SlideShare a Scribd company logo
CChhaapptteerr 1188 
RReemmoottee LLooggiinn:: 
TTeellnneett 
Objectives 
Upon completion you will be able to: 
• Understand how TELNET works 
• Understand the role of NVT in a TELNET communication 
• Understand TELNET option and suboption negotiation 
• Know how control characters are used 
• Know the TELNET modes of operation 
TCP/IP Protocol Suite 1
NNoottee:: 
TELNET is a general-purpose 
client-server application program. 
TCP/IP Protocol Suite 2
18.1 CONCEPT 
TELNET enables the establishment of a connection ttoo aa rreemmoottee ssyysstteemm 
iinn ssuucchh aa wwaayy tthhaatt tthhee llooccaall tteerrmmiinnaall aappppeeaarrss ttoo bbee aa tteerrmmiinnaall aatt tthhee 
rreemmoottee ssyysstteemm.. 
TThhee ttooppiiccss ddiissccuusssseedd iinn tthhiiss sseeccttiioonn iinncclluuddee:: 
TTiimmee--SShhaarriinngg EEnnvviirroonnmmeenntt 
LLooggiinn 
TCP/IP Protocol Suite 3
Figure 18.1 Local login 
TCP/IP Protocol Suite 4
Figure 18.2 Remote login 
TCP/IP Protocol Suite 5
18.2 NETWORK VIRTUAL 
TERMINAL (NVT) 
Via a universal interface called the Network Virtual TTeerrmmiinnaall ((NNVVTT)) 
cchhaarraacctteerr sseett,, tthhee TTEELLNNEETT cclliieenntt ttrraannssllaatteess cchhaarraacctteerrss ((ddaattaa oorr 
ccoommmmaannddss)) tthhaatt ccoommee ffrroomm tthhee llooccaall tteerrmmiinnaall iinnttoo NNVVTT ffoorrmm aanndd 
ddeelliivveerrss tthheemm ttoo tthhee nneettwwoorrkk.. TThhee TTEELLNNEETT sseerrvveerr ttrraannssllaatteess ddaattaa aanndd 
ccoommmmaannddss ffrroomm NNVVTT ffoorrmm iinnttoo tthhee ffoorrmm aacccceeppttaabbllee bbyy tthhee rreemmoottee 
ccoommppuutteerr.. 
TCP/IP Protocol Suite 6
Figure 18.3 Concept of NVT 
TCP/IP Protocol Suite 7
18.3 NVT CHARACTER SET 
NVT uses two sets of characters, one for data and oonnee ffoorr ccoonnttrrooll.. BBootthh 
aarree 88--bbiitt bbyytteess.. 
TThhee ttooppiiccss ddiissccuusssseedd iinn tthhiiss sseeccttiioonn iinncclluuddee:: 
DDaattaa CChhaarraacctteerrss 
CCoonnttrrooll CChhaarraacctteerrss 
TCP/IP Protocol Suite 8
Figure 18.4 Format of data characters 
TCP/IP Protocol Suite 9
Figure 18.5 Format of control characters 
TCP/IP Protocol Suite 10
TTaabbllee 1188..11 SSoommee NNVVTT ccoonnttrrooll cchhaarraacctteerrss 
TCP/IP Protocol Suite 11
18.4 EMBEDDING 
The same connection is used by TELNET for sending bbootthh ddaattaa aanndd 
ccoonnttrrooll cchhaarraacctteerrss.. TTEELLNNEETT aaccccoommpplliisshheess tthhiiss bbyy eemmbbeeddddiinngg tthhee ccoonnttrrooll 
cchhaarraacctteerrss iinn tthhee ddaattaa ssttrreeaamm.. 
TCP/IP Protocol Suite 12
Figure 18.6 An example of embedding 
TCP/IP Protocol Suite 13
18.5 OPTIONS 
TELNET lets the client and server negotiate options bbeeffoorree oorr dduurriinngg tthhee 
uussee ooff tthhee sseerrvviiccee.. OOppttiioonnss aarree eexxttrraa ffeeaattuurreess aavvaaiillaabbllee ttoo aa uusseerr wwiitthh aa 
mmoorree ssoopphhiissttiiccaatteedd tteerrmmiinnaall.. 
TCP/IP Protocol Suite 14
TTaabbllee 1188..22 OOppttiioonnss 
TCP/IP Protocol Suite 15
18.6 OPTION NEGOTIATION 
To use any of the options first requires option negotiation bbeettwweeeenn tthhee 
cclliieenntt aanndd tthhee sseerrvveerr.. FFoouurr ccoonnttrrooll cchhaarraacctteerrss aarree uusseedd ffoorr tthhiiss ppuurrppoossee.. 
TThhee ttooppiiccss ddiissccuusssseedd iinn tthhiiss sseeccttiioonn iinncclluuddee:: 
EEnnaabblliinngg aann OOppttiioonn 
DDiissaabblliinngg aann OOppttiioonn 
SSyymmmmeettrryy 
TCP/IP Protocol Suite 16
TTaabbllee 1188..33 NNVVTT cchhaarraacctteerr sseett ffoorr ooppttiioonn nneeggoottiiaattiioonn 
TCP/IP Protocol Suite 17
Figure 18.7 Offer to enable an option 
TCP/IP Protocol Suite 18
Figure 18.8 Request to enable an option 
TCP/IP Protocol Suite 19
Figure 18.9 Offer to disable an option 
TCP/IP Protocol Suite 20
Figure 18.10 Request to disable an option 
TCP/IP Protocol Suite 21
ExamplE 1 
Figure 18.11 shows an example of option negotiation. In this 
example, the client wants the server to echo each character 
sent to the server. In other words, when a character is typed at 
the user keyboard terminal, it goes to the server and is sent 
back to the screen of the user before being processed. The echo 
