Virtual terminal protocol vtp, Computer Network Security

Assignment Help:

Write down the short notes on VTR. Communication between different types of the equipment and software is made possible by making use of the networks. Full-screen text editor is software using which the communication is made possible among the screen and the user. Using editor, text is displayed on screen, cursor can be moved by the user and changes can be done in the text. But, the various rows and columns on the screen are dependent on the terminal which is being used that is the commands to change the cursor  position,  perform  delete  and  insert  operations  on  text  which  varies  as per  the  type  of the terminal. This problem can be ignored by the use of Virtual Terminal Protocol (VTP).

A VTP is the data structure whose information is maintained by the local terminal or application software. This protocol is used to define state of the terminal such as its shape, current position of cursor, number of rows and columns, reverse video indicator and colour. By referencing to this protocol, user and application do their operations irrespective of the terminal-specific issues. For example, the data is displayed on the screen independent of terminal type. VTP protocol does a reverse process when data is entered by the user. This process includes the three steps given below,

(i) The format of data structure is defined by the VTP.

(ii) The user input is converted into the standard form by using the software. 

(iii) The standard screen is read by application.

In case of scrolling, the virtual terminals save more data than the data which can be the displayed on screen, as shown figure below.

 Information stored in the VTI specifies first and last lines of the data displayed window. The displayed data is then defined within the window delimiters. Each time the user scrolls, delimiters are changed by virtual terminal software, thereby retrieving different text lines on the window.

An instance of VTP is Telnet, which is the network protocol used above LANs or Internet. This protocol generates the bidirectional interactive communication among a remote user and application.


Related Discussions:- Virtual terminal protocol vtp

Protocols for secure communications-cryptography, Protocols for Secure Comm...

Protocols for Secure Communications Securing Internet Communication by using S-HTTP and SSL Secure Socket Layer (SSL) protocol is a protocol that uses public key encryption t

Introduction to risk management and its component, INTRODUCTION TO RISK MAN...

INTRODUCTION TO RISK MANAGEMENT Risk management is the procedure of identifying and controlling risks facing an organization. Risk management is the discipline which is employed

Wireless networks, Wireless Networks The origin of wireless networks a...

Wireless Networks The origin of wireless networks and their ubiquity in the technological environment poses a new type of exposure and vulnerability for network security. Cont

Evaluate the percentage availability of the network, QUESTION a) "Two ...

QUESTION a) "Two of the key attributes of an enterprise network is that it have to be multi-platform and multisite." Decribe what you understand by this statement. b) A

Explain the operation of the matchmaker middle agent, Question 1: (a) E...

Question 1: (a) Explain the operation of the "matchmaker" middle agent. (b) Describe why broker middle agents are more efficient in terms of the time taken for a service to

Distinguish between passive and active attacks, Problem (a) Distinguis...

Problem (a) Distinguish between passive and active attacks. (b) Give two reasons why it is important to organise security awareness programs for users. (c) Describe how

Negative cycle algorithm in minimum cost flows, QUESTION: (a) Show the...

QUESTION: (a) Show the Negative Cycle Algorithm in Minimum Cost Flows. (b) List the steps added in finding a Negative Cycle. (c) Apply Dijkstra's algorithm on the subs

Explain the terms used in network security, Question 1 (a) Explain b...

Question 1 (a) Explain briefly the following terms as used in network security: (i) Denial of service (DoS) attack (ii) Birthday attack (iii) DeMilitarized Zone

Network analysis and network representation of a project, Question: Net...

Question: Network diagrams combine with a set of systematic analysis procedures, serve to remedy the shortcomings of the Gantt chart. Explain the following terms used in the ne

Topology, What is the concept of topology?

What is the concept of topology?

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd