SlideShare a Scribd company logo
1 of 41
TCP/IP Protocol Suite 1
Chapter 18Chapter 18
Upon completion you will be able to:
Remote Login:Remote Login:
TelnetTelnet
• Understand how TELNET works
• Understand the role of NVT in a TELNET communication
• Understand TELNET option and suboption negotiation
• Know how control characters are used
• Know the TELNET modes of operation
Objectives
TCP/IP Protocol Suite 2
TELNET is a general-purpose
client-server application program.
Note:Note:
TCP/IP Protocol Suite 3
18.1 CONCEPT
TELNET enables the establishment of a connection to a remote systemTELNET enables the establishment of a connection to a remote system
in such a way that the local terminal appears to be a terminal at thein such a way that the local terminal appears to be a terminal at the
remote system.remote system.
The topics discussed in this section include:The topics discussed in this section include:
Time-Sharing EnvironmentTime-Sharing Environment
LoginLogin
TCP/IP Protocol Suite 4
Figure 18.1 Local login
TCP/IP Protocol Suite 5
Figure 18.2 Remote login
TCP/IP Protocol Suite 6
18.2 NETWORK VIRTUAL
TERMINAL (NVT)
Via a universal interface called the Network Virtual Terminal (NVT)Via a universal interface called the Network Virtual Terminal (NVT)
character set, the TELNET client translates characters (data orcharacter set, the TELNET client translates characters (data or
commands) that come from the local terminal into NVT form andcommands) that come from the local terminal into NVT form and
delivers them to the network. The TELNET server translates data anddelivers them to the network. The TELNET server translates data and
commands from NVT form into the form acceptable by the remotecommands from NVT form into the form acceptable by the remote
computer.computer.
TCP/IP Protocol Suite 7
Figure 18.3 Concept of NVT
TCP/IP Protocol Suite 8
18.3 NVT CHARACTER SET
NVT uses two sets of characters, one for data and one for control. BothNVT uses two sets of characters, one for data and one for control. Both
are 8-bit bytes.are 8-bit bytes.
The topics discussed in this section include:The topics discussed in this section include:
Data CharactersData Characters
Control CharactersControl Characters
TCP/IP Protocol Suite 9
Figure 18.4 Format of data characters
TCP/IP Protocol Suite 10
Figure 18.5 Format of control characters
TCP/IP Protocol Suite 11
Table 18.1Table 18.1 Some NVT control charactersSome NVT control characters
TCP/IP Protocol Suite 12
18.4 EMBEDDING
The same connection is used by TELNET for sending both data andThe same connection is used by TELNET for sending both data and
control characters. TELNET accomplishes this by embedding the controlcontrol characters. TELNET accomplishes this by embedding the control
characters in the data stream.characters in the data stream.
TCP/IP Protocol Suite 13
Figure 18.6 An example of embedding
TCP/IP Protocol Suite 14
18.5 OPTIONS
TELNET lets the client and server negotiate options before or during theTELNET lets the client and server negotiate options before or during the
use of the service. Options are extra features available to a user with ause of the service. Options are extra features available to a user with a
more sophisticated terminal.more sophisticated terminal.
TCP/IP Protocol Suite 15
Table 18.2Table 18.2 OptionsOptions
TCP/IP Protocol Suite 16
18.6 OPTION NEGOTIATION
To use any of the options first requires option negotiation between theTo use any of the options first requires option negotiation between the
client and the server. Four control characters are used for this purpose.client and the server. Four control characters are used for this purpose.
The topics discussed in this section include:The topics discussed in this section include:
Enabling an OptionEnabling an Option
Disabling an OptionDisabling an Option
SymmetrySymmetry
TCP/IP Protocol Suite 17
Table 18.3Table 18.3 NVT character set for option negotiationNVT character set for option negotiation
TCP/IP Protocol Suite 18
Figure 18.7 Offer to enable an option
TCP/IP Protocol Suite 19
Figure 18.8 Request to enable an option
TCP/IP Protocol Suite 20
Figure 18.9 Offer to disable an option
TCP/IP Protocol Suite 21
Figure 18.10 Request to disable an option
TCP/IP Protocol Suite 22
Figure 18.11 shows an example of option negotiation. In this
example, the client wants the server to echo each character
sent to the server. In other words, when a character is typed at
the user keyboard terminal, it goes to the server and is sent
back to the screen of the user before being processed. The echo
