0% found this document useful (0 votes)
28 views15 pages

Telnet and Email

TELNET is a protocol that allows a local computer to connect to a remote computer for virtual terminal services, operating on a client/server model. It facilitates local and remote logins, enabling users to perform operations on remote systems while displaying results on the local machine. Email, a widely used internet service, allows users to send messages, including text and multimedia, through a structured system involving user agents, message transfer agents, and mailboxes.

Uploaded by

sidharthydv04
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
28 views15 pages

Telnet and Email

TELNET is a protocol that allows a local computer to connect to a remote computer for virtual terminal services, operating on a client/server model. It facilitates local and remote logins, enabling users to perform operations on remote systems while displaying results on the local machine. Email, a widely used internet service, allows users to send messages, including text and multimedia, through a structured system involving user agents, message transfer agents, and mailboxes.

Uploaded by

sidharthydv04
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 15
Introduction to TELNET Read Discuss Courses : Pre-Requisite: Types of Network Protocol TELNET stands for Teletype Network. It is a type of protocol that enables one computer to connect to the local computer. It is used as a standard TCP/IP protocol for virtual terminal service which is provided by ISO. The computer which starts the connection is known as the local computer. The computer which is being connected to i.e. which accepts the connection known as the remote computer. During telnet operation, whatever is being performed on the remote computer will be displayed by the local computer. Telnet operates on a client/server principle. The local computer uses a telnet client program and the remote computers use a telnet server nroaram eT ee Logging The logging process can be further categorized into two parts: 1. Local Login 2. Remote Login 1. Local Login: Whenever a user logs into its local system, it is known as local login. Operating System, Terminal Local Login The Procedure of Local Login * Keystrokes are accepted by the terminal driver when the user types at the terminal. e Terminal Driver passes these characters to OS. ¢ Now, OS validates the combination of ¢ characters and opens the required application. a 2. Remote Login: Remote Login is a process in which users can log in to a remote site i.e. computer and use services that are available on the remote computer. With the help of remote login, a user is able to understand the result of transferring the result of processing from the remote computer to the local computer. Tenens Telnet server ‘gpteation Ba.8 Ter, [ee Data Link Physical | [Pseudo [ecmentctve Terminat << wrterm ——> Remote Login in Logging The Procedure of Remote Login e When the user types something on the local computer, the local operating system accepts the character. * The local computer does not interpret wi character. The local computer does not interpret the characters, it will send them to the TELNET client. TELNET client transforms these characters to a universal character set called Network Virtual Terminal (NVT), characters and it will pass them to the local TCP/IP protocol Stack. Commands or text which are in the form of NVT, travel through the Internet and it will arrive at the TCP/IP stack at the remote computer. Characters are then delivered to the operating system and later on passed to the TELNET server. Then TELNET server changes those characters to characters that can be understandable by a remote computer. The remote operating system receives characters from a pseudo-terminal driver, which is a piece of software that pretends that characters are ( Network Virtual Terminal(NVT) NVT_(Network Virtual Terminal) is a virtual terminal in TELNET that has a fundamental structure that is shared by many different types of real terminals. NVT (Network Virtual Terminal) was created to make communication viable between different types of terminals with different operating systems. GeeksforGeeks TELNET Client TELNET Server Terminal a | = cet | i computer} computer } character set | 77777" 77m noon nnn nme nnn nn nnn nna | character set} Network Virtual Terminal(NVT) in Telnet Commands of Telnet are identified by a prefix character, Interpret As Command (IAC) with code 255. IAC is followed by command and option codes. The basic format of the command is as shown in the following figure : Command Option code code Advantages of Telnet 1.lt provides remote access to someone's computer system. 2.Telnet allows the user for more access with fewer problems in_data transmission. 3. Telnet saves a lot of time. 4. The oldest system can be connected to a newer system with telnet having different operating systems. Disadvantages of Telnet 1. As it is somehow complex, it becomes difficult to beginners in understanding. 2. Data is sent here in form of plain text, that’s why it is not so secured. 3.Some_ capabilities are disabled because of not proper interlinking of the remote and local devices. Modes of Operation Most telnet implementations operate in one of the following three modes: 1. Default mode 2. Character mode 3. Line mode oS. Line mouge 1. Default Mode: If no other modes are invoked then this mode is used. Echoing is performed in this mode by the client. In this mode, the user types a character and the client echoes the character on the screen but it does not send it until the whole line is completed. 