亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? tyt12fi.htm

?? tcpip14study_14天學會TCPIP編程裁減移植_好書啊!
?? HTM
?? 第 1 頁 / 共 5 頁
字號:
<HTML>

<HEAD>

<TITLE>tyt12fi.htm</TITLE>

<LINK REL="ToC" HREF="index.htm" tppabs="http://www.mcp.com/817948800/0-672/0-672-30885-1/index.htm">

<LINK REL="Index" HREF="tppmsgs/msgs0.htm#3" tppabs="http://www.mcp.com/817948800/0-672/0-672-30885-1/htindex.htm">

<LINK REL="Next" HREF="tyt13fi.htm" tppabs="http://www.mcp.com/817948800/0-672/0-672-30885-1/tyt13fi.htm">

<LINK REL="Previous" HREF="tyt11fi.htm" tppabs="http://www.mcp.com/817948800/0-672/0-672-30885-1/tyt11fi.htm"></HEAD>

<BODY BGCOLOR="#FFFFFF" TEXT="#000000" LINK="#0000FF" VLINK="#800080"><A ID="I0" NAME="I0"></A>

<P><P ALIGN=CENTER>

<A HREF="tyt11fi.htm" tppabs="http://www.mcp.com/817948800/0-672/0-672-30885-1/tyt11fi.htm" TARGET="_self"><IMG SRC="blanprev.gif" tppabs="http://www.mcp.com/817948800/0-672/0-672-30885-1/blanprev.gif" WIDTH = 37 HEIGHT = 37 BORDER = 0 ALT="Previous Page"></A>

<A HREF="index.htm" tppabs="http://www.mcp.com/817948800/0-672/0-672-30885-1/index.htm" TARGET="_self"><IMG SRC="blantoc.gif" tppabs="http://www.mcp.com/817948800/0-672/0-672-30885-1/blantoc.gif" WIDTH = 37 HEIGHT = 37 BORDER = 0 ALT="TOC"></A>

<A HREF="tyt13fi.htm" tppabs="http://www.mcp.com/817948800/0-672/0-672-30885-1/tyt13fi.htm" TARGET="_self"><IMG SRC="blannext.gif" tppabs="http://www.mcp.com/817948800/0-672/0-672-30885-1/blannext.gif" WIDTH = 37 HEIGHT = 37 BORDER = 0 ALT="Next Page"></A>


