Packet filtering firewall, Computer Network Security

Assignment Help:

Packet Filtering Firewall

Packet filtering is a network security mechanism that works by controlling what data can flow in and out of the network. The basic device that interconnects IP networks is called a router. Packets that are traversing the network travel from router to router until they reach their destination. Each packet contains the address of its ultimate destination which tells the router where it wants to go. Routers communicate with each other through routing protocols like Routing Information Protocol (RIP)  and Open Shortest Path First (OSPF)  and build routing tables in their memories. These tables help the routers to determine how to get the packets to their destination. While routing a packet, a router compares the packet’s destination address to the entries in the routing table and forward the packets as directed by the routing table. In determining how to forward a packet towards it destination, a packet filtering router also analyzes each packet against a set of rules and those that conform to these rules are allowed to pass through while others are discarded.


Related Discussions:- Packet filtering firewall

How does message switching operate, Question: Human telephone conversat...

Question: Human telephone conversations are characterized by irregular pauses, alternating with irregular bursts of speech. In contrast, communication via computers is char

Network-based ids (nids), Network-Based IDS (NIDS) A NIDS resides on com...

Network-Based IDS (NIDS) A NIDS resides on computer or appliance connected to segment of an organization’s network and looks for signs of attacks. While examining packets, a NID

Calculate the total latency, Question (a) Inspect the following ifconfi...

Question (a) Inspect the following ifconfig output of an IPv6 interface: i. What is the hidden Hardware Address of the interface on Line #1? ii. What is the hidden subn

Explain the usage of digital signature, a) Explain the contents of the Cost...

a) Explain the contents of the Cost Assessment. b) Various Documents are needed for Configuration Management. State three of them, and describe their importance. c) Given tha

What is an autonomous system, QUESTION 1: a) Differentiate between a r...

QUESTION 1: a) Differentiate between a routing protocol and a routed protocol. b) Describe any three design goals of Routing protocols. c) Lists some of the features shared

Pinging a web server, Ask quIf you are pinging a web server from a user’s c...

Ask quIf you are pinging a web server from a user’s client PC, how might the statistical information provided by ping be useful to you?estion #Minimum 100 words accepted#

Mr David, why is it that sometime we put password in our account to login o...

why is it that sometime we put password in our account to login or signup and it would not work?

Describe the process of components identification, Probelm 1: Give the ...

Probelm 1: Give the History and Evolution of Wireless Communication System. Complete explanation Probelm 2: Describe the process of Components Identification and cal

Attacks on cryptosystems-cryptography, Attacks on Cryptosystems Attacks a...

Attacks on Cryptosystems Attacks are attempts to achieve unauthorized access to secure communications have characteristically used brute force attacks. Attacker may alternatively

Information asset classification-risk management, Information asset classif...

Information asset classification-risk management A number of organizations have data classification schemes (for instance confidential, internal, public data). The classificat

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd