McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000
Chapter 19
TELNETand
Rlogin
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000
CONTENTSCONTENTS• CONCEPT• NETWORK VIRTUAL TERMINAL (NVT)• NVT CHARACTER SET• EMBEDDING• OPTIONS• OPTION NEGOTIATION• SUBOPTION NEGOTIATION• CONTROLLING THE SERVER• OUT-OF-BAND SIGNALING
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000
CONTENTS CONTENTS (Continued)(Continued)
• ESCAPE CHARACTER• MODE OF OPERATION• EXAMPLES• USER INTERFACE• RLOGIN (REMOTE LOGIN)• SECURITY ISSUE
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000
TELNET and Rlogin are TELNET and Rlogin are general-purpose general-purpose
client-server application programs.client-server application programs.
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000
CONCEPT
19.119.1
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000
Figure 19-1
Local login
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000
Figure 19-2
Remote login
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000
NETWORKVIRTUAL
TERMINAL
19.219.2
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000
Figure 19-3
NVT
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000
NVTCHARACTER
SET
19.319.3
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000
Figure 19-4
Format of data characters
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000
Figure 19-5
Format of control characters
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000
EMBEDDING
19.419.4
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000
Figure 19-6
Embedding
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000
OPTIONS
19.519.5
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000
OPTIONNEGOTIATION
19.619.6
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000
Figure 19-7
Offer to enable
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000
Figure 19-8
Request to enable
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000
Figure 19-9
Offer to disable
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000
Figure 19-10
Request to disable
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000
Figure 19-11
Echo option example
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000
SUBOPTIONNEGOTIATION
19.719.7
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000
Figure 19-12
Example of suboption negotiation
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000
CONTROLLINGTHE
SERVER
19.819.8
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000
Figure 19-13
Example of interrupting an application program
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000
OUT-OF-BANDSIGNALING
19.919.9
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000
Figure 19-14
Out-of-band signaling
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000
ESCAPECHARACTER
19.1019.10
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000
Figure 19-15Two different interruptions
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000
MODEOF
OPERATION
19.1119.11
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000
EXAMPLES
19.1219.12
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000
Example 1Example 1
In this example, we use the default mode to show the concept and its deficiencies even though it is almost obsolete today. The client and the server negotiate the terminal type and terminal speed and then the server checks the login and password of the user. See Figure 19.16.
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000
Figure 19-16 Example1
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000
Example 2Example 2
In this example, we show how the client switches to the character mode. This requires that the client request the server to enable the SUPPRESS GO AHEAD and ECHO options. See Figure 19.17.
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000
Figure 19-17
Example 2
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000
USERINTERFACE
19.1319.13
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000
RLOGIN(REMOTE LOGIN)
19.1419.14
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000
The Rlogin process uses the TCP port 513.
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000
Figure 19-18
Connection establishment
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000
Figure 19-19
Sending ss command from the client to the server
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000
SECURITYISSUE
19.1519.15