<HR ALIGN=CENTER>

<P>

<UL>

<UL>

<UL>

<LI>

<A HREF="#E68E108" >Network File System (NFS)</A></LI>

<LI>

<A HREF="#E68E109" >NFS Protocols</A></LI>

<UL>

<LI>

<A HREF="#E69E152" >Remote Procedure Call (RPC)</A></LI>

<UL>

<LI>

<A HREF="#E70E47" >Port Mapper</A></LI></UL>

<LI>

<A HREF="#E69E153" >External Data Representation (XDR)</A></LI>

<LI>

<A HREF="#E69E154" >Network File System Protocol</A></LI>

<LI>

<A HREF="#E69E155" >Mount Protocol</A></LI>

<LI>

<A HREF="#E69E156" >File Locking</A></LI>

<LI>

<A HREF="#E69E157" >Remote Execution Service (REX)</A></LI>

<LI>

<A HREF="#E69E158" >rusers and spray</A></LI></UL>

<LI>

<A HREF="#E68E110" >Configuring NFS</A></LI>

<UL>

<LI>

<A HREF="#E69E159" >Configuring UNIX as an NFS Server</A></LI>

<LI>

<A HREF="#E69E160" >Setting Up a UNIX NFS Client</A></LI>

<LI>

<A HREF="#E69E161" >Setting Up Windows-Based NFS </A></LI>

<LI>

<A HREF="#E69E162" >Sharing a Windows Directory</A></LI></UL>

<LI>

<A HREF="#E68E111" >Network Information Service (NIS)</A></LI>

<LI>

<A HREF="#E68E112" >Configuring NIS</A></LI>

<UL>

<LI>

<A HREF="#E69E163" >Setting Up the NIS Domain </A></LI>

<LI>

<A HREF="#E69E164" >NIS Daemons</A></LI>

<LI>

<A HREF="#E69E165" >Setting Up an NIS Master</A></LI>

<LI>

<A HREF="#E69E166" >Setting Up NIS Slaves</A></LI>

<LI>

<A HREF="#E69E167" >Setting Up NIS Clients</A></LI></UL>

<LI>

<A HREF="#E68E113" >RPC and NFS Administration</A></LI>

<UL>

<LI>

<A HREF="#E69E168" >rpcinfo</A></LI>

<LI>

<A HREF="#E69E169" >nfsstat</A></LI></UL>

<LI>

<A HREF="#E68E114" >Summary</A></LI>

<LI>

<A HREF="#E68E115" >Q&amp;A</A></LI>

<LI>

<A HREF="#E68E116" >Quiz</A></LI></UL></UL></UL>

<HR ALIGN=CENTER>

<A ID="E66E12" NAME="E66E12"></A>

<H1 ALIGN=CENTER>

<CENTER>

<FONT SIZE=6 COLOR="#FF0000"><B>&#151; 12 &#151;</B>

<BR><B>Network File System and Network Information Service</B></FONT></CENTER></H1>

<BR>

<P>Today I look at the Network File System (NFS), a set of protocols and products in wide use with TCP/IP-based networks. NFS is especially popular with UNIX networks, but it is now available for many platforms and works well across a local area network. I also look at several protocols that are closely associated with NFS, such as Network Information Service (NIS), and the Remote Execution Service (REX).

<BR>

<P>Today's text concentrates on the UNIX versions of these protocols, simply because they serve as an excellent illustration. For other operating systems, names of files and procedures might change, but the fundamentals are compatible. I show some examples of using PC machines for NFS and NIS as appropriate.

<BR>

<BR>

<A ID="E68E108" NAME="E68E108"></A>

<H3 ALIGN=CENTER>

<CENTER>

<FONT SIZE=5 COLOR="#FF0000"><B>Network File System (NFS)</B></FONT></CENTER></H3>

<BR>

<P>The move to distributed processing and client/server architectures<B><I> </I></B>has meant that many users have small, powerful machines on their desk that communicate with a larger server somewhere on a network. The applications the user needs are often located in places other than on their desktop, so some method of accessing remote files (applications and data) is required. Although both Telnet and rlogin enable a user to use a remote machine, neither system takes advantage of the user's desktop machine. Peripheral sharing has also become important as local area networks grow. To help integrate workstations into local area networks, as well as to simplify remote file access and peripheral sharing, Sun Microsystems introduced the Network File System (NFS).

<BR>

<P>Sun designed NFS so that it would enable machines from different vendors to work together, even if they used different operating systems. Sun published the NFS specifications, enabling other vendors to adopt their own hardware and software to work smoothly with NFS. This results in a completely homogeneous network. Since Sun's introduction, NFS has become a de facto standard among UNIX environments, with strong support in other operating systems, as well.

<BR>

<P>NFS actually refers to both a product and a protocol. There is an NFS product that consists of a set of protocols for different tasks (these are examined in the section titled &quot;NFS Protocols&quot;). The NFS protocol is the one protocol of the NFS product that deals with file access. To avoid confusion, you should think of the NFS protocol specifically (instead of the entire product set) when NFS is mentioned today. 

<BR>

<P>NFS is now intimately tied with UNIX, and it is shipped as part of the System V Release 4 software version. It is also tied to TCP/IP, which remains the communications protocol of choice for UNIX networks. For other operating systems, NFS is usually an extension that is added at the system administrator's option. UNIX systems use the process nfsd to manage NFS access, with the process started automatically when the UNIX system boots after NFS has been properly configured.

