Advertisement

rfc文档的全部内容已离线下载,范围涵盖rfc1至rfc8505。

  •  5星
  •     浏览量: 0
  •     大小:None
  •      文件类型:None


简介:
rfc是网络协义的重要学习资源,为方便大家查看,特收藏整理如下。下面是其中一篇内容:Network Working Group Steve CrockerRequest for Comments: 1 UCLA 7 April 1969 Title: Host Software Author: Steve Crocker Installation: UCLA Date: 7 April 1969 Network Working Group Request for Comment: 1CONTENTSINTRODUCTION I. A Summary of the IMP Software Messages Links IMP Transmission and Error Checking Open Questions on the IMP Software II. Some Requirements Upon the Host-to-Host Software Simple Use Deep Use Error CheckingIII. The Host Software Establishment of a Connection High Volume Transmission A Summary of Primitives Error Checking Closer Interaction Open QuestionsCrocker [Page 1]RFC 1 Host Software 7 April 1969 IV. Initial Experiments Experiment One Experiment TwoIntroduction The software for the ARPA Network exists partly in the IMPs and partly in the respective HOSTs. BB&N has specified the software of the IMPs and it is the responsibility of the HOST groups to agree on HOST software. During the summer of 1968, representatives from the initial four sites met several times to discuss the HOST software and initial experiments on the network. There emerged from these meetings a working group of three, Steve Carr from Utah, Jeff Rulifson from SRI, and Steve Crocker of UCLA, who met during the fall and winter. The most recent meeting was in the last week of March in Utah. Also present was Bill Duvall of SRI who has recently started working with Jeff Rulifson. Somewhat independently, Gerard DeLoche of UCLA has been working on the HOST-IMP interface. I present here some of the tentative agreements reached and some of the open questions encountered. Very little of what is here is firm and reactions are expected.I. A Summary of the IMP SoftwareMessages Information is transmitted from HOST to HOST in bundles called messages. A message is any stream of not more than 8080 bits, together with its header. The header is 16 bits and contains the following information: Destination 5 bits Link 8 bits Trace 1 bit Spare 2 bits The destination is the numerical code for the HOST to which the message should be sent. The trace bit signals the IMPs to record status information about the message and send the information back to the NMC (Network Measurement Center, i.e., UCLA). The spare bits are unused.Crocker [Page 2]RFC 1 Host Software 7 April 1969Links The link field is a special device used by the IMPs to limit certain kinds of congestion. They function as follows. Between every pair of HOSTs there are 32 logical full-duplex connections over which messages may be passed in either direction. The IMPs place the restriction on these links that no HOST can send two successive messages over the same link before the IMP at the destination has sent back a special message called an RFNM (Request for Next Message). This arrangement limits the congestion one HOST can cause another if the sending HOST is attempting to send too much over one link. We note, however, that since the IMP at the destination does not have enough capacity to handle all 32 links simultaneously, the links serve their purpose only if the overload is coming from one or two links. It is necessary for the HOSTs to cooperate in this respect. The links have the following primitive characteristics. They are always functioning and there are always 32 of them. By always functioning, we mean that the IMPs are always prepared to transmit another message over them. No notion of beginning or ending a conversation is contained in the IMP software. It is thus not possible to query an IMP about the state of a link (although it might be possible to query an IMP about the recent history of a link -- quite a different matter!). The other primitive characteristic of the links is that there are always 32 of them, whether they are in use or not. This means that each IMP must maintain 18 tables, each with 32 entries, regardless of the actual traffic. The objections to the link structure notwithstanding, the links are easily programmed within the IMPs and are probably a better alternative to more complex arrangements just because of their simplicity.IMP Transmission and Error Checking After receiving a message from a HOST, an IMP partitions the message into one or more packets. Packets are not more than 1010 bits long and are the unit of data transmission from IMP to IMP. A 24 bit cyclic checksum is computed by the transmission hardware and is appended to an outgoing packet. The checksum is recomputed by the receiving hardware and is checked against the transmitted checksum. Packets are reassembled into messages at the destination IMP.Open Questions on the IMP SoftwareCrocker [Page 3]RFC 1 Host Software 7 April 1969 1. An 8 bit field is provided for link specification, but only 32 links are provided, why? 2. The HOST is supposed to be able to send messages to its IMP. How does it do this? 3. Can a HOST, as opposed to its IMP, control RFNMs? 4. Will the IMPs perform code conversion? How is it to be controlled?II. Some Requirements Upon the Host-to-Host SoftwareSimple Use As with any new facility, there will be a period of very light usage until the community of users experiments with the network and begins to depend upon it. One of our goals must be to stimulate the immediate and easy use by a wide class of users. With this goal, it seems natural to provide the ability to use any remote HOST as if it had been dialed up from a TTY (teletype) terminal. Additionally, we would like some ability to transmit a file in a somewhat different manner perhaps than simulating a teletype.Deep Use One of the inherent problems in the network is the fact that all responses from a remote HOST will require on the order of a half-second or so, no matter how simple. For teletype use, we could shift to a half-duplex local-echo arrangement, but this would destroy some of the usefulness of the network. The 940 Systems, for example, have a very specialized echo. When we consider using graphics stations or other sophisticated terminals under the control of a remote HOST, the problem becomes more severe. We must look for some method which allows us to use our most sophisticated equipment as much as possible as if we were connected directly to the remote computer.Error Checking The point is made by Jeff Rulifson at SRI that error checking at major software interfaces is always a good thing. He points to some experience at SRI where it has saved much dispute and wasted effort. On these grounds, we would like to see some HOST to HOST checking. Besides checking the software interface, it would also check the HOST-IMP transmission hardware. (BB&N claims the HOST-IMP hardware will be as reliable as the internal registers of the HOST. We believeCrocker [Page 4]RFC 1 Host Software 7 April 1969 them, but we still want the error checking.)III. The Host SoftwareEstablishment of a Connection The simplest connection we can imagine is where the local HOST acts as if it is a TTY and has dialed up the remote HOST. After some consideration of the problems of initiating and terminating such a connection , it has been decided to reserve link 0 for communication between HOST operating systems. The remaining 31 links are thus to be used as dial-up lines. Each HOST operating system must provide to its user level programs a primitive to establish a connection with a remote HOST and a primitive to break the connection. When these primitives are invoked, the operating system must select a free link and send a message over link 0 to the remote HOST requesting a connection on the selected link. The operating system in the remote HOST must