Bridge Interface Setup

Total Page:16

File Type:pdf, Size:1020Kb

Bridge Interface Setup Bridge Document revision 2.3 (Fri Aug 18 11:56:45 GMT 2006) This document applies to V2.9 Table of Contents Table of Contents General Information Summary Quick Setup Guide Specifications Related Documents Description Additional Documents Bridge Interface Setup Description Property Description Example Port Settings Description Property Description Notes Example Bridge Monitoring Description Property Description Example Bridge Port Monitoring Description Property Description Example Bridge Host Monitoring Property Description Example Bridge Firewall General Description Description Property Description Notes Bridge Packet Filter Description Property Description Bridge NAT Description Property Description Bridge Brouting Facility Description Property Description Page 1 of 13 Copyright 1999-2006, MikroTik. All rights reserved. Mikrotik, RouterOS and RouterBOARD are trademarks of Mikrotikls SIA. Other trademarks and registred trademarks mentioned herein are properties of their respective owners. Troubleshooting Description General Information Summary !"" # $%&#'' $%&#'' $%&#'' client ( ad-hoc infrastructure station !"" ! $%&#''# )( " * ! +,- ! " " # . " " ( * /! ! -" 0 -0# 0 " ! ! ( *!" *# ! 1 • -" 0 -0 • ! " • 2 " 3 • • ! • 2 0 • -!"" ! " * Quick Setup Guide 0 "! ether1 ether2 # 1. MyBridge1 /interface bridge add name="MyBridge" disabled=no 2. ether1 ether2 MyBridge 1 /interface bridge port add interface=ether1 bridge=MyBridge /interface bridge port add interface=ether2 bridge=MyBridge Specifications Packages required: system License required: level3 Home menu level: /interface bridge Standards and Technologies: IEEE801.1D Hardware usage: Not significant Page 2 of 13 Copyright 1999-2006, MikroTik. All rights reserved. Mikrotik, RouterOS and RouterBOARD are trademarks of Mikrotikls SIA. Other trademarks and registred trademarks mentioned herein are properties of their respective owners. Related Documents • -( * • • • . Description 3 * ( * $%&#'' "3 +,- 4 ! # 0 ! ( " ! " / ! ( * ( / * ( * 5 ( / ( # " / "" ! ! / * ( ( * ( * " (/ / ( / /# ( * " / / "5 " # + ! / " " (! " ( * ! / / (! 3 * " * ! " # ! ( ! ( " " # -0 ( ! ( / " "/# (! ( " "! / ! ! * " # 0 5 ! 2,6 3 2 , 6 " / (! !" ( ( ! ( * "/# -0 ( " ( * ! ! * " " # 0 ( ( ,# Additional Documents "177 #! #7 Bridge Interface Setup Home menu level: /interface bridge Description 0 ! ( * ! ! !" " # 8 ( ( ! /# Property Description ageing-time (time; default: 5m) - how long a host information will be kept in the bridge database arp (disabled | enabled | proxy-arp | reply-only; default: enabled) - Address Resolution Protocol setting Page 3 of 13 Copyright 1999-2006, MikroTik. All rights reserved. Mikrotik, RouterOS and RouterBOARD are trademarks of Mikrotikls SIA. Other trademarks and registred trademarks mentioned herein are properties of their respective owners. forward-delay (time; default: 15s) - time which is spent during the initialization phase of the bridge interface (i.e., after router startup or enabling the interface) in listening/learning state before the bridge will start functioning normally garbage-collection-interval (time; default: 4s) - how often to drop old (expired) host entries in the bridge database. The garbage collection process expurges the entries older than defined by the ageing-time property hello-time (time; default: 2s) - how often send hello packets to other bridges mac-address (read-only: MAC address) - MAC address for the interface max-message-age (time; default: 20s) - how long to remember Hello messages received from other bridges mtu (integer; default: 1500) - Maximum Transmission Unit name (name; default: bridgeN) - a descriptive name of the bridge interface priority (integer: 0..65535; default: 32768) - bridge interface priority. The priority argument is used by Spanning Tree Protocol to determine, which port remains enabled if at least two ports form a loop stp (no | yes; default: no) - whether to enable the Spanning Tree Protocol. Bridging loops will only be prevented if this property is turned on Example 0 ( ( " 1 [admin@MikroTik] interface bridge> add; print Flags: X - disabled, R - running 0 R name="bridge1" mtu=1500 arp=enabled mac-address=61:64:64:72:65:73 stp=no priority=32768 ageing-time=5m forward-delay=15s garbage-collection-interval=4s hello-time=2s max-message-age=20s [admin@MikroTik] interface bridge> enable 0 Port Settings Home menu level: /interface bridge port Description 0 ! ! ! " ! # Property Description bridge (name; default: none) - the bridge interface the respective interface is grouped in • none - the interface is not grouped in any bridge interface (read-only: name) - interface name, which is to be included in a bridge path-cost (integer: 0..65535; default: 10) - path cost to the interface, used by STP to determine the 'best' path priority (integer: 0..255; default: 128) - interface priority compared to other interfaces, which are destined to the same network Page 4 of 13 Copyright 1999-2006, MikroTik. All rights reserved. Mikrotik, RouterOS and RouterBOARD are trademarks of Mikrotikls SIA. Other trademarks and registred trademarks mentioned herein are properties of their respective owners. Notes - &#9#9 " ! ( 5"# Example 0 !" ether1 ether2 / bridge1 &#9#91 [admin@MikroTik] interface bridge port> add interface=ether1 bridge=bridge1 [admin@MikroTik] interface bridge port> add interface=ether2 bridge=bridge1 [admin@MikroTik] interface bridge port> print # INTERFACE BRIDGE PRIORITY PATH-COST 0 ether1 bridge1 128 10 1 ether2 bridge1 128 10 [admin@MikroTik] interface bridge port> wlan1 / " # Bridge Monitoring Command name: /interface bridge monitor Description 6 ! ! # Property Description bridge-id (text) - the bridge ID, which is in form of bridge-priority.bridge-MAC-address designated-root (text) - ID of the root bridge path-cost (integer) - the total cost of the path to the root-bridge root-port (name) - port to which the root bridge is connected to Example 0 1 [admin@MikroTik] interface bridge> monitor bridge1 bridge-id: 32768.00:02:6F:01:CE:31 designated-root: 32768.00:02:6F:01:CE:31 root-port: ether2 path-cost: 180 [admin@MikroTik] interface bridge> Bridge Port Monitoring Command name: /interface bridge port monitor Description - Page 5 of 13 Copyright 1999-2006, MikroTik. All rights reserved. Mikrotik, RouterOS and RouterBOARD are trademarks of Mikrotikls SIA. Other trademarks and registred trademarks mentioned herein are properties of their respective owners. Property Description designated-port (text) - port of designated-root bridge designated-root (text) - ID of bridge, which is nearest to the root-bridge port-id (integer) - port ID, which represents from port priority and port number, and is unique status (disabled | blocking | listening | learning | forwarding) - the status of the bridge port: • disabled - the interface is disabled. No frames are forwarded, no Bridge Protocol Data Units (BPDUs) are heard • blocking - the port does not forward any frames, but listens for BPDUs • listening - the port does not forward any frames, but listens to them • learning - the port does not forward any frames, but learns the MAC addresses • forwarding - the port forwards frames, and learns MAC addresses Example 0 " 1 [admin@MikroTik] interface bridge port> mo 0 status: forwarding port-id: 28417 designated-root: 32768.00:02:6F:01:CE:31 designated-bridge: 32768.00:02:6F:01:CE:31 designated-port: 28417 designated-cost: 0 -- [Q quit|D dump|C-z pause] Bridge Host Monitoring Command name: /interface bridge host Property Description age (read-only: time) - the time since the last packet was received from the host bridge (read-only: name) - the bridge the entry belongs to local (read-only: flag) - whether the host entry is of the bridge itself (that way all local interfaces are shown) mac-address (read-only: MAC address) - host's MAC address on-interface (read-only: name) - which of the bridged interfaces the host is connected to Example 0 1 [admin@MikroTik] interface bridge host> print Flags: L - local BRIDGE MAC-ADDRESS ON-INTERFACE AGE bridge1 00:00:B4:5B:A6:58 ether1 4m48s bridge1 00:30:4F:18:58:17 ether1 4m50s L bridge1 00:50:08:00:00:F5 ether1 0s L bridge1 00:50:08:00:00:F6 ether2 0s bridge1 00:60:52:0B:B4:81 ether1 4m50s Page 6 of 13 Copyright 1999-2006, MikroTik. All rights reserved. Mikrotik, RouterOS and RouterBOARD are trademarks of Mikrotikls SIA. Other trademarks and registred trademarks mentioned herein are properties of their respective owners. bridge1 00:C0:DF:07:5E:E6 ether1 4m46s bridge1 00:E0:C5:6E:23:25 prism1 4m48s bridge1 00:E0:F7:7F:0A:B8 ether1 1s [admin@MikroTik] interface bridge host> Bridge Firewall General Description Home menu level: /interface bridge filter, /interface bridge nat, /interface bridge broute Description 0 ( " " * / " ! / ! ! ( ! Note " * ( :! * / " ! ; ; /ip firewall ! ! (/ "" 70 ! 3 5 " output ( 5 ! . ( 8!"!#
Recommended publications
  • On IP Networking Over Tactical Links
    On IP Networking over Tactical Links Claude Bilodeau The work described in this document was sponsored by the Department of National Defence under Work Unit 5co. Defence R&D Canada √ Ottawa TECHNICAL REPORT DRDC Ottawa TR 2003-099 Communications Research Centre CRC-RP-2003-008 August 2003 On IP networking over tactical links Claude Bilodeau Communications Research Centre The work described in this document was sponsored by the Department of National Defence under Work Unit 5co. Defence R&D Canada - Ottawa Technical Report DRDC Ottawa TR 2003-099 Communications Research Centre CRC RP-2003-008 August 2003 © Her Majesty the Queen as represented by the Minister of National Defence, 2003 © Sa majesté la reine, représentée par le ministre de la Défense nationale, 2003 Abstract This report presents a cross section or potpourri of the numerous issues that surround the tech- nical development of military IP networking over disadvantaged network links. In the first sec- tion, multi-media services are discussed with regard to three aspects: applications, operational characteristics and service models. The second section focuses on subnetworks and bearers; mainly impairments caused by characteristics of the wireless environment. An overview of the Iris tactical bearers is provided as an example of a tactical IP environment. The last section looks at how IP can integrate these two elements i.e. multi-media services and impaired sub- network links. These three sections are unified by a common theme, quality of service, which runs in the background of the discussions. Résumé Ce rapport présente une coupe transversale ou pot-pourri de questions reliées au développe- ment technique des réseaux militaires IP pour des liaisons défavorisées.
    [Show full text]
  • Troubleshooting TCP/IP
    4620-1 ch05.f.qc 10/28/99 12:00 PM Page 157 Chapter 5 Troubleshooting TCP/IP In This Chapter ᮣ Troubleshooting TCP/IP in Windows 2000 Server ᮣ TCP/IP troubleshooting steps ᮣ Defining which is the best TCP/IP troubleshooting tool to solve your problem ᮣ Mastering basic TCP/IP utilities roubleshooting is, it seems, an exercise in matrix mathematics. That is, Twe use a variety of approaches and influences to successfully solve our problems, almost in a mental columns-and-rows format. These approaches may include structured methodologies, inductive and deductive reasoning, common sense, experience, and luck. And this is what troubleshooting is made of. Troubleshooting TCP/IP problems is really no different from troubleshooting other Windows 2000 Server problems mentioned in this book, such as instal- lation failures described in Chapter 2. Needless to say, Windows 2000 Server offers several TCP/IP-related tools and utilities to assist us, but more on the specifics in a moment. TCP/IP Troubleshooting Basics The goal in TCP/IP troubleshooting is very simple: fix the problem. Too often, it is easy to become overly concerned about why something happened instead of just fixing the problem. And by fixing the problem, I mean cost effectively. 1. Be cost effective. Don’t forget that several hours’ worth of MCSE-level consulting could more than pay for the additional bandwidth that may easily solve your TCP/IP WAN-related problem. Don’t overlook such an easy fix when struggling to make a WAN connection between sites utilizing Windows 2000 Server. Too little bandwidth is typically the result of being penny wise and pound foolish.
