Explain working of telnet, Computer Engineering

Assignment Help:

Q. Explain Working of TELNET?

The working of TELNET

1.  Commands and characters are sent to operating system on common server computer.

2.  Local operating system sends these commands and characters to a TELNET client program, which is located on same local computer.

3.  TELNET client transforms the characters entered by the user to an agreed format termed as Network Virtual Terminal (NVT) characters and sends them to TCP/IP protocol stack of the server computer. NVT is a common device between the server and client.

4.  Commands and text are first broken into TCP and then IP packets and are sent across physical medium from the local client computer to server.

5.  At server computer's end, TCP/IP software collects all the IP packets, verifies their correctness and reconstructs the original command and handover the commands or text to that computer operating system.

6.  Operating system of the server computer hands over these commands or text to TELNET server program, which is executing on that remote computer.

7.  TELNET server program on the remote server computer then transforms commands or text from the NVT format to the format understood by the remote computer. TELNET can't directly handover the commands or text to operating system so TELNET hands over commands/text to the Pseudo-terminal driver.

8.  Pseudo-terminal driver program then hands over the commands or text to operating system of the remote computer, which then invokes application program on remote server.

The working of TELNET is extremely simple. Assume you are working as a faculty member of Expertsminds online tutoring faculty staff. You have a typical account FACULTY-1 on the Expertsminds computer, which is one of the hosts of Internet. You are selected for academic exchange scholarship to USA. You will get a user account in U.S.A. Though, all your colleagues know only your Expertsmind account. So, using Telnet you can always log on to your account in any country for mail your papers for using programs etc.

There are numerous databases available on the Internet. You can explore these databases by using Telnet. There are going to be several Internet services yet to be created. Each year and better means of accessing treasures of the Internet is appearing in which Telnet is key for accessing.


Related Discussions:- Explain working of telnet

What is boyce codd normal form, A relation schema R is in BCNF with respect...

A relation schema R is in BCNF with respect to a set F of functional dependencies if for all functional dependencies in F+ of the form a->b, where a and b is a subset of R, at leas

Loop used to show properties, Normal 0 false false false ...

Normal 0 false false false EN-IN X-NONE X-NONE MicrosoftInternetExplorer4  A loop invariant is

State in brief about the pseudo instruction, State in brief about the pseud...

State in brief about the pseudo instruction A pseudo instruction isn't a real instruction. CPU can't execute it. It often requires a complex architectural operation and if it w

What are the steps involved in authentication, What are the steps involved ...

What are the steps involved in authentication? Steps in Authentication The control over the access of the resources in the repository is exercised in two steps namely Auth

Multi-layer network architectures, Multi-Layer Network Architectures: ...

Multi-Layer Network Architectures: As we considered we saw in the previous lecture that perceptrons have limited scope in the type of concepts that they can learn - but they c

Why object oriented development not only allows reuse, Why object oriented ...

Why object oriented development not only allows reuse In a wider way we can say that object oriented development not only allows reuse and information sharing within an applica

Sorting algorithms, Two way merge sort for 84,83,78,90,23,123,98,159,8,200

Two way merge sort for 84,83,78,90,23,123,98,159,8,200

Explain the working of a three bit binary ripple counter, With the help of ...

With the help of clocked JK flip flops and waveforms, explain the working of a three bit binary ripple counter. Write truth table for clock transitions. Ans. Three-Bit Binary Rip

How can common bus system be constructed, How can common bus system be cons...

How can common bus system be constructed A common bus system could be constructed using multiplexers. These multiplexers select source register whose binary information is then

Different industries which use this marketing tool, What are the different ...

What are the different industries which use this marketing tool? Ans) Many dissimilar companies can use this tool for developing their business plan but it is often three main

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd