Telnet protocols - transport layer, Computer Networking

TELNET Protocols

The TCP/ IP protocol  suite  includes a simple textual  remote terminal protocols called  TELNET  that allow  a user to log into  a computer across an internet. TELNET  establishes  a TCP connection and then  passes keystrokes from the internet user  keyboard directly to the remote computer as if they had been  typed on a keyboard attached to the  remote machine. TELNET also carries textual output from the remote  machine back  to the user screen. The service is called transparent  because it gives  the  appearance that the  user keyboards and display attach directly to the remote machine.

TELNET  offers  three  basic  services. First  it defines  a network  virtual terminal that provides a standard interface to remote systems. Client  programs do not  have to  understand the details of all possible remote systems  they are built to use the standard interface. Second  TELNET  include a mechanism  that allows  the client  and server to negotiate options   and it provides a set of standard  option (  e ,g one of the option controls whether data passed across the connection uses the standard7 bit ASCII  character set  or an 8 bit  character set). Finally TELNET treats both ends  of eh connection symmetrically. In particular. TELNET does not  force client input  to come from a keyboard  not does  it force the client to display output  on a screen. Thus TELNET  allows  an arbitrary program  to become  a client. Furthermore either  end can negotiate options.

Posted Date: 3/12/2013 11:52:49 PM | Location : United States







Related Discussions:- Telnet protocols - transport layer, Assignment Help, Ask Question on Telnet protocols - transport layer, Get Answer, Expert's Help, Telnet protocols - transport layer Discussions

Write discussion on Telnet protocols - transport layer
Your posts are moderated
Related Questions
Router(config-if)# no cdp enable is the  command to disable CDP on an interface

Data Sharing One of the most important uses of networking is to allow the sharing of data. Before networking was common an accounting employee who wanted to prepare a report f

Routers The network  layer (also  called layer3) manages device  addressing  tracks the location  of devices on the network  and determines  the best  way to  move data. Which

S t d "B" 6.4 m Ku-BAND EARTH STATION (2004)   D-Sat (District Satellite Project) circuits for rural connectivity via satellite are in operation. Purpose of this project i

Encryption Authentication One common  technique  used to encrypt and authenticate in VPNs is IP security. IP sec  is a collection of protocols designed by the IETF( Internet En


MAC address called Physical address Because it's not changeable

DNS Working While discussing about the working of the DNS, there are many things which need to consider and play Avery significant role. This can the type of communication bet

QUESTION (a) What are the problems with IPv4 on today's Internet and how does IPv6 solve these problems? (b) Describe at least three ways in which IPv6 is more efficient tha