What protocol is used for remotely logging onto a computer


Asked by admin @ in Computer Science viewed by 279 People


Name the protocol used to log into a remote server

Answered by admin @



TELNET and FTP are Application Level Internet protocols. The TELNET and FTP protocol specifications have been implemented by many different sources, including The National Center for Supercomputer Applications (NCSA), and many other public domain and shareware sources.
The programs implementing the TELNET protocol are usually called telnet, but not always. Some notable exceptions are tn3270, WinQVT, and QWS3270, which are also TELNET protocol implementations. TELNET is used for remote login to other computers on the Internet.

The programs implementing the FTP protocol are usually called ftp, but there are exceptions to that too. A program called Fetch, distributed by Dartmouth College, WS_FTP, written and distributed by John Junod, and Ftptool, written by a Mike Sullivan, are FTP protocol implementations with graphic user interfaces. There's an enhanced FTP version, ncftp, that allows additional features, written by Mike Gleason. Also, FTP protocol implementations are often included in TELNET implementation programs, such as the ones distributed by NCSA. FTP is used for transferring files between computers on the Internet.

rlogin is a remote login service that was at one time exclusive to Berkeley 4.3 BSD UNIX. Essentially, it offers the same functionality as telnet, except that it passes to the remote computer information about the user's login environment. Machines can be configured to allow connections from trusted hosts without prompting for the users' passwords. A more secure version of this protocol is the Secure SHell, SSH, software written by Tatu Ylonen and available via ftp://ftp.net.ohio-state.edu/pub/security/ssh.

From a Unix prompt, these programs are invoked by typing the command (program name) and the (Internet) name of the remote machine to which to connect. You can also specify various options, as allowed, for these commands.

Syntax

telnet [options] [ remote_host [ port_number ] ]

tn3270 [options] [ remote_host [ port_number ] ]

ftp [options] [ remote_host ]

Common Options

ftp telnet Action

-d set debugging mode on

-d same as above (SVR4 only)

-i turn off interactive prompting

-n don't attempt auto-login on connection

-v verbose mode on

-l user connect with username, user, on the remote host (SVR4 only)

-8 8-bit data path (SVR4 only)

telnet and tn3270 allow you the option of specifying a port number to connect to on the remote host. For both commands it defaults to port number 23, the telnet port. Other ports are used for debugging of network services and for specialized resources.

Examples

telnet oscar.us.ohio-state.edu

tn3270 ohstmvsa.acs.ohio-state.edu

ftp magnus.acs.ohio-state.edu

The remote machine will query you for your login identification and your password. Machines set up as archives for software or information distribution often allow anonymous ftp connections. You ftp to the remote machine and login as anonymous (the login ftp is equivalent on many machines), that is, when asked for your "login" you would type anonymous.

Once you have successfully connected to a remote computer with telnet and rlogin (and assuming terminal emulation is appropriate) you will be able to use the machine as you always do.

Once you have successfully connected to a remote computer with ftp, you will be able to transfer a file "up" to that computer with the put command, or "down" from that computer with the get command. The syntax is as follows:

put local-file-name remote-file-name

get local-file-name remote-file-name

Other commands are available in ftp as well, depending on the specific "local" and "remote" FTP implementations. The help command will display a list of available commands. The help command will also display the purpose of a specific command. Examples of valid commands are shown below:

help display list of available commands

help mget display the purpose of the mget command ("get multiple files")

pwd present working directory

ls or dir directory list

cd change directory

lcd local change directory

open specify the machine you wish to connect with

user specify your login id (in cases where you are not prompted)

quit quit out of the FTP program

Similar Questions

The internet uses the as the protocol engine

Asked by admin @ in English viewed by 358 persons

Which is uses as the protocol engine in internet?

Explain the protocols that are used in e payments

Asked by admin @ in English viewed by 329 persons

Explain the protocols that are used in e-payments

Which of the following protocols is used for www

Asked by admin @ in Computer Science viewed by 294 persons

9. Which of the following protocols is used for WWW?(a) ftp(b) http(C) w3c(d) none of these​

The protocol used to communicate network errors is known as

Asked by admin @ in Computer Science viewed by 479 persons

The protocol used to communicate network errors is known as __________.

How to use a log jack

Asked by maham237 @ in Business viewed by 243 persons

Jack's Lumber Yard receives 8,000 large trees each period that it subsequently processes into rough logs by stripping off the tree bark and leaves (i.e., one tree equals one log). …

To check whether a remote computer is reachable

Asked by admin @ in English viewed by 252 persons

To check whether a remote computer is reachable over the network, which of the following tool is used?NetmonPingScannerTelent ​

Which protocol is used for secure communication over internet

Asked by admin @ in Computer Science viewed by 326 persons

Which protocol is used for secure communication over internet?

What is the use of recycle bin in computer

Asked by admin @ in Computer Science viewed by 315 persons

What is the use of recycle bin in computer ​

The tells the computer how to use its components

Asked by admin @ in Computer Science viewed by 326 persons

The tells the computer how to use its components. (1) utility (2) network (3) operating system (4) application program (5) None of these

Which network protocol is used to route ip addresses

Asked by admin @ in Computer Science viewed by 419 persons

Which network protocol is used to route ip addresses?

What is a computer network and why it is useful

Asked by admin @ in Computer Science viewed by 361 persons

What is computer network how is it useful​

Which layer 4 protocol is used for a telnet connection

Asked by admin @ in Computer Science viewed by 292 persons

Which layer 4 protocol is used for a Telnet connection? A.IP B.TCP C.TCP/IP D.UDP

Which waves are used by the common tv remote control

Asked by admin @ in Science viewed by 343 persons

4. The common TV remote control uses which one of the following waves ? (1) Lasers (2) Radio waves (3) Infrared waves (4) Ultrasonic waves

Advantage of network devices using open standard protocols

Asked by maham237 @ in Computers And Technology viewed by 441 persons

What is an advantage of network devices using open standard protocols?

Software to remote access computer without permission

Asked by maham237 @ in Computers And Technology viewed by 309 persons

How to remotely access another computer without permission using cmd?

Most viewed questions in Computer Science


A programmer mistakenly writes gor instead of for

Asked by admin @ in Computer Science viewed by 19033 persons


Domestic data entry operator ncert book class 9 solutions

Asked by admin @ in Computer Science viewed by 15819 persons


Information technology code 402 class 9 solutions chapter 1

Asked by admin @ in Computer Science viewed by 10979 persons



Ncert solutions for class 8 computer chapter 1 computer system

Asked by admin @ in Computer Science viewed by 10412 persons


A scrum team works on a 4 weeks sprint

Asked by admin @ in Computer Science viewed by 8725 persons


Which of the following occupies more memory in c

Asked by admin @ in Computer Science viewed by 8147 persons



A database of motor vehicles has the base entity

Asked by admin @ in Computer Science viewed by 7848 persons


The network architecture can be termed as a mcq

Asked by admin @ in Computer Science viewed by 6496 persons


Cat5 and cat6 cabling refer to which reference model layer

Asked by admin @ in Computer Science viewed by 5798 persons



Class 7 computer chapter 3 questions and answers

Asked by admin @ in Computer Science viewed by 5701 persons


Choose the correct options about usability and user experience

Asked by admin @ in Computer Science viewed by 5483 persons


Which advocates daily team meetings for coordination and integration

Asked by admin @ in Computer Science viewed by 4988 persons



Which three security features match the database security level

Asked by admin @ in Computer Science viewed by 4978 persons


Which of the dbms package is not available

Asked by admin @ in Computer Science viewed by 4693 persons


________ aid a business grow and attain its objectives

Asked by admin @ in Computer Science viewed by 4494 persons