option is enabled by the server because it is the server that 
sends the characters back to the user terminal. Therefore, the 
client should request from the server the enabling of the option 
using DO. The request consists of three characters: IAC, DO, 
and ECHO. The server accepts the request and enables the 
option. It informs the client by sending the three character 
approval: IAC, WILL, and ECHO. 
See Next Slide 
TCP/IP Protocol Suite 22
Figure 18.11 Example 1: Echo option 
TCP/IP Protocol Suite 23
18.7 SUBOPTION NEGOTIATION 
Some options require additional information. TThhee cclliieenntt aanndd sseerrvveerr 
aaggrreeee tthhrroouugghh aa pprroocceessss ccaalllleedd ssuubbooppttiioonn nneeggoottiiaattiioonn.. 
TCP/IP Protocol Suite 24
TTaabbllee 1188..44 NNVVTT cchhaarraacctteerr sseett ffoorr ssuubbooppttiioonn nneeggoottiiaattiioonn 
TCP/IP Protocol Suite 25
Figure 18.12 Example of suboption negotiation 
TCP/IP Protocol Suite 26
18.8 CONTROLLING THE SERVER 
Control characters can be used to control tthhee rreemmoottee sseerrvveerr.. 
TCP/IP Protocol Suite 27
TTaabbllee 1188..55 CChhaarraacctteerrss uusseedd ttoo ccoonnttrrooll tthhee aapppplliiccaattiioonn 
pprrooggrraamm rruunnnniinngg oonn rreemmoottee sseerrvveerr 
TCP/IP Protocol Suite 28
Figure 18.13 Example of interrupting an application program 
TCP/IP Protocol Suite 29
18.9 OUT-OF-BAND SIGNALING 
To make control characters effective in special ssiittuuaattiioonnss,, TTEELLNNEETT uusseess 
oouutt--ooff--bbaanndd ssiiggnnaalliinngg,, aa tteecchhnniiqquuee iinn wwhhiicchh tthhee ccoonnttrrooll cchhaarraacctteerrss aarree 
pprreecceeddeedd bbyy IIAACC aanndd aarree sseenntt oouutt ooff oorrddeerr ttoo tthhee rreemmoottee pprroocceessss.. 
TCP/IP Protocol Suite 30
Figure 18.14 Out-of-band signaling 
TCP/IP Protocol Suite 31
18.10 ESCAPE CHARACTER 
When a user wants characters interpreted by the client iinnsstteeaadd ooff tthhee 
sseerrvveerr,, hhee ccaann uussee aann eessccaappee cchhaarraacctteerr,, nnoorrmmaallllyy CCttrrll++]] ((sshhoowwnn aass ^^]])).. 
TCP/IP Protocol Suite 32
Figure 18.15 Two different interruptions 
TCP/IP Protocol Suite 33
18.11 MODE OF OPERATION 
Most TELNET implementations operate in one ooff tthhrreeee mmooddeess:: ddeeffaauulltt 
mmooddee,, cchhaarraacctteerr mmooddee,, oorr lliinnee mmooddee.. 
TThhee ttooppiiccss ddiissccuusssseedd iinn tthhiiss sseeccttiioonn iinncclluuddee:: 
DDeeffaauulltt MMooddee 
CChhaarraacctteerr MMooddee 
LLiinnee MMooddee 
TCP/IP Protocol Suite 34
ExamplE 2 
In this example, we use the default mode to show the concept 
and its deficiencies even though it is almost obsolete today. The 
client and the server negotiate the terminal type and terminal 
speed and then the server checks the login and password of the 
user (see Figure 18.16). 
See Next Slide 
TCP/IP Protocol Suite 35
Figure 18.16 Example 2 
TCP/IP Protocol Suite 36
ExamplE 3 
In this example, we show how the client switches to the 
character mode. This requires that the client request the server 
to enable the SUPPRESS GO AHEAD and ECHO options (see 
Figure 18.17). 
See Next Slide 
TCP/IP Protocol Suite 37
Figure 18.17 Example 3 
TCP/IP Protocol Suite 38
18.12 USER INTERFACE 
The operating system (UNIX, for example) defines aann iinntteerrffaaccee ttoo 
TTEELLNNEETT wwiitthh uusseerr--ffrriieennddllyy ccoommmmaannddss.. TThhee iinntteerrffaaccee iiss rreessppoonnssiibbllee ffoorr 
ttrraannssllaattiinngg tthhee uusseerr--ffrriieennddllyy ccoommmmaannddss ttoo tthhee TTEELLNNEETT ccoommmmaannddss.. 
TCP/IP Protocol Suite 39
TTaabbllee 1188..66 EExxaammpplleess ooff iinntteerrffaaccee ccoommmmaannddss 
TCP/IP Protocol Suite 40
18.13 SECURITY ISSUE 
TELNET suffers from security problems. TTEELLNNEETT rreeqquuiirreess aa llooggiinn 
nnaammee aanndd ppaasssswwoorrdd ((wwhheenn eexxcchhaannggiinngg tteexxtt).. AA mmiiccrrooccoommppuutteerr 
ccoonnnneecctteedd ttoo aa bbrrooaaddccaasstt LLAANN ccaann eeaassiillyy eeaavveessddrroopp uussiinngg ssnnooooppeerr 
ssooffttwwaarree ttoo ccaappttuurree aa llooggiinn nnaammee aanndd tthhee ccoorrrreessppoonnddiinngg ppaasssswwoorrdd ((eevveenn 
iiff iitt iiss eennccrryypptteedd).. 
TCP/IP Protocol Suite 41

