Unit-5 - Application Layer Protocols
Unit-5 - Application Layer Protocols
• Although Secure Shell (SSH) is a secure application program that can be used today for
several purposes such as remote logging and file transfer.
• It was originally designed to replace TELNET.
• It is a cryptographic network protocol that is used for transferring encrypted data over
the network. The port number of SSH is 22.
We briefly list the services provided by this protocol:
1. Privacy or confidentiality of the message exchanged.
2. Data integrity, which means that it is guaranteed that the messages exchanged between
the client and server are not changed/altered by an intruder.
3. Server authentication, which means that the client is now sure that the server is the one
that it claims to be.
4. Compression of the messages, which improves the efficiency of the system and makes
attack more difficult.
DHCP clients obtain a DHCP lease for an IP address, a subnet mask, and various DHCP options
from DHCP servers in a four-step process:
1. DHCP DISCOVER: The client broadcasts a request for a DHCP server.
2. DHCPOFFER: DHCP servers on the network offer an address to the client.
3. DHCPREQUEST: The client broadcasts a request to lease an address from one of the
offering DHCP servers.
4. DHCPACK: The DHCP server that the client responds to acknowledges the client,
assigns it any configured DHCP options, and updates its DHCP database. The client
then initializes and binds its TCP/IP protocol stack and can begin network
communication.