<BR>

<P>NFS enables an application to read and write files that reside on NFS servers, with the access to the NFS server completely transparent to the application and the user. For developers, NFS requires no extra coding or special handling, which makes it especially attractive. This transparent access to another machine's file structure is achieved by logically attaching the NFS server to the client, a process called <I>mounting. </I>

<BR>

<P>The NFS server's file system can be attached as a whole, or just a portion of it can be mounted. The directory at which the mount occurs is called the <I>mount point. </I>The concept of shared files similar to that encountered with NFS is sometimes called a <I>distributed file system,</I> although this is a misnomer with NFS.

<BR>

<BLOCKQUOTE>

<BLOCKQUOTE>

<HR ALIGN=CENTER>

<BR>

<NOTE>

<IMG SRC="note.gif" tppabs="http://www.mcp.com/817948800/0-672/0-672-30885-1/note.gif" WIDTH = 75 HEIGHT = 46>UNIX has had the capability to mount or attach another file system for a long time. This type of mounting can occur across networks and is transparent to the application and user, as long as filenames take into account the full path name of the mounted file system. The NFS mount is similar to the UNIX mount process.</NOTE>

<BR>

<HR ALIGN=CENTER>

</BLOCKQUOTE></BLOCKQUOTE>

<P>NFS uses the term <I>client </I>to represent any machine that requests a file from another machine, which is the <I>server. </I>Multitasking operating systems can act as both client and server simultaneously, with processes on the machine accessing files on another machine while others on the network access its own hard disk. Usually, restrictions are imposed as to the files or portions of a file system that can be shared, both for security and speed considerations. Typical NFS installations use personal computers or diskless workstations as clients accessing a more powerful server system. Because personal computer operating systems such as MS-DOS are single-tasking, PCs usually act only as clients, unless they run a multitasking operating system such as Windows NT or OS/2. It is possible to have an entire network of multitasking computers sharing their drives with each other, although in practice this works well only for small networks because of the high density of network traffic required to support all the mounted filesystems.

<BR>

<P>Because of the need to transfer files quickly, network speed becomes vitally important. When it was designed, the original goal for an NFS-mounted file system was to provide performance equivalent to 80 percent of the performance expected from a locally mounted hard disk. This puts the performance emphasis on both the NFS disk drive and the network system. Typically, NFS disk drives are among the fastest available, specifically to reduce bottlenecks at the drive end. The network hardware and software must be chosen to enable the fastest possible throughput.

<BR>

<P>Because NFS is UNIX-based, the security offered is rudimentary. For this reason, Sun has introduced Secure NFS, which implements an encrypted messaging protocol for added protection against unauthorized access to NFS-mounted file systems.

<BR>

<BR>

<A ID="E68E109" NAME="E68E109"></A>

<H3 ALIGN=CENTER>

<CENTER>

<FONT SIZE=5 COLOR="#FF0000"><B>NFS Protocols</B></FONT></CENTER></H3>

<BR>

<P>The NFS product comprises several protocols, only one of which is called the NFS protocol. The NFS product protocols are designed as a set of layers, similar to the OSI model. The layers of the NFS product are compared to the OSI layers in Figure 12.1. Each protocol in the NFS product has an Internet RFC dedicated to its specification.

<BR>

<P><B><A HREF="12tyt01.gif" tppabs="http://www.mcp.com/817948800/0-672/0-672-30885-1/12tyt01.gif">Figure 12.1. NFS protocol layers.</A></B>

<BR>

<P>The NFS product is based on the OSI layered model, resulting in protocols that are independent (in theory, at least) from each other and protocols in different layers. The design philosophy is that any single-layer protocol could be replaced with any other one, assuming the functionality of the protocol was the same. To date there are no common alternatives for the two lower-layer products, RPC and XDR, although there are several for the top layer. 

