X Servers - Limitations and Criticism - Network

Network

An X client cannot generally be detached from one server and reattached to another unless its code specifically provides for it (emacs is one of the few common programs with this ability). By extension, moving an entire session from one X server to another is generally not possible. However, approaches like Virtual Network Computing (VNC), NX and Xpra allow a virtual session to be reached from different X servers (in a manner similar to GNU Screen in relation to terminals), and other applications and toolkits provide related facilities. Workarounds like x11vnc (VNC :0 viewers) and NX (nxagent's shadow mode) also exist to make the current X-server screen available via VNC and NX respectively. This ability allows the user interface (mouse, keyboard, monitor) of a running application to be switched from one location to another without stopping and restarting the application. This can be important in some applications, such as process monitoring and control.

Network traffic between an X server and remote X clients is not encrypted by default. An attacker with a packet sniffer can intercept it, making it possible to view anything displayed to or sent from the user's screen. The most common way to encrypt X traffic is to establish a Secure Shell (SSH) tunnel for communication.

Like all thin clients, when using X across a network, bandwidth limitations can impede the use of bitmap-intensive applications that require rapidly updating large portions of the screen with low latency, such as 3D animation or photo editing. Even a relatively small uncompressed 640x480x24bit 30fps video stream can easily outstrip the bandwidth of a 100Mbit network for a single client. Early versions of X would suffer even when not using the local network, such as when using a linux workstation with the X server and client on the same system, due to the network-centric protocol which would still utilize an internal network model within the computer, via localhost or unix sockets. In contrast, modern versions of X generally have extensions such as MESA allowing local display of a local program's graphics to be optimized to bypass the network model and directly control the video card, for use of full-screen video, rendered 3D applications, and other such applications.

Read more about this topic:  X Servers, Limitations and Criticism

Other articles related to "networks, network":

X.75
... (ITU) (formerly CCITT) standard specifying the interface for interconnecting two X.25 networks ... Data Terminal Equipment (DTE)) and the network (Data Circuit-terminating Equipment (DCE)), X.75 specifies the interface between two networks (Signalling Terminal ... For example, X.25 only allows network-generated reset and clearing causes to be passed from the network (DCE) to the subscriber (DTE), and not the other way around since the ...
Xero Bank Browser - XeroBank Network
... xB Browser is optimized for use on the XeroBank anonymity network, which is a private and commercial broadband network operated by Xero Networks AG ... The XeroBank network routes traffic through at least two multi-jurisdictional hops ... In contrast to Tor, the XeroBank network supports both TCP and UDP protocols, performs channel multiplexing for low observability, is run by a single entity and costs money to use ...
Peer-to-peer - Advantages and Weaknesses
... In P2P networks, clients provide resources, which may include bandwidth, storage space, and computing power ... This property is one of the major advantages of using P2P networks because it makes the setup and running costs very small for the original content distributor ... If one peer on the network fails to function properly, the whole network is not compromised or damaged ...
Netwar - Network Structures
... Arquilla and Ronfeldt point to three basic types of networks that may be used by netwar actors Chain network – typified by smuggling networks, where end-to-end exchanges (information, contraband, etc.) must travel ... Hub or star network – disparate actors are tied to a central (though not necessarily hierarchical) node, and all communication travels through that central node ... All-channel network – every individual actor is able to communicate fully with all other nodes in the network ...
Network - Proper Nouns (names)
... Network (film), a 1976 American movie NETWORK (lobbying group), an American social justice group The Network, an American New Wave band Network (comics), a series ...

Famous quotes containing the word network:

    How have I been able to live so long outside Nature without identifying myself with it? Everything lives, moves, everything corresponds; the magnetic rays, emanating either from myself or from others, cross the limitless chain of created things unimpeded; it is a transparent network that covers the world, and its slender threads communicate themselves by degrees to the planets and stars. Captive now upon earth, I commune with the chorus of the stars who share in my joys and sorrows.
    Gérard De Nerval (1808–1855)

    Parents need all the help they can get. The strongest as well as the most fragile family requires a vital network of social supports.
    Bernice Weissbourd (20th century)

    A culture may be conceived as a network of beliefs and purposes in which any string in the net pulls and is pulled by the others, thus perpetually changing the configuration of the whole. If the cultural element called morals takes on a new shape, we must ask what other strings have pulled it out of line. It cannot be one solitary string, nor even the strings nearby, for the network is three-dimensional at least.
    Jacques Barzun (b. 1907)