Explain working of telnet, Computer Engineering

Assignment Help:

Q. Explain Working of TELNET?

The working of TELNET

1.  Commands and characters are sent to operating system on common server computer.

2.  Local operating system sends these commands and characters to a TELNET client program, which is located on same local computer.

3.  TELNET client transforms the characters entered by the user to an agreed format termed as Network Virtual Terminal (NVT) characters and sends them to TCP/IP protocol stack of the server computer. NVT is a common device between the server and client.

4.  Commands and text are first broken into TCP and then IP packets and are sent across physical medium from the local client computer to server.

5.  At server computer's end, TCP/IP software collects all the IP packets, verifies their correctness and reconstructs the original command and handover the commands or text to that computer operating system.

6.  Operating system of the server computer hands over these commands or text to TELNET server program, which is executing on that remote computer.

7.  TELNET server program on the remote server computer then transforms commands or text from the NVT format to the format understood by the remote computer. TELNET can't directly handover the commands or text to operating system so TELNET hands over commands/text to the Pseudo-terminal driver.

8.  Pseudo-terminal driver program then hands over the commands or text to operating system of the remote computer, which then invokes application program on remote server.

The working of TELNET is extremely simple. Assume you are working as a faculty member of Expertsminds online tutoring faculty staff. You have a typical account FACULTY-1 on the Expertsminds computer, which is one of the hosts of Internet. You are selected for academic exchange scholarship to USA. You will get a user account in U.S.A. Though, all your colleagues know only your Expertsmind account. So, using Telnet you can always log on to your account in any country for mail your papers for using programs etc.

There are numerous databases available on the Internet. You can explore these databases by using Telnet. There are going to be several Internet services yet to be created. Each year and better means of accessing treasures of the Internet is appearing in which Telnet is key for accessing.


Related Discussions:- Explain working of telnet

Show the classification of printers, Q. Show the Classification of Printers...

Q. Show the Classification of Printers? Printers can be classified on following bases: a) Impact: Impact printers print by impact of hammers on ribbon (for example Dot-Matri

Explain high level data link control, Explain High Level Data Link Control....

Explain High Level Data Link Control. HDLC - it is High Level Data Link Control: Protocol Overall explanation: Layer 2 of the OSI model is the data link layer. One of the

Operator, write algorithm and draw flowchart for exchange the values of two...

write algorithm and draw flowchart for exchange the values of two variables.

What is link destruction, What is link destruction? Link destruction is...

What is link destruction? Link destruction is inverse of link creation. When a link is destroyed makes sure the associated objects accessible by other handles or intentionally

Explain cache memory, What is cache memory? It is a small, fast memory ...

What is cache memory? It is a small, fast memory that is inserted among large, slower main memory and the processor. It decreases the memory access time

Which rule is used for the expansion of nested macro calls, The expansion ...

The expansion of nested macro calls done by using of? Ans. LIFO rule is used for the expansion of nested macro calls.

Dynamic programing, a ship is loaded with a stock of 3 items each unit of i...

a ship is loaded with a stock of 3 items each unit of item n has a wt wn and vn the max cargo wt the ship can take is the details of 3items are item(n):1 2 3 wt(wn):2 3 1 value(vn)

How do you pass basic types by reference, How do you pass basic types by re...

How do you pass basic types by reference?   In the case of basic types like bool, int, uint, etc. you can in fact choose among the two forms. If you prefix the method parameter

Distinguish between how ntfs and fat store time, Problem (a) Distingu...

Problem (a) Distinguish between how NTFS and FAT store time. Describe your answer. (b) Unix epoch starts as from January 1, 1970, 00:00:00 GMT. Provide that Unix stores

How can we decrement and increment operations, How can we decrement and in...

How can we decrement and increment  operations We  can  implement decrement  and increment  operations  by  using  a  combinational circuit  or  binary  down/up counters.  In

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd