Explain working of telnet, Computer Engineering

Assignment Help:

Q. Explain Working of TELNET?

The working of TELNET

1.  Commands and characters are sent to operating system on common server computer.

2.  Local operating system sends these commands and characters to a TELNET client program, which is located on same local computer.

3.  TELNET client transforms the characters entered by the user to an agreed format termed as Network Virtual Terminal (NVT) characters and sends them to TCP/IP protocol stack of the server computer. NVT is a common device between the server and client.

4.  Commands and text are first broken into TCP and then IP packets and are sent across physical medium from the local client computer to server.

5.  At server computer's end, TCP/IP software collects all the IP packets, verifies their correctness and reconstructs the original command and handover the commands or text to that computer operating system.

6.  Operating system of the server computer hands over these commands or text to TELNET server program, which is executing on that remote computer.

7.  TELNET server program on the remote server computer then transforms commands or text from the NVT format to the format understood by the remote computer. TELNET can't directly handover the commands or text to operating system so TELNET hands over commands/text to the Pseudo-terminal driver.

8.  Pseudo-terminal driver program then hands over the commands or text to operating system of the remote computer, which then invokes application program on remote server.

The working of TELNET is extremely simple. Assume you are working as a faculty member of Expertsminds online tutoring faculty staff. You have a typical account FACULTY-1 on the Expertsminds computer, which is one of the hosts of Internet. You are selected for academic exchange scholarship to USA. You will get a user account in U.S.A. Though, all your colleagues know only your Expertsmind account. So, using Telnet you can always log on to your account in any country for mail your papers for using programs etc.

There are numerous databases available on the Internet. You can explore these databases by using Telnet. There are going to be several Internet services yet to be created. Each year and better means of accessing treasures of the Internet is appearing in which Telnet is key for accessing.


Related Discussions:- Explain working of telnet

Explain one modulation technique used for high speed modems, Explain at lea...

Explain at least one modulation technique used for high speed modems. FSK - Frequency Shift Keying: In such technique the frequency of the carrier signal is changed as per to

Breakthrough for computer engineering, what is the importance of chemistry ...

what is the importance of chemistry for computer engineering?

Infix to reverse polish, A) Change the following formulas from reverse Poli...

A) Change the following formulas from reverse Polish to infix:             a) AB +C + D x               b) ABCDE + x x / B) Change the following formulas from infix to

Skip to line line number, The "SKIP TO LINE line number" is dependent on wh...

The "SKIP TO LINE line number" is dependent on which statement included in the report statement of the program. The "SKIP TO LINE line number" is dependent on "LINE-COUNT" stat

Explain in detail about real time processing, Explain in detail about Real ...

Explain in detail about Real time (transaction) processing When booking seats on a flight, for illustration, real time (transaction) processing would be used. Response to a que

Keypads operation, The 16 keys (4x4 matrixes) keypads diagram is shown in f...

The 16 keys (4x4 matrixes) keypads diagram is shown in figure 4 above. Let see how the keypad is connected. Each square of the alphanumeric has to be pushed to make a switch or con

Define congestion, Define Congestion. Congestion: This is uneconomic ...

Define Congestion. Congestion: This is uneconomic to give sufficient equipment to carry all the traffic which could possibly be offered to a telecommunication system. Inside

Linux, Discuss the risks of having a single root user and how more limited ...

Discuss the risks of having a single root user and how more limited management abilities can be given to others users on Linux/UNIX systems

Name the concepts of object oriented, Name the concepts of Object oriented ...

Name the concepts of Object oriented There are various concepts of object oriented analysis Abstraction, Encapsulation, Identity, Modularity, Hierarchy, Typin

Explain both absolute addressing and implied addressing, Absolute addressin...

Absolute addressing and  Implied addressing A fixed address is specified and also called as direct addressing. The location of data is implied by instruction itself, so no

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd