In Aircraft: Safety, Security, and Office of Aviation Research and Development Certification Issues, and Washington, DC 20591

Total Page:16

File Type:pdf, Size:1020Kb

In Aircraft: Safety, Security, and Office of Aviation Research and Development Certification Issues, and Washington, DC 20591 DOT/FAA/AR-08/31 Networked Local Area Networks Air Traffic Organization Operations Planning in Aircraft: Safety, Security, and Office of Aviation Research and Development Certification Issues, and Washington, DC 20591 Initial Acceptance Criteria (Phases 1 and 2) November 2008 Final Report This document is available to the U.S. public through the National Technical Information Service (NTIS), Springfield, Virginia 22161. U.S. Department of Transportation Federal Aviation Administration NOTICE This document is disseminated under the sponsorship of the U.S. Department of Transportation in the interest of information exchange. The United States Government assumes no liability for the contents or use thereof. The United States Government does not endorse products or manufacturers. Trade or manufacturer's names appear herein solely because they are considered essential to the objective of this report. This document does not constitute FAA certification policy. Consult your local FAA aircraft certification office as to its use. This report is available at the Federal Aviation Administration William J. Hughes Technical Center’s Full-Text Technical Reports page: actlibrary.tc.faa.gov in Adobe Acrobat portable document format (PDF). Technical Report Documentation Page 1. Report No. 2. Government Accession No. 3. Recipient's Catalog No. DOT/FAA/AR-08/31 4. Title and Subtitle 5. Report Date NETWORKED LOCAL AREA NETWORKS IN AIRCRAFT: SAFETY, November 2008 SECURITY, AND CERTIFICATION ISSUES AND INITIAL ACCEPTANCE CRITERIA (PHASES 1 AND 2) 6. Performing Organization Code 7. Author(s) 8. Performing Organization Report No. Eric Fleischman, Randall E. Smith, and Nick Multari 9. Performing Organization Name and Address 10. Work Unit No. (TRAIS) The Boeing Company P.O. Box 3707, MC 7L-49 Seattle, WA 98124-2207 11. Contract or Grant No. DTFACT-05-C-00003 12. Sponsoring Agency Name and Address 13. Type of Report and Period Covered U.S. Department of Transportation Final Report Federal Aviation Administration Air Traffic Organization Operations Planning December 2004-December 2006 Office of Aviation Research and Development Washington, DC 20591 14. Sponsoring Agency Code AIR-120 15. Supplementary Notes The Federal Aviation Administration Airport and Aircraft Safety R&D Division Technical Monitor was Charles Kilgore. 16. Abstract This report presents the results of the Federal Aviation Administration (FAA) local area network (LAN) research effort addressing potential safety impacts introduced by LANs in aircraft. Interconnecting previously isolated components on aircraft increases the complexity of unintended interactions between components and provides potential new access points that could be exploited to cause harm. This report addresses the potential security vulnerabilities introduced by networking LANs, the safety affects of security failures, and a process for designing and certifying LANs on aircraft to ensure the safety of these new aircraft systems. This report extends the current FAA safety assurance processes into airborne networked environments by leveraging the Biba Integrity Model. It builds upon existing FAA studies that articulate mechanisms to integrate RTCA/DO-178B and common criteria processes for the National Airspace System. This approach creates a safety-oriented airborne networked architecture that is built upon existing DO-178B and Aerospace Recommended Practice 4754 safety mechanisms. This produces results that are a direct analog to existing U.S. Department of Defense policies and processes. 17. Key Words 18. Distribution Statement Local area network, Network, Aircraft safety, Aircraft security This document is available to the U.S. public through the National Technical Information Service (NTIS), Springfield, Virginia 22161. 19. Security Classif. (of this report) 20. Security Classif. (of this page) 21. No. of Pages 22. Price Unclassified Unclassified 204 Form DOT F 1700.7 (8-72) Reproduction of completed page authorized TABLE OF CONTENTS Page EXECUTIVE SUMMARY xiii 1. INTRODUCTION 1 2. OBJECTIVES AND APPROACH 7 2.1 Notional Networked Aircraft Architecture 9 2.2 Why Both Target Alternatives Have Similar Security Postures 13 3. EXTENDING THE CURRENT FAA CERTIFICATION ENVIRONMENT 15 4. NETWORK RISKS 19 4.1 Different Universes: Stand-Alone Versus Networked 21 4.2 Internal, External, and Client-Side Attacks 24 4.3 Commerical Off-the-Shelf Vulnerabilities in a Networked Environment 26 4.4 Mixing Embedded Systems and Generic Operating Systems 31 4.5 Internet Protocol Family Security 35 4.6 Network Management—Network Security Concern 43 4.6.1 The SNMP has no Provisions for Two-Factored Authentication 44 4.6.2 The SNMP Symmetric Keys may be Assembled From Passwords 44 4.6.3 The SNMP Key Updates do not Provide for Perfect Forward Secrecy 45 4.6.4 The SNMP Symmetric Key Distribution Problems 45 4.6.5 The SNMP Currently Lacks Demonstrably Viable Session Keys 46 4.7 Mixing Different Communication Protocol Systems 46 4.7.1 Significant Semantic Differences to Allegedly Similar Concepts 48 4.7.2 Integrating Dissimilar Protocol Families 48 4.8 Identity Problem 50 4.9 Integrated or Cooperating System of Systems 51 5. NETWORK SECURITY DEFENSES 52 5.1 Defense-in-Depth 52 5.2 Department of Defense Networking 55 5.3 Internet Protocol Topology Hierarchy and Policy Systems 58 5.4 Mechanisms to Connect Aircraft to Networks 59 5.4.1 Aircraft and Network Mobility 60 iii 5.4.2 Aircraft as a Node (MIP and MANET) 60 5.4.3 Multilevel Network Systems (RED-BLACK, VPN) 61 5.5 Airplane Routing and Autonomous Systems 62 5.6 Virtual Private Networks Enable Network Partitioning 66 5.7 Security Zones and Policy-Based Networking 69 6. RELATING SAFETY AND SECURITY FOR CERTIFICATION 73 6.1 Security Requirements of Airborne Networked Environments 74 6.1.1 Integrity 75 6.1.2 Availability 77 6.1.3 Authentication 78 6.1.4 Confidentiality 79 6.1.5 Nonrepudiation 79 6.2 Extending FAA Orders, Guidance, and Processes Into Vast Network Systems 79 6.3 Comparing Civilian Aircraft Safety and Federal Government Security Levels 83 6.3.1 Civil Aircraft Software Levels 83 6.3.2 Federal Government Security Classifications 85 6.3.3 Comparison of the Two Policy Systems 86 6.4 Biba Integrity Model and Bell-LaPadula Confidentiality Model are Direct Analogs 87 6.5 Relating Safety Classification Levels to the CC 90 7. EXTENDING FAA CERTIFICATION TO AIRBORNE NETWORKS 93 7.1 Extending ARP 4754 Into Networked Environments 94 7.2 Extending DO-178B Into Networked Environments 96 8. CANDIDATE SAFETY AND SECURITY NETWORK SOLUTION 98 8.1 System Security Engineering Methodology 99 8.2 Applying the SSE Methodologies to Airborne Networks 102 8.3 Exemplar Airborne Network Architecture Solution 105 8.3.1 The VPN Encapsulation Method 108 8.3.2 Physical Security 114 8.3.3 Encapsulation Gateways 115 8.3.4 Packet Filter 116 8.3.5 Firewall 117 8.3.6 The ASBR Router 117 iv 8.3.7 High-Assurance LAN 118 8.3.8 Quality of Service 118 8.3.9 Air-to-Ground and Air-to-Air Communications 118 8.4 Network Management Extensions 119 9. ANSWERS TO THE PHASE 1 QUESTIONS 122 9.1 Connection of Multiple Domains 122 9.2 Integrated Modular Avionics Implementation 123 9.3 Using Public IPs 125 9.4 Electronic Flight Bags 125 9.5 Updating Security Protection Software 127 9.6 Responding to Security Breaches 128 9.7 Access to Aircraft Data 129 9.8 Adequacy of Existing Regulations 129 9.9 Ground-to-Air Communication 130 9.10 What is the Efficacy of Cyclic Redundancy Checks With Respect to Security? 130 10. ANSWERS TO THE PHASE 2 QUESTIONS 131 10.1 Are Current Regulations Adequate to Address Security Concern? 131 10.2 How Does Security Assurance Fit Into Overall Certification Process? 132 10.3 What Should Network Security Assurance Process Contain to Meet XX.1309? 132 10.4 How Will Continued Airworthiness and Maintenance be Addressed? 134 10.5 How Can it be Ensured That Networked Systems Cannot Impact Safety? 135 10.6 What Should the Process be for Updating Security Protection Software? 135 10.7 How can Security Breaches be Handled? 136 11. SUMMARY 137 v 11.1 Findings and Recommendations 139 11.2 Topics Needing Further Study 147 12. REFERENCES 148 13. RELATED DOCUMENTATION 156 14. GLOSSARY 157 APPENDICES A—Historic Attack Mechanisms and Tools B—FAA LAN Survey Results vi LIST OF FIGURES Figure Page 1 Notional Networked Aircraft Architecture 10 2 Generic Future Communication System Physical Architecture 11 3 Alternative Notional Aircraft Architecture 11 4 Both Target Architectures Have Similar Security Profiles 14 5 Three Different Software Certification Environments 16 6 The FAA Five Layers of System Protection 19 7 Network Threat Mission and Operational Impact 21 8 Airborne Network Threat Targets 21 9 Threat Agents in a Networked Environment 26 10 A Sample Deployment 30 11 Comparison Between the OSI and TCP/IP Protocol Stacks 46 12 Transforming Islands of Communication Into a Single Logical Network Infrastructure 49 13 Internet Protocol Stack to Convey Legacy Protocols 50 14 Overlapping Defense-in-Depth IA Systems 53 15 Sample Defense-in-Depth Technologies 54 16 Control Life Cycle 55 17 The DoD COMSEC End-to-End Packet Flow (IPV4 Example) 56 18 Representation of how Aircraft may Function Within the GIG 57 19 Internet Protocol Topology Hierarchy 59 20 Interfaces Between Customer and Service Provider Networks 67 21 Example of VPN Encapsulation Using IPsec 68 vii 22 Customer’s L3VPN Protocol Stack Shown Within the Network 69 Service Provider’s Network 23 Historic PBN Framework 70 24 Code- and Document-Signing Process 76 25 Code-
Recommended publications
  • Getting to Grips with Unix and the Linux Family
    Getting to grips with Unix and the Linux family David Chiappini, Giulio Pasqualetti, Tommaso Redaelli Torino, International Conference of Physics Students August 10, 2017 According to the booklet At this end of this session, you can expect: • To have an overview of the history of computer science • To understand the general functioning and similarities of Unix-like systems • To be able to distinguish the features of different Linux distributions • To be able to use basic Linux commands • To know how to build your own operating system • To hack the NSA • To produce the worst software bug EVER According to the booklet update At this end of this session, you can expect: • To have an overview of the history of computer science • To understand the general functioning and similarities of Unix-like systems • To be able to distinguish the features of different Linux distributions • To be able to use basic Linux commands • To know how to build your own operating system • To hack the NSA • To produce the worst software bug EVER A first data analysis with the shell, sed & awk an interactive workshop 1 at the beginning, there was UNIX... 2 ...then there was GNU 3 getting hands dirty common commands wait till you see piping 4 regular expressions 5 sed 6 awk 7 challenge time What's UNIX • Bell Labs was a really cool place to be in the 60s-70s • UNIX was a OS developed by Bell labs • they used C, which was also developed there • UNIX became the de facto standard on how to make an OS UNIX Philosophy • Write programs that do one thing and do it well.
    [Show full text]
  • Linking + Libraries
    LinkingLinking ● Last stage in building a program PRE- COMPILATION ASSEMBLY LINKING PROCESSING ● Combining separate code into one executable ● Linking done by the Linker ● ld in Unix ● a.k.a. “link-editor” or “loader” ● Often transparent (gcc can do it all for you) 1 LinkingLinking involves...involves... ● Combining several object modules (the .o files corresponding to .c files) into one file ● Resolving external references to variables and functions ● Producing an executable file (if no errors) file1.c file1.o file2.c gcc file2.o Linker Executable fileN.c fileN.o Header files External references 2 LinkingLinking withwith ExternalExternal ReferencesReferences file1.c file2.c int count; #include <stdio.h> void display(void); Compiler extern int count; int main(void) void display(void) { file1.o file2.o { count = 10; with placeholders printf(“%d”,count); display(); } return 0; Linker } ● file1.o has placeholder for display() ● file2.o has placeholder for count ● object modules are relocatable ● addresses are relative offsets from top of file 3 LibrariesLibraries ● Definition: ● a file containing functions that can be referenced externally by a C program ● Purpose: ● easy access to functions used repeatedly ● promote code modularity and re-use ● reduce source and executable file size 4 LibrariesLibraries ● Static (Archive) ● libname.a on Unix; name.lib on DOS/Windows ● Only modules with referenced code linked when compiling ● unlike .o files ● Linker copies function from library into executable file ● Update to library requires recompiling program 5 LibrariesLibraries ● Dynamic (Shared Object or Dynamic Link Library) ● libname.so on Unix; name.dll on DOS/Windows ● Referenced code not copied into executable ● Loaded in memory at run time ● Smaller executable size ● Can update library without recompiling program ● Drawback: slightly slower program startup 6 LibrariesLibraries ● Linking a static library libpepsi.a /* crave source file */ … gcc ..
    [Show full text]
  • AR400 User Guide 2.7.1
    AR400 SERIES User Guide Software Release 2.7.1 AR410 AR440S AR441S AR450S AR400 Series Router User Guide for Software Release 2.7.1 Document Number C613-02021-00 REV F. Copyright © 2004 Allied Telesyn International Corp. 19800 North Creek Parkway, Suite 200, Bothell, WA 98011, USA. All rights reserved. No part of this publication may be reproduced without prior written permission from Allied Telesyn. Allied Telesyn International Corp. reserves the right to make changes in specifications and other information contained in this document without prior written notice. The information provided herein is subject to change without notice. In no event shall Allied Telesyn be liable for any incidental, special, indirect, or consequential damages whatsoever, including but not limited to lost profits, arising out of or related to this manual or the information contained herein, even if Allied Telesyn has been advised of, known, or should have known, the possibility of such damages. All trademarks are the property of their respective owner. Contents CHAPTER 1 Introduction Why Read this User Guide? ............................................................................... 7 Where To Find More Information ...................................................................... 8 The Documentation Set .............................................................................. 8 Technical support .............................................................................................. 9 Features of the Router .....................................................................................
    [Show full text]
  • The Linux Command Line
    The Linux Command Line Fifth Internet Edition William Shotts A LinuxCommand.org Book Copyright ©2008-2019, William E. Shotts, Jr. This work is licensed under the Creative Commons Attribution-Noncommercial-No De- rivative Works 3.0 United States License. To view a copy of this license, visit the link above or send a letter to Creative Commons, PO Box 1866, Mountain View, CA 94042. A version of this book is also available in printed form, published by No Starch Press. Copies may be purchased wherever fine books are sold. No Starch Press also offers elec- tronic formats for popular e-readers. They can be reached at: https://www.nostarch.com. Linux® is the registered trademark of Linus Torvalds. All other trademarks belong to their respective owners. This book is part of the LinuxCommand.org project, a site for Linux education and advo- cacy devoted to helping users of legacy operating systems migrate into the future. You may contact the LinuxCommand.org project at http://linuxcommand.org. Release History Version Date Description 19.01A January 28, 2019 Fifth Internet Edition (Corrected TOC) 19.01 January 17, 2019 Fifth Internet Edition. 17.10 October 19, 2017 Fourth Internet Edition. 16.07 July 28, 2016 Third Internet Edition. 13.07 July 6, 2013 Second Internet Edition. 09.12 December 14, 2009 First Internet Edition. Table of Contents Introduction....................................................................................................xvi Why Use the Command Line?......................................................................................xvi
    [Show full text]
  • Strider Web Security
    Adversarial Web Crawling with Strider Monkeys Yi-Min Wang Director, Cyber-Intelligence Lab Internet Services Research Center (ISRC) Microsoft Research Search Engine Basics • Crawler – Crawling policy • Page classification & indexing • Static ranking • Query processing • Document-query matching & dynamic ranking – Diversity • Goals of web crawling – Retrieve web page content seen by browser users – Classify and index the content for search ranking • What is a monkey? – Automation program that mimics human user behavior Stateless Static Crawling • Assumptions – Input to the web server: the URL • Stateless client – Output from the web server: page content in HTML • Static crawler ignores scripts Stateful Static Crawling • We all know that Cookies affect web server response • HTTP User-Agent field affects response too – Some servers may refuse low-value crawlers – Some spammers use crawler-browser cloaking • Give crawlers a page that maximizes ranking (=traffic) • Give users a page that maximizes profit Dynamic Crawling • Simple crawler-browser cloaking can be achieved by returning HTML with scripts – Crawlers only parse static HTML text that maximizes ranking/traffic – Users’ browsers additionally execute the dynamic scripts that maximize profit • Usually redirect to a third-party domain to server ads • Need browser-based dynamic crawlers to index the true content Search Spam Example: Google search “coach handbag” Spam Doorway URL = http://coach-handbag-top.blogspot.com http://coach-handbag-top.blogspot.com/ script execution led to redirection
    [Show full text]
  • BASIC UNIX COMMANDS FILES and DIRECTORIES All Information Is Stored in files
    BASIC UNIX COMMANDS FILES AND DIRECTORIES All information is stored in files. File names and COMMANDS commands are case sensitive. Case matters. Files Commands are what you type at the prompt. Com- are contained in directories. You start out in your mands have arguments on which they operate. For own home directory, and your prompt usually tells example, in rm temp, the command is rm and the ar- its name. At any given time, one of these directories gument is temp; this command removes the file called is your working directory, the one you are in. temp. Here I put arguments in UPPER CASE. Thus, You can refer to files in your working directory by words such as FILE are taken to stand for some other just their names. You can refer to a file that is in a word, such as temp. In the following list, I use [ ] for subdirectory by giving a subdirectory name, a slash, optional arguments that are not typicaly used. and the file name, e.g., Mail/baron. You can refer to Commands have options that are controlled with any file on the computer by giving its full name, start- switches, which are usually letters following a single ing with a slash, such as /home7/b/baron/mbox. dash. Usually you can write several letters after one dash. For example ls -l lists files in a long format, If the file is a program, typing its name will run it. with more information. ls -a lists all the files, in- (That is what commands do.) If the program is some- cluding those that begin with ., which are usually thing you have just written and is in the director you files used by various programs.
    [Show full text]
  • The Air-Gap Jumpers
    Ben-Gurion University of the Negev The Air-Gap Jumpers Mordechai Guri, PhD The Head of R&D, Cyber-Security Research Center Ben-Gurion University of the Negev, Israel About Me Computer scientist (PhD) Head of R&D Cyber-Security Research Center, BGU Co-founder of Morphisec Endpoint Security Research focus Advance Persistent Threats (APTs), Rootkits Security of embedded systems Low-level attacks/defense Mobile security Air-gap security A profile on my research at WIRED by Andy Greenberg: https://www.wired.com/story/air-gap-researcher-mordechai-guri/ Ben-Gurion University of the Negev ‹#› Papers and videos of this presentation can be found in my air-gap research page [1] https://cyber.bgu.ac.il/advanced-cyber/airgap Ben-Gurion University of the Negev ‹#› Agenda Background Threats, attack-vectors Air-gap jumping techniques (‘covert channels’) Demo videos Evaluation Countermeasures Ben-Gurion University of the Negev ‹#› Air Gap Definition: A cyber security measure that secures computer network by physically isolating it from unsecured networks, such as the Internet or another unsecured local area networks. Air Gap Examples of the types of networks or systems that may be air gapped: Military defense system Critical infrastructure command and control centers Computerized medical equipment and healthcare Banking and finance sectors Cryptocurrencies air-gapped (‘cold’) wallets, blockchain Ben-Gurion University of the Negev ‹#› Threats – Chain of Attack Phase Research Question • How attackers can place a malware in Infiltration
    [Show full text]
  • Frequently Asked Questions
    Frequently Asked Questions Q. How can I use the city’s Wi-Fi network? A. BellevueConnect uses the Wi-Fi standard (also known as IEEE 802.11b or g). Your laptop may have wireless built-in, or you can add a Wi-Fi compatible network card to it. Most users can simply bring their wireless-enabled laptop computer or other wireless device and turn it on. Q. How do I connect to the internet through the wireless network? A. Wireless access points, located throughout the buildings, communicate with your wireless device. You should be able to connect anywhere in the public areas. When your wireless network card senses the BellevueConnect, the city’s Wi-Fi BellevueConnect signal, a message appears on the network, is open to all City Hall, South screen indicating the wireless network is available. If Bellevue Community Center, Highland there are multiple wireless networks detected, you Community Center, Crossroads will need to select the BellevueConnect network Community Center and North Bellevue to connect. Open your web browser and it should Q. Is my information safe while using wireless? Community Center visitors free of automatically connect to the Internet. A. BellevueConnect does not provide security or confidenti- charge. There are no preauthorization Q. Will I need any special settings or passwords to con- ality for your computer or data. Connecting your com- (or approval) requirements, although nect? puter to the Internet via BellevueConnect could exposes it you will be asked to accept a policy A. No. BellevueConnect is open to all users who accept the to the same viruses and other security risks as any Internet statement on acceptable use prior to City’s acceptable use policy.
    [Show full text]
  • Escape from Monkey Island: ? Evading High-Interaction Honeyclients
    Escape from Monkey Island: ? Evading High-Interaction Honeyclients Alexandros Kapravelos1, Marco Cova2, Christopher Kruegel1, Giovanni Vigna1 1 UC Santa Barbara {kapravel,chris,vigna}@cs.ucsb.edu 2 University of Birmingham, UK {m.cova}@cs.bham.ac.uk Abstract. High-interaction honeyclients are the tools of choice to detect mali- cious web pages that launch drive-by-download attacks. Unfortunately, the ap- proach used by these tools, which, in most cases, is to identify the side-effects of a successful attack rather than the attack itself, leaves open the possibility for malicious pages to perform evasion techniques that allow one to execute an at- tack without detection or to behave in a benign way when being analyzed. In this paper, we examine the security model that high-interaction honeyclients use and evaluate their weaknesses in practice. We introduce and discuss a number of possible attacks, and we test them against several popular, well-known high- interaction honeyclients. Our attacks evade the detection of these tools, while successfully attacking regular visitors of malicious web pages. 1 Introduction In a drive-by-download attack, a user is lured into visiting a malicious web page, which contains code that exploits vulnerabilities in the user’s browser and/or its environment. If successful, the exploits can execute arbitrary code on the victim’s machine [33]. This ability is typically used to automatically download and run malware programs on the compromised machine, which, as a consequence, often becomes part of a botnet [31]. Drive-by-download attacks are one of the most pervasive threats on the web, and past measurements have found millions of malicious web pages [3, 32].
    [Show full text]
  • Tracking and Mitigation of Malicious Remote Control Networks
    Tracking and Mitigation of Malicious Remote Control Networks Inauguraldissertation zur Erlangung des akademischen Grades eines Doktors der Naturwissenschaften der Universität Mannheim vorgelegt von Thorsten Holz aus Trier Mannheim, 2009 Dekan: Prof. Dr. Felix Christoph Freiling, Universität Mannheim Referent: Prof. Dr. Felix Christoph Freiling, Universität Mannheim Korreferent: Prof. Dr. Christopher Krügel, University of California, Santa Barbara Tag der mündlichen Prüfung: 30. April 2009 Abstract Attacks against end-users are one of the negative side effects of today’s networks. The goal of the attacker is to compromise the victim’s machine and obtain control over it. This machine is then used to carry out denial-of-service attacks, to send out spam mails, or for other nefarious purposes. From an attacker’s point of view, this kind of attack is even more efficient if she manages to compromise a large number of machines in parallel. In order to control all these machines, she establishes a malicious remote control network, i.e., a mechanism that enables an attacker the control over a large number of compromised machines for illicit activities. The most common type of these networks observed so far are so called botnets. Since these networks are one of the main factors behind current abuses on the Internet, we need to find novel approaches to stop them in an automated and efficient way. In this thesis we focus on this open problem and propose a general root cause methodology to stop malicious remote control networks. The basic idea of our method consists of three steps. In the first step, we use honeypots to collect information.
    [Show full text]
  • Downloader and Job Monitor)
    Fiery® EXP4110 SERVER & CONTROLLER SOLUTIONS Welcome © 2005 Electronics for Imaging, Inc. The information in this publication is covered under Legal Notices for this product. 45051573 22 September 2005 WELCOME 3 WELCOME This Welcome document provides system requirements and an overview of how to set up the Fiery EXP4110 so that you can begin printing. It describes the initial tasks you must perform and points you to sections in the user documentation where the procedures are described in further detail. This document also provides a description of the user documents on the User Documentation CD and instructions on printing them. This document assumes that you have already installed the printer components. Details about the printer, the network, remote computers, software applications, and Microsoft Windows are beyond the scope of this document. Terminology and conventions This document uses the following terminology and conventions. Term or convention Refers to Aero Fiery EXP4110 (in illustrations and examples) Fiery EXP4110 Fiery EXP4110 Mac OS Apple Mac OS X Printer Xerox 4110 Titles in italics Other documents in this set Windows Microsoft Windows 2000, Windows XP, Windows Server 2003 Topics for which additional information is available by starting Help in the software Tips and information Important information Important information about issues that can result in physical harm to you or others WELCOME 4 About the documentation This document is part of a set of documentation provided to users and system administrators of Fiery EXP4110. The documents are on the User Documentation CD and are in PDF (Portable Document Format). These files can be viewed online or printed using Adobe Reader.
    [Show full text]
  • The Networker's Guide to Appletalk, IPX, and Netbios
    03 9777 CH03 5/21/01 3:42 PM Page 85 3 The Networker’s Guide to AppleTalk, IPX, and NetBIOS UNTIL THE EARLY 1990S,TCP/IP WAS REALLY ONLY PREVALENT in large govern- ment and research facilities where UNIX and other supercomputing operating systems used it as a common network communications protocol.When PCs came into the picture, they were not networked. Rather, they were used either as front-ends to big micro or mainframe systems (IBM was a big fan of this approach) or as standalone sys- tems. In the early 1980s, as PCs grew in number and in performance, three strategies emerged to provide PCs with networking services:AppleTalk, Novell NetWare, and IBM’s NetBIOS. The goal of this chapter is to give you an understanding of the various protocols that make up the protocol suites and the roles they perform. It is not intended to explain how to design, set up, and manage a network. Chapter 7,“Introduction to Cisco Routers,” and Chapter 10,“Configuring IP Routing Protocols on Cisco Routers,” discuss configuration issues for these protocols. Because NetBIOS is a ses- sion layer protocol rather than a protocol suite, it will be described in the context of its operational behaviors at the end of this chapter. 03 9777 CH03 5/21/01 3:42 PM Page 86 86 Chapter 3 The Networker’s Guide to AppleTalk, IPX, and NetBIOS AppleTalk AppleTalk was an outgrowth of the Apple Macintosh computing platform. First intro- duced in 1984 and updated in 1989, it was designed to provide the Macintosh with a cohesive distributed client/server networking environment.AppleTalk,
    [Show full text]