亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? rfc49.txt

?? 中、英文RFC文檔大全打包下載完全版 .
?? TXT
字號:
NWG/RFC 49      Conversations with Steve Crocker (UCLA)                          Edwin W. Meyer, Jr.                            MIT Project MAC                             April 25, 1970   (Both my personal opinions and those that I believe represent a   consensus of the Network Working Group at Project MAC are presented   here.  The pronouns "I" and "we" are used to distinguish between   these.)On April 21 and 23 Thomas P. Skinner and I had telephone conversationswith Steve Crocker at UCLA relating to the network protocol,specifically regarding our proposal in NWG/RFC 46.  The following itemswere discussed.  (I hope that Steve will pardon me if I happen tomisparaphrase him.)1) Steve stated that he felt that a need for dynamic reconnection wouldlater be recognized by the network participants.  However, because of alack of consensus, it will not be included in the initialimplementation.  (We at Project MAC favor this approach of not includingit initially.)2) Steve supported the implementation of the INT network commanddescribed in NWG/RFC 46.This command allows a process that has agreed to accept interrupts overa socket connection to be reliably interrupted by the process at theother end.  The interrupt causes a process to abey its current executionand execute a procedure that it has specified as the INT handler.  (TheNCP does not specify the INT handler.  That is the function of higherlevel protocols.)The INT command is designed specifically for use by a third level UserControl and Communication (UCC) protocol to implement a "quit" signal.Under such a protocol, both the requestor and the created process agreethat an INT related to a specific socket connection and transmitted overthe NCP control link to the created process is the standard "quit"signal.  The created process provides an INT handler that implementsthis "quit" function.  (This does not preclude a differentinterpretation of INT by other third level protocols.)Although many systems implement the "quit" as a control character in theTeletype input stream, systems such as CTSS, Multics, and othersimplement it as a 200 ms spacing on the line.  We at MAC think that the                                                                [Page 1]NWG/RFC 49      Conversations with Steve Crocker (UCLA)first method is an undesirable implementation within the network (whilethe second is impossible).  I put forth several reasons why (and I thinkSteve agreed).(a) The link over which the quit character is to be transmitted may beblocked.(b) While the interrupt is most effectively implemented within the NCP,it is undesirable for the NCP to place any particular structure on thedata being transmitted.  (See discussion below.)  This would be requiredif the NCP were to scan a data stream for a control character.(c) Scanning the input stream greatly reduces NCP efficiency in asubsystem where speed is critical to effective operation.Steve pointed out that the implementation of INT as a "quit" should notnecessarily preclude a HOST's interpretation of a control character inthe input stream from also acting as a "quit".3) Steve is opposed both to including the instance tag in the socketidentifier and reserving a null field in the identifier for futuredefinition.  He cited several reasons:(a) Multiple processes of a single user should be indistinguishable to aforeign process.  (I agree with this in certain cases when processes areco-ordinated in joint action.  But what about the case where twoprocesses of the same user both want to independently use the network?)