In the contemporary time, internet is the main mode of communication in daily life even though we all know the truth that it is the most unreliable and unsecured approach. Nevertheless, there is no other alternative of this approach. Here the significant of SSH materializes in the market with a protected ambience for the diffusion of data and files. It is the most preferred, acknowledged and immune course of action for the communication applications. It accommodates the remote access to the server with high security for the users. The level of remote access has ameliorated to the next level through SSH as it secures the data transfer by offering the protected tunnel. Other applications such as SFTP and SCP also utilize SSH channel for its secure functionality.
Even though, the secure remote login is possible through SSH and it has become the sine qua non part in all industries for protected communication, it cannot eschew itself from some shortcomings. A single TCP connection is used during the SSH connection which embed lack of roaming facility in it. Secondly, it accepts input on “character-at-a-time” mode that enhances delay time (RTT) in today’s 3G or 4G network. These limitations are the main cause which leads this book to introduce a novice protocol Mosh (Mobile Shell) that can subjugate these flaws and provide a fast, reliable and robust network connection for remote access.
Mosh can be considered as a more significant and useful component for the mobile users, comparing to SSH. The reasons are as follows. First of all, Mosh is able to maintain continuous session on a frequently disconnecting and changing IP address. Secondly, as the Mosh clients can predict and display the user keystrokes without taking help from the server, Mosh ameliorates the quality of the session in a challenging network.
This book has tried to cover all aspects of remote login, its protocols and the new protocol Mosh.
Even though, the secure remote login is possible through SSH and it has become the sine qua non part in all industries for protected communication, it cannot eschew itself from some shortcomings. A single TCP connection is used during the SSH connection which embed lack of roaming facility in it. Secondly, it accepts input on “character-at-a-time” mode that enhances delay time (RTT) in today’s 3G or 4G network. These limitations are the main cause which leads this book to introduce a novice protocol Mosh (Mobile Shell) that can subjugate these flaws and provide a fast, reliable and robust network connection for remote access.
Mosh can be considered as a more significant and useful component for the mobile users, comparing to SSH. The reasons are as follows. First of all, Mosh is able to maintain continuous session on a frequently disconnecting and changing IP address. Secondly, as the Mosh clients can predict and display the user keystrokes without taking help from the server, Mosh ameliorates the quality of the session in a challenging network.
This book has tried to cover all aspects of remote login, its protocols and the new protocol Mosh.