Network virtual terminal - transport layer , Computer Networking

Network Virtual Terminal

 

1977_Network Virtual Terminal.png

                                                                         figure concept of NVT

To accommodate heterogeneity TELNET  defines how  data  command  sequence are  sent across the internet. the defines on is  known  as the network  virtual terminal. As figure illustrates the client software translate keystrokes and command  sequences form  the user terminal into NVT format  and sends  them to the server. Server  software  translates systems  incoming data and command  from NVT format  into the format  the remote  systems  requires.  For data  returning the remote server translates from  the remote  machine  format to NVT  and the  local  translate form  NVT  to the local  machines format.

NVT Character set: The definition of NVT is straight forward NVT uses  tow sets for characters one  for data  and the other  for control. Both  are 8 bits. For  data NVT  is an 8 bit  character set in which  the 7  lowest order bits  are the same as ASCII and the highest order is 0. To send control  characters between  computers (From  client to server or vice versa).NVT  uses an 8 bit characters set which  the highest order bit  is set to 1. Some of  the control  character and their  meaning  are.

 

Posted Date: 3/13/2013 12:02:53 AM | Location : United States







Related Discussions:- Network virtual terminal - transport layer , Assignment Help, Ask Question on Network virtual terminal - transport layer , Get Answer, Expert's Help, Network virtual terminal - transport layer Discussions

Write discussion on Network virtual terminal - transport layer
Your posts are moderated
Related Questions
What is the disadvantage of a star topology? One major drawbacks of star topology is that once the central hub or switch get damaged, the whole network becomes unusable.

Extranets can also be utilized to link an intranet to the Internet in order that remote offsite access can be built into a company's intranet through an authorized individual. It c

Determine the uses of firewalls The firewalls available today do all the things, viz., like filter the data packets, provide proxy services and do stateful inspection of packet

1.  A computer system has a two-level memory cache hierarchy. The L1 cache has a zero hit penalty, a miss penalty of 5 ns and a hit rate of 95 percent. The L2 cache has a miss pena

what's the difference among Symmetric and Asymmetric cryptosystem?

What is Piggy Backing? A process called piggybacking is used to get better the efficiency of the bidirectional protocols. When a frame is carrying data from A to B, it can also

What is basic purpose of Routers

Q. What is Source Routing? Source Routing - Sender of packet defines bridges and routes that packet should take - Complete path of bridge IDs and destination address i

What are the different technologies involved in establishing WAN links? Analog connections - using conventional telephone lines; Digital connections - using digital-grade telep

List the steps included in creating the checksum. a. Separate the data into sections b. Add the sections together using 1's complement arithmetic c. Take the complement o