SlideShare a Scribd company logo
1 of 40
Manoj Kumar
www.facebook.com/manojjkit91
Twitte : @manojjkit91
1
TELNET is an abbreviation for terminal network.
It is a standard TCP/IP protocol for virtual terminal
service.
It is a general purpose client/server application
program.
2
TELNET enables the establishment of a connection to
a remote system in such a way that the local terminal
appears to be a terminal at the remote system.
In other words, it allows the user to log on to a
remote computer. After logging on, user can use the
services available on the remote computer and
transfer the results back to the local computer.
3
LOGGINGLOGGING
To access the system, user logs into the system
with user-id. The system also includes password
checking to prevent an unauthorized user accessing
the resources.
Logging process can be local logging or remote
logging.
4
When the user logs into
a local timesharing
system, it is called local
log-in.
When the user wants to
access an application
program or utility
located on a remote
machine, it is called
remote log-in.
5
LOCAL LOG-INLOCAL LOG-IN
Figure- 1
6
When the user types at the terminal, the keystrokes
are accepted by the terminal driver.
The terminal driver passes the characters to the
operating system.
The operating system interprets the combination of
characters and invokes the desired application
program.
7
REMOTE LOG-INREMOTE LOG-IN
Figure- 1
Figure- 2
8
The user sends the keystrokes to the terminal driver,
where the local operating system accepts the
characters but does not interpret them.
The characters are sent to the TELNET client, which
transforms the characters to a universal character set
called network virtual terminal(NVT) characters and
delivers them to the local TCP/IP protocol stack.
9
The text in NVT form travel through the internet and
arrive at the TCP/IP stack at the remote machine.
The characters are delivered to the operating system
and passed to the TELNET server which changes the
characters to the corresponding characters
understandable by the remote computer.
10
However, the characters cannot be passed directly to
the operating system because the remote operating
system is not designed to receive characters from a
TELNET server.
It is designed to receive characters from a terminal
driver.
A software called a pseudo terminal driver is added
which pretends that the characters are coming from a
terminal.
11
CONCEPT OF NVTCONCEPT OF NVT
Figure- 3
12
The client telnet translates characters that come
from local terminal into NVT form and delivers them
to the network.
The server telnet translates data and commands
from NVT form into the form acceptable by the
remote computer.
13
NVT CHARACTER SETNVT CHARACTER SET
It uses two sets of characters one for data and
other for control.
Figure- 4
14
EMBEDDINGEMBEDDING
Telnet uses only one TCP connection.
The same connection is used for sending both data and
control characters.
Telnet accomplishes this by embedding the control
characters in the data stream.
To distinguish data from control characters, each
sequence of control characters is preceded by a special
control character called interpret as control(IAC).
15
An example of embeddingAn example of embedding
c a t f i e al IAC EC 1
Figure- 5
16
OPTIONSOPTIONS
Options are extra features available to a user with a more
sophisticated terminal.
Some common options are as-
Cod
e
Option Meaning
0 Binary Interpret as 8-bit binary transmission
1 Echo Echo the data received on one side
to the other
5 Status Request the status of telnet
24 Terminal type Set the terminal type
32 Terminal speed Set the terminal speed
34 Line mode Change to line mode
Figure- 6
17
OPTION NEGOTIATIONOPTION NEGOTIATION
Telnet lets the client and server negotiate options
before or during the use of the service.
Four control characters are used for this purpose-
18
Meaning
WILL 1. Offering to enable
2. Accepting a request to enable
WONT 1. 1.Rejecting a request to enable
2. 2.Offering to disable
3. 3.Accepting a request to disable
DO 1. 1.Approving an offer to enable
2. 2.Requesting to enable
DONT 1. 1.Dispproving an offer to enable
2. 2.Approving an offer to disable
3. 3.Requesting to disable
These control characters are as-
Figure- 7
19
WILL
Will I enable the option?
DO or DONT
Do (or don’t) enable the option
Offer to enable the option
Figure- 8
20
DO
Do enable the option
I will (won’t) enable the option
WILL or WONT
Request to enable an option
Figure- 9
21
WONT
I won’t use the option any more
DONT
Don’t use it
Offer to disable an option
Figure- 10
22
DONT
Don’t use the option any more
WONT
I won’t
Request to disable an option
Figure- 11
23
Example of option ‘Echo’Example of option ‘Echo’
Do enable the echo option
IACDOECHO1
I will enable the echo option
IAC WILL ECHO 22
Figure- 12
24
MODE OF OPERATIONMODE OF OPERATION
Most Telnet implementation operate in one of three
modes-
o Default mode
o Character mode
o Line mode
25
DEFAULT MODEDEFAULT MODE
This mode is used if no other modes are invoked
through option negotiation
Echoing is done by the client.
The user types the character , client echoes the
character but does not send it until a whole line is
completed.
26
CHARACTER MODECHARACTER MODE
Each character typed is sent by the client to the
server.
The server echoes the character back to be
displayed on the client screen.
Echoing of the character can be displayed if the
transmission time is long.
It also creates overhead for the network.
27
LINE MODELINE MODE
It is proposed to compensate for the deficiencies of
default mode and character mode.
In this line echoing is done by the client.
The client then sends the whole line to the server.
28
GOPHERGOPHER
Gopher is a TCP/IP application layer protocol
designed for distributing, searching and retrieving
documents over the internet.
It presented an alternative to the world wide web
in its early stages.
29
A gopher client sends request across the internet
to a gopher server.
Figure- 13
30
Figure- 14
31
Gopher pages are just lists of links either to other
pages on same site or pages on other site.
Unlike the world wide web there is no hypertext ,
just the links.
32
Figure- 15
33
o The gopher distributed database is essentially a
hierarchical structure of directories.
o Some entries point to other directories, some
points to documents.
o Documents can be text, images or programs
34
GOPHER SEARCHERSGOPHER SEARCHERS
Two types of search engine are available in gopher-
o Veronica
o Jug head
Veronica is popular of the two. Both work much like the
web search engine.
They search pre-built databases for keywords that you
provide.
35
VERONICAVERONICA
V- Very
E- Easy
R- Rodent
O- Oriented
N- Net-wide
I- Index
C- Computerized
A- Archives
36
VERONICA Contd…VERONICA Contd…
It was designed as a response to the problem of
resource discovery in gopher space.
Veronica is simply accessed through a gopher
client , which is already known by gopher users.
37
Gopher Client
Gopher server with veronica
Gopher Server
Gopher and Veronica are used together
Figure- 16
38
GOPHER EFFICIENCYGOPHER EFFICIENCY
The gopher does not retain any information about
the client across transactions.
This aspect of gopher design is the key to gopher’s
efficiency : the server is only connected to the
user long enough to serve a particular request.
It does not pay the high overhead cost of having
hundreds or thousands of users logged in at once.
39
40