    [Show full text]
  • Network Working Group Internet Engineering Task Force Request for Comments: 2500 J
    Network Working Group Internet Engineering Task Force Request for Comments: 2500 J. Reynolds Obsoletes: 2400, 2300, 2200, 2000, 1920, 1880, R. Braden 1800, 1780, 1720, 1610, 1600, 1540, 1500, 1410, Editors 1360, 1280, 1250, 1200, 1140, 1130, 1100, 1083 June 1999 STD: 1 Category: Standards Track Internet Official Protocol Standards Status of this Memo This memo describes the state of standardization of protocols used in the Internet as determined by the Internet Engineering Task Force (IETF). This memo is an Internet Standard. Distribution of this memo is unlimited. Copyright Notice Copyright (C) The Internet Society (1999). All Rights Reserved. Table of Contents 1. Introduction . 2 2. Current Technical Specifications . 4 2.1. Standard Protocols . 5 2.2. Network-Specific Standard Protocols . 6 2.3. Draft Standard Protocols . 7 2.4. Proposed Standard Protocols . 9 2.5. Experimental Protocols . 18 3. Current Applicability Statements . 21 4. Non-Standard Protocols . 22 4.1. Informational Protocol . 22 4.2. Historic Protocols . 24 5. Contacts . 25 5.1. IAB, IETF, and IRTF Contacts . 25 5.2. Internet Assigned Numbers Authority (IANA) Contact . 25 5.3. Request for Comments Editor Contact . 26 5.4. Requests for Comments Distribution Contact . 26 5.5. Sources for Requests for Comments . 26 6. Security Considerations . 26 7. Editors' Addresses . 27 Full Copyright Statement . 28 IETF Standards Track [Page 1] RFC 2500 Internet Standards June 1999 1. Introduction This memo summarizes the status of Internet protocols and specifications. It is published by the RFC Editor in accordance with Section 2.1 of "The Internet Standards Process -- Revision 3", RFC 2026, which specifies the rules and procedures by which all Internet stnadards are set.
    [Show full text]
  • Results Are As of Mar - 26 - 2002
    Results are as of Mar - 26 - 2002 ======================================================================== STANDARDS ORDERED BY STD ======================================================================== Mnemonic Title RFC# STD# ------------------------------------------------------------------------ --------- Internet Official Protocol Standards 3000 1* -------- [Reserved for Assigned Numbers. See RFC 1700 and R 2 FC 3232.] -------- Requirements for Internet Hosts - Communication 1122 3 Layers -------- Requirements for Internet Hosts - Application 1123 3 and Support -------- [Reserved for Router Requirements. See RFC 1812.] 4 IP Internet Protocol 791 5 ICMP Internet Control Message Protocol 792 5 --------- Broadcasting Internet Datagrams 919 5 --------- Broadcasting Internet datagrams in the presence 922 5 of subnets -------- Internet Standard Subnetting Procedure 950 5 IGMP Host extensions for IP multicasting 1112 5 UDP User Datagram Protocol 768 6 TCP Transmission Control Protocol 793 7 TELNET Telnet Protocol Specification 854 8 TELNET Telnet Option Specifications 855 8 FTP File Transfer Protocol 959 9 SMTP Simple Mail Transfer Protocol 821 10 SMTP-SIZE SMTP Service Extension for Message Size Declaration 1870 10 MAIL Standard for the format of ARPA Internet text 822 11 messages -------- [Reserved for Network Time Protocol (NTP). See RFC 12 1305.] DOMAIN Domain names - concepts and facilities 1034 13 DOMAIN Domain names - implementation and specification 1035 13 -------- [Was Mail Routing and the Domain System. Now Histo 14 ric.] SNMP
    [Show full text]
  • Networking and Security with Linux
    Networking and Security with Linux by Steven Gordon School of Engineering and Technology CQUniversity Australia This book is available as: HTML: sandilands.info/nsl/ PDF: sandilands.info/nsl/nsl.pdf NSL 19.03 1 March 2019 (r1671) Contents List of Figures xi List of Tables xiii Glossary xv 1 Introduction1 1.1 Purpose of This Book.............................1 1.1.1 History.................................1 1.1.2 Audience................................2 1.1.3 This is NOT a Textbook.......................2 1.2 Using This Book...............................3 1.2.1 Organisation of the Chapters....................3 1.2.2 Following the Examples.......................3 1.2.3 Terminology and Notation......................4 1.2.4 Book Website and Formats......................4 1.2.5 Downloading Example Files.....................4 1.2.6 Other Books and Sources.......................4 1.3 Recognition..................................7 1.3.1 Acknowledgements..........................7 1.3.2 Apologies, Limitations and Reporting Bugs.............7 1.3.3 Licensing...............................8 2 Linux, Ubuntu and VirtualBox9 2.1 What is Ubuntu Linux?...........................9 2.1.1 Why Not Microsoft Windows?....................9 2.2 Installing Ubuntu Linux........................... 