The Telnet protocol is one of the TCP/IP protocol suites. It is the standard protocol and main mode of the Internet remote login service. It is commonly used for remote control of web servers, allowing users to perform work on remote hosts on local hosts. The user first executes the Telnet program on the computer, connects to the destination server, and then enters the account number and password to verify the identity. The user can enter commands on the local host and then have the connected remote host execute as if they were directly entered on the other console. The data transmitted by the traditional Telnet session is not encrypted. Sensitive data such as account numbers and passwords are easily eavesdropped. Therefore, many servers will block the Telnet service and use more secure SSH.
When testing the network, telnet and ping are the two commands we use most often. But ping is just a communication protocol, part of the ip protocol, part of the tcp/ip protocol, and Ping is an executable command that comes with Windows. While the Telnet service is also a client/server model service, its greater significance is to implement remote login based on the Telnet protocol.
Below we distinguish between ping and telnet by comparing the parameters supported by ping and telnet.
Ping support parameters:
1. Usage: ping [-t] [-a] [-n count] [-l size] [-f] [-i TTL] [-v TOS]
2. [-r count] [-s count] [[-j host-list]