SlideShare a Scribd company logo
1 of 45
Telnet
• To Understand how TELNET works
• To Understand the role of NVT in a TELNET communication
• To Know how control characters are used
• To Know the TELNET modes of operation
Objectives
TELNET is a general-
purpose
client-server application
program.
CONCEPT
TELNET enables the establishment of a connection
to a remote system in such a way that the local
terminal appears to be a terminal at the remote
system.
Local login
Remote login
NETWORK VIRTUAL
TERMINAL (NVT)
Via a universal interface
 called the Network Virtual Terminal (NVT)
character set,
 the TELNET client translates characters (data or
commands) that come from the local terminal into
NVT form and delivers them to the network.
 The TELNET server translates data and
commands from NVT form into the form acceptable
by the remote computer.
Concept of NVT
NVT CHARACTER SET
NVT uses two sets of characters, one for data and
one for control. Both are 8-bit bytes.
The topics discussed in this section include:
Data Characters
Control Characters
Format of data characters
Format of control characters
Some NVT control characters
EMBEDDING
The same connection is used by TELNET for
sending both data and control characters. TELNET
accomplishes this by embedding the control
characters in the data stream.
An example of embedding
OPTIONS
TELNET lets the client and server negotiate
options before or during the use of the service.
Options are extra features available to a user with a
more sophisticated terminal.
Options
OPTION NEGOTIATION
To use any of the options first requires option
negotiation between the client and the server. Four
control characters are used for this purpose.
The topics discussed in this section include:
Enabling an Option
Disabling an Option
Symmetry
NVT character set for option negotiation
Offer to enable an option
Request to enable an option
Offer to disable an option
Request to disable an option
Figure 1 shows an example of option negotiation. In this
example, the client wants the server to echo each character
sent to the server. In other words, when a character is typed at
the user keyboard terminal, it goes to the server and is sent
back to the screen of the user before being processed. The echo
option is enabled by the server because it is the server that
sends the characters back to the user terminal. Therefore, the
client should request from the server the enabling of the option
using DO. The request consists of three characters: IAC, DO,
and ECHO. The server accepts the request and enables the
option. It informs the client by sending the three character
approval: IAC, WILL, and ECHO.
Example 1
See Next Slide
Echo option
CONTROLLING THE SERVER
Control characters can be used to control the remote server.
MODE OF OPERATION
Most TELNET implementations operate in one of three
modes:
 Default mode
 Character mode
 Line mode
In this example, we use the default mode to show the
concept and its deficiencies even though it is almost obsolete
today. The client and the server negotiate the terminal type and
terminal speed and then the server checks the login and
password of the user (see Figure 2).
Example 2
See Next Slide
Figure 2
In this example, we show how the client switches to the
character mode. This requires that the client request the server
to enable the SUPPRESS GO AHEAD and ECHO options (see
Figure 3).
Example 3
See Next Slide
Figure 3
USER INTERFACE
The operating system (UNIX, for example) defines an
interface to TELNET with user-friendly commands. The
interface is responsible for translating the user-friendly
commands to the TELNET commands.
Examples of interface commands
File Transfer Protocol
WHAT IS FTP?
• FTP works on the client/server principle. A client
program enables the user to interact with a server in
order to access information and services on the
server computer.
The FTP is a command- Response protocol.
• Files that can be transferred are stored on computers
called FTP servers. To access these files, an FTP
client program is used. This is an interface that
allows the user to locate the file(s) to be transferred
and initiate the transfer process.
• The original specification for the File Transfer
Protocol was written by Abhay Bhushan and
published as RFC 114 on 16 April 1971
MODE OF TRANSFER
• There are two modes of transfer in FTP: ascii and
binary.
• ASCII is used only for files saved in ASCII format (this
includes Postcript files)
• Binary is used for files that are formatted and saved
using a wordprocessing software like WordPerfect (.txt),
spreadsheets (.xls), images (.jpg, .gif), and many
executable programs (.exe) and videos (.avi).
BASIC STEPS TO USE FTP
• Connect to the FTP server
• Navigate the file structure to find the file you
want
• Transfer the file
• The specifics of each step will vary, depending
on the client program being used and the type
of Internet connection.
Usage of Port
• uses two TCP Ports
– one for control
– one for data transfers
Active Mode FTP
• Client connect from a random unprivileged port (n > 1023) to the
servers command port (21) and sends port command to tell server
to connect to n+1 then listens on the next higher unprivileged port
(n+1) for server responses. The server connects from it’s data port
(20) to the client data port (n+1)
Client
Server
20 21 1026 1027
1
2
3
4
Passive Mode FTP
• Client opens two random unprivileged ports ( n > 1023 and n+1; ex
1026 and 1027) and connects the first port (n) to server command
port 21 and issues a pasv command (server sends port to use for
data); client connects to servers specified data port, server
completes connection.
Client
Server
20 21 1026 1027
1
2
2024
3
4
File Structures
• Operating System store files in different structures
• FTP defined file structures for transporting files
– File F Unstructured, sequence of bytes
– Record R Series of records
– Page P Series of data blocks (pages)
• Default file structure is File (F)
• File Structure specified using STRU command
Transmission Modes
• Mode is used to specify additional coding or sequencing
performed on data
• independent of data type and file structure
– Stream S stream of bytes, if record structure
EOF sent as record indication;
if file eof indicated by closing
stream
– Block B file sent as sequence of blocks
preceded by header info allows restart
of an interruped transfer
– Compressed C data compressed using run length
encoding
FTP Commands
• USER User name, userid for access control
• PASS Password for access control
• ACCT Account info
• CWD Change working directory
• CDUP Change to parent directory
• SMNT Structure mount, mount a different file
system
• QUIT informs server that client wants out
• REIN restarts session at authentication phase
• PORT Host addr and data port to use
FTP Commands (more)
• PASV Passive; informs server that client will
contact to set up data connections, ask
server to sent port info
• TYPE Data type, type of subsequent transfers
• STRU File structure
• MODE Transfer mode
• RETR Retrieve, download the file from server
• STOR Store, upload the specified to server
• STOU Store unique, same as store but server
picks unique file name
FTP Commands (more)
• APPE Append, upload file to server, if file name
exists, append the upload
• ALLO Allocate, sometimes used to preallocate space
• REST Restart, restart an interrupted transfer
• RNFR Rename file from filename
• RNTO Rename file to
• ABOR Abort, ask server to abort last command
• DELE Delete specified file
• RMD Remove directory
• MKD Make directory
FTP Commands (more)
• PWD Print working directory
• LIST Request directory listing
• NLST Request just a file name list
• SITE Site parameters, allow client to specify
site specific options and parameters
• SYST request server operating system
• STAT Request server to send status of current
xfr
• HELP general and command specific
• NOOP ask server to send a positive reply
FTP TERMINOLOGY
• ASCII - American Standard Code for Information Interchange) -- Standard for the
code numbers used by computers to represent all the upper and lower-case Latin
letters, numbers, punctuation, tec. There are 128 standard ASCII codes each of
which can be represented by a 7 digit binary number: 0000000 through 1111111.
• BINARY - Used for files that are formatted and saved using a wordprocessing
software like WordPerfect, spreadsheets, images, and many executable
programs.
• BROWSER - A program which allows a person to read hypertext. The browser
gives some means of viewing the contents of nodes, and of navigating from one
node to another.
• FTP - (File Transfer Protocol)-a client program that enables the user to send files
from one computer to another via the telephone network with the aid of the
internet.
• LOCAL PC - your desktop computer that you will transfer files to.
• HOST - Any computer on a network that is a repository for services available to
other computers on the network..
• LOGIN - The account name used to gain access to a computer system, or the act
of entering into a computer system.
• NAVIGATION - The process of moving from one node or host to another through
the hypertext web. This is normally done by following links.
FTP TERMINOLOGY
• NODE - Any single computer connected to a network.
• PROTOCOLS - sets of communication rules that allow clients and servers
to communicate accurately with each other.
• MAIL ADDRESS - your complete e-mail address.
• SERVER - A computer, or a software package, that provides a specific kind
of service to client software running on other computers.
• INTERNET - The vast collection of inter-connected networks that all use the
TCP/IP protocols and that evolved from the ARPANET of the late 60’s and
70’s.
• TCP/IP - Transmission Control Protocl/Internet Protocol -- /tus us te syute if
oriticiks that defines the Internet. To be truly on the Internet, your computer
must have TCP/IP software.
• ANONYMOUS FTP - Allows a user to retrieve documents, files, programs,
and other archived data from anywhere in the Internet without having to
establish a userid and password. By using the special userid of
“anonymous” the network user will bypass local security checks and will
have access to publicly accessible files on the remote system.
FTP TERMINOLOGY
(CONT.)
• VIRUS PROGRAMS -viruses are small, invasive programs that are
designed to create havoc within your computer systems. There is software
to protect your computer from viruses. If you plan to swap disks with others,
the first software program you should install should be a virus protection
program.
• TELNET - The command and program used to login from one Internet site
to another. The telnet command/program gets you to the “login” prompt of
another host.
• CLIENT - A software program that is used to contact and obtain data from a
Server software program on another computer, often across a great
distance. Each Client program is designed to work with one or more
specific kinds of Server programs, and each Server requires a specific kind
of Client.
• VIRUS - A program which replicates itself on computer systems by
incorporating itself into other programs which are shared among computer
systems.
• ARCHIVE SITE - A machine that provides access to a collection of files
across the Internet.
• USER ID - On most host systems, the first time you connect you are asked
to supply a one-word user name. This can be any combination of letters
and numbers. This is usally also your e-mail name.
FTP QUESTIONNAIRE
( & ANSWERS)
• Define FTP
• File Transfer Protocol - the ability to send files from one computer to another via the
telephone network with the aid of the internet.
• What is the command in FTP to change directories?
cd or lcd
• What is the command to list your files?
dir or ls
• What is the difference between ASCII and Binary files?
ASCII is used only for files saved in ASCII format and Binary is used for files that are
formatted and saved using a Word Processing software.
• What type of file is a file with the extension:
.exe? executable
.txt? text
.jpg? picture
.avi? video/movie
.zip? compressed
• What do you enter as your password when logging in as “Anonymous”?
Your total e-mail address
• What safety measures should you take before downloading files from the Internet?
Be sure to have virus detection software loaded on your computer before downloading
files to be sure you don’t infect your computer with a virus.

