| Network communication is an important branch of the communication technology. With the rapid development of network communication, individuals and commercial units all need the support of the network equipment This paper concerns the design and implementation of the software running on the terminal server, which provides the communication between the local terminals and the remote hosts.The first part of the paper analyses the network virtual terminal software. It discusses the Telnet, one of the standard applications in the Internet, and the Reverse Telnet developed by myself. Telnet is an application developed long before and it still has the important use now. Telnet protocol has complicated definitions about the commands, the negotiation of the options and the sub-options, which do not handle the data desired by the uses. It just is the goal of the development of the Reverse Telnet, by which we can erase the definitions, make the protocol and code terse and get some other advantages. The paper shows the definition of the Reverse Telnet, the fundamental scheme, and the main flowcharts of the programs running on the server end and terminal end.The second part concerns the network security, providing the basic conceptions and the mathematical fundament, showing the implementations on the different network layers and revealing the advantage and disadvantage of the implementations. This part discusses the security standard in the Internet, the IPSec protocol suit. It analyses in details the interplay of all the components, the essential concepts such as Security Association, Security Association Database and Security Policy Database, the process of the package handling, the two security protocol Encapsulating Security Payload and Authentication Header It concerns not only the regulations of the protocols themselves but also the implementation schemes. It pays a great attention to the Internet Security Association and Key Management Protocol (ISAKMP) and the Internet Key Exchange (IKE) based on ISAKMP, because the key management is always the most consequential part of any security systems. To make the usage ofIPSec understood easier, at the end of this part, it gives the reader an example indicating the usage as a ultimate user Whereas, the paper do not offer the encryption algorithms and nthontication algorithms Anvone who is introstcd in tho firl rni reter to RFC documentsIn the end, the paper shows the combination between the two modules discussed above and the actual tcsi pun-ess and the resuiis... |