Packet filtering firewall, Computer Network Security

Packet Filtering Firewall

Packet filtering is a network security mechanism that works by controlling what data can flow in and out of the network. The basic device that interconnects IP networks is called a router. Packets that are traversing the network travel from router to router until they reach their destination. Each packet contains the address of its ultimate destination which tells the router where it wants to go. Routers communicate with each other through routing protocols like Routing Information Protocol (RIP)  and Open Shortest Path First (OSPF)  and build routing tables in their memories. These tables help the routers to determine how to get the packets to their destination. While routing a packet, a router compares the packet’s destination address to the entries in the routing table and forward the packets as directed by the routing table. In determining how to forward a packet towards it destination, a packet filtering router also analyzes each packet against a set of rules and those that conform to these rules are allowed to pass through while others are discarded.

Posted Date: 9/13/2012 5:54:32 AM | Location : United States







Related Discussions:- Packet filtering firewall, Assignment Help, Ask Question on Packet filtering firewall, Get Answer, Expert's Help, Packet filtering firewall Discussions

Write discussion on Packet filtering firewall
Your posts are moderated
Related Questions
Digital Signatures Digital Signatures are encrypted messages which can be proven mathematically to be authentic. These are created in response to rising requirement to verify in

Hashing is the transformation of a string of characters into a generally shorter fixed-length key or a value that presents the original string. Hashing is used to index and retri

(a) Describe the principal characteristics of associative memory networks? (b) Name the two basic types of associative memories and the differences between them. (c) Give an

Encode the following plaintext, using the Caesar cipher: LORD OF THE RINGS b) The following ciphertext jw njbh lxmn cx kanjt has been encoded using a

Describe the salient features of the multimedia. Also explain the applications of it. Multimedia can be understood as follows: Multimedia is on the whole a media which makes

Belady's Anomaly Also known FIFO anomaly. Generally, on raising the number of frames given to a process' virtual storage, the program execution is faster, because lesser page

Ask question #Minimum 100 words are there non parasitic viruses

What is the function of key secrecy and algorithm secrecy in security?  Algorithm Secrecy is explained as follows: ‘Algorithm secrecy’ is a method of keeping an algorithm

What questions should Iris ask Charlie about the new job, about Kelvin''s team, and about the future of the company?

Question: (a) Your office administrator is being trained to take server backups. Which authorization model could be ideal for this situation: MAC, DAC or RBAC? Justify your a