10 2.2.1 Ubuntu Variants........................... 10 2.2.2 Installation Approaches....................... 11 2.3 Virtualisation and VirtualBox........................ 12 3 Virtual Networking with Linux and VirtualBox 15 3.1 Virtual Networking and virtnet....................... 15 3.1.1 What is Virtual Networking?.................... 15 3.1.2 Motivation for virtnet........................ 15 3.1.3 How Does virtnet Work?....................... 17 3.1.4 virtnet Terminology.......................... 17 3.1.5 History of virtnet........................... 18 i ii CONTENTS 3.2 Getting Started................................ 19 3.2.1 General Requirements........................ 19 3.2.2 Installation.............................
    [Show full text]
  • Network Working Group Internet Architecture Board Request for Comments: 1600 J. Postel, Editor Obsoletes: Rfcs 1540
    Network Working Group Internet Architecture Board Request for Comments: 1600 J. Postel, Editor Obsoletes: RFCs 1540, 1500, 1410, 1360, March 1994 1280, 1250, 1100, 1083, 1130, 1140, 1200 STD: 1 Category: Standards Track INTERNET OFFICIAL PROTOCOL STANDARDS Status of this Memo This memo describes the state of standardization of protocols used in the Internet as determined by the Internet Architecture Board (IAB). This memo is an Internet Standard. Distribution of this memo is unlimited. Table of Contents Introduction . 2 1. The Standardization Process . 3 2. The Request for Comments Documents . 5 3. Other Reference Documents . 6 3.1. Assigned Numbers . 6 3.2. Gateway Requirements . 6 3.3. Host Requirements . 6 3.4. The MIL-STD Documents . 6 4. Explanation of Terms . 7 4.1. Definitions of Protocol State (Maturity Level) . 8 4.1.1. Standard Protocol . 8 4.1.2. Draft Standard Protocol . 9 4.1.3. Proposed Standard Protocol . 9 4.1.4. Experimental Protocol . 9 4.1.5. Informational Protocol . 9 4.1.6. Historic Protocol . 9 4.2. Definitions of Protocol Status (Requirement Level) . 9 4.2.1. Required Protocol . 10 4.2.2. Recommended Protocol . 10 4.2.3. Elective Protocol . 10 4.2.4. Limited Use Protocol . 10 4.2.5. Not Recommended Protocol . 10 5. The Standards Track . 10 5.1. The RFC Processing Decision Table . 10 5.2. The Standards Track Diagram . 12 6. The Protocols . 14 6.1. Recent Changes . 14 6.1.1. New RFCs . 14 Internet Architecture Board [Page 1] RFC 1600 Internet Standards March 1994 6.1.2.
    [Show full text]
  • Ip Header Contains a Protocol Field
    Ip Header Contains A Protocol Field Cadgy Algernon sometimes benaming his reactivation unfaithfully and bombilate so obscurely! Strophic and unconsidering soCarmine terminatively never extemporises that Rad exaggerating asthmatically very when withershins. Emmit unarm his Caledonians. Conjunct Barde enslaves her criminalistics The authentication data through a datagram has handled independently from other end sends a network. Continuously protect personal information attached host may sponsor a series of both hosts and no good idea of article. This identification is full through a protocol identification field in some link-layer header. The commands get delivered to exit this functionality, but none is algorithm. Is discarded Protocol bits This field specifies the next encapsulated protocol. In IP networking those small pieces of noise are called packets. Note that the data can also can be referenced by advancing the field contains ip header by the socket? TCPIP Quiz Answers 1 How many bits in a byte. Strict source route for encapsulation within a diagnostic messages out on reception. If allowed in a while allowing experimental documents themselves from looping around gateways and. PowerPoint Presentation California State University Long. Multicast a packet callback to edit this field comes in more information into three color marker. What are Ethernet IP and TCP Headers in Wireshark Captures. If there are based on filtering syntax is modified during a part are included ip traffic. NETWORK LAYERINTERNET PROTOCOLS IP Higher. It will assume that these implementations, leap will never fragmented datagram delivery path between other values of data corruption in one gateway finds out of. Icmpuses many times over experimental documents carefully defines how large.
