SlideShare uma empresa Scribd logo
1 de 6
Telnet

    TELNET is a network protocol used on the Internet or local area networks to provide a bidirectional
    interactive text-oriented communications facility via a virtual terminal connection. User data is
    interspersed in-band with TELNET control information in an 8-bit byte oriented data connection over
    the Transmission Control Protocol (TCP).

    Telnet was developed in 1969 beginning with RFC 15, extended in RFC 854, and standardized as Internet
    Engineering Task Force (IETF) Internet Standard STD 8, one of the first Internet standards.

    Historically, telnet provided access to a command-line interface (usually, of an operating system) on a
    remote host. Most network equipment and operating systems with a TCP/IP stacksupport a Telnet service
    for remote configuration (including systems based on Windows NT). Because of security issues with
    Telnet, its use for this purpose has waned in favor of SSH.

    The term telnet may also refer to the software that implements the client part of the protocol. Telnet client
    applications are available for virtually all computer platforms. Telnet is also used as a verb. To
    telnet means to establish a connection with the Telnet protocol, either with command line client or with a
    programmatic interface. For example, a common directive might be: "To change your password, telnet to
    the server, login and run the passwd command." Most often, a user will be telnetting to a Unix-like server
    system or a network device such as a router and obtain a login prompt to a command line text interface or
    a character-based full-screen manager.

                                                Telnet Protocols

    The Telnet protocol is a standard internet protocol enabling terminals and applications to interface over
    the Internet. This protocol provides the basic rules making it possible to link a client (system composed of
    a display and keyboard) to a command interpreter (server side).
    The Telnet protocol is applied on a TCP connection to send data in ASCII format coded over 8 bits
    between which the Telnet check sequences come. It therefore provides a communication orientated bi-
    directional system (half-duplex), coded over 8 bits and easy to implement.
    The Telnet protocol relies on three basic concepts:

•     The Network Virtual Terminal (NVT) paradigm
•     The negotiated options principle
•     The rules of negotiation


    Telnet                                                                                              Page 1
1) The Network Virtual Terminal (NVT) paradigm: - When the Internet began, the network
    (ARPANET) was made up of machines where configurations were slightly different (keyboards, character
    sets, resolutions, length of lines displayed). Moreover, the terminal sessions also had their own way of
    controlling the incoming/outgoing data flow.

    So, instead of creating adaptors for each terminal type so that there could be interoperability between these
    systems, it was decided to develop a standard interface, called NVT (Network Virtual Terminal),
    providing a standard communication base, comprised of:
•     7 bit ASCII characters to which the extended ASCII code is added
•     Three control characters
•     Five optional control characters
•     A set of basic control signals
    The Telnet protocol therefore consists of creating an abstraction of the terminal enabling whichever host
    (client or server) to communicate with another host without knowing its characteristics.

    2) The negotiated options principle:- The Telnet protocol specifications make it possible to take into
    account the fact that certain terminals can offer additional services, not defined in the basic specifications
    (but in accordance with the specifications), so as to be able to use advanced functions. This functionality is
    reflected in terms of options. The Telnet protocol therefore offers a system of option negotiations enabling
    the use of advanced functions in the form of options on either side by initiating requests for its
    authorisation from the remote system.

    The Telnet options separately affect each direction of the data channel. So, each end is able to negotiate
    the options, i.e. to define the options that it:

•     wants to use (DO)
•     refuses to use (DON'T)
•     wants the other end to use (WILL)
•     refuses that the other end use (WON'T)
    In this way, each party can issue a request for an option to be used. The other party must then respond as
    to whether or not it accepts the use of the option. Where the request relates to the deactivation of an
    option, the recipient of the request must not refuse so as to be completely compatible with the NVT
    model.




    Telnet                                                                                               Page 2
3) The rules of negotiation: - The rules of negotiation for options make it possible to avoid wraparound
   situations (for example when one of the parties sends option negotiation requests to each confirmation
   from the other party).

1. Requests must only be issued at the time of a mode change.
2. When one of the parties receives a mode change request, it must only acknowledge it if it is not already in
   the appropriate mode.
3. A request must only be inserted in the data flow at the place where it takes effect.


