TELNET is a protocol that allows a local computer to connect to a remote computer for virtual terminal services, operating on a client/server model. It facilitates local and remote logins, enabling users to perform operations on remote systems while displaying results on the local machine. Email, a widely used internet service, allows users to send messages, including text and multimedia, through a structured system involving user agents, message transfer agents, and mailboxes.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0 ratings0% found this document useful (0 votes)
28 views15 pages
Telnet and Email
TELNET is a protocol that allows a local computer to connect to a remote computer for virtual terminal services, operating on a client/server model. It facilitates local and remote logins, enabling users to perform operations on remote systems while displaying results on the local machine. Email, a widely used internet service, allows users to send messages, including text and multimedia, through a structured system involving user agents, message transfer agents, and mailboxes.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 15
Introduction to TELNET
Read Discuss Courses :
Pre-Requisite: Types of Network
Protocol
TELNET stands for Teletype Network. It
is a type of protocol that enables one
computer to connect to the local
computer. It is used as a standard TCP/IP
protocol for virtual terminal service
which is provided by ISO. The computer
which starts the connection is known as
the local computer.
The computer which is being connected
to i.e. which accepts the connection
known as the remote computer.
During telnet operation, whatever is
being performed on the remote
computer will be displayed by the local
computer. Telnet operates on a
client/server principle. The local
computer uses a telnet client program
and the remote computers use a telnet
server nroarameT ee
Logging
The logging process can be further
categorized into two parts:
1. Local Login
2. Remote Login
1. Local Login: Whenever a user logs
into its local system, it is known as local
login.
Operating
System,
Terminal
Local Login
The Procedure of Local Login
* Keystrokes are accepted by the
terminal driver when the user types
at the terminal.
e Terminal Driver passes these
characters to OS.
¢ Now, OS validates the combination of ¢
characters and opens the required
application.a
2. Remote Login: Remote Login is a
process in which users can log in to a
remote site i.e. computer and use
services that are available on the remote
computer. With the help of remote login,
a user is able to understand the result of
transferring the result of processing from
the remote computer to the local
computer.
Tenens Telnet server ‘gpteation
Ba.8
Ter,
[ee
Data Link
Physical | [Pseudo
[ecmentctve
Terminat
<< wrterm ——>
Remote Login in Logging
The Procedure of Remote Login
e When the user types something on
the local computer, the local
operating system accepts the
character.
* The local computer does not interpret
wicharacter.
The local computer does not interpret
the characters, it will send them to
the TELNET client.
TELNET client transforms these
characters to a universal character set
called
Network Virtual Terminal (NVT),
characters and it will pass them to
the local TCP/IP protocol Stack.
Commands or text which are in the
form of NVT, travel through the
Internet and it will arrive at the
TCP/IP
stack at the remote computer.
Characters are then delivered to the
operating system and later on passed
to the TELNET server.
Then TELNET server changes those
characters to characters that can be
understandable by a remote
computer.
The remote operating system receives
characters from a pseudo-terminal
driver, which is a piece of software
that pretends that characters are
(Network Virtual
Terminal(NVT)
NVT_(Network Virtual Terminal) is a
virtual terminal in TELNET that has a
fundamental structure that is shared by
many different types of real terminals.
NVT (Network Virtual Terminal) was
created to make communication viable
between different types of terminals
with different operating systems.
GeeksforGeeks
TELNET Client TELNET Server
Terminal
a | =
cet |
i computer} computer
} character set | 77777" 77m noon nnn nme nnn nn nnn nna | character set}
Network Virtual Terminal(NVT) in TelnetCommands of Telnet are identified by a
prefix character, Interpret As Command
(IAC) with code 255. IAC is followed by
command and option codes.
The basic format of the command is as
shown in the following figure :
Command Option
code codeAdvantages of Telnet
1.lt provides remote access to
someone's computer system.
2.Telnet allows the user for more
access with fewer problems in_data
transmission.
3. Telnet saves a lot of time.
4. The oldest system can be connected
to a newer system with telnet having
different operating systems.
Disadvantages of Telnet
1. As it is somehow complex, it becomes
difficult to beginners in
understanding.
2. Data is sent here in form of plain text,
that’s why it is not so secured.
3.Some_ capabilities are disabled
because of not proper interlinking of
the remote and local devices.
Modes of Operation
Most telnet implementations operate in
one of the following three modes:
1. Default mode
2. Character mode
3. Line modeoS. Line mouge
1. Default Mode: If no other modes are
invoked then this mode is used. Echoing
is performed in this mode by the client.
In this mode, the user types a character
and the client echoes the character on
the screen but it does not send it until
the whole line is completed.