    [Show full text]
  • TCP and UDP Port Assignments
    815 APPENDIX C TCP and UDP Port Assignments Transport Control Protocol (TCP), User Datagram Protocol (UDP) ports, and Protocol Numbers are important to TCP/IP networking, intranets, and the Internet. Ports and protocol numbers provide access to a host computer. However, they also create a security hazard by allowing uninvited access. Therefore, knowing which port to allow or disable increases a network’s security. If the wrong ports or protocol numbers are disabled on a firewall, router, or proxy server as a security measure, essential services might become unavailable. In This Appendix Port Assignments and Protocol Numbers 817 Port Assignments for Commonly-Used Services 822 Protocol Numbers 826 816 Part 4 Appendixes Related Information in the Resource Kit • For a complete listing of Well-Known Ports, Registered ports, and protocol numbers, see the Port Assignments link on the Web Resources page at http://windows.microsoft.com/windows2000/reskit/webresources. Appendix C TCP and UDP Port Assignments 817 Port Assignments and Protocol Numbers In TCP/IP networking, a port is a mechanism that allows a computer to simultaneously support multiple communication sessions with computers and programs on the network. A port directs the request to a particular service that can be found at that IP address. The destination of a packet can be further defined by using a unique port number. The port number is determined when the connection is established. The Internet Assigned Numbers Authority (IANA) defines the unique parameters and protocol values necessary for operation of the Internet and its future development. In the past, these numbers were documented through the RFC document series.
    [Show full text]
  • 1340 J. Postel Obsoletes Rfcs: 1060, 1010, 990, 960, ISI
    Network Working Group J. Reynolds Request for Comments: 1340 J. Postel Obsoletes RFCs: 1060, 1010, 990, 960, ISI 943, 923, 900, 870, 820, 790, 776, 770, July 1992 762, 758,755, 750, 739, 604, 503, 433, 349 Obsoletes IENs: 127, 117, 93 ASSIGNED NUMBERS Status of this Memo This memo is a status report on the parameters (i.e., numbers and keywords) used in protocols in the Internet community. Distribution of this memo is unlimited. Table of Contents INTRODUCTION................................................... 2 Data Notations................................................. 3 Special Addresses.............................................. 4 VERSION NUMBERS................................................ 6 PROTOCOL NUMBERS............................................... 7 WELL KNOWN PORT NUMBERS........................................ 9 REGISTERED PORT NUMBERS........................................ 23 INTERNET MULTICAST ADDRESSES................................... 27 IANA ETHERNET ADDRESS BLOCK.................................... 29 IP TOS PARAMETERS.............................................. 30 IP TIME TO LIVE PARAMETER...................................... 32 DOMAIN SYSTEM PARAMETERS....................................... 33 BOOTP PARAMETERS............................................... 35 NETWORK MANAGEMENT PARAMETERS.................................. 36 MILNET LOGICAL ADDRESSES....................................... 49 MILNET LINK NUMBERS............................................ 50 MILNET X.25 ADDRESS MAPPINGS..................................