(b) A process wishing to connect to one of a foreign user's processesdoes not know the instance tag of the particular process that he wants,and he can't easily find out.(c) If an instance tag should later prove desirable it could be addedwith some difficulty.  (I claim that something as fundamental as thelength of a socket identifier will prove very resistant to change.)Tom stated that perhaps the low order three bits of the user code couldbe reserved for later interpretation as an instance tag.  He doesn'tthink that a separate field is of great importance.Steve's arguments seem to have merit.  Perhaps Tom's suggestion is theway to go.  I am currently undecided on this matter.4) We all (Steve and MAC) seem to agree that at the NCP level thereshould be no special structure imposed on the data transmitted.  To anNCP all data to be transmitted are bit strings of arbitrary length.  One                                                                [Page 2]NWG/RFC 49      Conversations with Steve Crocker (UCLA)happy result is that the difficult question of character sets does nothave to be resolved at this protocol level.  To include a character setspecification at the NCP level would delay agreement on the protocol andmake this character set more resistant to change.  (If there is to be astandard character set, we prefer ASCII.  After all, it is the preferedstandard of our sponsoring organization.)We also agree with Steve that there should be no optional echoing ofmessages at the NCP protocol level.  (This is also the position of theSDC people in RFC 44.)5) Shoshani, Long, and Landsberg also state (RFC 33) that they prefer toalign messages to end on a word boundary as opposed to double padding.Steve agrees with us in not liking double padding.6) In our proposal (RFC 46) we suggest that RFCs be queued only for opensockets, that RFCs to inactive or connected sockets are to beautomatically rejected via the CLS command.  Steve proposes that RFCs tothese sockets be briefly queued.  If the socket remains in anunacceptable state for a specific interval after the RFC comes in, it isrejected.  This scheme allows certain types of network commandinteraction involving critical races to be implementable.  Such a schemeof limited queueing does not seem unreasonable to me.7) Steve, Tom, and I discussed strategies for a User Control andCommunication (UCC) Protocol.  Steve said that he disliked our UCCstrategy (RFC 46) because it requires maintaining two full-duplexconnections to the requestor process and switching between them.Steve put forth an alternate proposal: a process wishing to create auser process at a foreign HOST issues RFCs to sockets 0 and 1 belongingto the user whose process he wishes to create.  If these sockets areinactive, the NCP automatically directs these requests to the foreignHOST's logger process.  The logger accepts connection and performs thelogin ritual.  If successful, the logger creates a user process and letsgo of the usurped sockets so that the created process may use them tocommunicate with the requestor process.  (I note that this does not usereconnection at a network level, since the logger uses sockets belongingto the ultimate user.  However, it does involve internal reconnection.)Tom and I objected to this because it introduces UCC protocol into theNCP level.  (The NCP must direct all RFCs to inactive sockets 0 and 1 toa logger process.)  I made a quick suggestion that perhaps our twoproposals could be combined such that the requestor issues a"signalling" RFC to a "signal" socket of the UCC process.  The UCC                                                                [Page 3]NWG/RFC 49      Conversations with Steve Crocker (UCLA)rejects the RFC but remembers who is calling.  