McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Chapter 19 TELNET and Rlogin
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 CONTENTS CONCEPT NETWORK VIRTUAL TERMINAL (NVT) NVT CHARACTER SET EMBEDDING OPTIONS OPTION NEGOTIATION SUBOPTION NEGOTIATION CONTROLLING THE SERVER OUT-OF-BAND SIGNALING
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 CONTENTS (Continued) ESCAPE CHARACTER MODE OF OPERATION EXAMPLES USER INTERFACE RLOGIN (REMOTE LOGIN) SECURITY ISSUE
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 TELNET and Rlogin are general-purpose client-server application programs.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 CONCEPT 19.1
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Figure 19-1 Local login
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Figure 19-2 Remote login
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 NETWORK VIRTUAL TERMINAL 19.2
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Figure 19-3 NVT
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 NVT CHARACTER SET 19.3
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Figure 19-4 Format of data characters
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Figure 19-5 Format of control characters
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 EMBEDDING 19.4
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Figure 19-6 Embedding
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 OPTIONS 19.5
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 OPTION NEGOTIATION 19.6
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Figure 19-7 Offer to enable
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Figure 19-8 Request to enable
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Figure 19-9 Offer to disable
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Figure Request to disable
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Figure Echo option example
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 SUBOPTION NEGOTIATION 19.7
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Figure Example of suboption negotiation
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 CONTROLLING THE SERVER 19.8
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Figure Example of interrupting an application program
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 OUT-OF-BAND SIGNALING 19.9
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Figure Out-of-band signaling
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 ESCAPE CHARACTER 19.10
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Figure Two different interruptions
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 MODE OF OPERATION 19.11
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 EXAMPLES 19.12
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Example 1 In this example, we use the default mode to show the concept and its deficiencies even though it is almost obsolete today. The client and the server negotiate the terminal type and terminal speed and then the server checks the login and password of the user. See Figure
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Figure Example1
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Example 2 In this example, we show how the client switches to the character mode. This requires that the client request the server to enable the SUPPRESS GO AHEAD and ECHO options. See Figure
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Figure Example 2
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 USER INTERFACE 19.13
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 RLOGIN (REMOTE LOGIN) 19.14
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 The Rlogin process uses the TCP port 513.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Figure Connection establishment
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Figure Sending ss command from the client to the server
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 SECURITY ISSUE 19.15