    [Show full text]
  • 985 NSF May 1986 Requirements for Internet
    Network Working Group Network Technical Advisory Group Request for Comments: 985 NSF May 1986 Requirements for Internet Gateways -- Draft Status of this Memo This RFC summarizes the requirements for gateways to be used on networks supporting the DARPA Internet protocols. While it applies specifically to National Science Foundation research programs, the requirements are stated in a general context and are believed applicable throughout the Internet community. This document was prepared by the Gateway Requirements Subcommittee of the NSF Network Technical Advisory Group in cooperation with the Internet Activities Board, Internet Architecture Task Force and Internet Engineering Task Force. It requests discussion and suggestions for improvements. Distribution of this memo is unlimited. The purpose of this document is to present guidance for vendors offering products that might be used or adapted for use in an Internet application. It enumerates the protocols required and gives references to RFCs and other documents describing the current specifications. In a number of cases the specifications are evolving and may contain ambiguous or incomplete information. In these cases further discussion giving specific guidance is included in this document. Specific policy issues relevant to the NSF scientific networking community are summarized in an Appendix. ********************************************************************* This is a DRAFT edition of this statement of gateway requirements. Comments are sought on this document for consideration and possibly incorporated in the final edition. Comments are especially sought from those actually developing gateways, particular vendors and potential vendors of gateways. The period for comments is 90 days ending 15-Aug-86, at which time revised edition will be issued with a new RFC number.
    [Show full text]
  • Q 1988 ACM O-89791-279-9/88/008/0 115 $1.50 and Evaluation
    The Fuzzball David L. Mills Electrical Engineering Department University of Delaware Abstract It is not clear how or exactly when the Fuzzball came to be called that. Its ancestor was born at the University of Edinburgh in 1971 The Fuzzball is an operating system and applications library and evolved as the DCN operating system for a distributed network designed for the PDPll family of computers. It was intended as a of PDPl 1 virtual machines at the University of Maryland in 1975 development platform and research pipewrench for the DARPA/NSF [MIL75]. Among the lessons learned is the fact that context switching Internet, but has occasionally escaped to earn revenue in in a virtualized PDPll architecture is painfully slow, so the DCN commercial service. It was designed, implemented and evolved over system remained a demonstration curio. a seventeen-year era spanning the development of the ARPANET and TCP/IP protocol suites and can today be found at Internet By 1977 the DGN system was dismantled and rebuilt in a leaner, outposts from Hawaii to Italy standing watch for adventurous zippier design and software was developed for the TCPllP protocol applications and enduring experiments. This paper describes the suite. The DCN routing protocol, now called Hellospeak [MIL83], Fuzzball and its applications, including a description of its novel was completely redesigned to link DCN hosts and gateways together congestion avoidance/control and timekeeping mechanisms. and to other networks, including ARPANET, SATNET and various LANs. At the time there were no full-featured Internet hosts other Keywords: protocol testing, network testing, performance evaluation, than DCN based on a microprocessor; so, presumably because Internet architecture, TCPllP protocols, congestion control, nobody knew what DCN stood for, they became affectionally and internetwork time synchronization.
    [Show full text]
  • SNMP  SNMP Standards and Rfcs
    INTRODUCTION TO INTERNET NETWORK MANAGEMENT The Fifth Meeting Table of Contents Background Origins of Internet Origins of Internet Network Management Evolution of SNMP SNMP Standards and RFCs SNMP Basic Concepts Network Management Architecture SNMP Protocol Architecture Proxies 2 Internet Network Management Also referred to as SNMP-based Network Management Simple Network Management Protocol (SNMP) is often referred to as the Internet Network Management Framework which includes management architecture structure of management information management protocol plus related concepts... Most widely used in computer communication networks Internet Engineering Task Force (IETF) is responsible for SNMP standardization 3 Origins of Internet ARPANET (formed by US DoD, 1969) connecting four geographically separated computers in US 23 computers in ARPANET (1971) Computers in UK and Norway were connected (1973) TCP/IP protocol suite as ARPANET’s standard protocol (late 70’s) TCP/IP as NFSNET’s standard protocol (1984), then replace ARPANET Continued growth throughout the 80’s and 90’s currently more than 40,000,000 nodes on the Internet Need for the management of rapidly growing Internet! 4 Origins of Internet Network Management Internet Control Message Protocol (ICMP) until late 70’s, e.g., Ping utility Simple Gateway Monitoring Protocol (SGMP) - 1987 High-level Entity Management System (HEMS) generalized version of Host Monitoring Protocol (HMP) SNMP enhanced version of SGMP an interim solution Common Management Information Protocol (CMIP) over TCP/IP (CMOT) long-term solution did not go very far 5 What is SNMP? Simple Network Management Protocol (SNMP) is an application–layer protocol defined by the Internet Architecture Board (IAB) in RFC1157 for exchanging management information between network devices.
    [Show full text]