亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? network

?? unix v7是最后一個廣泛發布的研究型UNIX版本
??
?? 第 1 頁 / 共 2 頁
字號:
.RP.if n .ls 2.ds RH Nowitz.ND "August 18, 1978".TLA Dial-Up Network ofUNIX\s6\uTM\d\s0Systems.AUD. A. Nowitz.AUM. E. Lesk.AI.MH.AB.if n .ls 2A network of over eighty.UXcomputer systems has been established using thetelephone system as its primary communication medium.The network was designed to meet the growing demands forsoftware distribution and exchange.Some advantages of our design are:.IP -The startup cost is low.A system needs only a dial-up port,but systems with automatic calling units have much moreflexibility..IP -No operating system changes are required to install or use the system..IP -The communication is basically over dial-up lines,however, hardwired communication lines can be usedto increase speed..IP -The command for sending/receiving files is simple to use..spKeywords: networks, communications, software distribution, software maintenance.AE.NH Purpose.PPThe widespread use of the.UXsystem.[ritchie thompson bstj 1978.]within Bell Laboratorieshas produced problems of software distribution and maintenance.A conventional mechanism was set up to distribute the operatingsystem and associated programs from a central site to thevarious users.However this mechanism alone does not meet all softwaredistribution needs.Remote sites generate much software and must transmit it toother sites.Some.UXsystemsare themselves central sites for redistributionof a particular specialized utility,such as the Switching Control Center System.Other sites have particular, often long-distance needs forsoftware exchange; switching research,for example, is carried on inNew Jersey, Illinois, Ohio, and Colorado.In addition, general purpose utility programs are written atall.UXsystem sites.The.UXsystem is modifiedand enhanced by many people in many places andit would be very constricting to deliver new software in a one-waystream without any alternativefor the user sites to respond with changes of their own..PPStraightforward software distribution is only part of the problem.A large project may exceed the capacity of a single computer andseveral machines may be used by the one group of people.It then becomes necessaryfor them to pass messages, data and other information back an forthbetween computers..PPSeveral groups with similar problems, both inside and outside ofBell Laboratories, have constructed networks built ofhardwired connections only..[dolotta mashey 1978 bstj.].[network unix system chesson.]Our network, however, uses both dial-up and hardwiredconnections so that service can be provided to as many sites as possible..NHDesign Goals.PPAlthough some of our machines are connected directly, otherscan only communicate over low-speed dial-up lines.Since the dial-up lines are often unavailableand file transfers may take considerable time,we spool all work and transmit in the background.We also had to adapt to a community of systems which are independentlyoperated and resistant to suggestions that they should allbuy particular hardware or install particular operating systemmodifications.Therefore, we make minimal demands on the local sitesin the network.Our implementation requires no operating system changes;in fact, the transfer programs look like any other userentering the system through the normal dial-up login ports,and obeying all local protection rules..PPWe distinguish ``active'' and ``passive'' systemson the network.Active systems have an automatic calling unitor a hardwired line to another system,and can initiate a connection.Passive systems do not have the hardwareto initiate a connection.However, anactive system can be assigned the job of calling passivesystems and executing work found there;this makes a passive system the functional equivalent ofan active system, except for an additional delay while it waits to be polled.Also, people frequently log into active systems andrequest copying from one passive system to another.This requires two telephone calls, but even so, it is fasterthan mailing tapes..PPWhere convenient, we use hardwired communication lines.These permit much faster transmission and multiplexingofthe communications link.Dial-up connections are made at either 300 or 1200 baud;hardwired connections are asynchronous up to 9600 baud and might run even faster on special-purpose communicationshardware..