SlideShare une entreprise Scribd logo
1  sur  29
TELNET JP
• TELNET is an abbreviation for terminal network.
• It is a standard TCP/IP protocol for virtual terminal
service.
• It is a general purpose client/server application
program.
2
• TELNET enables the establishment of a connection to
a remote system in such a way that the local terminal
appears to be a terminal at the remote system.
• In other words, it allows the user to log on to a remote
computer. After logging on, user can use the services
available on the remote computer and transfer the
results back to the local computer.
3
LOGGINGLOGGING
• To access the system, user logs into the system with
user-id. The system also includes password
checking to prevent an unauthorized user accessing
the resources.
• Logging process can be local logging or remote
logging.
4
• When the user logs into
a local timesharing
system, it is called local
log-in.
• When the user wants to
access an application
program or utility
located on a remote
machine, it is called
remote log-in.
5
LOCAL LOG-IN 6
Figure- 1
• When the user types at the terminal, the keystrokes
are accepted by the terminal driver.
• The terminal driver passes the characters to the
operating system.
• The operating system interprets the combination of
characters and invokes the desired application
program.
7
REMOTE LOG-IN 8
Figure- 1
Figure- 2
• The user sends the keystrokes to the terminal driver,
where the local operating system accepts the
characters but does not interpret them.
• The characters are sent to the TELNET client, which
transforms the characters to a universal character set
called network virtual terminal(NVT) characters and
delivers them to the local TCP/IP protocol stack.
9
• The text in NVT form travel through the internet and
arrive at the TCP/IP stack at the remote machine.
• The characters are delivered to the operating system
and passed to the TELNET server which changes the
characters to the corresponding characters
understandable by the remote computer.
10
• However, the characters cannot be passed directly to the
operating system because the remote operating system is not
designed to receive characters from a TELNET server.
• It is designed to receive characters from a terminal driver.
• A software called a pseudo terminal driver is added which
pretends that the characters are coming from a terminal.
11
CONCEPT OF NVT 12
Figure- 3
NETWORK VIRTUAL TERMINAL
• The client telnet translates characters that come from
local terminal into NVT form and delivers them to the
network.
• The server telnet translates data and commands from
NVT form into the form acceptable by the remote
computer.
13
NVT CHARACTER SET
It uses two sets of characters one for data and other
for control.
14
Figure- 4
EMBEDDING
• Telnet uses only one TCP connection.
• The same connection is used for sending both data and
control characters.
• Telnet accomplishes this by embedding the control
characters in the data stream.
• To distinguish data from control characters, each
sequence of control characters is preceded by a special
control character called interpret as control(IAC).
15
OPTIONS
• Options are extra features available to a user with a more
sophisticated terminal.
• Some common options are as-
16
Code Option Meaning
0 Binary Interpret as 8-bit binary transmission
1 Echo Echo the data received on one side
to the other
5 Status Request the status of telnet
24 Terminal type Set the terminal type
32 Terminal speed Set the terminal speed
34 Line mode Change to line mode
Figure- 6
OPTION NEGOTIATION
• Telnet lets the client and server negotiate options
before or during the use of the service.
• Four control characters are used for this purpose-
17
Meaning
WILL 1. Offering to enable
2. Accepting a request to enable
WONT 1. 1.Rejecting a request to enable
2. 2.Offering to disable
3. 3.Accepting a request to disable
DO 1. 1.Approving an offer to enable
2. 2.Requesting to enable
DONT 1. 1.Dispproving an offer to enable
2. 2.Approving an offer to disable
3. 3.Requesting to disable
These control characters are as-
Figure- 7
18
WILL
Will I enable the option?
DO or DONT
Do (or don’t) enable the option
Offer to enable the option
Figure- 8
19
DO
Do enable the option
I will (won’t) enable the option
WILL or WONT
Request to enable an option
Figure- 9
20
WONT
I won’t use the option any more
DONT
Don’t use it
Offer to disable an option
Figure- 10
21
DONT
Don’t use the option any more
WONT
I won’t
Request to disable an option
Figure- 11
22
Example of option ‘Echo’Example of option ‘Echo’ 23
Do enable the echo option
IACDOECHO1
I will enable the echo option
IAC WILL ECHO 22
Figure- 12
MODE OF OPERATION
Most Telnet implementation operate in one of three
modes-
• Default mode
• Character mode
• Line mode
24
DEFAULT MODE
• This mode is used if no other modes are invoked
through option negotiation
• Echoing is done by the client.
• The user types the character , client echoes the
character but does not send it until a whole line is
completed.
25
CHARACTER MODE
• Each character typed is sent by the client to the
server.
• The server echoes the character back to be
displayed on the client screen.
• Echoing of the character can be displayed if the
transmission time is long.
26
LINE MODE
• It is proposed to compensate for the deficiencies of
default mode and character mode.
• In this line echoing is done by the client.
• The client then sends the whole line to the server.
27
28
Places to Telnet
The text based internet can be exciting, informative, and
fun. Using telnet, you can access a variety of these resources
on the internet. Below you'll find lists of a few places to get
you started.
Miscellaneous fun places
•rainmaker.wunderground.com :: weather via telnet!
•india.colorado.edu 13 (Get the time) :: get the time
•telehack.com 23 :: Telehack
•telehack.com :: Telehack - web
•towel.blinkenlights.nl 23 :: Star Wars asciimation
•towel.blinkenlights.nl 666 :: The Bofh Excuse Server
29

Contenu connexe

Tendances

Computer Network - Telnet and Gopher
Computer Network -  Telnet and GopherComputer Network -  Telnet and Gopher
Computer Network - Telnet and GopherManoj Kumar
 
IP addressing seminar ppt
IP addressing seminar pptIP addressing seminar ppt
IP addressing seminar pptSmriti Rastogi
 
Web and http computer network
Web and http computer networkWeb and http computer network
Web and http computer networkAnil Pokhrel
 
File Transfer Protocol
File Transfer ProtocolFile Transfer Protocol
File Transfer Protocolguest029bcd
 
Address resolution protocol (ARP)
Address resolution protocol (ARP)Address resolution protocol (ARP)
Address resolution protocol (ARP)NetProtocol Xpert
 
Computer Network - Network Layer
Computer Network - Network LayerComputer Network - Network Layer
Computer Network - Network LayerManoj Kumar
 
Presentation on Transmission Media
Presentation on Transmission MediaPresentation on Transmission Media
Presentation on Transmission MediaSyed Ahmed Zaki
 
TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network pptextraganesh
 
protocols and types of protocols.
protocols and types of protocols.protocols and types of protocols.
protocols and types of protocols.Šhæÿæñ Æhmęd
 
Simple mail transfer protocol (smtp)
Simple mail transfer protocol (smtp) Simple mail transfer protocol (smtp)
Simple mail transfer protocol (smtp) RochakSrivastava3
 
difference between hub, bridge, switch and router
difference between hub, bridge, switch and routerdifference between hub, bridge, switch and router
difference between hub, bridge, switch and routerAkmal Cikmat
 

Tendances (20)

Computer Network - Telnet and Gopher
Computer Network -  Telnet and GopherComputer Network -  Telnet and Gopher
Computer Network - Telnet and Gopher
 
Dhcp
DhcpDhcp
Dhcp
 
Domain name system
Domain name systemDomain name system
Domain name system
 
Telnet presentation
Telnet presentationTelnet presentation
Telnet presentation
 
IP addressing seminar ppt
IP addressing seminar pptIP addressing seminar ppt
IP addressing seminar ppt
 
Transport layer
Transport layer Transport layer
Transport layer
 
Web and http computer network
Web and http computer networkWeb and http computer network
Web and http computer network
 
File Transfer Protocol
File Transfer ProtocolFile Transfer Protocol
File Transfer Protocol
 
Address resolution protocol (ARP)
Address resolution protocol (ARP)Address resolution protocol (ARP)
Address resolution protocol (ARP)
 
Computer Network - Network Layer
Computer Network - Network LayerComputer Network - Network Layer
Computer Network - Network Layer
 
Presentation on Transmission Media
Presentation on Transmission MediaPresentation on Transmission Media
Presentation on Transmission Media
 
Telnet
TelnetTelnet
Telnet
 
Switching
SwitchingSwitching
Switching
 
TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network ppt
 
Transport Layer
Transport LayerTransport Layer
Transport Layer
 
Internet address
Internet addressInternet address
Internet address
 
protocols and types of protocols.
protocols and types of protocols.protocols and types of protocols.
protocols and types of protocols.
 
Simple mail transfer protocol (smtp)
Simple mail transfer protocol (smtp) Simple mail transfer protocol (smtp)
Simple mail transfer protocol (smtp)
 
difference between hub, bridge, switch and router
difference between hub, bridge, switch and routerdifference between hub, bridge, switch and router
difference between hub, bridge, switch and router
 
TCP/ IP
TCP/ IP TCP/ IP
TCP/ IP
 

En vedette (20)

Telnet
TelnetTelnet
Telnet
 
Telnet
TelnetTelnet
Telnet
 
TelNet
TelNetTelNet
TelNet
 
Telnet
TelnetTelnet
Telnet
 
Telnet
TelnetTelnet
Telnet
 
Telnet & SSH Configuration
Telnet & SSH ConfigurationTelnet & SSH Configuration
Telnet & SSH Configuration
 
FTP - File Transfer Protocol
FTP - File Transfer ProtocolFTP - File Transfer Protocol
FTP - File Transfer Protocol
 
Protocolos; SNMP, TELNET, SSH
Protocolos; SNMP, TELNET, SSHProtocolos; SNMP, TELNET, SSH
Protocolos; SNMP, TELNET, SSH
 
Ftp server
Ftp serverFtp server
Ftp server
 
Ftp
FtpFtp
Ftp
 
Email - Electronic Mail
Email - Electronic MailEmail - Electronic Mail
Email - Electronic Mail
 
DNS - Domain Name System
DNS - Domain Name SystemDNS - Domain Name System
DNS - Domain Name System
 
Dns ppt
Dns pptDns ppt
Dns ppt
 
The Internet Presentation
The Internet Presentation The Internet Presentation
The Internet Presentation
 
รายงาน Tcp
รายงาน Tcpรายงาน Tcp
รายงาน Tcp
 
Ftp
FtpFtp
Ftp
 
Server side JavaScript: going all the way
Server side JavaScript: going all the wayServer side JavaScript: going all the way
Server side JavaScript: going all the way
 
TELNET and SSH by MUSTAFA SAKHAI
TELNET and SSH by MUSTAFA SAKHAITELNET and SSH by MUSTAFA SAKHAI
TELNET and SSH by MUSTAFA SAKHAI
 
Chat server nitish nagar
Chat server nitish nagarChat server nitish nagar
Chat server nitish nagar
 
Report on telnet
Report on telnetReport on telnet
Report on telnet
 

Similaire à Telnet

Remote login.89 to 90
Remote login.89 to 90Remote login.89 to 90
Remote login.89 to 90myrajendra
 
Ch2 ccna exploration 3 lan switching and wireless
Ch2 ccna exploration 3 lan switching and wirelessCh2 ccna exploration 3 lan switching and wireless
Ch2 ccna exploration 3 lan switching and wirelesskratos2424
 
Denovo SIP VoIP Termination SBC Session Boarder Controler @ denofolab.com
Denovo SIP VoIP Termination SBC Session Boarder Controler @ denofolab.comDenovo SIP VoIP Termination SBC Session Boarder Controler @ denofolab.com
Denovo SIP VoIP Termination SBC Session Boarder Controler @ denofolab.comAnne Kwong
 
Internet technology unit 5
Internet technology unit 5Internet technology unit 5
Internet technology unit 5WE-IT TUTORIALS
 
Protolcols in communication system
Protolcols in communication systemProtolcols in communication system
Protolcols in communication systemArchana Dwivedi
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 9
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 9CCNA (R & S) Module 01 - Introduction to Networks - Chapter 9
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 9Waqas Ahmed Nawaz
 
Unit iii - mobile ip and wireless access protocol
Unit iii - mobile ip and wireless access protocolUnit iii - mobile ip and wireless access protocol
Unit iii - mobile ip and wireless access protocolRamannagariKeerthana
 
Computer networks transport layer
Computer networks  transport layerComputer networks  transport layer
Computer networks transport layerjamunaashok
 
Unit 4-Transport Layer Protocols-3.pptx
Unit 4-Transport Layer Protocols-3.pptxUnit 4-Transport Layer Protocols-3.pptx
Unit 4-Transport Layer Protocols-3.pptxDESTROYER39
 
Unit 4-Transport Layer Protocols.pptx
Unit 4-Transport Layer Protocols.pptxUnit 4-Transport Layer Protocols.pptx
Unit 4-Transport Layer Protocols.pptxsarosh32
 
Networking essentials lect3
Networking essentials lect3Networking essentials lect3
Networking essentials lect3Roman Brovko
 
Internetworking
InternetworkingInternetworking
InternetworkingDhanya LK
 
Byte Ordering - Unit 2.pptx
Byte Ordering - Unit 2.pptxByte Ordering - Unit 2.pptx
Byte Ordering - Unit 2.pptxRockyBhai46825
 
Telnet and FTP.ppt
Telnet and FTP.pptTelnet and FTP.ppt
Telnet and FTP.pptssuser1774d3
 
Net essentials6e ch7
Net essentials6e ch7Net essentials6e ch7
Net essentials6e ch7APSU
 

Similaire à Telnet (20)

Remote login.89 to 90
Remote login.89 to 90Remote login.89 to 90
Remote login.89 to 90
 
Ch2 ccna exploration 3 lan switching and wireless
Ch2 ccna exploration 3 lan switching and wirelessCh2 ccna exploration 3 lan switching and wireless
Ch2 ccna exploration 3 lan switching and wireless
 
Denovo SIP VoIP Termination SBC Session Boarder Controler @ denofolab.com
Denovo SIP VoIP Termination SBC Session Boarder Controler @ denofolab.comDenovo SIP VoIP Termination SBC Session Boarder Controler @ denofolab.com
Denovo SIP VoIP Termination SBC Session Boarder Controler @ denofolab.com
 
Internet technology unit 5
Internet technology unit 5Internet technology unit 5
Internet technology unit 5
 
Remote login
Remote loginRemote login
Remote login
 
Protolcols in communication system
Protolcols in communication systemProtolcols in communication system
Protolcols in communication system
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 9
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 9CCNA (R & S) Module 01 - Introduction to Networks - Chapter 9
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 9
 
Unit iii - mobile ip and wireless access protocol
Unit iii - mobile ip and wireless access protocolUnit iii - mobile ip and wireless access protocol
Unit iii - mobile ip and wireless access protocol
 
Computer networks transport layer
Computer networks  transport layerComputer networks  transport layer
Computer networks transport layer
 
Unit 4-Transport Layer Protocols-3.pptx
Unit 4-Transport Layer Protocols-3.pptxUnit 4-Transport Layer Protocols-3.pptx
Unit 4-Transport Layer Protocols-3.pptx
 
Unit 4-Transport Layer Protocols.pptx
Unit 4-Transport Layer Protocols.pptxUnit 4-Transport Layer Protocols.pptx
Unit 4-Transport Layer Protocols.pptx
 
Networking essentials lect3
Networking essentials lect3Networking essentials lect3
Networking essentials lect3
 
Chap 18 telnet
Chap 18 telnetChap 18 telnet
Chap 18 telnet
 
Internetworking
InternetworkingInternetworking
Internetworking
 
Transport layer protocol
Transport layer protocolTransport layer protocol
Transport layer protocol
 
Byte Ordering - Unit 2.pptx
Byte Ordering - Unit 2.pptxByte Ordering - Unit 2.pptx
Byte Ordering - Unit 2.pptx
 
TCP/IP(networking)
TCP/IP(networking)TCP/IP(networking)
TCP/IP(networking)
 
Out of band signaling
Out of band signalingOut of band signaling
Out of band signaling
 
Telnet and FTP.ppt
Telnet and FTP.pptTelnet and FTP.ppt
Telnet and FTP.ppt
 
Net essentials6e ch7
Net essentials6e ch7Net essentials6e ch7
Net essentials6e ch7
 

