Tweet





Share

Common Carrier Time Services and Security Services

AppId is over the quota
AppId is over the quota

A common carrier is a private company that provides communications services for a free.

Time Services:

With the launch of the so-called Global Positioning System (GPS) satellites, microsecond accuracy became possible in workstations equipped with inexpensive radio receivers. Unfortunately, however, accurate clocks remain a major problem in the most widely used computer workstations and network technologies.

At the time of this writing, the usual clock for a PC or workstation consists of a quartz-based chip much like the one in a common wristwatch, accurate to within a few seconds per year. The initial value of such a clock is either set by the vendor or by the user, when the computer is booted. As a result, in any network of workstations, clocks can give widely divergent readings and can drift with respect to one another at significant rates. For these reasons, there has been considerable study of algorithms for clock synchronization, whereby the clocks on individual machines can be adjusted to give behavior approximating that of a shared global clock.

However, much of this work has a limited lifetime. GPS receivers can give extremely accurate time, and GPS signals are transmitted frequently enough so that even inexpensive hardware can potentially maintain time accurate to microseconds. By broadcasting GPS time values, this information can be propagated within a network of computers, and although some accuracy is necessarily lost when doing so, the resulting clocks are still accurate and comparable to within tens of microseconds. This development can be expected to have a major impact on the way that distributed software is designed-from a world of asynchronous communication and clocks that can be inaccurate by many times the average message latency in the network, GPS-based time could catapult us into a domain in which clock resolutions considerably exceed the average latency between sending a message and when it is received. Such developments make it very reasonable to talk about synchronous (time-based) styles of software design and the use of time in algorithms of all sorts.

Even coarsely synchronized clocks can be of value in distributed software for example, when comparing versions of files, microsecond accuracy is not needed to decide if one version is more current than another: Accuracy of seconds or even tens of seconds may be adequate. Security systems often have a concept of expiration associated with keys, but for these to be at risk of attacks an intruder would need a way to set a clock back by days, not fractions of a second. And although we will see that RFC protocols use time to detect and ignore very old, stale messages, as in the case of a security mechanism a clock would need to be extremely inaccurate for such a system to malfunction.

Security Services:

In the context of an RFC environment, security is usually concerned with the authentication problem. Briefly stated, this is the problem of providing applications with accurate information about the user-ID on behalf of which a request is being performed. Obviously, one would hope that the user-ID is related in some way to the user, although this is frequently the weak link in security architecture. Given an accurate source of user identifications, however, the basic idea is to avoid intrusions that can compromise user-ID security through break-ins on individual computers and even replacements of system components on some machines with versions that have been compromised and hence could malfunction.

To accomplish authentication, a typical -security mechanism will request some form of password or one-time key from the user at log-in time, and periodically thereafter, as keys expire on the basis of elapsed time. This information is used to compute a form of secure user identification, which can be employed during connection establishment. When a client binds to a server, the security mechanism authenticates both ends and (at the option of the programmer) arranges for data to be encrypted on the wire, so that intruders who witness messages being exchanged between the client and server have no way to decode the data contained within them. (Unfortunately, however, this step is so costly that many applications disable encryption and simply rely upon the security available from the initial connection setup.) Notice that for such a system to work correctly there must be a way to trust the authentication server itself: The user needs a way to confirm that it is actually talking to the authentication server and to legitimate representatives of the services it wishes to use. Given the anonymity of network communication, these are potentially difficult problems.


SOURCE : click here


Get New Article Alerts In Your Inbox

Subscribe to Computers Knowledge Article Alerts to get daily notifications of our newest articles in your email for free. You can unsubscribe at any time. share your opinion about Common Carrier Time Services and Security Services by comment on below post.

 

Thank you in advance.

Yours sincerely,

suyanto-signature


Bookmark to: Technorati   Bookmark to: Del.icio.us   Bookmark to: Google   Bookmark to: Yahoo   Bookmark to: Blinklist   Bookmark to: Digg   Bookmark to: Reddit

Related Posts :



0 komentar:

Posting Komentar

Categories

10100Mbps 156Inch 240GB 256MB 28GHz 2x120GB 384019003 412786001 418872001 419107001 463552003 519329002 5Port 608425002 608425003 609939001 7270FW 7Inch 80211g 920002555 about Access Accreditation Accreditations Accurate accused Acquires Adapter AdapterPower Advantage Advisor adware against Agency Alien Allows Altering Amazon AmericanStatesman AMZAZING Android Announce Announces Anyone appealDemocrat Apple arrested article Assessments Atlantic Atrix Attain Audio Austin Automation AutoMDIX Backlinks Bagleheads Barranco Based basics batteries Because Being Believe Benefits Better Black BlackBerry Bloomberg Bookmarking Books Boost Bottom Braces Bradleyaposs break bride Briefcase Brilliant bring browsing Budget Business businesses Busters Cable calculate Calculators Career Carrier CCCHSA0DSU01 CDROM CDRWDVD Certification Certifications change Changed charge Chatting cheap chest chips Choices Christian Clarksville Class Cleaner Clear Clearly clinical close cloud Combo coming commerants Common Commtouch companies Company Completely Computer ComputerActivecouk computers Computerworld computing ConceivablyTech Concept Connection Consumerization consumers Contemporary control Converter Cosmetic Costs could Courses CrossPlatform Cyber Cyberwar Dalvik daughter decision defpro Demystifying Dentistry dependency Depth design Desktop desktops destroy device devices Dewalt Diamond different digital Disable Dispatch disrupted documents domainB download Downs Droid DVDROM DWave Dwelling early Edgar Edition Education effective efficient Electronic Electronics Eliminate Elimination Elysium Embrace Enables engine engineer Ensure enyoy Eradicate escape Ethernet every exactly Examinations Excel expands Experts exploring extends Extension F7553D350 Facebook Factor faire Features Feeder Files Finest Finish Firefox Firewall first Flash Flyer Forbes Framework Freeze Freezes Friday function Fundamentals funding Fusion Gamers Games Gaming GDDR2 Geekzone Gerrit Getting GigaOm Globes Goodbye Google Googleaposs Government Gradual grande Greatest Guide hampel Hannspad Hannspree Harry hazard Heights hello Helps Herald Heres Hershey HewlettPackard Hints Homage homes hosting Huawei Huffington iCloud Immersion Imperio Importance Imports incarnate Increase India Industry infected infringement Inquirer Insider Inspire Instant Intel Intellectual intelligent InterinetSkim International Internet introducing Invest investigative iPhone Isnapost jargon joins Journal journalism Keyboard Kindle Kingston laptop laptops Laser Latest launches Leader leaks Learned Leelee Lessons Level Leveling Levels Lexington Lexmark Liliputing Limited Lindhurst Linksys LockheedMartin Logitech LogMeIn Lunch Magazine maintenant majorit majority Making malware management Managers Managing Manner Market Marketing MarketWatch Marketwire MctiviaFrom MD1024SD1333 Meadows media memory Menus Micro microSD Microsoft Midnight Might Million Minneapolis Mk550 Mobile Modern Module Monday Money Monitor Mortgage Mostly Mouse moving Mozilla MrExcelLiveLessons msnbccom MSPmentor mtiers Mueller Myths Needed Network networks newly NewsChannel Nextgov Nokia NoniPadTablet notebook Novel observer Office online Operating Optical OPTIMA optimization Oracle Ordinateurs Organization organizations ORourke outsource overtake Pages PanDigital Paperback Parents Particulars patents Payday Paying PC2700 people People percent perform Performance Permanently Personal Pfizer Philadelphia philippines Phillip phone PHOTOS Pinball Planning plans PocketCloud Pogoplug Points Polkast Popular Popularity Ports Potter Power PowerPoint Precaffeine press prices printing prints Produkt Professional Professionals Profitable Program promise promised Promote Property Prospects Protect prototype proven Provider public publishing punching purchasing purported Qosmio Qualification Qualifications quality Quarter quick Quickly Radeon rapidrelease Razer ready Reasons recall recovery Reflecting regarding register Registry relation release releases Relevance reliable Remote remotely Remove Reorganizes Replica Replication Reports Residence Restore restores Results Retail revealed Reviewed revolution right Ripping Rocket roots Router Running Samsung SanDisk Sapphires School schools Science Score Screen SDC2GB SDSDB8192A11 seamless search Seattle Second security Seeks Selling Sensation Sense Service services Setting Seven Short Shouldnt signs Sites sketches SlashGear Small smart Smartphone smartphones Smiles Smooth SN10T1 Sobieski Social Software solution Someones something Sorts Sound Spanish SPDIF special Specialists specs Spectacular Speed Sphere Spiralbound Spyware square StarTechcom Starting state Stealth SteelSeries Steve Stock Stocks Story Streaming Street student students Studies Superior supplier SupplyCord support surfing Switch Switcher system systems Table tablet tablets tagged Taiwan Tamas TE100S5 TechCrunch Techniques technology Tests Texts thefts Their Thinking THINTOS10 Threats Through Times TimesLeader timing Today Toshiba Toslink Total touch Toward transform Trend TRENDnet Trends trial Tribune Trust Turbine turbo Turning Tutorial Twitter Typical Ultimate Ultra understand Undertake Unique university Unveils Unwired Upgrade Upload Users Using Utica Value Vampire version Video Videonow Videos virus voice Warcraft Warrior Washington Watches Webcam WebOS Website websites wedding Weddings welcomes which White Wholesale Wilkes Window Windows Windowscompatible Wireless Wisdom Wizard Working World Worth Wrong X8300455NBK Xigmatek Yearold young yourself YouTube

 
Your Ad Here