[fraser spider 1974 ieee.].[fraser channel network datamation 1975.]Thus, systems typically join our network first aspassive systems and whenthey find the service more important, they acquireautomatic calling units and become activesystems; eventually, they may install high-speedlinks to particular machines with which theyhandle a great deal of traffic.At no point, however, must users change theirprograms or procedures..PPThe basic operation of the network is very simple.Each participating system has a spool directory,in which work to be done (files to be moved, or commands to be executedremotely) is stored.A standard program,.I uucico ,performs all transfers.This program starts by identifying a particular communication channelto a remote system with which it will hold a conversation..I Uucicothen selects a device and establishes the connection,logs onto the remote machineand starts the.I uucicoprogram on the remote machine.Once two of these programs are connected, they first agree on a line protocol,and then start exchanging work.Each program in turn, beginning with the calling (active system) program,transmits everything it needs, and then asks the other what it wants done.Eventually neither has any more work, and both exit..PPIn this way, all services are available from all sites; passive sites,however, must wait until called.A variety of protocols may be used; this conforms to the real,non-standard world.As long as the caller and called programs have a protocol in common,they can communicate.Furthermore, each caller knows the hours when each destination systemshould be called.If a destination is unavailable, the data intended for itremain in the spool directory until the destination machine can be reached..PPThe implementation of thisBell Laboratories networkbetween independent sites, all of whichstore proprietary programs and data,illustratives the pervasive need for securityand administrative controls over file access.Each site, in configuring its programs and system files,limits and monitors transmission.In order to access a file a user needs access permissionfor the machine that contains the file and access permissionfor the file itself.This is achieved by first requiring the user to use his passwordto log into his local machine and then his localmachine logs into the remote machine whose files are to be accessed.In addition, records are kept identifying all filesthat are moved into and out of the local system,and how the requestor of such accesses identifiedhimself.Some sites may arrangeto permit users onlyto call upand request work to be done;the calling users are then called backbefore the work is actually done.It is then possible to verifythat the request is legitimate from the standpoint of thetarget system, as well as the originating system.Furthermore, because of the call-back,no site can masquerade as anothereven if it knows all the necessary passwords..PPEach machine can optionally maintain a sequence count forconversations with other machines and require a verification of thecount at the start of each conversation.Thus, even if call back is not in use, a successful masquerade requiresthe calling party to present the correct sequence number.A would-be impersonator must not just steal the correct phone number,user name, and password, but also the sequence count, and must call insufficiently promptly to precede the next legitimate request from either side.Even a successful masquerade will be detected on the next correctconversation..NHProcessing.PPThe user has two commands which set up communications,.I uucpto set up file copying,and.I uuxto set up command execution where some of the requiredresources (system and/or files)are not on the local machine.Each of these commands will put work and data filesinto the spool directory for execution by.I uucpdaemons.Figure 1 shows the major blocks of the file transfer process..SHFile Copy.PPThe.I uucicoprogram is used to perform all communications betweenthe two systems.It performs the following functions:.RS.IP - 3Scan the spool directory for work..IP -Place a call to a remote system..IP -\ \ Negotiate a line protocol to be used..IP -\ \ Start program.I uucicoon the remote system..IP -\ \ Execute all requests from both systems..IP -\ \ Log work requests and work completions..RE.LP.I Uucicomay be started in several ways;.RS.IP a) 5by a system daemon,.IP b)by one of the.I uucpor.I uuxprograms,.IP c)by a remote system..RE.SHScan For Work.PPThe file names in the spool directory are constructed to allow thedaemon programs.I "(uucico, uuxqt)"to determine the files they should look at,the remote machines they should calland the order in which the files for a particularremote machine should be processed..SHCall Remote System.PPThe call is made using information from severalfiles which reside in the uucp program directory.At the start of the call process, a lock isset on the system being called so that anothercall will not be attempted at the same time..PPThe system name is found in a``systems''file.The information contained for each system is:.IP.RS.IP [1]system name,.IP [2]times to call the system(days-of-week and times-of-day),.IP [3]device or device type to be used for call,.IP [4]line speed,.IP [5]phone number,.IP [6]login information (multiple fields)..RE.PPThe time field is checked against the present time to seeif the call should be made.The.Iphone number.Rmay contain abbreviations (e.g. ``nyc'', ``boston'') which get translated into dialsequences using a``dial-codes'' file.This permits the same ``phone number'' to be stored at every site, despitelocal variations in telephone services and dialing conventions..PPA ``devices''file is scanned using fields [3] and [4] from the``systems''file to find an available device for the connection.The program will try all devices which satisfy[3] and [4] until a connection is made, or no moredevices can be tried.If a non-multiplexable device is successfully opened, a lock fileis created so that another copy of.I uucicowill not try to use it.If the connection is complete, the.Ilogin information.Ris used to log into the remote system.Thena command is sent to the remote systemto start the.I uucicoprogram.The conversation between the two.I uucicoprograms begins with a handshake started by the called,.I SLAVE ,system.The.I SLAVE

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
成人国产视频在线观看| 精彩视频一区二区三区| 欧美激情艳妇裸体舞| 精品少妇一区二区三区免费观看| 91免费国产在线观看| aaa国产一区| 91网站视频在线观看| 色综合久久中文综合久久牛| 91蝌蚪porny| 色猫猫国产区一区二在线视频| 成人aa视频在线观看| av激情成人网| 日本高清免费不卡视频| 在线观看国产一区二区| 欧美日韩一级黄| 欧美videos大乳护士334| 久久一留热品黄| 中文字幕不卡在线播放| 亚洲欧美日韩国产综合在线 | 在线播放亚洲一区| 欧美一区二区国产| 久久久99免费| 亚洲欧洲99久久| 亚洲电影你懂得| 狠狠网亚洲精品| 色综合久久天天| 日韩三级在线免费观看| 国产精品情趣视频| 午夜精品爽啪视频| 国产在线不卡一卡二卡三卡四卡| 国产成人精品免费网站| 日本高清免费不卡视频| 精品99一区二区三区| 国产精品国产三级国产aⅴ原创| 亚洲日穴在线视频| 蜜桃视频免费观看一区| 99这里只有久久精品视频| 欧美视频你懂的| 久久日一线二线三线suv| 综合av第一页| 国产综合色视频| 欧美影院一区二区三区| 久久毛片高清国产| 午夜精品一区二区三区电影天堂| 国产乱一区二区| 在线观看日韩国产| 国产欧美一区二区精品性色超碰| 一区二区三区四区亚洲| 韩国女主播成人在线观看| 欧美亚洲一区二区在线观看| 久久久夜色精品亚洲| 亚洲一区二三区| 成人黄色在线网站| 91精品国产一区二区三区 | 亚洲女厕所小便bbb| 极品少妇一区二区三区精品视频 | 国产一区二区三区四区五区入口| 色www精品视频在线观看| 久久这里只有精品首页| 丝袜美腿一区二区三区| 国产精品一区二区在线观看不卡| 欧美美女一区二区在线观看| 日韩一区有码在线| av午夜一区麻豆| 国产日韩亚洲欧美综合| 美女高潮久久久| 日韩欧美二区三区| 美女爽到高潮91| 欧美伦理电影网| 亚洲国产wwwccc36天堂| 欧美在线一区二区| 亚洲国产精品天堂| 欧洲激情一区二区| 亚洲国产精品视频| 欧美三区免费完整视频在线观看| 亚洲精品成人天堂一二三| a亚洲天堂av| 亚洲欧美成人一区二区三区| heyzo一本久久综合| 中文字幕va一区二区三区| 国产成人免费视频网站| 亚洲国产高清aⅴ视频| 成人一区在线看| 亚洲国产精华液网站w| www.66久久| 亚洲视频一区二区在线| 色噜噜久久综合| 亚洲一区二区三区爽爽爽爽爽| 欧美日韩一区在线观看| 肉色丝袜一区二区| 久久综合久久久久88| 成人99免费视频| 亚洲高清视频的网址| 制服丝袜av成人在线看| 国产美女精品一区二区三区| 国产日韩精品视频一区| 99精品国产热久久91蜜凸| 亚洲一区二区精品视频| 欧美mv和日韩mv国产网站| 国产酒店精品激情| 一区二区三区在线视频免费 | 麻豆国产精品官网| 久久噜噜亚洲综合| 色偷偷88欧美精品久久久| 午夜欧美大尺度福利影院在线看| 精品国产乱码91久久久久久网站| 国产精品18久久久久久vr| 国产精品沙发午睡系列990531| 91社区在线播放| 久久国产精品99久久人人澡| 国产精品色在线| 欧美日韩日日夜夜| 国产+成+人+亚洲欧洲自线| 亚洲自拍偷拍综合| 久久综合久久久久88| 色婷婷综合久久久久中文 | 欧美性视频一区二区三区| 久久99久久99精品免视看婷婷| 国产欧美精品一区| 欧美日韩国产综合久久| 国产乱人伦偷精品视频免下载 | 欧美一区日韩一区| 91在线观看下载| 久久成人羞羞网站| 亚洲永久免费视频| 中文字幕久久午夜不卡| 欧美视频一区二区| 99久久免费精品高清特色大片| 毛片av一区二区| 亚洲第一精品在线| 亚洲精品视频在线| 日韩国产在线观看一区| 欧美国产日韩在线观看| 91久久久免费一区二区| 国产一区二区三区在线观看免费视频| 久久蜜桃av一区精品变态类天堂| 日本韩国欧美一区二区三区| 国产成人在线影院| 免费精品视频在线| 日韩精品亚洲一区| 午夜精品免费在线| 亚洲免费毛片网站| 中文字幕一区二区三区四区不卡 | 九九久久精品视频| 婷婷成人综合网| 亚洲一线二线三线视频| 中文字幕一区二区在线观看| 国产精品天干天干在观线| 精品日韩一区二区| 欧美一区二区久久久| 91精品国模一区二区三区| 欧美日韩国产一区二区三区地区| 色噜噜狠狠色综合中国| 在线亚洲+欧美+日本专区| 成人教育av在线| 99麻豆久久久国产精品免费优播| 成人一区二区视频| 成人美女在线观看| 99国产一区二区三精品乱码| av综合在线播放| 一本到三区不卡视频| 99精品久久免费看蜜臀剧情介绍| 久久av资源站| 黄页网站大全一区二区| 国产一区二区免费看| 成人天堂资源www在线| eeuss鲁一区二区三区| 色综合欧美在线| 欧美精品九九99久久| 日韩亚洲欧美一区二区三区| 亚洲精品在线免费播放| 国产精品日韩成人| 亚洲国产精品欧美一二99| 久久国产精品99久久人人澡| 成人自拍视频在线观看| 在线观看不卡一区| 欧美一二三四区在线| 国产三级精品在线| 亚洲精品水蜜桃| 国内成人自拍视频| 成人av在线一区二区三区| 色94色欧美sute亚洲线路二| 欧美日韩第一区日日骚| 精品免费国产二区三区| ...xxx性欧美| 污片在线观看一区二区| 国产精品一区二区在线播放 | 91蜜桃传媒精品久久久一区二区| 在线观看成人小视频| 久久久久88色偷偷免费 | 在线观看91精品国产麻豆| 久久午夜色播影院免费高清| 一区二区三区四区不卡在线| 国产在线一区观看| 欧美日韩一区二区三区不卡| 国产精品天天摸av网| 日本美女视频一区二区| 色欧美乱欧美15图片| 国产片一区二区| 蜜桃在线一区二区三区|