Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

what is secure hand shake protocol

Answer Posted / jitender sinha

it is also know as ssh protocol
it work on 3ree step
let supoose that machine 1 want to comunicate withe machine 2
then what process take place.
step 1 node one send the request to the node to and wiat for ack
step 2.node 2 accept the request and send the ack
step 3 node 1 acccept the request and send the request again
and communucation get stared

Is This Answer Correct ?    2 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What are the different memories that are used in a cisco router?

1075


What is the difference between the communication and transmission?

1102


What are the three sources of signal degradation on a data link?

1280


State the difference between dynamic IP and static IP addressing?

1159


Referring to the commands shown, what command must next be used on the branch router prior to traffic being sent to the router?

1331


Which command we give for live view of remote site routers?

1030


How do you find valid hosts in a subnet?

1101


Which command we give for see routing table?

1109


What is the difference between dynamic ip and static ip addressing?

1148


Which protocol works only on cisco routers?

1077


Why we use debug command?

1155


How does L2TP process?

2170


What is ping? What is the usage of ping?

1133


Explain the difference between simple authentication and md5?

1131


What are the steps of data encapsulation?

1095