What is the host model?

The host model is a bit like a porter who stands on the "door" of the network computer and determines whether to accept or reject data packets. Information is sent along computer networks in packets, which are small pieces of data filtering via a network connection to their destination. Like letters sent to specific houses, packets moving over the Internet are sent to specific host addresses. These addresses consist of a number of numbers that are governed by the Convention address format called Internet Protocol (IP).

Most of the main operating systems use built -in host models. Since the consecutive versions of these operating systems have been developed and released, programmers have moved to prefer what is known to be "strong" host models in earlier versions - known as "weak" host models - which came earlier. Before accepting these two, it differs in the degree of validation that requires from the data packets.It is sent to a specific IP address of the computer, regardless of the network interface through which it was accepted. In other words, he likes to accept all and all packets addressed to the computer, regardless of their delivery method. The use of a weak host model can improve network connection; It facilitates the delivery of specific packets. On the other hand, it makes it easier for hackers to use the system because they do not have to provide such a large specificity to receive their packets.

The powerful host model deletes only packets that are sent to a specific IP address on the network interface where the packet is accepted. This means that the host model will only accept packets if they are specifically addressed not only to the IP address of the computer, but to a specific path to the IP address of the computer. This increases the security level for the network system, but has a corresponding weakening effect on the total network connection, PIt is more cumbersome to move packets to a particular computer.

Some systems do not offer the possibility to activate a strong host model. Instead, you can enable the "RP_Filter" option to increase the network security over the basic weak model. This provides a source verification for all incoming packets. This allows the system to track all packets back to their "return IP addresses" to confirm that the data is actually legitimate.

IN OTHER LANGUAGES

Was this article helpful? Thanks for the feedback Thanks for the feedback

How can we help? How can we help?