More Related Content

Viewers also liked

Chap 22 www http
Chap 22 www httpChap 22 www http
Chap 22 www http
Noctorous Jamal
 
Chap 14 rip, ospf
Chap 14 rip, ospfChap 14 rip, ospf
Chap 14 rip, ospf
Noctorous Jamal
 
Chap 17 dns
Chap 17 dnsChap 17 dns
Chap 17 dns
Noctorous Jamal
 
Tftp client server communication
Tftp client server communicationTftp client server communication
Tftp client server communication
Uday Sharma
 
Chap 21 snmp
Chap 21 snmpChap 21 snmp
Chap 21 snmp
Noctorous Jamal
 
Chap 13 stream control transmission protocol
Chap 13 stream control transmission protocolChap 13 stream control transmission protocol
Chap 13 stream control transmission protocol
Noctorous Jamal
 
Chap 19 ftp & tftp
Chap 19 ftp & tftpChap 19 ftp & tftp
Chap 19 ftp & tftp
Noctorous Jamal
 
TFTP - Trivial File Transfer Protocol
TFTP - Trivial File Transfer ProtocolTFTP - Trivial File Transfer Protocol
TFTP - Trivial File Transfer Protocol
Peter R. Egli
 

Viewers also liked (8)

Chap 22 www http
Chap 22 www httpChap 22 www http
Chap 22 www http
 
Chap 14 rip, ospf
Chap 14 rip, ospfChap 14 rip, ospf
Chap 14 rip, ospf
 
Chap 17 dns
Chap 17 dnsChap 17 dns
Chap 17 dns
 
Tftp client server communication
Tftp client server communicationTftp client server communication
Tftp client server communication
 
