Home > Free Essays > Tech & Engineering > Internet > Telnet & File Transfer Protocol’s Working Mechanism
2 min
Cite This

Telnet & File Transfer Protocol’s Working Mechanism Essay

StarStarStarStarStar

Provide a description of how Telnet and FTP work. What is common between these protocols?

How Telnet Works

Telnet is a software-based mode of communication that is used to connect a client and a remote host (server). The software is normally installed on the client computer and when the user wants to connect to the server, he sends a request via the client software to the server. The server in turn asks for authentication information from the client and when verified, a connection is established. This enables the client to access the host’s resources virtually. The client acts as a virtual office.

Authentication is basically by use of username and password which are set when a user account is created on the client. The legitimate user in this case can access all files on the host and work on them as if he was physically present. Limited access can however be granted to visitors who can log on to the system without the basic authentication (Forouzan 2000).

How FTP works

In FTP, users can access information on the server through the internet or Intranet based communication channel. FTP is mainly used where files need to be transferred to and from a central storage location. The users on their client computers access a server which is a computer on which data, information, and control programs are stored by sending requests as per their requirements to the server.

When a connect request is received by the host, the client is asked to provide a username and password to verify their identity and when verified as legitimate users, two connections are established; a control channel through which control signals are relayed and a data channel used for data transfer (Forouzan 2000). The control channel stays open throughout the session while the data channel opens and closes as the need arises. The level of access is controlled by the assignment of user rights by the system administrator.

Comparison between Telnet & FTP

Both Telnet and FTP enable communication between two computers in a client-server model and they are software-based. Both lack built-in security measures and are therefore vulnerable to attacks but newer versions have been developed to incorporate security measures such as FTPS and SFTP and SSH in place of Telnet.. Both FTP and Telnet employ the use of command line, FTP has features that enable its use with a dedicated application and most file browsers.

FTP is mainly used in file transfers between two communicating computers while Telnet is used to issue commands to a remote host. Telnet allows remote access to a user account on the server, while FTP allows general file access.

Provide a description of how Ethereal can be used to study traffic and what can be achieved with Ethereal?

Ethereal has special features that allow it to view packets on the network. Its ability to read files capture by other filters makes it very useful when it comes to analyzing the kind of traffic flowing in a network. In addition, its filtering capability finds application in keeping off spam from the network; this is made even easier by the fact that its source code is freely available hence a user can customize it to meet his particular requirements.

The use of ethereal as a sniffing tool on a network can minimize cyberspace intrusion attempts as most of the malicious or unwanted packets are kept off the network. Ethereal is compatible with Windows, Linux, and Unix operating systems and thus it can be widely used, (Ethereal: the world’s most popular network protocol analyzer 2006).

References

Ethereal: the world’s most popular network protocol analyzer 2006. Web.

Forouzan, B. 2000. TCP/IP: Protocol Suite. 1st Ed. Tata McGraw-Hill Publishing Company, New Delhi India.

This essay on Telnet & File Transfer Protocol’s Working Mechanism was written and submitted by your fellow student. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly.
Removal Request
If you are the copyright owner of this paper and no longer wish to have your work published on IvyPanda.
Request the removal

Need a custom Essay sample written from scratch by
professional specifically for you?

Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar

certified writers online

Cite This paper

Select a referencing style:

Reference

IvyPanda. (2021, April 2). Telnet & File Transfer Protocol's Working Mechanism. Retrieved from https://ivypanda.com/essays/telnet-amp-file-transfer-protocols-working-mechanism/

Work Cited

"Telnet & File Transfer Protocol's Working Mechanism." IvyPanda, 2 Apr. 2021, ivypanda.com/essays/telnet-amp-file-transfer-protocols-working-mechanism/.

1. IvyPanda. "Telnet & File Transfer Protocol's Working Mechanism." April 2, 2021. https://ivypanda.com/essays/telnet-amp-file-transfer-protocols-working-mechanism/.


Bibliography


IvyPanda. "Telnet & File Transfer Protocol's Working Mechanism." April 2, 2021. https://ivypanda.com/essays/telnet-amp-file-transfer-protocols-working-mechanism/.

References

IvyPanda. 2021. "Telnet & File Transfer Protocol's Working Mechanism." April 2, 2021. https://ivypanda.com/essays/telnet-amp-file-transfer-protocols-working-mechanism/.

References

IvyPanda. (2021) 'Telnet & File Transfer Protocol's Working Mechanism'. 2 April.

More related papers
Psst... Stuck with your
assignment? 😱
Hellen
Online
Psst... Stuck with your assignment? 😱
Do you need an essay to be done?
What type of assignment πŸ“ do you need?
How many pages (words) do you need? Let's see if we can help you!