<BR>

<BLOCKQUOTE>

<BLOCKQUOTE>

<HR ALIGN=CENTER>

<BR>

<NOTE>

<IMG SRC="note.gif" tppabs="http://www.mcp.com/817948800/0-672/0-672-30885-1/note.gif" WIDTH = 75 HEIGHT = 46>The source code for both the Remote Procedure Call (RPC) and External Data Representation (XDR) protocols is available free of charge from Sun Microsystems.</NOTE>

<BR>

<HR ALIGN=CENTER>

</BLOCKQUOTE></BLOCKQUOTE>

<P>Figure 12.1 introduces the RPC (Remote Procedure Call) and XDR (External Data Representation) protocols that I look at now in more detail.

<BR>

<BR>

<A ID="E69E152" NAME="E69E152"></A>

<H4 ALIGN=CENTER>

<CENTER>

<FONT SIZE=4 COLOR="#FF0000"><B>Remote Procedure Call (RPC)</B></FONT></CENTER></H4>

<BR>

<P>The Remote Procedure Call (RPC) protocol acts as the session layer and as the message exchanger for all NFS-based applications. RPC is composed of a set of procedures that can be incorporated into high-level applications to handle any required network access. The remote procedures are no more complicated to use than local procedures.

<BR>

<BLOCKQUOTE>

<BLOCKQUOTE>

<HR ALIGN=CENTER>

<BR>

<NOTE>

<IMG SRC="note.gif" tppabs="http://www.mcp.com/817948800/0-672/0-672-30885-1/note.gif" WIDTH = 75 HEIGHT = 46>RPC was specially developed for NFS but has since found use in other protocol suites. The principles covered here apply to those RPC products, as well.</NOTE>

<BR>

<HR ALIGN=CENTER>

</BLOCKQUOTE></BLOCKQUOTE>

<P>Application developers can create their own RPC procedures between a client (the one that issues the request) and a server (the one that processes the request). A group of procedures is called a <I>service. </I>Each server can use only one service, so each service is assigned a <I>program </I><I>number </I>to identify itself to both the client and the server.

<BR>

<P>RPC functions over the network between a client and a server. The process followed by an RPC is shown in Figure 12.2. It begins with the activation of the procedure by the client, from which a request message is sent to the server. After receiving the message and extracting the request, the server executes the requested procedure and assembles a response message with the results. Upon receipt of the reply, the client disassembles the message and continues with the application's normal execution. Every step of the procedure is controlled by routines within the RPC library (which is linked into the applications).

<BR>

<P><B><A HREF="12tyt02.gif" tppabs="http://www.mcp.com/817948800/0-672/0-672-30885-1/12tyt02.gif">Figure 12.2. The execution of an RPC.</A></B>

<BR>

<P>RPC messages can be sent using either TCP or UDP (or for that matter, any other protocol that provides the same functionality). Typically, RPC is used with UDP because a connection-based protocol is not necessary and UDP is usually faster. However, UDP does impose a maximum packet size, which can cause some problems with procedures. Also, UDP does not guarantee delivery, so an application that uses UDP must handle reliability issues (usually with a retransmission timer).

<BR>

<P>The use of TCP offers the capability not only to ignore reliability concerns (leaving that to the TCP software), but also to batch requests. With a batch connection, the client and server agree that the client can send several RPC requests one after another without waiting for acknowledgment or a reply to each. This can be a useful feature with some applications.

<BR>

<P>The RPC protocol is used to send requests and replies. The format of the RPC protocol packet header is shown in Figure 12.3, with all fields coded in the External Data Representation (XDR) format (see the section titled &quot;External Data Representation (XDR)&quot; later today). The Transaction ID field is used to match requests and replies and is changed (usually incremented) by the client with each new request. The Direction Indicator field shows whether the message originated with the client (a value of 0) or with the server (a value of 1). The first Version Number is the version of RPC used and the second Version Number identifies the version of the program. The Program Number identifies the service (set of procedures) to use, as mentioned earlier. The Procedure Number identifies the particular procedure in the service.

