DEC Networks and Architectures



Similar documents
MCSE Windows 98 Study Guide

Oracle Backup & Recovery

Software Project Management (Second Edition)

Networking. Sixth Edition. A Beginner's Guide BRUCE HALLBERG

Computer Organization

The Data Access Handbook

Building. Applications. in the Cloud. Concepts, Patterns, and Projects. AAddison-Wesley. Christopher M. Mo^ar. Cape Town Sydney.

Winning the Hardware-Software Game

Cisco. A Beginner's Guide Fifth Edition ANTHONY T. VELTE TOBY J. VELTE. City Milan New Delhi Singapore Sydney Toronto. Mc Graw Hill Education

Network Security Essentials:

Designing Interactive Systems

2. What is the maximum value of each octet in an IP address? A. 28 B. 255 C. 256 D. None of the above

DECnet for OpenVMS Guide to Networking

Enterprise. ESXi in the. VMware ESX and. Planning Deployment of. Virtualization Servers. Edward L. Haletky

NEURAL NETWORK FUNDAMENTALS WITH GRAPHS, ALGORITHMS, AND APPLICATIONS

Understanding the Pros and Cons of Combination Networks 7. Acknowledgments Introduction. Establishing the Numbers of Clients and Servers 4

8/27/2014. What is a computer network? Introduction. Business Applications (1) Uses of Computer Networks. Business Applications (2)

IT 3202 Internet Working (New)

Financial Statement Analysis

ENTERPRISE SYSTEMS FOR MANAGEMENT

Customer Relationship. Management. Ed Peelen and Rob Beltman

The Crossroads of Accounting & IT

Management. Oracle Fusion Middleware. 11 g Architecture and. Oracle Press ORACLE. Stephen Lee Gangadhar Konduri. Mc Grauu Hill.

ENTERPRISE RESOURCE PLANNING

RFID Field Guide. Deploying Radio Frequency Identification Systems. Manish Bhuptani Shahram Moradpour. Sun Microsystems Press A Prentice Hall Title

Lecture (02) Networking Model (TCP/IP) Networking Standard (OSI) (I)

Business Data Communications & IT Infrastructures, 2 nd Edition

Computer Security. Introduction to. Michael T. Goodrich Department of Computer Science University of California, Irvine. Roberto Tamassia PEARSON

UPPER LAYER SWITCHING

NZQA Expiring unit standard 6857 version 4 Page 1 of 5. Demonstrate an understanding of local and wide area computer networks

THE PSYCHOLOGY OF INVESTING

Zarządzanie sieciami telekomunikacyjnymi

Computer Networks Vs. Distributed Systems

Network Security. Windows 2012 Server. Securing Your Windows. Infrastructure. Network Systems and. Derrick Rountree. Richard Hicks, Technical Editor

SERVICES MARKETING PEOPLE, TECHNOLOGY, STRATEGY. Global Edition. Christopher Lovelock. Yale University Jochen Wirtz National University of Singapore

Delivery. Enterprise Software. Bringing Agility and Efficiency. Global Software Supply Chain. AAddison-Wesley. Alan W. Brown.

Windows Sockets Network Programming

BUSINESS INTELLIGENCE

CRYPTOGRAPHY AND NETWORK SECURITY

Oracle8/ SQLJ Programming

Study Guide. Professional vsphere 4. VCP VMware Certified. (ExamVCP4IO) Robert Schmidt. IVIC GratAf Hill

Public Relations in Schools

Audio Over IP. Building Pro AolP Systems. with Livewire. Skip Pizzi. Steve Church. Focal. Press ELSEVIER AMSTERDAM BOSTON HEIDELBERG LONDON

Enterprise Java. Where, How, When (and When Not) to Apply Java in Client/Server Business Environments. Jeffrey Savit Sean Wilcox Bhuvana Jayaraman

Building VPNs. Nam-Kee Tan. With IPSec and MPLS. McGraw-Hill CCIE #4307 S&

Fundamentals of Mobile and Pervasive Computing

TCP/IP Illustrated, Volume 2 The Implementation

Overview of Routing between Virtual LANs

Development Effort & Duration

CONTEMPORARY DIRECT & INTERACTIVE MARKETING

Computer Networks CS321

Performance Management

BENEFITS OF SERVERLESS COMPUTING

CONTENTS AT A GMi#p. Chapter I Ethical Hacking Basics I Chapter 2 Cryptography. Chapter 3 Reconnaissance: Information Gathering for the Ethical Hacker

BUSINESS AND PROFESSIONAL COMMUNICATION

Network System Design Lesson Objectives

Compensating the Sales Force

Software Security. Building Security In. Gary McGraw. A Addison-Wesley

Tuning Tips & Techniques

James Dicks. 6 Ways to Trade the Dollar. McGraw-Hill

Audio and Video for the Internet

Business Finance. Theory and Practica. Eddie McLaney PEARSON

ADVANCED COMPUTER ARCHITECTURE: Parallelism, Scalability, Programmability

Building and Managing

Social Media Marketing

Access Control Lists: Overview and Guidelines

ICTTEN2209A Build and maintain a secure network

Internetworking Microsoft TCP/IP on Microsoft Windows NT 4.0

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

CSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required

QUANTITATIVE METHODS. for Decision Makers. Mik Wisniewski. Fifth Edition. FT Prentice Hall

Networking. Systems Design and. Development. CRC Press. Taylor & Francis Croup. Boca Raton London New York. CRC Press is an imprint of the

VISUALIZING DATA POWER VIEW. with MICROSOFT. Brian Larson. Mark Davis Dan English Paui Purington. Mc Grauu. Sydney Toronto

System Development and Life-Cycle Management (SDLCM) Methodology

Mobile IP Network Layer Lesson 01 OSI (open systems interconnection) Seven Layer Model and Internet Protocol Layers

Cloud Computing. Theory and Practice. Dan C. Marinescu. Morgan Kaufmann is an imprint of Elsevier HEIDELBERG LONDON AMSTERDAM BOSTON

OPERATIONS MANAGEMENT

CAREER DEVELOPMENT INTERVENTIONS IN THE 21 ST CENTURY

Introduction to Computer Networks and Data Communications

The TCP/IP Reference Model

Computer Networking Networks

Client Server Computing

Overview of Computer Networks

Network Client. Troubleshooting Guide FREQUENTLY ASKED QUESTIONS

Enterprise Integration Patterns

Patterns of Enterprise Application Architecture

AKAMAI WHITE PAPER. The Challenges of Connecting Globally in the Pharmaceutical Industry

Cisco Data Centre: Introducing Cisco Data Center Networking

Layered Architectures and Applications

CHAINED EXPLOITS Advanced Hacking Attacks from Start to Finish

SO114 - Solaris 10 OE Network Administration

Interconnecting Cisco Network Devices 1 Course, Class Outline

Transcription:

DEC Networks and Architectures Carl Malamud Intertext Publications McGraw-Hill Book Company New York St. Louis San Francisco Auckland Bogota Hamburg London Madrid Mexico Milan Montreal New Delhi Panama Paris Sao Paulo Singapore Sidney Tokyo Toronto

Contents Trademarks Acknowledgments Preface xiii xvii xix Part L Introduction Chapter L Introduction: Networks and Architectures 3 Layered Architectures: The ISO Reference Model 4 Lower Layers: Networks and Subnetworks 6 Upper Layers: Users and Services 8 Multiple Architectures in Networks 9 Services 18 What to Do After You Read This Book 20 Part 2. DEC Architectures Chapter 2. DNA Lower-Layer Protocols 25 Overview of Lower-Layer Protocols 25 DDCMP Data Link Protocols 27 Ethernet Data Link Protocols 31 Routing 37 45 46 Chapter 3. DNA Upper-Layer Protocols 47 Overview of Upper Layer Protocols 47 Network Services Protocol 48 Session Control Layer 53 Virtual Terminal Service 58 Data Access Protocols 59

