Home>Article> What protocol is used for remote login?

What protocol is used for remote login?

青灯夜游
青灯夜游 Original
2022-07-04 17:46:27 23029browse

The protocol used for remote login is "Telnet". The Telnet protocol is a member of the TCP/IP protocol suite and is the standard protocol and main method for Internet remote login services; it provides users with the ability to complete remote host work on the local computer. The Telnet protocol allows users on one machine to log in to a remote machine and perform work.

What protocol is used for remote login?

The operating environment of this tutorial: Windows 7 system, Dell G3 computer.

The protocol used for remote login is "Telnet".

The Telnet protocol is a member of the TCP/IP protocol family and is the standard protocol and main method for Internet remote login services. It provides users with the ability to complete remote host work on their local computer. Use the telnet program on the end user's computer to connect to the server. Terminal users can enter commands into the telnet program, and these commands will be run on the server as if they were entered directly on the server's console. You can control the server locally. To start a telnet session, you must enter your username and password to log into the server. Telnet is a commonly used method to remotely control web servers.

The Telnet protocol allows users on one machine to log in to a remote machine and perform work.

The purpose of Telnet protocol

Telnet is the standard protocol and main method of Internet remote login service. It was originally developed by ARPANET and is now mainly used for Internet sessions. Its basic The function is to allow users to log in to the remote host system.

Telnet allows us to sit in front of our own computer and log in to another remote computer through the Internet network. This computer can be in the next room or on the other side of the world. After logging in to the remote computer, the local computer is equivalent to a terminal of the remote computer. We can use our own computer to directly control the remote computer and enjoy the same operating rights as the local terminal of the remote computer.

The main purpose of Telnet is to use the information resources owned by the remote computer that the local computer does not have. If the main purpose of the remote computer is to transfer files between the local computer and the remote computer, then using FTP will Faster and more effective.

Working process

When using the Telnet protocol for remote login, the following conditions need to be met: the client program containing the Telnet protocol must be installed on the local computer; the remote host must be known IP address or domain name; you must know the login ID and password.

Telnet remote login service is divided into the following 4 processes:

1) Establish a connection between the local and the remote host. The process is actually to establish a TCP connection. The user must know the IP address or domain name of the remote host;

2) Convert the user name and password entered on the local terminal and any commands or characters entered later to NVT (Net Virtual Terminal) format to the remote host. This process is actually sending an IP data packet from the local host to the remote host;

3) Convert the NVT format data output by the remote host into a locally accepted format and send it back to the local terminal, including entering commands and returning Display and command execution results;

4) Finally, the local terminal revokes the connection to the remote host. The process is to revoke a TCP connection.

The above content only discusses the most basic things about remote login. The complexity and hardship of programmers are beyond our imagination. I wonder if you have thought of these while using Telnet comfortably!

For more related knowledge, please visit theFAQcolumn!

The above is the detailed content of What protocol is used for remote login?. For more information, please follow other related articles on the PHP Chinese website!

Statement:
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn