Network Working Group J. White
Request for Comments: 206 Computer Research Lab, UCSB
NIC: 7176 9 August 1971
A User TELNET
Description of an Initial Implementation
PREFACE
The User TELNET described in this document has been implemented
within UCSB's Online System by Mark Krilanovich and makes teletype-
compatible time-sharing systems in the Net accessible to Online
System users.
Contents
Page
I. Function................................................... 1
II. Invoking TELNET............................................ 2
III. The Virtual Teletype....................................... 5
IV. Returning to TELNET........................................ 11
V. Breaking TELNET Connections................................ 12
VI. Abnormal Network Conditions................................ 12
FIGURES
Page
Figure 1. Network Sites........................................ 4
Figure 2. TELNET Character Set................................. 6
Figure 3. Connect Error Codes.................................. 13
Figure 4. Input Error Codes.................................... 13
Figure 5. Output Error Codes................................... 14
I. Function
This document describes a program whose function is to make an Online
System terminal _appear_ to any teletype-compatible, time-sharing
system in the Network _as if it were directly connected to that
system_. By invoking this program from his terminal, an OLS user can
effectively dial up a system at another site and use it as if he were
a local user of that system. The program performs the following
major functions:
1) it resolves keyboard and display device incompatibilities
2) performs character set transformations, and
White [Page 1]
RFC 206 A User TELNET August 1971
3) makes its presence and that of the Network transparent to the
user.
The program which performs these functions is called a _User TELNET_.
It operates in conjunction with another program called a _Server
TELNET_ executing at the site whose system is being used. A Server
TELNET exists at each site whose system is accessible from the Net.
Similarly, a User TELNET must exist at a site before users at that
site have access to remote systems.
User and Server TELNETs access the Net through their respective NCPs,
and operate under a Network-standard protocol which specifies the
hand-shaking procedure by which the two parties connect themselves to
one another, as well as the format of data sent over a pair of
Network connections established between them. A User TELNET makes
such protocol considerations transparent to its users.
The TELNET protocol is based upon the notion of a virtual teletype,
employing a 7-bit ASCII character set. The primary function of a
User TELNET, then, is to provide the means by which its users can
'hit' all the keys on that virtual teletype. If the user's keyboard
happens in fact to actually be a teletype, then the mapping procedure
is a very simple one. However, in UCSB's case, where a user's input
device is an OLS keyboard (a device very different from a teletype),
the mapping is more complex.
The primary function of a Server TELNET is to map the keys on the
virtual teletype into that set of keys _its_ local users can push on
_their_ keyboards. Again, if those keyboards are teletypes, the
mapping done by the Server TELNET is straightforward. In other
cases, the task may be very complex.
A similar set of mappings transforms ouput generated by the remote
system into a form displayable on the user's output device (in UCSB's
case, this device is normally a storage scope).
II. Invoking TELNET
This and succeeding sections describe a preliminary version of a User
TELNET (hereafter referred to simply as TELNET) currently implemented
within the Online System. This initial implementation does not
provide all of the services that a final version must provide, nor
does it provide all the conveniences that the next version will
offer. It's a first pass which will be upgraded in the near future.
White [Page 2]
RFC 206 A User TELNET August 1971
TELNET is accessible from NET, a subsystem (like MOLSF and COL) of
OLS. A user is by default prohibited from loading NET. To have
access to NET enabled fro his user number, a user need only contact
the Computer Center. Assuming the foregoing, Net can be loaded with
the key sequence:
KEYBOARD ENTRY OLS QUERY/RESPONSE
SYST WORK AREAS UPDATED
LOAD NET LOAD NET
RETURN FILE LOADED
or by specifying the system name 'NET' at login.
Once in NET, TELNET is invoked by going to Level II Real and hitting
_LOG_. TELNET responds with a query for site number. The user
should enter in decimal the number of the site (as indicated in
Figure 1) to which he desires access, followed by _RETURN_. TELNET
will then query the user for the Server TELNET's socket_number. By
convention, this number is normally 1, but in certain cases some
other socket may be appropriate. In any case, the user should enter
the socket number in decimal and hit _RETURN_. The dialogue, then,
goes like this:
KEYBOARD ENTRY OLS QUERY/RESPONSE
II LOG FOREIGN SITE NO. = (site number)
site number RETURN FOREIGN SCK NO. = 1
1 RETURN
When the second RETURN is depressed, TELNET will attempt to contact
the designated Server TELNET and establish a duplex connection for
the user. Once the connection has been established, TELNET will
erase the tube and position the carriage to the upper left-hand
corner of the screen. From this point on, the user is effectively
connected to the remote system. TELNET enters a mode in which keys
pushed by the user are mapped into their virtual-teletype equivalents
and incoming text similarly transformed and displayed on the scope.
If the remote system to which the user is connected normally issues a
login message, that message will be the first to be displayed. In
any case, the user should proceed by logging in to the remote system
according to the conventions appropriate to that system.
White [Page 3]
RFC 206 A User TELNET August 1971
Figure 1.
Network Sites
Institution Location Computer Site Site # Site #
Name (HEX) (DEC)
------------------------------------------------------------------------
UCLA Los Angeles Sigma-7 UCLA 01 1
UCLA Los Angeles IBM 360/91 UCL1 41 65
Stanford Research
Institute Menlo Park PDP-10 SRI0 02 2
Stanford Research
Institute Menlo Park PDP-15 SRI1 42 66
UCSB Santa Barbara IBM 360/75 UCSB 03 3
University of Salt Lake City,
Utah Utah PDP-10 UTAH 04 4
Bolt, Beranek, Cambridge,
and Newman Mass. PDP-10 BBN0 05 5
Bolt, Beranek, Cambridge,
and Newman Mass. DDP-516 BBN1 45 69
MIT Cambridge,
Mass. GE 645 MIT0 06 6
MIT Cambridge,
Mass. PDP-10 MIT1 46 70
Rand
Corporation Santa Monica IBM 1800 RAND 07 7
(IBM 360/65)
System Development
Corporation Santa Monica DDP-516 SDC 08 8
(IBM 360/67)
Harvard Cambridge,
University Mass. PDP-10 HRV0 09 9
Harvard Cambridge,
University Mass. PDP-1 HRV1 49 73
White [Page 4]
RFC 206 A User TELNET August 1971
Lincoln Lexington,
Laboratory (MIT)Mass. IBM 360/67 LINO 0A 10
Lincoln Lexington,
Laboratory (MIT)Mass. TX2 LIN1 4A 74
Stanford
University Stanford PDP-10 STAN 0B 11
University of Urbana, Ill. PDP-11 ILl 0C 12
Illinois
Case Western
Resevrve Cleveland,
University Ohio PDP-10 CASE 0D 13
Carnegie-Mellon Pittsburgh,
University Pa. PDP-10 CARN 0E 14
Burroughs Paoli, Pa. B-6500 BURR 0F 15
(Illiac IV)
III. The Virtual Teletype
The algorithm by which TELNET maps the OLS keyboard into the virtual
teletype's character set, and by which it maps that same character
set into the set of characters which can be displayed on the user's
storage scope is defined in Figure 2. A line of that figure reads as
follows:
For line 11:
The key labeled 'LF' (meaning 'Line Feed') on the virtual
teletype, sometimes referred to as 'control-J', is struck by
pressing either _SUB_, _CASE J_, or [1] on an OLS keyboard.
TELNET sends to the remote system an 8-bit character with the
value X'0A'. Whenever 'LF' is received from the foreign system,
TELNET displays it by rolling the carriage down one line.
As indicated in the figure, _CASE_ substitutes for the CNTRL key on a
teletype. Hence, for example, 'control-C' is represented by the key
pair 'CASE C'. Note, however, that _CASE_ and 'C' are hit in
sequence, whereas on a teletype the CNTRL key is held down while 'C'
is struck. 'CASE A' - 'CASE Z' each have an equivalent on the upper
keyboard, and the position of that key on the upper keyboard
corresponds to that of its counterpart on the lower keyboard. Hence,
LS equivalent to CASE A.
White [Page 5]
RFC 206 A User TELNET August 1971
Although TELNET provides the user with the means for transmitting
both upper- and lower-case alphabetics (hitting 'A' sends a lower-
case 'A'; holding down _SHIFT_ and hitting 'A' sends upper-case 'A'),
there is no provision in OLS for displaying lower-case characters on
the storage scope. Hence, TELNET maps lower-case alphabetics into
upper-case before displaying them.
The four virtual teltype keys 'ENQ', 'ACK', 'BEL', and 'NAK' are
displayed by TELNET in a special manner. Two lines are reserved for
these characters at the top of the display area, and whenever TELNET
receives such a character from the remote system, it displays it in
its assigned position within the two-line field. TELNET always
positions those four characters at the top of the display area,
regardless of the user's current position on the scope, then returns
to it.
A storage scope has both positive and negative attributes relative to
a teletype. Display is much quieter on a scope than on a teletype.
