diff --git a/LDP/guide/docbook/Linux-Networking/Connectivity-Devices.xml b/LDP/guide/docbook/Linux-Networking/Connectivity-Devices.xml index 34100cb0..ea3e440d 100644 --- a/LDP/guide/docbook/Linux-Networking/Connectivity-Devices.xml +++ b/LDP/guide/docbook/Linux-Networking/Connectivity-Devices.xml @@ -9,38 +9,33 @@ optional features; for example, a repeater can extend the length of a bus network segment. -Repeaters + - +Repeaters Repeaters connect network media to extend total length. The purpose of this device is to eliminate the effects if attenuation. However, as is outlined in the 'Overview' section of this document it can sometimes inadvertently add 'noise' to the network signal. Please see the 'Overview' for further details on this device. - + -Hub - - +Hub Hubs connect nodes and network resources in a network to a central point in a star topology. It should be noted the the usage of these devices has largely been eliminated as the development of 'switch' and general 'switching-fabric' technology has delivered increased levels of speed and efficiency in network communication. Switches and routers are two types of hubs. - + -Switch - +Switch Switches connect nodes in a private network to a central point in a star topology. They send packets to nodes based on MAC address and provide roughtly the same functionality as 'routers' but much more efficiently and on a different level. - + -Bridge - - +Bridge Bridges filter and move data between segments based on MAC address. For example, an ethernet bridge is a device that controls data packets within a subnet in an attempt to cut down the amount of traffic. A bridge @@ -58,39 +53,32 @@ collisions. Several bridges can work together to create even larger networks of Ethernets using the IEEE 802.1 spanning tree algorithm. As this is a standard, Linux bridges will interoperate properly with other third party bridge products. Additional packages allow filtering based on IP, IPX or MAC -addresses. +addresses. Please see the Bridge-HOWTO for further details as to their purpose, +usage and implementation. + -Please see :- - -for further details as to their purpose, usage and implementation. - - -Router - - +Router A special purpose computer, hardware device or software package that handles the connection between two or more packet-switched networks. Routers spend all their time looking at the logical source and logical destination addresses of the packets passing through them and deciding which route or host to send them on to. Please see the 'Routing' section for further details on this device. - + -Brouter - - +Brouter A network device that combines bridge and router capablities. - + -Gateway - - +Gateway The technical meaning is a hardware or software set-up that translates between two dissimilar protocols/data formats, for example America Online has a gateway that translates between its internal, proprietary e-mail format and Internet e-mail format. Another, sloppier meaning of gateway is to describe any mechanism for providing access to another system, e.g. AOL might be called a gateway to the Internet. - + + + diff --git a/LDP/guide/docbook/Linux-Networking/Donations.xml b/LDP/guide/docbook/Linux-Networking/Donations.xml index 7ea339ba..fb97f52d 100644 --- a/LDP/guide/docbook/Linux-Networking/Donations.xml +++ b/LDP/guide/docbook/Linux-Networking/Donations.xml @@ -1,4 +1,3 @@ - Donations diff --git a/LDP/guide/docbook/Linux-Networking/Glossary.xml b/LDP/guide/docbook/Linux-Networking/Glossary.xml index f35619b9..c09d0b8f 100644 --- a/LDP/guide/docbook/Linux-Networking/Glossary.xml +++ b/LDP/guide/docbook/Linux-Networking/Glossary.xml @@ -2,927 +2,1867 @@ Glossary + + ARPA - The Advanced Research and Projects Agency of the United States Department of Defense. - Also known as DARPA (the "D" stands for "Defense"), it originated in the late 1960s - and early 1970s the proposal and standards for the Internet. For this reason, the - Internet was initially referred to as ARPANet, and connected the military with the - various centers of research around the United States in a way that was intended to - have a high degree of survivability against a nuclear attack. + + + +The Advanced Research and Projects Agency of the United States Department of Defense. Also known as DARPA (the "D" stands for "Defense"), it originated in the late 1960s and early 1970s the proposal and standards for the Internet. For this reason, the Internet was initially referred to as ARPANet, and connected the military with the various centers of research around the United States in a way that was intended to have a high degree of survivability against a nuclear attack. + + + + + BASH - The Bourne Again Shell and is based on the Bourne shell, sh, the original command interpreter. + + + +The Bourne Again Shell and is based on the Bourne shell, sh, the original command interpreter. + + + + + Bourne Shell - The Bourne shell is the original Unix shell (command execution program, often called a - command interpreter) that was developed at AT&T. Named for its developer, Stephen - Bourne, the Bourne shell is also known by its program name, sh. The shell prompt (character - displayed to indicate readiness for input) used is the $ symbol. The Bourne shell family - includes the Bourne, Korn shell, bash, and zsh shells. Bourne Again Shell (bash) is the - free version of the Bourne shell distributed with Linux systems. Bash is similar to the - original, but has added features such as command line editing. Its name is sometimes - spelled as Bourne Again SHell, the capitalized Hell referring to the difficulty some people - have with it. + + + +The Bourne shell is the original Unix shell (command execution program, often called a command interpreter) that was developed at AT&T. Named for its developer, Stephen Bourne, the Bourne shell is also known by its program name, sh. The shell prompt (character displayed to indicate readiness for input) used is the $ symbol. The Bourne shell family includes the Bourne, Korn shell, bash, and zsh shells. Bourne Again Shell (bash) is the free version of the Bourne shell distributed with Linux systems. Bash is similar to the original, but has added features such as command line editing. Its name is sometimes spelled as Bourne Again SHell, the capitalized Hell referring to the difficulty some people have with it. + + + + + CLI - A CLI (command line interface) is a user interface to a computer's operating system or an - application in which the user responds to a visual prompt by typing in a command on a - specified line, receives a response back from the system, and then enters another command, - and so forth. The MS-DOS Prompt application in a Windows operating system is an example of - the provision of a command line interface. Today, most users prefer the graphical user - interface (GUI) offered by Windows, Mac OS, BeOS, and others. Typically, most of today's - Unix-based systems offer both a command line interface and a graphical user interface. - + + + +A CLI (command line interface) is a user interface to a computer's operating system or an application in which the user responds to a visual prompt by typing in a command on a specified line, receives a response back from the system, and then enters another command, and so forth. The MS-DOS Prompt application in a Windows operating system is an example of the provision of a command line interface. Today, most users prefer the graphical user interface (GUI) offered by Windows, Mac OS, BeOS, and others. Typically, most of today's Unix-based systems offer both a command line interface and a graphical user interface. + + + + + + +core + + + +A core file is created when a program terminates unexpectedly, due to a bug, or a violation of the operating system's or hardware's protection mechanisms. The operating system kills the program and creates a core file that programmers can use to figure out what went wrong. It contains a detailed description of the state that the program was in when it died. If would like to determine what program a core file came from, use the file command, like this: $ file core That will tell you the name of the program that produced the core dump. You may want to write the maintainer(s) of the program, telling them that their program dumped core. To Enable or Disable Core Dumps you must use the ulimit command in bash, the limit command in tcsh, or the rlimit command in ksh. See the appropriate manual page for details. This setting affects all programs run from the shell (directly or indirectly), not the whole system. If you wish to enable or disable core dumping for all processes by default, you can change the default setting in /usr/include/linux/sched.h. Refer to definition of INIT_TASK, and look also in /usr/include/linux/resource.h. PAM support optimizes the system's environment, including the amount of memory a user is allowed. In some distributions this parameter is configurable in the /etc/security/limits.conf file. For more information, refer to the Linux Administrator's Security Guide. + + + + + + daemon - A process lurking in the background, usually unnoticed, until something triggers it into - action. For example, the \cmd{update} daemon wakes up every thirty seconds or so to - flush the buffer cache, and the \cmd{sendmail} daemon awakes whenever someone sends mail. + + + +A process lurking in the background, usually unnoticed, until something triggers it into action. For example, the \cmd{update} daemon wakes up every thirty seconds or so to flush the buffer cache, and the \cmd{sendmail} daemon awakes whenever someone sends mail. + + + + + DARPA - The Defense Advanced Research Projects Agency is the central research and development - organization for the Department of Defense (DoD). It manages and directs selected basic - and applied research and development projects for DoD, and pursues research and - technology where risk and payoff are both very high and where success may provide - dramatic advances for traditional military roles and missions. + + + +The Defense Advanced Research Projects Agency is the central research and development organization for the Department of Defense (DoD). It manages and directs selected basic and applied research and development projects for DoD, and pursues research and technology where risk and payoff are both very high and where success may provide dramatic advances for traditional military roles and missions. + + + + + DHCP - Dynamic Host Control Protocol, is a protocol like BOOTP (actually dhcpd includes much - of the functionality of BOOTPD). It assigns IP addresses to clients based on lease times. - DHCP is used extensively by Microsoft and more recently also by Apple. It is probably - essential in any multi-platform environment. + + + +Dynamic Host Control Protocol, is a protocol like BOOTP (actually dhcpd includes much of the functionality of BOOTPD). It assigns IP addresses to clients based on lease times. DHCP is used extensively by Microsoft and more recently also by Apple. It is probably essential in any multi-platform environment. + + + + + DNS - Domain Name System translates Internet domain and host names to IP addresses. DNS - implements a distributed database to store name and address information for all - public hosts on the Net. DNS assumes IP addresses do not change (i.e., are - statically assigned rather than dynamically assigned). The DNS database resides - on a hierarchy of special-purpose servers. When visiting a Web site or other device - on the Net, a piece of software called the DNS resolver (usually built - into the network operating system) first contacts a DNS server to determine the server's IP - address. If the DNS server does not contain the needed mapping, it will in turn forward the - request to a DNS server at the next higher level in the hierarchy. After potentially several - forwarding and delegation messages are sent within the DNS hierarchy, the IP address for the - given host eventually is delivered to the resolver. DNS also includes support for caching - requests and for redundancy. Most network operating systems allow one to enter the - IP addresses of primary, secondary, and tertiary DNS servers, each of which can service - initial requests from clients. Many ISPs maintain their own DNS servers and use DHCP - to automatically assign the addresses of these servers to dial-in clients, so most - home users need not be aware of the details behind DNS configuration. Registered - domain names and addresses must be renewed periodically, and should a dispute occur - between two parties over ownership of a given name, such as in trademarking, ICANN's - Uniform Domain-Name Dispute-Resolution Policy can be invoked. Also known as Domain - Name System, Domain Name Service, Domain Name Server. + + + +Domain Name System translates Internet domain and host names to IP addresses. DNS implements a distributed database to store name and address information for all public hosts on the Net. DNS assumes IP addresses do not change (i.e., are statically assigned rather than dynamically assigned). The DNS database resides on a hierarchy of special-purpose servers. When visiting a Web site or other device on the Net, a piece of software called the DNS resolver (usually built into the network operating system) first contacts a DNS server to determine the server's IP address. If the DNS server does not contain the needed mapping, it will in turn forward the request to a DNS server at the next higher level in the hierarchy. After potentially several forwarding and delegation messages are sent within the DNS hierarchy, the IP address for the given host eventually is delivered to the resolver. DNS also includes support for caching requests and for redundancy. Most network operating systems allow one to enter the IP addresses of primary, secondary, and tertiary DNS servers, each of which can service initial requests from clients. Many ISPs maintain their own DNS servers and use DHCP to automatically assign the addresses of these servers to dial-in clients, so most home users need not be aware of the details behind DNS configuration. Registered domain names and addresses must be renewed periodically, and should a dispute occur between two parties over ownership of a given name, such as in trademarking, ICANN's Uniform Domain-Name Dispute-Resolution Policy can be invoked. Also known as Domain Name System, Domain Name Service, Domain Name Server. + + + + + environment variable - A variable that is available to any program that is started by the shell. + + + +A variable that is available to any program that is started by the shell. + + + + + +ESD + + + +Enlightened Sound Daemon. This program is designed to mix together several digitized audio streams for playback by a single device. + + + + + + +filesystem + + + +The methods and data structures that an operating system uses to keep track of files on a disk or partition; the way the files are organized on the disk. Also used to describe a partition or disk that is used to store the files or the type of the filesystem. + + + + + + +FSSTND + + + +Often the group, which creates the Linux File System Structure document, or the document itself, is referred to as the 'FSSTND'. This is short for "file system standard". This document has helped to standardize the layout of file systems on Linux systems everywhere. Since the original release of the standard, most distributors have adopted it in whole or in part, much to the benefit of all Linux users. It is now often refered to as the FHS (Filesystem Hierarchy Standard) document though since its incorporation into the LSB (Linux Standards Base) Project. + + + + + + GUI - Graphical User Interface. The use of pictures rather than just words to represent the input and output of a program. A program with a GUI runs under some windowing system (e.g. - The X Window System, Microsoft Windows, Acorn RISC OS, NEXTSTEP). The program displays - certain icons, buttons, dialogue boxes etc. in its windows on the screen and the user - controls it