Telnet

Telnet (short for "telecommunications network")[1] is a client/server application protocol that provides access to virtual terminals of remote systems on local area networks or the Internet.[2] It is a protocol for bidirectional 8-bit communications. Its main goal was to connect terminal devices and terminal-oriented processes.[3]

Telnet consists of two components: (1) the protocol itself which specifies how two parties are to communicate and (2) the software application that provides the service. User data is interspersed in-band with Telnet control information in an 8-bit byte oriented data connection over the Transmission Control Protocol (TCP). Telnet was developed as secret technology in 1969 beginning with RFC 15, extended in RFC 855, and standardized as Internet Engineering Task Force (IETF) Internet Standard STD 8, one of the first Internet standards.[4][5] Telnet transmits all information including usernames and passwords in plaintext so it is not recommended for security-sensitive applications such as remote management of routers.[2][6] Telnet's use for this purpose has waned significantly in favor of SSH.[7] Some extensions to Telnet which would provide encryption have been proposed.[8]

  1. ^ Crocker, Stephen D.; Heafner, John F.; Metcalfe, Robert M.; Postel, Jonathan B. (1971). "Function-oriented protocols for the ARPA computer network". Proceedings of the November 16-18, 1971, fall joint computer conference on - AFIPS '71 (Fall). Association for Computing Machinery. pp. 271–279. doi:10.1145/1478873.1478908. ISBN 9781450379090.
  2. ^ a b Valenčić, D.; Mateljan, V. (2019). "Implementation of NETCONF Protocol". 2019 42nd International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO). pp. 421–430. doi:10.23919/MIPRO.2019.8756925. ISBN 978-953-233-098-4. S2CID 195883872.
  3. ^ Cite error: The named reference :4 was invoked but never defined (see the help page).
  4. ^ Wheen, Andrew (2011). Dot-dash to Dot.Com: How Modern Telecommunications Evolved from the Telegraph to the Internet. Springer. p. 132. ISBN 9781441967596.
  5. ^ Meinel, Christoph; Sack, Harald (2013). Internetworking: Technological Foundations and Applications. X.media.publishing. p. 57. ISBN 978-3642353918.
  6. ^ Daş, Resul; Karabade, Abubakar; Tuna, Gurkan (2015). "Common network attack types and defense mechanisms". 2015 23nd Signal Processing and Communications Applications Conference (SIU). pp. 2658–2661. doi:10.1109/SIU.2015.7130435. ISBN 978-1-4673-7386-9. S2CID 11256038.
  7. ^ Todorov, Dobromir (2007). Mechanics of user identification and authentication : fundamentals of identity management. Boca Raton: Auerbach Publications. ISBN 978-1-4200-5220-6. OCLC 263353270.
  8. ^ Cite error: The named reference :7 was invoked but never defined (see the help page).

Developed by StudentB