More Related Content

What's hot

Types of environment in Artificial Intelligence
Types of environment in Artificial IntelligenceTypes of environment in Artificial Intelligence
Types of environment in Artificial IntelligenceNoman Ullah Khan
 
data-link layer protocols
data-link layer protocols  data-link layer protocols
data-link layer protocols BE Smârt
 
A Quick Introduction to Linux
A Quick Introduction to LinuxA Quick Introduction to Linux
A Quick Introduction to LinuxTusharadri Sarkar
 
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSDr. SELVAGANESAN S
 
Substitution techniques
Substitution techniquesSubstitution techniques
Substitution techniquesvinitha96
 
Key management and distribution
Key management and distributionKey management and distribution
Key management and distributionRiya Choudhary
 
Network layer - design Issues
Network layer - design IssuesNetwork layer - design Issues
Network layer - design Issuesقصي نسور
 
Secure Socket Layer (SSL)
Secure Socket Layer (SSL)Secure Socket Layer (SSL)
Secure Socket Layer (SSL)amanchaurasia
 
Key Management and Distribution
Key Management and DistributionKey Management and Distribution
Key Management and DistributionSyed Bahadur Shah
 
LINUX:Control statements in shell programming
LINUX:Control statements in shell programmingLINUX:Control statements in shell programming
LINUX:Control statements in shell programmingbhatvijetha
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference ModelMukesh Tekwani
 
Transport Layer Security
Transport Layer SecurityTransport Layer Security
Transport Layer SecurityHuda Seyam
 

What's hot (20)

Types of environment in Artificial Intelligence
Types of environment in Artificial IntelligenceTypes of environment in Artificial Intelligence
Types of environment in Artificial Intelligence
 
data-link layer protocols
data-link layer protocols  data-link layer protocols
data-link layer protocols
 
A Quick Introduction to Linux
A Quick Introduction to LinuxA Quick Introduction to Linux
A Quick Introduction to Linux
 
Linux file system
Linux file systemLinux file system
Linux file system
 
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
 
Xampp Ppt
Xampp PptXampp Ppt
Xampp Ppt
 
Substitution techniques
Substitution techniquesSubstitution techniques
Substitution techniques
 
Rc4
Rc4Rc4
Rc4
 
Sliding window protocol
Sliding window protocolSliding window protocol
Sliding window protocol
 
Key management and distribution
Key management and distributionKey management and distribution
Key management and distribution
 
Network layer - design Issues
Network layer - design IssuesNetwork layer - design Issues
Network layer - design Issues
 
Secure Socket Layer (SSL)
Secure Socket Layer (SSL)Secure Socket Layer (SSL)
Secure Socket Layer (SSL)
 
Transport layer
Transport layer Transport layer
Transport layer
 
Hashing
HashingHashing
Hashing
 
Key Management and Distribution
Key Management and DistributionKey Management and Distribution
Key Management and Distribution
 
Web Security
Web SecurityWeb Security
Web Security
 
LINUX:Control statements in shell programming
LINUX:Control statements in shell programmingLINUX:Control statements in shell programming
LINUX:Control statements in shell programming
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference Model
 
Web security
Web securityWeb security
Web security
 
Transport Layer Security
Transport Layer SecurityTransport Layer Security
Transport Layer Security
 

Viewers also liked

Viewers also liked (20)

Gopher
GopherGopher
Gopher
 
Presentation on telnet
Presentation on telnetPresentation on telnet
Presentation on telnet
 
TELNET Protocol
TELNET ProtocolTELNET Protocol
TELNET Protocol
 
FTP - File Transfer Protocol
FTP - File Transfer ProtocolFTP - File Transfer Protocol
FTP - File Transfer Protocol
 
File Transfer Protocol
File Transfer ProtocolFile Transfer Protocol
File Transfer Protocol
 
Ftp (file transfer protocol)
Ftp (file transfer protocol)Ftp (file transfer protocol)
Ftp (file transfer protocol)
 
File transfer protocol (ftp)
File transfer protocol (ftp)File transfer protocol (ftp)
File transfer protocol (ftp)
 
HTTP Basics
HTTP BasicsHTTP Basics
HTTP Basics
 
Introduction to HTTP protocol
Introduction to HTTP protocolIntroduction to HTTP protocol
Introduction to HTTP protocol
 
Telnet
TelnetTelnet
Telnet
 
world wide web
world wide webworld wide web
world wide web
 
TCP/IP – Transmission Control Protocol/ Internet Protocol
TCP/IP – Transmission Control Protocol/ Internet ProtocolTCP/IP – Transmission Control Protocol/ Internet Protocol
TCP/IP – Transmission Control Protocol/ Internet Protocol
 
Artificial Intelligence : A Presentation
Artificial Intelligence : A Presentation Artificial Intelligence : A Presentation
Artificial Intelligence : A Presentation
 
Who Is Youth ?
Who Is Youth ?Who Is Youth ?
Who Is Youth ?
 
Telnet y Gopher
Telnet y GopherTelnet y Gopher
Telnet y Gopher
 
TELNET and SSH by MUSTAFA SAKHAI
TELNET and SSH by MUSTAFA SAKHAITELNET and SSH by MUSTAFA SAKHAI
TELNET and SSH by MUSTAFA SAKHAI
 
Remote login.89 to 90
Remote login.89 to 90Remote login.89 to 90
Remote login.89 to 90
 
09 telnet, remote dan ftp
09 telnet, remote dan ftp09 telnet, remote dan ftp
09 telnet, remote dan ftp
 
Telnet & Secure Shell
Telnet & Secure ShellTelnet & Secure Shell
Telnet & Secure Shell
 
Report on telnet
Report on telnetReport on telnet
Report on telnet
 

Similar to Computer Network - Telnet and Gopher

Internet technology unit 5
Internet technology unit 5Internet technology unit 5
Internet technology unit 5WE-IT TUTORIALS
 
Meeting 5.1 : telnet
Meeting 5.1 : telnetMeeting 5.1 : telnet
Meeting 5.1 : telnetSyaiful Ahdan
 
Major project of Video calling and remote accessing
Major project  of Video calling and remote accessingMajor project  of Video calling and remote accessing
Major project of Video calling and remote accessingsyed Farhan Rizvi
 
Machine Problem 1: Let's chat
Machine Problem 1: Let's chatMachine Problem 1: Let's chat
Machine Problem 1: Let's chatbutest
 
IRJET- DTMF Controlled Robotic Car
IRJET-  	  DTMF Controlled Robotic CarIRJET-  	  DTMF Controlled Robotic Car
IRJET- DTMF Controlled Robotic CarIRJET Journal
 
Design an Implementation of A Messaging and Resource Sharing Software
Design an Implementation of A Messaging and Resource Sharing SoftwareDesign an Implementation of A Messaging and Resource Sharing Software
Design an Implementation of A Messaging and Resource Sharing Softwarenilabarai
 
Cpu224 xp eth-ethernet_interface
Cpu224 xp eth-ethernet_interfaceCpu224 xp eth-ethernet_interface
Cpu224 xp eth-ethernet_interfacearco zhang
 
Telnet configuration
Telnet configurationTelnet configuration
Telnet configurationMdAlAmin187
 
Communication between PLC different vendors using OPC server improved with ap...
Communication between PLC different vendors using OPC server improved with ap...Communication between PLC different vendors using OPC server improved with ap...
Communication between PLC different vendors using OPC server improved with ap...TELKOMNIKA JOURNAL
 
ONLINE FOOD ORDERS THROUGH WHATSAPP AUTOMATION BOT
ONLINE FOOD ORDERS THROUGH WHATSAPP AUTOMATION BOTONLINE FOOD ORDERS THROUGH WHATSAPP AUTOMATION BOT
ONLINE FOOD ORDERS THROUGH WHATSAPP AUTOMATION BOTIRJET Journal
 
IRJET- IOT Based Surveillance Robotic Car using Raspberry PI
IRJET- IOT Based Surveillance Robotic Car using Raspberry PIIRJET- IOT Based Surveillance Robotic Car using Raspberry PI
IRJET- IOT Based Surveillance Robotic Car using Raspberry PIIRJET Journal
 
International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...ijcseit
 
Different applications of programmable logic controller (plc)
Different applications of programmable logic controller (plc)Different applications of programmable logic controller (plc)
Different applications of programmable logic controller (plc)ijcseit
 
DIFFERENT APPLICATIONS OF PROGRAMMABLE LOGIC CONTROLLER (PLC)
DIFFERENT APPLICATIONS OF PROGRAMMABLE LOGIC CONTROLLER (PLC)DIFFERENT APPLICATIONS OF PROGRAMMABLE LOGIC CONTROLLER (PLC)
DIFFERENT APPLICATIONS OF PROGRAMMABLE LOGIC CONTROLLER (PLC)ijcseit
 
12 coms 525 tcpip - applications - http - telnet
12   coms 525 tcpip - applications - http - telnet12   coms 525 tcpip - applications - http - telnet
12 coms 525 tcpip - applications - http - telnetPalanivel Kuppusamy
 
Denovo SIP VoIP Termination SBC Session Boarder Controler @ denofolab.com
Denovo SIP VoIP Termination SBC Session Boarder Controler @ denofolab.comDenovo SIP VoIP Termination SBC Session Boarder Controler @ denofolab.com
Denovo SIP VoIP Termination SBC Session Boarder Controler @ denofolab.comAnne Kwong
 

Similar to Computer Network - Telnet and Gopher (20)

Telnet ppt
Telnet pptTelnet ppt
Telnet ppt
 
Internet technology unit 5
Internet technology unit 5Internet technology unit 5
Internet technology unit 5
 
