Explain working of telnet, Computer Engineering

Assignment Help:

Q. Explain Working of TELNET?

The working of TELNET

1.  Commands and characters are sent to operating system on common server computer.

2.  Local operating system sends these commands and characters to a TELNET client program, which is located on same local computer.

3.  TELNET client transforms the characters entered by the user to an agreed format termed as Network Virtual Terminal (NVT) characters and sends them to TCP/IP protocol stack of the server computer. NVT is a common device between the server and client.

4.  Commands and text are first broken into TCP and then IP packets and are sent across physical medium from the local client computer to server.

5.  At server computer's end, TCP/IP software collects all the IP packets, verifies their correctness and reconstructs the original command and handover the commands or text to that computer operating system.

6.  Operating system of the server computer hands over these commands or text to TELNET server program, which is executing on that remote computer.

7.  TELNET server program on the remote server computer then transforms commands or text from the NVT format to the format understood by the remote computer. TELNET can't directly handover the commands or text to operating system so TELNET hands over commands/text to the Pseudo-terminal driver.

8.  Pseudo-terminal driver program then hands over the commands or text to operating system of the remote computer, which then invokes application program on remote server.

The working of TELNET is extremely simple. Assume you are working as a faculty member of Expertsminds online tutoring faculty staff. You have a typical account FACULTY-1 on the Expertsminds computer, which is one of the hosts of Internet. You are selected for academic exchange scholarship to USA. You will get a user account in U.S.A. Though, all your colleagues know only your Expertsmind account. So, using Telnet you can always log on to your account in any country for mail your papers for using programs etc.

There are numerous databases available on the Internet. You can explore these databases by using Telnet. There are going to be several Internet services yet to be created. Each year and better means of accessing treasures of the Internet is appearing in which Telnet is key for accessing.


Related Discussions:- Explain working of telnet

Convert the following binary numbers into octal, Q. Convert the following B...

Q. Convert the following BINARY numbers into OCTAL, double check by converting the result OCTAL to BINARY. a) 111.111 b) 10110111 c) 0.11111

What is file scope, Explain File scope File scope: The variables and ...

Explain File scope File scope: The variables and functions with file scope appear outside any block or list of parameters and are accessible from any place in the translation

Input, what is an input?

what is an input?

Anu, write a program to find the area under the curve y=f(x) between x=a an...

write a program to find the area under the curve y=f(x) between x=a and y=b integrate y=f(x) between the limits of a and b. the area under a curve between two points can be found b

Explain the language processors, Name the language processors are? Asse...

Name the language processors are? Assembler, Compiler and Interpreter are the language processors.

Stencil duplicating, Stencil Duplicating Equipment Required Stenci...

Stencil Duplicating Equipment Required Stencil Duplicator Thermal copier (optional) Electronic stencil cutter Materials Stencil COPY paper Ink Clean

Determine condition how the output changed of JK flipflop, The output of a ...

The output of a JK flipflop with asynchronous preset and clear inputs is '1'. The output can be changed to '0' with which conditions ? Ans. Through applying J = 1, K = 1 and u

Explain approaches to reuse free memory area in a heap, Discuss two main ap...

Discuss two main approaches to reuse free memory area in a heap. Two major approaches to reuse free memory area in a heap are: First-fit: Allocate the first hole which i

Where does the cpu enhanced mode originate , Intel's 8086 was the first 32-...

Intel's 8086 was the first 32-bit processor, and as the company had to backward-support the 8086. All the modern Intel-based processors will run in the Enhanced mode, capable of sw

What is the impact of overflow for binary numbers, Q. What is the impact of...

Q. What is the impact of overflow for binary numbers? An overflow is said to have happened when sum of two n digits number takes n+ 1 digits. This definition is perfectly appli

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd