Packet filtering firewall, Computer Network Security

Packet Filtering Firewall

Packet filtering is a network security mechanism that works by controlling what data can flow in and out of the network. The basic device that interconnects IP networks is called a router. Packets that are traversing the network travel from router to router until they reach their destination. Each packet contains the address of its ultimate destination which tells the router where it wants to go. Routers communicate with each other through routing protocols like Routing Information Protocol (RIP)  and Open Shortest Path First (OSPF)  and build routing tables in their memories. These tables help the routers to determine how to get the packets to their destination. While routing a packet, a router compares the packet’s destination address to the entries in the routing table and forward the packets as directed by the routing table. In determining how to forward a packet towards it destination, a packet filtering router also analyzes each packet against a set of rules and those that conform to these rules are allowed to pass through while others are discarded.

Posted Date: 9/13/2012 5:54:32 AM | Location : United States







Related Discussions:- Packet filtering firewall, Assignment Help, Ask Question on Packet filtering firewall, Get Answer, Expert's Help, Packet filtering firewall Discussions

Write discussion on Packet filtering firewall
Your posts are moderated
Related Questions
What key which if used to encrypt the ciphertext again would give back the plaintext (i.e. key is a weak key)? Define a formula for identifying weak keys for the cipher below (

Thinking ethically is difficult without a background in moral philosophy. Asking people to embrace ethics without offering practical explanation of the efficacy of so doing, is a t

(a) Show four Network Security attacks. How do they compromise security? (b) In what ways do the following devices or services contribute to security: (i) Firewall (ii) In

Question (a) Name 3 popular electronic mail access protocols? (b) i. What is DNS? ii. Briefly, describe what it does and how it works? iii. Why does DNS use a dist

hi have a look and tell me if u can do it. if u can do Q1then i will allow u to do Q2

Using the selected approach, you should then conduct an audit or review of the information security issues associated with the use of computing facility and report on the findings.

(a) Illustrate what you understand by Nyquist Capacity Theorem? (b) Consider we wish to transmit at a rate of 64 kbps over a 4 kHz noisy but error-free channel. What is the mini

(a) What is a pseudorandom generator? Give an example describing how it works. (b) Explain the key components of a wireless network and their purpose. (c) Describe the authen

(a) Briefly explain the following security goals provided by cryptography: confidentiality, authentication, integrity and non-repudiation. (b) State Kerckhoff's Princip

Identify Possible Controls For each threat and linked vulnerabilities which have residual risk, create primary list of control ideas. Residual risk is the risk which remains to