Chap 18 telnet
Chap 18 telnetChap 18 telnet
Chap 18 telnet
 
Meeting 5.1 : telnet
Meeting 5.1 : telnetMeeting 5.1 : telnet
Meeting 5.1 : telnet
 
MininetasSDNPlatform.pdf
MininetasSDNPlatform.pdfMininetasSDNPlatform.pdf
MininetasSDNPlatform.pdf
 
Major project of Video calling and remote accessing
Major project  of Video calling and remote accessingMajor project  of Video calling and remote accessing
Major project of Video calling and remote accessing
 
Machine Problem 1: Let's chat
Machine Problem 1: Let's chatMachine Problem 1: Let's chat
Machine Problem 1: Let's chat
 
IRJET- DTMF Controlled Robotic Car
IRJET-  	  DTMF Controlled Robotic CarIRJET-  	  DTMF Controlled Robotic Car
IRJET- DTMF Controlled Robotic Car
 
Design an Implementation of A Messaging and Resource Sharing Software
Design an Implementation of A Messaging and Resource Sharing SoftwareDesign an Implementation of A Messaging and Resource Sharing Software
Design an Implementation of A Messaging and Resource Sharing Software
 
Cpu224 xp eth-ethernet_interface
Cpu224 xp eth-ethernet_interfaceCpu224 xp eth-ethernet_interface
Cpu224 xp eth-ethernet_interface
 
Telnet configuration
Telnet configurationTelnet configuration
Telnet configuration
 
Communication between PLC different vendors using OPC server improved with ap...
Communication between PLC different vendors using OPC server improved with ap...Communication between PLC different vendors using OPC server improved with ap...
Communication between PLC different vendors using OPC server improved with ap...
 
ONLINE FOOD ORDERS THROUGH WHATSAPP AUTOMATION BOT
ONLINE FOOD ORDERS THROUGH WHATSAPP AUTOMATION BOTONLINE FOOD ORDERS THROUGH WHATSAPP AUTOMATION BOT
ONLINE FOOD ORDERS THROUGH WHATSAPP AUTOMATION BOT
 
IRJET- IOT Based Surveillance Robotic Car using Raspberry PI
IRJET- IOT Based Surveillance Robotic Car using Raspberry PIIRJET- IOT Based Surveillance Robotic Car using Raspberry PI
IRJET- IOT Based Surveillance Robotic Car using Raspberry PI
 
International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...
 
Different applications of programmable logic controller (plc)
Different applications of programmable logic controller (plc)Different applications of programmable logic controller (plc)
Different applications of programmable logic controller (plc)
 
DIFFERENT APPLICATIONS OF PROGRAMMABLE LOGIC CONTROLLER (PLC)
DIFFERENT APPLICATIONS OF PROGRAMMABLE LOGIC CONTROLLER (PLC)DIFFERENT APPLICATIONS OF PROGRAMMABLE LOGIC CONTROLLER (PLC)
DIFFERENT APPLICATIONS OF PROGRAMMABLE LOGIC CONTROLLER (PLC)
 
12 coms 525 tcpip - applications - http - telnet
12   coms 525 tcpip - applications - http - telnet12   coms 525 tcpip - applications - http - telnet
12 coms 525 tcpip - applications - http - telnet
 
ROBOT MOTION
ROBOT    MOTIONROBOT    MOTION
ROBOT MOTION
 
Denovo SIP VoIP Termination SBC Session Boarder Controler @ denofolab.com
Denovo SIP VoIP Termination SBC Session Boarder Controler @ denofolab.comDenovo SIP VoIP Termination SBC Session Boarder Controler @ denofolab.com
Denovo SIP VoIP Termination SBC Session Boarder Controler @ denofolab.com
 

More from Manoj Kumar

TCP/IP Protocol Architeture
TCP/IP Protocol ArchitetureTCP/IP Protocol Architeture
TCP/IP Protocol ArchitetureManoj Kumar
 
Computer Network - Network Layer
Computer Network - Network LayerComputer Network - Network Layer
Computer Network - Network LayerManoj Kumar
 
