Telnet protocols - transport layer, Computer Networking

TELNET Protocols

The TCP/ IP protocol  suite  includes a simple textual  remote terminal protocols called  TELNET  that allow  a user to log into  a computer across an internet. TELNET  establishes  a TCP connection and then  passes keystrokes from the internet user  keyboard directly to the remote computer as if they had been  typed on a keyboard attached to the  remote machine. TELNET also carries textual output from the remote  machine back  to the user screen. The service is called transparent  because it gives  the  appearance that the  user keyboards and display attach directly to the remote machine.

TELNET  offers  three  basic  services. First  it defines  a network  virtual terminal that provides a standard interface to remote systems. Client  programs do not  have to  understand the details of all possible remote systems  they are built to use the standard interface. Second  TELNET  include a mechanism  that allows  the client  and server to negotiate options   and it provides a set of standard  option (  e ,g one of the option controls whether data passed across the connection uses the standard7 bit ASCII  character set  or an 8 bit  character set). Finally TELNET treats both ends  of eh connection symmetrically. In particular. TELNET does not  force client input  to come from a keyboard  not does  it force the client to display output  on a screen. Thus TELNET  allows  an arbitrary program  to become  a client. Furthermore either  end can negotiate options.

Posted Date: 3/12/2013 11:52:49 PM | Location : United States







Related Discussions:- Telnet protocols - transport layer, Assignment Help, Ask Question on Telnet protocols - transport layer, Get Answer, Expert's Help, Telnet protocols - transport layer Discussions

Write discussion on Telnet protocols - transport layer
Your posts are moderated
Related Questions
What do mean by tunnel mode? This is a mode of data exchange wherein two communicating computers do not use IPSec themselves. Instead, the gateway that is linking their LANs to

When we specifically block, single router update for other routers

What is DoS? A do, or Denial-of-Service attack, is an attempt to stop users from being able to access the internet or any other network services. Such attacks might be come in

Explain Client/Server Networking Model. A networking model where one or more powerful  computers (servers) give the dissimilar network services and all other user's computers (

What are the functions of the typical server program? Ans) It waits for client-initiated requests. Implements many requests at the similar time. Takes care of VIP clients first.

What is Bookmark A list of pages a user likes to frequently visit. Netscape® Navigator and Explorer® have a "bookmark" menu item which allows users to add favourite sites vi

NETWORK OWNERSHIP:   There are two types in this case: 1. Private Network 2. Public Network

Explain the meaning of Negotiation Negotiation is process of getting both sides to agree on some values or parameters to be used during communication. Maximum packet size is on

How do we do encryption and authentication in L2TP?

Explain teh term- Bits and Bitmap Many tiny dots, which are put together to make a picture. Bits are combined to make a graphic image called a bitmap. GIF and JPEG files are