Chap 21 snmp
Chap 21 snmpChap 21 snmp
Chap 21 snmp
 
Chap 13 stream control transmission protocol
Chap 13 stream control transmission protocolChap 13 stream control transmission protocol
Chap 13 stream control transmission protocol
 
Chap 19 ftp & tftp
Chap 19 ftp & tftpChap 19 ftp & tftp
Chap 19 ftp & tftp
 
TFTP - Trivial File Transfer Protocol
TFTP - Trivial File Transfer ProtocolTFTP - Trivial File Transfer Protocol
TFTP - Trivial File Transfer Protocol
 

More from Noctorous Jamal

Chap 28 security
Chap 28 securityChap 28 security
Chap 28 security
Noctorous Jamal
 
Chap 27 next generation i pv6
Chap 27 next generation i pv6Chap 27 next generation i pv6
Chap 27 next generation i pv6
Noctorous Jamal
 
Chap 25 multimedia
Chap 25 multimediaChap 25 multimedia
Chap 25 multimedia
Noctorous Jamal
 
Chap 24 mobile ip
Chap 24 mobile ipChap 24 mobile ip
Chap 24 mobile ip
Noctorous Jamal
 
Chap 23 ip over atm
Chap 23 ip over atmChap 23 ip over atm
Chap 23 ip over atm
Noctorous Jamal
 
Chap 12 tcp
Chap 12 tcpChap 12 tcp
Chap 12 tcp
Noctorous Jamal
 
Chap 11 udp
Chap 11 udpChap 11 udp
Chap 11 udp
Noctorous Jamal
 
Chap 10 igmp
Chap 10 igmpChap 10 igmp
Chap 10 igmp
Noctorous Jamal
 
Chap 09 icmp
Chap 09 icmpChap 09 icmp
Chap 09 icmp
Noctorous Jamal
 
Chap 08 ip
Chap 08 ipChap 08 ip
Chap 08 ip
Noctorous Jamal
 
Chap 07 arp & rarp
Chap 07 arp & rarpChap 07 arp & rarp
Chap 07 arp & rarp
Noctorous Jamal
 
Chap 06 delivery and routing of ip packets
Chap 06 delivery and routing of ip packetsChap 06 delivery and routing of ip packets
Chap 06 delivery and routing of ip packets
Noctorous Jamal
 
Chap 05 ip addresses classfless
Chap 05 ip addresses classflessChap 05 ip addresses classfless
Chap 05 ip addresses classfless
Noctorous Jamal
 
Chap 04 ip addresses classful
Chap 04 ip addresses classfulChap 04 ip addresses classful
Chap 04 ip addresses classful
Noctorous Jamal
 
Chap 02 osi model
Chap 02 osi modelChap 02 osi model
Chap 02 osi model
Noctorous Jamal
 
Lecture 8 The Communication System Finalterm Slides
Lecture 8  The Communication System Finalterm SlidesLecture 8  The Communication System Finalterm Slides
Lecture 8 The Communication System Finalterm Slides
Noctorous Jamal
 
Lecture 7 The Communication System Finalterm Slides
Lecture 7  The Communication System Finalterm SlidesLecture 7  The Communication System Finalterm Slides
Lecture 7 The Communication System Finalterm Slides
Noctorous Jamal
 
Lecture 6 The Communication System Finalterm Slides
Lecture 6  The Communication System Finalterm SlidesLecture 6  The Communication System Finalterm Slides
Lecture 6 The Communication System Finalterm Slides
Noctorous Jamal
 

More from Noctorous Jamal (18)

Chap 28 security
Chap 28 securityChap 28 security
Chap 28 security
 
Chap 27 next generation i pv6
Chap 27 next generation i pv6Chap 27 next generation i pv6
Chap 27 next generation i pv6
 