option is enabled by the server because it is the server that
sends the characters back to the user terminal. Therefore, the
client should request from the server the enabling of the option
using DO. The request consists of three characters: IAC, DO,
and ECHO. The server accepts the request and enables the
option. It informs the client by sending the three character
approval: IAC, WILL, and ECHO.
ExamplE 1
See Next Slide
TCP/IP Protocol Suite 23
Figure 18.11 Example 1: Echo option
TCP/IP Protocol Suite 24
18.7 SUBOPTION NEGOTIATION
Some options require additional information. The client and serverSome options require additional information. The client and server
agree through a process called suboption negotiation.agree through a process called suboption negotiation.
TCP/IP Protocol Suite 25
Table 18.4Table 18.4 NVT character set for suboption negotiationNVT character set for suboption negotiation
TCP/IP Protocol Suite 26
Figure 18.12 Example of suboption negotiation
TCP/IP Protocol Suite 27
18.8 CONTROLLING THE SERVER
Control characters can be used to control the remote server.Control characters can be used to control the remote server.
TCP/IP Protocol Suite 28
Table 18.5Table 18.5 Characters used to control the applicationCharacters used to control the application
program running on remote serverprogram running on remote server
TCP/IP Protocol Suite 29
Figure 18.13 Example of interrupting an application program
TCP/IP Protocol Suite 30
18.9 OUT-OF-BAND SIGNALING
To make control characters effective in special situations, TELNET usesTo make control characters effective in special situations, TELNET uses
out-of-band signaling, a technique in which the control characters areout-of-band signaling, a technique in which the control characters are
preceded by IAC and are sent out of order to the remote process.preceded by IAC and are sent out of order to the remote process.
TCP/IP Protocol Suite 31
Figure 18.14 Out-of-band signaling
TCP/IP Protocol Suite 32
18.10 ESCAPE CHARACTER
When a user wants characters interpreted by the client instead of theWhen a user wants characters interpreted by the client instead of the
server, he can use an escape character, normally Ctrl+] (shown as ^]).server, he can use an escape character, normally Ctrl+] (shown as ^]).
TCP/IP Protocol Suite 33
Figure 18.15 Two different interruptions
TCP/IP Protocol Suite 34
18.11 MODE OF OPERATION
Most TELNET implementations operate in one of three modes: defaultMost TELNET implementations operate in one of three modes: default
mode, character mode, or line mode.mode, character mode, or line mode.
The topics discussed in this section include:The topics discussed in this section include:
Default ModeDefault Mode
Character ModeCharacter Mode
Line ModeLine Mode
TCP/IP Protocol Suite 35
In this example, we use the default mode to show the concept
and its deficiencies even though it is almost obsolete today. The
client and the server negotiate the terminal type and terminal
speed and then the server checks the login and password of the
user (see Figure 18.16).
ExamplE 2
See Next Slide
TCP/IP Protocol Suite 36
Figure 18.16 Example 2
TCP/IP Protocol Suite 37
In this example, we show how the client switches to the
character mode. This requires that the client request the server
to enable the SUPPRESS GO AHEAD and ECHO options (see
Figure 18.17).
ExamplE 3
See Next Slide
TCP/IP Protocol Suite 38
Figure 18.17 Example 3
TCP/IP Protocol Suite 39
18.12 USER INTERFACE
The operating system (UNIX, for example) defines an interface toThe operating system (UNIX, for example) defines an interface to
TELNET with user-friendly commands. The interface is responsible forTELNET with user-friendly commands. The interface is responsible for
translating the user-friendly commands to the TELNET commands.translating the user-friendly commands to the TELNET commands.
TCP/IP Protocol Suite 40
Table 18.6Table 18.6 Examples of interface commandsExamples of interface commands
TCP/IP Protocol Suite 41
18.13 SECURITY ISSUE
TELNET suffers from security problems. TELNET requires a loginTELNET suffers from security problems. TELNET requires a login
name and password (when exchanging text). A microcomputername and password (when exchanging text). A microcomputer
connected to a broadcast LAN can easily eavesdrop using snooperconnected to a broadcast LAN can easily eavesdrop using snooper
software to capture a login name and the corresponding password (evensoftware to capture a login name and the corresponding password (even
if it is encrypted).if it is encrypted).