It then tries to connecttwo sockets of the process to be created to the requestor's sockets, andconducts the login ritual through these.  Steve liked this and suggestedthat I write it up.Following the conversation, I thought of several disadvantages to thisUCC strategy:(a) If the control sockets at a created process are limited to 0 and 1,there is the possibility that a rightful user may not be able tocommunicate with a foreign UCC because the UCC already is using thosesockets to communicate with an imposter.  The logger will discover thisand turn off the imposter, but this is an aggravating security breach.A malicious process could issue simultaneous multiple requests to tie upthe sockets and prevent access to a rightful user.  A better solution isto allow any socket pair of the potential user process to act as thecontrol path.  This permits the UCC to conduct simultaneousinterrogations of competing requestors.(b) A disadvantage of both Crocker's and the combined UCC is that theuser to be logged in is specified by supplying a socket belonging to aparticular user.  The logger must now make the additional check that theuser it is logging in actually belongs to the socket pair it is talkingover.  This seems the reverse of the prefered process: to identify auser and then determine the user code for his socket identifiers.(c) The user may not know the socket user code of the user he wishes tolog in at the foreign HOST.  (After all, there is no basic reason whythe requestor and created processes should have the same user code solong as the requestor satisfies the foreign logger.)(d) In the combined strategy, there is no way for the requestor tospecify which socket user code it wants.  The only assumption that theUCC can make is that the requestor process wishes to log in a processhaving the same socket user code as itself.  (This may not seem veryimportant, but I envision a scheme in which a local process exists toallow consoles attached to the local HOST to login at a foreign HOSTwithout being logged in locally.)(e) The idea of allowing a process to masquerade within the network asanother process (even with the best of intentions) by using its socketuser code introduces a potentially dangerous security breach.  I thinkthat it should be a basic protocol law that NO PROCESS WHATSOEVER mayrequest or accept connections or transmit or receive data over a sockethaving a user code not its own.  This does not apply to an NCP processwhich has responsibility for such transmission, nor does it prevent apriviliged process from closing or rejecting connections between aforeign process and another local process.                                                                [Page 4]NWG/RFC 49      Conversations with Steve Crocker (UCLA)I still think that the UCC proposal we advanced in RFC 46 is a goodworkable scheme.  It does not require socket reconnection (eitherexpressly throughout the network or implicitly within an NCP), nor doany of the objections raised above apply.  The only particulardisadvantage I see is that it requires the requestor process to maintainand switch between two full-duplex connections.  I don't see this as aserious hindrance.  I would like the comments of the networkparticipants on this point in particular.Fortunately the UCC is a third level protocol.  The second level NCP canbe specified before we reach final agreement on a UCC, provided that theNCP allows implementation of a workable UCC.Steve expressed the thought that there need not be an initial standardUCC, that there might be several UCCs.  We at MAC disagree.  