                                            System Requirements

       •   A Personal Computer with a 486/100 MHz CPU or higher

       •   Microsoft Windows NT 4.0, Windows 2000, Windows XP or Windows 2003

       •   Mouse or compatible pointing device

       •   800 KB of hard-disk space

   Also Required:

       •   TCP/IP networking must be installed and configured

       •   Windows NT/2000/XP/2003 are registered trademarks of Microsoft Corporation.

                             Connect to a Remote Computer Using Telnet



   Telnet allows you to use your computer as a terminal for a remote computer (typically a mainframe or
   Unix-based computer). With telnet, you can search a database, access an online catalog, read your e-mail
   or participate in interactive games like multiuser dungeons (MUDs). You can log in according to the
   permissions that the remote host has given you.

   Instructions

   Step 1:-Install a telnet program (client) on your computer. HyperTerminal, included with Windows, will
   perform many telnet operations. You can also locate an array of freeware, shareware or commercial telnet
   clients from various software Web sites.
   Telnet                                                                                             Page 3
Step 2: -Open your telnet program.

Step 3:-Enter the telnet address in the address box. Click OK.

Step 4: -Enter your login ID. If you have been given special permission, your host will have provided you
with a login ID. If it is an anonymous site, you may be able to log in as "guest" or by using your e-mail
address .

Step 5: -Once you are logged in, the procedure varies depending on how the host has been set up. Follow
instructions that appear on the screen.



                                              Tips for use telnet

   •   You may be able to access your telnet program directly from your browser if you have configured
       your software correctly. To use your browser, type the telnet address in the address bar. It may be
       something such as "telnet: far.away.computer.com" or "telnet far.away.computer.com."


   •   Some telnet programs require a colon between "telnet" and the address. Others require a space.


   •   Telnet is typically used to turn your computer into a terminal for a mainframe or Unix-based
       computer. Don't expect to be able to use Windows or Macintosh commands.


   •   Telnet can be a useful way to access your e-mail away from home, because you don't need to
       remember SMTP or POP server names. Not all Internet service providers (ISPs) allow telnet
       access, however, and you will probably need to use a Unix-based e-mail client this way.


   •   If one letter is typed incorrectly, the telnet search will fail.



                                               Current status

As of mid-2010, the Telnet protocol itself has been mostly superseded for remote login. Telnet is popular
in various application areas:

       •    Enterprise networks to access host applications, e.g., on IBM Mainframes.
Telnet                                                                                           Page 4
•   Administration of network elements, e.g., in commissioning, integration and maintenance
         of core network elements in mobile communication networks, and many industrial control
         systems.
     •   MUD games played over the Internet, as well as talkers, MUSHes, MUCKs, MOOes, and the
         resurgent BBS community.
     •   Internet game clubs, like the Internet Chess Club, the Free Internet Chess Server and
         the Internet Go server.
     •   Embedded systems.
     •   Mobile data collection applications where telnet runs over secure networks.
     •   Collaboration of multiple users where the capability of session transfer, swap, sharing, and
         recovery of disconnected sessions is needed

                                           Advantages of Telnet

         1) The big advantage of telnet is that it saves you are able to use another computer elsewhere
            in the world without actually being there. You are actually connected to that machine.

         2) You can use other computers, fix other people's computer problems, play games with other
            people (MUD games -- see your textbook for a discussion), etc.,all without leaving your
            seat.

                                                       Disadvantage

     1) Only text and numbers displayed (VT100, VT220 connection)

     2) No graphics, (limited Tektronix 4014 graphics)

     3) No color

     4) No mouse (no menus, check boxes, etc)




                                            Conclusion


Telnet                                                                                           Page 5
You need a special application to telnet from a Mac or a PC. You need to know is the hostname or the IP
address of the computer that you want to connect to. Using telnet is as simple as launching the telnet
application, and then opening a connection to a host (usually under the File menu). Once the connection is
established, you can interact with the remote computer directly by typing commands.

                                              References

   • Ehow.com

   • En.kioskia.net

   • Microsoft.com




Telnet                                                                                           Page 6

Mais conteúdo relacionado

Mais procurados

Architecture of Mobile Computing
Architecture of Mobile ComputingArchitecture of Mobile Computing
Architecture of Mobile ComputingJAINIK PATEL
 
Mobile computing notes and material
Mobile computing notes and materialMobile computing notes and material
Mobile computing notes and materialSDMCET DHARWAD
 
Data communication and networks by B. Forouzan
Data communication and networks by B. ForouzanData communication and networks by B. Forouzan
Data communication and networks by B. ForouzanPreethi T G
 
MEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLMEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLjunnubabu
 
Simple Mail Transfer Protocol
Simple Mail Transfer ProtocolSimple Mail Transfer Protocol
Simple Mail Transfer ProtocolUjjayanta Bhaumik
 
wireless cellular network
wireless cellular networkwireless cellular network
wireless cellular networkMaulik Patel
 
User datagram protocol (udp)
User datagram protocol (udp)User datagram protocol (udp)
User datagram protocol (udp)Ramola Dhande
 
Computer Network - Network Layer
Computer Network - Network LayerComputer Network - Network Layer
Computer Network - Network LayerManoj Kumar
 
IP Security and its Components
IP Security and its ComponentsIP Security and its Components
IP Security and its ComponentsMohibullah Saail
 
Mobile computing unit-5
Mobile computing unit-5Mobile computing unit-5
Mobile computing unit-5Ramesh Babu
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesSayed Chhattan Shah
 
C05 satellite systems
C05 satellite systemsC05 satellite systems
C05 satellite systemsRio Nguyen
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithmBushra M
 

Mais procurados (20)

Architecture of Mobile Computing
Architecture of Mobile ComputingArchitecture of Mobile Computing
Architecture of Mobile Computing
 
Mobile computing notes and material
Mobile computing notes and materialMobile computing notes and material
Mobile computing notes and material
 
Data communication and networks by B. Forouzan
Data communication and networks by B. ForouzanData communication and networks by B. Forouzan
Data communication and networks by B. Forouzan
 
Application Layer
Application LayerApplication Layer
Application Layer
 
MEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLMEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROL
 
Simple Mail Transfer Protocol
Simple Mail Transfer ProtocolSimple Mail Transfer Protocol
Simple Mail Transfer Protocol
 
Circuit Switching
Circuit SwitchingCircuit Switching
Circuit Switching
 
wireless cellular network
wireless cellular networkwireless cellular network
wireless cellular network
 
User datagram protocol (udp)
User datagram protocol (udp)User datagram protocol (udp)
User datagram protocol (udp)
 
Computer Network - Network Layer
Computer Network - Network LayerComputer Network - Network Layer
Computer Network - Network Layer
 
Network software
Network softwareNetwork software
Network software
 
IP Security and its Components
IP Security and its ComponentsIP Security and its Components
IP Security and its Components
 
Mobile computing unit-5
Mobile computing unit-5Mobile computing unit-5
Mobile computing unit-5
 
Mobile computing unit 5
Mobile computing  unit 5Mobile computing  unit 5
Mobile computing unit 5
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and Services
 
Dhcp ppt
Dhcp pptDhcp ppt
Dhcp ppt
 
C05 satellite systems
C05 satellite systemsC05 satellite systems
C05 satellite systems
 
IP Address
IP AddressIP Address
IP Address
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithm
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithm
 

Destaque (18)

Presentation on telnet
Presentation on telnetPresentation on telnet
Presentation on telnet
 
TELNET Protocol
TELNET ProtocolTELNET Protocol
TELNET Protocol
 
Telnet & Secure Shell
Telnet & Secure ShellTelnet & Secure Shell
Telnet & Secure Shell
 
09 telnet, remote dan ftp
09 telnet, remote dan ftp09 telnet, remote dan ftp
09 telnet, remote dan ftp
 
Video/ Graphics cards
Video/ Graphics  cardsVideo/ Graphics  cards
Video/ Graphics cards
 
Menu vb
Menu vbMenu vb
Menu vb
 
TCP - IP Presentation
TCP - IP PresentationTCP - IP Presentation
TCP - IP Presentation
 
Instalación ftp, telnet y ssh sobre linux
Instalación ftp, telnet y ssh sobre linuxInstalación ftp, telnet y ssh sobre linux
Instalación ftp, telnet y ssh sobre linux
 
Protocols in computer network
Protocols in computer network   Protocols in computer network
Protocols in computer network
 
Ftp
FtpFtp
Ftp
 
Telnet
TelnetTelnet
Telnet
 
Ftp (file transfer protocol)
Ftp (file transfer protocol)Ftp (file transfer protocol)
Ftp (file transfer protocol)
 
Computer Network - Telnet and Gopher
Computer Network -  Telnet and GopherComputer Network -  Telnet and Gopher
Computer Network - Telnet and Gopher
 
File transfer protocol (ftp)
File transfer protocol (ftp)File transfer protocol (ftp)
File transfer protocol (ftp)
 
Telnet
TelnetTelnet
Telnet
 
FTP - File Transfer Protocol
FTP - File Transfer ProtocolFTP - File Transfer Protocol
FTP - File Transfer Protocol
 
TCP/IP – Transmission Control Protocol/ Internet Protocol
TCP/IP – Transmission Control Protocol/ Internet ProtocolTCP/IP – Transmission Control Protocol/ Internet Protocol
TCP/IP – Transmission Control Protocol/ Internet Protocol
 
TCP/IP Basics
TCP/IP BasicsTCP/IP Basics
TCP/IP Basics
 

Semelhante a Report on telnet

Protolcols in communication system
Protolcols in communication systemProtolcols in communication system
Protolcols in communication systemArchana Dwivedi
 
Computer Networks
Computer NetworksComputer Networks
Computer NetworksShylesh BC
 
Computer Seminar.pptx
Computer Seminar.pptxComputer Seminar.pptx
Computer Seminar.pptxMelvinShaji12
 
Remote login.89 to 90
Remote login.89 to 90Remote login.89 to 90
Remote login.89 to 90myrajendra
 
Web Programming: Basics of Internet and Introduction to HTML5 and CSS
Web Programming: Basics of Internet and Introduction to HTML5 and CSSWeb Programming: Basics of Internet and Introduction to HTML5 and CSS
Web Programming: Basics of Internet and Introduction to HTML5 and CSSKajal Singh
 
Application layer and protocols of application layer
Application layer and protocols of application layerApplication layer and protocols of application layer
Application layer and protocols of application layerTahmina Shopna
 
Lesson4.9 d u4l3 hierarchy of open protocols
Lesson4.9 d u4l3 hierarchy of open protocolsLesson4.9 d u4l3 hierarchy of open protocols
Lesson4.9 d u4l3 hierarchy of open protocolsLexume1
 
Basic of it definations
Basic of it definationsBasic of it definations
Basic of it definationstangemjoy
 
installandmanagenetworkprotocols.pptx
installandmanagenetworkprotocols.pptxinstallandmanagenetworkprotocols.pptx
installandmanagenetworkprotocols.pptxTeshome48
 
install and manage network protocols.pptx
install and manage network protocols.pptxinstall and manage network protocols.pptx
install and manage network protocols.pptxJaleto Sunkemo
 
installandmanagenetworkprotocols-221219130255-40dcfff3 (1).pdf
installandmanagenetworkprotocols-221219130255-40dcfff3 (1).pdfinstallandmanagenetworkprotocols-221219130255-40dcfff3 (1).pdf
installandmanagenetworkprotocols-221219130255-40dcfff3 (1).pdfTadeseBeyene
 

Semelhante a Report on telnet (20)

Telnet ppt
Telnet pptTelnet ppt
Telnet ppt
 
Protolcols in communication system
Protolcols in communication systemProtolcols in communication system
Protolcols in communication system
 
Week11 F
Week11 FWeek11 F
Week11 F
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
 
Telnet
TelnetTelnet
Telnet
 
Telnet
TelnetTelnet
Telnet
 
Computer Seminar.pptx
Computer Seminar.pptxComputer Seminar.pptx
Computer Seminar.pptx
 
Remote login.89 to 90
Remote login.89 to 90Remote login.89 to 90
Remote login.89 to 90
 
Web Presen
Web PresenWeb Presen
Web Presen
 
Web Programming: Basics of Internet and Introduction to HTML5 and CSS
Web Programming: Basics of Internet and Introduction to HTML5 and CSSWeb Programming: Basics of Internet and Introduction to HTML5 and CSS
Web Programming: Basics of Internet and Introduction to HTML5 and CSS
 
Telnet
TelnetTelnet
Telnet
 
Application layer and protocols of application layer
Application layer and protocols of application layerApplication layer and protocols of application layer
Application layer and protocols of application layer
 
Lesson4.9 d u4l3 hierarchy of open protocols
Lesson4.9 d u4l3 hierarchy of open protocolsLesson4.9 d u4l3 hierarchy of open protocols
Lesson4.9 d u4l3 hierarchy of open protocols
 
Application Protocol
Application Protocol Application Protocol
Application Protocol
 
Basic of it definations
Basic of it definationsBasic of it definations
Basic of it definations
 
Webpre2
Webpre2Webpre2
Webpre2
 
Networking
Networking Networking
Networking
 
installandmanagenetworkprotocols.pptx
installandmanagenetworkprotocols.pptxinstallandmanagenetworkprotocols.pptx
installandmanagenetworkprotocols.pptx
 
install and manage network protocols.pptx
install and manage network protocols.pptxinstall and manage network protocols.pptx
install and manage network protocols.pptx
 
installandmanagenetworkprotocols-221219130255-40dcfff3 (1).pdf
installandmanagenetworkprotocols-221219130255-40dcfff3 (1).pdfinstallandmanagenetworkprotocols-221219130255-40dcfff3 (1).pdf
installandmanagenetworkprotocols-221219130255-40dcfff3 (1).pdf
 

Mais de Amandeep Kaur

Menu pop up menu mdi form and playing audio in vb
Menu pop up menu mdi form and playing audio in vbMenu pop up menu mdi form and playing audio in vb
Menu pop up menu mdi form and playing audio in vbAmandeep Kaur
 
Image contro, and format functions in vb
Image contro, and format functions in vbImage contro, and format functions in vb
Image contro, and format functions in vbAmandeep Kaur
 
Data base connectivity and flex grid in vb
Data base connectivity and flex grid in vbData base connectivity and flex grid in vb
Data base connectivity and flex grid in vbAmandeep Kaur
 
Toolbar, statusbar, coolbar in vb
Toolbar, statusbar, coolbar in vbToolbar, statusbar, coolbar in vb
Toolbar, statusbar, coolbar in vbAmandeep Kaur
 
Introduction to computer graphics
Introduction to computer graphicsIntroduction to computer graphics
Introduction to computer graphicsAmandeep Kaur
 
Introduction to computer graphics
Introduction to computer graphicsIntroduction to computer graphics
Introduction to computer graphicsAmandeep Kaur
 
Introduction to computer graphics
Introduction to computer graphicsIntroduction to computer graphics
Introduction to computer graphicsAmandeep Kaur
 
Report on browser war
Report on browser warReport on browser war
Report on browser warAmandeep Kaur
 
Report of internet connections
Report of internet connectionsReport of internet connections
Report of internet connectionsAmandeep Kaur
 
How to configure dns server(2)
How to configure dns server(2)How to configure dns server(2)
How to configure dns server(2)Amandeep Kaur
 

Mais de Amandeep Kaur (20)

Menu pop up menu mdi form and playing audio in vb
Menu pop up menu mdi form and playing audio in vbMenu pop up menu mdi form and playing audio in vb
Menu pop up menu mdi form and playing audio in vb
 
Active x control
Active x controlActive x control
Active x control
 
Image contro, and format functions in vb
Image contro, and format functions in vbImage contro, and format functions in vb
Image contro, and format functions in vb
 
Data base connectivity and flex grid in vb
Data base connectivity and flex grid in vbData base connectivity and flex grid in vb
Data base connectivity and flex grid in vb
 
Toolbar, statusbar, coolbar in vb
Toolbar, statusbar, coolbar in vbToolbar, statusbar, coolbar in vb
Toolbar, statusbar, coolbar in vb
 
Richtextbox
RichtextboxRichtextbox
Richtextbox
 
Treeview listview
Treeview listviewTreeview listview
Treeview listview
 
Progress bar
Progress barProgress bar
Progress bar
 
Filehandling
FilehandlingFilehandling
Filehandling
 
Socket
SocketSocket
Socket
 
Ppt of socket
Ppt of socketPpt of socket
Ppt of socket
 
Introduction to computer graphics
Introduction to computer graphicsIntroduction to computer graphics
Introduction to computer graphics
 
