Explain working of telnet, Computer Engineering

Assignment Help:

Q. Explain Working of TELNET?

The working of TELNET

1.  Commands and characters are sent to operating system on common server computer.

2.  Local operating system sends these commands and characters to a TELNET client program, which is located on same local computer.

3.  TELNET client transforms the characters entered by the user to an agreed format termed as Network Virtual Terminal (NVT) characters and sends them to TCP/IP protocol stack of the server computer. NVT is a common device between the server and client.

4.  Commands and text are first broken into TCP and then IP packets and are sent across physical medium from the local client computer to server.

5.  At server computer's end, TCP/IP software collects all the IP packets, verifies their correctness and reconstructs the original command and handover the commands or text to that computer operating system.

6.  Operating system of the server computer hands over these commands or text to TELNET server program, which is executing on that remote computer.

7.  TELNET server program on the remote server computer then transforms commands or text from the NVT format to the format understood by the remote computer. TELNET can't directly handover the commands or text to operating system so TELNET hands over commands/text to the Pseudo-terminal driver.

8.  Pseudo-terminal driver program then hands over the commands or text to operating system of the remote computer, which then invokes application program on remote server.

The working of TELNET is extremely simple. Assume you are working as a faculty member of Expertsminds online tutoring faculty staff. You have a typical account FACULTY-1 on the Expertsminds computer, which is one of the hosts of Internet. You are selected for academic exchange scholarship to USA. You will get a user account in U.S.A. Though, all your colleagues know only your Expertsmind account. So, using Telnet you can always log on to your account in any country for mail your papers for using programs etc.

There are numerous databases available on the Internet. You can explore these databases by using Telnet. There are going to be several Internet services yet to be created. Each year and better means of accessing treasures of the Internet is appearing in which Telnet is key for accessing.


Related Discussions:- Explain working of telnet

Performance evaluation-parallel computing, Performance Evaluation In th...

Performance Evaluation In this part, we talk about the primary attributes used to measure the performance of a computer system. Unit 2 of block 3 is totally devoted to performa

Define strategy procedure, Q. Define Strategy Procedure? The strategy p...

Q. Define Strategy Procedure? The strategy procedure is called when loaded into memory by DOS or whenever controlled device request service. The major purpose of the strategy i

What are batch systems, What are batch systems?  Batch systems are quit...

What are batch systems?  Batch systems are quite appropriate for implementing large jobs that need little interaction. The user can submit jobs and return later for the results

How to run an app in a page with existing content, There are no needs.. If ...

There are no needs.. If you need to use a Viewport you can! If you want to render components into divs... you can do that aswell.

What do understand by the granularity of a parallel system, What do underst...

What do understand by the granularity of a parallel system ? Granularity refers to the quantity of computation complete in parallel relative to the size of the entire program. I

Example of bitwise-and operator, Example of Bitwise-AND Operator In the...

Example of Bitwise-AND Operator In the following example, the bitwise-AND operator (&) compares the bits of two integers, nNumA and nNumB: // Example of the bitwise-AND oper

Ds, explain about relations

explain about relations

Ai6301 - building blocks and techniques used in ai, The princess (or princ...

The princess (or prince if you're female) has been captured by the Evil Dragon and held prisoner in a tower. The tower is also surrounded by a maze to keep out the riff-raff. You

Cg transformations, magnify a triangle a(0,0), b(1,1), c(5,2) twice its siz...

magnify a triangle a(0,0), b(1,1), c(5,2) twice its size hile keeping c as fix

What are the kernel threads, What are the Kernel threads Kernel threads...

What are the Kernel threads Kernel threads are supported directly by the operating system .Thread creation; scheduling and management are done by the operating system. Thus the

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd