170 likes | 228 Vues
Learn about remote login sessions, interactive client building, TELNET protocol, SSH advantages, Rlogin in BSD UNIX, VNC remote desktop, RDP by Microsoft, and accommodating heterogeneity in computing environments.
E N D
Remote Login(TELNET, SSH) Chapter 24
Remote Interactive Computing • TCP can be used for interactive use of remote machines • User establish remote login session • Then executes commands • Remote login may not be simple • Most systems designed to expect direct login • May have to modify the machine’s OS • Building interactive client may be difficult, too • Passing on Control-C commands
TELNET Protocol • TCP/IP suite includes TELNET • Simple remote terminal protocol • Allows user to log into computer over internet • Establishes TCP connection • Passes keystrokes to remote machine • Carries output back to user’s screen • Transparent • Gives appearance that user keyboard and display is directly connected to the remote machine
TELNET is not sophisticated as some • Is widely available • ID remote machine by domain name or IP address • Offers three basic services • Defines network virtual terminal • Clients only have to build to the standard interface • Allows negotiation of some standard options • Treats both ends of connection symmetrically • Does not force keyboard input or screen output
Server is more complex than shown • Must handle multiple, concurrent connections • TELNET server consists of: • Master server that listens for new requests • Slave that handles one particular connection • Pseudo terminal • OS entry point • Allows application to transfer characters to OS as if they came from a keyboard • Cannot build TELNET server without it
Adv of TELNET server as application pgm • Modification & control of server easier • Since code is not part of OS • Disadv • Inefficiency • Each keystroke • User keyboard OS Client program OS Across internet • Then, Server’s OS Application Program • Output comes back over same path • Each keystroke requires several context switches • Expensive; practical due to slow typing speeds
Accommodating Heterogeneity • Computers and OSs are different • Ending lines of text • Some require termination by CR • Others require LF • Other require two characters: CR-LF • Key to interrupt running program • Most interactive systems provide a way • Specific keystroke is different (Control-C or ESC)
Use network virtual terminal • Defines how data and command sequences are sent Figure 24.2
NVT definition fairly straightforward • Communication involves 8 bits • Use USASCII 7-bit code for data • Command sequences have high order bit set • 95 printable letters, digits, punctuation marks • 33 control codes Figure 24.3
Secure Shell (SSH) • Popular alternative to TELNET • Uses TCP to connect remotely, like TELNET • Two significant enhancements over TELNET • Provides secure communications • Can perform additional, independent data transfers over same connection used for remote login • Uses public key cryptography • Really a general purpose secure connection • Versus just a secure remote login service
Rlogin (BSD UNIX) • BSD UNIX operating systems include remote login service called rlogin • Not a general purpose protocol like TELNET • Protocol understands computing environments • Exports part of user’s environment to remote machine • Supports trusted hosts • Administrator can choose set of machines over which login names & file access protections are shared
Virtual Network Computing (VNC) • Provides remote desktop capability • See exact copy of desktop on another computer • Use keyboard, mouse to interact with remote machine • Runs across multiple platforms • Linux, Windows, etc.
Remote Desktop Protocol (RDP) • Defined by Microsoft for their OS • Similar to other remote desktop systems • See exact copy of remote desktop • Can be used across software platforms
Summary • Application level protocols can be built on TCP/IP services & client-server model • TELNET • TCP/IP internet standard • Widely available remote access system • Secure Shell • Authenticated, confidential remote login • Multiple applications can share SSH connection • Other remote access systems • rlogin, VNC, and RDP