More Related Content

What's hot

What's hot (20)

Telnet ppt
Telnet pptTelnet ppt
Telnet ppt
 
Three Address code
Three Address code Three Address code
Three Address code
 
Lecture 7 -_ftp,_tftp,_telnet_and_ssh
Lecture 7 -_ftp,_tftp,_telnet_and_sshLecture 7 -_ftp,_tftp,_telnet_and_ssh
Lecture 7 -_ftp,_tftp,_telnet_and_ssh
 
08 Operating System Support
08  Operating  System  Support08  Operating  System  Support
08 Operating System Support
 
Tcp/ip model
Tcp/ip  modelTcp/ip  model
Tcp/ip model
 
TCP - IP Presentation
TCP - IP PresentationTCP - IP Presentation
TCP - IP Presentation
 
Simple Mail Transfer Protocol
Simple Mail Transfer ProtocolSimple Mail Transfer Protocol
Simple Mail Transfer Protocol
 
message passing
 message passing message passing
message passing
 
It 3-icmp-igmp
It 3-icmp-igmpIt 3-icmp-igmp
It 3-icmp-igmp
 
Distributed system architecture
Distributed system architectureDistributed system architecture
Distributed system architecture
 
Finite automata
Finite automataFinite automata
Finite automata
 
Transport layer protocols : TCP and UDP
Transport layer protocols  : TCP and UDPTransport layer protocols  : TCP and UDP
Transport layer protocols : TCP and UDP
 
Dqdb
DqdbDqdb
Dqdb
 
File transfer protocol
File transfer protocolFile transfer protocol
File transfer protocol
 
Formal Languages and Automata Theory unit 3
Formal Languages and Automata Theory unit 3Formal Languages and Automata Theory unit 3
Formal Languages and Automata Theory unit 3
 
Distributed concurrency control
Distributed concurrency controlDistributed concurrency control
Distributed concurrency control
 
L3 cfg
L3 cfgL3 cfg
L3 cfg
 
02 protocol architecture
02 protocol architecture02 protocol architecture
02 protocol architecture
 
Reference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IPReference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IP
 
Lecture Notes-Are Natural Languages Regular.pdf
Lecture Notes-Are Natural Languages Regular.pdfLecture Notes-Are Natural Languages Regular.pdf
Lecture Notes-Are Natural Languages Regular.pdf
 

Similar to Telnet and FTP.ppt

Application layer
Application layerApplication layer
Application layerNeha Kurale
 
Application layer
Application layerApplication layer
Application layerNeha Kurale
 
application layer protocol for iot.pptx
application layer protocol for iot.pptxapplication layer protocol for iot.pptx
application layer protocol for iot.pptxaravind Guru
 
File Transfer Protocol
File Transfer ProtocolFile Transfer Protocol
File Transfer Protocolguest029bcd
 
FTP-PPT.pptx
FTP-PPT.pptxFTP-PPT.pptx
FTP-PPT.pptxMemerhub1
 
Computer Networks
Computer NetworksComputer Networks
Computer NetworksShylesh BC
 
Computer network
Computer networkComputer network
Computer networkPihu Goel
 
File transfer protocol- Gowdham
File transfer protocol- GowdhamFile transfer protocol- Gowdham
File transfer protocol- GowdhamGowdham P
 
Group20 Dynamic Networks
Group20 Dynamic NetworksGroup20 Dynamic Networks
Group20 Dynamic Networkshariprasadnr
 
File Transfer Protocol
File Transfer ProtocolFile Transfer Protocol
File Transfer ProtocolVinh Nguyen
 
Iso osi and tcp-ip reference models
Iso osi and tcp-ip reference modelsIso osi and tcp-ip reference models
Iso osi and tcp-ip reference modelsbhavanatmithun
 
File tranfer protocol
File tranfer protocolFile tranfer protocol
File tranfer protocolKunalThorat9
 
Ftp: a slideshow on File transfer protocol
Ftp: a slideshow on File transfer protocol Ftp: a slideshow on File transfer protocol
Ftp: a slideshow on File transfer protocol Lina Guha Roy
 
File Transfer Protocol (FTP)
File Transfer Protocol (FTP)File Transfer Protocol (FTP)
File Transfer Protocol (FTP)AxelXrest
 

Similar to Telnet and FTP.ppt (20)

Application layer
Application layerApplication layer
Application layer
 
Application layer
Application layerApplication layer
Application layer
 
application layer protocol for iot.pptx
application layer protocol for iot.pptxapplication layer protocol for iot.pptx
application layer protocol for iot.pptx
 
FTP
FTPFTP
FTP
 
Application Layer
Application Layer Application Layer
Application Layer
 
File Transfer Protocol
File Transfer ProtocolFile Transfer Protocol
File Transfer Protocol
 
FTP-PPT.pptx
FTP-PPT.pptxFTP-PPT.pptx
FTP-PPT.pptx
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
 
Computer network
Computer networkComputer network
Computer network
 
Introduction to telnet
Introduction to telnetIntroduction to telnet
Introduction to telnet
 
File transfer protocol- Gowdham
File transfer protocol- GowdhamFile transfer protocol- Gowdham
File transfer protocol- Gowdham
 
Group20 Dynamic Networks
Group20 Dynamic NetworksGroup20 Dynamic Networks
Group20 Dynamic Networks
 
Ft pv2(1)
Ft pv2(1)Ft pv2(1)
Ft pv2(1)
 
File Transfer Protocol
File Transfer ProtocolFile Transfer Protocol
File Transfer Protocol
 
Sem 1 Ch 11
Sem 1 Ch 11Sem 1 Ch 11
Sem 1 Ch 11
 
Iso osi and tcp-ip reference models
Iso osi and tcp-ip reference modelsIso osi and tcp-ip reference models
Iso osi and tcp-ip reference models
 
File tranfer protocol
File tranfer protocolFile tranfer protocol
File tranfer protocol
 
Ftp: a slideshow on File transfer protocol
Ftp: a slideshow on File transfer protocol Ftp: a slideshow on File transfer protocol
Ftp: a slideshow on File transfer protocol
 
File Transfer Protocol (FTP)
File Transfer Protocol (FTP)File Transfer Protocol (FTP)
File Transfer Protocol (FTP)
 
patelchodu
patelchodupatelchodu
patelchodu
 

Recently uploaded

Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 

Recently uploaded (20)

Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 

Telnet and FTP.ppt

  • 1. Telnet • To Understand how TELNET works • To Understand the role of NVT in a TELNET communication • To Know how control characters are used • To Know the TELNET modes of operation Objectives
  • 2. TELNET is a general- purpose client-server application program.
  • 3. CONCEPT TELNET enables the establishment of a connection to a remote system in such a way that the local terminal appears to be a terminal at the remote system.
  • 6. NETWORK VIRTUAL TERMINAL (NVT) Via a universal interface  called the Network Virtual Terminal (NVT) character set,  the TELNET client translates characters (data or commands) that come from the local terminal into NVT form and delivers them to the network.  The TELNET server translates data and commands from NVT form into the form acceptable by the remote computer.
  • 8. NVT CHARACTER SET NVT uses two sets of characters, one for data and one for control. Both are 8-bit bytes. The topics discussed in this section include: Data Characters Control Characters
  • 9. Format of data characters Format of control characters
  • 10. Some NVT control characters
  • 11. EMBEDDING The same connection is used by TELNET for sending both data and control characters. TELNET accomplishes this by embedding the control characters in the data stream.
  • 12. An example of embedding
  • 13. OPTIONS TELNET lets the client and server negotiate options before or during the use of the service. Options are extra features available to a user with a more sophisticated terminal.
  • 15. OPTION NEGOTIATION To use any of the options first requires option negotiation between the client and the server. Four control characters are used for this purpose. The topics discussed in this section include: Enabling an Option Disabling an Option Symmetry
  • 16. NVT character set for option negotiation
  • 17. Offer to enable an option Request to enable an option
  • 18. Offer to disable an option Request to disable an option
  • 19. Figure 1 shows an example of option negotiation. In this example, the client wants the server to echo each character sent to the server. In other words, when a character is typed at the user keyboard terminal, it goes to the server and is sent back to the screen of the user before being processed. The echo option is enabled by the server because it is the server that sends the characters back to the user terminal. Therefore, the client should request from the server the enabling of the option using DO. The request consists of three characters: IAC, DO, and ECHO. The server accepts the request and enables the option. It informs the client by sending the three character approval: IAC, WILL, and ECHO. Example 1 See Next Slide
  • 21. CONTROLLING THE SERVER Control characters can be used to control the remote server.
  • 22. MODE OF OPERATION Most TELNET implementations operate in one of three modes:  Default mode  Character mode  Line mode
  • 23. In this example, we use the default mode to show the concept and its deficiencies even though it is almost obsolete today. The client and the server negotiate the terminal type and terminal speed and then the server checks the login and password of the user (see Figure 2). Example 2 See Next Slide
  • 25. In this example, we show how the client switches to the character mode. This requires that the client request the server to enable the SUPPRESS GO AHEAD and ECHO options (see Figure 3). Example 3 See Next Slide
  • 27. USER INTERFACE The operating system (UNIX, for example) defines an interface to TELNET with user-friendly commands. The interface is responsible for translating the user-friendly commands to the TELNET commands.
  • 30. WHAT IS FTP? • FTP works on the client/server principle. A client program enables the user to interact with a server in order to access information and services on the server computer. The FTP is a command- Response protocol. • Files that can be transferred are stored on computers called FTP servers. To access these files, an FTP client program is used. This is an interface that allows the user to locate the file(s) to be transferred and initiate the transfer process. • The original specification for the File Transfer Protocol was written by Abhay Bhushan and published as RFC 114 on 16 April 1971
  • 31. MODE OF TRANSFER • There are two modes of transfer in FTP: ascii and binary. • ASCII is used only for files saved in ASCII format (this includes Postcript files) • Binary is used for files that are formatted and saved using a wordprocessing software like WordPerfect (.txt), spreadsheets (.xls), images (.jpg, .gif), and many executable programs (.exe) and videos (.avi).
  • 32. BASIC STEPS TO USE FTP • Connect to the FTP server • Navigate the file structure to find the file you want • Transfer the file • The specifics of each step will vary, depending on the client program being used and the type of Internet connection.
  • 33. Usage of Port • uses two TCP Ports – one for control – one for data transfers
  • 34. Active Mode FTP • Client connect from a random unprivileged port (n > 1023) to the servers command port (21) and sends port command to tell server to connect to n+1 then listens on the next higher unprivileged port (n+1) for server responses. The server connects from it’s data port (20) to the client data port (n+1) Client Server 20 21 1026 1027 1 2 3 4
  • 35. Passive Mode FTP • Client opens two random unprivileged ports ( n > 1023 and n+1; ex 1026 and 1027) and connects the first port (n) to server command port 21 and issues a pasv command (server sends port to use for data); client connects to servers specified data port, server completes connection. Client Server 20 21 1026 1027 1 2 2024 3 4
  • 36. File Structures • Operating System store files in different structures • FTP defined file structures for transporting files – File F Unstructured, sequence of bytes – Record R Series of records – Page P Series of data blocks (pages) • Default file structure is File (F) • File Structure specified using STRU command
  • 37. Transmission Modes • Mode is used to specify additional coding or sequencing performed on data • independent of data type and file structure – Stream S stream of bytes, if record structure EOF sent as record indication; if file eof indicated by closing stream – Block B file sent as sequence of blocks preceded by header info allows restart of an interruped transfer – Compressed C data compressed using run length encoding
  • 38. FTP Commands • USER User name, userid for access control • PASS Password for access control • ACCT Account info • CWD Change working directory • CDUP Change to parent directory • SMNT Structure mount, mount a different file system • QUIT informs server that client wants out • REIN restarts session at authentication phase • PORT Host addr and data port to use
  • 39. FTP Commands (more) • PASV Passive; informs server that client will contact to set up data connections, ask server to sent port info • TYPE Data type, type of subsequent transfers • STRU File structure • MODE Transfer mode • RETR Retrieve, download the file from server • STOR Store, upload the specified to server • STOU Store unique, same as store but server picks unique file name
  • 40. FTP Commands (more) • APPE Append, upload file to server, if file name exists, append the upload • ALLO Allocate, sometimes used to preallocate space • REST Restart, restart an interrupted transfer • RNFR Rename file from filename • RNTO Rename file to • ABOR Abort, ask server to abort last command • DELE Delete specified file • RMD Remove directory • MKD Make directory
  • 41. FTP Commands (more) • PWD Print working directory • LIST Request directory listing • NLST Request just a file name list • SITE Site parameters, allow client to specify site specific options and parameters • SYST request server operating system • STAT Request server to send status of current xfr • HELP general and command specific • NOOP ask server to send a positive reply
  • 42. FTP TERMINOLOGY • ASCII - American Standard Code for Information Interchange) -- Standard for the code numbers used by computers to represent all the upper and lower-case Latin letters, numbers, punctuation, tec. There are 128 standard ASCII codes each of which can be represented by a 7 digit binary number: 0000000 through 1111111. • BINARY - Used for files that are formatted and saved using a wordprocessing software like WordPerfect, spreadsheets, images, and many executable programs. • BROWSER - A program which allows a person to read hypertext. The browser gives some means of viewing the contents of nodes, and of navigating from one node to another. • FTP - (File Transfer Protocol)-a client program that enables the user to send files from one computer to another via the telephone network with the aid of the internet. • LOCAL PC - your desktop computer that you will transfer files to. • HOST - Any computer on a network that is a repository for services available to other computers on the network.. • LOGIN - The account name used to gain access to a computer system, or the act of entering into a computer system. • NAVIGATION - The process of moving from one node or host to another through the hypertext web. This is normally done by following links.
  • 43. FTP TERMINOLOGY • NODE - Any single computer connected to a network. • PROTOCOLS - sets of communication rules that allow clients and servers to communicate accurately with each other. • MAIL ADDRESS - your complete e-mail address. • SERVER - A computer, or a software package, that provides a specific kind of service to client software running on other computers. • INTERNET - The vast collection of inter-connected networks that all use the TCP/IP protocols and that evolved from the ARPANET of the late 60’s and 70’s. • TCP/IP - Transmission Control Protocl/Internet Protocol -- /tus us te syute if oriticiks that defines the Internet. To be truly on the Internet, your computer must have TCP/IP software. • ANONYMOUS FTP - Allows a user to retrieve documents, files, programs, and other archived data from anywhere in the Internet without having to establish a userid and password. By using the special userid of “anonymous” the network user will bypass local security checks and will have access to publicly accessible files on the remote system.
  • 44. FTP TERMINOLOGY (CONT.) • VIRUS PROGRAMS -viruses are small, invasive programs that are designed to create havoc within your computer systems. There is software to protect your computer from viruses. If you plan to swap disks with others, the first software program you should install should be a virus protection program. • TELNET - The command and program used to login from one Internet site to another. The telnet command/program gets you to the “login” prompt of another host. • CLIENT - A software program that is used to contact and obtain data from a Server software program on another computer, often across a great distance. Each Client program is designed to work with one or more specific kinds of Server programs, and each Server requires a specific kind of Client. • VIRUS - A program which replicates itself on computer systems by incorporating itself into other programs which are shared among computer systems. • ARCHIVE SITE - A machine that provides access to a collection of files across the Internet. • USER ID - On most host systems, the first time you connect you are asked to supply a one-word user name. This can be any combination of letters and numbers. This is usally also your e-mail name.
  • 45. FTP QUESTIONNAIRE ( & ANSWERS) • Define FTP • File Transfer Protocol - the ability to send files from one computer to another via the telephone network with the aid of the internet. • What is the command in FTP to change directories? cd or lcd • What is the command to list your files? dir or ls • What is the difference between ASCII and Binary files? ASCII is used only for files saved in ASCII format and Binary is used for files that are formatted and saved using a Word Processing software. • What type of file is a file with the extension: .exe? executable .txt? text .jpg? picture .avi? video/movie .zip? compressed • What do you enter as your password when logging in as “Anonymous”? Your total e-mail address • What safety measures should you take before downloading files from the Internet? Be sure to have virus detection software loaded on your computer before downloading files to be sure you don’t infect your computer with a virus.