Telnet Application Protocol

Telnet

Telnet Application Protocol
Fig 1: Telnet Application Protocol


Telnet is the protocol that allows the user to log in to a host located else where on the internet. It is the application protocol that was developed in the year of the 1969 at beginning. On the most computers systems the computer a command that is the role to invokes the Telnet is named "telnet".

Command: "telnet hostname"

Description

Telnet stands for the "teletype network" and When you access remote computer by the Telnet a very great deal of work takes place behind the scenes to set up a connection and to moving of the data to an from a remote host. The main purpose of the telnet is to allow a user to access the remote computers. Users often get the the advantage of the telnet to access a computer they are authorized to log into and for the instance users visiting a site on the internet can use the telnet to return to their regular computers back at their sites of home. Telnet is establishing the Transmission Control Protocol and the port number for this protocol that allows the user to access the remote machine is 23. Telnet is the most easiest way for the accessing of the remote machine. The basic purpose of the TELNET protocol is to provide a text-oriented terminal connection to an interactive network service such as a computer or workstation. This terminal connection is known as a virtual terminal connection because the physical connection to the computer is through a device known as a terminal emulator.

Cons of Telnet

Telnet is not a secure source of accessing the remote machine because of the one reason that makes it an unsecure protocol that is "telnet transfer all it data in the form of the clear text form that is a source of if anyone sniff our network it is very easy to grab out the username and the password.

Positive Alternate Solution of the Telnet

So the positive and the alternate solution of the telnet is the Secure Shell that is mostly known as the SSH this protocol is the very popular protocol for the accessing the remote host and this is the secure and the reason of the security of this protocol is "encrypts both connection and use the digital signature for the identification on the other end". 

The acronym SSH stands for Secure Shell. It is a protocol that allows you to connect to a remote computer securely over a network. This remote computer could be a remote server, a workstation, or even another computer on the network. SSH is commonly used for remote access to a computer. A key difference between SSH and TELNET is that SSH is a client-server protocol and TELNET is a peer-to-peer protocol. This means that the client is connected to the server. TELNET can be thought of as a remote shell or terminal connection. 

SSH stands for Secure Shell. This is the protocol for the secure way to log into a remote machine. It uses the well-known Telnet protocol, but uses public-key cryptography instead of a password to log in. SSH uses the Telnet protocol, but uses public-key cryptography instead of a password to log in. SSH provides an encrypted, secure, and authenticated channel between two hosts.

Post a Comment

0 Comments