Unit II-final
Unit II-final
Unit II-final
DNS – E-mail – FTP – TFTP – History of WWW – Basics of WWW and Browsing -
Local information on the internet – HTML – Web Browser Architecture – Web Pages
and Multimedia – Remote Login (TELNET).
• DNS Server
• Introduction
Introduction
• A domain name is a name given to a network for ease of reference by humans.
• The term domain refers to a group of computers that are known by a single
common name.
• Finally, the domain names will be translated into IP address which is shown in
fig. 5.1
• A computer can be referred with the name, and to make it a unique one, internet
naming conventions are used.
• The full name of a computer consists of its local name followed by a period and
the organization’s suffix.
• As the name of the organization could be same, this method is not good
enough.
• Country specific domain name can also be add3ed such as, www.bbc.co.uk
indicating that the physical location of the web server is in England.
• Thus humans use domain names to refer to computers on the internet,
whereas computers use only IP address.
• When the domain name is typed on the computer, it is actually translated into
corresponding IP address.
• In the initial days, the domain names(also known as host names) and their
associated IP addresses were recorded in a single file called hosts,txt.
• Every night, all the hosts attached to the Internet would obtain a copy of this file
to refresh their domain name entries.
• As the Internet grew at a breathtaking pace, so did the size of this file.
• By mid-1980s, this file had become extremely huge. Therefore, it was too large
to copy to all systems and almost impossible to keep it up-to-date.
• Similarly, from Fig. 5.4, it can be seen that Atul.maths.oxford.edu identifies the
complete path for a computer under the domain Atul , which is under the
domain maths , which is under the domain oxford , and which is finally under
the domain edu
• The topmost domains are classified into two main categories, General (which
means, the domains registered in the US) and countries .
• edu (educational),
• The country domains specify one entry for each country, i.e., uk (United
Kingdom), jp(Japan), in (India), and so on. Each domain is fully
qualified by the path upward from it to the topmost (un named) root. The
names within a full path are separated by a dot.
• A full pathname can be up to 255 characters long including the dots, and
each component within it can be up to a maximum of 63 characters.
• Also, there could be as many dots in a domain name as you could have—
within each component, separated by dots.
DNS Server
• A domain name server is simply a computer that contains the database
and the software for mapping between domain names and IP
addresses.
• IBM is totally responsible for maintaining the name server for IBM.com.
1. It can supply the IP address because it already knows the IP address for the
domain.
2. It can contact another DNS server and try to locate the IP address for the
name requested. It may have to do this more than once. Every DNS server
has an entry called as alternate DNS server, which is the DNS server it should
get in touch with for unresolved domains.
4. It can return an error message because the requested domain name is invalid
or does not exist. This is shown in Fig. 5.5
Resolver , sending it the domain name for which the corresponding IP address
is to be located. The resolver is an application program running on the host.
3.The local DNS server looks up the domain name and returns the IP address to the
resolver.
• The mailbox
• Email Anatomy
• POP server
• SMTP server
• IMAP protocol
• Email Privacy
EMAIL – Introduction
The best features of email are given as follows.
(b)The recording of the email messages in some form is like the postal system
(which is even better than the telephone system). Thus, email combines the
best of the features of the telephone system and the postal system, and is yet
very cheap.
From the view point of users, email performs the following five
functions
• Composition
• Transfer
• Reporting
• Displaying
• Disposition
• This feature, called as spooling , allows a user to compose and send an email
message even if his network is currently disconnected or the recipient is not
currently connected to his end of the network.
• When an email message is sent, a copy of the email is placed in a storage
area on the server’s disk, called as spool.
• One part that runs on the client (user’s) PC is called as email client
software and the other part that runs on the email server is called as email
server software.
• The mail client software is a program that allows the user to compose an
email and specify the intended recipient’s email address.
• The composing part is very similar to simple word processing. It allows features
such as simple text to be typed in, adjusting the spacing, paragraphs,
margins, fonts and different ways of displaying characters (e.g., bold, italics,
underlining, etc.).
• Using the recipient’s email address, the email travels from the source to
the email server of the source, and then to the recipient’s email server.
• That means that the bits in the contents of the email (text, image, etc.) are
broken down into packets as per TCP/IP format and re-assembled at the
recipient’s end.
• In-between the nodes, the error/flow control and routing functions are
performed as per the different protocols of different networks.
• The email software itself is divided into two parts, client portion and server
portion.
• The client portion allows you to compose a message, forward it, reply to a
message, and also display a received message.
• The server portion essentially manages the mailbox to store the messages
temporarily and deliver them when directed.
The user agent is the user interface client email software (such as Microsoft
Outlook Express, Lotus Notes, Netscape Mail, etc.) that provides the user facilitates
for reading an email message by retrieving it from the server, composing an email
message in a Word-processor like format, etc.
Mailbox
There is one mailbox per user, which acts as the email storage system for that user.
Spool
It allows storing of email messages sent by the user until they can be sent to the
intended recipient.
The mail transfer agent is the interface between the email system and the local email
server
EMAIL - The email transfer protocols
• POP server
• SMTP server
POP server
• In effect, SMTP transfers emails from the sender’s computer to the sender’s
email server and from there to the receiver’s email server. POP then allows
the receiver to remotely or locally log on to the receiver’s email server and
retrieve those waiting emails.
• In other words, POP (like IMAP) works only at the receiver’s end, and has no
role to play at the sender’s side.
• The client (i.e., the receiver) opens a TCP connection with the receiver’s POP
server on well-known port 110.
• The client user name and password to access the mailbox are sent along with
it.
• Provided these are correct, the receiver user can list and receive emails from
the mailbox.
POP supports
• delete mode (i.e., delete emails from the mailbox on the email server once
they are downloaded to the receiver’s computer )and
• keep mode (i.e., keep emails in the mailbox on the email server even after
they are downloaded to the receiver’s computer).
• A POP session between a client and a server has three states, one after the
other, as given below.
• Authorization state
• Here, the server does a passive open and the client authenticates itself. •
Transaction state
• Here, the client is allowed to perform mailbox operations
(view/retrieve/delete/...mails).
• Update state
• Here, the server deletes messages marked for deletion, session is closed,
and TCP connection is terminated.
SMTP Server
• Simple Mail Transfer Protocol (SMTP) is at the heart of the email system.
• In SMTP, the server keeps waiting on well-known port 25. SMTP consists of two
aspects, UA and MTA,
• (a) from the sender’s computer to the sender’s SMTP server, and
• (b) from the sender’s SMTP server to the receiver’s SMTP server.
• The last leg of transferring emails between the receiver’s SMTP server and the
receiver’s computer is done by one of the two other email protocols, called as
POP or IMAP
SMTP Server
• Steps involved in communication between the client and server using SMTP
server are:
• In SMTP, client sends one or more commands to the server. Server returns
responses.
SMTP Server
• 1. Client makes active TCP connection with the server on server’s well-known
port number 25.
• 2. Server sends code 220 (service ready), else 421 (service not available).
• 3. Client sends HELO message to identify itself using its domain name.
Here, the client sends a QUIT command, which the server acknowledges, as
mentioned below.
SMTP Server
IMAP PROTOCOL
• POP is very popular but is offline (mail is retrieved from the server and
deleted from there).
• POP was made disconnected to achieve this functionality (i.e., retrieve mail
onto the client computer, but do not delete from the server; synchronize
changes, if any).
• This is not always desired. Hence, a different email access and retrieval
protocol is necessary.
• Here, work is focused on email server rather than downloading emails on the
client before doing anything else (unlike what happens in the case of POP).
• In this protocol, the server does a passive open on well-known port number
143.
• TCP three-way handshake happens and client and server can use IMAP over a
new session that gets created.
• The SMTP protocol can be used to send only NVT 7-bit ASCII text. •
It cannot work with some languages(French, German, etc. ...).
• Furthermore, it cannot be used to send multimedia data (binary files, video,
audio,etc.).
• The way MIME works is quite simple from a conceptual viewpoint. MIME
transforms non-ASCII data at the sender’s end into NVT ASCII and delivers it
to the client SMTP for transmission.
• At the receiver’s end, it receives NVT ASCII data from the SMTP server and
transforms it back into the original (possibly non-ASCII)data.
• MIME-Version
• Content-Type
• Content-Transfer-Encoding
• Content-Id
• Content-Description
Email Privacy
What if the email message gets trapped on its way and is read by an
unintended recipient?
• The most significant aspects of PGP are that it supports the basic
requirements of cryptography, is quite simple to use, and is completely free,
including its source code and documentation.
• PGP has become extremely popular and is far more widely used, as
compared to PEM
• PEM, unlike PGP, was the effort of a working group, and not of an individual.
• Messages sent with PEM are first translated into a canonical (common) form
so that the same conventions about white spaces, tabs, carriage returns and
linefeeds are used.
• This transformation ensures that the MTAs that sometimes modify messages
because they do not understand certain characters are not allowed to do so
here.
• Unlike PGP, PEM does not support compression. The encryption in PGP is
done using 128-bit keys.
FTP - TFTP
FTP
• Introduction
• FTP Basics
• FTP Connections
• Control Connection
• Control connection
FTP – Introduction
• A special software and set of rules called File TransferProtocol (FTP) exists
for this purpose.
• At a high level, a user (the client) requests the FTP software to either retrieve
from or upload a file to a remote server.
• Figure 5.30 shows at a broad level, how an FTP client can obtain a file ABC
from an FTP server
• Emails are meant for short message transfers. FTP is meant for file transfers.
• When a user wants to download a file from a remote server, several issues
must be dealt with.
1. The client must have the necessary authorizations to download that file.
2. The client and server computers could be different in terms of their hardware
and/or operating systems.
3. An end user must not be concerned with these issues as long as he has the
necessary access rights
• FTP provides a simple file transfer mechanism for the end user, and internally
handles these complications.
• FTP presents the user with a prompt and allows entering various commands
for accessing files on a remote computer.
• After invoking an FTP application, the user identifies a remote computer and
instructs FTP to establish a connection with it.
. • If multiple files are to be transferred in a single FTP session, then the control connection
between the client and the server must remain active throughout the entire FTP session.
• The data transfer connection is opened and closed for each file that is to be
transferred.
• The data transfer connection opens every time the commands for transferring
files are used, and it gets closed when the file transfer is complete.
The control and data transfer connections are opened and closed by the client
and the server during an FTP session.
Control connection
The process of the creation of a control connection between a client and a server is
similar to the creation of other TCP connections between a client and a server.
1. The server passively waits for a client (passive open). In other words, the server
waits endlessly for accepting a TCP connection from one or more clients.
2. The client actively sends an open request to the server (active open). That is, the
client always initiates the dialog with the server by sending a TCP connection
request.
3. The TCP software on the client computer then establishes a TCP connection
between the client and the server using a three-way handshake.
4. When a successful TCP connection is established between the client and the
server, an FTP server program is ready to serve the client’s requests for file transfer.
• The connection for data transfer, in turn, uses the control connection
established previously.
• The data transfer connection is always first requested for by the client.
Let us understand how the data transfer connection is opened.
• The client issues a passive open command for the data transfer connection.
• This means that the client has opened a data transfer connection on a
particular port number, say X , from its side.
• The client uses the control connection established earlier, to send this port
number to the server.
• The server receives the port number ( X ) from the client over the control
connection, and invokes an open request for the data transfer connection on
its side.
• This means that the server has also now opened a data transfer connection.
• This connection is always on port 20—the standard port for FTP on any
server.
• Note that the client and the server can use different operating systems, file
formats, character sets and file structures.
• Let us now study how FTP achieves this, using the control connection and the
data transfer connection.
Control connection
• The requests sent over the control connection are four-character commands,
such as
STOR (to upload a file from the client to the server), etc.
• The data transfer connection is used to transfer files from the server to the
client or from the client to the server, as shown in Fig. 5.35.
• As we have noted before, this is decided based on the commands that travel
over the control connection
FTP can transfer a file across a data transfer connection by interpreting its structure
in the following ways.
1. Byte-oriented structure
2. Record-oriented structure
The other option for the structure of the file being transferred is the record-oriented
structure, where the file is divided into records and these records are then sent
one by one
FTP can transfer a file by using one of the three transmission modes as described
below,
1. Stream mode
2. Block mode
• Data can be delivered in terms of blocks.
The first byte of the header is called as block descriptor, whereas the remaining
two bytes define the size of the block
3. Compressed mode
• Normally, the Run Length Encoding (RLE) compression method is used for
compressing a file.
• This method replaces repetitive occurrences of a data block by the first
occurrence only, and a count of how many times it repeats is stored along
with it.
• The Trivial File Transfer Protocol (TFTP) is a protocol used for transferring
files between two computers, similar to what FTP is used for.
• FTP uses the reliable TCP as the underlying transport layer protocol
• TFTP does not allow for user authentication unlike FTP. Therefore, TFTP
must not be used on computers where sensitive/confidential information is
stored.
• The recipient must acknowledge each such data block before the sender
sends the next block.
• Also, unlike FTP, there is no provision for resuming an aborted file transfer
from its last point.
History of WWW
• Hypertext
• Tim Berners-Lee
• Hypertext server
• Marc Andreessen
• Mosaic
• Web browser
• Netscape Navigator
• Internet Explorer
• TimBerners-Lee did the primary work in the development of the WWW at the
European Laboratory for Particle Physics (CERN).
• Motivation for the development of the WWW - was to try and improve the
CERN’s research-document handling and sharing mechanisms.
• The Web became very popular among the scientific community in a short
span of time.
Web browser
• In 1993, Marc Andreessen and his team, at the University of Illinois, wrote a
program called as Mosaic.
• Mosaic could read a document created using the hypertext format, and interpret its
contents,
• so that they could be displayed on the user’s screen.
• World wide network of computers, was accessible to anybody who had a PC,
an Internet connection, and a Web browser.
• The World Wide Web Consortium (W3C) oversees the standards related to
the WWW.
• HTTP Commands
• Proxy Server
Introduction
• Most of the companies and organizations have their Web sites consisting of a
number of pages, each.
• In addition, there are many portals, which can be used to do multiple
activities.
• In order to attract more customers to their site, they create large Web pages
(“content”), which gives different news, information and entertainment
items.
• For instance, a site for buying/selling trains/ plane tickets can also give
information about hotels, tourist places, etc. This is called as the
content.
• WWW is a huge, on-line repository of information that users can view using a
program called as a Web browser.
• Modern browsers allow a graphical user interface. So, a user can use the
mouse to make selections, navigate through the pages, etc
• Whatever is sent from the client to the server (request for a Web page), and
from the server to the client (actual Web page), is sent using TCP/IP as an
underlying protocol
The message is broken into IP packets and routed through various routers and
networks within the internet until they reach the final destination, where they are
reassembled after verifying the accuracy, etc
• Each Web page can contain text, graphics, sound, video and animation that
people want to see or hear.
• The Web server constantly and passively waits for a request for a Web page
from a browser program running on the client.
• When any such request is received, it locates that corresponding page and
sends it to the requesting client computer.
• To do this, every Web site has a server process that listens to TCP
connection requests coming from different clients all the time.
• After a TCP connection is established, the client sends one request and the
server sends one response.
• For instance, HTTP software on the client prepares the request for a Web page,
whereas the HTTP software on the server interprets such a request and
prepares a response to be sent back to the client.
• Thus, both client and server computers need to have HTTP software running
on them.
• Using this program, a user requests for a Web page stored on a Web server.
• The Web server locates this Web page and sends it back to the client
computer.
• The Web browser then interprets the Web page written in the HTML
language/ format and then displays it on the client computer’s
screen.
• The full file name is called as Uniform Resource Locator (URL). For instance,
a URL could be
• The forward slash (/) character indicates that the file is one of the many files
stored in the domain yahoo.com.
If the user wants another file called as newsoftheday from this site, he would type
http://www.yahoo.com/newsoftheday.
STEP 5: The client makes an explicit request for the Web page to the Web server
using HTTP request.
• The HTTP request is a series of lines, which, among other things, contains
two important statements, GET and HOST , as shown with our current
example,
• The GET statement indicates that the index.htm file needs to be retrieved.
• The Host parameter indicates that the index file needs to be retrieved from
the domain yahoo.com.
• STEP 6: The request is handed over to the HTTP software running on
the client machine to be transmitted to the server.
• STEP 7: The HTTP software on the client now hands over the HTTP request
to the TCP/IP software running on the client.
• STEP 8: The TCP/IP software running on the client breaks the HTTP
request into packets and sends them over TCP to the Web server (in this
case, yahoo.com)
• STEP 9: The TCP/IP software running on the Web server reassembles the
HTTP request using the packets thus received and gives it to the HTTP
software running on the Web server.
• STEP 10: The HTTP software running on the Web server interprets the HTTP
request. It realizes that the browser has asked for the file index.htm on the
server. Therefore, it requests the operating system running on the server for
that file.
• STEP 11: The operating system on the Web server locates index.htm file and
gives it to the HTTP software running on the Web server.
STEP 12: The HTTP software running on the Web server adds some headers to
the file to form an HTTP response.
• The HTTP response is a series of lines that contains this header information
(such as date and time when the response is being sent, etc.) and the HTML
text corresponding to the requested file (in this case, index.htm ).
STEP 13: The HTTP software on the Web server now hands over this HTTP
response to the TCP/IP software running on the Web server.
STEP 14: The TCP/IP software running on the Web server breaks the HTTP
response into packets and sends it over the TCP connection to the client.
Once all packets have been transmitted correctly to the client, the TCP/IP
software on the Web server informs the HTTP software on the Web
server.