agree and send back an accepting message over link 0. In the event both HOSTs select the same link to initiate a connection and both send request messages at essentially the same time, a simple priority scheme will be invoked in which the HOST of lower priority gives way and selects another free link. One usable priority scheme is simply the ranking of HOSTS by their identification numbers. Note that both HOSTs are aware that simultaneous requests have been made, but they take complementary actions: The higher priority HOST disregards the request while the lower priority HOST sends both an acceptance and another request. The connection so established is a TTY-like connection in the pre-log-in state. This means the remote HOST operating system will initially treat the link as if a TTY had just called up. The remote HOST will generate the same echos, expect the same log-in sequence and look for the same interrupt characters.High Volume Transmission Teletypes acting as terminals have two special drawbacks when we consider the transmission of a large file. The first is that some characters are special interrupt characters. The second is that special buffering techniques are often employed, and these are appropriate only for low-speed character at time transmission. We therefore define another class of connection to be used for the transmission of files or other large volumes of data. To initiate this class of link, user level programs at both ends of an established TTY-like link must request the establishment of a file-like connection parallel to the TTY-like link. Again the priority scheme comes intoCrocker [Page 5]RFC 1 Host Software 7 April 1969 play, for the higher priority HOST sends a message over link 0 while the lower priority HOST waits for it. The user level programs are, of course, not concerned with this. Selection of the free link is done by the higher priority HOST. File-like links are distinguished by the fact that no searching for interrupt characters takes place and buffering techniques appropriate for the higher data rates takes place.A Summary of Primitives Each HOST operating systems must provide at least the following primitives to its users. This list knows not to be necessary but not sufficient. a) Initiate TTY-like connection with HOST x. b) Terminate connection. c) Send/Receive character(s) over TTY-like connection. d) Initiate file-like connection parallel to TTY-like connection. e) Terminate file-like connection. f) Send/Receive over file-like connection.Error Checking We propose that each message carry a message number, bit count, and a checksum in its body, that is transparent to the IMP. For a checksum we suggest a 16-bit end-around-carry sum computed on 1152 bits and then circularly shifted right one bit. The right circular shift every 1152 bits is designed to catch errors in message reassembly by the IMPs.Closer Interaction The above described primitives suggest how a user can make simple use of a remote facility. They shed no light on how much more intricate use of the network is to be carried out. Specifically, we are concerned with the fact that as some sites a great deal of work has gone into making the computer highly responsive to a sophisticated console. Cullers consoles at UCSB and Englebarts at SRI are at least two examples. It is clear that delays of a half-second or so for trivial echo-like responses degrade the interaction to the point of making the sophistication of the console irrelevant. We believe that most console interaction can be divided into twoCrocker [Page 6]RFC 1 Host Software 7 April 1969 parts, an essentially local, immediate and trivial part and a remote, more lengthy and significant part. As a simple example, consider a user at a console consisting of a keyboard and refreshing display screen. The program the user is talking typing