More Related Content

What's hot (20)

Computer networks a tanenbaum - 5th editionee
Computer networks   a tanenbaum - 5th editioneeComputer networks   a tanenbaum - 5th editionee
Computer networks a tanenbaum - 5th editionee
 
Domain name system
Domain name systemDomain name system
Domain name system
 
Network servers
Network serversNetwork servers
Network servers
 
Memory mapped I/O and Isolated I/O
Memory mapped I/O and Isolated I/OMemory mapped I/O and Isolated I/O
Memory mapped I/O and Isolated I/O
 
Instruction format
Instruction formatInstruction format
Instruction format
 
Telnet ppt
Telnet pptTelnet ppt
Telnet ppt
 
IPv4 Addressing
 IPv4 Addressing   IPv4 Addressing
IPv4 Addressing
 
Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteProtocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol Suite
 
POST’s CORRESPONDENCE PROBLEM
POST’s CORRESPONDENCE PROBLEMPOST’s CORRESPONDENCE PROBLEM
POST’s CORRESPONDENCE PROBLEM
 
Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) ppt
 
List of 8085 programs
List of 8085 programsList of 8085 programs
List of 8085 programs
 
TCP/IP
TCP/IPTCP/IP
TCP/IP
 
Data Communication and Networking
Data Communication and NetworkingData Communication and Networking
Data Communication and Networking
 
Groupware
GroupwareGroupware
Groupware
 
Cisco Packet Tracer Overview
Cisco Packet Tracer OverviewCisco Packet Tracer Overview
Cisco Packet Tracer Overview
 
VLSM (1).ppt
VLSM (1).pptVLSM (1).ppt
VLSM (1).ppt
 
Application layer : DNS
Application layer : DNSApplication layer : DNS
Application layer : DNS
 
Application layer
Application layerApplication layer
Application layer
 
Chat Application
Chat ApplicationChat Application
Chat Application
 
IP Configuration
IP ConfigurationIP Configuration
IP Configuration
 

Similar to Chap 18 telnet (20)

Telnethappy
TelnethappyTelnethappy
Telnethappy
 
Meeting 5.1 : telnet
Meeting 5.1 : telnetMeeting 5.1 : telnet
Meeting 5.1 : telnet
 
User datagram protocol
User datagram protocolUser datagram protocol
User datagram protocol
 
Chap 11
Chap 11Chap 11
Chap 11
 
Transportlayer.ppt
Transportlayer.pptTransportlayer.ppt
Transportlayer.ppt
 
Chap 13
Chap 13Chap 13
Chap 13
 
Icmp
IcmpIcmp
Icmp
 
Icmp
IcmpIcmp
Icmp
 
CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5
 
IGMP.ppt
IGMP.pptIGMP.ppt
IGMP.ppt
 
Chap 10 igmp
Chap 10 igmpChap 10 igmp
Chap 10 igmp
 
Chap 11 udp
Chap 11 udpChap 11 udp
Chap 11 udp
 
Ccna v5-S1-Chapter 7
Ccna v5-S1-Chapter 7Ccna v5-S1-Chapter 7
Ccna v5-S1-Chapter 7
 
Chap 12 tcp
Chap 12 tcpChap 12 tcp
Chap 12 tcp
 
Chap 12 tcp
Chap 12 tcpChap 12 tcp
Chap 12 tcp
 
Chap 02 osi model
Chap 02 osi modelChap 02 osi model
Chap 02 osi model
 
Chap 13 stream control transmission protocol
Chap 13 stream control transmission protocolChap 13 stream control transmission protocol
Chap 13 stream control transmission protocol
 
Telnet configuration
Telnet configurationTelnet configuration
Telnet configuration
 
Chap-13.ppt
Chap-13.pptChap-13.ppt
Chap-13.ppt
 
TransportLayerServices.ppt
TransportLayerServices.pptTransportLayerServices.ppt
TransportLayerServices.ppt
 

Recently uploaded

Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsNbelano25
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...EADTU
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxPooja Bhuva
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Amil baba
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxPooja Bhuva
 
How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17Celine George
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use CasesTechSoup
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsSandeep D Chaudhary
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptNishitharanjan Rout
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17Celine George
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxannathomasp01
 
Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17Celine George
 

Recently uploaded (20)

Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use Cases
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Our Environment Class 10 Science Notes pdf
Our Environment Class 10 Science Notes pdfOur Environment Class 10 Science Notes pdf
Our Environment Class 10 Science Notes pdf
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17
 

