls emerged as a new technology in 1990s but its idea was present near two decades back. Historical context of "Firewall" is quite literal. It was in use to describe a barrier that separates a portion of a building dealing with fire, like a stove or a kitchen, from the rest of the structure. Later firewall found its use in connection with steam engines. It was described as a wall which separates an engine fire from passenger cars. Firewall ideas were greatly matured when Jeff Mogul from Digital Equipment Corporation published his papers in 1988 . His work described various processes that could be used to make networks secure. It was Marcus Ranum of AT&T Bell Laboratories who proposed the design of firewall and its components. He also coined the term "Firewall" for this quickly maturing technology. His work got much attention in 1990 and firewalls gained commercial popularity

 

Posted Date: 9/13/2012 5:36:07 AM | Location : United States







Related Discussions:- Firewalls, Assignment Help, Ask Question on Firewalls, Get Answer, Expert's Help, Firewalls Discussions

Write discussion on Firewalls
Your posts are moderated
Related Questions
QUESTION (a) Define what you understand by the following terms in Network Flows: i) UnDirected Path ii) Directed Path iii) Directed Cycle. iv) Tree In each of th

ATM designers select cells over packets because of the following facts: Cells are fixed length and memory management for them is easy. Handling variable length packets tends

Question 1: (a) How are IPv4 addresses transformed into IPv6 addresses using IPv4 compatible addresses? (b) Name some of the simplifications that were introduced in IPv6.

What is use of Carrier sense multiple access Carrier sense multiple access with collision detection (CSMA/CD) is a form of medium access control in which a station listens to

Cable, Erase, and Reload the Router Step 1: Cable the network. Cable a network that is same to the one in the topology diagram. Step 2: Clear the configuration on the rou

Configure Spanning Tree Step 1: Examine the default configuration of 802.1D STP. On each switch, display the spanning tree table with the show spanning-tree command. R

Error Detection- 2D/LRC Adds an additional character (instead of a bit) A block of bits is prearranged in a table The Parity Bit for every data unit is calculate

Determine the benefits of security on internet or intranet Security has long been seen as a major threatening point in the implementation of the Internet or of Intranet technolog

Gives excellent low-level control of parallelism; Portable; Minimal overhead in data distribution and parallel synchronisation; and It is less error prone. Drawb