Like Us

Find us on Facebook!!!

Blogger Tips and TricksLatest Tips For BloggersBlogger Tricks

Template information

Important

728-banner

Pages

Powered by Blogger.

Search This Blog

Protocol Spoofing



Protocol Spoofing is an essential part of data communications that helps to enhance performance. This technological aspect comes as an effective solution particularly in situations when an existing protocol is not adequate characterized by high error rates and long delays. Protocol spoofing evolved in the 1980s and is used as a data compression technique to improve throughput levels and thereby increase performance. While used as a data compression technique, the protocol headers and trailers are either removed completely or cut down, and finally reconstructed at the end points.

The technique of protocol spoofing involves communication devices (modem, router), host machines, compatible remote devices and communication links. The process commences with a modem/router simulating or ‘spoofing’ a connection’s remote endpoint to that of a local host. Through using the most appropriate protocol, communication is established with a compatible remote device, which spoofs its end of the communication link.
Spoofing, in computer security, pertains to different forms of data falsification or misrepresentation. The forgery of headers to send out misleading information is a form of spoofing. While protocol spoofing generally refers to the method of enhancing performance, there are many other types of protocol spoofing that perform different functions – both advantageous and disadvantageous.

Share on Google Plus

About Unknown

This is a short description in the author block about the author. You edit it by entering text in the "Biographical Info" field in the user admin panel.
    Blogger Comment
    Facebook Comment

0 comments:

Post a Comment