Preview

Distinguish Between Ftp and Telnet Protocols

Powerful Essays
Open Document
Open Document
1343 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Distinguish Between Ftp and Telnet Protocols
1) Distinguish between the FTP and TELNET protocols.
File Transfer Protocol (FTP) is used to transfer text files, programs, spreadsheets, and databases across the Internet.
TELNET is a terminal emulation protocol used on TCP/IP-based networks. It allows users to run programs and review data from a remote terminal or computer. TELNET is an inherent part of the TCP/IP communications protocol. While both protocols deal with data transfer, FTP is useful for perusing a file of data as if the user were actually at the remote site. 2) What purpose do protocols serve?
Protocols serve network functions in several ways:
First, they facilitate the physical connection between the network devices. Through protocols, devices are able to identify themselves to other devices as legitimate network entities and initiate (or terminate) a communication session.
Second, protocols synchronize the transfer of data between physical devices. This involves defining the rules for initiating a message, determining the data transfer rate between devices, and acknowledging message receipt.
Third, protocols provide a basis for error checking and measuring network performance. This is done by comparing measured results against expectations. For example, performance measures pertaining to storage access times, data transmission rates and modulation frequencies are critical to control the network’s function. Thus, the identification and correction of errors depend on protocol standards that define acceptable performance.
Fourth, protocols promote compatibility among network devices. To transmit and receive data successfully, the various devices involved in a particular session must conform to a mutually acceptable mode of operation, such as synchronous and duplex, or half duplex. Without protocols to provide such conformity, messages sent between devices would be distorted and garbled.
Finally, protocols promote network designs that are flexible, expandable, and cost-effective. Users

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT1430

    • 285 Words
    • 1 Page

    i. Both are text-based protocols: mouse movements cannot be transferred only keystrokes. Both are connection-oriented and are client-server protocols. The main difference is in security. SSH offers security mechanisms that protect the user against anyone with malicious intent while Telnet has no security measures whatsoever.…

    • 285 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Manages information-consistency capacities, i.e., gives a dependable byte stream between two nodes on a system. TCP and UDP exert at this particular level.…

    • 1263 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Telnet is an Application Layer protocol that will provide the user with access to a remote host through a command-line interface.…

    • 623 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Unit 3 Lab

    • 290 Words
    • 2 Pages

    TCP – This protocol is what is used to break data down into manageable pieces and package them to send out to the proper address.…

    • 290 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    File Transfer Protocol. This is the main protocol, or service that is utilized during file transferring between…

    • 438 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Protocol: A set of rules that different devices and/or software must follow so that the network works correctly.…

    • 539 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    It230 Wk1 Checkpoint

    • 576 Words
    • 3 Pages

    Within a network consists of a model that interlinks computers with one another by its methods and protocols, this model is known as the “Open Systems Interconnection (OSI) model”, (2010. PP.28). It is a framework that defines and dissects its methods protocols into another model consisting of seven different layers. Each different layer increases from one layer to the next, all in which rely on the services the lower level provides to the next until data becomes present upon viewing a computer screen. Seven layers defining the “seven-layer model”, (2010. PP.28), are: physical, data-link, network, transport, session, presentation, and application. Each consists of different functions and purposes.…

    • 576 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Message timing involves several rules of engagement. Access Method determines when two hosts can know when to begin sending messages and how to respond when errors occur. Flow control is used to manage how much data and the speed at which the data is transferred, allowing source and destination hosts to negotiate correct timing for successful communication. Hosts on the network also have defined Response Timeout rules specifying how long to wait for responses and what action to take if a response timeout occurs.…

    • 538 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Nt1310 Unit 7

    • 2452 Words
    • 10 Pages

    Communication to run smoothly across the network there are devices that place intermediary roles in networking. These intermediary devices provide connectivity and work behind the scenes to ensure that data flows across the network. These devices connect the individual hosts (end devices) to the network and can connect multiple individual networks to form an internetwork.…

    • 2452 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    Unit 3 P3

    • 1666 Words
    • 7 Pages

    Routers use IP (internet protocol) to identify connected devices, which is then used to control communications. The router may connect to these devices through wires, or through wireless. The router is essentially responsible for controlling communications through forwarding packets to the correct recipients across the least congested channel.…

    • 1666 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 1 Exercise 1

    • 617 Words
    • 2 Pages

    Transferring data that is being sent by the user who has created and initialized the transfer of information using a source such as an email service for example. How do you get information from one computer to another, and how do you make it simple and easy to do this?…

    • 617 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Topology Diagram Topology

    • 349 Words
    • 2 Pages

    Several devices having its own cable that connects to a central hub, or sometimes a switch, or even a Multi-station Access Unit (MAU). Data passes through the hub to reach other devices on the network.…

    • 349 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Study Guide

    • 350 Words
    • 2 Pages

    Data bits are frequently passed through pins in a connector.Synchronous protocols are the type of data link protocols primarily used to delineate groups of bits or bytes:…

    • 350 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    TCP/IP was developed in the 1960s to enable university scientists to transmit data from computer to computer.…

    • 932 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    ISSC362 lab 7 jarad krum

    • 696 Words
    • 2 Pages

    The significance of the TCP, 3-Way Handshake for applications that utilize TCP as a transport protocol is to ensure a connection is made before transmitting data such as SSH and HTTP. FTP, Telnet, HTTP, HTTPS, SMTP, POP3, IMAP, SSH use TCP as a transport protocol.…

    • 696 Words
    • 2 Pages
    Good Essays