Security Protocols
Security Protocols
Security Protocols
Protocols
ensure protection of data. Used
with a communications
protocol, it provides secure
delivery of data between two
parties.
Secure Sockets Layer (SSL)
A low-level encryption scheme used to
secure transmissions in higher level HTTP
format
Private Communications Technology (PCT)
A security protocol that provides secure
transactions over the Web.
Secure Electronic Transmission (SET)
An encryption scheme developed by a
consortium of technology firms and
banks to secure credit card transactions.
Privacy Enhanced Mail (PEM)
Standard for secure e-mail on the
Internet.
Network News
Transfer
Protocol (NNTP)
It is used to connect to Usenet
groups on the Internet.
Usenet Newsreader Software
supports the NNTP protocol
HTTP and HTTP-NG
- Special-purpose computers
that manage LAN nodes
- Networks are linked via combination of
LANs of
hardware and software devices called different
types
bridges and gateways.
Star Topology
• Describes a network of
computers with a large
central computer (HOST) at
the hub that has direct
connections to a periphery
of smaller computers.
• Often used for a WAN
• Databases may be
distributed or centralized.
Hierarchical
Topology
Data
Collision Three basic methods for managing sessions
and controlling data collisions:
-Polling
-Token Passing
-Carrier Sensing
Polling
• Most popular technique for establishing a communication
session in WANs
• One site, the master, polls the other slave sites to
determine if they have data to transmit. If a slave
responds in the affirmative, the master file locks the
network while the data are transmitted.
• 2 Primary Advantages
It is noncontentious; data collisions are prevented.
An organization can set priorities for data communications
across the network.
Involves transmitting a special signal-
the token- around the network from
node to node in a specific sequence.