Data communications and computer networking (DCCN) has established itself as an essential part of most computer science and engineering curricula, usually in the form of courses and/or laboratories. For reliable train...
详细信息
Data communications and computer networking (DCCN) has established itself as an essential part of most computer science and engineering curricula, usually in the form of courses and/or laboratories. For reliable training in this area, this study presents a series of 10 experiments that serve as a complete laboratory course in DCCN. The prominent benefit of this laboratory set is that it uses available unix workstations where networking is simulated using software;this overcomes the obstacle of unavailable or expensive hardware and communication resources. The experiments presented here cover all layers, except the physical layer, of the Open Systems Interconnection (OSI) model. In addition to introducing the student to this wide-ranging subject matter, the laboratory set enhances his/her programming skills. This is accomplished by introducing the unixprogramming environment and using it to carry out the experiments, starting with editing and compiling simple programs, and ending with implementing advanced client-server applications. (C) 2004 Wiley Periodicals, Inc.
networking has brought about the potential of distributed applications to the user. Typically in such applications there are several different interacting processes that run in multiple hosts and communicate across th...
详细信息
ISBN:
(纸本)9780897915069
networking has brought about the potential of distributed applications to the user. Typically in such applications there are several different interacting processes that run in multiple hosts and communicate across the network for exchanging data and exercising control. Authentication is an intrinsic activity in the context of distributed applications. A server process has to authenticate a client process, possibly running on another network, prior to granting service to that client. A password in clear text might be sent across the network for this purpose, thus endangering the system security. We propose a heuristic protocol, as an alternative approach to the authentication problem. One important characteristic of our protocol is that its success can only be asserted in a probabilistic manner, nevertheless its probability of success, in any given authentication session, can be arbitrarily increased. The major advantage, however, is that no clear text copy of a password need ever be stored or exchanged across the network under the proposed protocol.
暂无评论