Explain the working of TELNET.

1 Answer

Answer :

TELNET: TELNET is an abbreviation for TErminaLNETwork. It is the standard TCP/IP protocol for virtual terminal service.


TELNET Working: * TELNET is a client-server application that allows a user to log on to a remote machine, giving the user access to the remote system. * The user sends the keystrokes to the terminal driver, where the local operating system accepts the characters but does not interpret them. * A terminal driver correctly interprets the keystrokes on the local terminal or terminal emulator. * The characters are sent to the TELNET client, which transforms the characters to a universal character set called network virtual terminal (NVT) characters and delivers them to the local TCP/IP protocol stack. * The commands or text, in NVT form, travel through the Internet and arrive at the TCP/IP stack at the remote machine. * Here the characters are delivered to the operating system and passed to the TELNET server, which changes the characters to the corresponding characters understandable by the remote computer. * However, the characters cannot be passed directly to the operating system because the remote operating system is not designed to receive characters from a TELNET server: It is designed to receive characters from a terminal driver. * A piece of software called a pseudo terminal driver is added which pretends that the characters are coming from a terminal. * The operating system then passes the characters to the appropriate application program. 


electronics2electrical.com 619 -  .jpg

Fig. Working of TELNET 

Related questions

Description : Explain working of WWW.

Last Answer : The Web is a repository of information in which the documents, called web pages, are distributed all over the world and related documents are linked together. The WWW today is a distributed client- ... the web server. Each time a request arrives, the corresponding document is sent to the client. 

Description : Explain TCP connection management with the help of TCP connection management finite state machine.

Last Answer : To keep track of all the different events happening during connection establishment, connection termination, and data transfer, TCP is specified as the Finite State Machine -FSM TCP ... , a server transitions through a solid line or a client transitions through a dotted line.

Description : Explain how TCP connections are established using the 3 way handshake. What happens when 2 hosts simultaneously try to establish a connection?

Last Answer : If 2 host Simultaneously try to establish connection: Simultaneous Open: * It's possible for two applications to send a SYN to each other to start a TCP connection, although the possibility is small, ... . * The CLOSING state takes the place of FIN-WAIT-2 or CLOSEWAIT in a common scenario.

Description : Explain about standard and non standard protocols at the application layer.

Last Answer : HTTP The Hypertext Transfer Protocol (HTTP) is a Application layer protocol used mainly to access data on the World Wide Web. HTTP uses the services of TCP on well-known port 80. FTP ... starts with the client when the user needs to download e-mail from the mailbox on the mail server.

Description : Explain the TCP connection establishment using a three way handshake mechanism.

Last Answer : Connection Establishment TCP uses a Three way handshaking mechanism to establish a connection between client and server machines. The three steps in three way handshaking mechanism are as follows.  SYN: ... This is just an ACK segment. It guarantees the completion of three way handshaking.

Description : Explain different transition method of IPv4 to IPv6.

Last Answer : Three Transition from IPv4 to IPv6 strategies are 1. Dual Stack 2. Tunnelling 3. Header Translation  1. DUAL STACK  In this kind of strategy a station has a dual stack of protocols run IPv4 and ... of the IPv6 packet is converted to an IPv4 header see figure. Fig. Header Translation

Description : Explain difference between distance vector and link state routing. 

Last Answer : Distance Vector Routing Link State Routing Routing tables are updated by exchanging information with the neighbours.  Complete topology is distributed to every router to update a routing table. ... Harder to configure Count to infinity problem No count to infinity problem

Description : Explain ICMP protocol. Describe the header format of ICMP.

Last Answer : The Internet Control Message Protocol (ICMP) supports the unreliable and connectionless Internet Protocol (IP). * ICMP messages are encapsulated in IP datagrams. There are two categories of ICMP messages ... query messages, the data section carries extra information based on the type of the query.

Description : Explain about telnet.

Last Answer : Remote terminal protocol. It allows to interact with a remote system as if terminal is directly connected to that machine. - working procedure - applications

Description : Explain following: I. Telnet II. FTP 

Last Answer : 1. Telnet: TELNET is abbreviation for Terminal Network. It is standard TCP/IP protocol for virtual terminal services proposed by ISO. TELNET enables establishment of connection to a remote system in such ... . FTP uses port 21 for the control connection and port 20 for the data connection. 

Description : Describe the HTTP response message format.

Last Answer : Status Line  Status line shows status for the response it indicates response status using a code as well as a status phrase. The status-Line begins with a protocol version, then status code and status phrase. ... fields Body It contains actual content. This part is optional. OR

Description : Describe the RIP message format.

Last Answer : RIP(Routing Information Protocol) message format * RIP is routing protocol based on Distance Vector Routing algorithm which is an intradomain (interior) routing protocol used inside an autonomous ... 32-bit field defines the hop count from the advertising router to the destination network

Description : Construct a diagram to show the application of cookies in a scenario in which the server uses cookies for advertisement.

Last Answer : Use of Cookies for advertisements:  A cookie is also used by advertising agencies. An advertising agency can place banner ads on some main website that is often visited by users. The advertising agency supplies only ... the user is sent and stored in the file, which are used by the server. 

Description : Compare TCP and UDP

Last Answer : Characteristics TCP UDP Connection TCP is connection oriented Protocol UDP is connection less Protocol  Reliability It provides reliable delivery of messages It provides unreliable delivery of ... FTP, Telnet, SMTP, DNS, HTTP, POP DNS, BOOTP, DHCP, TFTP, RIP

Description : State the concept of fragmentation in IPv4. 

Last Answer : Fragmentation: When the maximum size of datagram is greater than maximum size of data that can be held a frame then the network layer divides the datagram received from x-port layer into ... copied into the fragment header. The three fields Flags, Fragmentation offset and Total length are altered.

Description : State the transmission modes of FTP.

Last Answer : Transmission modes of FTP: 1. Stream mode 2. Block mode 3. Compressed mode

Description : List two advantages of using UDP over TCP.

Last Answer : Advantages of using UDP over TCP : 1) UDP is connection less and unreliable transport layer protocol. i.e. It does not require to maintain a connection. 2) UDP is transaction oriented and ... UDP is faster since it does not require acknowledgment. 4) Useful when time sensitivity is more important

Description : State the use of 6 flags in TCP header.

Last Answer : There are 6, 1-bit control bits that control connection establishment, termination, abortion, flow control etc.. 1) URG: Urgent pointer If this bit field is set the receiving TCP should ... 6) FIN: No more data from sender. If this bit is set then it terminates the connection.

Description : State the need of domain name system.

Last Answer : Need of domain name system: * Since IP addresses are difficult to remember and names are easier to remember Domain Name System is used and DNS servers are used for converting these names into IP addresses. * ... to internet. Use for mapping can map a name to an address or an address to a name. 

Description : State the four advantages of IPv6.

Last Answer : Advantages of IPv6: * Larger address space. * Better header format. * New options for additional functionalities. * Allowance for extension. * Support for more security. * ... Simplified Network configuration * Support for new services * Support for Security * Auto configuration

Description : Differentiate between IPv4 and IPv6.

Last Answer : IPv4 IPv6 1. Source and destination addresses are 32 bits (4 bytes) in length. 1. Source and destination addresses are 128 bits(16 bytes) in length. 2. Uses broadcast ... Uses host address (AAAA) resource records in the domain name system to map host names to IPv6 addresses

Description : What do you understand by telnet? -Technology

Last Answer : Telnet is a protocol that facilitates remote login on a computer.

Description : Distinguish between FTP and Telnet. -Technology

Last Answer : FTP (File Transfer Protocol) facilitates the transfer of files from one point to another while Telnet is a connection protocol that allows a user to connect to a remote server.

Description : What is Telnet ?

Last Answer : The service through which a user can log in to a computer in a remote location and use the resource from it, the service is called Telnet . . The local computer on the telnet can be compared to the computer that is connected to the terminal and the remote location to the host .

Description : Which command does not show that two devices are failing to route packets between them successfully? A. show interface B. trace C. telnet D. ping

Last Answer : show interface

Description : Which of the following are ways to provide login access to a router? (choose all that apply) A. HTTP B. Aux Port C. Console D. LLC E. Telnet F.

Last Answer : Aux Port

Description : Data communications monitors available on the software marked include a. ENVIRON/1 b. TOTAL c. BPL d. Telnet

Last Answer : ENVIRON/1

Description : If you want to connect toyour owncomputer throughthe Internet from another location, you can use– (A) e-mail (B) FTP (C) instant message (D) Telnet (E) None of these

Last Answer : Telnet

Description : Which of the following applications allows a user to access and change remote files without actual transfer? A) DNS B) FTP C) NFS D) Telnet

Last Answer : C) NFS

Description : The name of the protocol which provides virtual terminal in TCP/IP model is. A) Telnet B) SMTP C) HTTP

Last Answer : A) Telnet

Description : Which of the following protocol is used for transferring electronic mail messages from one machine to another? a. TELNET b. FTP c. SNMP d. SMTP

Last Answer : d. SMTP

Description : In one of the pairs of protocols given below, both the protocols can use multiple TCP connections between the same client and the server. Which one is that? a. HTTP, FTP b. HTTP, TELNET c. FTP, SMTP d. HTTP, SMTP

Last Answer : a. HTTP, FTP

Description : Which one of the following allows a user at one site to establish a connection to another site and then pass keystrokes from local host to remote host? a.HTTP b.FTP c.Telnet d.TCP

Last Answer : c.Telnet

Description : TELNET, FTP, SMTP, Protocols fall in the following layer of OSI reference model? a. Transport layer b. Internet layer c. Network layer d. Application layer

Last Answer : d. Application layer

Description : Which one of the following uses UDP as the transport protocol? a. HTTP b. Telnet c. DNS d. SMTP

Last Answer : c. DNS

Description : . The newer technique uses a distributed database system called ………………….. to translate names to addresses. A. DNS B. IP C. ARP D. Telnet

Last Answer : A. DNS

Description : If you want to connect to your own computer through the internet from another location you can use: a) Telnet b) Instant Messaging c) FTP d) E- Mail e) None of These

Last Answer : a) Telnet

Description : Application layer firewalls works on the application level of the ____stack (i.e. all browser traffic or all telnet or FTP traffic) and may intercept all packets travelling to or from an application: a) TCP b) IP c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : If you want to connect to your own computer through the internet from another location, you can use: a) E - Mail b) FTP c) Instant Message d) Telnet e) None of The Above

Last Answer : c) Instant Message

Description : WWW provides standardized access to: a) GOPHER b) TELNET c) FTP d) None of These e) All of the Above

Last Answer : e) All of the Above

Description : Internet provides _______ for remote login. a) telnet b) http c) ftp d) rpc

Last Answer : telnet

Description : TELNET is an abbreviation for _______

Last Answer : Terminal Network

Description : Which of the following applications allows a user to access and change remote files without actual transfer? A) DNS B) FTP C) NFS D) Telnet

Last Answer : C) NFS

Description : The name of the protocol which provides virtual terminal in TCP/IP model is. A) Telnet B) SMTP C) HTTP

Last Answer : A) Telnet

Description : Which of the following applications allows a user to access and change remote files without actual transfer? A) DNS B) FTP C) NFS D) Telnet

Last Answer : C) NFS

Description : The name of the protocol which provides virtual terminal in TCP/IP model is. A) Telnet B) SMTP C) HTTP

Last Answer : A) Telnet

Description : Which protocol is commonly used to retrieve email from a mail server? a) FTP b) IMAP c) HTML d) TELNET

Last Answer : b) IMAP

Description : You can grab banner by using A)Telnet B)NetCat C)Either A or B D)Both A and B

Last Answer : D)Both A and B

Description : What port does Telnet use? a. 22 b. 80 c. 20 d. 23

Last Answer : d. 23

Description : You can grab banner by using A)Telnet B)NetCat C)Either A or B D)Both A and B

Last Answer : D)Both A and B