0% found this document useful (0 votes)
125 views

TELNET

Telnet is a protocol that allows users to establish connections to remote systems. It enables a local terminal to appear as a terminal on the remote system. Users log in with their user ID and password. Logging can be local, accessing an application on the local system, or remote, accessing an application on another system. Telnet converts characters to a common format called Network Virtual Terminal (NVT) for transmission over the network. It allows clients and servers to negotiate options like binary transmission, echoing, and terminal type before or during the session. [/SUMMARY]

Uploaded by

vishnu haridas
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
125 views

TELNET

Telnet is a protocol that allows users to establish connections to remote systems. It enables a local terminal to appear as a terminal on the remote system. Users log in with their user ID and password. Logging can be local, accessing an application on the local system, or remote, accessing an application on another system. Telnet converts characters to a common format called Network Virtual Terminal (NVT) for transmission over the network. It allows clients and servers to negotiate options like binary transmission, echoing, and terminal type before or during the session. [/SUMMARY]

Uploaded by

vishnu haridas
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 24

TELNET

SUBMITTED BY
HARITHA T
M.sc Computer Science
TELNET
 TELNET is an abbreviation for terminal network.
 It is a standard TCP/IP protocol for virtual terminal
service.
 It is a general purpose client/server application
program.
 TELNET enables the establishment of a connection to
a remote system in such a way that the local terminal
appears to be a terminal at the remote system.
LOGGING
 To access the system, user logs into the system with
user-id. The system also includes password checking
to prevent an unauthorized user accessing the
resources.
 Logging process can be local logging or remote
logging.
LOGGING

 When the user logs into  When the user wants to


a local timesharing access an application
system, it is called local program or utility
log-in. located on a remote
machine , it is called
remote log-in.
LOCAL LOG-IN

Figure 1
 When the user types at the terminal, the keystrokes are
accepted by the terminal driver.

 The terminal driver passes the characters to the operating


system.

 The operating system interprets the combination of


characters and invokes the desired application program.
REMOTE LOG-IN

Figure 2
NETWORK VIRTUAL TERMINAL
 The user sends the keystrokes to the terminal driver, where the local
operating system accepts the characters but does not interpret them.

 The characters are sent to the TELNET client, which transforms the
characters to a universal character set called network virtual terminal
(NVT) characters and delivers them to the local TCP/IP protocol stack.

 The text in NVT form travel through the internet and arrive at the
TCP/IP stack at the remote machine.
 The characters are delivered to the operating system and
passed to the TELNET server which changes the characters to
the corresponding characters understandable by the remote
computer.
 However, the characters cannot be passed directly to the
operating system is not designed to receive characters from a
TELNET server.
 It is designed to receive characters from a terminal driver.
 A software called a pseudo terminal driver is added which
pretends that the characters are coming from a terminal.
CONCEPT OF NVT
NETWORK VIRTUAL TERMINAL

Figure 3
 The client telnet translates characters that come from
local terminal into NVT form and delivers them to the
network.

 The server telnet translates data and commands from


NVT form into the form acceptable by the remote
computer.
NVT CHARACTER SET

Figure 4
OPTIONS
 Options are extra features available to a user with a more sophisticated terminal.

 Some common options are as-

Code Option Meaning

0 Binary Interpret as 8-bit binary transmission

1 Echo Echo the data received on one side to the


other

5 Status Request the status of telnet

24 Terminal type Set the terminal type

32 Terminal speed Set the terminal type

Figure-5
34 Line mode Change to line mode
OPTION NEGOTIATION
Telnet lets the client and server negotiate
options before or during the use of the service.

Four control characters are used for this


purpose-
These control characters are as-
Meaning

WILL 1. Offering to enable


2. Accepting a request to enable

WONT 1. 1.Rejecting a request to enable


2. 2.Offering to disable

DO 1. 1.Approving an offer to enable


2. 2.Requesting to enable

DONT 1. 1.Dispproving an offer to enable


2. 2.Approving an offer to disable
3. 3.Requesting to disable

Figure 6
Offer to enable the option

Figure 7
Request to enable an option

Figure 8
Offer to disable an option

Figure 9
Request to disable an option

Figure 10
MODE OF OPERATION
Most Telnet implementation operate in one of three
modes-

 Default mode

 Character mode

 Line mode
DEFAULT MODE
 This mode is used if no other modes are invoked
through option negotiation

 Echoing is done by the client.

 The user types the character, client echoes the


character but does not send it until a whole line is
completed.
CHARACTER MODE
 Each character typed is sent by the client to the server.

 The server echoes the character back to be displayed


on the client screen.

 Echoing of the character can be displayed if the


transmission time is long.
LINE MODE
 It is proposed to compensate for the deficiencies of
default mode and character mode.

 In this line echoing is done by the client.

 The client then sends the whole line to the server.


END
THANK
YOU

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy