TELNET
Presented By:-Mr. Yohanis Eshetu
M.Tech 1year ECE, DCCN
Punjabi University, Patiala
10/25/22
What is Telnet?
Telnet is a network protocol used to virtually access a
computer and to provide a two-way, collaborative and
text-based communication channel between two
machines.
10/25/22
1
Cont.
It follows a user command Transmission Control
Protocol/Internet Protocol (TCP/IP) networking protocol
for creating remote sessions. On the web, Hypertext
Transfer Protocol (HTTP) and File Transfer Protocol
(FTP) simply enable users to request specific files from
remote computers, while, through Telnet, users can log
on as a regular user with the privileges they are granted
to the specific applications and data on that computer.
10/25/22 23
Cont.
Anabstract example of the syntax for a Telnet command
request is as follows:
telnet the.libraryat.whatis.edu
10/25/22
3
Cont.
The result of this request would be an invitation to log
on with a user ID, and then the program would prompt
the user for a password. If accepted, the user is granted
access to the remote host.
Telnet is most likely to be used by program developers
and anyone who has a need to use specific applications
or data located at a remote machine.
10/25/22 4
Cont.
10/25/22
5
How Telnet works
Telnet is a type of client-server protocol that can be used to open
a command line on a remote computer, typically a server. Users
can utilize this tool to ping a port and find out whether it is open.
Telnet works with what is called a virtual terminal connection
emulator, or an abstract instance of a connection to a computer,
using standard protocols to act like a physical terminal connected
to a machine. FTP may also be used along with Telnet for users
working to send data files.
10/25/22
6
Cont.
10/25/22 7
Cont.
10/25/22
8
Cont.
Users connect remotely to a machine using Telnet,
sometimes referred to as Telnet ting into the system. They
are prompted to enter their username and password
combination to access the remote computer, which enables
the running of command lines as if logged in to the
computer in person. Despite the physical location of users,
their IP address will match the computer logged in to
rather than the one physically used to connect.
10/25/22
9
Uses of Telnet
Telnet can be used for a variety of activities on a server,
including editing files, running various programs and
checking email.
Some servers enable remote connections using Telnet to
access public data to play simple games or look up weather
reports. Many of these features exist for nostalgic fun or
because they still have compatibility with older systems that
need access to specific data.
10/25/22
10
Cont.
Users are also able to connect to any software that utilizes
text-based, unencrypted protocols via Telnet, from web
servers to ports. Users can open a command prompt on the
remote machine, type the word telnet and the remote
machine's name or IP address, and the telnet connection
will ping the port to see if it is open or not. An open port
will show a blank screen, while an error message that says
the port is connecting means that it is closed.
10/25/22 11
Security
Telnet is not a secure protocol and is unencrypted. By
monitoring a user's connection, anyone can access a
person's username, password and other private
information that is typed over the Telnet session in
plaintext. With this information, access can be gained to
the user's device.
10/25/22
12
Thank you
10/25/22