Preview

Distinguish Between Ftp and Telnet Protocols

Powerful Essays
Open Document
Open Document
1343 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Distinguish Between Ftp and Telnet Protocols
1) Distinguish between the FTP and TELNET protocols.
File Transfer Protocol (FTP) is used to transfer text files, programs, spreadsheets, and databases across the Internet.
TELNET is a terminal emulation protocol used on TCP/IP-based networks. It allows users to run programs and review data from a remote terminal or computer. TELNET is an inherent part of the TCP/IP communications protocol. While both protocols deal with data transfer, FTP is useful for perusing a file of data as if the user were actually at the remote site. 2) What purpose do protocols serve?
Protocols serve network functions in several ways:
First, they facilitate the physical connection between the network devices. Through protocols, devices are able to identify themselves to other devices as legitimate network entities and initiate (or terminate) a communication session.
Second, protocols synchronize the transfer of data between physical devices. This involves defining the rules for initiating a message, determining the data transfer rate between devices, and acknowledging message receipt.
Third, protocols provide a basis for error checking and measuring network performance. This is done by comparing measured results against expectations. For example, performance measures pertaining to storage access times, data transmission rates and modulation frequencies are critical to control the network’s function. Thus, the identification and correction of errors depend on protocol standards that define acceptable performance.
Fourth, protocols promote compatibility among network devices. To transmit and receive data successfully, the various devices involved in a particular session must conform to a mutually acceptable mode of operation, such as synchronous and duplex, or half duplex. Without protocols to provide such conformity, messages sent between devices would be distorted and garbled.
Finally, protocols promote network designs that are flexible, expandable, and cost-effective. Users

You May Also Find These Documents Helpful

  • Good Essays

    ISSC362 lab 7 jarad krum

    • 696 Words
    • 2 Pages

    The significance of the TCP, 3-Way Handshake for applications that utilize TCP as a transport protocol is to ensure a connection is made before transmitting data such as SSH and HTTP. FTP, Telnet, HTTP, HTTPS, SMTP, POP3, IMAP, SSH use TCP as a transport protocol.…

    • 696 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    NT1430

    • 285 Words
    • 1 Page

    i. SCP stands for Secure Copy Protocol, and FTP is an acronym for the File Transfer Protocol, which was the original file transfer protocol. SCP and FTP are two applications for copying files from one computer to another. Both were based on their own protocols, but both now use different prtocols.…

    • 285 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Manages information-consistency capacities, i.e., gives a dependable byte stream between two nodes on a system. TCP and UDP exert at this particular level.…

    • 1263 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 3 Lab

    • 290 Words
    • 2 Pages

    TCP – This protocol is what is used to break data down into manageable pieces and package them to send out to the proper address.…

    • 290 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    File Transfer Protocol. This is the main protocol, or service that is utilized during file transferring between…

    • 438 Words
    • 2 Pages
    Good Essays
  • Better Essays

    A communication protocol is a set of rules that allow two or more devices to communicate, so they can send and receive…

    • 1327 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    Protocol: A set of rules that different devices and/or software must follow so that the network works correctly.…

    • 539 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 1 Essay

    • 443 Words
    • 2 Pages

    TCP – TCP stands for “transmission control protocol” and it is the pieces that manages all movement of each data packet between computers. It establishes a connection between the computers. It also acknowledges that each packet have been…

    • 443 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    TCP/IP was developed in the 1960s to enable university scientists to transmit data from computer to computer.…

    • 932 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Message timing involves several rules of engagement. Access Method determines when two hosts can know when to begin sending messages and how to respond when errors occur. Flow control is used to manage how much data and the speed at which the data is transferred, allowing source and destination hosts to negotiate correct timing for successful communication. Hosts on the network also have defined Response Timeout rules specifying how long to wait for responses and what action to take if a response timeout occurs.…

    • 538 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Nt1310 Unit 7

    • 2452 Words
    • 10 Pages

    A network protocol defines rules and conventions for communication between network devices. Protocols for computer networking all generally use packet switching techniques to send and receive messages in the form of packets.…

    • 2452 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    Unit 3 P3

    • 1666 Words
    • 7 Pages

    Routers use IP (internet protocol) to identify connected devices, which is then used to control communications. The router may connect to these devices through wires, or through wireless. The router is essentially responsible for controlling communications through forwarding packets to the correct recipients across the least congested channel.…

    • 1666 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 1 Exercise 1

    • 617 Words
    • 2 Pages

    Transferring data that is being sent by the user who has created and initialized the transfer of information using a source such as an email service for example. How do you get information from one computer to another, and how do you make it simple and easy to do this?…

    • 617 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Topology Diagram Topology

    • 349 Words
    • 2 Pages

    Several devices having its own cable that connects to a central hub, or sometimes a switch, or even a Multi-station Access Unit (MAU). Data passes through the hub to reach other devices on the network.…

    • 349 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Study Guide

    • 350 Words
    • 2 Pages

    Data bits are frequently passed through pins in a connector.Synchronous protocols are the type of data link protocols primarily used to delineate groups of bits or bytes:…

    • 350 Words
    • 2 Pages
    Satisfactory Essays