Network virtual terminal - transport layer , Computer Networking

Network Virtual Terminal

 

1977_Network Virtual Terminal.png

                                                                         figure concept of NVT

To accommodate heterogeneity TELNET  defines how  data  command  sequence are  sent across the internet. the defines on is  known  as the network  virtual terminal. As figure illustrates the client software translate keystrokes and command  sequences form  the user terminal into NVT format  and sends  them to the server. Server  software  translates systems  incoming data and command  from NVT format  into the format  the remote  systems  requires.  For data  returning the remote server translates from  the remote  machine  format to NVT  and the  local  translate form  NVT  to the local  machines format.

NVT Character set: The definition of NVT is straight forward NVT uses  tow sets for characters one  for data  and the other  for control. Both  are 8 bits. For  data NVT  is an 8 bit  character set in which  the 7  lowest order bits  are the same as ASCII and the highest order is 0. To send control  characters between  computers (From  client to server or vice versa).NVT  uses an 8 bit characters set which  the highest order bit  is set to 1. Some of  the control  character and their  meaning  are.

 

Posted Date: 3/13/2013 12:02:53 AM | Location : United States







Related Discussions:- Network virtual terminal - transport layer , Assignment Help, Ask Question on Network virtual terminal - transport layer , Get Answer, Expert's Help, Network virtual terminal - transport layer Discussions

Write discussion on Network virtual terminal - transport layer
Your posts are moderated
Related Questions
Q. Building a Defense in networking? When building a defense you must use a layered approach that includes securing - The network infrastructure the communications protocol

Explain the uses of Firewall in computer For Intranet developers, restricting access of unauthorised users to the Web site has been the greatest challenge. In addition to preve

i have an assigment due and want some one to do my assognment

Question The operational amplifier in the peak detector circuit shown in the figure below is powered from plus and minus 15 V. If Vout is at 1V and Vin is at 0.5V, at approxima

Each link layer process will have two connections: one "up" to the appropriate IP layer process, and one "sideways" to the link layer process on the simulated machine at the other

i have an exam i need it to be solved

THICK ETHERNET WIRING:  It needs thick coax cable. AUI cable joins from NIC to transceiver. AUI cable take digital signal from NIC to transceiver. The transceiver creates anal

TCP/IP is a name provided to the collection (or suite) of networking protocols that have been used to construct the global Internet. The protocols are also referred to as the DoD (

Configure the Logical Topology Step: Configure the host computers. Configure the static IP address, subnet mask, and gateway for every host computer.  Note: The followi

Sender requests connection from network. Other receiver agrees to connection. Computers interchange data through connection. One-endpoint requests network to split connection when