mainly by moving a pointer on the screen (typically controlled by a mouse) and - selecting certain objects by pressing buttons on the mouse while the pointer is pointing - at them. Though Apple Computer would like to claim they invented the GUI with their - Macintosh operating system, the concept originated in the early 1970s at Xerox's PARC - laboratory. + + + +Graphical User Interface. The use of pictures rather than just words to represent the input and output of a program. A program with a GUI runs under some windowing system (e.g. The X Window System, Microsoft Windows, Acorn RISC OS, NEXTSTEP). The program displays certain icons, buttons, dialogue boxes etc. in its windows on the screen and the user controls it mainly by moving a pointer on the screen (typically controlled by a mouse) and selecting certain objects by pressing buttons on the mouse while the pointer is pointing at them. Though Apple Computer would like to claim they invented the GUI with their Macintosh operating system, the concept originated in the early 1970s at Xerox's PARC laboratory. + + + + + hard link - A directory entry, which maps a filename to an inode, number. A file may have multiple - names or hard links. The link count gives the number of names by which a file is - accessible. Hard links do not allow multiple names for directories and do not allow - multiple names in different filesystems. + + + +A directory entry, which maps a filename to an inode, number. A file may have multiple names or hard links. The link count gives the number of names by which a file is accessible. Hard links do not allow multiple names for directories and do not allow multiple names in different filesystems. + + + + + init - 'init' process is the first user level process started by the kernel. init has many - important duties, such as starting getty (so that users can log in), implementing - run levels, and taking care of orphaned processes. This chapter explains how init - is configured and how you can make use of the different run levels. init is one of - those programs that are absolutely essential to the operation of a Linux system, - but that you still can mostly ignore. Usually, you only need to worry about init - if you hook up serial terminals, dial-in (not dial-out) modems, or if you want to - change the default run level. When the kernel has started (has been loaded into memory, - has started running, and has initialized all device drivers and data structures and - such), it finishes its own part of the boot process by starting a user level program, - init. Thus, init is always the first process (its process number is always 1). The - kernel looks for init in a few locations that have been historically used for it, - but the proper location for it is /sbin/init. If the kernel can't find init, it - tries to run /bin/sh, and if that also fails, the startup of the system fails. - When init starts, it completes the boot process by doing a number of administrative - tasks, such as checking filesystems, cleaning up /tmp, starting various services, - and starting a getty for each terminal and virtual console where users should be able - to log in. After the system is properly up, init restarts getty for each terminal - after a user has logged out (so that the next user can log in). init also adopts - orphan processes: when a process starts a child process and dies before its child, - the child immediately becomes a child of init. This is important for various - technical reasons, but it is good to know it, since it makes it easier to understand - process lists and process tree graphs. init itself is not allowed to die. You can't - kill init even with SIGKILL. There are a few variants of init available. Most - Linux distributions use sysvinit (written by Miquel van Smoorenburg), which is based - on the System V init design. The BSD versions of Unix have a different init. The - primary difference is run levels: System V has them, BSD doesn't. + + + +'init' process is the first user level process started by the kernel. init has many important duties, such as starting getty (so that users can log in), implementing run levels, and taking care of orphaned processes. This chapter explains how init is configured and how you can make use of the different run levels. init is one of those programs that are absolutely essential to the operation of a Linux system, but that you still can mostly ignore. Usually, you only need to worry about init if you hook up serial terminals, dial-in (not dial-out) modems, or if you want to change the default run level. When the kernel has started (has been loaded into memory, has started running, and has initialized all device drivers and data structures and such), it finishes its own part of the boot process by starting a user level program, init. Thus, init is always the first process (its process number is always 1). The kernel looks for init in a few locations that have been historically used for it, but the proper location for it is /sbin/init. If the kernel can't find init, it tries to run /bin/sh, and if that also fails, the startup of the system fails. When init starts, it completes the boot process by doing a number of administrative tasks, such as checking filesystems, cleaning up /tmp, starting various services, and starting a getty for each terminal and virtual console where users should be able to log in. After the system is properly up, init restarts getty for each terminal after a user has logged out (so that the next user can log in). init also adopts orphan processes: when a process starts a child process and dies before its child, the child immediately becomes a child of init. This is important for various technical reasons, but it is good to know it, since it makes it easier to understand process lists and process tree graphs. init itself is not allowed to die. You can't kill init even with SIGKILL. There are a few variants of init available. Most Linux distributions use sysvinit (written by Miquel van Smoorenburg), which is based on the System V init design. The BSD versions of Unix have a different init. The primary difference is run levels: System V has them, BSD doesn't. + + + + + inode - An inode is the address of a disk block. When you see the inode information through ls, ls - prints the address of the first block in the file. You can use this information to tell if - two files are really the same file with different names (links). A file has several - components: a name, contents, and administrative information such as permissions and - modification times. The administrative information is stored in the inode (over the years, - the hyphen fell out of "i-node"), along with essential system data such as how long it is, - where on the disc the contents of the file are stored, and so on. There are three times in - the inode: the time that the contents of the file were last modified (written); the time - that the file was last used (read or executed); and the time that the inode itself was last - changed, for example to set the permissions. Altering the contents of the file does not - affect its usage time and changing the permissions affects only the inode change time. It - is important to understand inodes, not only to appreciate the options on ls, but because in - a strong sense the inodes are the files. All the directory hierarchy does is provide - convenient names for files. The system's internal name for the file is its i-number: the - number of the inode holding the file's information. + + + +An inode is the address of a disk block. When you see the inode information through ls, ls prints the address of the first block in the file. You can use this information to tell if two files are really the same file with different names (links). A file has several components: a name, contents, and administrative information such as permissions and modification times. The administrative information is stored in the inode (over the years, the hyphen fell out of "i-node"), along with essential system data such as how long it is, where on the disc the contents of the file are stored, and so on. There are three times in the inode: the time that the contents of the file were last modified (written); the time that the file was last used (read or executed); and the time that the inode itself was last changed, for example to set the permissions. Altering the contents of the file does not affect its usage time and changing the permissions affects only the inode change time. It is important to understand inodes, not only to appreciate the options on ls, but because in a strong sense the inodes are the files. All the directory hierarchy does is provide convenient names for files. The system's internal name for the file is its i-number: the number of the inode holding the file's information. + + + + + kernel - Part of an operating system that implements the interaction with hardware and the sharing - of resources. + + + +Part of an operating system that implements the interaction with hardware and the sharing of resources. + + + + + libraries - Executables should have no undefined symbols, only useful symbols; all useful programs refer - to symbols they do not define (eg. printf or write). These references are resolved by pulling - object files from libraries into the executable. + + + +Executables should have no undefined symbols, only useful symbols; all useful programs refer to symbols they do not define (eg. printf or write). These references are resolved by pulling object files from libraries into the executable. + + + + + link - A symbolic link (alias in MacOS and shortcut under Windows) is a file that points to another - file; this is a commonly used tool. A hard-link rarely created by the user, is a filename - that points to a block of data that has several other filenames as well. + + + +A symbolic link (alias in MacOS and shortcut under Windows) is a file that points to another file; this is a commonly used tool. A hard-link rarely created by the user, is a filename that points to a block of data that has several other filenames as well. + + + + + man page - Every version of UNIX comes with an extensive collection of online help pages called man - pages (short for manual pages). The man pages are the authoritative documentation about - your UNIX system. They contain complete information about both the kernel and all the utilities. + + + +Every version of UNIX comes with an extensive collection of online help pages called man pages (short for manual pages). The man pages are the authoritative documentation about your UNIX system. They contain complete information about both the kernel and all the utilities. + + + + + MTA - Mail Transfer Agents. Alongside the web, mail is the top reason for the popularity of the - Internet. E-mail is an inexpensive and fast method of time-shifted messaging which, much - like the Web, is actually based around sending and receiving plain text files. The - protocol used is called the Simple Mail Transfer Protocol (SMTP). The server programs - that implement SMTP to move mail from one server to another are called MTAs. Once upon - a time users would have to Telnet into an SMTP server and use a command line mail program - like 'mutt' or 'pine' to check their mail. Now, GUI based e-mail clients like Mozilla, - Kmail and Outlook allow users to check their email off of a local SMTP sever. Additional - protocols like POP3 and IMAP4 are used between the SMTP server and desktop mail client to - allow clients to manipulate files on, and download from, their local mail server. The - programs that implement POP3 and IMAP4 are called Mail Delivery Agents (MDAs). They are - generally separate from MTAs. + + + +Mail Transfer Agents. Alongside the web, mail is the top reason for the popularity of the Internet. E-mail is an inexpensive and fast method of time-shifted messaging which, much like the Web, is actually based around sending and receiving plain text files. The protocol used is called the Simple Mail Transfer Protocol (SMTP). The server programs that implement SMTP to move mail from one server to another are called MTAs. Once upon a time users would have to Telnet into an SMTP server and use a command line mail program like 'mutt' or 'pine' to check their mail. Now, GUI based e-mail clients like Mozilla, Kmail and Outlook allow users to check their email off of a local SMTP sever. Additional protocols like POP3 and IMAP4 are used between the SMTP server and desktop mail client to allow clients to manipulate files on, and download from, their local mail server. The programs that implement POP3 and IMAP4 are called Mail Delivery Agents (MDAs). They are generally separate from MTAs. + + + + + NFS - Network File System, is the UNIX equivalent of Server Message Block (SMB). It is a way - through which different machines can import and export local files between each other. - Like SMB though, NFS sends information including user passwords unencrypted, so it's best - to limit its usage to within your local network. + + + +Network File System, is the UNIX equivalent of Server Message Block (SMB). It is a way through which different machines can import and export local files between each other. Like SMB though, NFS sends information including user passwords unencrypted, so it's best to limit its usage to within your local network. + + + + + operating system - Software that shares a computer system's resources (processor, memory, disk space, network - bandwidth, and so on) between users and the application programs they run. Controls access - to the system to provide security. + + + +Software that shares a computer system's resources (processor, memory, disk space, network bandwidth, and so on) between users and the application programs they run. Controls access to the system to provide security. + + + + + PAM - Pluggable Authentication Modules. A suite of shared libraries that determine how a user - will be authenticated. For example, conventionally UNIX users authenticate themselves by - supplying a password at the password prompt after they have typed their name at the login - prompt. In many circumstances, such as internal access to workstations, this simple form - of authentication is considered sufficient. In other cases, more information is warranted. - If a user wants to log in to an internal system from an external source, like the Internet, - more or alternative information may be required - perhaps a one-time password. PAM - provides this type of capability and much more. Most important, PAM modules allow you to - configure your environment with the necessary level of security. + + + +Pluggable Authentication Modules. A suite of shared libraries that determine how a user will be authenticated. For example, conventionally UNIX users authenticate themselves by supplying a password at the password prompt after they have typed their name at the login prompt. In many circumstances, such as internal access to workstations, this simple form of authentication is considered sufficient. In other cases, more information is warranted. If a user wants to log in to an internal system from an external source, like the Internet, more or alternative information may be required - perhaps a one-time password. PAM provides this type of capability and much more. Most important, PAM modules allow you to configure your environment with the necessary level of security. + + + + + PATH - The shell looks for commands and programs in a list of file paths stored in the PATH - environment variable. An environment variable stores information in a place where other - programs and commands can access it. Environment variables store information such as the - shell that you are using, your login name, and your current working directory. To see a - list of all the environment variables currently defined; type 'set' at the prompt. When - you type a command at the shell prompt, the shell will look for that command's program - file in each directory listed in the PATH variable, in order. The