Computer Network - OSI model
Computer Network - OSI modelComputer Network - OSI model
Computer Network - OSI modelManoj Kumar
 
Computer Network - NetworkTopology
Computer Network - NetworkTopologyComputer Network - NetworkTopology
Computer Network - NetworkTopologyManoj Kumar
 
Caste a vote online
Caste a vote onlineCaste a vote online
Caste a vote onlineManoj Kumar
 
Biometric authentication system
Biometric authentication systemBiometric authentication system
Biometric authentication systemManoj Kumar
 
Some Basic Concepts of Object Oriented Methodology
Some Basic Concepts of Object Oriented MethodologySome Basic Concepts of Object Oriented Methodology
Some Basic Concepts of Object Oriented MethodologyManoj Kumar
 

More from Manoj Kumar (7)

TCP/IP Protocol Architeture
TCP/IP Protocol ArchitetureTCP/IP Protocol Architeture
TCP/IP Protocol Architeture
 
Computer Network - Network Layer
Computer Network - Network LayerComputer Network - Network Layer
Computer Network - Network Layer
 
Computer Network - OSI model
Computer Network - OSI modelComputer Network - OSI model
Computer Network - OSI model
 
Computer Network - NetworkTopology
Computer Network - NetworkTopologyComputer Network - NetworkTopology
Computer Network - NetworkTopology
 
Caste a vote online
Caste a vote onlineCaste a vote online
Caste a vote online
 
Biometric authentication system
Biometric authentication systemBiometric authentication system
Biometric authentication system
 
Some Basic Concepts of Object Oriented Methodology
Some Basic Concepts of Object Oriented MethodologySome Basic Concepts of Object Oriented Methodology
Some Basic Concepts of Object Oriented Methodology
 

Recently uploaded

Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 

Recently uploaded (20)

Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 

Computer Network - Telnet and Gopher

  • 2. TELNET is an abbreviation for terminal network. It is a standard TCP/IP protocol for virtual terminal service. It is a general purpose client/server application program. 2
  • 3. TELNET enables the establishment of a connection to a remote system in such a way that the local terminal appears to be a terminal at the remote system. In other words, it allows the user to log on to a remote computer. After logging on, user can use the services available on the remote computer and transfer the results back to the local computer. 3
  • 4. LOGGINGLOGGING To access the system, user logs into the system with user-id. The system also includes password checking to prevent an unauthorized user accessing the resources. Logging process can be local logging or remote logging. 4
  • 5. When the user logs into a local timesharing system, it is called local log-in. When the user wants to access an application program or utility located on a remote machine, it is called remote log-in. 5
  • 7. When the user types at the terminal, the keystrokes are accepted by the terminal driver. The terminal driver passes the characters to the operating system. The operating system interprets the combination of characters and invokes the desired application program. 7
  • 9. The user sends the keystrokes to the terminal driver, where the local operating system accepts the characters but does not interpret them. The characters are sent to the TELNET client, which transforms the characters to a universal character set called network virtual terminal(NVT) characters and delivers them to the local TCP/IP protocol stack. 9
  • 10. The text in NVT form travel through the internet and arrive at the TCP/IP stack at the remote machine. The characters are delivered to the operating system and passed to the TELNET server which changes the characters to the corresponding characters understandable by the remote computer. 10
  • 11. However, the characters cannot be passed directly to the operating system because the remote operating system is not designed to receive characters from a TELNET server. It is designed to receive characters from a terminal driver. A software called a pseudo terminal driver is added which pretends that the characters are coming from a terminal. 11
  • 12. CONCEPT OF NVTCONCEPT OF NVT Figure- 3 12
  • 13. The client telnet translates characters that come from local terminal into NVT form and delivers them to the network. The server telnet translates data and commands from NVT form into the form acceptable by the remote computer. 13
  • 14. NVT CHARACTER SETNVT CHARACTER SET It uses two sets of characters one for data and other for control. Figure- 4 14
  • 15. EMBEDDINGEMBEDDING Telnet uses only one TCP connection. The same connection is used for sending both data and control characters. Telnet accomplishes this by embedding the control characters in the data stream. To distinguish data from control characters, each sequence of control characters is preceded by a special control character called interpret as control(IAC). 15
  • 16. An example of embeddingAn example of embedding c a t f i e al IAC EC 1 Figure- 5 16
  • 17. OPTIONSOPTIONS Options are extra features available to a user with a more sophisticated terminal. Some common options are as- Cod e Option Meaning 0 Binary Interpret as 8-bit binary transmission 1 Echo Echo the data received on one side to the other 5 Status Request the status of telnet 24 Terminal type Set the terminal type 32 Terminal speed Set the terminal speed 34 Line mode Change to line mode Figure- 6 17
  • 18. OPTION NEGOTIATIONOPTION NEGOTIATION Telnet lets the client and server negotiate options before or during the use of the service. Four control characters are used for this purpose- 18
  • 19. Meaning WILL 1. Offering to enable 2. Accepting a request to enable WONT 1. 1.Rejecting a request to enable 2. 2.Offering to disable 3. 3.Accepting a request to disable DO 1. 1.Approving an offer to enable 2. 2.Requesting to enable DONT 1. 1.Dispproving an offer to enable 2. 2.Approving an offer to disable 3. 3.Requesting to disable These control characters are as- Figure- 7 19
  • 20. WILL Will I enable the option? DO or DONT Do (or don’t) enable the option Offer to enable the option Figure- 8 20
  • 21. DO Do enable the option I will (won’t) enable the option WILL or WONT Request to enable an option Figure- 9 21
  • 22. WONT I won’t use the option any more DONT Don’t use it Offer to disable an option Figure- 10 22
  • 23. DONT Don’t use the option any more WONT I won’t Request to disable an option Figure- 11 23
  • 24. Example of option ‘Echo’Example of option ‘Echo’ Do enable the echo option IACDOECHO1 I will enable the echo option IAC WILL ECHO 22 Figure- 12 24
  • 25. MODE OF OPERATIONMODE OF OPERATION Most Telnet implementation operate in one of three modes- o Default mode o Character mode o Line mode 25
  • 26. DEFAULT MODEDEFAULT MODE This mode is used if no other modes are invoked through option negotiation Echoing is done by the client. The user types the character , client echoes the character but does not send it until a whole line is completed. 26
  • 27. CHARACTER MODECHARACTER MODE Each character typed is sent by the client to the server. The server echoes the character back to be displayed on the client screen. Echoing of the character can be displayed if the transmission time is long. It also creates overhead for the network. 27
  • 28. LINE MODELINE MODE It is proposed to compensate for the deficiencies of default mode and character mode. In this line echoing is done by the client. The client then sends the whole line to the server. 28
  • 29. GOPHERGOPHER Gopher is a TCP/IP application layer protocol designed for distributing, searching and retrieving documents over the internet. It presented an alternative to the world wide web in its early stages. 29
  • 30. A gopher client sends request across the internet to a gopher server. Figure- 13 30
  • 32. Gopher pages are just lists of links either to other pages on same site or pages on other site. Unlike the world wide web there is no hypertext , just the links. 32
  • 34. o The gopher distributed database is essentially a hierarchical structure of directories. o Some entries point to other directories, some points to documents. o Documents can be text, images or programs 34
  • 35. GOPHER SEARCHERSGOPHER SEARCHERS Two types of search engine are available in gopher- o Veronica o Jug head Veronica is popular of the two. Both work much like the web search engine. They search pre-built databases for keywords that you provide. 35
  • 36. VERONICAVERONICA V- Very E- Easy R- Rodent O- Oriented N- Net-wide I- Index C- Computerized A- Archives 36
  • 37. VERONICA Contd…VERONICA Contd… It was designed as a response to the problem of resource discovery in gopher space. Veronica is simply accessed through a gopher client , which is already known by gopher users. 37
  • 38. Gopher Client Gopher server with veronica Gopher Server Gopher and Veronica are used together Figure- 16 38
  • 39. GOPHER EFFICIENCYGOPHER EFFICIENCY The gopher does not retain any information about the client across transactions. This aspect of gopher design is the key to gopher’s efficiency : the server is only connected to the user long enough to serve a particular request. It does not pay the high overhead cost of having hundreds or thousands of users logged in at once. 39
  • 40. 40