<BR>

<P><B><A HREF="12tyt03.gif" tppabs="http://www.mcp.com/817948800/0-672/0-672-30885-1/12tyt03.gif">Figure 12.3. The RPC protocol header.</A></B>

<BR>

<P>Some procedures might require a client to authenticate itself to the server, both for identification purposes and for security reasons. The RPC protocol header contains two fields for authentication. The Authorization Information field is for information itself, and the Authorization Verification field is used for the validation. The RPC RFC does not define how authentication is to be performed, leaving it up to the application developer, but it does specify two fields with a maximum size of 400 bytes each. There are currently four types of authentication predefined for use:

<BR>

<UL>

<LI><B>None:</B> No authentication is used. Both authentication fields have zero length.

<BR></LI>

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
午夜精品福利一区二区蜜股av| 国产精品国产三级国产专播品爱网| 亚洲一区中文日韩| 丁香婷婷综合色啪| 久久久久国产精品麻豆| 国产专区综合网| 污片在线观看一区二区| 欧美综合一区二区| 亚洲高清视频中文字幕| 欧美在线高清视频| 亚洲成人高清在线| 欧美精品18+| 日本视频在线一区| 日韩一卡二卡三卡四卡| 男人的j进女人的j一区| 日韩视频在线你懂得| 日本不卡123| 日韩丝袜美女视频| 韩国三级电影一区二区| 久久无码av三级| 国产+成+人+亚洲欧洲自线| 日本一区二区高清| 91女厕偷拍女厕偷拍高清| 亚洲欧洲制服丝袜| 欧美日韩亚洲综合一区二区三区| 婷婷开心久久网| 日韩亚洲欧美一区二区三区| 美国十次了思思久久精品导航| 亚洲精品一区二区三区福利| 国产乱子伦一区二区三区国色天香 | 久久99国产精品久久99果冻传媒| 日韩女优毛片在线| 国产乱淫av一区二区三区| 国产精品日韩成人| 欧美主播一区二区三区美女| 亚洲高清一区二区三区| 日韩一区二区三区av| 国产伦精一区二区三区| 中文字幕视频一区| 欧美性生活久久| 裸体健美xxxx欧美裸体表演| 久久精品一区二区| 91亚洲男人天堂| 日韩黄色片在线观看| 精品国产三级电影在线观看| 床上的激情91.