Introduction to computer graphics
Introduction to computer graphicsIntroduction to computer graphics
Introduction to computer graphics
 
Introduction to computer graphics
Introduction to computer graphicsIntroduction to computer graphics
Introduction to computer graphics
 
Internet
InternetInternet
Internet
 
Internet working
Internet workingInternet working
Internet working
 
Report on browser war
Report on browser warReport on browser war
Report on browser war
 
Report of internet connections
Report of internet connectionsReport of internet connections
Report of internet connections
 
Report on intranet
Report on intranetReport on intranet
Report on intranet
 
How to configure dns server(2)
How to configure dns server(2)How to configure dns server(2)
How to configure dns server(2)
 

Report on telnet

  • 1. Telnet TELNET is a network protocol used on the Internet or local area networks to provide a bidirectional interactive text-oriented communications facility via a virtual terminal connection. User data is interspersed in-band with TELNET control information in an 8-bit byte oriented data connection over the Transmission Control Protocol (TCP). Telnet was developed in 1969 beginning with RFC 15, extended in RFC 854, and standardized as Internet Engineering Task Force (IETF) Internet Standard STD 8, one of the first Internet standards. Historically, telnet provided access to a command-line interface (usually, of an operating system) on a remote host. Most network equipment and operating systems with a TCP/IP stacksupport a Telnet service for remote configuration (including systems based on Windows NT). Because of security issues with Telnet, its use for this purpose has waned in favor of SSH. The term telnet may also refer to the software that implements the client part of the protocol. Telnet client applications are available for virtually all computer platforms. Telnet is also used as a verb. To telnet means to establish a connection with the Telnet protocol, either with command line client or with a programmatic interface. For example, a common directive might be: "To change your password, telnet to the server, login and run the passwd command." Most often, a user will be telnetting to a Unix-like server system or a network device such as a router and obtain a login prompt to a command line text interface or a character-based full-screen manager. Telnet Protocols The Telnet protocol is a standard internet protocol enabling terminals and applications to interface over the Internet. This protocol provides the basic rules making it possible to link a client (system composed of a display and keyboard) to a command interpreter (server side). The Telnet protocol is applied on a TCP connection to send data in ASCII format coded over 8 bits between which the Telnet check sequences come. It therefore provides a communication orientated bi- directional system (half-duplex), coded over 8 bits and easy to implement. The Telnet protocol relies on three basic concepts: • The Network Virtual Terminal (NVT) paradigm • The negotiated options principle • The rules of negotiation Telnet Page 1
  • 2. 1) The Network Virtual Terminal (NVT) paradigm: - When the Internet began, the network (ARPANET) was made up of machines where configurations were slightly different (keyboards, character sets, resolutions, length of lines displayed). Moreover, the terminal sessions also had their own way of controlling the incoming/outgoing data flow. So, instead of creating adaptors for each terminal type so that there could be interoperability between these systems, it was decided to develop a standard interface, called NVT (Network Virtual Terminal), providing a standard communication base, comprised of: • 7 bit ASCII characters to which the extended ASCII code is added • Three control characters • Five optional control characters • A set of basic control signals The Telnet protocol therefore consists of creating an abstraction of the terminal enabling whichever host (client or server) to communicate with another host without knowing its characteristics. 2) The negotiated options principle:- The Telnet protocol specifications make it possible to take into account the fact that certain terminals can offer additional services, not defined in the basic specifications (but in accordance with the specifications), so as to be able to use advanced functions. This functionality is reflected in terms of options. The Telnet protocol therefore offers a system of option negotiations enabling the use of advanced functions in the form of options on either side by initiating requests for its authorisation from the remote system. The Telnet options separately affect each direction of the data channel. So, each end is able to negotiate the options, i.e. to define the options that it: • wants to use (DO) • refuses to use (DON'T) • wants the other end to use (WILL) • refuses that the other end use (WON'T) In this way, each party can issue a request for an option to be used. The other party must then respond as to whether or not it accepts the use of the option. Where the request relates to the deactivation of an option, the recipient of the request must not refuse so as to be completely compatible with the NVT model. Telnet Page 2
