+ 1-888-787-5890  
   + 1-302-351-4405  
 
 
 
 

Essay/Term paper: Telnet

Essay, term paper, research paper:  Internet

Free essays available online are good but they will not follow the guidelines of your particular writing assignment. If you need a custom term paper on Internet: Telnet, you can hire a professional writer here to write you a high quality authentic essay. While free essays can be traced by Turnitin (plagiarism detection program), our custom written essays will pass any plagiarism test. Our writing service will save you time and grade.



Telnet

PURPOSE OF THIS REPORT
Before gophers, hypertext, and sophisticated web browsers, telnet was
the primary means by which computer users connected their machines with other
computers around the world. Telnet is a plain ASCII terminal emulation
protocol that is still used to access a variety of information sources, most
notably libraries and local BBS's. This report will trace the history and usage
of this still popular and widely used protocol and explain where and how it
still manages to fit in today.

HISTORY AND FUTURE OF TELNET
"Telnet" is the accepted name of the Internet protocol and the command
name on UNIX systems for a type of terminal emulation program which allows users
to log into remote computer networks, whether the network being targeted for
login is physically in the next room or halfway around the globe. A common
program feature is the ability to emulate several diverse types of terminals--
ANSI, TTY, vt52, and more. In the early days of networking some ten to fifteen
years ago, the "internet" more or less consisted of telnet, FTP (file transfer
protocol), crude email programs, and news reading. Telnet made library catalogs,
online services, bulletin boards, databases and other network services available
to casual computer users, although not with the friendly graphic user interfaces
one sees today.
Each of the early internet functions could be invoked from the UNIX
prompt, however, each of them used a different client program with its own
unique problems. Internet software has since greatly matured, with modern web
browsers (i.e. Netscape and Internet Explorer) easily handling the WWW protocol
(http) along with the protocols for FTP, gopher, news, and email. Only the
telnet protocol to this day requires the use of an external program.
Due to problems with printing and saving and the primitive look and
feel of telnet connections, a movement is underway to transform information
resources from telnet-accessible sites to full fledged web sites. However, it
is estimated that it will still take several years before quality web interfaces
exist for all of the resources now currently available only via telnet.
Therefore, knowing the underlying command structure of terminal emulation
programs like telnet is likely to remain necessary for the networking
professional for some time to come.

ADVANTAGES AND DISADVANTAGES OF TELNET

The chief advantage to the telnet protocol today lies in the fact that
many services and most library catalogs on the Internet remain accessible today
only via the telnet connection. Since telnet is a terminal application, many
see it as a mere holdover from the days of mainframe computers and minicomputers.
With the recent interest in $500 Internet terminals may foretell a resurgence
in this business. Disadvantages include the aforementioned problems that telnet
tends to have printing and saving files, and its primitive look and feel when
compared to more modern web browsers.

OTHER APPROACHES

The functionality of the telnet protocol may be compared with the UNIX
"rlogin" command, an older remote command that still has some utility today.
Rlogin is a protocol invoked by users with accounts on two different UNIX
machines, allowing connections for certain specified users without a password.
This requires setting up a ".rhosts" or "/etc/hosts.equiv" file and may involve
some security risks, so caution is advised.
Using telnet instead of the rlogin command will accomplish the same
results, but the use of the rlogin command will have the effect of saving
keystrokes, particularly if it is used in conjunction with an alias.

CONCLUSION

Some argue that the future of the Internet lies in sophisticated web
browsers like Netscape and Internet Explorer, or tools such as Gopher that
"save" end users from having to deal with the command line prompt and the
peculiar details of commands like Telnet. While that may be the case, the
tendency remains in place for programmers to develop new software by building on
the old. Therefore, knowing the underlying command structure of older protocols
like telnet and rlogin are likely to remain essential skills for the networking
professional in the forseeable future.

 

Other sample model essays:

The Anti-Trust Case Against Microsoft Since 1990, a battle has raged in United States courts between the United States government and the Microsoft Corporation out of Redmond, Washington, ...
The Basics of A Hard Drive I'm sure, by now you have used a computer be it to play games or write a paper. But do you know how a computer works and runs all the programs you what it to? We...
The Central Processing Unit Microprocessors, also called central processing units (CPUs), are frequently described as the "brains" of a computer, because they act as the central contro...
Technology Changes Role of Database Administrator The database administrator (DBA) is responsible for managing and coordinating all database activities. The DBA's job description includes da...
Internet / The Computer
The Computer This report is about the impact that the personal computer has made during the past 10 years on the the community. It is a report that includes detailed information about the per...
Internet / Computers
Computers Computer are electronic device that can receive a set of instructions, or program, and then carry out a program by performing calculations on numbered data or by compiling and c...
Technology / The Modem
The Modem First of all I would like to start with an introduction I chose this topic because I thought it would be interesting to learn about how a modem works in a computer. With modem we ar...
The Communications Decency Act The U.S. Government should not attempt to place restrictions on the internet. The Internet does not belong to the United States and it is not our responsibility...
The Dependability of the Web by Nathan Redman A new age is upon us - the computer age. More specifically, the internet. There's no doubt that the internet has changed how fast and the ...
The Environment Is Going To Hell This is the litany: Our resources are running out. The air is bad, the water worse. The planet's specis are dying off-more exactly, we're killing them -at the...
Experience with Dream Essay - Reliable and great customer service. Quality of work - High quality of work.
, ,
Dream Essay - Very reliable and great customer service. Encourage other to try their service. Writer 91463 - Provided a well written Annotated Bibliography with great deal of detail per th
, ,
it is always perfect
, ,
The experience with Dream Essay is stress free. Service is excellent and forms various forms of communication all help with customer service. Dream Essay is customer oriented. Writer 17663
, ,
Only competent & proven writers
Original writing — no plagiarism
Our papers are never resold or reused, period
Satisfaction guarantee — free unlimited revisions
Client-friendly money back guarantee
Total confidentiality & privacy
Guaranteed deadlines
Live Chat & 24/7 customer support
All academic and professional subjects
All difficulty levels
12pt Times New Roman font, double spaced, 1 inch margins
The fastest turnaround in the industry
Fully documented research — free bibliography guaranteed
Fax (additional info): 866-332-0244
Fax (additional info): 866-308-7123
Live Chat Support
Need order related assistance?—Click here to submit a inquiry
© Dreamessays.com. All Rights Reserved.
Dreamessays.com is the property of MEDIATECH LTD