first program found - matching the command you typed will be run. If the command's program file is not in a - directory listed in you PATH environment variable, the shell returns a "commands not found" - error. By default, the shell does not look in your current working directory or your home - directory for commands This is really a security mechanism so that you don't execute - programs by accident. What if a malicious user put a harmful program called ls in your - home directory? If you typed ls and the shell looked for the fake program in your home - directory before the real program in the /bin directory, what do you think would happen? - If you thought bad things, you are on the right track. Since your PATH doesn't have the - current directory as one of its search locations, programs in your current directory - must be called with an absolute path of a relative path specified as './program-name'. - To see what directories are part of your PATH enter this command: - # echo $PATH /usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/usr/bin/X11 + + + +The shell looks for commands and programs in a list of file paths stored in the PATH environment variable. An environment variable stores information in a place where other programs and commands can access it. Environment variables store information such as the shell that you are using, your login name, and your current working directory. To see a list of all the environment variables currently defined; type 'set' at the prompt. When you type a command at the shell prompt, the shell will look for that command's program file in each directory listed in the PATH variable, in order. The first program found matching the command you typed will be run. If the command's program file is not in a directory listed in you PATH environment variable, the shell returns a "commands not found" error. By default, the shell does not look in your current working directory or your home directory for commands This is really a security mechanism so that you don't execute programs by accident. What if a malicious user put a harmful program called ls in your home directory? If you typed ls and the shell looked for the fake program in your home directory before the real program in the /bin directory, what do you think would happen? If you thought bad things, you are on the right track. Since your PATH doesn't have the current directory as one of its search locations, programs in your current directory must be called with an absolute path of a relative path specified as './program-name'. To see what directories are part of your PATH enter this command: # echo $PATH /usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/usr/bin/X11 + + + + + pipes and sockets - Special files that programs use to communicate with one another. They are rarely seen, - but you might be able to see a socket or two in the /dev/ directory. + + + +Special files that programs use to communicate with one another. They are rarely seen, but you might be able to see a socket or two in the /dev/ directory. + + + + + process identifier - Shown in the heading of the ps command as PID. The unique number assigned to every - process running in the system. + + + +Shown in the heading of the ps command as PID. The unique number assigned to every process running in the system. + + + + + rpc - Remote Procedure Calls. It enables a system to make calls to programs such as NFS - across the network transparently, enabling each system to interpret the calls as - if they were local. In this case, it would make exported filesystems appear as - thought they were local. + + + +Remote Procedure Calls. It enables a system to make calls to programs such as NFS across the network transparently, enabling each system to interpret the calls as if they were local. In this case, it would make exported filesystems appear as thought they were local. + + + + + set group ID (SGID) - The SGID permission causes a script to run with its group set to the group of the - script, rather than the group of the user who started it. It is normally considered - extremely bad practice to run a program in this way as it can pose many security - problems. Later versions of the Linux kernel will even prohibit the running of shell - scripts that have this attribute set. + + + +The SGID permission causes a script to run with its group set to the group of the script, rather than the group of the user who started it. It is normally considered extremely bad practice to run a program in this way as it can pose many security problems. Later versions of the Linux kernel will even prohibit the running of shell scripts that have this attribute set. + + + + + set user ID (SUID) - The SUID permission causes a script to run as the user who is the owner of the script, - rather than the user who started it. It is normally considered extremely bad practice - to run a program in this way as it can pose many security problems. Later versions of - the Linux kernel will even prohibit the running of shell scripts that have this attribute - set. + + + +The SUID permission causes a script to run as the user who is the owner of the script, rather than the user who started it. It is normally considered extremely bad practice to run a program in this way as it can pose many security problems. Later versions of the Linux kernel will even prohibit the running of shell scripts that have this attribute set. + + + + + signal - Software interrupts sent to a program to indicate that an important event has occurred. - The events can vary from user requests to illegal memory access errors. Some signals, - like the interrupt signal, indicate that a user has asked the program to do something - that is not in the usual flow of control. + + + +Software interrupts sent to a program to indicate that an important event has occurred. The events can vary from user requests to illegal memory access errors. Some signals, like the interrupt signal, indicate that a user has asked the program to do something that is not in the usual flow of control. + + + + + SSH - The Secure Shell, or SSH, provides a way of running command line and graphical - applications, and transferring files, over an encrypted connection, all that will - be seen is junk. It is both a protocol and a suite of small command line applications, - which can be used for various functions. SSH replaces the old Telnet application, - and can be used for secure remote administration of machines across the Internet. - However, it also has other features. SSH increases the ease of running applications - remotely by setting up X permissions automatically. If you can log into a machine, - it allows you to run a graphical application on it, unlike Telnet, which requires - users to have an understanding of the X authentication mechanisms that are manipulated - through the xauth and xhost commands. SSH also has inbuilt compression, which allows - your graphic applications to run much faster over the network. SCP (Secure Copy) and - SFTP (Secure FTP) allow transfer of files over the remote link, either via SSH's own - command line utilities or graphical tools like Gnome's GFTP. Like Telnet, SSH is - cross-platform. You can find SSH server and clients for Linux, Unix and all flavours - of Windows, BeOS, PalmOS, Java and embedded Oses used in routers. + + + +The Secure Shell, or SSH, provides a way of running command line and graphical applications, and transferring files, over an encrypted connection, all that will be seen is junk. It is both a protocol and a suite of small command line applications, which can be used for various functions. SSH replaces the old Telnet application, and can be used for secure remote administration of machines across the Internet. However, it also has other features. SSH increases the ease of running applications remotely by setting up X permissions automatically. If you can log into a machine, it allows you to run a graphical application on it, unlike Telnet, which requires users to have an understanding of the X authentication mechanisms that are manipulated through the xauth and xhost commands. SSH also has inbuilt compression, which allows your graphic applications to run much faster over the network. SCP (Secure Copy) and SFTP (Secure FTP) allow transfer of files over the remote link, either via SSH's own command line utilities or graphical tools like Gnome's GFTP. Like Telnet, SSH is cross-platform. You can find SSH server and clients for Linux, Unix and all flavours of Windows, BeOS, PalmOS, Java and embedded Oses used in routers. + + + + + STDERR - Standard error. A special type of output used for error messages. The file - descriptor for STDERR is 2. + + + +Standard error. A special type of output used for error messages. The file descriptor for STDERR is 2. + + + + + STDIN - Standard input. User input is read from STDIN. The file descriptor for STDIN is 0. + + + +Standard input. User input is read from STDIN. The file descriptor for STDIN is 0. + + + + + STDOUT - Standard output. The output of scripts is usually to STDOUT. The file descriptor - for STDOUT is 1. + + + +Standard output. The output of scripts is usually to STDOUT. The file descriptor for STDOUT is 1. + + + + + symbol table - The part of an object table that gives the value of each symbol (usually - as a section name and an offset) is called the symbol table. Executables may - also have a symbol table, with this one giving the final values of the symbols. - Debuggers use the symbol table to present addresses to the user in a symbolic, - rather than a numeric form. It is possible to strip the symbol table from - executables resulting in a smaller sized executable but this prevents - meaningful debugging. + + + +The part of an object table that gives the value of each symbol (usually as a section name and an offset) is called the symbol table. Executables may also have a symbol table, with this one giving the final values of the symbols. Debuggers use the symbol table to present addresses to the user in a symbolic, rather than a numeric form. It is possible to strip the symbol table from executables resulting in a smaller sized executable but this prevents meaningful debugging. + + + + + symbolic link or soft link - A special filetype, which is a small pointer file, allowing multiple names - for the same file. Unlike hard links, symbolic links can be made for directories - and can be made across filesystems. Commands that access the file being pointed - to are said to follow the symbolic link. Commands that access the link itself do - not follow the symbolic link. + + + +A special filetype, which is a small pointer file, allowing multiple names for the same file. Unlike hard links, symbolic links can be made for directories and can be made across filesystems. Commands that access the file being pointed to are said to follow the symbolic link. Commands that access the link itself do not follow the symbolic link. + + + + + system call - The services provided by the kernel to application programs, and the way in - which they are invoked. See section 2 of the manual pages. + + + +The services provided by the kernel to application programs, and the way in which they are invoked. See section 2 of the manual pages. + + + + + system program - Programs that implement high level functionality of an operating system, - i.e., things that aren't directly dependent on the hardware. May sometimes - require special privileges to run (e.g., for delivering electronic mail), but - often just commonly thought of as part of the system (e.g., a compiler). + + + +Programs that implement high level functionality of an operating system, i.e., things that aren't directly dependent on the hardware. May sometimes require special privileges to run (e.g., for delivering electronic mail), but often just commonly thought of as part of the system (e.g., a compiler). + + + + + tcp-wrappers - Almost all of the services provided through inetd are invoked through tcp-wrappers - by way of the tcp-wrappers daemon, tcpd. The tcp-wrappers mechanism provides access - control list restrictions and logging for all service requests to the service it - wraps. It may be used for either TCP or TCP services as long as the services are - invoked through a central daemon process such as inetd. These programs log the - client host name of incoming telnet, ftp, rsh, rlogin, finger etc.... requests. - Security options are access control per host, domain and/or service; detection of - host name spoofing or host address spoofing; booby traps to implement an - early-warning system. + + + +Almost all of the services provided through inetd are invoked through tcp-wrappers by way of the tcp-wrappers daemon, tcpd. The tcp-wrappers mechanism provides access control list restrictions and logging for all service requests to the service it wraps. It may be used for either TCP or TCP services as long as the services are invoked through a central daemon process such as inetd. These programs log the client host name of incoming telnet, ftp, rsh, rlogin, finger etc.... requests. Security options are access control per host, domain and/or service; detection of host name spoofing or host address spoofing; booby traps to implement an early-warning system. + + + + + ZSH - Zsh was developed by Paul Falstad as a replacement for both the Bourne and C shell. - It incorporates features of all the other shells (such as file name completion and - a history mechanism) as well as new capabilities. Zsh is considered similar to the - Korn shell. Falstad intended to create in zsh a shell that would do whatever a - programmer might reasonably hope it would do. Zsh is popular with advanced users. - Along with the Korn shell and the C shell, the Bourne shell remains among the three - most widely used and is included with all UNIX systems. The Bourne shell is often - considered the best shell for developing scripts. + + + +Zsh was developed by Paul Falstad as a replacement for both the Bourne and C shell. It incorporates features of all the other shells (such as file name completion and a history mechanism) as well as new capabilities. Zsh is considered similar to the Korn shell. Falstad intended to create in zsh a shell that would do whatever a programmer might reasonably hope it would do. Zsh is popular with advanced users. Along with the Korn shell and the C shell, the Bourne shell remains among the three most widely used and is included with all UNIX systems. The Bourne shell is often considered the best shell for developing scripts. + + + -Base 10 - Well known decimal number system, represent any value with digit 0-9. - -Base 16 - Usually used in lower and higher programming languages, known also as - hexadecimal number system, represent any value with digit 0-9 and char - A-F (case insensitive). - -Base 85 - Representation of a value with 85 different digits/chars, this can lead - to shorter strings but never seen in the wild. - + + +Base-10 + + + +Well known decimal number system, represent any value with digit 0-9. + + + + + + +Base-16 + + + +Usually used in lower and higher programming languages, known also as +hexadecimal number system, represent any value with digit 0-9 and char +A-F (case insensitive). + + + + + + +Base-85 + + + +Representation of a value with 85 different digits/chars, this can lead +to shorter strings but never seen in the wild. + + + + + + Bit - Smallest storage unit, on/true (1) or off/false (0) - + + + +Smallest storage unit, on/true (1) or off/false (0) + + + + + + Byte - Mostly a collection of 8 (but not really a must - see older computer - systems) bits - + + +Mostly a collection of 8 (but not really a must - see older computer +systems) bits + + + + + + Device - Here, hardware of network connection, see also NIC - -Dual homed host - A dual homed host is a node with two network (physical or virtual) - interfaces on two different links, but does not forward any packets - between the interfaces. - + + +Here, hardware of network connection, see also NIC + + + + + + +Dual-homed-host + + +A dual homed host is a node with two network (physical or virtual) +interfaces on two different links, but does not forward any packets +between the interfaces. + + + + + + Host - Generally a single homed host on a link. Normally it has only one active - network interface, e.g. Ethernet or (not and) PPP. - + + +Generally a single homed host on a link. Normally it has only one active +network interface, e.g. Ethernet or (not and) PPP. + + + + + + Interface - Mostly same as "device", see also NIC - -IP Header - Header of an IP packet (each network packet has a header, kind of is - depending on network layer) - + + +Mostly same as "device", see also NIC + + + + + + +IP-Header + + +Header of an IP packet (each network packet has a header, kind of is +depending on network layer) + + + + + + Link - A link is a layer 2 network packet transport medium, examples are - Ethernet, Token Ring, PPP, SLIP, ATM, ISDN, Frame Relay,... - + + +A link is a layer 2 network packet transport medium, examples are +Ethernet, Token Ring, PPP, SLIP, ATM, ISDN, Frame Relay,... + + + + + + Node - A node is a host or a router. - + + +A node is a host or a router. + + + + + + Octet - A collection of 8 real bits, today also similar to "byte". - + + +A collection of 8 real bits, today also similar to "byte". + + + + + + Port - Information for the TCP/UDP dispatcher (layer 4) to transport information - to upper layers - + + +Information for the TCP/UDP dispatcher (layer 4) to transport information +to upper layers + + + + + + Protocol - Each network layer contains mostly a protocol field to make life easier - on dispatching transported information to upper layer, seen in layer 2 - (MAC) and 3 (IP) - + + +Each network layer contains mostly a protocol field to make life easier +on dispatching transported information to upper layer, seen in layer 2 +(MAC) and 3 (IP) + + + + + + Router - A router is a node with two or more network (physical or virtual) - interfaces, capable of forwarding packets between the interfaces. - + + +A router is a node with two or more network (physical or virtual) +interfaces, capable of forwarding packets between the interfaces. + + + + + + Socket - An IP socket is defined by source and destination IP addresses and Ports - and (binding) - + + +An IP socket is defined by source and destination IP addresses and Ports +and (binding) + + + + + + Stack - Network related a collection of layers - + + +Network related a collection of layers + + + + + + Subnetmask - IP networks uses bit masks to separate local networks from remote ones - + + +IP networks uses bit masks to separate local networks from remote ones + + + + + + Tunnel - A tunnel is typically a point-to-point connection over which packets are - exchanged which carry the data of another protocol, e.g. an IPv6-in-IPv4 - tunnel. + + +A tunnel is typically a point-to-point connection over which packets are +exchanged which carry the data of another protocol, e.g. an IPv6-in-IPv4 +tunnel. + + + + + ACL - Access Control List - + + +Access Control List + + + + + + API - Application Programming Interface - + + +Application Programming Interface + + + + + + ASIC - Application Specified Integrated Circuit - + + +Application Specified Integrated Circuit + + + + + + BSD - Berkeley Software Distribution - + + +Berkeley Software Distribution + + + + + + CAN-Bus - Controller Area Network Bus (physical bus system) - + + +Controller Area Network Bus (physical bus system) + + + + + + ISP - Internet Service Provider - + + +Internet Service Provider + + + + + + KAME - Project - a joint effort of six companies in Japan to provide a free IPv6 - and IPsec (for both IPv4 and IPv6) stack for BSD variants to the world - [http://www.kame.net/] www.kame.net - + + +Project - a joint effort of six companies in Japan to provide a free IPv6 +and IPsec (for both IPv4 and IPv6) stack for BSD variants to the world +[http://www.kame.net/] www.kame.net + + + + + + LIR - Local Internet Registry - + + +Local Internet Registry + + + + + + NIC - Network Interface Card - + + +Network Interface Card + + + + + + RFC - Request For Comments - set of technical and organizational notes about - the Internet - + + +Request For Comments - set of technical and organizational notes about +the Internet + + + + + + USAGI - UniverSAl playGround for Ipv6 Project - works to deliver the production - quality IPv6 protocol stack for the Linux system. + + +UniverSAl playGround for Ipv6 Project - works to deliver the production +quality IPv6 protocol stack for the Linux system. + + + + + CGI Script - A Common Gateway Interface Script. This is a program which is - run on demand to generate the content of a web page. If a web - page has to do more than simply feed an unchanging text and - graphics display to the viewer, you will probably need some sort - of dynamic content generation program such as a CGI Script. - Examples include discussion boards, feedback forms, e-commerce - shopping carts, and more. + + +A Common Gateway Interface Script. This is a program which is +run on demand to generate the content of a web page. If a web +page has to do more than simply feed an unchanging text and +graphics display to the viewer, you will probably need some sort +of dynamic content generation program such as a CGI Script. +Examples include discussion boards, feedback forms, e-commerce +shopping carts, and more. + + + + + DHCP - Dynamic Host Configuration Protocol. A standard, defined in RFC - 1531, for computers on a TCP/IP network to request from a - central server information such as the IP number they should be - using, the netmask, the gateway, etc. Rather than an - administrator entering this information into the machine - configuration, the machine simply requests it from the server as - it is preparing to attach to the network. + + +Dynamic Host Configuration Protocol. A standard, defined in RFC +1531, for computers on a TCP/IP network to request from a +central server information such as the IP number they should be +using, the netmask, the gateway, etc. Rather than an +administrator entering this information into the machine +configuration, the machine simply requests it from the server as +it is preparing to attach to the network. + + + + + DNS - Domain Name Service. A standard for translating domain names - into ``IP Number''s, or vice versa, by looking up data in - centralized databases. + + +Domain Name Service. A standard for translating domain names +into ``IP Number''s, or vice versa, by looking up data in +centralized databases. + + + + + DSL - Digital Subscriber Line. A relatively high speed network - connection, usually delivered through specialized telephone - wiring. + + +Digital Subscriber Line. A relatively high speed network +connection, usually delivered through specialized telephone +wiring. + + + + + Dynamic IP Number - An ``IP Number'' which is assigned periodically or on a per- - session basis. No guarantee is made that the number will remain - constant. A dynamic IP number might change only when your - network connection hangs up and reconnects, or it might change - periodically under ``DHCP'' negotiation. Certain session-based - services such as telnet and ssh will stop working if the IP - number of either end of the connection is changed during the - session. + + +An ``IP Number'' which is assigned periodically or on a per- +session basis. No guarantee is made that the number will remain +constant. A dynamic IP number might change only when your +network connection hangs up and reconnects, or it might change +periodically under ``DHCP'' negotiation. Certain session-based +services such as telnet and ssh will stop working if the IP +number of either end of the connection is changed during the +session. + + + + + Forward DNS Query - A ``DNS'' query which converts a domain name into an ``IP - Number''. + + +A ``DNS'' query which converts a domain name into an ``IP +Number''. + + + + + FTP - The File Transfer Protocol. A standard system for sending files - between machines over the Internet. + + +The File Transfer Protocol. A standard system for sending files +between machines over the Internet. + + + + + ftpd - The daemon responsible for providing ``FTP'' services on a host. - It responds to queries initiated by a remote client. + + +The daemon responsible for providing ``FTP'' services on a host. +It responds to queries initiated by a remote client. + + + + + Internet Service Provider - See ``ISP''. + + +See ``ISP''. + + + + + IP - See ``IP Number''. + + + +See ``IP Number''. + + + + + IP Number - The ``address'' of a certain network interface. Under the - current addressing standard, called ipv4, this number consists - of four 8-bit values, generally written as base-10 numbers - separated by dots. Communication between computers on the - Internet is based on packets of information sent between IP - numbers. + + +The ``address'' of a certain network interface. Under the +current addressing standard, called ipv4, this number consists +of four 8-bit values, generally written as base-10 numbers +separated by dots. Communication between computers on the +Internet is based on packets of information sent between IP +numbers. + + + + + ISP - Internet Service Provider. The company which provides your - network connectivity, including connection hardware, service - hosting, and leasing out the IP numbers under their control. + + +Internet Service Provider. The company which provides your +network connectivity, including connection hardware, service +hosting, and leasing out the IP numbers under their control. + + + + + Masquerading - A form of filtering in which packets from one machine to the - outside world have their headers rewritten so that they appear - to come from an intermediate machine. That intermediate machine - then passes responses back to the originating machine. The net - effect is that an entire network of machines can appear to use a - single IP number, that of the masquerading host, for the purpose - of outgoing connections. + + +A form of filtering in which packets from one machine to the +outside world have their headers rewritten so that they appear +to come from an intermediate machine. That intermediate machine +then passes responses back to the originating machine. The net +effect is that an entire network of machines can appear to use a +single IP number, that of the masquerading host, for the purpose +of outgoing connections. + + + + + named - The name server daemon. This is the daemon which answers ``DNS'' - queries, and is distributed as part of the BIND package. + + +The name server daemon. This is the daemon which answers ``DNS'' +queries, and is distributed as part of the BIND package. + + + + + Network Time Protocol - See ``NTP''. + + +See ``NTP''. + + + + + NTP - Network Time Protocol. A standard for synchronizing your system - clock with the ``true time'', defined as the average of many - high-accuracy clocks around the world. + + +Network Time Protocol. A standard for synchronizing your system +clock with the ``true time'', defined as the average of many +high-accuracy clocks around the world. + + + + + OS Operating System. - Linux, Windows, FreeBSD, BeOS, HP-UX, etc. - -PHB - Pointy-Haired Boss - . - A creation of Scott Adams, of Dilbert fame. + + +Linux, Windows, FreeBSD, BeOS, HP-UX, etc. + + + + + Provider - See ``ISP''. + + +See ``ISP''. + + + + + Reverse DNS Query - A ``DNS'' query which converts a ``IP Number'' into a domain - name. + + +A ``DNS'' query which converts a ``IP Number'' into a domain +name. + + + + + Router - A specialized hardware device which implements rules for where - to send packets based on their ``IP Number''s, and which bridges - between your Ethernet hardware and whatever communications - medium connects you to your ``ISP''. + + +A specialized hardware device which implements rules for where +to send packets based on their ``IP Number''s, and which bridges +between your Ethernet hardware and whatever communications +medium connects you to your ``ISP''. + + + + + ssh - The secure shell. A cryptographically strong replacement for - rlogin, telnet, ftp, and other programs. Protects against - ``spoofing'', man in the middle attacks, and packet sniffing. + + +The secure shell. A cryptographically strong replacement for +rlogin, telnet, ftp, and other programs. Protects against +``spoofing'', man in the middle attacks, and packet sniffing. + + + + + Static IP Number - An ``IP Number'' which has been assigned or leased to you - permanently. Barring revocation of the agreement which granted - you this number, that IP number will always be available for - your use, and no other machine on the Internet is allowed to use - that number. Contrast this with ``Dynamic IP Number''s. + + +An ``IP Number'' which has been assigned or leased to you +permanently. Barring revocation of the agreement which granted +you this number, that IP number will always be available for +your use, and no other machine on the Internet is allowed to use +that number. Contrast this with ``Dynamic IP Number''s. + + + + + PSTN - Public Switched Telephone Network + + +Public Switched Telephone Network + + + + + VoIP - Voice over Internet Protocol + + +Voice over Internet Protocol + + + + + LAN - Local Area Network + + +Local Area Network + + + + + WAN - Wide Area Network + + +Wide Area Network + + + + + TOS - Type Of Service + + +Type Of Service + + + + + ISP - Internet Service Provider + + +Internet Service Provider + + + + + RTP - Real Time Protocol + + +Real Time Protocol + + + + + RSVP - ReSerVation Protocol + + +ReSerVation Protocol + + + + + QoS - Quality of Service + + +Quality of Service + + + + + client - The machine or program that initiates an action or a connection - for the purpose of gaining use of some service or data. + + +The machine or program that initiates an action or a connection +for the purpose of gaining use of some service or data. + + + + + server - The machine or program that accepts incoming connections from - multiple remote machines and provides a service or data to - those. + + +The machine or program that accepts incoming connections from +multiple remote machines and provides a service or data to +those. + + + + + Bindery - The bindery is a specialised database storing network - configuration information on a Novell fileserver. Netware - clients may query the bindery to obtain information on available - services, routing and user information. + + +The bindery is a specialised database storing network +configuration information on a Novell fileserver. Netware +clients may query the bindery to obtain information on available +services, routing and user information. + + + + + Frame Type - is a term used to describe that actual protocol used to carry - the IPX (and IP) datagrams across your ethernet style network - segments. There are four common ones. They are: + + +is a term used to describe that actual protocol used to carry +the IPX (and IP) datagrams across your ethernet style network +segments. There are four common ones. They are: + + + + + Ethernet_II - This is a refined version of the original DIX ethernet - standard. Novell has been allocated a formal protocol id and - this means that both IPX and IP can coexist happily in an - Ethernet_II environment quite happily. This is commonly used - in Novell environments and is a good choice. + + +This is a refined version of the original DIX ethernet +standard. Novell has been allocated a formal protocol id and +this means that both IPX and IP can coexist happily in an +Ethernet_II environment quite happily. This is commonly used +in Novell environments and is a good choice. + + + + + 802.3 - This is an I.E.E.E. protocol defining a Carrier Sense - Multiple Access with Collision Detection (CSMA/CD) mechanism. - It was based on the original DIX Ethernet standard, with an - important modification, the type (protocol id) field was - converted into a length field instead. It is for this reason - that IPX really shouldn't be run here. IEEE 802.3 was - designed to carry