Title: TELNET
1Chapter 19
TELNET and Rlogin
2CONTENTS
- CONCEPT
- NETWORK VIRTUAL TERMINAL (NVT)
- NVT CHARACTER SET
- EMBEDDING
- OPTIONS
- OPTION NEGOTIATION
- SUBOPTION NEGOTIATION
- CONTROLLING THE SERVER
- OUT-OF-BAND SIGNALING
3CONTENTS (Continued)
- ESCAPE CHARACTER
- MODE OF OPERATION
- EXAMPLES
- USER INTERFACE
- RLOGIN (REMOTE LOGIN)
- SECURITY ISSUE
4TELNET and Rlogin are general-purpose
client-server application programs.
519.1
CONCEPT
6Figure 19-1
Local login
7Figure 19-2
Remote login
819.2
NETWORK VIRTUAL TERMINAL
9Figure 19-3
NVT
1019.3
NVT CHARACTER SET
11Figure 19-4
Format of data characters
12Figure 19-5
Format of control characters
1319.4
EMBEDDING
14Figure 19-6
Embedding
1519.5
OPTIONS
1619.6
OPTION NEGOTIATION
17Figure 19-7
Offer to enable
18Figure 19-8
Request to enable
19Figure 19-9
Offer to disable
20Figure 19-10
Request to disable
21Figure 19-11
Echo option example
2219.7
SUBOPTIONNEGOTIATION
23Figure 19-12
Example of suboption negotiation
2419.8
CONTROLLING THE SERVER
25Figure 19-13
Example of interrupting an application program
2619.9
OUT-OF-BANDSIGNALING
27Figure 19-14
Out-of-band signaling
2819.10
ESCAPECHARACTER
29Figure 19-15
Two different interruptions
3019.11
MODE OF OPERATION
3119.12
EXAMPLES
32Example 1
In this example, we use the default mode to show
the concept and its deficiencies even though it
is almost obsolete today. The client and the
server negotiate the terminal type and terminal
speed and then the server checks the login and
password of the user. See Figure 19.16.
33Example1
Figure 19-16
34Example 2
In this example, we show how the client switches
to the character mode. This requires that
the client request the server to enable the
SUPPRESS GO AHEAD and ECHO options. See Figure
19.17.
35Figure 19-17
Example 2
3619.13
USER INTERFACE
3719.14
RLOGIN (REMOTE LOGIN)
38The Rlogin process uses the TCP port 513.
39Figure 19-18
Connection establishment
40Figure 19-19
Sending ss command from the client to the server
4119.15
SECURITY ISSUE