How many methods used to control traffic flowing in-out, Computer Engineering

Assignment Help:

How many methods used to control traffic flowing into and out of the network by firewall?

Firewalls utilize one or more of three ways to control traffic flowing into and out of the network as given below:

1. Packet filtering: Packets i.e., small chunks of data are analyzed against a set of filters.

2. Packets which make this through the filters are sent to the requesting system and all others are rejected.

3. Proxy service: Information through the Internet is retrieved via the firewall and after that sent to the requesting system and as vice versa

4. Stateful inspection: A newer method which doesn't inspect the contents of each packet but in its place compares exact key parts of the packet to a database of trustable information.


Related Discussions:- How many methods used to control traffic flowing in-out

Main characteristics of horizontal organizational structure, What are the m...

What are the main characteristics of Horizontal Organizational Structure? Horizontal Organization’s main characteristics are given below: The work is structured all aroun

Define memory read and write operation, Define Memory read and write operat...

Define Memory read and write operation The transfer of information from a memory word to outside environment is known as read operation. The transfer of new information to be k

Explain load sharing processor configuration of spc, Explain how a centrali...

Explain how a centralized SPC organization works under load sharing operation. Under load sharing operation, an incoming call is allocated randomly or in a predetermined sequen

Illustrate about the macros and give its example, Illustrate about the macr...

Illustrate about the macros and give its example For instance, assume you want some data to be input into a spreadsheet if result of a calculation in cell K40 is negative: m

What is wireless transmission systems, What are wired and wireless transmis...

What are wired and wireless transmission systems? Transmission Systems: Modern type long distance transmission systems can be placed in three wide categories: 1. Radio Sy

Secondary storage - computer architecture, Secondary storage: Secondar...

Secondary storage: Secondary storage (or external memory) differs from primary storage in that aspect it is not accessible by the CPU directly. The computer typically uses its

What do you mean by loader, Q. What do you mean by Loader? Loader is a ...

Q. What do you mean by Loader? Loader is a program that assigns absolute addresses to program. These addresses are produced by adding the address from where program is loaded i

Hard-disk acquisition, Problem (a) Forensic methodology consists of t...

Problem (a) Forensic methodology consists of three phases. Briefly explian these three phases. (b) Sometimes it's best not to perform hard-disk acquisition. Provide two

State briefly about the register transfer, State briefly about the  Regist...

State briefly about the  Register Transfer A micro operation is a basic operation performed on information stored in one or more registers. The result of operation may replace

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd