Download presentation
Presentation is loading. Please wait.
1
COS 420 DAY 24
2
Agenda Assignment 5 posted Chap 22-26 Due May 4 Final exam will be take home and handed out May 4 and Due May 10 Student evaluations Latest version of Protocol Definition is better Today we will discuss Remote login and desktop
3
Project 2 Grading Meeting Timelines 10% Deliverables Program requirements Due March 30 15% late Protocol Definition Due April 13 15% Better but I hope to see improvement by May1 Working Network Application Due May 4 25% Final Paper Due May 1 25% User Manual Protocol Program requirements Technical Specifications Presentation Due May 4 10%
4
PART XXIV APPLICATIONS: REMOTE LOGIN (TELNET AND RLOGIN)
5
Remote Interaction Devised when computers used (ASCII) terminals Terminal abstraction extended to remote access over a network
6
Client-Server Interaction Client Invoked by user Forms connection to remote server Passes keystrokes from user’s keyboard to server and displays output from server on user’s screen Server Accepts connection over the network Passes incoming characters to OS as if they were typed on a local keyboard Sends output over connection to client
7
TELNET Standard protocol for remote terminal access Three basic services Defines network virtual terminal that provides standard interface Mechanism that allows client and server to negotiate options (e.g., character set) Symmetric treatment that allows either end of the connection to be a program instead of a physical keyboard and display
8
Illustration Of TELNET
9
Accommodating Heterogeneity Network Virtual Terminal (NVT) describes system-independent encoding TELNET client and server map NVT into local computer’s representation
10
Illustration Of How NVT Accommodates Heterogeneity
11
Definition Of TELNET NVT
12
TELNET NVT Control Functions
13
TELNET Commands
14
TELNET Control Sequences And TCP TELNET cannot rely on the conventional data stream alone to carry control sequences between client and server because a misbehaving application that needs to be controlled might inadvertently block the data stream. Solution: use TCP’s urgent data to send control sequences
15
TELNET Option Negotiation TELNET uses a symmetric option negotiation mechanism to allow clients and servers to reconfigure the parameters controlling their interaction. Because all TELNET software understands a basic NVT protocol, clients and servers can interoperate even if one understands options another does not.
16
Remote Login (rlogin) Invented for BSD Unix Includes facilities specifically for Unix Allows manager to configure a set of computers so that if two or more computers have same login id, X, the logins are owned by the same individual Permits other forms of authentication
17
Remote Shell (rsh) Similar to rlogin Also part of BSD Unix Allows remote execution of a single command
18
Secure Remote Login (ssh) Alternative to TELNET/rlogin Transport layer protocol with service authentication User authentication protocol Connection protocol Multiplexes multiple transfers Uses encryption for privacy
19
Port Forwarding Novel aspect of ssh Similar to NAT Permits incoming TCP connection to be forwarded across secure tunnel
20
Remote Desktop Intended for systems that have a GUI interface Allows a remote user to see screen of remote system and use mouse as well as keyboard Examples include Virtual Network Computing (VNC) http://www.realvnc.com/ Remote Desktop Protocol (RDP)
21
Summary Remote interaction allows client software to connect local keyboard and screen to remote system Standard protocol is TELNET Alternatives include rlogin, rsh, and ssh Remote desktop extends remote access to handle GUI interface
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.