Chapter 26 Remote Logging, Electronic Mail, and File Transfer

It would be impossible to write a specific client/server program for each demand. The better solution is a general-purpose client/server program that lets a user access any application program on a remote computer. | Chapter 26 Remote Logging, Electronic Mail, and File Transfer Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 26. 26-1 REMOTE LOGGING It would be impossible to write a specific client/server program for each demand. The better solution is a general-purpose client/server program that lets a user access any application program on a remote computer. TELNET Topics discussed in this section: 26. TELNET is a general-purpose client/server application program. Note 26. Figure Local and remote log-in 26. Figure Concept of NVT 26. Table Some NVT control characters 26. Figure An example of embedding 26. Table Options 26. Table NVT character set for option negotiation 26. Figure shows an example of option negotiation. In this example, the client wants the server to echo each character sent to the server. The echo option is enabled by the server because it is the server that sends . | Chapter 26 Remote Logging, Electronic Mail, and File Transfer Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 26. 26-1 REMOTE LOGGING It would be impossible to write a specific client/server program for each demand. The better solution is a general-purpose client/server program that lets a user access any application program on a remote computer. TELNET Topics discussed in this section: 26. TELNET is a general-purpose client/server application program. Note 26. Figure Local and remote log-in 26. Figure Concept of NVT 26. Table Some NVT control characters 26. Figure An example of embedding 26. Table Options 26. Table NVT character set for option negotiation 26. Figure shows an example of option negotiation. In this example, the client wants the server to echo each character sent to the server. The echo option is enabled by the server because it is the server that sends the characters back to the user terminal. Therefore, the client should request from the server the enabling of the option using DO. The request consists of three characters: IAC, DO, and ECHO. The server accepts the request and enables the option. It informs the client by sending the three-character approval: IAC, WILL, and ECHO. Example 26. Figure Example : Echo option 26. Table Character set for suboptions 26. Figure shows an example of suboption negotiation. In this example, the client wants to negotiate the type of the terminal. Example 26. Figure Example of suboption negotiation 26. 26-2 ELECTRONIC MAIL One of the most popular Internet services is electronic mail (e-mail). The designers of the Internet probably never imagined the popularity of this application program. Its architecture consists of several components that we discuss in this chapter. Architecture User Agent Message Transfer Agent: SMTP Message Access Agent: POP .

Không thể tạo bản xem trước, hãy bấm tải xuống
TÀI LIỆU MỚI ĐĂNG
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.