Telnet & File Transfer Protocol’s Working Mechanism Essay

Exclusively available on Available only on IvyPanda® Made by Human No AI

Provide a description of how Telnet and FTP work. What is common between these protocols?

How Telnet Works

Telnet is a software-based mode of communication that is used to connect a client and a remote host (server). The software is normally installed on the client computer and when the user wants to connect to the server, he sends a request via the client software to the server. The server in turn asks for authentication information from the client and when verified, a connection is established. This enables the client to access the host’s resources virtually. The client acts as a virtual office.

Authentication is basically by use of username and password which are set when a user account is created on the client. The legitimate user in this case can access all files on the host and work on them as if he was physically present. Limited access can however be granted to visitors who can log on to the system without the basic authentication (Forouzan 2000).

How FTP works

In FTP, users can access information on the server through the internet or Intranet based communication channel. FTP is mainly used where files need to be transferred to and from a central storage location. The users on their client computers access a server which is a computer on which data, information, and control programs are stored by sending requests as per their requirements to the server.

When a connect request is received by the host, the client is asked to provide a username and password to verify their identity and when verified as legitimate users, two connections are established; a control channel through which control signals are relayed and a data channel used for data transfer (Forouzan 2000). The control channel stays open throughout the session while the data channel opens and closes as the need arises. The level of access is controlled by the assignment of user rights by the system administrator.

Comparison between Telnet & FTP

Both Telnet and FTP enable communication between two computers in a client-server model and they are software-based. Both lack built-in security measures and are therefore vulnerable to attacks but newer versions have been developed to incorporate security measures such as FTPS and SFTP and SSH in place of Telnet.. Both FTP and Telnet employ the use of command line, FTP has features that enable its use with a dedicated application and most file browsers.

FTP is mainly used in file transfers between two communicating computers while Telnet is used to issue commands to a remote host. Telnet allows remote access to a user account on the server, while FTP allows general file access.

Provide a description of how Ethereal can be used to study traffic and what can be achieved with Ethereal?

Ethereal has special features that allow it to view packets on the network. Its ability to read files capture by other filters makes it very useful when it comes to analyzing the kind of traffic flowing in a network. In addition, its filtering capability finds application in keeping off spam from the network; this is made even easier by the fact that its source code is freely available hence a user can customize it to meet his particular requirements.

The use of ethereal as a sniffing tool on a network can minimize cyberspace intrusion attempts as most of the malicious or unwanted packets are kept off the network. Ethereal is compatible with Windows, Linux, and Unix operating systems and thus it can be widely used, (Ethereal: the world’s most popular network protocol analyzer 2006).

References

Ethereal: the world’s most popular network protocol analyzer 2006. Web.

Forouzan, B. 2000. TCP/IP: Protocol Suite. 1st Ed. Tata McGraw-Hill Publishing Company, New Delhi India.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2021, April 2). Telnet & File Transfer Protocol's Working Mechanism. https://ivypanda.com/essays/telnet-amp-file-transfer-protocols-working-mechanism/

Work Cited

"Telnet & File Transfer Protocol's Working Mechanism." IvyPanda, 2 Apr. 2021, ivypanda.com/essays/telnet-amp-file-transfer-protocols-working-mechanism/.

References

IvyPanda. (2021) 'Telnet & File Transfer Protocol's Working Mechanism'. 2 April.

References

IvyPanda. 2021. "Telnet & File Transfer Protocol's Working Mechanism." April 2, 2021. https://ivypanda.com/essays/telnet-amp-file-transfer-protocols-working-mechanism/.

1. IvyPanda. "Telnet & File Transfer Protocol's Working Mechanism." April 2, 2021. https://ivypanda.com/essays/telnet-amp-file-transfer-protocols-working-mechanism/.


Bibliography


IvyPanda. "Telnet & File Transfer Protocol's Working Mechanism." April 2, 2021. https://ivypanda.com/essays/telnet-amp-file-transfer-protocols-working-mechanism/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
Privacy Settings

IvyPanda uses cookies and similar technologies to enhance your experience, enabling functionalities such as:

  • Basic site functions
  • Ensuring secure, safe transactions
  • Secure account login
  • Remembering account, browser, and regional preferences
  • Remembering privacy and security settings
  • Analyzing site traffic and usage
  • Personalized search, content, and recommendations
  • Displaying relevant, targeted ads on and off IvyPanda

Please refer to IvyPanda's Cookies Policy and Privacy Policy for detailed information.

Required Cookies & Technologies
Always active

Certain technologies we use are essential for critical functions such as security and site integrity, account authentication, security and privacy preferences, internal site usage and maintenance data, and ensuring the site operates correctly for browsing and transactions.

Site Customization

Cookies and similar technologies are used to enhance your experience by:

  • Remembering general and regional preferences
  • Personalizing content, search, recommendations, and offers

Some functions, such as personalized recommendations, account preferences, or localization, may not work correctly without these technologies. For more details, please refer to IvyPanda's Cookies Policy.

Personalized Advertising

To enable personalized advertising (such as interest-based ads), we may share your data with our marketing and advertising partners using cookies and other technologies. These partners may have their own information collected about you. Turning off the personalized advertising setting won't stop you from seeing IvyPanda ads, but it may make the ads you see less relevant or more repetitive.

Personalized advertising may be considered a "sale" or "sharing" of the information under California and other state privacy laws, and you may have the right to opt out. Turning off personalized advertising allows you to exercise your right to opt out. Learn more in IvyPanda's Cookies Policy and Privacy Policy.

1 / 1