30.01.2013 Views

Master Course Computer Networks IN2097 - TUM

Master Course Computer Networks IN2097 - TUM

Master Course Computer Networks IN2097 - TUM

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Conclusion<br />

q� Middleboxes violate the initial end-to-end argument<br />

q� In many cases: valid reason for introduction<br />

§� Address depletion<br />

§� Security<br />

§� Performance<br />

q� Cause problems with many existing protocols<br />

q� If behavior is known, algorithms can be adapted accordingly<br />

§� Information Model (also processing model)<br />

§� Pairing based on knowledge<br />

Network <strong>IN2097</strong> - <strong>Master</strong> Security, <strong>Course</strong> WS 2008/09, <strong>Computer</strong> Chapter <strong>Networks</strong>, 9 WS 2012/2013 57

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!