0% found this document useful (0 votes)
8 views

Computer Network

Computer Network 2

Uploaded by

indochini16
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views

Computer Network

Computer Network 2

Uploaded by

indochini16
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 67

Standard

Client –Server
Protocols
UNIT V

Prof. Arti Gavas 1


Prof. Arti Gavas 2
Prof. Arti Gavas 3
CLIENT

Prof. Arti Gavas 4


Prof. Arti Gavas 5
Prof. Arti Gavas 6
Prof. Arti Gavas 7
Prof. Arti Gavas 8
Prof. Arti Gavas 9
Prof. Arti Gavas 10
Prof. Arti Gavas 11
Prof. Arti Gavas 12
Prof. Arti Gavas 13
Prof. Arti Gavas 14
Prof. Arti Gavas 15
Prof. Arti Gavas 16
Prof. Arti Gavas 17
Prof. Arti Gavas 18
Prof. Arti Gavas 19
Prof. Arti Gavas 20
Prof. Arti Gavas 21
Prof. Arti Gavas 22
Prof. Arti Gavas 23
Prof. Arti Gavas 24
Prof. Arti Gavas 25
Prof. Arti Gavas 26
Prof. Arti Gavas 27
Prof. Arti Gavas 28
Prof. Arti Gavas 29
Prof. Arti Gavas 30
Prof. Arti Gavas 31
Prof. Arti Gavas 32
Prof. Arti Gavas 33
Prof. Arti Gavas 34
Prof. Arti Gavas 35
Prof. Arti Gavas 36
Prof. Arti Gavas 37
Prof. Arti Gavas 38
Prof. Arti Gavas 39
Prof. Arti Gavas 40
Prof. Arti Gavas 41
Prof. Arti Gavas 42
Multipurpose Internet Mail Extensions (MIME)

Prof. Arti Gavas 43


Prof. Arti Gavas 44
Prof. Arti Gavas 45
Prof. Arti Gavas 46
Prof. Arti Gavas 47
Prof. Arti Gavas 48
Secure Shell
❑Secure Shell (SSH) is a cryptographic network protocol for operating network services
securely over an unsecured network.

❑The best known example application is for remote login to computer systems by users.

❑SSH provides a secure channel over an unsecured network in a client-server architecture,


connecting an SSH client application with an SSH server.

❑Common applications include remote command-line login and remote command


execution, but any network service can be secured with SSH.

❑The protocol specification distinguishes between two major versions, referred to as


SSH-1 and SSH-2.

❑The most visible application of the protocol is for access to shell


accounts on Unix-like operating systems, but it sees some limited use on Windows as
well.

❑In 2015, Microsoft announced that they would include native support for SSH in a future
release Prof. Arti Gavas 49
Secure Shell
❑SSH was designed as a replacement for Telnet and
or unsecured remote shell protocols such as the
Berkeley rlogin, rsh, and rexec protocols.

❑Those protocols send information, notably passwords,


in plaintext, rendering them susceptible to interception
and disclosure using packet analysis.

❑The encryption used by SSH is intended to provide


confidentiality and integrity of data over an unsecured
network, such as the Internet,

Prof. Arti Gavas 50


Prof. Arti Gavas 51
Domain Name System

Prof. Arti Gavas 52


Prof. Arti Gavas 53
Prof. Arti Gavas 54
Prof. Arti Gavas 55
Prof. Arti Gavas 56
Prof. Arti Gavas 57
Prof. Arti Gavas 58
Prof. Arti Gavas 59
Prof. Arti Gavas 60
Prof. Arti Gavas 61
Prof. Arti Gavas 62
Prof. Arti Gavas 63
Prof. Arti Gavas 64
Prof. Arti Gavas 65
Prof. Arti Gavas 66
THANK YOU !

Prof. Arti Gavas 67

You might also like