Distributed Naming Service Distributed File System Videotex Chapter 4. Direct Ethernet Clients: LAT and MOP Overview of LAT and MOP Protocols Local Area Transport Architecture Maintenance Operations Protocol Chapter 5. Clusters Overview of Clusters CI bus hardware System Communication Architecture Connection Management Distributed Lock Manager Distributed File System Distributed Queuing Systems Local Area VAX Clusters Mixed Interconnect Clusters Availability and Performance Census Bureau Clustering Case Study Part 3. DEC Networks Chapter 6. Local Area Networks Overview of Local Area Networks Single-Segment Ethernets Repeaters: Multisegment Ethernets Extended Ethernets Servers Integration of Personal Workstations Facilities wiring: DECconnect Other Media Access Control Options Chapter 7. Wide Area Networks Overview of Wide Area Networks 70 76 79 81 81 83 83 84 91 93 95 97 97 99 101 103 104 108 109 111 114 114 115 116 117 119 121 121 122 132 135 142 151 155 158 163 164 165 165

Point-to-Point Connections 166 X.25 Networks 183 ISDN 188 Wide Area Implementation: DEC's Easynet 194 198 198 Chapter 8. DNA Implementation and Management 199 Overview of This Chapter 199 Implementation of DNA on VMS 200 Implementation on Ultrix 204 Implementation on MS-DOS 206 DNA Clones 207 Phase IV Network Management 209 NMCC/DECnet Monitor 217 Other Management Interfaces 222 Phase V Network Management 231 237 237 Part 4. Internets and Open Architectures Chapter 9. TCP/IP and the Network File System 241 Overview of This Chapter 241 Overview of IP 242 Internet Addresses 243 Address Resolution 243 IP Packets 245 IP Routing 247 Internet Control Message Protocol 248 Autonomous Systems and the Internet 251 Subnet Routing 254 The Domain Naming System 256 Transport Layer Services 258 Network File System 264 TCP/IP Implementation 272 274 274 Chapter 10. System Network Architecture 277 Overview of This Chapter 277 Network Addressable Units 278 DNA/SNA Interconnection Strategies 285 Basic Services Integration 290

Programming Libraries Integrating Data Access Office Systems Integration Systems Application Architecture Chapter 1L DECnet/OSI and OSI Lower Layers Overview of DECnet Phase V Overview of OSI Lower Layers Physical Layer Data Link Support OSI Network Layer Phase V CLNS Network Service Phase V Link State Routing Other Network Layer Functions Network Addresses Transport and Network Layer Service Interaction Chapter 12. OSI Upper-Level Protocols Overview of OSI Upper Layers Transport Layer Protocols Session Layer Protocols Presentation Layer Application Layer Overview CASE Facilities File Transfer, Access, and Management Job Transfer and Manipulation Virtual Terminal Service Manufacturing Automation Protocol X.400 Messaging Services DEC's Messaging Strategy Part 5. User Interface Standards Chapter 13. X Windows Overview of X Windows X Windows System Basic Concepts Window Components Graohics Context and Color MaDS 292 294 298 301 305 306 307 307 307 310 311 314 316 317 318 319 320 320 321 321 322 328 330 333 333 336 342 345 348 351 360 363 363 367 367 369 371 374

Chapter 14. Glossary Index Graphics Manipulations Events Properties and Selections Customizing the X Window Environment The X Toolkit DECwindows and X Postscript Overview of Postscript Language Structure User and Device Space Creating and Rendering Paths Fonts Images Virtual Memory Program Interfaces to PostScript 377 379 382 384 384 387 391 391 393 393 394 398 400 404 407 409 411 416 417 41f 465