Paper Details  
 
   

Has Bibliography
30 Pages
7424 Words

 
   
   
    Filter Topics  
 
     
   
 

Internet Protocols and Infra Structure

th taken by information as it goes from one machine to another and can be used to identify where problems might be occurring. On the Internet that path may not always be the same.For exampleThe following are the results of a number of executions of traceroute from the machine aldur (138.77.36.29).In the first example the machine knuth is on the same network as aldur. This means that the information can get their directly.bash$ traceroute knuthtraceroute to knuth.cqu.edu.au (138.77.36.20), 30 hops max, 40 byte packets1 knuth.cqu.EDU.AU (138.77.36.20) 2 ms 2 ms 2 msSome More Internet Protocols :FTPfile transfer. The file transfer protocol (FTP) allows a user on any computer to get files from another computer, or to send files to another computer. Security is handled by requiring the user to specify a user name and password for the other computer. Provisions are made for handling file transfer between machines with different character set, end of line conventions, etc.FTP is a utility that you run any time you want to access a file on another system. You use it to copy the file to your own system. You then work with the local copy. (See RFC 959 for specifications for FTP.)TELNETremote login. The network terminal protocol (TELNET) allows a user to log in on any other computer on the network. You start a remote session by specifying a computer to connect to. From that time until you finish the session, anything you type is sent to the other computer. Note that you are really still talking to your own computer. But the telnet program effectively makes your computer invisible while it is running. Every character you type is sent directly to the other system. Generally, the connection to the remote computer behaves much like a dialup connection. That is, the remote system will ask you to log in and give a password, in whatever manner it would normally ask a user who had just dialed it up. When you log off of the other computer, the telnet progr...

< Prev Page 21 of 30 Next >

    More on Internet Protocols and Infra Structure...

    Loading...
 
Copyright © 1999 - 2025 CollegeTermPapers.com. All Rights Reserved. DMCA