Virtual terminal protocol vtp, Computer Network Security

Assignment Help:

Write down the short notes on VTR. Communication between different types of the equipment and software is made possible by making use of the networks. Full-screen text editor is software using which the communication is made possible among the screen and the user. Using editor, text is displayed on screen, cursor can be moved by the user and changes can be done in the text. But, the various rows and columns on the screen are dependent on the terminal which is being used that is the commands to change the cursor  position,  perform  delete  and  insert  operations  on  text  which  varies  as per  the  type  of the terminal. This problem can be ignored by the use of Virtual Terminal Protocol (VTP).

A VTP is the data structure whose information is maintained by the local terminal or application software. This protocol is used to define state of the terminal such as its shape, current position of cursor, number of rows and columns, reverse video indicator and colour. By referencing to this protocol, user and application do their operations irrespective of the terminal-specific issues. For example, the data is displayed on the screen independent of terminal type. VTP protocol does a reverse process when data is entered by the user. This process includes the three steps given below,

(i) The format of data structure is defined by the VTP.

(ii) The user input is converted into the standard form by using the software. 

(iii) The standard screen is read by application.

In case of scrolling, the virtual terminals save more data than the data which can be the displayed on screen, as shown figure below.

 Information stored in the VTI specifies first and last lines of the data displayed window. The displayed data is then defined within the window delimiters. Each time the user scrolls, delimiters are changed by virtual terminal software, thereby retrieving different text lines on the window.

An instance of VTP is Telnet, which is the network protocol used above LANs or Internet. This protocol generates the bidirectional interactive communication among a remote user and application.


Related Discussions:- Virtual terminal protocol vtp

What are the main objectives of a risk analysis, QUESTION 1 Risk ana...

QUESTION 1 Risk analysis helps companies prioritize their risks and shows management the amount of money that should be applied to protecting against those risks in a sensib

For providing the security, There are various benefits related with providi...

There are various benefits related with providing the security. They are given below,  (i)  Confidentiality/ Privacy (ii)  Integrity  (iii) Availability (iv)Authenticatio

Vigenere Cipher, What key which if used to encrypt the ciphertext again wou...

What key which if used to encrypt the ciphertext again would give back the plaintext (i.e. key is a weak key)? Define a formula for identifying weak keys for the cipher below (

Design a network layout, QUESTION: (a) Below is a capture of an Ethern...

QUESTION: (a) Below is a capture of an Ethernet II frame which contains an IPv4 packet and a TCP segment. Give the source MAC address for the frame in hexadecimal; the sourc

Explain rsa encryption, (a) Describe RSA encryption. (b) For an RSA encr...

(a) Describe RSA encryption. (b) For an RSA encryption the values of the primes are: p=29, q=31. select e=11, evaluate the public and private keys. (c) How can RSA be used fo

The major decision hierarchy for disclosing security problem, QUESTION ...

QUESTION The major decision hierarchy for disclosing security problems is if the problem is with the product owned by the business or if it is used by the business. Although th

What is internet, The Internet is known as the set of networks connect...

The Internet is known as the set of networks connected by routers that are configured to pass traffic among any machine attached to any network in the set. By internet several

Explain how can we achieved privacy in an e-mail system, Explain how can we...

Explain how can we achieved privacy in an e-mail system.  The full form of PEM is Privacy Enhanced Mail: PEM  is  the  internet  Privacy  Enhanced  Mail  standard  adopted

Principles of information security, The key concepts and frameworks covered...

The key concepts and frameworks covered in modules 1-4 are particularly relevant for this assignment. Assignment 2 relates to the specific course learning objectives 1, 2 and 3:

Introduction to physical security, INTRODUCTION TO PHYSICAL SECURITY The...

INTRODUCTION TO PHYSICAL SECURITY The Physical security addresses design, execution, and maintenance of countermeasures which protect physical resources of an organization. The

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd