Eicon Networks CX1 Manuel d'utilisateur Page 8

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 20
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 7
8
G&
R
GLIN
K
FOR WINDOWS
TM
Telnet protocols
Telnet is the first and oldest TCP/IP terminal control protocol.
It was originally defined in RFC854 back in 1983, to control a
very primitive device, the NVT (Network Virtual Terminal).
Telnet is a byte stream protocol with the Telnet commands
embedded in the data as escape sequences. Each side must
merge its commands into the outgoing stream, and scan the
incoming stream looking for Telnet commands.
TNVIP, TN3270/TN3270E and TN5250/TN5250E are Telnet
dialects. They are basically the Telnet byte scanning protocol,
with options that help overcome some of the disadvantages of
using a byte-stream oriented protocol, best suited to dumb
echo mode terminals, to control an intelligent block mode
terminal device.
They require that a Telnet server be on the mainframe side,
scanning the incoming byte stream, and decoding Telnet
protocol.
The connections between your workstations and mainframe
can be secured with a choice of the Secure Socket Layer or
Secure Shell encryption and authentication protocols.
FTP client
The Glink FTP client automatically detects the type of FTP server to which it is connected and converts
between the FTP server and Windows directory formats. Local and remote directories can be displayed in
any Windows format. Each directory window has its own toolbar.
Glink FTP supports drag and
drop, or you can mark the
desired file(s) in either
directory and click the upload
or download icon. File type is
derived from the name
extension, allowing transfer of
multiple files in mixed ASCII
and binary formats. The client
supports directory download
and compressed download.
Remote files can be viewed and edited using a configurable viewer and editor. Remote files changed with
the editor are uploaded if the changes are saved. Your FTP file transfers can be secured with a choice of the
Secure Socket Layer (SSL) or Secure Shell (SSH) encryption and authentication protocols.
Vue de la page 7
1 2 3 4 5 6 7 8 9 10 11 12 13 ... 19 20

Commentaires sur ces manuels

Pas de commentaire