0% found this document useful (0 votes)
30 views7 pages

30 Manab Chanda

Uploaded by

manabchanda2000
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views7 pages

30 Manab Chanda

Uploaded by

manabchanda2000
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

Global College of Science & Technology

Affiliated to MAKAUT, Maulana Abul Kalam Azad University of Technology

NH-34, PALPARA MORE, KRISHNANAGAR, DIST. - NADIA, PIN: 741102, WEST BENGAL

Academic Year: 2024-2025

Continuous Assessment-2 (CA2)


Topic – Telnet

Submitted by

Name: Manab Chanda

Roll No: 34501222030

Registration No: 223451010027 (2022-23)

Semester: 5th

Stream: BCA (3rd Year)

Subject: Internet Technology

Subject Code: BCAC501


Acknowledgement

I would like to express my sincere gratitude to Ms. Pragyna Paramita Garai for
her invaluable guidance and support throughout the preparation of this report. Her
expertise and insights have enriched the content and strengthened its quality. I am
deeply appreciative of her encouragement and mentorship, which have been
instrumental in shaping my understanding of Telnet. Thank you, ma’am, for your
unwavering commitment to excellence and dedication to fostering intellectual
growth among your students.

Furthermore, I would like to extend my grateful thanks to my parents because


without their help, this project would not have been successful.

Lastly, I would like to thank my dear friends who have been with me all the time.

1|Page
1. Introduction

Telnet (Teletype Network) is an application layer protocol that provides a


bidirectional interactive text-oriented communication facility using a virtual
terminal connection. Developed in 1969, Telnet was one of the earliest Internet
protocols, allowing remote access to other computers over a TCP/IP network.

2. How Telnet Works

Telnet operates on a client-server model. The client initiates a connection to the


server, typically on port 23. Once connected, the user can input commands as if
they were directly connected to the remote system's command line interface.

Key points:
• Uses TCP for reliable data transmission
• Default port is 23
• Provides a virtual terminal interface

3. Telnet Protocol

The Telnet protocol consists of a series of commands and options that allow the
client and server to negotiate capabilities. These include:

• IAC (Interpret as Command): Indicates that the following byte is a Telnet


command
• DO, DONT, WILL, WONT: Used for option negotiation
• SB, SE: Used for sub negotiation of options

2|Page
Example command structure:
IAC WILL ECHO
IAC DO SUPPRESS-GO-AHEAD

4. Applications and Use Cases

Telnet has been used for various purposes, including:


• Remote login to systems
• Accessing and configuring network devices (routers, switches)
• Troubleshooting network services
• Interacting with Internet services (e.g., SMTP, HTTP) for testing

5. Security Concerns

Telnet's major drawback is its lack of security:


• Data, including passwords, is transmitted in plaintext
• Vulnerable to eavesdropping and man-in-the-middle attacks
• No built-in encryption or strong authentication mechanisms

6. Alternatives to Telnet

Due to security concerns, more secure alternatives have largely replaced Telnet:
• SSH (Secure Shell): Provides encrypted communications and strong
authentication
• HTTPS: For web-based management interfaces
• SCP and SFTP: For secure file transfers

3|Page
7. Current Status and Future of Telnet

While Telnet usage has significantly declined due to security issues, it still exists
in some environments:
• Legacy systems that don't support newer protocols
• Situations where encryption is not required or possible
• Educational purposes to demonstrate basic network principles

However, its use is discouraged in production environments.

4|Page
8. Conclusion

Telnet played a crucial role in the early development of the Internet, providing
remote access capabilities that were revolutionary at the time. While security
concerns have led to its decline, understanding Telnet remains important for
comprehending the evolution of networking protocols and the ongoing
importance of secure communications.

9. References

1. RFC 854 - Telnet Protocol Specification


2. RFC 855 - Telnet Option Specifications
3. Kozierok, C. M. (2005). The TCP/IP Guide. No Starch Press.
4. Kurose, J. F., & Ross, K. W. (2017). Computer Networking: A Top-Down
Approach. Pearson.

5|Page
THANK YOU

6|Page

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy