Top Articles:

What is Telnet ? - How telnet works ?

Telnet is an internet protocol which helps in bidirectional connectivity over the internet. Telnet is defined as a client server protocol which helps in reliable connection oriented transport of data. Telnet is a synonymous term given to client softwares.


How telnet works

Telnet is a TCP/IP network protocol which is helpful in assessing distant computer terminals. Telnet allows the administrator of another computer to access the computer of any other computer residing on network. The HTTP and FTP protocols are often ready to lend a hand to ask or send request to access particular files on the network. However both of these protocols do not provide any help to actually log in to the remote PC. It is however possible to log in to access any remote Pc and you can utilize the various applications on which you have been provided an authorize access. Telnet is a useful source of using a remote PC by the program developers or the network administrators who need to use the host PC for virus scanning and related applications. It is telnet which connects your PC to the network. When a person enters a command with using a telnet program he/she has to enter a specific username and password, if the username is correct a person can remotely administer the web servers.

Telnet uses in LAN

Telnet can also guide us to use it as a LAN tool to help allow remote access to network. Connect the Ethernet or LAN cable to the instrument. Then type the IP address into the web browser, then click on advanced information and locate the SCPI port. Then recheck your connection using a DOS window, type IP and the PING address of the product. Run Telnet command and at the command bar type the IP address and the port number. Then enter the command for the product. Afterwards shut the connection and egress Telnet. Telnet is also popularly used in enterprise networks to access host PCs. It can be used to administrate network. It is still used in mobile network communications and industrial control units. It used in internet games like internet chess club and internet go server. Furthermore it is also used in entrenched systems. Telnet also runs over the secure networks. It is also helpful in file sharing such as session transfer, sharing and swap.

Telnet Security

In 1969 when telnet was initially introduced the use of PC and the internet was not common. Hence the security risks aware limited. However, now the demand for internet and increased bandwidth has led to security threats. Therefore the use of telnet to access remote computers is limited and subject to security constraints. The telnet offers weak security. Data is not encrypted naturally when it is sent over the network. There are security tools to encrypt and decrypt the data in order to make it safe. For this reason password and user Id is recommended. However if any user has access to network router and gateways and the system is based on the telnet protocol he can capture the data packets containing any information and related to anyone. Afterwards he/she can exploit that information. The telnet is commonly used to allow communication between two systems specifically allocated to communicate hence there is no loss of data from it. However what if one wants to use the telnet for LAN network. In that case he has to bear the risk of data loss. Hence with the passage of time the use of telnet was replaced greatly by other network protocols such as secure shell protocol and, transport layer security.

Related Articles
- How to use telnet

Useful & Related Links

Interested in Advertising your products or website with us? Click Why Advertising with us ?

Other Improtant topics

Computer Network Architechture :: Data recovery :: What is Data Mining & techniques :: Security issues of Computer :: Frame Relay :: How to create wireless groups :: How to design security policy for network :: How to Troubleshoot LAN :: How to Troubleshoot WLAN :: Infrared Network :: Introduction to Active Directory :: Network Management Software :: Network ports List :: Network Security Software :: Networking FAQ :: Online Security Threat :: Satellite Communication :: Submarine Communication Cable :: Telecommunication Networks :: WAN Technology :: What is Cryptography :: What is Optical Router :: Working Of Telnet :: Linux Server Adminstatrion :: Wireless Bridges set up techniques :: Digital Communication :: How to Configure Linksys wireless bridge :: How to setup wireless repeater :: Distributed Computing :: Hight Performance Computing :: Parallel computing :: Quantum Computing :: Super Computing :: Cloud Computing :: How to configure print server :: How video conferencing works :: Setting up TCP/IP network :: Recover lost hard drive data :: How to solve network performance problems :: 3GPP2 Multimedia Domain Architecture :: Network management model and architechture :: What is protocol analysis & Analyzer :: What is network address translator :: Internet network architecture :: Types of information technology :: What is DSL technology :: Dsl concept :: Dsl vs Cable internet :: Network simulator :: Next generation networks :: What is Switched mesh :: What is :: How to change mac address :: How to flush dns :: EV-DO Rev. B Technology? :: What is network protocol :: What is ASIC :: Blu ray Technology :: Field Program Gate Array (FPGA) :: Computer networking with ethernet hub :: Intelligent networks :: Adsl problems and oppertunities :: Dsl components :: What is hub :: What is networking switch :: Hubs Vs Switches :: Frame relay networks

Browse All Categories

Web Statistics