Chap 25 multimedia
Chap 25 multimediaChap 25 multimedia
Chap 25 multimedia
 
Chap 24 mobile ip
Chap 24 mobile ipChap 24 mobile ip
Chap 24 mobile ip
 
Chap 23 ip over atm
Chap 23 ip over atmChap 23 ip over atm
Chap 23 ip over atm
 
Chap 12 tcp
Chap 12 tcpChap 12 tcp
Chap 12 tcp
 
Chap 11 udp
Chap 11 udpChap 11 udp
Chap 11 udp
 
Chap 10 igmp
Chap 10 igmpChap 10 igmp
Chap 10 igmp
 
Chap 09 icmp
Chap 09 icmpChap 09 icmp
Chap 09 icmp
 
Chap 08 ip
Chap 08 ipChap 08 ip
Chap 08 ip
 
Chap 07 arp & rarp
Chap 07 arp & rarpChap 07 arp & rarp
Chap 07 arp & rarp
 
Chap 06 delivery and routing of ip packets
Chap 06 delivery and routing of ip packetsChap 06 delivery and routing of ip packets
Chap 06 delivery and routing of ip packets
 
Chap 05 ip addresses classfless
Chap 05 ip addresses classflessChap 05 ip addresses classfless
Chap 05 ip addresses classfless
 
Chap 04 ip addresses classful
Chap 04 ip addresses classfulChap 04 ip addresses classful
Chap 04 ip addresses classful
 
Chap 02 osi model
Chap 02 osi modelChap 02 osi model
Chap 02 osi model
 
Lecture 8 The Communication System Finalterm Slides
Lecture 8  The Communication System Finalterm SlidesLecture 8  The Communication System Finalterm Slides
Lecture 8 The Communication System Finalterm Slides
 
Lecture 7 The Communication System Finalterm Slides
Lecture 7  The Communication System Finalterm SlidesLecture 7  The Communication System Finalterm Slides
Lecture 7 The Communication System Finalterm Slides
 
Lecture 6 The Communication System Finalterm Slides
Lecture 6  The Communication System Finalterm SlidesLecture 6  The Communication System Finalterm Slides
Lecture 6 The Communication System Finalterm Slides
 