However, the noise made by the return of a teletype carriage is often
a valuable cue to the user, frequently signifying that the previous
line of input from the user has been accepted by the system. As a
substitute for this particular cue, TELNET displays an underline
('_') at the left edge on the next line whenever it receives a
carriage return (CR) from the remote system.
Figure 2. TELNET Character Set
To | | Also |Push | Or |Code Sent |Upon receipt
Send| (Explanation)| Known as |Either| |is (in hex)|Displayed as
----+--------------+----------+------+---------+-----------+------------
NUL |NULL | ^@ | [2] | | 00 |
| | | | | |
SOH |Start of | [3]^A | LS |[4]CASE A| 01 |
| Heading | | | | |
| | | | | |
STX |Start of Text | ^B | ATAN | CASE B | 02 |
| | | | | |
ETX |End of Text | ^C | LOG | CASE C | 03 |
| | | | | |
EOT |End of | | | | |
| Transmission| ^D | REFL | CASE D | 04 |
| | | | | |
ENQ |Enquiry | ^E | [4] | CASE E | 05 | [5] <ENQ>
| | | | | |
ACK |Acknowledge | ^F | UP | CASE F | 06 | <ACK>
| | | | | |
BEL |Bell | ^G | DOWN | CASE G | 07 | <BELL>
White [Page 6]
RFC 206 A User TELNET August 1971
BS |Backspace | ^H | EVAL | CASE H | 08 |
| | | | | |
HT |Horizontal | | | | |
|Tab. | ^I | INV | CASE I, | 09 |
| | | | TAB | |
| | | | | |
LF |Line Feed | ^J | SUB | CASE J, | 0A | Carriage
| | | | [1] | | rolled down
| | | | | |
VT |Vertical Tab. | ^K | MAX | CASE K | 0B |
| | | | | |
FF |Form Feed | ^L | MOD | CASE L | 0C |
| | | | | |
CR |Carriage | | | | |
| Return | ^M | DEL | CASE M, | 0D |[6]Carriage
| | | | RETURN| | returned
| | | | | |
SO |Shift Out | ^N | ARG | CASE N | 0E |
| | | | | |
SI |Shift In | ^O | DIFF | CASE O | 0F |
| | | | | |
DLE |Data Link | | | | |
| Escape | ^P | SUM | CASE P | 10 |
| | | | | |
DC1 |Device | | | | |
| Control 1 | ^Q | [7] | CASE Q | 11 |
| | | | | |
DC2 |Device | | | | |
| Control 2 | ^R | [8] | CASE R | 12 |
| | | | | |
DC3 |Device | | | | |
| Control 3 | ^S | RS | CASE S | 13 |
| | | | | |
DC4 |Device | | | | |
| Control 4 | ^T | SQ | CASE T | 14 |
| | | | | |
NAK |Negative | | | | |
| Acknowledge | ^U | CONJ | CASE U | 15 | <NAK>
| | | | | |
SYN |Synchronous | | | | |
| Idle | ^V | EXP | CASE V | 16 |
| | | | | |
ETB |End of | | | | |
| Transmission| | | | |
| Block | ^W | [9] | CASE W | 17 |
| | | | | |
CAN |Cancel | ^X | COS | CASE X | 18 |
White [Page 7]
RFC 206 A User TELNET August 1971
EM |End of Medium | ^Y | SQRT | CASE Y | 19 |
| | | | | |
SUB | Substitute | ^Z | SIN | CASE Z | 1A |
| | | | | |
ESC | Escape |Alt Mode, | NEG | | 1B |
| | ^[ | | | |
| | | | | |
FS | File | ^ | PROD | | 1C |
| Separator | | | | |
| | | | | |
GS | Group | ^] | SORT | | 1D |
| Separator | | | | |
| | | | | |
RS | Record | ^^ | CONV | | 1E |
| Separator | | | | |
| | | | | |
US | Unit | ^<- | PWR | | 1F |
| Separator | | | | |
| | | | | |
SP | Space | |SPACE | | 20 |blank
| | | | | |
! | Exclamation | | ! | | 21 | !
| Point | | | | |
| | | | | |
" | Quotation |Diaeresis | " | | 22 | "
| Marks | | | | |
| | | | | |
# | Number Sign | | # | | 23 | #
| | | | | |
$ | Dollar Sign | | $ | | 24 | $
| | | | | |
% | Percent | | % | | 25 | %
| | | | | |
& | Ampersand | | & | | 26 | &
| | | | | |
' | Apostrophe |Acute | ' | | 27 | '
| | Accent, | | | |
| | Closing | | | |
| | Single | | | |
| | Quote | | | |
| | | | | |
( | Opening | | | | 28 | (
| Parenthesis| | ( | | |
| | | | | |
) | Closing | | | | 29 | (
| Parenthesis| | ( | | |
| | | | | |
- | Asterick | | * | | 2A | *
White [Page 8]
RFC 206 A User TELNET August 1971
+ | Plus | | + | | 2B | +
| | | | | |
, | Comma |Cedilla | , | | 2C | ,
| | | | | |
- | Hyphen |Minus | - | | 2D | -
| | | | | |
. | Period |Decimal | . | | 2E | .
| | Point | | | |
| | | | | |
/ | Slant | | / | | 2F | /
| | | | | |
: | Colon | | : | | 3A | :
| | | | | |
; | Semicolon | | ; | | 3B | ;
| | | | | |
< | Less than | | < | | 3C | <
| | | | | |
= | Equals | | = | | 3D | =
| | | | | |
> | Greater than | | > | | 3E | >
| | | | | |
? | Question Mark| | ? | | 3F | ?
| | | | | |
@ | Commercial At| | @ | | 40 | @
| | | | | |
[ | Opening | | [ | | 5B | [
| Bracket | | | | |
| | | | | |
\ | Reverse Slant| |CASE /| | 5C | \
| | | | | |
] | Closing | | ] | | 5D | ]
| Bracket | | | | |
| | | | | |
^ | Circumflex | | ^ | ^ | 5E | ^
| | | | | |
_ | Underline | | <- | _ | 5F | _
| | | | | |
` | Grave Accent | Opening |CASE `| | 60 |`
| | single | | | |
| | quote | | | |
| | | | | |
{ | Opening Brace| |CASE (| | 7B | {
| | | | | |
| | Vertical Line| | | | | 7C | |
| | | | | |
} | Closing Brace| |CASE )| | 7D | }
White [Page 9]
RFC 206 A User TELNET August 1971
~ | Tilde | Overline,| - | | 7E | ~
| | General | | | |
| | Accent | | | |
| | | | | |
DEL | Delete | Rubout | BACK | | 7F |
| | | | | |
0-9 | Numerics | | 0-9 | | 30-39 | 0-9
| | | | | |
A-Z | Upper Case | |SHIFT | | 41-5A | A-Z
| Alphabetics | |[9] | | |
| | | A-Z | | |
| | | | | |
a-z | Lower Case | | | | 61-7A | A-Z
| Alphabetics | | A-Z | | |
| | | | | |
Table Notes
[1] Down arrow
[2] Superscript 1
[3] Superscript 2
[4] Circle with Dot in the Middle
[5] Superscript 3
[6] Superscript 6
[7] Circle with Plus (+) in the Middle
[8] Circle with Slash (/) in the Middle
[9] Superscript 5
Notes for Figure 2. TELNET Character Set
Superscript 1 - All of the following keys send NULL:
SET, CLR, cent sign, Superscript 0-9
Superscript 2 - '^A' is read 'Control A'. Same for '^B', '^C', etc.
Superscript 3 - ENQ, ACK, BEL, and NAK are displayed as '<ENQ>',
'<ACK>', '<BELL>', and '<NAK>', respectively, in an
area at the top of the screen reserved especially for
those characters.
Superscript 4 - ^A is sent by hitting th keys 'CASE' and 'A' in turn.
Same for ^B, ^C, etc.
Superscript 5 - Upper case 'A' is sent by holding down the SHIFT key
while 'A' is struck. Same for upper case 'B', 'C',
etc.
White [Page 10]
RFC 206 A User TELNET August 1971
Superscript 6 - CR also causes an underline '_' to be displayed in
the left margin as a substitute for the often useful
cue provided by the noisy return of a teletype
carriage.
A storage scope is also a much faster display device than a teletype.
However, in some situations this apparent attribute can be
troublesome. In particular, when a system displays a whole series of
lines of text without requiring input from the user, the display may
be wrapped around from the bottom of the scope to the top, and begin
overlaying itself before the user has had some time to read it all.
In such cases, the following strategy is sometimes useful (and will
make sense once the next section -- Section IV -- has been read): hit
_II_ before the display begins to wrap around upon itself; the
display will stop. After the text has been read, erase the scope and
hit _LOG_ and display will resume.
If the user hits _ERASE_ while in TELNET, that key will have its
usual effect; it will have _no_effect upon the remote system.
However, because of a quirk in the current implementation of TELNET,
_ERASE_ will have the one additional effect of causing the display of
incoming text to be suspended until another key on the virtual
teletype is struck. The user is thus cautioned against erasing the
scope while waiting for a response from the remote system. However,
the user can extricate himself from the situation described by
following the _ERASE_ with NUL on the virtual teletype.
IV. Returning to TELNET
The user can at any time escape from TELNET (and hence from the
remote system to which he is attached) by depressing a level key
(e.g., I, II,...,_SYST, TYPE, LIST_) or of course, by hitting
_RESET_. Any time thereafter, the user may return to TELNET by
hitting _II LOG_ (on NET) once again, and resume operation on his
remote system _exactly where he left off_. When _'II LOG'_ is
pressed this second time, instead of querying the user for site
number as before, TELNET will notice that the user is already
connected to a remote system and simply resume where _it_ left off.
After he escapes from TELNET and before he returns to it, the user
may engage himself in any other Online System activity short of
logging out but including changing systems, while still retaining the
option of subsequently returning to TELNET and resuming activity on
the remote system to which he remains connected. The user can
exploit this property of TELNET to obtain hard copy of a selected
portion of his dialogue with the remote system. The user simply
brings his system to the point at which a listing is thereby desired,
escapes from TELNET by hitting _'TYPE SEL' 1,4 RETURN'_, thereby
White [Page 11]
RFC 206 A User TELNET August 1971
selecting the line printer as a secondary output device, and then
returns to TELNET by pressing _'II LOG'_. All subsequent
communication with the remote system will be recorded for eventual
output on the printer. Logging off of OLS while escaped from TELNET
causes the TELNET connection to be broken automatically by the
system.
V. Breaking TELNET Connections
At any time while the user is in contact with TELNET, after the
connection to the remote system has been established, the user may
terminate that connection by hitting _'CON RETURN'_. TELNET will
respond _'SOCKETS PURGED_'. \ subsequent call to TELNET (i.e., a
subsequent instance of _'II LOG'_) will illicit the original query
for remote site number. The user is then free to connect himself to
another foreign system.
The user is cautioned that breaking Network connections as just
described is not necessarily equivalent to logging out of the remote
system. Some Server TELNETs may, when they detect the breaking of
connections, log the user off of their system; others may leave the
user logged on. The user should be aware of the conventions of the
systems he uses and, where appropriate, log himself off before
breaking connections.
The key sequence _'I DEL RETURN'_ will also terminate a TELNET
connection, but all other connections that may have been previously
established using the operators of Level I are closed as well.
VI. Abnormal Network Conditions
While the user is in TELNET and attached to a remote system, TELNET
monitors the user's Network connections. If any abnormal condition
is detected, it terminates its monitoring and issues a message of the
form:
{CONNECT}
{INPUT} ERROR - CODE = n
{OUTPUT}
where 'n' is one of the values listed in Figures 3-5. A CONNECT
error may occur during TELNET's initial attempt to establish
connections to the remote system; an INPUT error may occur when
TELNET attempts to extract incoming data from the NET; and an OUTPUT
error may occur as TELNET tries to insert outgoing data into the Net.
White [Page 12]
RFC 206 A User TELNET August 1971
Figure 3. Connect Error Codes
4 - A previous invocation of TELNET left a local receive
socket open; the send socket is closed. Hit _'I DEL
RETURN'_.
8 - A previous invocation of TELNET aborted, and _'I DEL
RETURN'_ failed to close the Network connections.
The remote site is probably dead.
12 - All communication paths between UCSB and the
specified remote site are in use.
16 - UCSB's NCP is running at capacity or is drained or
stopped.
20 - The connection attempt was refused by the remote
site.
28 - No such remote site.
36 - Remote site was discovered to be dead.
44 - The Operator has stopped or reset the NCP.
60 - Either the specified remote site is not accepting
input from the net, or there was a failure in the
subnet.
68 - The specified remote site has broken all existing
connections to UCSB.
72 - The remote site is known to be dead.
Figure 4. Input Error Codes
8 - Connections to the server TELNET at the remote site
have been broken.
16 - Connections to the Server TELNET at the remote site
are being broken.
52 - An interrupt was sent by the remote system. Resume
by hitting _LOG_.
White [Page 13]
RFC 206 A User TELNET August 1971
Figure 5. Output Error Codes
8 - Connections to the Server TELNET at the remote site
have been broken.
16 - Connections to the Server TELNET at the remote site
are being broken.
20 - same as 8.
36 - Remote site has died.
44 - The Operator has stopped or reset the NCP.
52 - An interrupt was sent by the remote system. Resume
by hitting _LOG_.
60 - Either the remote site has stopped accepting input
from the Net or there was a failure in the subnet.
64 - same as 60.
68 - The remote site has broken all existing connections
to UCSB.
White [Page 14]