Plus de Jishnu Pradeep

Paper Presentation - "Your Botnet is my Botnet : Analysis of a Botnet Takeover"
Paper Presentation - "Your Botnet is my Botnet : Analysis of a Botnet Takeover"Paper Presentation - "Your Botnet is my Botnet : Analysis of a Botnet Takeover"
Paper Presentation - "Your Botnet is my Botnet : Analysis of a Botnet Takeover"Jishnu Pradeep
 
Cyber Security of Power grids
Cyber Security of Power grids Cyber Security of Power grids
Cyber Security of Power grids Jishnu Pradeep
 
Secure Data Sharing in Cloud (SDSC)
Secure Data Sharing in Cloud (SDSC)Secure Data Sharing in Cloud (SDSC)
Secure Data Sharing in Cloud (SDSC)Jishnu Pradeep
 
Job Automation using Linux
Job Automation using LinuxJob Automation using Linux
Job Automation using LinuxJishnu Pradeep
 
Augmented Reality & Applications
Augmented Reality & ApplicationsAugmented Reality & Applications
Augmented Reality & ApplicationsJishnu Pradeep
 
Motherboard and its components
Motherboard and its componentsMotherboard and its components
Motherboard and its componentsJishnu Pradeep
 

Plus de Jishnu Pradeep (6)

Paper Presentation - "Your Botnet is my Botnet : Analysis of a Botnet Takeover"
Paper Presentation - "Your Botnet is my Botnet : Analysis of a Botnet Takeover"Paper Presentation - "Your Botnet is my Botnet : Analysis of a Botnet Takeover"
Paper Presentation - "Your Botnet is my Botnet : Analysis of a Botnet Takeover"
 
Cyber Security of Power grids
Cyber Security of Power grids Cyber Security of Power grids
Cyber Security of Power grids
 
Secure Data Sharing in Cloud (SDSC)
Secure Data Sharing in Cloud (SDSC)Secure Data Sharing in Cloud (SDSC)
Secure Data Sharing in Cloud (SDSC)
 
Job Automation using Linux
Job Automation using LinuxJob Automation using Linux
Job Automation using Linux
 
Augmented Reality & Applications
Augmented Reality & ApplicationsAugmented Reality & Applications
Augmented Reality & Applications
 
Motherboard and its components
Motherboard and its componentsMotherboard and its components
Motherboard and its components
 

Dernier

Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 

Dernier (20)

Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 

Telnet

  • 2. • TELNET is an abbreviation for terminal network. • It is a standard TCP/IP protocol for virtual terminal service. • It is a general purpose client/server application program. 2
  • 3. • TELNET enables the establishment of a connection to a remote system in such a way that the local terminal appears to be a terminal at the remote system. • In other words, it allows the user to log on to a remote computer. After logging on, user can use the services available on the remote computer and transfer the results back to the local computer. 3
  • 4. LOGGINGLOGGING • To access the system, user logs into the system with user-id. The system also includes password checking to prevent an unauthorized user accessing the resources. • Logging process can be local logging or remote logging. 4
  • 5. • When the user logs into a local timesharing system, it is called local log-in. • When the user wants to access an application program or utility located on a remote machine, it is called remote log-in. 5
  • 7. • When the user types at the terminal, the keystrokes are accepted by the terminal driver. • The terminal driver passes the characters to the operating system. • The operating system interprets the combination of characters and invokes the desired application program. 7
  • 9. • The user sends the keystrokes to the terminal driver, where the local operating system accepts the characters but does not interpret them. • The characters are sent to the TELNET client, which transforms the characters to a universal character set called network virtual terminal(NVT) characters and delivers them to the local TCP/IP protocol stack. 9
  • 10. • The text in NVT form travel through the internet and arrive at the TCP/IP stack at the remote machine. • The characters are delivered to the operating system and passed to the TELNET server which changes the characters to the corresponding characters understandable by the remote computer. 10
  • 11. • However, the characters cannot be passed directly to the operating system because the remote operating system is not designed to receive characters from a TELNET server. • It is designed to receive characters from a terminal driver. • A software called a pseudo terminal driver is added which pretends that the characters are coming from a terminal. 11
  • 12. CONCEPT OF NVT 12 Figure- 3 NETWORK VIRTUAL TERMINAL
  • 13. • The client telnet translates characters that come from local terminal into NVT form and delivers them to the network. • The server telnet translates data and commands from NVT form into the form acceptable by the remote computer. 13
  • 14. NVT CHARACTER SET It uses two sets of characters one for data and other for control. 14 Figure- 4
  • 15. EMBEDDING • Telnet uses only one TCP connection. • The same connection is used for sending both data and control characters. • Telnet accomplishes this by embedding the control characters in the data stream. • To distinguish data from control characters, each sequence of control characters is preceded by a special control character called interpret as control(IAC). 15
  • 16. OPTIONS • Options are extra features available to a user with a more sophisticated terminal. • Some common options are as- 16 Code Option Meaning 0 Binary Interpret as 8-bit binary transmission 1 Echo Echo the data received on one side to the other 5 Status Request the status of telnet 24 Terminal type Set the terminal type 32 Terminal speed Set the terminal speed 34 Line mode Change to line mode Figure- 6
  • 17. OPTION NEGOTIATION • Telnet lets the client and server negotiate options before or during the use of the service. • Four control characters are used for this purpose- 17
  • 18. Meaning WILL 1. Offering to enable 2. Accepting a request to enable WONT 1. 1.Rejecting a request to enable 2. 2.Offering to disable 3. 3.Accepting a request to disable DO 1. 1.Approving an offer to enable 2. 2.Requesting to enable DONT 1. 1.Dispproving an offer to enable 2. 2.Approving an offer to disable 3. 3.Requesting to disable These control characters are as- Figure- 7 18
  • 19. WILL Will I enable the option? DO or DONT Do (or don’t) enable the option Offer to enable the option Figure- 8 19
  • 20. DO Do enable the option I will (won’t) enable the option WILL or WONT Request to enable an option Figure- 9 20
  • 21. WONT I won’t use the option any more DONT Don’t use it Offer to disable an option Figure- 10 21
  • 22. DONT Don’t use the option any more WONT I won’t Request to disable an option Figure- 11 22
  • 23. Example of option ‘Echo’Example of option ‘Echo’ 23 Do enable the echo option IACDOECHO1 I will enable the echo option IAC WILL ECHO 22 Figure- 12
  • 24. MODE OF OPERATION Most Telnet implementation operate in one of three modes- • Default mode • Character mode • Line mode 24
  • 25. DEFAULT MODE • This mode is used if no other modes are invoked through option negotiation • Echoing is done by the client. • The user types the character , client echoes the character but does not send it until a whole line is completed. 25
  • 26. CHARACTER MODE • Each character typed is sent by the client to the server. • The server echoes the character back to be displayed on the client screen. • Echoing of the character can be displayed if the transmission time is long. 26
  • 27. LINE MODE • It is proposed to compensate for the deficiencies of default mode and character mode. • In this line echoing is done by the client. • The client then sends the whole line to the server. 27
  • 28. 28
  • 29. Places to Telnet The text based internet can be exciting, informative, and fun. Using telnet, you can access a variety of these resources on the internet. Below you'll find lists of a few places to get you started. Miscellaneous fun places •rainmaker.wunderground.com :: weather via telnet! •india.colorado.edu 13 (Get the time) :: get the time •telehack.com 23 :: Telehack •telehack.com :: Telehack - web •towel.blinkenlights.nl 23 :: Star Wars asciimation •towel.blinkenlights.nl 666 :: The Bofh Excuse Server 29

Notes de l'éditeur

  1. The text based internet. A terminal emulation that enables a user to connect to a remote host or device using a telnet client, usually over port23.
  2. Telnet is an application protocol used on the Internet or local area networks to provide a bidirectional interactive text-oriented communication facility using a virtualterminal connection. User data is interspersed in-band with Telnet control information in an 8-bit byte oriented data connection over the Transmission Control Protocol(TCP).
  3. Intrepret as command
  4. Has more advantages over other two modes. Here also echoing is done by client. Whole line