If we areall to talk to each other, and not between limited subsets of HOSTswithin the network, there must be an initial standard UCC whichEVERYBODY implements.  (Steve is of course correct that there can beother experimental UCCs also implemented.)It is theoretically possible for each HOST to provide multiple sets ofsoftware to allow a requestor process to communicate with the loggers atHOSTs implementing different UCCs.  I don't think that it will work thisway in practice.  Each HOST will implement the UCC protocol that is mostagreeable to it, and will provide one set of software so that arequestor process can communicate only with those HOSTs which implementsimilar UCCs.I don't think that there is much enthusiasm at Project MAC forimplementing a non-standard UCC just so we can talk to ourselves.  Wewant to implement a single UCC supported at all installations, so thatwe can log in to all HOSTs using this protocol, and that users at allforeign HOSTs can log in to us.       [ This RFC was put into machine readable form for entry ]       [ into the online RFC archives by Altair Petrofsky 7/97 ]                                                                [Page 5]

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
在线成人午夜影院| 国产精品免费网站在线观看| 久久伊人中文字幕| 一区二区三区不卡视频在线观看| 久久精品国产99久久6| 欧美中文字幕久久| 中文字幕在线一区| 日韩在线一区二区三区| 99久久婷婷国产| 久久久99精品久久| 蜜乳av一区二区| 欧美精品亚洲二区| 国产一区福利在线| 精品国产精品网麻豆系列| 亚洲成人激情av| 在线看国产一区二区| 五月综合激情日本mⅴ| 欧美日韩专区在线| 亚洲福利电影网| 一本一本大道香蕉久在线精品 | 3d成人h动漫网站入口| 国产精品素人一区二区| 一本高清dvd不卡在线观看| 亚洲成av人影院| 久久人人97超碰com| 久久 天天综合| 日韩视频一区二区在线观看| 亚洲第一搞黄网站| 久久久777精品电影网影网| 91视频观看视频| 亚洲美女免费在线| 在线精品视频一区二区| 久久国产夜色精品鲁鲁99| 亚洲欧洲精品一区二区精品久久久 | 日韩西西人体444www| 99久久综合色| 中文字幕一区视频| 日韩视频免费直播| 91麻豆6部合集magnet| 精品午夜久久福利影院| 亚洲人吸女人奶水| 久久网这里都是精品| 欧美性一二三区| 日本中文字幕不卡| 欧美本精品男人aⅴ天堂| 韩国欧美国产1区| 国产精品乱码人人做人人爱| 91精品免费观看| 色婷婷久久99综合精品jk白丝| 精品一区二区在线看| 亚洲国产美女搞黄色| 国产日韩欧美不卡在线| 不卡区在线中文字幕| 亚洲精品五月天| 91精品国产欧美一区二区成人| 久久 天天综合| 天天av天天翘天天综合网 | 久久精品亚洲精品国产欧美kt∨| 欧美性淫爽ww久久久久无| av一区二区三区| 国产精选一区二区三区| 日韩一区在线播放| 亚洲国产精品激情在线观看| 色婷婷av久久久久久久| 成人午夜电影久久影院| 一区二区三区久久| 亚洲区小说区图片区qvod| 国产人妖乱国产精品人妖| 2021久久国产精品不只是精品| 日韩一区二区三区观看| 欧美日韩日日骚| 欧美日韩精品欧美日韩精品一| 久久99精品久久久| 极品尤物av久久免费看| 免费观看久久久4p| 亚洲精品免费播放| 亚洲另类春色国产| 亚洲欧美成aⅴ人在线观看| 国产精品久久久久久久久图文区| 久久综合狠狠综合久久综合88| 欧美一区二区在线观看| 91精品国产黑色紧身裤美女| 在线电影欧美成精品| 3d动漫精品啪啪一区二区竹菊| 欧美日韩精品电影| 欧美一级高清片| 日韩久久久久久| 欧美三级中文字| 欧美日韩一卡二卡| 91精品国产日韩91久久久久久| 日韩一区二区三区视频在线| 精品欧美一区二区久久| 久久综合久久综合久久| 欧美国产日韩精品免费观看| 国产精品久久午夜夜伦鲁鲁| 亚洲另类色综合网站| 亚洲福利视频一区二区| 日本亚洲视频在线| 国产在线观看一区二区| 国产盗摄一区二区| 韩国一区二区三区| 成人av片在线观看| 欧亚一区二区三区| 欧美mv日韩mv亚洲| 一色屋精品亚洲香蕉网站| 亚洲小说欧美激情另类| 日本午夜精品一区二区三区电影| 精品亚洲aⅴ乱码一区二区三区| 国产一区二区导航在线播放| 成人精品高清在线| 欧美色欧美亚洲另类二区| 欧美一级片免费看| 国产精品看片你懂得| 亚洲一区二区三区四区在线| 一个色在线综合| 激情综合五月天| 99久久er热在这里只有精品66| 欧美日韩免费观看一区二区三区 | 六月婷婷色综合| 99免费精品在线观看| 4438x亚洲最大成人网| 国产精品色呦呦| 日韩av不卡在线观看| 成人午夜视频免费看| 欧美日韩在线播放三区| 国产欧美日韩麻豆91| 天天做天天摸天天爽国产一区| 懂色av一区二区夜夜嗨| 高清国产一区二区| 欧美日韩国产高清一区二区| 日本一区二区三区高清不卡| 亚洲成a人v欧美综合天堂| 成人激情动漫在线观看| 欧美一二三四区在线| 亚洲欧美偷拍另类a∨色屁股| 九色综合国产一区二区三区| 日本高清成人免费播放| 91成人看片片| 国产亚洲一区字幕| 美女视频黄免费的久久| 色噜噜狠狠一区二区三区果冻| 精品99一区二区三区| 一区二区免费在线| 99久久er热在这里只有精品66| 26uuu欧美| 欧美96一区二区免费视频| 欧美在线短视频| 国产精品久久久久久久久图文区| 久久草av在线| 日韩欧美国产麻豆| 首页国产丝袜综合| 日本道精品一区二区三区| 日本一区二区三区视频视频| 久久国产精品99精品国产| 欧美军同video69gay| 亚洲综合偷拍欧美一区色| 成人av高清在线| 国产午夜亚洲精品午夜鲁丝片| 免费高清视频精品| 欧美久久久久久久久久| 尤物视频一区二区| av在线不卡观看免费观看| 日本一区二区三区四区在线视频| 国产精品中文有码| www国产成人免费观看视频 深夜成人网| 午夜电影一区二区| 欧美精品国产精品| 日韩专区欧美专区| 欧美一区二区免费观在线| 蜜桃视频在线一区| 欧美成人乱码一区二区三区| 久久er99热精品一区二区| 日韩视频在线观看一区二区| 久久国产免费看| 精品国产一区二区亚洲人成毛片| 美女视频网站久久| ww久久中文字幕| 国产精品一色哟哟哟| 国产三级欧美三级| 波多野结衣在线aⅴ中文字幕不卡| 亚洲国产精品精华液ab| 91亚洲精华国产精华精华液| 亚洲欧美激情小说另类| 日本高清无吗v一区| 丝瓜av网站精品一区二区| 欧美一级视频精品观看| 国产一区二区精品久久| 久久精品男人的天堂| 91亚洲国产成人精品一区二三| 亚洲午夜在线电影| 欧美成人高清电影在线| 国产福利一区在线| 亚洲人一二三区| 丁香婷婷深情五月亚洲| 国产精品久久久久aaaa| 欧美日韩国产一区| 狠狠色伊人亚洲综合成人| 中文字幕制服丝袜成人av| 欧美亚洲丝袜传媒另类| 开心九九激情九九欧美日韩精美视频电影 |