2. Character Mode: Each character typed
in this mode is sent by the client to the
server. A server in this type of mode
normally echoes characters back to be
displayed on the client’s screen.
3. Line Mode: Line editing like echoing,
character erasing, etc. is done from the
client side. The client will send the
whole line to the server.
Last Updated : 24 Mar. 2023 AL 20 nIntroduction to Electronic Mail
Introduction:
Electronic mail, commonly known as
email, is a method of exchanging
messages over the internet. Here are the
basics of email:
=
. An email address: This is a unique identifier for
each user, typically in the format of
[email protected].
2. An email client: This is a software program
used to send, receive and manage emails, such
as Gmail, Outlook, or Apple Mail.
3. An email server: This is a computer system
responsible for storing and forwarding emails
to their intended recipients.ee ee EE
To send an email:
1. Compose a new message in your email client.
2. Enter the recipient's email address in the “To”
field.
3. Add a subject line to summarize the content of
the message.
4. Write the body of the message.
5. Attach any relevant files if needed.
6. Click “Send” to deliver the message to the
recipient's email server.
7. Emails can also include features such as cc
(carbon copy) and bcc (blind carbon copy) to
send copies of the message to multiple
recipients, and reply, reply all, and forward
options to manage the conversation.
Electronic Mail (e-mail) is one of most widely
used services of Internet. This service allows an
Internet user to send a message in formatted
manner (mail) to the other Internet user in any
part of world. Message in mail not only contain
text, but it also contains images, audio andmanner (mail) to the other Internet user In any
part of world. Message in mail not only contain
text, but it also contains images, audio and
videos data. The person who is sending mail is
called sender and person who receives mail is
called recipient. It is just like postal mail service.
Components of E-Mail System : The basic
components of an email system are : User Agent
(UA), Message Transfer Agent (MTA), Mail Box,
and Spool file. These are explained as following
below.
1. User Agent (UA) : The UA is normally a
program which is used to send and receive
mail. Sometimes, it is called as mail reader. It
accepts variety of commands for composing,
receiving and replying to messages as well as
for manipulation of the mailboxes.
2. Message Transfer Agent (MTA) : MTA is
actually responsible for transfer of mail from
one system to another. To send a mail, a
system must have client MTA and system
MTA. It transfer mail to mailboxes of recipients
if they are connected in the same machine. Itsystem must nave client MIA ana system
MTA. It transfer mail to mailboxes of recipients
if they are connected in the same machine. It
delivers mail to peer MTA if destination
mailbox is in another machine. The delivery
from one MTA to another MTA is done by
Simple Mail Transfer Protocol.
User A User 8
. Mailbox : It is a file on local hard drive to
collect mails. Delivered mails are present in
this file. The user can read it delete it according
to his/her requirement. To use e-mail system
each user must have a mailbox . Access to
mailbox is only to owner of mailbox.4. Spool file : This file contains mails that are to
be sent. User agent appends outgoing mails in
this file using SMTP. MTA extracts pending
mail from spool file for their delivery. E-mail
allows one name, an alias, to represent several
different e-mail addresses. It is known as
mailing list, Whenever user have to sent a
message, system checks recipient’s name
against alias database. If mailing list is present
for defined alias, separate messages, one for
each entry in the list, must be prepared and
handed to MTA. If for defined alias, there is no
such mailing list is present, name itself
becomes naming address and a single
message is delivered to mail transfer entity.
Services provided by E-mail system :
« Composition — The composition refer to
process that creates messages and answers.
For composition any kind of text editor can be
used.Services provided by E-mail system :
Composition — The composition refer to
process that creates messages and answers.
For composition any kind of text editor can be
used.
Transfer —- Transfer means sending procedure
of mail i.e. from the sender to recipient.
Reporting — Reporting refers to confirmation
for delivery of mail. It help user to check
whether their mail is delivered, lost or rejected.
Displaying — It refers to present mail in form
that is understand by the user.
Disposition — This step concern with recipient
that what will recipient do after receiving mail
i.e save mail, delete before reading or delete
after reading.Advantages of email:
1. Convenient and fast communication with
individuals or groups globally.
2. Easy to store and search for past messages.
3. Ability to send and receive attachments such
as documents, images, and videos.
4. Cost-effective compared to traditional mail and
fax.
5. Available 24/7.
Disadvantages of email:
=
. Risk of spam and phishing attacks.
Ny
. Overwhelming amount of emails can lead to
information overload.
3. Can lead to decreased face-to-face
communication and loss of personal touch.
4. Potential for miscommunication due to lack of
tone and body language in written messages.
a
. Technical issues, such as server outages, can
disrupt email service.