1. Trang chủ
  2. » Tất cả

AIT 622 network architecture and protocols

15 2 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Nội dung

AIT 622 Network Architecture and Protocols Remote Login (TELNET, SSH) 1 Remote Interactive Computing TCP can be used for interactive use of remote machines  User establish remote login session  Then[.]

Remote Login (TELNET, SSH) Remote Interactive Computing TCP can be used for interactive use of remote machines   User establish remote login session Then executes commands Remote login may not be simple  Most systems designed to expect direct login May have to modify the machine’s OS  Building interactive client may be difficult, too Passing on Control-C commands TELNET Protocol TCP/IP suite includes TELNET   Simple remote terminal protocol Allows user to log into computer over internet Establishes TCP connection Passes keystrokes to remote machine Carries output back to user’s screen  Transparent Gives appearance that user keyboard and display is directly connected to the remote machine TELNET is not sophisticated as some  Is widely available ID remote machine by domain name or IP address Offers three basic services  Defines network virtual terminal Clients only have to build to the standard interface   Allows negotiation of some standard options Treats both ends of connection symmetrically Does not force keyboard input or screen output Figure 24.1 Server is more complex than shown   Must handle multiple, concurrent connections TELNET server consists of: Master server that listens for new requests Slave that handles one particular connection Pseudo terminal    OS entry point Allows application to transfer characters to OS as if they came from a keyboard Cannot build TELNET server without it Adv of TELNET server as application pgm  Modification & control of server easier Since code is not part of OS Disadv  Inefficiency Each keystroke   User keyboard  OS  Client program OS Across internet Then, Server’s OS Application Program Output comes back over same path Each keystroke requires several context switches  Expensive; practical due to slow typing speeds Accommodating Heterogeneity Computers and OSs are different  Ending lines of text Some require termination by CR Others require LF Other require two characters: CR-LF  Key to interrupt running program Most interactive systems provide a way Specific keystroke is different (Control-C or ESC) Use network virtual terminal  Defines how data and command sequences are sent Figure 24.2 NVT definition fairly straightforward  Communication involves bits Use USASCII 7-bit code for data Command sequences have high order bit set 95 printable letters, digits, punctuation marks 33 control codes Figure 24.3 10 Secure Shell (SSH) Popular alternative to TELNET   Uses TCP to connect remotely, like TELNET Two significant enhancements over TELNET Provides secure communications Can perform additional, independent data transfers over same connection used for remote login   Uses public key cryptography Really a general purpose secure connection Versus just a secure remote login service 11 Rlogin (BSD UNIX) BSD UNIX operating systems include remote login service called rlogin   Not a general purpose protocol like TELNET Protocol understands computing environments Exports part of user’s environment to remote machine  Supports trusted hosts Administrator can choose set of machines over which login names & file access protections are shared 12 Virtual Network Computing (VNC) Provides remote desktop capability    See exact copy of desktop on another computer Use keyboard, mouse to interact with remote machine Runs across multiple platforms Linux, Windows, etc 13 Remote Desktop Protocol (RDP) Defined by Microsoft for their OS  Similar to other remote desktop systems See exact copy of remote desktop Can be used across software platforms 14 Summary Application level protocols can be built on TCP/IP services & client-server model TELNET   TCP/IP internet standard Widely available remote access system Secure Shell   Authenticated, confidential remote login Multiple applications can share SSH connection Other remote access systems  rlogin, VNC, and RDP 15 ... address Offers three basic services  Defines network virtual terminal Clients only have to build to the standard interface   Allows negotiation of some standard options Treats both ends of connection... provide a way Specific keystroke is different (Control-C or ESC) Use network virtual terminal  Defines how data and command sequences are sent Figure 24.2 NVT definition fairly straightforward... more complex than shown   Must handle multiple, concurrent connections TELNET server consists of: Master server that listens for new requests Slave that handles one particular connection Pseudo

Ngày đăng: 19/11/2022, 20:40