Virtual terminal protocol vtp, Computer Network Security

Assignment Help:

Write down the short notes on VTR. Communication between different types of the equipment and software is made possible by making use of the networks. Full-screen text editor is software using which the communication is made possible among the screen and the user. Using editor, text is displayed on screen, cursor can be moved by the user and changes can be done in the text. But, the various rows and columns on the screen are dependent on the terminal which is being used that is the commands to change the cursor  position,  perform  delete  and  insert  operations  on  text  which  varies  as per  the  type  of the terminal. This problem can be ignored by the use of Virtual Terminal Protocol (VTP).

A VTP is the data structure whose information is maintained by the local terminal or application software. This protocol is used to define state of the terminal such as its shape, current position of cursor, number of rows and columns, reverse video indicator and colour. By referencing to this protocol, user and application do their operations irrespective of the terminal-specific issues. For example, the data is displayed on the screen independent of terminal type. VTP protocol does a reverse process when data is entered by the user. This process includes the three steps given below,

(i) The format of data structure is defined by the VTP.

(ii) The user input is converted into the standard form by using the software. 

(iii) The standard screen is read by application.

In case of scrolling, the virtual terminals save more data than the data which can be the displayed on screen, as shown figure below.

 Information stored in the VTI specifies first and last lines of the data displayed window. The displayed data is then defined within the window delimiters. Each time the user scrolls, delimiters are changed by virtual terminal software, thereby retrieving different text lines on the window.

An instance of VTP is Telnet, which is the network protocol used above LANs or Internet. This protocol generates the bidirectional interactive communication among a remote user and application.


Related Discussions:- Virtual terminal protocol vtp

Steganography-cryptography, Steganography It is a process of hiding info...

Steganography It is a process of hiding information in use for a long time. Most popular modern version of this process hides information within files appearing to contain digit

Frame format and error detection, FRAME FORMAT AND ERROR DETECTION The...

FRAME FORMAT AND ERROR DETECTION The changed frame format also adds CRC. If there is an error happened in frame, then it typically causes receiver to removed frame. The frame

Explain why spreadsheets are so useful, Question: Spreadsheet packages ...

Question: Spreadsheet packages are widely used in Business. a) Explain why spreadsheets are so useful. b) Spreadsheet files are sometimes saved for use by other software

Find the capacity of the wcdma, Question: (a) Describe the term interfe...

Question: (a) Describe the term interference in the space, time, frequency, and code domain. (b) Consider a 1 G - AMPS: 824-849 MHz (forward) ; 869-894 MHz (reverse). B

Use the chinese remainder theorem to evaluate x, Use the Chinese remainder ...

Use the Chinese remainder theorem to evaluate x from the following simultaneous congruences: x ≡ 1 (mod 2); x ≡ 2 (mod 3); x ≡ 3 (mod 5). Calculate gcd(14526, 2568). (

Imap and pop functions, How does the POP functions? What are the advantages...

How does the POP functions? What are the advantages/benefits of IMAP over POP? POP stands for Post Office Protocol, version 3 (POP3) is one of the easiest message access protoc

CS, Discuss how developers should apply the following countermeasures to im...

Discuss how developers should apply the following countermeasures to improve the security of their code:

What you understand by the term brute force attack, Question: a) Expla...

Question: a) Explain what you understand by the term brute force attack, giving an example of such an attack b) Briefly outline the concept of Caesar cipher and identify a

Risk control strategies-, Risk Control Strategies Once the ranked vulner...

Risk Control Strategies Once the ranked vulnerability risk worksheet has created, they should choose one of following 4 strategies to control each risk: •Apply safeguards which

Hardware trojan detection, how to form the trojan integrated cirucit and wh...

how to form the trojan integrated cirucit and what are the tools are used to simulate the ciruit to our system and how to pass it as input to the clustering algorithm to get the ou

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd