Many TCP/IP application protocols have been developed to meet the different purposes of transferring files, exchanging messages, and publishing pages. However, when TCP/IP protocols were being developed, it was assumed that access to the network was sufficient security, so there were no mechanisms to authenticate services and protect data as it crossed the network. On modern networks, we have to assume that no network channel is entirely safe, so robust application security is critical. Along with security, most application protocols also require hosts to be synchronized to the same time. This is particularly important for authentication and auditing functions. This lesson will help you to explain features of the protocols that fulfill these security and synchronization functions.
As you study this lesson, answer the following questions:
Acquire Centre