2. Character Mode: Each character typed in this mode is sent by the client to the server. A server in this type of mode normally echoes characters back to be displayed on the client’s screen. 3. Line Mode: Line editing like echoing, character erasing, etc. is done from the client side. The client will send the whole line to the server. Last Updated : 24 Mar. 2023 AL 20 n Introduction to Electronic Mail Introduction: Electronic mail, commonly known as email, is a method of exchanging messages over the internet. Here are the basics of email: = . An email address: This is a unique identifier for each user, typically in the format of [email protected]. 2. An email client: This is a software program used to send, receive and manage emails, such as Gmail, Outlook, or Apple Mail. 3. An email server: This is a computer system responsible for storing and forwarding emails to their intended recipients. ee ee EE To send an email: 1. Compose a new message in your email client. 2. Enter the recipient's email address in the “To” field. 3. Add a subject line to summarize the content of the message. 4. Write the body of the message. 5. Attach any relevant files if needed. 6. Click “Send” to deliver the message to the recipient's email server. 7. Emails can also include features such as cc (carbon copy) and bcc (blind carbon copy) to send copies of the message to multiple recipients, and reply, reply all, and forward options to manage the conversation. Electronic Mail (e-mail) is one of most widely used services of Internet. This service allows an Internet user to send a message in formatted manner (mail) to the other Internet user in any part of world. Message in mail not only contain text, but it also contains images, audio and manner (mail) to the other Internet user In any part of world. Message in mail not only contain text, but it also contains images, audio and videos data. The person who is sending mail is called sender and person who receives mail is called recipient. It is just like postal mail service. Components of E-Mail System : The basic components of an email system are : User Agent (UA), Message Transfer Agent (MTA), Mail Box, and Spool file. These are explained as following below. 1. User Agent (UA) : The UA is normally a program which is used to send and receive mail. Sometimes, it is called as mail reader. It accepts variety of commands for composing, receiving and replying to messages as well as for manipulation of the mailboxes. 2. Message Transfer Agent (MTA) : MTA is actually responsible for transfer of mail from one system to another. To send a mail, a system must have client MTA and system MTA. It transfer mail to mailboxes of recipients if they are connected in the same machine. It system must nave client MIA ana system MTA. It transfer mail to mailboxes of recipients if they are connected in the same machine. It delivers mail to peer MTA if destination mailbox is in another machine. The delivery from one MTA to another MTA is done by Simple Mail Transfer Protocol. User A User 8 . Mailbox : It is a file on local hard drive to collect mails. Delivered mails are present in this file. The user can read it delete it according to his/her requirement. To use e-mail system each user must have a mailbox . Access to mailbox is only to owner of mailbox. 4. Spool file : This file contains mails that are to be sent. User agent appends outgoing mails in this file using SMTP. MTA extracts pending mail from spool file for their delivery. E-mail allows one name, an alias, to represent several different e-mail addresses. It is known as mailing list, Whenever user have to sent a message, system checks recipient’s name against alias database. If mailing list is present for defined alias, separate messages, one for each entry in the list, must be prepared and handed to MTA. If for defined alias, there is no such mailing list is present, name itself becomes naming address and a single message is delivered to mail transfer entity. Services provided by E-mail system : « Composition — The composition refer to process that creates messages and answers. For composition any kind of text editor can be used. Services provided by E-mail system : Composition — The composition refer to process that creates messages and answers. For composition any kind of text editor can be used. Transfer —- Transfer means sending procedure of mail i.e. from the sender to recipient. Reporting — Reporting refers to confirmation for delivery of mail. It help user to check whether their mail is delivered, lost or rejected. Displaying — It refers to present mail in form that is understand by the user. Disposition — This step concern with recipient that what will recipient do after receiving mail i.e save mail, delete before reading or delete after reading. Advantages of email: 1. Convenient and fast communication with individuals or groups globally. 2. Easy to store and search for past messages. 3. Ability to send and receive attachments such as documents, images, and videos. 4. Cost-effective compared to traditional mail and fax. 5. Available 24/7. Disadvantages of email: = . Risk of spam and phishing attacks. Ny . Overwhelming amount of emails can lead to information overload. 3. Can lead to decreased face-to-face communication and loss of personal touch. 4. Potential for miscommunication due to lack of tone and body language in written messages. a . Technical issues, such as server outages, can disrupt email service.

You might also like