into accumulates a string of characters until a carriage return is encountered and then it processes the string. While characters are being typed, it displays the characters on the screen. When a rubout character is typed, it deletes the previous non-rubout character. If the user types H E L L O <- <- P where <- is rubout and is carriage-return, he has made nine keystrokes. If each of these keystrokes causes a message to be sent which in return invokes instructions to our display station we will quickly become bored. A better solution would be to have the front-end of the remote program -- that is the part scanning for <- and -- be resident in our computer. In that case, only one five character message would be sent, i.e., H E L P , and the screen would be managed locally. We propose to implement this solution by creating a language for console control. This language, current named DEL, would be used by subsystem designers to specify what components are needed in a terminal and how the terminal is to respond to inputs from its keyboard, Lincoln Wand, etc. Then, as a part of the initial protocol, the remote HOST would send to the local HOST, the source language text of the program which controls the console. This program would have been by the subsystem designer in DEL, but will be compiled locally. The specifications of DEL are under discussion. The following diagrams show the sequence of actions.Crocker [Page 7]RFC 1 Host Software 7 April 1969A. Before Link Establishment / \ | +-----------+ +-----------+ | | | | | | | | | | | | | | | terminal | | terminal | | | | | | | | | | | | | | | +-----+-----+ +-----+-----+ | | | | | | | | | | | | | | +-----+-----+ +-----------+ | | | | | Request connection | | | | UCLA { | | | -> over link 25 | | | } SRI | | +-+-+ | +-+ +-+ | +-+-+ | | | | | OS|---+-=|I|----------|I|=-+---| OS| | | | | +-+-+ | +-+ +-+ | +---+ | | | | | | | | | | | | | | | +-----------+ +-----------+ | | HOST: UCLA HOST: SRI | \ /Crocker [Page 8]RFC 1 Host Software 7 April 1969b. After Link Establishment and Log-in / \ | +-----------+ +-----------+ | | | | | | | | | | | | | | | terminal | | terminal | | | | | | | | | | | | | | | +-----+-----+ +-----+-----+ | | | | | | | | | | | | | | +-----+-----+ Please send front+-----------+ | | | | | end control | | | | UCLA { | | | -> | | | } SRI ___ | | +-+-+ | +-+ +-+ | +--+---+ | | / | | | | OS|---+-=|I|----------|I|=-+--|OS|NLS| +----+---| | | | +-+-+ | +-+ +-+ | +------+ | | |___/ | | | DEL prog. | | | | | | | | <- | | | |____| | +-----------+ +-----------+ | | HOST: UCLA HOST:SRI | \ /Crocker [Page 9]RFC 1 Host Software 7 April 1969c. After Receipt and Compilation of the DEL program / \ | +-----------+ +-----------+ | | | | | | | | | | | | | | | terminal | | terminal | | | | | | | | | | | | | | | +-----+-----+ +-----+-----+ | | |Trivial | | | |Responses | | | | | | | +-----+------+ +-----------+ | | | | | | | | | UCLA { | | | Major Responses | | | } SRI ___ | | +--+--+ | +-+ +-+ | +--+---+ | | / | | | |DEL |---+-=|I|----------|I|=-+--|OS|NLS| +---+---| | | | |front| | +-+ +-+ | +------+ | | |___/ | | | end | | | | | | | | | |prog.| | | | | |____| | | +-----+ | | | | | | | OS | | | | | | | +-----+ | | | | | | | | | | | +------------+ +-----------+ | | HOST: UCLA HOST: SRI | \ /Open Questions 1. If the IMPs do code conversion, the checksum will not be correct. 2. The procedure for requesting the DEL front end is not yet specified.IV. Initial ExperimentsExperiment One SRI is currently modifying their on-line retrieval system which will be the major software component on the Network Documentation Center so that it can be operated with model 35 teletypes. The control of the teletypes will be written in DEL. All sites will write DEL compilers and use NLS through the DEL program.Experiment TwoCrocker [Page 10]RFC 1 Host Software 7 April 1969 SRI will write a DEL front end for full NLS, graphics included. UCLA and UTAH will use NLS with graphics. [ This RFC was put into machine readable form for entry ] [ into the online RFC archives by Celeste Anderson 3/97 ]Crocker [Page 11]

