Disadvantages of ip sec tunnelling mode, Computer Networking

Assignment Help:

Disadvantages of IP sec  Tunnelling mode

IP sec  tunnelling  mode has the  following  disadvantage

a.Encryption of  small  packets  generates a lot  networks  over head  thus  reducing  network  performance.

b.IP sec is  complicate and  complex with many  features. This complexity increased the probability  of loopholes  being  discovered by hackers.

c.The data  encryption standard  algorithm is very  susceptible to brute force  attacks  using  readily available  software  on the internet.


Related Discussions:- Disadvantages of ip sec tunnelling mode

Source to destination data transfer - datagram approach, Source to Destinat...

Source to Destination Data Transfer - Datagram approach - Each packet is treated independently. - Every pkt will take its own path to reach the destination. - There i

Dns records and messages - application layer, DNS Records  and Messages ...

DNS Records  and Messages Two types  of records  are used DNS. The  question records  are used in the question  section of the query and response  messages. The resource  reco

Comparison and contrast between the osi and tcp-ip model, Q. Comparison and...

Q. Comparison and Contrast between the OSI and TCP-IP Model? This presentation would discuss a few comparison and contrast between the 2 main reference models which use the con

Explain silly window syndrome, Q. Explain Silly window syndrome? When e...

Q. Explain Silly window syndrome? When either sending application sends data gradually or receiving application consumes data slowly - Illustration when 1 byte sent 40 bytes

Cnet sliding window protocol, implementing cnet sliding window protocol wit...

implementing cnet sliding window protocol with 6 nodes

Redhat, short note on redhat updation details? why redhat is popular?

short note on redhat updation details? why redhat is popular?

advance routing, i need help with this assigmnet reply asap pleas

i need help with this assigmnet reply asap please

Who initiates the ‘trap'' message, Question 1 Who initiates the ‘Trap' mes...

Question 1 Who initiates the ‘Trap' message? When is this message generated? Question 2 Discuss the features of a typical Network Management System.List (Fault Management,

Selective repeat ARQ, Selective Repeat ARQ - Processing at the receive...

Selective Repeat ARQ - Processing at the receiver additionally complex - The window size is reduced to 2(m-1) (2m/2 at most) - Both the transmitter as well as the receiv

Link layer process, Each link layer process will have two connections: one ...

Each link layer process will have two connections: one "up" to the appropriate IP layer process, and one "sideways" to the link layer process on the simulated machine at the other

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd