Login
Remember
Register
Questions
Hot!
Unanswered
Categories
Ask a Question
Trivia Quiz
Download Books
Donate
Ask a Question
What is a proxy firewall
+1
vote
81
views
asked
Feb 28
in
Computer Networks
by
(user.guest)
Your answer
Help us make this a great place for discussion by always working to provide accurate answers.
Email me at this address if my answer is selected or commented on:
Email me if my answer is selected or commented on
Privacy: Your email address will only be used for sending these notifications.
Anti-spam verification:
Write 2 in words
To avoid this verification in future, please
log in
or
register
.
1
Answer
+1
vote
answered
Feb 28
by
(user.guest)
selected
Mar 10
by
(user.guest)
Best answer
A proxy firewall is a type of network firewall. It acts as an intermediary between computer and external networks, by receiving and selectively blocking data packets at the network boundary.
Your comment on this answer:
Improve the existing answer with your comment.
Email me at this address if a comment is added after mine:
Email me if a comment is added after mine
Privacy: Your email address will only be used for sending these notifications.
Anti-spam verification:
To avoid this verification in future, please
log in
or
register
.
Related questions
+1
vote
1
answer
106
views
What is a stateful inspection firewall
asked
Feb 28
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
119
views
What a firewall does?
asked
Aug 27, 2021
in
Computer Networks
by
anonymous
+1
vote
2
answers
163
views
What a firewall does?
asked
Aug 28, 2021
in
Computer Networks
by
anonymous
+1
vote
1
answer
99
views
Difference between a computer firewall and network firewall
asked
Feb 28
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
203
views
What are the variety of functions and capabilities built in firewall?
asked
Sep 6, 2021
in
Computer Networks
by
anonymous
+1
vote
1
answer
110
views
Mention some types of network firewall
asked
Feb 28
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
14
views
Briefly describe how Ethernet's exponential backoff works. What is one reason why Ethernet's exponential backoff might be better than randomizing retransmission attempts over a fixed-length time interval?
asked
3 days
ago
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
14
views
What is a Wireless Access Point
asked
3 days
ago
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
30
views
What is a network?
asked
May 14
in
Computer Networks
by
(user.guest)
0
votes
1
answer
203
views
A network on the Internet has a subnet mask of 255.255.240.0. What is the maximum number of hosts it can handle ?
asked
May 3
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
73
views
Due to the high variability of the Round Trip Time (RTT), the selection of the TCP timeout is a difficult task. What mechanism has been put in place to solve this?
asked
Apr 20
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
77
views
What is a serial port
asked
Feb 28
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
69
views
What is a practical example of the application of SSL
asked
Feb 25
in
Computer Networks
by
(user.guest)
0
votes
1
answer
158
views
What is a Token-ring protocol?
asked
Dec 26, 2021
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
223
views
What is a site-to-site VPN
asked
Dec 20, 2021
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
166
views
What is a remote Access VPN
asked
Dec 20, 2021
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
123
views
What is a domain name
asked
Dec 16, 2021
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
120
views
What is a Domain Name server
asked
Dec 6, 2021
in
Computer Networks
by
(user.guest)
0
votes
1
answer
230
views
Given a total bandwidth for cellular operator as 12.5 MHz. If each voice channel needs a bandwidth of 30 kHz, what is the total number of simplex channels per cluster and per cell in a 7-cell cluster?
asked
Nov 29, 2021
in
Computer Networks
by
(user.guest)
0
votes
1
answer
165
views
What is a Protocol?
asked
Nov 22, 2021
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
212
views
What is a query string
asked
Nov 8, 2021
in
Computer Networks
by
(user.guest)
0
votes
1
answer
153
views
What is a fibre-optic cable?
asked
Oct 28, 2021
in
Computer Networks
by
(user.guest)
+2
votes
1
answer
478
views
What is a client program? What is a server program? Does a server program request and receive services from a client program?
asked
Oct 8, 2021
in
Computer Networks
by
anonymous
+1
vote
1
answer
165
views
What is a Modem?
asked
Sep 17, 2021
in
Computer Networks
by
anonymous
+1
vote
1
answer
244
views
What is a propagation delay ?
asked
Sep 6, 2021
in
Computer Networks
by
anonymous
+1
vote
1
answer
122
views
What is a passphrase ?
asked
Sep 1, 2021
in
Computer Networks
by
anonymous
+1
vote
1
answer
828
views
What is IP. Draw a diagram of IP Packet Format and also describes the IP packet fields?
asked
Aug 26, 2021
in
Computer Networks
by
anonymous
0
votes
0
answers
1.1k
views
What are the propagation time and the transmission time for a 5-Mbyte message (an image) if the bandwidth of the network is 1 Mbps? Assume that the distance between the sender and the receiver is 12,000 km and that light travels at 2.4 x 108 m/s.
asked
May 7, 2021
in
Computer Networks
by
anonymous
+1
vote
1
answer
855
views
What is the disadvantage of using Nagle's algorithm on a badly congested network?
asked
Apr 13, 2021
in
Computer Networks
by
anonymous
0
votes
0
answers
396
views
ys are constant and which are variable? 4 Describe what is Web caching and how it can reduce the delay in receiving a requested object. Will Web caching reduce the delay for all objects requested 2 by a user or for only some of the objects? Why?
asked
Apr 8, 2021
in
Computer Networks
by
anonymous
+1
vote
1
answer
622
views
A bare bone forwarding table in VC network has four columns, what is meaning of value in each columns?
asked
Dec 11, 2020
in
Computer Networks
by
anonymous
0
votes
1
answer
1.5k
views
Suppose Bob initiates a TCP connection to Trudy who is pretending to be Alice. During the handshake, Trudy sends Bob Alice’s certificate. In what step of the SSL handshake algorithm will Bob discover that he is not communicating with Alice?
asked
Oct 20, 2020
in
Computer Networks
by
(user.guest)
0
votes
1
answer
1.4k
views
What is the purpose of a nonce in an end-point authentication protocol?
asked
Oct 20, 2020
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
606
views
From a service perspective, what is an important difference between a symmetric-key system and a public-key system?
asked
Oct 20, 2020
in
Computer Networks
by
(user.guest)
0
votes
1
answer
1.9k
views
What does it mean for a wireless network to be operating in “infrastructure mode?” If the network is not in infrastructure mode, what mode of operation is it in, and what is the difference between that mode of operation and infrastructure mode?
asked
Oct 11, 2020
in
Computer Networks
by
(user.guest)
0
votes
1
answer
3.0k
views
What is meant by a control plane that is based on logically centralized control? In such cases, are the data plane and the control plane implemented within the same device or in separate devices? Explain.
asked
Oct 8, 2020
in
Computer Networks
by
(user.guest)
0
votes
1
answer
2.5k
views
What is meant by a control plane that is based on per-router control? In such cases, when we say the network control and data planes are implemented "monolithically." what do we mean?
asked
Oct 8, 2020
in
Computer Networks
by
(user.guest)
0
votes
1
answer
3.1k
views
What is meant by the "match plus action" operation of a router or switch? In the case of destination-based forwarding packet switch, what is matched and what is the action taken?
asked
Oct 6, 2020
in
Computer Networks
by
(user.guest)
0
votes
1
answer
1.7k
views
What is a private network address? Should a datagram with a private network address ever be present in the larger public Internet? Explain.
asked
Oct 6, 2020
in
Computer Networks
by
(user.guest)
0
votes
1
answer
1.1k
views
What is meant by a "plug-and-play" or "zeroconf" protocol?
asked
Oct 6, 2020
in
Computer Networks
by
(user.guest)
0
votes
1
answer
2.2k
views
What is meant by the term "route aggregation"? Why is it useful for a router to perform route aggregation?
asked
Oct 6, 2020
in
Computer Networks
by
(user.guest)
0
votes
1
answer
3.1k
views
What field in the IP header can be used to ensure that a packet is forwarded through no more than N routers?
asked
Oct 6, 2020
in
Computer Networks
by
(user.guest)
+3
votes
1
answer
1.7k
views
What is an essential different between RR and WFQ packet scheduling? Is there a case where RR and WFQ will behave exactly the same?
asked
Oct 1, 2020
in
Computer Networks
by
(user.guest)
+2
votes
1
answer
3.1k
views
What is the role of the forwarding table within a router?
asked
Sep 30, 2020
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
1.3k
views
If a physical address is 48 bits (6 bytes) what is the minimum header size at the data link layer of the TCP/IP protocol suite?
asked
Jul 2, 2020
in
Computer Networks
by
anonymous
+3
votes
1
answer
2.1k
views
If a port number is 16 bits (2 bytes), what is the minimum header size at transport layer of the TCP/IP protocol suite?
asked
Jul 2, 2020
in
Computer Networks
by
anonymous
+1
vote
1
answer
561
views
What is a communication session in computer networking
asked
Oct 31, 2019
in
Computer Networks
by
anonymous
+2
votes
1
answer
1.1k
views
What is a protocol in computer networking
asked
Oct 31, 2019
in
Computer Networks
by
anonymous
+1
vote
1
answer
200
views
A computer on a 6-Mbps network is regulated by a token bucket. The token bucket is filled with a rate 1 Mbps. The bucket is initially filled to capacity with 1 Mb. How long can the computer transmit at the full 6 Mbps?
asked
Apr 13
in
Computer Networks
by
(user.guest)
0
votes
0
answers
101
views
Suppose that a 1Mbps connection is shared by 5 well behaving TCP and 5 UDP sources.
asked
Apr 10
in
Computer Networks
by
anonymous
Welcome to
CPEN
Talk
.com
Solution-oriented students of
computer engineering
on one platform to get you that
ONE SOLUTION
...