0% found this document useful (0 votes)
14 views

Telnet

Usenet is a global discussion and file-sharing system that operates using the Network News Transfer Protocol (NNTP), allowing users to read and post messages in organized newsgroups. Telnet is a client/server protocol for accessing remote systems, though its use has declined due to security concerns, with SSH being the preferred alternative. VoIP enables voice communication over the internet by converting voice signals into digital data packets, requiring high-speed internet and compatible devices for operation.

Uploaded by

malasamr.ssmrv
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views

Telnet

Usenet is a global discussion and file-sharing system that operates using the Network News Transfer Protocol (NNTP), allowing users to read and post messages in organized newsgroups. Telnet is a client/server protocol for accessing remote systems, though its use has declined due to security concerns, with SSH being the preferred alternative. VoIP enables voice communication over the internet by converting voice signals into digital data packets, requiring high-speed internet and compatible devices for operation.

Uploaded by

malasamr.ssmrv
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 19

• Usenet is a worldwide system of discussion groups and file sharing that

operates over a computer network. It's similar to an online forum or bulletin


board.

Usenet service providers

• GigaNews

• EasyNEws

• Usenet server
Working of Usenet
• The Usenet is built on the Network News Transfer Protocol (NNTP), a standard Internet
protocol in Request for Comments (RFC) 977 and has two components:

• A client/server portion that allows users running client software such as Google Chrome to
interact with the news servers by downloading a list of available.

• Usenet newsgroups on the server, read existing messages in the newsgroups, reply to
existing messages, or post new messages.

• A server portion that allows news servers to establish communication with each other, for
the purpose of replicating messages from newsgroups.

• For example, Microsoft Exchange Server fully supports NNTP.


How does Usenet work?

• Users read and post messages, known as articles, to newsgroups.

• Newsgroups are organized by subject and can be thought of as forums or


subreddits.

• Some newsgroups have moderators.

• Usenet uses the Network News Transfer Protocol (NNTP) to transfer articles
between news servers.

• Articles are replicated to a local Usenet server, allowing users to read and post
articles without accessing the global internet.
TELNET
• It stands for Teletype Network.
• It is a client/server application protocol that provides access to virtual terminals of
remote systems on local area networks or the Internet.
• The local computer uses a telnet client program and the remote computers use a
telnet server program. It is used as a standard TCP/IP protocol for virtual terminal
service which is provided by ISO.
• The computer which starts the connection is known as the local computer.
• The computer which is being connected to i.e. which accepts the connection known as
the remote computer.
• During telnet operation, whatever is being performed on the remote computer will be
displayed by the local computer.
• This protocol allowed users to access remote computers using a terminal or command-
line interface.
TELNET
• This protocol allowed users to access remote computers using a terminal or command-
line interface.
• Telnet’s use has diminished due to security concerns, and alternatives like SSH are now
preferred for secure remote management.
• Secure Shell (SSH) protocol is a method for securely sending commands to a computer
over an unsecured network.
• SSH uses cryptography to authenticate and encrypt connections between devices.
• SSH also allows for tunneling, or port forwarding, which is when data packets are not
able to cross networks that they would not otherwise be able to cross.
Local Login
• Whenever a user logs into its local system, it is known as local login.
• Keystrokes are accepted by the terminal driver when the user types at
the terminal.
• Terminal Driver passes these characters to OS.
• Now, OS validates the combination of characters and opens the
required application.
Remote Login
• Remote Login is a process in which users can log in to a remote site
i.e. computer and use services that are available on the remote
computer. With the help of remote login, a user is able to understand
the result of transferring the result of processing from the remote
computer to the local computer.
The Procedure of Remote Login

• When the user types something on the local computer, the local operating
system accepts the character.

• The local computer does not interpret the characters, it will send them to the
TELNET client.

• TELNET client transforms these characters to a universal character set called


Network Virtual Terminal (NVT) characters and it will pass them to the local
TCP/IP protocol Stack.

• Commands or text which are in the form of NVT, travel through the Internet
and it will arrive at the TCP/IP stack at the remote computer.
• Characters are then delivered to the operating system and later on
passed to the TELNET server.

• Then TELNET server changes those characters to characters that can be


understandable by a remote computer.

• The remote operating system receives characters from a pseudo-


terminal driver, which is a piece of software that pretends that
characters are coming from a terminal.

• The operating system then passes the character to the appropriate


application program.
Despite the rise of more advanced remote access protocols such as SSH,
Telnet remains relevant today because it is simple and widely
supported. Many network devices, such as routers, switches, and
firewalls, still use Telnet as the primary instrument of remote
management.
While no modern web browser inherently
supports a built-in Telnet client, access Telnet
functionality through browser extensions or web
apps, with Chrome to use a Telnet client extension
from the Chrome Web Store
• Troubleshooting network connectivity: It can be used to test connectivity
to a network device or server. By establishing a Telnet connection to the
device or server, you can check whether it’s reachable, identify any errors
or connectivity issues, and diagnose network problems.
• Configuring network devices: Network administrators can use Telnet to
remotely configure network devices like routers, switches, and firewalls. It
allows them to manage the devices from a central location and make
changes to the network infrastructure without physically accessing each
device.
• Remote administration of servers: It can be used to remotely administer
servers running a command-line interface. By establishing a Telnet session,
system administrators can remotely manage and configure servers, run
scripts, and perform other tasks.
• Accessing legacy systems: Some legacy computer systems still rely on
Telnet for remote access. It helps connect to these systems, run
applications, process data, and manage resources.

• Testing and debugging applications: The protocol can be used as a testing


tool to check whether an application can connect and communicate with a
remote server or device. By establishing a Telnet connection, developers
and testers can verify that the application is functioning correctly and
troubleshoot any issues.
• Voice over Internet Protocol (VoIP) is a form of communication that

allows you to make phone calls over a broadband internet connection

instead of typical analog telephone lines.

• VoIP (voice over Internet Protocol) is the transmission of voice and

multimedia content over an internet connection.

• VoIP allows users to make voice calls from a computer, smartphone,

other mobile devices, special VoIP phones and Web RTC-enabled

browsers. Real-Time Communications" (WebRTC) protocol


• Google Chrome, Mozilla Firefox and others - it enables plugin-free

Real Time Communications via Javascript API.

• Voice over Internet Protocol (VoIP) is a technology that allows voice

communication over the internet.

• By converting voice signals into digital data packets, VoIP enables

users to make calls from computers, smartphones, or VoIP phones.

• Key benefits include lower costs for long-distance calls, additional

features like video conferencing,


Equipment Required in VoIP

• An Internet connection must be very high to use VoIP services.

• Internet access can be via cable modem or LAN and other high-speed services.

• Users need compatible devices, such as computers, adapters, or special VoIP

phones.

• Other services give you the option of using a traditional phone that comes

with a VoIP adapter.

• Computer-based tests require inexpensive software and microphones.


Equipment Required in VoIP

• VoIP phones can be connected directly to a broadband connection.

• They work like traditional telephones.

• Using a phone with a VoIP adapter, users can dial numbers as usual.

• In such cases, the service can provide a voice call.


How VOIP works
• Initiation of the Call: VOIP sender to VOIP service provider
• Signal conversion: Voice signals are then converted into data packets
by the VOIP device or Analog telephone adapter.
• Routing the call: the packets are stamped with the destination IP
address and are routed to the destination through network routers.
• At the receiving end the packets are converted to an analog voice
signal.
• End of call: after the conversation, the calling party ends the call and a
signal is sent to the VOIP provider to terminate the connection.

You might also like