Chap 18 telnet

  • 1. TCP/IP Protocol Suite 1 Chapter 18Chapter 18 Upon completion you will be able to: Remote Login:Remote Login: TelnetTelnet • Understand how TELNET works • Understand the role of NVT in a TELNET communication • Understand TELNET option and suboption negotiation • Know how control characters are used • Know the TELNET modes of operation Objectives
  • 2. TCP/IP Protocol Suite 2 TELNET is a general-purpose client-server application program. Note:Note:
  • 3. TCP/IP Protocol Suite 3 18.1 CONCEPT TELNET enables the establishment of a connection to a remote systemTELNET enables the establishment of a connection to a remote system in such a way that the local terminal appears to be a terminal at thein such a way that the local terminal appears to be a terminal at the remote system.remote system. The topics discussed in this section include:The topics discussed in this section include: Time-Sharing EnvironmentTime-Sharing Environment LoginLogin
  • 4. TCP/IP Protocol Suite 4 Figure 18.1 Local login
  • 5. TCP/IP Protocol Suite 5 Figure 18.2 Remote login
  • 6. TCP/IP Protocol Suite 6 18.2 NETWORK VIRTUAL TERMINAL (NVT) Via a universal interface called the Network Virtual Terminal (NVT)Via a universal interface called the Network Virtual Terminal (NVT) character set, the TELNET client translates characters (data orcharacter set, the TELNET client translates characters (data or commands) that come from the local terminal into NVT form andcommands) that come from the local terminal into NVT form and delivers them to the network. The TELNET server translates data anddelivers them to the network. The TELNET server translates data and commands from NVT form into the form acceptable by the remotecommands from NVT form into the form acceptable by the remote computer.computer.
  • 7. TCP/IP Protocol Suite 7 Figure 18.3 Concept of NVT
  • 8. TCP/IP Protocol Suite 8 18.3 NVT CHARACTER SET NVT uses two sets of characters, one for data and one for control. BothNVT uses two sets of characters, one for data and one for control. Both are 8-bit bytes.are 8-bit bytes. The topics discussed in this section include:The topics discussed in this section include: Data CharactersData Characters Control CharactersControl Characters
  • 9. TCP/IP Protocol Suite 9 Figure 18.4 Format of data characters
  • 10. TCP/IP Protocol Suite 10 Figure 18.5 Format of control characters
  • 11. TCP/IP Protocol Suite 11 Table 18.1Table 18.1 Some NVT control charactersSome NVT control characters
  • 12. TCP/IP Protocol Suite 12 18.4 EMBEDDING The same connection is used by TELNET for sending both data andThe same connection is used by TELNET for sending both data and control characters. TELNET accomplishes this by embedding the controlcontrol characters. TELNET accomplishes this by embedding the control characters in the data stream.characters in the data stream.
  • 13. TCP/IP Protocol Suite 13 Figure 18.6 An example of embedding
  • 14. TCP/IP Protocol Suite 14 18.5 OPTIONS TELNET lets the client and server negotiate options before or during theTELNET lets the client and server negotiate options before or during the use of the service. Options are extra features available to a user with ause of the service. Options are extra features available to a user with a more sophisticated terminal.more sophisticated terminal.
  • 15. TCP/IP Protocol Suite 15 Table 18.2Table 18.2 OptionsOptions
  • 16. TCP/IP Protocol Suite 16 18.6 OPTION NEGOTIATION To use any of the options first requires option negotiation between theTo use any of the options first requires option negotiation between the client and the server. Four control characters are used for this purpose.client and the server. Four control characters are used for this purpose. The topics discussed in this section include:The topics discussed in this section include: Enabling an OptionEnabling an Option Disabling an OptionDisabling an Option SymmetrySymmetry
  • 17. TCP/IP Protocol Suite 17 Table 18.3Table 18.3 NVT character set for option negotiationNVT character set for option negotiation
  • 18. TCP/IP Protocol Suite 18 Figure 18.7 Offer to enable an option
  • 19. TCP/IP Protocol Suite 19 Figure 18.8 Request to enable an option
  • 20. TCP/IP Protocol Suite 20 Figure 18.9 Offer to disable an option
  • 21. TCP/IP Protocol Suite 21 Figure 18.10 Request to disable an option