| 亚洲一卡二卡三卡四卡| 欧美xxx久久| 91亚洲精华国产精华精华液| 五月婷婷另类国产| 欧美激情在线看| 精品视频在线看| 国产美女在线精品| 亚洲自拍与偷拍| 久久这里都是精品| 91九色最新地址| 久久99国产精品麻豆| 国产精品久久夜| 欧美精品成人一区二区三区四区| 国产精品综合二区| 亚洲一二三四区| 久久精品一区二区| 欧美精品三级日韩久久| 国产精品中文有码| 午夜精品123| 中文字幕欧美国产| 欧美精品色一区二区三区| 粉嫩13p一区二区三区| 亚洲一区二区三区中文字幕在线| 精品播放一区二区| 91国产成人在线| 国产不卡在线一区| 青青国产91久久久久久| 亚洲欧美国产高清| 久久先锋影音av鲁色资源| 在线观看av一区| 国产成人在线视频网站| 调教+趴+乳夹+国产+精品| 国产精品久久精品日日| 日韩美女一区二区三区四区| 色香色香欲天天天影视综合网| 经典一区二区三区| 一级精品视频在线观看宜春院| 久久精品夜色噜噜亚洲aⅴ| 欧美日本一区二区在线观看| 成人激情动漫在线观看| 麻豆91在线看| 亚洲国产裸拍裸体视频在线观看乱了| 久久精品免视看| 日韩一区二区高清| 欧美日韩在线免费视频| 99精品国产91久久久久久| 国内久久精品视频| 奇米精品一区二区三区四区| 亚洲裸体在线观看| 中文文精品字幕一区二区| 日韩亚洲欧美中文三级| 欧美日韩精品欧美日韩精品| 91在线国内视频| 国产成人在线色| 狠狠色丁香九九婷婷综合五月| 午夜电影网亚洲视频| 亚洲美女免费视频| 国产精品狼人久久影院观看方式| 欧美精品一区二区三区蜜桃视频| 7777精品伊人久久久大香线蕉完整版| 91麻豆蜜桃一区二区三区| 成人黄页在线观看| 成人永久aaa| 国产精品12区| 国产精品自在在线| 国内成人精品2018免费看| 日本不卡一二三| 偷拍一区二区三区四区| 亚洲高清免费视频| 亚洲成a人片综合在线| 夜夜亚洲天天久久| 亚洲制服丝袜在线| 亚洲精品成人少妇| 一区二区三区中文字幕电影| 亚洲美女视频在线观看| 亚洲少妇30p| 亚洲啪啪综合av一区二区三区| 国产精品水嫩水嫩| 国产精品麻豆欧美日韩ww| 中文字幕欧美日本乱码一线二线 | 欧美日韩精品一区二区| 色成人在线视频| 91国模大尺度私拍在线视频| av网站免费线看精品| 成人av在线网站| 91网站视频在线观看| 97久久精品人人爽人人爽蜜臀 | 国产盗摄一区二区| 国产成人av一区二区| 成人在线视频一区二区| eeuss鲁片一区二区三区在线观看 eeuss鲁片一区二区三区在线看 | 欧美精品18+| 日韩视频免费观看高清完整版 | 樱花草国产18久久久久| 亚洲码国产岛国毛片在线| 亚洲黄一区二区三区| 一区二区三区美女视频| 洋洋av久久久久久久一区| 中文字幕欧美激情| 久久久一区二区三区| 国产精品美女久久久久aⅴ国产馆| 国产色产综合产在线视频| 久久这里只有精品6| 国产精品女同一区二区三区| 欧美高清在线一区二区| 国产欧美日韩精品在线| 久久久99精品免费观看| 亚洲欧洲色图综合| 亚洲日本在线看| 一区二区三区四区视频精品免费| 最新日韩在线视频| 亚瑟在线精品视频| 石原莉奈一区二区三区在线观看| 日韩中文字幕区一区有砖一区| 亚洲精品亚洲人成人网| 天堂精品中文字幕在线| 日韩有码一区二区三区| 老色鬼精品视频在线观看播放| 蜜臀av性久久久久蜜臀aⅴ| 国产精品99久久久| proumb性欧美在线观看| 色成人在线视频| 欧美在线观看视频一区二区| 日韩视频一区二区在线观看| 337p日本欧洲亚洲大胆色噜噜| 久久九九99视频| 中文字幕一区二区在线播放| 亚洲成人黄色小说| 老司机精品视频一区二区三区| 国产馆精品极品| 色综合咪咪久久| 日韩一区二区视频在线观看| 2019国产精品| 中文字幕在线一区二区三区| 亚洲一卡二卡三卡四卡| 国产在线精品一区二区| 99视频热这里只有精品免费| 91精品国产欧美一区二区| 久久久精品国产99久久精品芒果| 中文字幕一区免费在线观看| 日韩影院精彩在线| 国产jizzjizz一区二区| 在线观看国产一区二区| 日韩久久久久久| 夜夜爽夜夜爽精品视频| 精品亚洲成a人在线观看| 成人国产精品视频| 99久久国产免费看| 91精品欧美综合在线观看最新 | 欧美电影免费提供在线观看| 欧美韩日一区二区三区四区| 中文字幕日本乱码精品影院| 久久精品国产澳门| 色噜噜狠狠一区二区三区果冻|