Ch19

41
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000 Chapter 19 TELNET and Rlogin

description

 

Transcript of Ch19

Page 1: Ch19

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000

Chapter 19

TELNETand

Rlogin

Page 2: Ch19

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000

CONTENTSCONTENTS• CONCEPT• NETWORK VIRTUAL TERMINAL (NVT)• NVT CHARACTER SET• EMBEDDING• OPTIONS• OPTION NEGOTIATION• SUBOPTION NEGOTIATION• CONTROLLING THE SERVER• OUT-OF-BAND SIGNALING

Page 3: Ch19

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000

CONTENTS CONTENTS (Continued)(Continued)

• ESCAPE CHARACTER• MODE OF OPERATION• EXAMPLES• USER INTERFACE• RLOGIN (REMOTE LOGIN)• SECURITY ISSUE

Page 4: Ch19

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000

TELNET and Rlogin are TELNET and Rlogin are general-purpose general-purpose

client-server application programs.client-server application programs.

Page 5: Ch19

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000

CONCEPT

19.119.1

Page 6: Ch19

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000

Figure 19-1

Local login

Page 7: Ch19

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000

Figure 19-2

Remote login

Page 8: Ch19

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000

NETWORKVIRTUAL

TERMINAL

19.219.2

Page 9: Ch19

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000

Figure 19-3

NVT

Page 10: Ch19

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000

NVTCHARACTER

SET

19.319.3

Page 11: Ch19

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000

Figure 19-4

Format of data characters

Page 12: Ch19

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000

Figure 19-5

Format of control characters

Page 13: Ch19

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000

EMBEDDING

19.419.4

Page 14: Ch19

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000

Figure 19-6

Embedding

Page 15: Ch19

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000

OPTIONS

19.519.5

Page 16: Ch19

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000

OPTIONNEGOTIATION

19.619.6

Page 17: Ch19

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000

Figure 19-7

Offer to enable

Page 18: Ch19

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000

Figure 19-8

Request to enable

Page 19: Ch19

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000

Figure 19-9

Offer to disable

Page 20: Ch19

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000

Figure 19-10

Request to disable

Page 21: Ch19

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000

Figure 19-11

Echo option example

Page 22: Ch19

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000

SUBOPTIONNEGOTIATION

19.719.7

Page 23: Ch19

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000

Figure 19-12

Example of suboption negotiation

Page 24: Ch19

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000

CONTROLLINGTHE

SERVER

19.819.8

Page 25: Ch19

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000

Figure 19-13

Example of interrupting an application program

Page 26: Ch19

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000

OUT-OF-BANDSIGNALING

19.919.9

Page 27: Ch19

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000

Figure 19-14

Out-of-band signaling

Page 28: Ch19

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000

ESCAPECHARACTER

19.1019.10

Page 29: Ch19

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000

Figure 19-15Two different interruptions

Page 30: Ch19

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000

MODEOF

OPERATION

19.1119.11

Page 31: Ch19

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000

EXAMPLES

19.1219.12

Page 32: Ch19

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000

Example 1Example 1

In this example, we use the default mode to show the concept and its deficiencies even though it is almost obsolete today. The client and the server negotiate the terminal type and terminal speed and then the server checks the login and password of the user. See Figure 19.16.

Page 33: Ch19

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000

Figure 19-16 Example1

Page 34: Ch19

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000

Example 2Example 2

In this example, we show how the client switches to the character mode. This requires that the client request the server to enable the SUPPRESS GO AHEAD and ECHO options. See Figure 19.17.

Page 35: Ch19

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000

Figure 19-17

Example 2

Page 36: Ch19

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000

USERINTERFACE

19.1319.13

Page 37: Ch19

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000

RLOGIN(REMOTE LOGIN)

19.1419.14

Page 38: Ch19

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000

The Rlogin process uses the TCP port 513.

Page 39: Ch19

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000

Figure 19-18

Connection establishment

Page 40: Ch19

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000

Figure 19-19

Sending ss command from the client to the server

Page 41: Ch19

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000

SECURITYISSUE

19.1519.15