Preview

Distinguish Between Ftp and Telnet Protocols

Powerful Essays
Open Document
Open Document
1343 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Distinguish Between Ftp and Telnet Protocols
1) Distinguish between the FTP and TELNET protocols.
File Transfer Protocol (FTP) is used to transfer text files, programs, spreadsheets, and databases across the Internet.
TELNET is a terminal emulation protocol used on TCP/IP-based networks. It allows users to run programs and review data from a remote terminal or computer. TELNET is an inherent part of the TCP/IP communications protocol. While both protocols deal with data transfer, FTP is useful for perusing a file of data as if the user were actually at the remote site. 2) What purpose do protocols serve?
Protocols serve network functions in several ways:
First, they facilitate the physical connection between the network devices. Through protocols, devices are able to identify themselves to other devices as legitimate network entities and initiate (or terminate) a communication session.
Second, protocols synchronize the transfer of data between physical devices. This involves defining the rules for initiating a message, determining the data transfer rate between devices, and acknowledging message receipt.
Third, protocols provide a basis for error checking and measuring network performance. This is done by comparing measured results against expectations. For example, performance measures pertaining to storage access times, data transmission rates and modulation frequencies are critical to control the network’s function. Thus, the identification and correction of errors depend on protocol standards that define acceptable performance.
Fourth, protocols promote compatibility among network devices. To transmit and receive data successfully, the various devices involved in a particular session must conform to a mutually acceptable mode of operation, such as synchronous and duplex, or half duplex. Without protocols to provide such conformity, messages sent between devices would be distorted and garbled.
Finally, protocols promote network designs that are flexible, expandable, and cost-effective. Users

You May Also Find These Documents Helpful

  • Satisfactory Essays

    TCP/IP was developed in the 1960s to enable university scientists to transmit data from computer to computer.…

    • 932 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT1430

    • 285 Words
    • 1 Page

    i. Both are text-based protocols: mouse movements cannot be transferred only keystrokes. Both are connection-oriented and are client-server protocols. The main difference is in security. SSH offers security mechanisms that protect the user against anyone with malicious intent while Telnet has no security measures whatsoever.…

    • 285 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Manages information-consistency capacities, i.e., gives a dependable byte stream between two nodes on a system. TCP and UDP exert at this particular level.…

    • 1263 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 3 Lab

    • 290 Words
    • 2 Pages

    TCP – This protocol is what is used to break data down into manageable pieces and package them to send out to the proper address.…

    • 290 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    File Transfer Protocol. This is the main protocol, or service that is utilized during file transferring between…

    • 438 Words
    • 2 Pages
    Good Essays
  • Better Essays

    A communication protocol is a set of rules that allow two or more devices to communicate, so they can send and receive…

    • 1327 Words
    • 6 Pages
    Better Essays
  • Good Essays

    ISSC362 lab 7 jarad krum

    • 696 Words
    • 2 Pages

    The significance of the TCP, 3-Way Handshake for applications that utilize TCP as a transport protocol is to ensure a connection is made before transmitting data such as SSH and HTTP. FTP, Telnet, HTTP, HTTPS, SMTP, POP3, IMAP, SSH use TCP as a transport protocol.…

    • 696 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Protocol: A set of rules that different devices and/or software must follow so that the network works correctly.…

    • 539 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 1 Essay

    • 443 Words
    • 2 Pages

    TCP – TCP stands for “transmission control protocol” and it is the pieces that manages all movement of each data packet between computers. It establishes a connection between the computers. It also acknowledges that each packet have been…

    • 443 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Message timing involves several rules of engagement. Access Method determines when two hosts can know when to begin sending messages and how to respond when errors occur. Flow control is used to manage how much data and the speed at which the data is transferred, allowing source and destination hosts to negotiate correct timing for successful communication. Hosts on the network also have defined Response Timeout rules specifying how long to wait for responses and what action to take if a response timeout occurs.…

    • 538 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Nt1310 Unit 7

    • 2452 Words
    • 10 Pages

    A network protocol defines rules and conventions for communication between network devices. Protocols for computer networking all generally use packet switching techniques to send and receive messages in the form of packets.…

    • 2452 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    Unit 3 P3

    • 1666 Words
    • 7 Pages

    This means that the transmission of data can be sent or received to a device and never the other way around. Radio broadcasting and communicating with a printer is an example of such communication, where the communication medium is used for one-way communication.m…

    • 1666 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 1 Exercise 1

    • 617 Words
    • 2 Pages

    Transferring data that is being sent by the user who has created and initialized the transfer of information using a source such as an email service for example. How do you get information from one computer to another, and how do you make it simple and easy to do this?…

    • 617 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Topology Diagram Topology

    • 349 Words
    • 2 Pages

    Several devices having its own cable that connects to a central hub, or sometimes a switch, or even a Multi-station Access Unit (MAU). Data passes through the hub to reach other devices on the network.…

    • 349 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Study Guide

    • 350 Words
    • 2 Pages

    Data bits are frequently passed through pins in a connector.Synchronous protocols are the type of data link protocols primarily used to delineate groups of bits or bytes:…

    • 350 Words
    • 2 Pages
    Satisfactory Essays