In this section, we first discuss eavesdropping. In a wired
network eavesdropping is possible, but in most cases it is
not practical. In most corporate networks, clients are con-
nected to switches and hence the traffic between the client
and the network is not readily visible to other clients. The
switches feed traffic into administered routers, which even-
tually lead to border routers into some backbone network.
Here, to snoop, the routers have to be reprogrammed (diffi-
cult) and the amount of traffic flowing through them makes
the overhead of sniffing and filtering prohibitive.
In this section, we first discuss eavesdropping. In a wired
network eavesdropping is possible, but in most cases it is
not practical. In most corporate networks, clients are con-
nected to switches and hence the traffic between the client
and the network is not readily visible to other clients. The
switches feed traffic into administered routers, which even-
tually lead to border routers into some backbone network.
Here, to snoop, the routers have to be reprogrammed (diffi-
cult) and the amount of traffic flowing through them makes
the overhead of sniffing and filtering prohibitive.
การแปล กรุณารอสักครู่..
