Telnet protocols - transport layer, Computer Networking

TELNET Protocols

The TCP/ IP protocol  suite  includes a simple textual  remote terminal protocols called  TELNET  that allow  a user to log into  a computer across an internet. TELNET  establishes  a TCP connection and then  passes keystrokes from the internet user  keyboard directly to the remote computer as if they had been  typed on a keyboard attached to the  remote machine. TELNET also carries textual output from the remote  machine back  to the user screen. The service is called transparent  because it gives  the  appearance that the  user keyboards and display attach directly to the remote machine.

TELNET  offers  three  basic  services. First  it defines  a network  virtual terminal that provides a standard interface to remote systems. Client  programs do not  have to  understand the details of all possible remote systems  they are built to use the standard interface. Second  TELNET  include a mechanism  that allows  the client  and server to negotiate options   and it provides a set of standard  option (  e ,g one of the option controls whether data passed across the connection uses the standard7 bit ASCII  character set  or an 8 bit  character set). Finally TELNET treats both ends  of eh connection symmetrically. In particular. TELNET does not  force client input  to come from a keyboard  not does  it force the client to display output  on a screen. Thus TELNET  allows  an arbitrary program  to become  a client. Furthermore either  end can negotiate options.

Posted Date: 3/12/2013 11:52:49 PM | Location : United States







Related Discussions:- Telnet protocols - transport layer, Assignment Help, Ask Question on Telnet protocols - transport layer, Get Answer, Expert's Help, Telnet protocols - transport layer Discussions

Write discussion on Telnet protocols - transport layer
Your posts are moderated
Related Questions
Computer Networks A computer  networks  can be defined as set of computer that  interact  among  the individual  computers sharing  resources or information. Reference models


Receive Window This  field  defines the size  of the  window in bytes  that the  other party  must  maintain. Note  that the  length  of this  field 16 bits  which  means


RIP and IGRP are Distance Vectoring protocols that send their whole routing tables to their neighbours. In some Cisco literature, EIGRP is listed as an 'advanced distance vector

What is piggybacked ACK The protocol will be incorrect. Suppose that 3-bit sequence numbers we are using. Consider following situation: A just send frame 7. B gets frame

Question: a) Consider the following MIP scenario. Quite a few enterprise networks use private addresses and NAPT for the communication to the Internet. i. Discu

Describe the count-to-infinity problem in distance vector

In Novell's use of RIP, there are two metrics used to make routing decisions.  What are they? Ans) A. Ticks. B. Hops

There are basically two functions for creating routing tables, which are as given: Manual entry Software Further there are two types for computing routing table inf