0% found this document useful (0 votes)
35 views

Chapter 20

This document discusses remote login protocols like TELNET and SSH. It provides examples of how client and server negotiate options like binary mode, line mode, and go ahead using Telnet control codes. Exercise examples show the byte sequences exchanged and resulting network traffic. Putty is mentioned as a common open-source client that supports both TELNET and SSH for remote login.

Uploaded by

Siraj Ud-Doulla
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
35 views

Chapter 20

This document discusses remote login protocols like TELNET and SSH. It provides examples of how client and server negotiate options like binary mode, line mode, and go ahead using Telnet control codes. Exercise examples show the byte sequences exchanged and resulting network traffic. Putty is mentioned as a common open-source client that supports both TELNET and SSH for remote login.

Uploaded by

Siraj Ud-Doulla
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

CHAPTER 20

Remote Login: TELNET


and SSH

Exercises
1. The pattern is:

11110011 00111100 11111111 11111111

Note that the last byte is duplicated because it is the same as IAC; it must be
repeated to be interpreted as data.

3. To do the task in Exercise 1, we need to send:

Client to Server: IAC DO BINARY (3 bytes)


Server to Client: IAC WILL BINARY (3 bytes)
Client to Server: 11110011 00111100 11111111 11111111 (4 bytes)

If each transmission is encapsulated in a single TCP segment with 20 bytes of


header, there will be 3 segments of 23, 23, and 24 bytes for the total of 70 bytes or
560 bits.

5. If we assume the useful bits are the 3 bytes of data from Exercise 1:

(3 bytes of data) / (216 transmitted bytes) ≈ 1:70 ≈ 1.42 percent

1
2

7. See Figure 20.E7.


Figure 20.E7 Solution to Exercise 7

Server
Client GA: GO AHEAD
SGA: SUPPRESS GO AHEAD

1 ECHO DONT IAC


Character
IAC WONT ECHO 2 mode
3 SGA DONT IAC
IAC WONT SGA 4

IAC GA 5 Default
mode
Time Time

9. See Figure 20.E9.


Figure 20.E9 Solution to Exercise 9

LM: LINE MODE


Client GA: GO AHEAD
SGA: SUPPRESS GO AHEAD Server

1 ECHO DONT IAC


IAC WONT ECHO 2 Character
mode
3 LM DO IAC
IAC WILL LM 4
Line
mode
Time Time

11. See Figure 20.E11.


Figure 20.E11 Solution to Exercise 11

LM: LINE MODE


GA: GO AHEAD
Client SGA: SUPPRESS GO AHEAD Server

1 ECHO DO IAC
IAC WILL ECHO 2
3 LM DONT IAC Line
mode
IAC WONT LM 4
5 SGA DONT IAC
IAC WONT SGA 6

IAC GA 7 Default
mode

Time Time
3

13. One of the common client/server remote login program is called putty.The client
putty program can be freely downloaded and installed on your local computer. If
the remote server that you have account on is using the putty server program, you
can easily use this software. It provides both SSH, TELNET.
4

You might also like