13.07.2015 Views

View File - University of Engineering and Technology, Taxila

View File - University of Engineering and Technology, Taxila

View File - University of Engineering and Technology, Taxila

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

SecurityData security is a matter <strong>of</strong> great concern to many Internet users. Two broadtypes <strong>of</strong> security have been discussed in the literature <strong>and</strong> in practice: firewalls<strong>and</strong> encryption. A prominent public-key encryption method for e-mail is thePretty Good Privacy (PGP), which is based on the Rivest–Shamir–Adleman(RSA) algorithm [15]. A secured network can be built over the network byencrypting <strong>and</strong> decrypting information at both end terminals <strong>and</strong> stations.Chapter 1, Sec. 1.4 discusses the principles <strong>of</strong> encryption <strong>and</strong> decryption.Firewalls attempt to provide filters for both incoming <strong>and</strong> outgoingpackets in order to improve the security <strong>of</strong> the networks connected to theInternet. Examples includePacket filters, which use the IP address <strong>and</strong> TCP port number to decideif a packet can pass through the routers. This filter type is used at thenetwork layer to regulate traffic flow.Proxy servers (also called circuit-level gateways) prevent direct connectionfrom the outside to the service on the inside.Stateful packet inspection (also called dynamic firewall technology) usesa comparison-basis technique, where a packet under filtering iscompared with the saved state <strong>of</strong> the previously forwarded packets.If the record shows that the packet under inspection appears reasonable,then permission is granted to pass the packet to the intendeddestination.Several firewall products are currently available.8.3.2 The Internet Via SatelliteCurrent technology allows the Internet interaction channel to remain withinthe ISDN link. Satellite technologies are uniquely poised to address some <strong>of</strong>the key challenges that must be met for the Internet to continue its rapidexpansion <strong>and</strong> advancement: specifically, high-speed access for rural <strong>and</strong>remote areas; the distribution <strong>and</strong> delivery <strong>of</strong> media-rich content; <strong>and</strong> tightintegration with existing technologies. With advances in technology <strong>and</strong> theminiaturization <strong>of</strong> electronic components, bidirectional communications canbe carried over satellite, eliminating the necessity <strong>of</strong> the subscribers’ (endusers’) terrestrial Internet connections that are inherent with the existing onewaysatellite systems.Figure 8.15 shows a basic Internet access through satellite. The Internetuser (subscriber) accesses the Internet via his=her ISP, which then establishesCopyright © 2002 by Marcel Dekker, Inc. All Rights Reserved.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!