Virtual terminal protocol vtp, Computer Network Security

Write down the short notes on VTR. Communication between different types of the equipment and software is made possible by making use of the networks. Full-screen text editor is software using which the communication is made possible among the screen and the user. Using editor, text is displayed on screen, cursor can be moved by the user and changes can be done in the text. But, the various rows and columns on the screen are dependent on the terminal which is being used that is the commands to change the cursor  position,  perform  delete  and  insert  operations  on  text  which  varies  as per  the  type  of the terminal. This problem can be ignored by the use of Virtual Terminal Protocol (VTP).

A VTP is the data structure whose information is maintained by the local terminal or application software. This protocol is used to define state of the terminal such as its shape, current position of cursor, number of rows and columns, reverse video indicator and colour. By referencing to this protocol, user and application do their operations irrespective of the terminal-specific issues. For example, the data is displayed on the screen independent of terminal type. VTP protocol does a reverse process when data is entered by the user. This process includes the three steps given below,

(i) The format of data structure is defined by the VTP.

(ii) The user input is converted into the standard form by using the software. 

(iii) The standard screen is read by application.

In case of scrolling, the virtual terminals save more data than the data which can be the displayed on screen, as shown figure below.

 Information stored in the VTI specifies first and last lines of the data displayed window. The displayed data is then defined within the window delimiters. Each time the user scrolls, delimiters are changed by virtual terminal software, thereby retrieving different text lines on the window.

An instance of VTP is Telnet, which is the network protocol used above LANs or Internet. This protocol generates the bidirectional interactive communication among a remote user and application.

Posted Date: 7/20/2012 5:58:25 AM | Location : United States







Related Discussions:- Virtual terminal protocol vtp, Assignment Help, Ask Question on Virtual terminal protocol vtp, Get Answer, Expert's Help, Virtual terminal protocol vtp Discussions

Write discussion on Virtual terminal protocol vtp
Your posts are moderated
Related Questions
Risk Control Strategies Once the ranked vulnerability risk worksheet has created, they should choose one of following 4 strategies to control each risk: •Apply safeguards which

(a) Using the extended Euclidean algorithm, find the multiplicative inverse of 504 mod 67. (b) Decrypt the following ciphertext, which has been encrypted using Caesar cipher:

Question : a) Below is a capture of an Ethernet II frame which contains an IPv4 packet and a TCP segment. Give the source MAC address for the frame in hexadecimal; the source I

Question: (a) Explain the following security services: Confidentiality, Availability. (b) Which attack will be used to bypass even the best physical and logical security m

Selecting a Risk Control Strategy Risk controls involve selecting one of the 4 risk control strategies for every vulnerability. The flowchart is shown in the figure given below

Problem (1) - Alice, Bob and Charlie have a secret key a=3, b=4, c=5, respectively. - They want to find a common secret key using Diffie-Hellan key exchange protocol (with g

Hybrid Cryptography Systems This makes use of different cryptography systems. Except digital certificates, pure asymmetric key encryption is not used extensively. Asymmetric enc

This assignment aims to enhance students' understanding of the network protocol hierarchy and flow control and error control techniques by implementing a sliding window protocol in

Question: The Wired Equivalent Privacy (WEP) standard was created in order to give wireless networks safety and security features similar to that of wired networks. (a) L

PACKET SNIFFERS A packet network protocol analyzer is a network tool which collects copies of packets from network and analyzes them. It can give network administrator with valu