Chap 18 telnet

  • 1. CChhaapptteerr 1188 RReemmoottee LLooggiinn:: TTeellnneett Objectives Upon completion you will be able to: • Understand how TELNET works • Understand the role of NVT in a TELNET communication • Understand TELNET option and suboption negotiation • Know how control characters are used • Know the TELNET modes of operation TCP/IP Protocol Suite 1
  • 2. NNoottee:: TELNET is a general-purpose client-server application program. TCP/IP Protocol Suite 2
  • 3. 18.1 CONCEPT TELNET enables the establishment of a connection ttoo aa rreemmoottee ssyysstteemm iinn ssuucchh aa wwaayy tthhaatt tthhee llooccaall tteerrmmiinnaall aappppeeaarrss ttoo bbee aa tteerrmmiinnaall aatt tthhee rreemmoottee ssyysstteemm.. TThhee ttooppiiccss ddiissccuusssseedd iinn tthhiiss sseeccttiioonn iinncclluuddee:: TTiimmee--SShhaarriinngg EEnnvviirroonnmmeenntt LLooggiinn TCP/IP Protocol Suite 3
  • 4. Figure 18.1 Local login TCP/IP Protocol Suite 4
  • 5. Figure 18.2 Remote login TCP/IP Protocol Suite 5
  • 6. 18.2 NETWORK VIRTUAL TERMINAL (NVT) Via a universal interface called the Network Virtual TTeerrmmiinnaall ((NNVVTT)) cchhaarraacctteerr sseett,, tthhee TTEELLNNEETT cclliieenntt ttrraannssllaatteess cchhaarraacctteerrss ((ddaattaa oorr ccoommmmaannddss)) tthhaatt ccoommee ffrroomm tthhee llooccaall tteerrmmiinnaall iinnttoo NNVVTT ffoorrmm aanndd ddeelliivveerrss tthheemm ttoo tthhee nneettwwoorrkk.. TThhee TTEELLNNEETT sseerrvveerr ttrraannssllaatteess ddaattaa aanndd ccoommmmaannddss ffrroomm NNVVTT ffoorrmm iinnttoo tthhee ffoorrmm aacccceeppttaabbllee bbyy tthhee rreemmoottee ccoommppuutteerr.. TCP/IP Protocol Suite 6
  • 7. Figure 18.3 Concept of NVT TCP/IP Protocol Suite 7
  • 8. 18.3 NVT CHARACTER SET NVT uses two sets of characters, one for data and oonnee ffoorr ccoonnttrrooll.. BBootthh aarree 88--bbiitt bbyytteess.. TThhee ttooppiiccss ddiissccuusssseedd iinn tthhiiss sseeccttiioonn iinncclluuddee:: DDaattaa CChhaarraacctteerrss CCoonnttrrooll CChhaarraacctteerrss TCP/IP Protocol Suite 8
  • 9. Figure 18.4 Format of data characters TCP/IP Protocol Suite 9
  • 10. Figure 18.5 Format of control characters TCP/IP Protocol Suite 10
  • 11. TTaabbllee 1188..11 SSoommee NNVVTT ccoonnttrrooll cchhaarraacctteerrss TCP/IP Protocol Suite 11
  • 12. 18.4 EMBEDDING The same connection is used by TELNET for sending bbootthh ddaattaa aanndd ccoonnttrrooll cchhaarraacctteerrss.. TTEELLNNEETT aaccccoommpplliisshheess tthhiiss bbyy eemmbbeeddddiinngg tthhee ccoonnttrrooll cchhaarraacctteerrss iinn tthhee ddaattaa ssttrreeaamm.. TCP/IP Protocol Suite 12
  • 13. Figure 18.6 An example of embedding TCP/IP Protocol Suite 13
  • 14. 18.5 OPTIONS TELNET lets the client and server negotiate options bbeeffoorree oorr dduurriinngg tthhee uussee ooff tthhee sseerrvviiccee.. OOppttiioonnss aarree eexxttrraa ffeeaattuurreess aavvaaiillaabbllee ttoo aa uusseerr wwiitthh aa mmoorree ssoopphhiissttiiccaatteedd tteerrmmiinnaall.. TCP/IP Protocol Suite 14
  • 15. TTaabbllee 1188..22 OOppttiioonnss TCP/IP Protocol Suite 15
  • 16. 18.6 OPTION NEGOTIATION To use any of the options first requires option negotiation bbeettwweeeenn tthhee cclliieenntt aanndd tthhee sseerrvveerr.. FFoouurr ccoonnttrrooll cchhaarraacctteerrss aarree uusseedd ffoorr tthhiiss ppuurrppoossee.. TThhee ttooppiiccss ddiissccuusssseedd iinn tthhiiss sseeccttiioonn iinncclluuddee:: EEnnaabblliinngg aann OOppttiioonn DDiissaabblliinngg aann OOppttiioonn SSyymmmmeettrryy TCP/IP Protocol Suite 16
  • 17. TTaabbllee 1188..33 NNVVTT cchhaarraacctteerr sseett ffoorr ooppttiioonn nneeggoottiiaattiioonn TCP/IP Protocol Suite 17
  • 18. Figure 18.7 Offer to enable an option TCP/IP Protocol Suite 18
  • 19. Figure 18.8 Request to enable an option TCP/IP Protocol Suite 19
  • 20. Figure 18.9 Offer to disable an option TCP/IP Protocol Suite 20
  • 21. Figure 18.10 Request to disable an option TCP/IP Protocol Suite 21
  • 22. ExamplE 1 Figure 18.11 shows an example of option negotiation. In this example, the client wants the server to echo each character sent to the server. In other words, when a character is typed at the user keyboard terminal, it goes to the server and is sent back to the screen of the user before being processed. The echo option is enabled by the server because it is the server that sends the characters back to the user terminal. Therefore, the client should request from the server the enabling of the option using DO. The request consists of three characters: IAC, DO, and ECHO. The server accepts the request and enables the option. It informs the client by sending the three character approval: IAC, WILL, and ECHO. See Next Slide TCP/IP Protocol Suite 22
  • 23. Figure 18.11 Example 1: Echo option TCP/IP Protocol Suite 23
  • 24. 18.7 SUBOPTION NEGOTIATION Some options require additional information. TThhee cclliieenntt aanndd sseerrvveerr aaggrreeee tthhrroouugghh aa pprroocceessss ccaalllleedd ssuubbooppttiioonn nneeggoottiiaattiioonn.. TCP/IP Protocol Suite 24
  • 25. TTaabbllee 1188..44 NNVVTT cchhaarraacctteerr sseett ffoorr ssuubbooppttiioonn nneeggoottiiaattiioonn TCP/IP Protocol Suite 25
  • 26. Figure 18.12 Example of suboption negotiation TCP/IP Protocol Suite 26
  • 27. 18.8 CONTROLLING THE SERVER Control characters can be used to control tthhee rreemmoottee sseerrvveerr.. TCP/IP Protocol Suite 27
  • 28. TTaabbllee 1188..55 CChhaarraacctteerrss uusseedd ttoo ccoonnttrrooll tthhee aapppplliiccaattiioonn pprrooggrraamm rruunnnniinngg oonn rreemmoottee sseerrvveerr TCP/IP Protocol Suite 28
  • 29. Figure 18.13 Example of interrupting an application program TCP/IP Protocol Suite 29
  • 30. 18.9 OUT-OF-BAND SIGNALING To make control characters effective in special ssiittuuaattiioonnss,, TTEELLNNEETT uusseess oouutt--ooff--bbaanndd ssiiggnnaalliinngg,, aa tteecchhnniiqquuee iinn wwhhiicchh tthhee ccoonnttrrooll cchhaarraacctteerrss aarree pprreecceeddeedd bbyy IIAACC aanndd aarree sseenntt oouutt ooff oorrddeerr ttoo tthhee rreemmoottee pprroocceessss.. TCP/IP Protocol Suite 30
  • 31. Figure 18.14 Out-of-band signaling TCP/IP Protocol Suite 31
  • 32. 18.10 ESCAPE CHARACTER When a user wants characters interpreted by the client iinnsstteeaadd ooff tthhee sseerrvveerr,, hhee ccaann uussee aann eessccaappee cchhaarraacctteerr,, nnoorrmmaallllyy CCttrrll++]] ((sshhoowwnn aass ^^]])).. TCP/IP Protocol Suite 32
  • 33. Figure 18.15 Two different interruptions TCP/IP Protocol Suite 33
  • 34. 18.11 MODE OF OPERATION Most TELNET implementations operate in one ooff tthhrreeee mmooddeess:: ddeeffaauulltt mmooddee,, cchhaarraacctteerr mmooddee,, oorr lliinnee mmooddee.. TThhee ttooppiiccss ddiissccuusssseedd iinn tthhiiss sseeccttiioonn iinncclluuddee:: DDeeffaauulltt MMooddee CChhaarraacctteerr MMooddee LLiinnee MMooddee TCP/IP Protocol Suite 34
  • 35. ExamplE 2 In this example, we use the default mode to show the concept and its deficiencies even though it is almost obsolete today. The client and the server negotiate the terminal type and terminal speed and then the server checks the login and password of the user (see Figure 18.16). See Next Slide TCP/IP Protocol Suite 35
  • 36. Figure 18.16 Example 2 TCP/IP Protocol Suite 36
  • 37. ExamplE 3 In this example, we show how the client switches to the character mode. This requires that the client request the server to enable the SUPPRESS GO AHEAD and ECHO options (see Figure 18.17). See Next Slide TCP/IP Protocol Suite 37
  • 38. Figure 18.17 Example 3 TCP/IP Protocol Suite 38
  • 39. 18.12 USER INTERFACE The operating system (UNIX, for example) defines aann iinntteerrffaaccee ttoo TTEELLNNEETT wwiitthh uusseerr--ffrriieennddllyy ccoommmmaannddss.. TThhee iinntteerrffaaccee iiss rreessppoonnssiibbllee ffoorr ttrraannssllaattiinngg tthhee uusseerr--ffrriieennddllyy ccoommmmaannddss ttoo tthhee TTEELLNNEETT ccoommmmaannddss.. TCP/IP Protocol Suite 39
  • 40. TTaabbllee 1188..66 EExxaammpplleess ooff iinntteerrffaaccee ccoommmmaannddss TCP/IP Protocol Suite 40
  • 41. 18.13 SECURITY ISSUE TELNET suffers from security problems. TTEELLNNEETT rreeqquuiirreess aa llooggiinn nnaammee aanndd ppaasssswwoorrdd ((wwhheenn eexxcchhaannggiinngg tteexxtt).. AA mmiiccrrooccoommppuutteerr ccoonnnneecctteedd ttoo aa bbrrooaaddccaasstt LLAANN ccaann eeaassiillyy eeaavveessddrroopp uussiinngg ssnnooooppeerr ssooffttwwaarree ttoo ccaappttuurree aa llooggiinn nnaammee aanndd tthhee ccoorrrreessppoonnddiinngg ppaasssswwoorrdd ((eevveenn iiff iitt iiss eennccrryypptteedd).. TCP/IP Protocol Suite 41