Questions!!

Thursday, October 1, 2009
@ Sowmya and group:
 
1. How is IP a connectionless protocol? Agreed that data can be transmitted without the consent of the reciever, but its not a rule which it follows always.
 
@ Rajani and group :
 
1.How secure is reverse proxy mechanisim? Consider google itself , if they use a combination of servers under same ip to handle the requests anybody else can do the same and pretend to be google right? This applies for any scenario where we can pretend to be some other standard servers? Is it possible? How secure is proxy mechanism?



--
Sahana

1 comments:

Unknown said...

no it is not a rule. connectionless implies that the recepient is unaware of the sender address and thus it does not acknowledge the sender. receiver does not have any role to play here except for accepting the sent data.

Post a Comment