IEEE 802.2 frames only but there are - implementations that use it to carry IPX frames directly and - remarkably it does work. Avoid it unless you are trying to - interwork with a network already configured to use it. + + +This is an I.E.E.E. protocol defining a Carrier Sense +Multiple Access with Collision Detection (CSMA/CD) mechanism. +It was based on the original DIX Ethernet standard, with an +important modification, the type (protocol id) field was +converted into a length field instead. It is for this reason +that IPX really shouldn't be run here. IEEE 802.3 was +designed to carry IEEE 802.2 frames only but there are +implementations that use it to carry IPX frames directly and +remarkably it does work. Avoid it unless you are trying to +interwork with a network already configured to use it. + + + + + 802.2 - This is an I.E.E.E. protocol that defines a set of Logical - Link Control procedures. It provides a simplistic way of - allowing different protocols to coexist, but is quite limited - in this respect. Novell uses an unofficial Service Address - Point (like a protocol id) but since everyone else uses it as - well, that hasn't yet presented too much of a problem. + + +This is an I.E.E.E. protocol that defines a set of Logical +Link Control procedures. It provides a simplistic way of +allowing different protocols to coexist, but is quite limited +in this respect. Novell uses an unofficial Service Address +Point (like a protocol id) but since everyone else uses it as +well, that hasn't yet presented too much of a problem. + + + + + SNAP - SNAP is the Sub Network Access Protocol. This protocol is - designed ride on top of 802.3 and 802.2. It expands the - multiprotocol capability of 802.2 and provides some measure - of compatability with existing Ethernet and Ethernet_II frame - types. + + +SNAP is the Sub Network Access Protocol. This protocol is +designed ride on top of 802.3 and 802.2. It expands the +multiprotocol capability of 802.2 and provides some measure +of compatability with existing Ethernet and Ethernet_II frame +types. + + + + + IPX - Internet Packet eXchange is a protocol used by the Novell - corporation to provide internetworking support for their - NetWare(tm) product. IPX is similar in functionality to the IP - protocol used by the tcp/ip community. + + +Internet Packet eXchange is a protocol used by the Novell +corporation to provide internetworking support for their +NetWare(tm) product. IPX is similar in functionality to the IP +protocol used by the tcp/ip community. + + + + + IPX network address - This is a number which uniquely identifies a particular IPX - network. The usual notation for this address is in hexadecimal. - An example might look like: 0x23a91002. + + +This is a number which uniquely identifies a particular IPX +network. The usual notation for this address is in hexadecimal. +An example might look like: 0x23a91002. + + + + + IPX Internal network - This is a virtual IPX network. It is virtual because it does not - correspond to a physical network. This is used to provide a - means of uniquely identifying and addressing a particular IPX - host. This is generally only useful to IPX hosts that exist on - more than one physical IPX network such as fileservers. The - address is coded in the same form as for a physical IPX network. + + +This is a virtual IPX network. It is virtual because it does not +correspond to a physical network. This is used to provide a +means of uniquely identifying and addressing a particular IPX +host. This is generally only useful to IPX hosts that exist on +more than one physical IPX network such as fileservers. The +address is coded in the same form as for a physical IPX network. + + + + + RIP - Routing Information Protocol is a protocol used to automatically - propagate network routes in an IPX network. It is functionally - similar to the RIP used within the tcp/ip community. + + +Routing Information Protocol is a protocol used to automatically +propagate network routes in an IPX network. It is functionally +similar to the RIP used within the tcp/ip community. + + + + + NCP - NetWare Core Protocol is a networked filesystem protocol - designed by the Novell Corporation for their NetWare(tm) - product. NCP is functionally similar to the NFS used in the - tcp/ip community. + + +NetWare Core Protocol is a networked filesystem protocol +designed by the Novell Corporation for their NetWare(tm) +product. NCP is functionally similar to the NFS used in the +tcp/ip community. + + + + + SAP - Service Advertisement Protocol is a protocol designed by the - Novell Corporation that is used to advertise network services in - a NetWare(tm) environment. + + +Service Advertisement Protocol is a protocol designed by the +Novell Corporation that is used to advertise network services in +a NetWare(tm) environment. + + + + + Hardware address - This is a number that uniquely identifies a host in a physical - network at the media access layer. Examples of this are Ethernet - Addresses. An Ethernet address is generally coded as six - hexadecimal values separated by colon characters eg. - 00:60:8C:C3:3C:0F + + +This is a number that uniquely identifies a host in a physical +network at the media access layer. Examples of this are Ethernet +Addresses. An Ethernet address is generally coded as six +hexadecimal values separated by colon characters eg. +00:60:8C:C3:3C:0F + + + + + route - The route is the path that your packets take through the network - to reach their destination. - + + +The route is the path that your packets take through the network +to reach their destination. + + + + + + ARP - This is an acronym for the Address Resolution Protocol and this - is how a network machine associates an IP Address with a - hardware address. + + +This is an acronym for the Address Resolution Protocol and this +is how a network machine associates an IP Address with a +hardware address. + + + + + ATM - This is an acronym for Asynchronous Transfer Mode. An ATM - network packages data into standard size blocks which it can - convey efficiently from point to point. ATM is a circuit - switched packet network technology. + + +This is an acronym for Asynchronous Transfer Mode. An ATM +network packages data into standard size blocks which it can +convey efficiently from point to point. ATM is a circuit +switched packet network technology. + + + + + client - This is usually the piece of software at the end of a system - where the user is. There are exceptions to this, for example, in - the X11 window system it is actually the server with the user - and the client runs on the remote machine. The client is the - program or end of a system that is receiving the service - provided by the server. In the case of peer to peer systems such - as slip or ppp the client is taken to be the end that initiates - the connection and the remote end, being called, is taken to be - the server. + + +This is usually the piece of software at the end of a system +where the user is. There are exceptions to this, for example, in +the X11 window system it is actually the server with the user +and the client runs on the remote machine. The client is the +program or end of a system that is receiving the service +provided by the server. In the case of peer to peer systems such +as slip or ppp the client is taken to be the end that initiates +the connection and the remote end, being called, is taken to be +the server. + + + + + datagram - A datagram is a discrete package of data and headers which - contain addresses, which is the basic unit of transmission - across an IP network. You might also hear this called a - `packet'. + + +A datagram is a discrete package of data and headers which +contain addresses, which is the basic unit of transmission +across an IP network. You might also hear this called a +`packet'. + + + + + DLCI - The DLCI is the Data Link Connection Identifier and is used to - identify a unique virtual point to point connection via a Frame - Relay network. The DLCI's are normally assigned by the Frame - Relay network provider. + + +The DLCI is the Data Link Connection Identifier and is used to +identify a unique virtual point to point connection via a Frame +Relay network. The DLCI's are normally assigned by the Frame +Relay network provider. + + + + + Frame Relay - Frame Relay is a network technology ideally suited to carrying - traffic that is of bursty or sporadic nature. Network costs are - reduced by having many Frame Relay customer sharing the same - network capacity and relying on them wanting to make use of the - network at slightly different times. + + +Frame Relay is a network technology ideally suited to carrying +traffic that is of bursty or sporadic nature. Network costs are +reduced by having many Frame Relay customer sharing the same +network capacity and relying on them wanting to make use of the +network at slightly different times. + + + + + Hardware address - This is a number that uniquely identifies a host in a physical - network at the media access layer. Examples of this are Ethernet - Addresses and AX.25 Addresses. + + +This is a number that uniquely identifies a host in a physical +network at the media access layer. Examples of this are Ethernet +Addresses and AX.25 Addresses. + + + + + ISDN - This is an acronym for Integrated Services Digital Network. ISDN - provides a standardized means by which Telecommunications - companies may deliver either voice or data information to a - customers premises. Technically ISDN is a circuit switched data - network. - + + +This is an acronym for Integrated Services Digital Network. ISDN +provides a standardized means by which Telecommunications +companies may deliver either voice or data information to a +customers premises. Technically ISDN is a circuit switched data +network. + + + + + ISP - This is an acronym of Internet Service Provider. These are - organizations or companies that provide people with network - connectivity to the Internet. - + + +This is an acronym of Internet Service Provider. These are +organizations or companies that provide people with network +connectivity to the Internet. + + + + + IP address - This is a number that uniquely identifies a TCP/IP host on the - network. The address is 4 bytes long and is usually represented - in what is called the "dotted decimal notation", where each byte - is represented in decimal from with dots `.' between them. - + + +This is a number that uniquely identifies a TCP/IP host on the +network. The address is 4 bytes long and is usually represented +in what is called the "dotted decimal notation", where each byte +is represented in decimal from with dots `.' between them. + + + + + MSS - The Maximum Segment Size (MSS) is the largest quantity of data - that can be transmitted at one time. If you want to prevent - local fragmentation MSS would equal MTU-IP header. - + + +The Maximum Segment Size (MSS) is the largest quantity of data +that can be transmitted at one time. If you want to prevent +local fragmentation MSS would equal MTU-IP header. + + + + + MTU - The Maximum Transmission Unit (MTU) is a parameter that - determines the largest datagram than can be transmitted by an IP - interface without it needing to be broken down into smaller - units. The MTU should be larger than the largest datagram you - wish to transmit unfragmented. Note, this only prevents - fragmentation locally, some other link in the path may have a - smaller MTU and the datagram will be fragmented there. Typical - values are 1500 bytes for an ethernet interface, or 576 bytes - for a SLIP interface. + + +The Maximum Transmission Unit (MTU) is a parameter that +determines the largest datagram than can be transmitted by an IP +interface without it needing to be broken down into smaller +units. The MTU should be larger than the largest datagram you +wish to transmit unfragmented. Note, this only prevents +fragmentation locally, some other link in the path may have a +smaller MTU and the datagram will be fragmented there. Typical +values are 1500 bytes for an ethernet interface, or 576 bytes +for a SLIP interface. + + + + + route - The route is the path that your datagrams take through the - network to reach their destination. + + +The route is the path that your datagrams take through the +network to reach their destination. + + + + + server - This is usually the piece of software or end of a system remote - from the user. The server provides some service to one or many - clients. Examples of servers include ftp, Networked File - System, or Domain Name Server. In the case of peer to peer - systems such as slip or ppp the server is taken to be the end of - the link that is called and the end calling is taken to be the - client. - + + +This is usually the piece of software or end of a system remote +from the user. The server provides some service to one or many +clients. Examples of servers include ftp, Networked File +System, or Domain Name Server. In the case of peer to peer +systems such as slip or ppp the server is taken to be the end of +the link that is called and the end calling is taken to be the +client. + + + + + window - The window is the largest amount of data that the receiving end - can accept at a given point in time. + + +The window is the largest amount of data that the receiving end +can accept at a given point in time. + + + + + Linux - supplies the operating system. It is a stable Unix - implementation providing true multi-user multi-tasking services - with full network (TCP/IP e. a.) support. Except from the - actual media and transmission cost, it is available free of - charge and comes in form of so-called distributions which - usually include everything needed from the basic OS to text - processing, scripting, software development, interface builders, - etc. + + +supplies the operating system. It is a stable Unix +implementation providing true multi-user multi-tasking services +with full network (TCP/IP e. a.) support. Except from the +actual media and transmission cost, it is available free of +charge and comes in form of so-called distributions which +usually include everything needed from the basic OS to text +processing, scripting, software development, interface builders, +etc. + + + + + HTML - is the Hypertext Markup Language used to build interfaces to - network systems like Intranets and the WWW, the World Wide Web. - HTML is very simple and can be produced with any ASCII-capable - text editor. + + +is the Hypertext Markup Language used to build interfaces to +network systems like Intranets and the WWW, the World Wide Web. +HTML is very simple and can be produced with any ASCII-capable +text editor. + + + + + Browsers - are text-based (e. g. Lynx) or graphical (e. g. Mosaic, - Netscape, Arena etc.) applications accepting, evaluating and - displaying HTML documents. They are the only piece of software - which is directly operated by the database user. Using browsers, - it is possible to display various types of data (text, possibly - images) and communicate with http servers (see next) on about - every popular computer model for which a browser has been made - available. + + +are text-based (e. g. Lynx) or graphical (e. g. Mosaic, +Netscape, Arena etc.) applications accepting, evaluating and +displaying HTML documents. They are the only piece of software +which is directly operated by the database user. Using browsers, +it is possible to display various types of data (text, possibly +images) and communicate with http servers (see next) on about +every popular computer model for which a browser has been made +available. + + + + + http servers - provide access to the area of a host computer where data - intended for public use in a network are stored. They understand - the http protocol and procure the information the user requests. + + +provide access to the area of a host computer where data +intended for public use in a network are stored. They understand +the http protocol and procure the information the user requests. + + + + + SQL - Structured Query Language is a language for manipulating data in - relational databases. It has a very simple grammar and is a - standard with wide industry support. SQL-based databases have - become the core of the classical client/server database concept. - There are many famous SQL systems available, like Oracle, - Informix etc., and then there is also msql which comes with a - very low or even zero price tag if it is used in academical and - educational environments. + + +Structured Query Language is a language for manipulating data in +relational databases. It has a very simple grammar and is a +standard with wide industry support. SQL-based databases have +become the core of the classical client/server database concept. +There are many famous SQL systems available, like Oracle, +Informix etc., and then there is also msql which comes with a +very low or even zero price tag if it is used in academical and +educational environments. + + + + + CGI - Common Gateway Interface is the programming interface between - the system holding the data (in our case an SQL-based system) - and the network protocol (HTML, of course). CGIs can be built - around many programming languages, but a particularly popular - language is perl. + + +Common Gateway Interface is the programming interface between +the system holding the data (in our case an SQL-based system) +and the network protocol (HTML, of course). CGIs can be built +around many programming languages, but a particularly popular +language is perl. + + + + + perl - is an extremely powerful scripting language which combines all - merits of C, various shell languages, and stream manipulation - languages like awk and sed. Perl has a lot of modularized - interfaces and can be used to control SQL databases, for - example. + + +is an extremely powerful scripting language which combines all +merits of C, various shell languages, and stream manipulation +languages like awk and sed. Perl has a lot of modularized +interfaces and can be used to control SQL databases, for +example. + + + + + DBM - DataBase Management, a library of functions which maintain key-content - pairs in a data base. - + + +DataBase Management, a library of functions which maintain key-content +pairs in a data base. + + + + + + DLL - Dynamically Linked Library, a library linked to an executable program at - run-time. - + + +Dynamically Linked Library, a library linked to an executable program at +run-time. + + + + + + domainname - A name "key" that is used by NIS clients to be able to locate a suitable - NIS server that serves that domainname key. Please note that this does - not necessarily have anything at all to do with the DNS "domain" (machine - name) of the machine(s). - + + +A name "key" that is used by NIS clients to be able to locate a suitable +NIS server that serves that domainname key. Please note that this does +not necessarily have anything at all to do with the DNS "domain" (machine +name) of the machine(s). + + + + + + FTP - File Transfer Protocol, a protocol used to transfer files between two - computers. - + + +File Transfer Protocol, a protocol used to transfer files between two +computers. + + + libnsl - Name services library, a library of name service calls (getpwnam, - getservbyname, etc...) on SVR4 Unixes. GNU libc uses this for the NIS - (YP) and NIS+ functions. - + + +Name services library, a library of name service calls (getpwnam, +getservbyname, etc...) on SVR4 Unixes. GNU libc uses this for the NIS +(YP) and NIS+ functions. + + + + + + libsocket - Socket services library, a library for the socket service calls (socket, - bind, listen, etc...) on SVR4 Unixes. - + + +Socket services library, a library for the socket service calls (socket, +bind, listen, etc...) on SVR4 Unixes. + + + + + + NIS - Network Information Service, a service that provides information, that - has to be known throughout the network, to all machines on the network. - There is support for NIS in Linux's standard libc library, which in the - following text is referred to as "traditional NIS". - + + +Network Information Service, a service that provides information, that +has to be known throughout the network, to all machines on the network. +There is support for NIS in Linux's standard libc library, which in the +following text is referred to as "traditional NIS". + + + + + + NIS+ - Network Information Service (Plus :-), essentially NIS on steroids. NIS+ - is designed by Sun Microsystems Inc. as a replacement for NIS with better - security and better handling of _large_ installations. - + + +Network Information Service (Plus :-), essentially NIS on steroids. NIS+ +is designed by Sun Microsystems Inc. as a replacement for NIS with better +security and better handling of _large_ installations. + + + + + + NYS - This is the name of a project and stands for NIS+, YP and Switch and is - managed by Peter Eriksson . It contains among other - things a complete reimplementation of the NIS (= YP) code that uses the - Name Services Switch functionality of the NYS library. - + + +This is the name of a project and stands for NIS+, YP and Switch and is +managed by Peter Eriksson peter@ifm.liu.se. It contains among other +things a complete reimplementation of the NIS (= YP) code that uses the +Name Services Switch functionality of the NYS library. + + + + + + NSS - Name Service Switch. The /etc/nsswitch.conf file determines the order of - lookups performed when a certain piece of information is requested. - + + +Name Service Switch. The /etc/nsswitch.conf file determines the order of +lookups performed when a certain piece of information is requested. + + + + + + RPC - Remote Procedure Call. RPC routines allow C programs to make procedure - calls on other machines across the network. When people talk about RPC - they most often mean the Sun RPC variant. - + + +Remote Procedure Call. RPC routines allow C programs to make procedure +calls on other machines across the network. When people talk about RPC +they most often mean the Sun RPC variant. + + + + + + YP - Yellow Pages(tm), a registered trademark in the UK of British Telecom - plc. - + + +Yellow Pages(tm), a registered trademark in the UK of British Telecom +plc. + + + + + + TCP-IP - Transmission Control Protocol/Internet Protocol. It is the data - communication protocol most often used on Unix machines. + + +Transmission Control Protocol/Internet Protocol. It is the data +communication protocol most often used on Unix machines. + + + -PSTN (Public Service Telephone Network) - is the telephone system that is used thoughout the U.S. and many other - countries. Although never intended for networking, telephone lines can - be used for communications for computers. + + +PSTN + + + +(Public Service Telephone Network) +is the telephone system that is used thoughout the U.S. and many other +countries. Although never intended for networking, telephone lines can +be used for communications for computers. - A modem (modulator/demodulator) is used to interface between a computer and - the telephone system. Modems can convert data into audible tones and back. - The fastest two-way modems currently available support a speed of 33.6 Kbps - (kilobits per second). +A modem (modulator/demodulator) is used to interface between a computer and +the telephone system. Modems can convert data into audible tones and back. +The fastest two-way modems currently available support a speed of 33.6 Kbps +(kilobits per second). - Current modems advertise speeds up to 56 Kbps per second. These modems rely - on digital equipment being used in the phone company's central office and in - the facility (such as the Internet Service Provider) you are dialling into. - The 56 Kbps speed also works in only one direction; the other direction supports - 33.6 Kbps. +Current modems advertise speeds up to 56 Kbps per second. These modems rely +on digital equipment being used in the phone company's central office and in +the facility (such as the Internet Service Provider) you are dialling into. +The 56 Kbps speed also works in only one direction; the other direction supports +33.6 Kbps. + + + + + protocol - A protocol is a set of rules governing the format and meaning of the frames, - packets, or messages within a layer and can be changed at will by entities, - provided that they do not change the service visible to their users. - + + +A protocol is a set of rules governing the format and meaning of the frames, +packets, or messages within a layer and can be changed at will by entities, +provided that they do not change the service visible to their users. + + + + diff --git a/LDP/guide/docbook/Linux-Networking/Linux-Networking.xml b/LDP/guide/docbook/Linux-Networking/Linux-Networking.xml index 0b8ca36e..8b009dcf 100644 --- a/LDP/guide/docbook/Linux-Networking/Linux-Networking.xml +++ b/LDP/guide/docbook/Linux-Networking/Linux-Networking.xml @@ -8,8 +8,14 @@ + + + + + + ]> @@ -18,8 +24,8 @@ Linux Networking Study Guide -Version 0.10 -2005-02-08 +Version 0.11 +2005-02-19 Binh @@ -77,8 +83,14 @@ http://cvsview.tldp.org/index.cgi/LDP/guide/docbook/Linux-Networking/ Linux Networking Study Guide &Foreward; +&Overview; +&Layering; &OSI; &TCP-IP; +&Topologies-and-Architectures; +&Connectivity-Devices; +&Media-Types; +&Protocols-Standards-Services; &Glossary; diff --git a/LDP/guide/docbook/Linux-Networking/Overview.xml b/LDP/guide/docbook/Linux-Networking/Overview.xml index 0b9f1a5a..fe930384 100644 --- a/LDP/guide/docbook/Linux-Networking/Overview.xml +++ b/LDP/guide/docbook/Linux-Networking/Overview.xml @@ -3,7 +3,7 @@ Overview - 4.1. A brief history of Linux Networking Kernel Development. + A Brief History of Linux Networking Kernel Development. Developing a brand new kernel implementation of the tcp/ip protocol stack that would perform as well as existing implementations was not @@ -31,7 +31,7 @@ were therefore an essential component of the success of the current product. - Orest Zborowski produced the original BSD socket + Orest Zborowski produced the original BSD socket programming interface for the Linux kernel. This was a big step forward as it allowed many of the existing network applications to be ported to linux without serious modification. diff --git a/LDP/guide/docbook/Linux-Networking/Protocols-Standards-Services.xml b/LDP/guide/docbook/Linux-Networking/Protocols-Standards-Services.xml index 448d6582..c45979a8 100644 --- a/LDP/guide/docbook/Linux-Networking/Protocols-Standards-Services.xml +++ b/LDP/guide/docbook/Linux-Networking/Protocols-Standards-Services.xml @@ -21,75 +21,149 @@ IEEE (Institute of Electrical and Electronics Engineers) 802 Standards Protocols -So it is clear that data units can be transmitted from a sender Data-link Layer to a (peer) receiver Data-Link ayer. The data unit (DU) is encapsulated in a frame. Each frame contains additional information. The meaning of this additional information and the rules that the sender and receiver must follow when processing this information consitutue the protocol. Hence, the frame constitutes a Protocol Data Unit (PDU). To distinguish between PDU's of different layers the PDU may be referred to as a DPDU (D for Data-link). +So it is clear that data units can be transmitted from a sender Data-link +Layer to a (peer) receiver Data-Link ayer. The data unit (DU) is +encapsulated in a frame. Each frame contains additional information. The +meaning of this additional information and the rules that the sender and +receiver must follow when processing this information consitutue the protocol. +Hence, the frame constitutes a Protocol Data Unit (PDU). To distinguish +between PDU's of different layers the PDU may be referred to as a DPDU +(D for Data-link). Piggy-backing -Each PDU may or may not contain data. In the later case, the PDU is being used expressly for the purpose of the protocol, eg. for the receiver to signal that a frame was corrupted. +Each PDU may or may not contain data. In the later case, the PDU is being +used expressly for the purpose of the protocol, eg. for the receiver to signal +that a frame was corrupted. -Sometimes a PDU used for the purpose of protocol alone is called a control message. Sending an entire PDU without any data can lead to a waste of resources. It is possible to control information in a PDU which contains data. Thisis called piggy-backing and is a commonly used technique to save resources. The drawback is that sometimes there is no data available or ready to be sent, in which case the control message may be delayed until data becomes available. +Sometimes a PDU used for the purpose of protocol alone is called a control +message. Sending an entire PDU without any data can lead to a waste of +resources. It is possible to control information in a PDU which contains data. +Thisis called piggy-backing and is a commonly used technique to save resources. +The drawback is that sometimes there is no data available or ready to be sent, +in which case the control message may be delayed until data becomes available. Utopia protocol -The Utopia protocol assumes that the logical-link and receiver are ideal, e. the logical-link is error free, provides unlimited capacity and the receiver can receive PDU's at any rate. With these assumptions, each DU is transmitted as soon as it is given, without any other mechanisms or support. Similarly the receiver delivers each DU as sson as it arrives without checking for errors, duplicates or out of order delivery. +The Utopia protocol assumes that the logical-link and receiver are ideal, +ie. the logical-link is error free, provides unlimited capacity and the +receiver can receive PDU's at any rate. With these assumptions, each DU is +transmitted as soon as it is given, without any other mechanisms or support. +Similarly the receiver delivers each DU as sson as it arrives without +checking for errors, duplicates or out of order delivery. -Out of order delivery is possible, even if the sender sent the frames in order! One possiblity is that an entire frame is lost (never to be received) due to noise. Utopia assumes that this cannot happen. +Out of order delivery is possible, even if the sender sent the frames in +order! One possiblity is that an entire frame is lost (never to be received) +due to noise. Utopia assumes that this cannot happen. Stop-and-Wait Protocol -Consider sending frames from a fast machine to a slow machine. What happens if the slow machine is reading the data at half the rate that the fast machine is sending it? Eventually the sent data will be lost, never to be received. +Consider sending frames from a fast machine to a slow machine. What happens +if the slow machine is reading the data at half the rate that the fast machine +is sending it? Eventually the sent data will be lost, never to be received. For this reason it is important to provide some kind of flow control. -The Stop-and-Wait protocol requires the receiver to send an acknowledgement PDU in return for every frame received. Such a PDU is often called an ACK. The sender will wait for the ACK before sending the next frame. +The Stop-and-Wait protocol requires the receiver to send an acknowledgement PDU +in return for every frame received. Such a PDU is often called an ACK. The +sender will wait for the ACK before sending the next frame. Kinds of errors Three kinds of errors can occur: -- the bits in the frame can be inverted, anywhere within the frame including the data bits or the frame's control bits. -- additional bits can be inserted into the frame, before the frame or after the frame and +- the bits in the frame can be inverted, anywhere within the frame including + the data bits or the frame's control bits. +- additional bits can be inserted into the frame, before the frame or after + the frame and - bits can be deleted from the frame -Such errors could cause the entire frame to be deleted. Errors don't necessarily happen because of noise. Sometimes an intermediate device devides to "drop" a frame, because eg. it's buffer may be full. These kinds of errors may lead to frames being mistaken as other frames, to ACK's being lost.... even to ACK's magically appearing! + +Such errors could cause the entire frame to be deleted. Errors don't +necessarily happen because of noise. Sometimes an intermediate device +decides to "drop" a frame, because eg. it's buffer may be full. These kinds +of errors may lead to frames being mistaken as other frames, to ACK's +being lost.... even to ACK's magically appearing! Echo checking -Clearly, error control is required. Error control can be implemented at all layers with the choice of whn, where and how being made by those who develop the layers. +Clearly, error control is required. Error control can be implemented at all +layers with the choice of whn, where and how being made by those who develop +the layers. -At the highest layer, the use must implement menual error control, eg. by inspecting the result of a file transfer to ensure that the contents are as expected, or by seeing that the keys typed on the terminal are echoed properly onto the display. In fact, error checking is a simple form of error control. In this case, the receiver sends back (echoes) a copy of the receive data unit, for the sender to check. +At the highest layer, the use must implement menual error control, eg. by +inspecting the result of a file transfer to ensure that the contents are as +expected, or by seeing that the keys typed on the terminal are echoed properly +onto the display. In fact, error checking is a simple form of error control. +In this case, the receiver sends back (echoes) a copy of the receive data unit, +for the sender to check. Automatic Repeat Request -Echo checking is not feasible when the computer is transmitting long data unit sequences. Typically the error control involves the receiver checking the frame for possible errors (perhaps implementing some amount of error correcting) and then either: +Echo checking is not feasible when the computer is transmitting long data unit +sequences. Typically the error control involves the receiver checking the frame +for possible errors (perhaps implementing some amount of error correcting) and +then either: 1. sending a positive acknowledgement as a form of receipt or -2. sending a negative acknowledgement (NACK) to request another copy of the frame be sent. +2. sending a negative acknowledgement (NACK) to request another copy of the +frame be sent. -This type of error control is known as automatic repeat request (ARQ). ARQ is used in two ways: +This type of error control is known as automatic repeat request (ARQ). ARQ is +used in two ways: - idle RQ and - continuous RQ. -In either case, the use of ACK's, NACK's or both is implementation dependent and this can lead to a variety of protocols which differ slightly in their specification/operation. The continuous RQ typically uses one of the following transmission strategies: +In either case, the use of ACK's, NACK's or both is implementation dependent +and this can lead to a variety of protocols which differ slightly in their +specification/operation. The continuous RQ typically uses one of the following +transmission strategies: - selective repeat or - go-back-N Sequence numbers -For all the ARQ error control methods, it is necessary to distinguish between different frames. The principle reason is so that duplicate frames can be avoided and to ensure that all frames are eventually received. +For all the ARQ error control methods, it is necessary to distinguish between +different frames. The principle reason is so that duplicate frames can be avoided +and to ensure that all frames are eventually received. -Furthermore, because the sequence number must be recorded as part of the frame it will occupy some number of bytes. For frames with fixed formats, the maximum size of the sequence number is also fiexed. So eg. the sequence number may be designated as 1 bit, 2 bits, 8 bits, etc.... +Furthermore, because the sequence number must be recorded as part of the frame +it will occupy some number of bytes. For frames with fixed formats, the maximum +size of the sequence number is also fiexed. So eg. the sequence number may be +designated as 1 bit, 2 bits, 8 bits, etc.... -Although a fixed suze sequence number may suggest that only a fixed number of frames can be transmitted, as will be found when examining the protocols, distinguishing each frame from every frame is not necessary and in some caes it is quite possible to have a 1-bit sequence number. +Although a fixed suze sequence number may suggest that only a fixed number of +frames can be transmitted, as will be found when examining the protocols, +distinguishing each frame from every frame is not necessary and in some cases +it is quite possible to have a 1-bit sequence number. Timers -A timer provides an event after a given time interval. Timers are used to trigger protocol state transitions. Eg. recall the stop-and-wait protocol as previously described. If the ACK is lost then the sender will wait indefinitely. In this case, a timer may be used to trigger the protocol in the extendede absence of an ACK. +A timer provides an event after a given time interval. Timers are used to +trigger protocol state transitions. Eg. recall the stop-and-wait protocol +as previously described. If the ACK is lost then the sender will wait +indefinitely. In this case, a timer may be used to trigger the protocol in +the extended absence of an ACK. Idle RQ -The stop-and-wait protocol given earlier is an incomplete form of idle RQ. The basic RQ uses a timer at the sender and either ACK's only (implicit retransmission) or a combination of ACK's and NACK's (explicit retransmission). +The stop-and-wait protocol given earlier is an incomplete form of idle RQ. +The basic RQ uses a timer at the sender and either ACK's only (implicit +retransmission) or a combination of ACK's and NACK's (explicit retransmission). -When sending a frame, F(n), the sender starts a timer. The sender waits to receive either an ACK(n) or a NACK(n). If nothing is recieved before the timer expires then the timer is reset and F(n) is retransmitted (implicit). If ACK(n) is received then the sender repeats the process F(n+1). If NACK(n) is received before the timer expires then the sender resets the timer and retransmits F(n) (explicit). +When sending a frame, F(n), the sender starts a timer. The sender waits to +receive either an ACK(n) or a NACK(n). If nothing is recieved before the timer +expires then the timer is reset and F(n) is retransmitted (implicit). If ACK(n) +is received then the sender repeats the process F(n+1). If NACK(n) is received +before the timer expires then the sender resets the timer and retransmits +F(n) (explicit). Using a NACK -See that the NACK is used when receiving a corrupted frame and signals the sender to stop the timer and send F(n) immediately. Intuitively this decreases the amount of time wasted, and so increases the link utlization. +See that the NACK is used when receiving a corrupted frame and signals the +sender to stop the timer and send F(n) immediately. Intuitively this decreases +the amount of time wasted, and so increases the link utlization. Link utilization -Clearly, the use of a NACK increases the use of the link. To quantify this requires first examining the basic link utilization of idle RQ. +Clearly, the use of a NACK increases the use of the link. To quantify this +requires first examining the basic link utilization of idle RQ. See Page 48. Idle RQ and sequence numbers -Clearly, the sequence numbers for idle RQ may be 1 bit. For example, the sender transmits frame F(0) and does not transmit frame F(1) until F(0) has been acknowledged. At any one time, there is only a single frame in question. The two sequence numbers are required in case that the ACK(0) is lost - the sender times out and resends F(0), however the receiver is now waiting for F(1) and can reject F(0). +Clearly, the sequence numbers for idle RQ may be 1 bit. For example, the sender +transmits frame F(0) and does not transmit frame F(1) until F(0) has been +acknowledged. At any one time, there is only a single frame in question. The +two sequence numbers are required in case that the ACK(0) is lost - the sender +times out and resends F(0), however the receiver is now waiting for F(1) and +can reject F(0). In this way, the sender has to buffer only one frame, and the receiver has to record only the sequence number of the frame that was previously received. @@ -321,52 +395,7 @@ networks support a bandwidth of 2.5 Mbps. Newer standards (ARCnet Plus and TCNS) support speeds of 20 Mbps and 100 Mbps, but have not really caught on. - -ARCNet device names are `arc0e', `arc1e', `arc2e' etc. or `arc0s', -`arc1s', `arc2s' etc. The first card detected by the kernel is -assigned `arc0e' or `arc0s' and the rest are assigned sequentially in -the order they are detected. The letter at the end signifies whether -you've selected ethernet encapsulation packet format or RFC1051 packet -format. - - - - - Kernel Compile Options: - - Network device support ---> - [*] Network device support - <*> ARCnet support - [ ] Enable arc0e (ARCnet "Ether-Encap" packet format) - [ ] Enable arc0s (ARCnet RFC1051 packet format) - - - - -Once you have your kernel properly built to support your ethernet card -then configuration of the card is easy. - - - -Typically you would use something like: - - - - - root# ifconfig arc0e 192.168.0.1 netmask 255.255.255.0 up - root# route add -net 192.168.0.0 netmask 255.255.255.0 arc0e - - - - -Please refer to the /usr/src/linux/Documentation/networking/arcnet.txt -and /usr/src/linux/Documentation/networking/arcnet-hardware.txt files -for further information. - - - -ARCNet support on Linux was developed by Avery Pennarun, apenwarr@foxnet.net. - +- ARCnet HOWTO @@ -501,12 +530,10 @@ Ring packets. > Start Binh GigE - -GigE Ethernet, also known as 1000BaseT or Gigabit Ethernet. GigE can only use Cat 5 cable. - -GigE uses the same topology as that of Fast Ethernet (ie. physical star topology). Like Fast Ethernet -though it requires that hubs/switches on the LAN to be GigE capable. If not it will revert back to +GigE Ethernet, also known as 1000BaseT or Gigabit Ethernet. GigE can only use Cat 5 cable. GigE uses the same topology as that of Fast Ethernet (ie. physical star topology). Like Fast Ethernet though it requires that hubs/switches on the LAN to be GigE capable. If not it will revert back to 100BaseT, and if this is not available to 10BaseT Ethernet. + +It is now often utilized as a more inexpensive option to Optic Fibre. > End Binh * Ethernet-Howto @@ -666,10 +693,6 @@ involve all sorts of other hardware such as (pupin) coils, transformers, amplifiers and regenerators. - - - - T1-T4 A T1 line is a high-speed, dedicated, point-to-point leased line that @@ -729,175 +752,13 @@ quite well. You should expect a data transfer rate of about 20 kilobytes per second when a link is running well. -7.2. PLIP for Linux-2.0 - - -PLIP device names are `plip0', `plip1 and plip2. - - - - - Kernel Compile Options: - - Network device support ---> - <*> PLIP (parallel port) support - - - - -The PLIP device drivers competes with the parallel device driver for -the parallel port hardware. If you wish to use both drivers then you -should compile them both as modules to ensure that you are able to -select which port you want to use for PLIP and which ports you want -for the printer driver. Refer to the ``Modules mini-HOWTO'' for more -information on kernel module configuration. - - - -Please note that some laptops use chipsets that will not work with -PLIP because they do not allow some combinations of signals that PLIP -relies on, that printers don't use. - - - -The Linux plip interface is compatible with the Crynwyr Packet Driver -PLIP and this will mean that you can connect your Linux machine to a -DOS machine running any other sort of tcp/ip software via plip. - - - -In the 2.0.* series kernel the plip devices are mapped to i/o port and -IRQ as follows: - - - - - device i/o IRQ - ------ ----- --- - plip0 0x3bc 5 - plip1 0x378 7 - plip2 0x278 2 - - - - -If your parallel ports don't match any of the above combinations then -you can change the IRQ of a port using the ifconfig command using the -`irq' parameter (be sure to enable IRQ's on your printer ports in your -ROM BIOS if it supports this option). As an alternative, you can -specify ``io='' annd ``irq='' options on the insmod command line, if -you use modules. For example: - - - - - root# insmod plip.o io=0x288 irq=5 - - - - -PLIP operation is controlled by two timeouts, whose default values are -probably ok in most cases. You will probably need to increase them if -you have an especially slow computer, in which case the timers to -increase are actually on the other computer. A program called -plipconfig exists that allows you to change these timer settings -without recompiling your kernel. It is supplied with many Linux -distributions. - - - -To configure a plip interface, you will need to invoke the following -commands (or add them to your initialization scripts): - - - - - root# /sbin/ifconfig plip1 localplip pointopoint remoteplip - root# /sbin/route add remoteplip plip1 - - - - -Here, the port being used is the one at I/O address 0x378; localplip -amd remoteplip are the names or IP addresses used over the PLIP cable. -I personally keep them in my /etc/hosts database: - - - - - # plip entries - 192.168.3.1 localplip - 192.168.3.2 remoteplip - - - - -The pointopoint parameter has the same meaning as for SLIP, in that it -specifies the address of the machine at the other end of the link. - - - -In almost all respects you can treat a plip interface as though it -were a SLIP interface, except that neither dip nor slattach need be, -nor can be, used. - - - -Further information on PLIP may be obtained from the ``PLIP mini- -HOWTO''. - - -7.3. PLIP for Linux-2.2 - - -During development of the 2.1 kernel versions, support for the -parallel port was changed to a better setup. - - - - - Kernel Compile Options: - - General setup ---> - [*] Parallel port support - Network device support ---> - <*> PLIP (parallel port) support - - - - -The new code for PLIP behaves like the old one (use the same ifconfig -and route commands as in the previous section, but initialization of -the device is different due to the advanced parallel port support. - - - -The ``first'' PLIP device is always called ``plip0'', where first is -the first device detected by the system, similarly to what happens for -Ethernet devices. The actual parallel port being used is one of the -available ports, as shown in /proc/parport. For example, if you have -only one parallel port, you'll only have a directory called -/proc/parport/0. - - - -If your kernel didn't detect the IRQ number used by your port, -``insmod plip'' will fail; in this case just write the right number to -/proc/parport/0/irq and reinvoke insmod. - - - -Complete information about parallel port management is available in -the file Documentation/parport.txt, part of your kernel sources. - - -· PLIP information can be found in The Network Administrator Guide - - PLIP allows the cheap connection of two machines. It uses a parallel port and a special cable, achieving speeds of 10kBps to 20kBps. - + +- PLIP HOWTO +- Networking HOWTO + @@ -959,8 +820,7 @@ also automatically remove packets sent to a computer that is having a problem. This makes Token Ring a reliable choice for networking. -See Token-Ring HOWTO for more details on running Token Ring on your local -network. +- Token-Ring HOWTO @@ -994,16 +854,7 @@ applications. X,25 is a protocol with a relatively high overhead, since it provides error control and accouting for users of the network. - -An implementation of X.25 and LAPB are being worked on and recent -2.1.* kernels include the work in progress. Jonathon Naylor -jsn@cs.nott.ac.uk is leading the development and a -mailing list has been established to discuss Linux X.25 related -matters. To subscribe send a message to: majordomo@vger.rutgers.edu -with the text "subscribe linux-x25" in the body of the message. -Early versions of the configuration tools may be obtained from -Jonathon's ftp site at ftp.cs.nott.ac.uk. - +- X25 HOWTO @@ -2757,243 +2608,6 @@ raf.unisba.ac.id/resources/BandwidthLimitingHOWTO/index.html - - -Compressed-TCP - - -In the past, we used to compress files in order to save disk space. -Today, disk space is cheap - but bandwidth is limited. By compressing -data streams such as TCP/IP-Sessions using SSH-like tools, you achieve -two goals: - - - 1) You save bandwidth/transfered volume (that is important if you have - to pay for traffic or if your network is loaded.). - 2) Speeding up low-bandwidth connections (Modem, GSM, ISDN). - - -This HowTo explains how to save both bandwith and connection time by -using tools like SSH1, SSH2, OpenSSH or LSH. - - -2. Compressing HTTP/FTP,... - - -My office is connected with a 64KBit ISDN line to the internet, so the -maximum transfer rate is about 7K/s. You can speed up the connection -by compressing it: when I download files, Netscape shows up a transfer -rate of up to 40K/s (Logfiles are compressable by factor 15). SSH is a -tool that is mainly designed to build up secure connections over -unsecured networks. Further more, SSH is able to compress connections -and to do port forwarding (like rinetd or redir). So it is the -appropriate tool to compress any simple TCP/IP connection. "Simple" -means, that only one TCP-connection is opened. An FTP-connections or -the connection between M$-Outlook and MS-Exchange are not simple as -several connections are established. SSH uses the LempleZiv (LZ77) -compression algorithm - so you will achieve the same high compression -rate as winzip/pkzip. In order to compress all HTTP-connections from -my intranet to the internet, I just have to execute one command on my -dial-in machine: - - - - -ssh -l -C -L8080::80 -f sleep -10000 - - - - - - = host that is located at my ISP. SSH-access is required. - = my login-ID on - = the web proxy of my ISP - - - - -My browser is configured to use localhost:8080 as proxy. My laptop -connects to the same socket. The connection is compressed and -forwarded to the real proxy by SSH. The infrastructure looks like: - - - - - 64KBit ISDN - My PC--------------------------------A PC (Unix/Linux/Win-NT) at my ISP - SSH-Client compressed SSH-Server, Port 22 - Port 8080 | - | | - | | - | | - |10MBit Ethernet |100MBit - |not compressed |not compressed - | | - | | - My second PC ISP's WWW-proxy - with Netscape,... Port 80 - (Laptop) - - - -3. Compressing Email - -3.1. Incoming Emails (POP3, IMAP4) - - -Most people fetch their email from the mailserver via POP3. POP3 is a -protocol with many disadvantages: - - - 1. POP3 transfers password in clear text. (There are SSL- - implementations of POP/IMAP and a challenge/response - authentication, defined in RFC-2095/2195). - - 2. POP3 causes much protocol overhead: first the client requests a - message than the server sends the message. After that the client - requests the transferred article to be deleted. The server confirms - the deletion. After that the server is ready for the next - transaction. So 4 transactions are needed for each email. - - 3. POP3 transfers the mails without compression although email is - highly compressible (factor=3.5). - - -You could compress POP3 by forwarding localhost:110 through a -compressed connection to your ISP's POP3-socket. After that you have -to tell your mail client to connect to localhost:110 in order to -download mail. That secures and speeds up the connection -- but the -download time still suffers from the POP3-inherent protocol overhead. - - - -It makes sense to substitute POP3 by a more efficient protocol. The -idea is to download the entire mailbox at once without generating -protocol overhead. Furthermore it makes sense to compress the -connections. The appropriate tool which offers both features is SCP. -You can download your mail-file like this: - - - - - scp -C -l loginId:/var/spool/mail/loginid /tmp/newmail - - - - -But there is a problem: what happens if a new email arrives at the -server during the download of your mailbox? The new mail would be -lost. Therefore it makes more sense to use the following commands: - - - - - ssh -l loginid mailserver -f mv /var/spool/mail/loginid - /tmp/loginid_fetchme - scp -C -l loginid:/tmp/my_new_mail /tmp/loginid_fetchme - - - - -A move (mv) is a elementary operation, so you won't get into truble if -you receive new mail during the execution of the commands. But if the -mail server directories /tmp/ and /var/spool/mail are not on the same -disc you might get problems. A solution is to create a lockfile on the -server before you execute the mv: touch /var/spool/mail/loginid.lock. -You should remove it, after that. A better solution is to move the -file loginid in the same directory: - - - - - ssh -l loginid mailserver -f mv /var/spool/mail/loginid - /var/spool/mail/loginid_fetchme - - - - -After that you can use formail instead of procmail in order to filter -/tmp/newmail into the right folder(s): - - - - -formail -s procmail < /tmp/newmail - - - -3.2. Outgoing Email (SMTP) - - -You send email over compresses and encrypted SSH-connections, in order -to: - - - · Save network traffic - · Secure the connection (This does not make sense, if the mail is - transported over untrusted networks, later.) - · Authenticate the sender. Many mail servers deny mail relaying in - order to prevent abuse. If you send an email over an SSH- - connection, the remote mail server (i.e. sendmail or MS-exchange) - thinks to be connected, locally. - - -If you have SSH-access on the mail server, you need the following -command: - - - - - ssh -C -l loginid mailserver -L2525:mailserver:25 - - - - -If you don't have SSH-access on the mail server but to a server that -is allowed to use your mail server as relay, the command is: - - - - - ssh -C -l loginid other_server -L2525:mailserver:25 - - - - -After that you can configure your mail client (or mail server: see -"smarthost") to send out mails to localhost port 2525. - - -4. Thoughts about performance. - - -Of course compression/encryption takes CPU time. It turned out that an -old Pentium-133 is able to encrypt and compress about 1GB/hour -- -that's quite a lot. If you compile SSH with the option "--with-none" -you can tell SSH to use no encryption. That saves a little -performance. Here is a comprison between several download methods -(during the test, a noncompressed 6MB-file was transfered from a -133MHz-Pentium-1 to a 233MHz Pentium2 laptop over a 10MBit ethernet -without other load). - - - - - +-------------------+--------+----------+-----------+----------------------+ - | | FTP |encrypted |compressed |compressed & encrypted| - +-------------------+--------+----------+-----------+----------------------+ - | Elapsed Time | 17.6s | 26s | 9s | 23s | - +-------------------+--------+----------+-----------+----------------------+ - | Throughput | 790K/s | 232K/s | 320K/s | 264K/s | - +-------------------+--------+----------+-----------+----------------------+ - |Compression Factor | 1 | 1 | 3.8 | 3.8 | - +-------------------+--------+----------+-----------+----------------------+ - - - - - IP-Accounting diff --git a/LDP/guide/docbook/Linux-Networking/Sources.xml b/LDP/guide/docbook/Linux-Networking/Sources.xml index 9130ab96..822e6447 100644 --- a/LDP/guide/docbook/Linux-Networking/Sources.xml +++ b/LDP/guide/docbook/Linux-Networking/Sources.xml @@ -360,7 +360,6 @@ Connecting X Terminals to Linux Mini-HOWTO How to change the title of an xterm X Window System Architecture Overview HOWTO The X Window User HOWTO - Bandwidth Limiting HOWTO www.webopedia.com/quick_ref/OSI_Layers.asp www.uwsg.iu.edu/usail/network/nfs/network_layers.html @@ -402,152 +401,57 @@ The Clock Mini-HOWTO X Window System Architecture Overview HOWTO The LBX Mini-HOWTO Leased line Mini HOWTO - - 26. http://www.oswg.org/oswg-nightly/DHCP.html - 27. http://www.linux.org.tw/CLDP/mini/DHCP.html - 28. http://www.linux.or.jp/JF/JFdocs/DHCP.html - 29. ftp://cuates.pue.upaep.mx/pub/linux/LuCAS/DHCP-mini-Como/ - 30. mailto:vuksan-feedback@veus.hr - 31. http://www.opencontent.org/opl.shtml - 32. http://web.syr.edu/~jmwobus/comfaqs/dhcp.faq.html - 33. mailto:sergei@phystech.com - 34. ftp://ftp.phystech.com/pub/ - 35. http://www.cps.msu.edu/~dunham/out/ - 36. ftp://metalab.unc.edu/pub/Linux/system/network/daemons - 37. ftp://ftp.phystech.com/pub/ - 38. DHCP.html#NAMESERVER - 39. DHCP.html#LINUXPPC-RH6 - 40. mailto:alexander.stevenson@home.com - 41. DHCP.html#NAMESERVER - 42. ftp://ftp.redhat.com/pub/redhat/redhat-4.2/i386/RedHat/RPMS/dhcpcd-0.6-2.i386.rpm - 43. DHCP.html#SLACKWARE - 44. mailto:nothing@cc.gatech.edu - 45. DHCP.html#NAMESERVER - 46. http://ftp.debian.org/debian/dists/slink/main/binary-i386/net/ - 47. DHCP.html#SLACKWARE - 48. mailto:heiko@os.inf.tu-dresden.de - 49. DHCP.html#NAMESERVER - 50. DHCP.html#REDHAT6 - 51. ftp://ftp.linuxppc.org/ - 52. ftp://ftp.phystech.com/pub/dhcpcd-1.3.17-pl9.tar.gz - 53. DHCP.html#TROUBLESHOOTING - 54. mailto:nothing@cc.gatech.edu - 55. DHCP.html#ERROR3 - 56. ftp://vanbuer.ddns.org/pub/ - 57. DHCP.html#DHCPSERVER - 58. mailto:mellon@isc.org - 59. ftp://ftp.isc.org/isc/dhcp/ - 60. http://www.kde.org/ - 61. ftp://ftp.us.kde.org/pub/kde/unstable/apps/network/ - 62. http://www.linux-mag.com/2000-04/networknirvana_01.html - - A good page providing comparisons between reliable multicast protocols - is - - . - - A very good and up-to-date site, with lots of interesting links - (Internet drafts, RFCs, papers, links to other sites) is: - - . - - is also a good source of - information on the subject. - - Katia Obraczka's "Multicast Transport Protocols: A Survey and - Taxonomy" article gives short descriptions for each protocol and tries - to classify them according to different features. You can read it in - the IEEE Communications magazine, January 1998, vol. 36, No. 1. - - - - 10. References. - - 10.1. RFCs. - - - o RFC 1112 "Host Extensions for IP Multicasting". Steve Deering. - August 1989. - - o RFC 2236 "Internet Group Management Protocol, version 2". W. - Fenner. November 1997. - - o RFC 1458 "Requirements for Multicast Protocols". Braudes, R and - Zabele, S. May 1993. - - o RFC 1469 "IP Multicast over Token-Ring Local Area Networks". T. - Pusateri. June 1993. - - o RFC 1390 "Transmission of IP and ARP over FDDI Networks". D. Katz. - January 1993. - - o RFC 1583 "OSPF Version 2". John Moy. March 1994. - - o RFC 1584 "Multicast Extensions to OSPF". John Moy. March 1994. - - o RFC 1585 "MOSPF: Analysis and Experience". John Moy. March 1994. - - o RFC 1812 "Requirements for IP version 4 Routers". Fred Baker, - Editor. June 1995 - - o RFC 2117 "Protocol Independent Multicast-Sparse Mode (PIM-SM): - Protocol Specification". D. Estrin, D. Farinacci, A. Helmy, D. - Thaler; S. Deering, M. Handley, V. Jacobson, C. Liu, P. Sharma, and - L. Wei. July 1997. - - o RFC 2189 "Core Based Trees (CBT version 2) Multicast Routing". A. - Ballardie. September 1997. - - o RFC 2201 "Core Based Trees (CBT) Multicast Routing Architecture". - A. Ballardie. September 1997. - - - - 10.2. Internet Drafts. - - - o "Introduction to IP Multicast Routing". draft-ietf-mboned-intro- - multicast- 03.txt. T. Maufer, C. Semeria. July 1997. - - o "Administratively Scoped IP Multicast". draft-ietf-mboned-admin-ip- - space-03.txt. D. Meyer. June 10, 1997. - - 10.3. Web pages. - - - o Linux Multicast Homepage. - - - o Linux Multicast FAQ. - - o Multicast and MBONE on Linux. - - - o Christian Daudt's MBONE-Linux Page. - - - o Reliable Multicast Links - - - o Multicast Transport Protocols - - 10.4. Books. - - o "TCP/IP Illustrated: Volume 1 The Protocols". Stevens, W. Richard. - Addison Wesley Publishing Company, Reading MA, 1994 - - o "TCP/IP Illustrated: Volume 2, The Implementation". Wright, Gary - and W. Richard Stevens. Addison Wesley Publishing Company, Reading - MA, 1995 - - o "UNIX Network Programming Volume 1. Networking APIs: Sockets and - XTI". Stevens, W. Richard. Second Edition, Prentice Hall, Inc. - 1998. - - o "Internetworking with TCP/IP Volume 1 Principles, Protocols, and - Architecture". Comer, Douglas E. Second Edition, Prentice Hall, - Inc. Englewood Cliffs, New Jersey, 1991 +http://www.oswg.org/oswg-nightly/DHCP.html +http://www.linux.org.tw/CLDP/mini/DHCP.html +http://www.linux.or.jp/JF/JFdocs/DHCP.html +ftp://cuates.pue.upaep.mx/pub/linux/LuCAS/DHCP-mini-Como/ +mailto:vuksan-feedback@veus.hr +http://www.opencontent.org/opl.shtml +http://web.syr.edu/~jmwobus/comfaqs/dhcp.faq.html +mailto:sergei@phystech.com +ftp://ftp.phystech.com/pub/ +http://www.cps.msu.edu/~dunham/out/ +ftp://metalab.unc.edu/pub/Linux/system/network/daemons +ftp://ftp.phystech.com/pub/ +mailto:alexander.stevenson@home.com +ftp://ftp.redhat.com/pub/redhat/redhat-4.2/i386/RedHat/RPMS/dhcpcd-0.6-2.i386.rpm +mailto:nothing@cc.gatech.edu +http://ftp.debian.org/debian/dists/slink/main/binary-i386/net/ +mailto:heiko@os.inf.tu-dresden.de +ftp://ftp.linuxppc.org/ +ftp://ftp.phystech.com/pub/dhcpcd-1.3.17-pl9.tar.gz +ftp://vanbuer.ddns.org/pub/ +mailto:mellon@isc.org +ftp://ftp.isc.org/isc/dhcp/ +http://www.kde.org/ +ftp://ftp.us.kde.org/pub/kde/unstable/apps/network/ +http://www.linux-mag.com/2000-04/networknirvana_01.html +http://www.tascnets.com/mist/doc/mcpCompare.html +http://research.ivv.nasa.gov/RMP/links.html +http://hill.lut.ac.uk/DS-Archive/MTP.html +RFC 1112 "Host Extensions for IP Multicasting". Steve Deering. August 1989. +RFC 2236 "Internet Group Management Protocol, version 2". W. Fenner. November 1997. +RFC 1458 "Requirements for Multicast Protocols". Braudes, R and Zabele, S. May 1993. +RFC 1469 "IP Multicast over Token-Ring Local Area Networks". T. Pusateri. June 1993. +RFC 1390 "Transmission of IP and ARP over FDDI Networks". D. Katz. January 1993. +RFC 1583 "OSPF Version 2". John Moy. March 1994. +RFC 1584 "Multicast Extensions to OSPF". John Moy. March 1994. +RFC 1585 "MOSPF: Analysis and Experience". John Moy. March 1994. +RFC 1812 "Requirements for IP version 4 Routers". Fred Baker, Editor. June 1995 +RFC 2117 "Protocol Independent Multicast-Sparse Mode (PIM-SM): Protocol Specification". D. Estrin, D. Farinacci, A. Helmy, D. Thaler; S. Deering, M. Handley, V. Jacobson, C. Liu, P. Sharma, and L. Wei. July 1997. +RFC 2189 "Core Based Trees (CBT version 2) Multicast Routing". A. Ballardie. September 1997. +RFC 2201 "Core Based Trees (CBT) Multicast Routing Architecture". A. Ballardie. September 1997. +"Introduction to IP Multicast Routing". draft-ietf-mboned-intro-multicast-03.txt. T. Maufer, C. Semeria. July 1997. +"Administratively Scoped IP Multicast". draft-ietf-mboned-admin-ip-space-03.txt. D. Meyer. June 10, 1997. +Linux Multicast Homepage. http://www.cs.virginia.edu/~mke2e/multicast.html +Linux Multicast FAQ. http://andrew.triumf.ca/pub/linux/multicast-FAQ +Multicast and MBONE on Linux. http://www.teksouth.com/linux/multicast/ +Christian Daudt's MBONE-Linux Page. http://www.microplex.com/~csd/linux/mbone.html +Reliable Multicast Links http://research.ivv.nasa.gov/RMP/links.html +Multicast Transport Protocols http://hill.lut.ac.uk/DS-Archive/MTP.html +"TCP/IP Illustrated: Volume 1 The Protocols". Stevens, W. Richard. Addison Wesley Publishing Company, Reading MA, 1994 +"TCP/IP Illustrated: Volume 2, The Implementation". Wright, Gary and W. Richard Stevens. Addison Wesley Publishing Company, Reading MA, 1995 +"UNIX Network Programming Volume 1. Networking APIs: Sockets and XTI". Stevens, W. Richard. Second Edition, Prentice Hall, Inc. 1998. +"Internetworking with TCP/IP Volume 1 Principles, Protocols, and Architecture". Comer, Douglas E. Second Edition, Prentice Hall, Inc. Englewood Cliffs, New Jersey, 1991 diff --git a/LDP/guide/docbook/Linux-Networking/LAN-Topologies-and-Architectures.xml b/LDP/guide/docbook/Linux-Networking/Topologies-and-Architectures.xml similarity index 100% rename from LDP/guide/docbook/Linux-Networking/LAN-Topologies-and-Architectures.xml rename to LDP/guide/docbook/Linux-Networking/Topologies-and-Architectures.xml