Group member: WET080713 Xu Peiwen WET080715 Zulifeiya.Julaiti WET080007 Lum Ken Iu WET080023 Wee See Yee.

Slides:



Advertisements
Similar presentations
Description Competency standards Duration Learning Learning methods Show visual Learning Managemen System on Moodle Offline Show visual Learning Managemen.
Advertisements

Securing Remote PC Access to UNIX/Linux Hosts with VPN or SSH Charles T. Moetului WRQ, Inc. (206)
PC Anywhere By: Neil Meharu Jewel Libid Pete Ramirez Lynn Hy.
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
FTP (File Transfer Protocol ) FTP (File Transfer Protocol ) Members : Farihah Azmi WET : Nur Afiqah Zainuri WET : Nurnadia Saidon WET
Local Area Networks Outline –Basic Components of a LAN –Network Architectures –Topologies and LAN Technologies –Selecting a LAN –Improving LAN Performance.
Protocols and the TCP/IP Suite Chapter 4 (Stallings Book)
Remote Login: TELNET and
LogMeIn.com By: Casey Davidson. What is it? Free Web-based VNC Client Remotely control any PC or Mac from anywhere in the world No network configuring.
Chapter 16 AAA. AAA Components  AAA server –Authenticates users accessing a device or network –Authorizes user to perform specific activities –Performs.
M2M Gateway Features Jari Lahti, CTO
CLOUD COMPUTING.  It is a collection of integrated and networked hardware, software and Internet infrastructure (called a platform).  One can use.
© Folens 2008 Transfer of data in ICT systems Using ICT networks.
TCP/IP Tools Lesson 5. Objectives Skills/ConceptsObjective Domain Description Objective Domain Number Using basic TCP/IP commands Understanding TCP/IP3.6.
1 MASTERING (VIRTUAL) NETWORKS A Case Study of Virtualizing Internet Lab Avin Chen Borokhovich Michael Goldfeld Arik.
Privilege Levels Cisco IOS provides for 16 different privilege levels ranging from 0 to 15. Cisco IOS comes with 2 predefined user levels. User mode.
Telnet/SSH: Connecting to Hosts Internet Technology1.
Exterior Gateway Protocol Border Gateway Protocol (BGP) Interior Gateway Protocol Routing Information Protocol (RIP) Enhanced Interior Gateway Protocol.
Current Network Schema Router Internet Switch PC.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols.
VNC Greg Fankhanel Jessica Nunn Jennifer Romero. What is it? Stands for Virtual Network Computing It is remote control software which allows you to view.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicBSCI Module 6 1 Basic Switch Concept Prepared by: Akhyari Nasir Resources form Internet.
Open Systems Interconnection Model (OSI model). The Open Systems Interconnect Model.
VPN Security Policy By: Fred Cicilioni. VPN, or Virtual Private Network, is a protocol that allows remote access, allowing the user to connect to all.
Alarm Network System Supervised by: Dr. Luai Malhis. Prepared by: Mahmoud Musa & Mustafa Assaf.
1 Week #10Business Continuity Backing Up Data Configuring Shadow Copies Providing Server and Service Availability.
1 Chapter 34 Internet Applications (Telnet, FTP).
Networking in Linux. ♦ Introduction A computer network is defined as a number of systems that are connected to each other and exchange information across.
TELNET 1.TELNET 2.SSH. TELNET  TELNET is an abbreviation for TErminaL NETwork.  It is the standard TCP/IP protocol for virtual terminal service as proposed.
Module 10: Providing Secure Access to Remote Offices.
Configuring AAA Kamyar Miremadi Laila Sherif Summer 2005.
Project Description. NetFGPA-based Virtual Router Implement a Virtual Router with using NetFPGA Box. an open source hardware and software platform for.
Credit:  An operating system is the program that is loaded into the computer  coordinates all the activities among.
Protocols Monil Adhikari. Agenda Introduction Port Numbers Non Secure Protocols FTP HTTP Telnet POP3, SMTP Secure Protocols HTTPS.
.  Hubs send data from one computer to all other computers on the network. They are low-cost and low-function and typically operate at Layer 1 of the.
1 Pertemuan 3 Operating Cisco IOS Software. Discussion Topics The purpose of Cisco IOS software Router user interface Router user interface modes Cisco.
COSC 432 Shi Li 12/8/2008. File Transfer Protocol (FTP) Used to transfer files and data between computers via internet Defined as RFC959 Developed in.
Computer Networks CSC September 23,
Network Overview. Protocol Protocol (network protocols) - a special set of rules that define communication between two or more devices on a network.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Virtual Network Computing Sangmi Lee Oct,25,2000 Florida State University.
أمن المعلومات لـ أ. عبدالرحمن محجوب حمد mtc.edu.sd أمن المعلومات Information Security أمن المعلومات Information Security  أ. عبدالرحمن محجوب  Lec (5)
SECURE LAB: CREATING A CISCO 3550 VLSM NETWORK
Protocols and the TCP/IP Suite
Transfer of data in ICT systems
Understand Wide Area Networks (WANs)
Virtual Private Networks
Virtual Network Computing
Pertemuan 19 Introduction to TCP/IP
Em4 Ethernet tutorial Remote connection.
Introduction to Networking
Chapter 2: Basic Switching Concepts and Configuration
Computer Network.
ECEN 619 “Internet Protocols and Modeling”
Net 412 (Practical Part) LAB 3 - Telnet
Maestro Heritage Ethernet
PPPoE Internet Point to Point Protocol over Ethernet
ECEN “Internet Protocols and Modeling”
Remote Access Services RAS Routing and Remote Access Services RRAS Remote Desktop Terminal Services Virtual Private Networking VPN.
Net 412 (Practical Part) LAB 4 - SSH
Computer Network.
Unit 36: Internet Server Management
Radoslaw Jedynak, PhD Poland, Technical University of Radom
TELNET BY , S.AISHWARYA III-IT.
Internet Connection Sharing
Windows Remote Management
Read this to find out how the internet works!
Computer Networks Protocols
Done by:Thikra abdullah
Internet Applications (Telnet, FTP)
Presentation transcript:

Group member: WET Xu Peiwen WET Zulifeiya.Julaiti WET Lum Ken Iu WET Wee See Yee

Telnet  Network protocol enable user to access a remote pc through command-line interface.  Used on the internet or local area networks  Telnet also refer to software that implements the client part of the protocol.

Pros and Cons  Pros: - Can manage network devices, esp:  switch, router, computer etc - Remote access other devices  Cons: - Low security: - Easy access to other pc Replace by SSH or Windows Remote Dekstop

Thanks