全部评论 (0)

还没有任何评论哟~
客服
客服
  • RFC 1RFC 8700线
    优质
    这是一份包含从RFC 1到RFC 8700全部互联网技术规范和标准的完整合集,方便用户离线查阅和研究。 《RFC文档离线下载:全面理解网络协议与计算机网络基础》 RFC(Request for Comments)是互联网工程任务组(IETF)发布的技术规范和标准文件,详细定义了互联网的各种协议、标准及建议。从最初的RFC1到最新的第8700号,这些文档记载了大量的关键技术和发展历程中的重要协议,为理解现代互联网的运作机制提供了宝贵的资源。 了解RFC文档的重要性至关重要。它们不仅是技术开发者与网络工程师的重要参考手册,也是见证互联网创新和演进的关键文献。每一个RFC编号代表一个独特的主题,可能涉及新协议提案、现有协议修订或关于网络安全及性能优化等方面的讨论。例如,RFC793详细描述了TCP(传输控制协议),这是TCPIP协议族中的核心部分;而RFC2616则定义了HTTP1.1,它是互联网上最广泛使用的应用层通信标准之一。 下载并离线阅读这些文档能够帮助我们深入理解网络协议的工作原理。例如,RFC1035解释了DNS(域名系统)的运作方式,这对于任何涉及网络域名管理的人来说都是不可或缺的知识点;而RFC1122和RFC1123则分别规定了互联网主机与路由器的行为规范,这些都是构建和维护网络基础设施的基础。 在计算机网络领域中,这些文档还涵盖了IP协议(包括IPv4和IPv6)以及以太网的数据链路层协议。例如,关于IPv4的详细信息可以在RFC791找到;而有关IPv6的信息则收录于RFC2460之中。此外,对于动态主机配置过程感兴趣的读者可以查阅RFC2131及RFC1541文档,这些文件详尽地介绍了DHCP(动态主机配置协议)的工作流程。 除了技术规范外,一些RFC文档还专注于网络安全问题。例如,RFC2142定义了电子邮件系统的常见安全域名;而RFC4949则提供了互联网安全术语的介绍,这对于理解和处理网络安全隐患至关重要。另外,像RFC5735这样的文件专门讨论预留的IPv4和IPv6地址空间,在网络规划中避免地址冲突方面具有实际指导意义。 从最初的第1号到最新的第8700号文档集合为学习者提供了一套完整的网络协议和技术知识宝库。无论是初学者还是高级从业者,都可以从中找到自己感兴趣或需要了解的内容,并进一步提升对互联网工作原理的理解和应用能力。通过深入研读这些文档,我们可以更好地应对不断变化的网络环境,掌握最新的技术趋势,并为未来的创新奠定坚实的基础。
  • RFC 1RFC 8505完整线
    优质
    本资源提供互联网通信基础规范RFC从第1号到第8505号的全套文档离线下载,涵盖协议、标准及最佳实践。 RFC是网络协议的重要学习资源,为方便大家查看,现将其中一篇内容整理如下: 《网络工作组请求评论:1》 作者:Steve Crocker 安装机构:UCLA 日期:1969年4月7日 ### 内容概要: I. 阻塞控制报文协议(IMP)软件概述 II. 主机到主机软件的一些需求 III. 主机软件详情 IV. 初始实验 #### I. IMP 软件概述 信息在主机间传输以消息的形式进行,每条消息不超过8080比特,并附带一个16位的头部。头部包含以下信息:目的地(5位)、链接(8位)、追踪(1位)和备用(2位)。追踪比特指示IMP记录有关该消息的状态信息并将其反馈给网络测量中心。 #### II. 主机到主机软件的一些需求 简单使用方面,目标是允许用户像通过电话拨号一样访问远程主机。在深度应用层面,则需要考虑如何优化高级终端设备的使用,并确保在网络延迟下仍能维持用户体验。 错误检查:建议每个消息携带一个带有位计数和校验码的消息号码,在传输过程中透明地处理。 #### III. 主机软件 - 建立连接:定义了TTY类型链接及文件类型的链接建立方式,以及中断字符的搜索不会在文件类型链接中进行。 错误检查机制也被提出,建议每个消息携带一个消息号、位计数和校验码。此外还提出了创建一种控制台语言DEL的想法。 #### IV. 初始实验 - 实验一:SRI正在修改其在线检索系统以支持模型35电传打字机,并用DEL编写控制系统。 - 实验二:计划为完整NLS(网络联机系统)写一个前端,包括图形功能。UCLA和UTAH将使用带有图形的NLS。 此RFC文档提供了有关早期互联网协议开发的重要见解,特别是关于主机间通信的基本原理和技术细节。
  • RFC翻译集(RFC1RFC3093)
    优质
    本资源包含从RFC1到RFC3093的所有RFC文档的中文翻译版本,为网络技术爱好者和专业人士提供全面而详实的技术资料库。 RFC文档中文翻译完整版涵盖了从RFC1到RFC3093的所有协议。
  • RFC合集【RFC1-3093】
    优质
    本合集包含了从RFC1到RFC3093的所有中文文档,为技术爱好者和专业人士提供互联网协议、标准及技术细节的全面资源。 RFC中文文档全集【RFC1-3093】包含了从RFC 1到RFC 3093的所有文档的中文翻译版本,为读者提供了全面了解互联网标准和技术规范的机会。
  • PN532操作指南,
    优质
    《PN532操作指南》是一份全面详尽的手册,旨在指导用户掌握PN532芯片的所有功能和使用技巧,适用于初学者与专业人士。 PN532操作说明书涵盖了该设备的所有使用内容和技术细节,旨在帮助用户全面了解并熟练掌握PN532的各类功能与应用方法。这份文档详细介绍了从基础设置到高级配置的各项步骤,并提供了故障排除及维护建议等实用信息。通过阅读此说明书,用户能够充分利用PN532的功能,发挥其最大效能以满足不同场景下的需求。
  • JVM知识思维导图(
    优质
    本思维导图全面覆盖Java虚拟机(JVM)的核心知识点,包括内存管理、类加载机制、性能调优等关键领域,帮助开发者深入理解与高效运用JVM。 JVM的整体结构与内存模型涵盖了对象的创建、指针压缩、对象大小及内存布局等方面的知识。此外还包括垃圾收集器及其算法,以及如何通过调优工具进行内存优化。这些内容涉及到了垃圾回收机制(包括具体的回收算法)和类加载过程中的双亲委派模式等核心概念。一张图可以全面概括JVM的所有知识点,帮助学习者快速掌握相关技术细节。
  • AMBA AHB规AMBA 2AMBA 5)
    优质
    本文档全面解析ARM AMBA总线架构从AMBA 2到AMBA 5的各项规范,提供深入理解片上系统互连的关键。 AMBA AHB(Advanced High-performance Bus)是由ARM公司设计的一种总线接口,专门用于处理高带宽和高性能数据传输需求。它是AMBA总线协议家族的一部分,并与APB(Advanced Peripheral Bus)和AXI(Advanced eXtensible Interface)一起使用。AHB主要用于连接高性能的核心模块,如处理器核心、DMA(Direct Memory Access)控制器以及高速存储设备。这种总线支持高数据传输速率及复杂的总线控制特性,包括突发传输和分裂传输,以优化系统性能并提高总线利用率。适用于需要处理大量数据或执行复杂数据处理任务的系统,例如多媒体处理和高速缓存系统中使用AHB可以显著提升效率和响应速度。
  • AMBA APB规AMBA 2AMBA 5)
    优质
    本书详尽解析了ARM AMBA总线架构从AMBA 2到AMBA 5的各项规范,包括APB、AHB及更高级协议,是理解和设计高效系统级芯片的重要参考。 AMBA APB(Advanced Peripheral Bus)总线是由ARM公司设计的一种接口协议,主要用于连接低带宽的控制外设。它是AMBA总线协议家族的一部分,该家族还包括AHB(Advanced High-performance Bus)和AXI(Advanced eXtensible Interface)。APB被专门设计用于简单的外设,例如时钟控制、接口管理和IO端口等设备,这些设备不需要高速数据传输功能。
  • AD9959译资料,分原
    优质
    本资料为AD9959芯片的详细中文翻译文档,包含原版英文手册的主要信息和关键参数说明,便于国内工程师快速理解和应用。 经过三天的努力,我完成了翻译和整理的工作。希望这些内容能够被采用。如果有任何问题或需要讨论的地方,请随时告知,我们可以一起进行调整和完善。