STEP 15: The TCP/IP software on the client computer checks the packets for
correctness and reassembles them to form the original Web page in the
HTML format.
It informs the HTTP software on the server that the Web page was received
correctly.
STEP 16: The HTTP software on the Web server terminates the TCP connection
between itself and the client. Therefore, HTTP is called as stateless protocol.
• The TCP connection between the client and the server is established for
every page, even if all the pages requested by the client reside on the same
server.
• HTTP does not remember anything about the previous request. It does not
maintain any information about the state—and hence the term stateless.
Keeping HTTP stateless was aimed at keeping the Web simple STEP 17: The
TCP/IP software on the client now hands over the Web page to the Web browser for
interpretation.
It is only the browser, which understands the “HTML code language” to decipher
which elements(text, photo, video) should be displayed where and how.
HTTP Commands
• GET is the most common command sent by a client browser as a part of the
HTTP request to a Web server.
• When a browser sends such an HTTP request command to a Web server, the
server sends back a status line(indicating the success or failure, as a result of
executing that command) and additional information (which can be the Web
page itself).
The status line contains error codes. For example, a status code of 200 means
success (OK), 403 means authorization failure, etc
HTTP Commands
• In response, the server might send the following HTTP response back to the
browser.
• The first line indicates to the browser that the server is also using HTTP 1.0
as its protocol version.
• Also,the return code of 200 means that the server processed the browser’s
HTTP request successfully.
• After that, there would be a few other parameters, which are not shown. •
After these parameters, the following lines start.
<HTML> </html>
<HEAD> </head>
<TITLE></title>
• Actual contents of the Web page are sent by the Web server to the browser
with the help of these tags.
• A tag is a HTML keyword usually enclosed between less than and greater
than symbols.
• For instance, the<HTML> statement (i.e., tag) indicates that the HTML
contents of the Web page start now.
• In this example, the browser (i.e., the client) retrieves a HTML document from
the Web server.
• We shall assume that the TCP connection in between the client and the
server is already established
That is, the name of the file is image1, and it is stored in the files/new directory
of the Web server.
• Instead, the Web browser could have, of course, requested for an HTML page
(i.e., a file with html extension).
• In response, the Web server sends an appropriate return code of 200, which
means that the request was successfully processed, and also the image data,
as requested.
• The browser sends a request with the GET command, as discussed. It also
sends two more parameters by using two Accept commands.
• Therefore, the server should send the image file only if it is in one of these
formats.
• It also sends the information about the date and time when this response was
sent back to the browser.
• The server’s name is the same as the domain name.
• Finally, the server indicates that it is sending 3010 bytes of data (i.e., the image
file is made up of bits equivalent to 3010 bytes). This is followed by the actual
data of the image file (not shown in the figure).
Proxy Server
• To solve this issue, a proxy server is used as an interpreter between the web
browser and the web server for transforming a non-HTTP protocol to HTTP
and vice-versa.
• Google, Altavista, Yahoo and Infoseek are some of the most popular search
engine.
Introduction
• Basically, HTML is used to specify where and how to display headings, where
new paragraph starts, which text to display in which font and color etc.
• Most tags ends with the corresponding </> tag. The <p> tag would end with a
</p> tag.
• As an another example, the tag pair <B> and </B> can be used to change
the text font to boldface. This is shown in Figure 6.8
• When a browser comes across this portion of HTML document, it realizes that
the portion of the text embedded within <B> and </B> tags need to be
displayed in boldface. Therefore it displays the test in boldface, as shown in
Figure 6.9
HTML Example
• The HTML code in the page are as follows,
• <HTML> tag indicates the beginning of an HTML page and </HTML> tag
indicates the end of the HTML page.
• <BODY> tag indicates the beginning of the contents of the page and
</BODY> tag indicates the end of the contents of the page.
• <H1> tag indicates that the text starting here is a heading and should be
displayed in different font until the closing tag </H1> is found.
• If we click on that text in the Web browser, our browser opens the site/page
that the hyperlink refers to.
• The tag used is <a>. The general syntax for doing this is as follows.
<a href=”url”>Text to be displayed</a>
Here,
A = Create an anchor
• Web browsers have a more complex structure than the Web servers.
• HTTP client program shown in the above figure as (2) and HTML interpreter
program (3) are mandatory.
• Some other interpreter programs as in (4), Java interpreter program (5) and
other optional interpreter program (6) are optional.
• The browser also has a controller, shown as (1), which manages all of them. •
The controller is like the control unit in a computer’s CPU.
• It interprets both mouse clicks/selections and keyboard inputs.
When the Web page is received, the controller calls the HTML interpreter to interpret
the tags and display the Web page on the screen.
• For this, it interprets the various HTML tags and translates them into display
commands based on the display hardware in the user’s computer.
For instance, when the interpreter sees a tag to make the text bold, it instructs the
display hardware to display the text in the bold format.
Optional Clients
• Apart from the HTTP client and an HTML interpreter, a browser can contain
additional clients.
• For supporting FTP and Email applications, a browser contains FTP and
email client programs.
• The mailto protocol allows the invocation of an email client program through
the browser.
• For this the HTML page must specify the mailto tag.
• For this anchor tag has to be used along with the mailto: protocol indicator
and email address.
• For example, if john has created his personal website, he might include link in
the HTML page to send an email to the id John@hotmail.com like this:
• It will invoke the mailto protocol, email client protocol and inserts the address
in the From and To fields.
• The user can enter the subject and email text and send it.
• The file that has to be downloaded from the server has to be specified.
• The controller in the browser uses the first field of the URL to determine which
client application(e.g, HTTP, FTP) has to be invoked.
• If the first field of the URL is HTTP, it passes control to the HTTP client, which
in turn, sends a request for a web page to the web server.
• If this field is FTP, the controller calls the FTP client program. •
For Example: consider the following portion of the web page:
Our website contains many excellent documents. For Example, <BR> <A
HREF=ftp://ftp.yankee.com/books/Internet.doc> A document on the internet</A> •
As a result, the browser displays the following:
Our website contains many excellent documents. For Example, A document on the
internet.
• It uses HTTP protocol for each such file to establish and break the link
between the client and web server each time.
• The browser then obtains a copy of the image and inserts it in the place of the
link in the displayed document on the user’s computer screen.
• For linking the image with an HTML document, the IMG tag is used. •
Example: <IMG SRC = “ANA.GIF”>
• The file ANA.gif is not stored as a normal text file.
• Such a file contains binary data that corresponds to the pixels in an image.
• A plug-in is a program that resides on the server along with the compressed
file.
• This program understands the format of the file and therefore has a method of
decompressing it.
• This program is also sent from the server along with the required file.
• The browser on the client uses this program to interpret the file, decompress it
and to display it.
• Once a plug-in program is sent it is stored there, and need not be sent again
and again.
• If a web page contains an image, audio and video there will be three hyperlinks
and the client will make three connection to the server using HTTP protocol.
• That is why web pages with many heavy multimedia tend to be slow.
• To improve the performance, a good web page design recommends that very
heavy multimedia contents should be avoided.
• Sample HTML code and the corresponding results of embedding an image file
in a web page is shown in fig 6.18.
<html>
<head>
<title>IMAGE EXAMPLE</title>
</head>
<body>
<p><a href=“http://images/gift”></a></p>
</body>
</html>
Fig 6.18 HTML Code for Displaying an Image
• A remote login facility permits a user who is using one computer to interact with a
program on another computer. The service extends the login concept used by
conventional timesharing computer systems to permit access to a remote
timesharing system.
• Remote Login is a process in which user can login into remote site i.e.
computer and use services that are available on the remote computer. With
the help of remote login a user is able to understand result of transferring
result of processing from the remote computer to the local computer.
1. When the user types something on local computer, then local operating
system accepts character.
2. Local computer does not interpret the characters, it will send them to
TELNET client.
3. TELNET client transforms these characters to a universal character set
called Network Virtual Terminal (NVT) characters and it will pass them
to the local TCP/IP protocol Stack.
4. Commands or text which is in the form of NVT, travel through Internet
and it will arrive at the TCP/IP stack at remote computer.
5. Characters are then delivered to operating system and which later on
passed to TELNET server.
6. Then TELNET server changes that characters to characters which can
be understandable by remote computer.
7. Remote operating system receives character from a pseudo-terminal
driver, which is a piece of software that pretends that characters are
coming from a terminal.
8. Operating system then passes character to the appropriate application
program.
NVT Character Set :
• With NVT Character set, TELNET client translates characters into NVT
form and deliver to network.
• TELNET server translates data and commands from NVT form to the
other form that will be understandable by remote computer.
• NVT uses 2 sets of characters, one for data and other for control. Size of
both characters is 8-bit bytes.
• For data, NVT is an 8-bit character set in which 7 lowest bits are same as
ASCII and highest order bit is 0.
• For control characters, NVT uses an 8-bit character set in which the
highest bit is set to 1.