  • 22. TCP/IP Protocol Suite 22 Figure 18.11 shows an example of option negotiation. In this example, the client wants the server to echo each character sent to the server. In other words, when a character is typed at the user keyboard terminal, it goes to the server and is sent back to the screen of the user before being processed. The echo option is enabled by the server because it is the server that sends the characters back to the user terminal. Therefore, the client should request from the server the enabling of the option using DO. The request consists of three characters: IAC, DO, and ECHO. The server accepts the request and enables the option. It informs the client by sending the three character approval: IAC, WILL, and ECHO. ExamplE 1 See Next Slide
  • 23. TCP/IP Protocol Suite 23 Figure 18.11 Example 1: Echo option
  • 24. TCP/IP Protocol Suite 24 18.7 SUBOPTION NEGOTIATION Some options require additional information. The client and serverSome options require additional information. The client and server agree through a process called suboption negotiation.agree through a process called suboption negotiation.
  • 25. TCP/IP Protocol Suite 25 Table 18.4Table 18.4 NVT character set for suboption negotiationNVT character set for suboption negotiation
  • 26. TCP/IP Protocol Suite 26 Figure 18.12 Example of suboption negotiation
  • 27. TCP/IP Protocol Suite 27 18.8 CONTROLLING THE SERVER Control characters can be used to control the remote server.Control characters can be used to control the remote server.
  • 28. TCP/IP Protocol Suite 28 Table 18.5Table 18.5 Characters used to control the applicationCharacters used to control the application program running on remote serverprogram running on remote server
  • 29. TCP/IP Protocol Suite 29 Figure 18.13 Example of interrupting an application program
  • 30. TCP/IP Protocol Suite 30 18.9 OUT-OF-BAND SIGNALING To make control characters effective in special situations, TELNET usesTo make control characters effective in special situations, TELNET uses out-of-band signaling, a technique in which the control characters areout-of-band signaling, a technique in which the control characters are preceded by IAC and are sent out of order to the remote process.preceded by IAC and are sent out of order to the remote process.
  • 31. TCP/IP Protocol Suite 31 Figure 18.14 Out-of-band signaling
  • 32. TCP/IP Protocol Suite 32 18.10 ESCAPE CHARACTER When a user wants characters interpreted by the client instead of theWhen a user wants characters interpreted by the client instead of the server, he can use an escape character, normally Ctrl+] (shown as ^]).server, he can use an escape character, normally Ctrl+] (shown as ^]).
  • 33. TCP/IP Protocol Suite 33 Figure 18.15 Two different interruptions
  • 34. TCP/IP Protocol Suite 34 18.11 MODE OF OPERATION Most TELNET implementations operate in one of three modes: defaultMost TELNET implementations operate in one of three modes: default mode, character mode, or line mode.mode, character mode, or line mode. The topics discussed in this section include:The topics discussed in this section include: Default ModeDefault Mode Character ModeCharacter Mode Line ModeLine Mode
  • 35. TCP/IP Protocol Suite 35 In this example, we use the default mode to show the concept and its deficiencies even though it is almost obsolete today. The client and the server negotiate the terminal type and terminal speed and then the server checks the login and password of the user (see Figure 18.16). ExamplE 2 See Next Slide
  • 36. TCP/IP Protocol Suite 36 Figure 18.16 Example 2
  • 37. TCP/IP Protocol Suite 37 In this example, we show how the client switches to the character mode. This requires that the client request the server to enable the SUPPRESS GO AHEAD and ECHO options (see Figure 18.17). ExamplE 3 See Next Slide
  • 38. TCP/IP Protocol Suite 38 Figure 18.17 Example 3
  • 39. TCP/IP Protocol Suite 39 18.12 USER INTERFACE The operating system (UNIX, for example) defines an interface toThe operating system (UNIX, for example) defines an interface to TELNET with user-friendly commands. The interface is responsible forTELNET with user-friendly commands. The interface is responsible for translating the user-friendly commands to the TELNET commands.translating the user-friendly commands to the TELNET commands.
  • 40. TCP/IP Protocol Suite 40 Table 18.6Table 18.6 Examples of interface commandsExamples of interface commands
  • 41. TCP/IP Protocol Suite 41 18.13 SECURITY ISSUE TELNET suffers from security problems. TELNET requires a loginTELNET suffers from security problems. TELNET requires a login name and password (when exchanging text). A microcomputername and password (when exchanging text). A microcomputer connected to a broadcast LAN can easily eavesdrop using snooperconnected to a broadcast LAN can easily eavesdrop using snooper software to capture a login name and the corresponding password (evensoftware to capture a login name and the corresponding password (even if it is encrypted).if it is encrypted).