Telnet
Telnet
• GigaNews
• EasyNEws
• Usenet server
Working of Usenet
• The Usenet is built on the Network News Transfer Protocol (NNTP), a standard Internet
protocol in Request for Comments (RFC) 977 and has two components:
• A client/server portion that allows users running client software such as Google Chrome to
interact with the news servers by downloading a list of available.
• Usenet newsgroups on the server, read existing messages in the newsgroups, reply to
existing messages, or post new messages.
• A server portion that allows news servers to establish communication with each other, for
the purpose of replicating messages from newsgroups.
• Usenet uses the Network News Transfer Protocol (NNTP) to transfer articles
between news servers.
• Articles are replicated to a local Usenet server, allowing users to read and post
articles without accessing the global internet.
TELNET
• It stands for Teletype Network.
• It is a client/server application protocol that provides access to virtual terminals of
remote systems on local area networks or the Internet.
• The local computer uses a telnet client program and the remote computers use a
telnet server program. It is used as a standard TCP/IP protocol for virtual terminal
service which is provided by ISO.
• The computer which starts the connection is known as the local computer.
• The computer which is being connected to i.e. which accepts the connection known as
the remote computer.
• During telnet operation, whatever is being performed on the remote computer will be
displayed by the local computer.
• This protocol allowed users to access remote computers using a terminal or command-
line interface.
TELNET
• This protocol allowed users to access remote computers using a terminal or command-
line interface.
• Telnet’s use has diminished due to security concerns, and alternatives like SSH are now
preferred for secure remote management.
• Secure Shell (SSH) protocol is a method for securely sending commands to a computer
over an unsecured network.
• SSH uses cryptography to authenticate and encrypt connections between devices.
• SSH also allows for tunneling, or port forwarding, which is when data packets are not
able to cross networks that they would not otherwise be able to cross.
Local Login
• Whenever a user logs into its local system, it is known as local login.
• Keystrokes are accepted by the terminal driver when the user types at
the terminal.
• Terminal Driver passes these characters to OS.
• Now, OS validates the combination of characters and opens the
required application.
Remote Login
• Remote Login is a process in which users can log in to a remote site
i.e. computer and use services that are available on the remote
computer. With the help of remote login, a user is able to understand
the result of transferring the result of processing from the remote
computer to the local computer.
The Procedure of Remote Login
• When the user types something on the local computer, the local operating
system accepts the character.
• The local computer does not interpret the characters, it will send them to the
TELNET client.
• Commands or text which are in the form of NVT, travel through the Internet
and it will arrive at the TCP/IP stack at the remote computer.
• Characters are then delivered to the operating system and later on
passed to the TELNET server.
• Internet access can be via cable modem or LAN and other high-speed services.
phones.
• Other services give you the option of using a traditional phone that comes
• Using a phone with a VoIP adapter, users can dial numbers as usual.