  • 3. 3) The rules of negotiation: - The rules of negotiation for options make it possible to avoid wraparound situations (for example when one of the parties sends option negotiation requests to each confirmation from the other party). 1. Requests must only be issued at the time of a mode change. 2. When one of the parties receives a mode change request, it must only acknowledge it if it is not already in the appropriate mode. 3. A request must only be inserted in the data flow at the place where it takes effect. System Requirements • A Personal Computer with a 486/100 MHz CPU or higher • Microsoft Windows NT 4.0, Windows 2000, Windows XP or Windows 2003 • Mouse or compatible pointing device • 800 KB of hard-disk space Also Required: • TCP/IP networking must be installed and configured • Windows NT/2000/XP/2003 are registered trademarks of Microsoft Corporation. Connect to a Remote Computer Using Telnet Telnet allows you to use your computer as a terminal for a remote computer (typically a mainframe or Unix-based computer). With telnet, you can search a database, access an online catalog, read your e-mail or participate in interactive games like multiuser dungeons (MUDs). You can log in according to the permissions that the remote host has given you. Instructions Step 1:-Install a telnet program (client) on your computer. HyperTerminal, included with Windows, will perform many telnet operations. You can also locate an array of freeware, shareware or commercial telnet clients from various software Web sites. Telnet Page 3
  • 4. Step 2: -Open your telnet program. Step 3:-Enter the telnet address in the address box. Click OK. Step 4: -Enter your login ID. If you have been given special permission, your host will have provided you with a login ID. If it is an anonymous site, you may be able to log in as "guest" or by using your e-mail address . Step 5: -Once you are logged in, the procedure varies depending on how the host has been set up. Follow instructions that appear on the screen. Tips for use telnet • You may be able to access your telnet program directly from your browser if you have configured your software correctly. To use your browser, type the telnet address in the address bar. It may be something such as "telnet: far.away.computer.com" or "telnet far.away.computer.com." • Some telnet programs require a colon between "telnet" and the address. Others require a space. • Telnet is typically used to turn your computer into a terminal for a mainframe or Unix-based computer. Don't expect to be able to use Windows or Macintosh commands. • Telnet can be a useful way to access your e-mail away from home, because you don't need to remember SMTP or POP server names. Not all Internet service providers (ISPs) allow telnet access, however, and you will probably need to use a Unix-based e-mail client this way. • If one letter is typed incorrectly, the telnet search will fail. Current status As of mid-2010, the Telnet protocol itself has been mostly superseded for remote login. Telnet is popular in various application areas: • Enterprise networks to access host applications, e.g., on IBM Mainframes. Telnet Page 4
  • 5. Administration of network elements, e.g., in commissioning, integration and maintenance of core network elements in mobile communication networks, and many industrial control systems. • MUD games played over the Internet, as well as talkers, MUSHes, MUCKs, MOOes, and the resurgent BBS community. • Internet game clubs, like the Internet Chess Club, the Free Internet Chess Server and the Internet Go server. • Embedded systems. • Mobile data collection applications where telnet runs over secure networks. • Collaboration of multiple users where the capability of session transfer, swap, sharing, and recovery of disconnected sessions is needed Advantages of Telnet 1) The big advantage of telnet is that it saves you are able to use another computer elsewhere in the world without actually being there. You are actually connected to that machine. 2) You can use other computers, fix other people's computer problems, play games with other people (MUD games -- see your textbook for a discussion), etc.,all without leaving your seat. Disadvantage 1) Only text and numbers displayed (VT100, VT220 connection) 2) No graphics, (limited Tektronix 4014 graphics) 3) No color 4) No mouse (no menus, check boxes, etc) Conclusion Telnet Page 5
  • 6. You need a special application to telnet from a Mac or a PC. You need to know is the hostname or the IP address of the computer that you want to connect to. Using telnet is as simple as launching the telnet application, and then opening a connection to a host (usually under the File menu). Once the connection is established, you can interact with the remote computer directly by typing commands. References • Ehow.com • En.kioskia.net • Microsoft.com Telnet Page 6