Les Routeurs Multicast

Total Page:16

File Type:pdf, Size:1020Kb

Les Routeurs Multicast Raccorder son réseau d’entreprise à l’Internet Alexandre Fenyö, Frédéric Le Guern, Samuel Tardieu To cite this version: Alexandre Fenyö, Frédéric Le Guern, Samuel Tardieu. Raccorder son réseau d’entreprise à l’Internet. Editions Eyrolles, 1997, 9782212089516. hal-01649131 HAL Id: hal-01649131 https://hal.archives-ouvertes.fr/hal-01649131 Submitted on 3 Jul 2021 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Distributed under a Creative Commons Attribution - NonCommercial - ShareAlike| 4.0 International License Remerciements Nous tenons tout particulierement` a` remercier Philippe DAX, Nadine RICHARD et Ahmed SERHROUCHNI pour les precieux´ conseils qu’ils nous ont prodigues´ durant la redaction´ de cet ouvrage ainsi que pour leur patience lors des multiples relectures. Les noms d’utilisateurs fictifs presents´ dans les exemples de ce livre nous ont et´ e´ gracieu- sement pretˆ es´ par Luc BEURTON et Stoned ELIPOT, qui nous ont egalement´ aides´ par leurs pertinentes contributions. Le chapitre sur le travail cooperatif´ a ben´ efici´ e´ de l’aide de Yan PUJANTE, auteur d’un me-´ moire de recherche sur le sujet. Nous tenons egalement´ a` remercier Bruno BEAUGRAND, Raphael¨ LUTA et Philippe MEU- NIER qui ont eu la gentillesse de nous procurer les documentations techniques dont nous avions besoin. Pierre BEYSSAC et Guillaume URVOY nous ont egalement´ apporte´ leur aide et nous les en remercions. Les illustrations presentant´ des materiels´ CISCO ont et´ e´ reproduites avec la gracieuse autori- sation de la societ´ eC´ ISCO1. Le formulaire de demande de creation´ ou de modification de domaine dans la zone fr a et´ e´ reproduit avec l’aimable permission du NIC France2, ainsi que la liste des fournisseurs proposant le service de raccordement par ligne specialis´ ee.´ Nous remercions enfin la societ´ eI´ NTUISYS3 pour ses moyens techniques et la patience de ses collaborateurs. 1. http://www.cisco.com/ 2. http://www.nic.fr/ 3. http://www.intuisys.fr/ Preface´ L’Internet est, de par sa topologie, un meta-r´ eseau´ a` couverture mondiale constitue´ d’agre-´ gations de reseaux´ proprietaires´ qu’il interconnecte au moyen de lignes de transmission, de routeurs et du protocole d’interconnexion IP, l’Internet Protocol. L’idee´ de cette interconnexion est dej´ a` ancienne, puisqu’elle remonte a` la naissance de l’Ar- panet en 1969, lorsque Vinton Cerf raccorda les quatre premiers sites. Mais depuis, l’Internet n’a cessedesed´ evelopper´ et de s’amplifier a` un rythme soutenu, doublant, sans flechir,´ son taux de croissance chaque annee.´ Si ce deploiement´ n’a et´ eexp´ erimental´ qu’au cours des annees´ 70 pour tester la viabilite´ des nouveaux protocoles, il est devenu plus concerte´ durant les annees´ 80, uniquement reserv´ e´ aux secteurs militaires et academiques´ ainsi qu’aux organismes et instituts de recherche et de developpement´ ou` les raccordements point a` point s’etablissaient´ alors d’ami a` ami. Au debut´ des annees´ 90 la der´ eglementation´ quasi gen´ erale´ des operateurs´ de tel´ ecommunications´ allait ouvrir la voie a` de nouvelles structures professionnelles offrant de la connectiviteIPetdes´ services reseau´ a` valeur ajoutee´ a` quiconque voulait adherer´ au reseau.´ Ces nouvelles structures, appelees´ ISP (Internet Service Provider) ou prestataire de service Internet, se sont ainsi multipliees´ pour faire face a` la demande exponentielle de nouvelles populations issues des entreprises, mais aussi, par le biais de la mediatisation´ en queteˆ de sensationnel, du grand public. Les ISP constituent dorenavant´ une couche incontournable entre les utilisateurs, toutes origines confondues, et l’Internet. La premiere` partie de cet ouvrage, consacree´ au routage IP, c’est-a-dire` au fonctionnement memeˆ de l’Internet, s’inscrit parfaitement dans cette optique d’interconnexion et de raccor- dement avec les prestataires de services. Elle presente´ tous les cas de figure de raccordements connus a` ce jour et propose des solutions rationnelles selon les contraintes techniques et eco-´ nomiques. Les seconde et troisieme` parties du livre s’attachent principalement ad` evelopper´ les services majeurs du reseau´ qui sont actuellement presents´ sur l’Internet a` savoir le cour- rier electronique´ email, les forums de discussion news, l’inevitable´ World Wide Web, et aussi les nouvelles technologies en cours d’experimentation,´ telles que les relais, les caches et la diffusion de groupe par multicast. L’inter´ etˆ de ces chapitres porte sur l’installation, la mise en œuvre et la meilleure fa¸con de rendre ces services. Les aspects de la securit´ e´ sont abordes,´ 4 comme il se doit, dans la derniere` partie du livre. L’administrateur systeme` ou le respon- sable securit´ e´ y trouvera un arsenal d’outils d’une grande efficacite´ destines´ a` proteger´ et a` controlerˆ son site. Une grande majorite´ des services reseau´ et des outils de securit´ epr´ esent´ es´ est d’ailleurs, chose cocasse, apportee´ par l’utilisation de logiciels du domaine public tres` largement repandus´ et parfaitement maˆıtrises´ par la communaute´ des internautes. Ce livre s’attache a` donner au responsable informatique et reseau´ de l’entreprise tous les el´ e-´ ments techniques pour a` la fois comprendre, choisir et apporter des solutions concretes` et fiables a` tous les problemes` que peuvent poser un raccordement a` l’Internet et la mise en œuvre des services. Le lecteur pourra ainsi eviter´ d’une part de longues pertes de temps dans les meandres´ des documentations, d’autre part les ecueils´ dans lesquels les premiers prati- ciens sont inevitablement´ tombes´ un jour. Cet ouvrage d’ingenierie´ s’adresse principalement aux administrateurs systeme` et reseau,´ aux ingenieurs´ et responsables informatiques et bien entendu aux etudiants´ qui souhaitent toujours en savoir plus. Ce travail original consacre le resultat´ de la collaboration d’un groupe de trois de mes el´ eves` de l’ENST, promotions 1993 et 1994, qui ont chacun l’ageˆ de l’Internet. J’ai personnellement eu avec chacun d’eux de longues discussions passionnantes a` travers lesquelles l’echange´ a` toujours primeeta´ et´ e´ fructueux pour tous, sorte de maietique.¨ La relevedelag` en´ eration´ des pionniers par cette nouvelle gen´ eration´ Internet est donc assuree´ et prometteuse pour l’avenir a` l’aube de l’an 2000. Philippe DAX Philippe DAX est directeur d’etudes´ et ingenieur´ systeme` et reseau´ du departement´ informatique de l’Ecole´ nationale superieure´ des tel´ ecommunications´ de Paris (ENST), membre fondateur de l’Associa- tion fran¸caise des utilisateurs d’Unix (AFUU), membre de l’ISOC (Internet SOCiety) France, auteur de nombreux articles a` propos d’Internet, redacteur´ en chef de la revue Tribunix et auteur du best-seller Le langage C traduit en de nombreuses langues (Eyrolles, 1983). Table des matieres` Remerciements 1 Preface´ 3 I Raccordement a` l’Internet 19 1 Introduction 21 1.1 Historique et architecture de l’Internet . 21 1.1.1 L’Internet : des annees´ 60 a` nos jours . 21 1.1.2 Topologie de l’Internet . 22 1.1.3 Aspects administratifs . 23 1.2 Les composantes de l’Internet . 26 1.2.1 Concepts de base . 26 1.2.2 Aper¸cu des services disponibles sur l’Internet . 30 1.2.3 L’Internet en chiffres . 32 2 Notions de base des reseaux´ TCP/IP 33 2.1 Les differentes´ classes d’adresses . 33 2.1.1 Les adresses de classe A . 34 2.1.2 Les adresses de classe B . 35 2.1.3 Les adresses de classe C . 35 2.1.4 Les adresses de classe D . 36 6 Table des matieres` 2.1.5 Les adresses de classe E . 36 2.2 Les masques de reseau´ et de sous-reseaux´ . 37 2.2.1 Les masques de reseau´ . 37 2.2.2 Les masques de sous-reseaux´ . 37 2.3 L’attribution des adresses IP . 38 2.4 Les couches de protocoles . 41 2.4.1 Le modeleOSI.............................` 41 2.4.2 TCP/IP . 42 2.4.3 La couche physique . 43 2.4.4 La couche liaison de donnees.....................´ 43 2.4.5 La couche reseau´ . 45 2.4.6 La couche transport . 46 2.4.7 Les couches superieures´ . 46 2.5 L’acheminement des donnees..........................´ 47 2.5.1 Les rep´ eteurs´ . 47 2.5.2 Les ponts . 48 2.5.3 Les routeurs . 49 2.5.4 Les passerelles . 49 2.6 Les protocoles de routage . 49 2.6.1 L’algorithme de routage IP . 49 2.6.2 Le routage interne aunr` eseau´ local . 50 2.6.3 Le routage interne a` un fournisseur Internet . 52 2.6.4 Le routage entre fournisseurs . 53 2.7 Techniques de configuration . 55 2.7.1 Configuration des adresses IP . 56 2.7.2 Configuration du routage . 61 3 Raccordement d’un reseau´ local a` l’Internet 63 3.1 Gen´ eralit´ es...................................´ 63 3.1.1 Les quatre offres traditionnelles . 63 3.1.2 Points de Presence´ . 64 Table des matieres` 7 3.1.3 Equipements´ . 66 3.1.4 Types de jonction et mode de transmission . 66 3.1.5 Protocoles pour le raccordement . 67 3.2PPP....................................... 67 3.2.1 Principe . 67 3.2.2 PPP synchrone et asynchrone . 68 3.2.3 Dial-on-Demand . 69 3.2.4 Redial . 69 3.2.5 Filtres . 69 3.2.6 Scripts . 70 3.2.7 Authentification .
Recommended publications
  • Status and Projections of the NAS Program Frank R
    https://ntrs.nasa.gov/search.jsp?R=19870015491 2020-03-20T10:46:12+00:00Z View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by NASA Technical Reports Server NASA Technical Memorandum 88339 . , Status and Projections of the NAS Program Frank R. Bailey EECGECTIOIS CP f Avail: NTlS P87-24924 CSCL 09B 63 Unclad 0080153 July 1986 National Aeronautics and Space Administration ~~ ~ NASA Technical Memorandum 88339 Status and Projections of the NAS Program Frank R. Bailey, Ames Research Center, Moffett Field, California July 1986 NASA National Aeronautics and Space Adminlstratlon Ames Research Center Moffett Field. California 94035 STATUS AND PROJECTIONS OF THE NAS PROGRAM by Dr. F. Ron Bailey to be presented at the SYMPOSIUM ON FUTURE DIRECTIONS OF COMPUTATIONAL MECHANICS ASME Winter Annual Meeting December 7-12, 1986 Anaheim, California ABSTRACT NASA's Numerical Aerodynamic Simulation (NASI Program has completed devel- opment of the initial operating configuration of the NAS Processing System Net- work (NPSN). This is the first milestone in the continuing and pathfinding effort to provide state-of-the-art supercomputing for aeronautics research and development. The NPSN, available to a nation-wide community of remote users, provides a uniform UNIX 1 environment over a network of host computers ranging from the new Cray-2 supercomputer to advanced scientific workstations. This system, coupled with a vendor-independent base of common user interface and network software, presents a new paradigm for supercomputing environments. Presented here is the background leading to the NAS Program, its programmatic goals and strategies, technical goals and objectives, and the development activ- ities leading to the current NPSN configuration.
    [Show full text]
  • Einführung in Z/OS Und OS/390
    Einführung in z/OS und OS/390 Dr. rer. nat. Paul Herrmannn Prof. Dr.-Ing. Wilhelm G. Spruth WS 2006/2007 Teil 3 z/OS Betriebssystem es 0101 ww6 wgs 09-99 System z und S/390 Betriebssysteme z/OS IBM große Installationen (OS/390, MVS) z/VSE IBM mittelgroße Installationen z/VM IBM Virtualisierung, Software Entwicklung TPF IBM spezialisierte Transaktionsverarbeitung UTS 4 Amdahl based on System V, Release 4 (SVR4) OSF/1 Hitachi Open System Foundation Unix z/Linux Public Domain Alle System z bzw. S/390 Betriebssysteme sind Server Betriebssysteme, optimiert für den Multi-User Betrieb es 0521z ww6 wgs 09-99 Transaction Processing Facility TPF 13. Oktober 2006. Die Firma Worldspan, ein weltweiter Anbieter von Reise-Reservierungs- systemen, hat sich für den Einsatz von sechs IBM System z9 Enterprise Class (EC) Mainframe-Servern entschieden. Worldspan will damit sein Angebot an elektronischen Datendiensten erweitern, um circa 700 Anbietern von Reiseangeboten und Millionen von Reisenden weltweit eine gemeinsame Plattform anbieten zu können. Worldspan setzt die neuen IBM System z9 EC Server ein, um sowohl Reisebüros als auch Anbietern von Online-basierten Reisediensten die Möglichkeit zur Nutzung des weltweiten Global Distribution System (GDS) zu geben, über das zum Beispiel die Bestellung und Buchung von Reiseprodukten von Flugzeugtickets, Hotels, Mietwagen und andere Reisedienstleistungen durchgeführt wird. Durch die Nutzung der Software „IBM Transaction Processing Facility“ (TPF) ist Worldspan in der Lage, 17.000 Kundenanfragen pro Sekunde auf
    [Show full text]
  • Joseph S. Mertz Jr. EDUCATION
    Jan 2020 Joseph S. Mertz Jr. H. John Heinz III College & Dietrich College of Humanities and Social Sciences Carnegie Mellon University Pittsburgh, PA 15213-3890 Phone: (412) 268-2540 Email: [email protected] EDUCATION: 1995 Carnegie Mellon University Ph.D. in Engineering and Public Policy 1983 University of Southern California M.S. in Computer Science 1982 Pennsylvania State University B.S. in Computer Science ACADEMIC APPOINTMENTS: Carnegie Mellon University 2018 – present: Director - Information Systems Program 2015 – present: Teaching Professor Joint 50/50 appointment: H. John Heinz III College Dietrich College of Humanities & Social Sciences Information Systems Program 2010 – 2015: Associate Teaching Professor Joint 50/50 appointment: H. John Heinz III College Dietrich College of Humanities & Social Sciences Information Systems Program 2005 – 2010: Associate Teaching Professor Joint 50/50 appointment: H. John Heinz III College School of Computer Science Spring 2009: Associate Teaching Professor Carnegie Mellon Qatar Computer Science Spring 2008: Associate Teaching Professor Carnegie Mellon Qatar Computer Science 2002 – 2005: Associate Teaching Professor Joint 50/50 appointment: Mertz-CV H. John Heinz III School of Public Policy & Management School of Computer Science 1996 – 2002: Co-Director Center for University Outreach 1994 – 1996: Post Doctoral Fellow Center for Innovation in Learning 1988 – 1995: Graduate Research Assistant Department of Engineering & Public Policy University of Puerto Rico 1986 – 1987: Visiting Professor Department of Electrical & Computer Engineering Illinois Benedictine College 1984: Adjunct Instructor Computer Science AWARDS: Mark Gelfand Service Award for Educational Outreach – 2012 Annual University honor for sustained, effective community service with academic coursework to enhance learning, and teach social responsibility. Nominated for the Martcia Wade Teaching Award – 2012 H.
    [Show full text]
  • How Attackers Break Programs, and How to Write Programs More Securely
    How Attackers Break Programs, and How To Write Programs More Securely Matt Bishop Department of Computer Science University of California at Davis Davis, CA 95616-8562 United States of America email: [email protected] www: http://seclab.cs.ucdavis.edu/~bishop phone: +1 (530) 752-8060 © 2002 by Matt Bishop This page deliberately left blank. That is, this page would have been blank except that we had to put the notice "this page deliberately left blank" on it. Otherwise, you might have seen the blank page and worried that someone left a page out of your booklets. So, we put a note on the blank page to assure you that no-one forgot to put something on this page; indeed, we intended for it to be blank. But we could not live up to our intentions, for the reason stated above, so we couldn't put a blank page in here. We had to put a page with some writing on it. So we couldn't put the notice "this page deliberately left blank" because it's not true and, if we couldn't tell when a page is blank, you'd doubt the veracity of everything we did. So we wrote this paragraph to ... oh, heck, forget it. Table of Contents sections slides Overview..................................... 1— 13 Attacking Programs ........................... 14—123 Overview .......................14 — 20 Users and Privilege ...............21 — 29 Environment ....................30 — 48 Buffer Overflow ..................49 — 70 Numeric Overflow ................71 — 76 Validation and Verification .........77 — 92 Race Conditions..................93—112 Denial of Service ............... 113—121 Environment .................. 122—123 Writing Better Programs ......................124—379 Overview ....................
    [Show full text]
  • 17. Websphere Application Server
    17. WebSphere Application Server 17.1 z/OS as a Unix System 17.1.1 Unix Betriebssysteme Welche Server-Betriebssysteme findet man in der Praxis ? • Windows, verschiedene Varianten • Unix, verschiedene Varianten • i-Series, OS/400 • zSeries Betriebssysteme – z/OS, z/VM, z/VSE, TPF Welche wesentlichen Unix Varianten existieren ? • HP/UX • SunSolaris • IBM AIX • Siemens Sinix Unix Systeme sind weitestgehend, • MacOS (BSD) aber nicht 100 % kompatibel • Linux, einschließlich zLinux • z/OS Unix System Services Führende Unix Großrechner sind: • Integrity Superdome von HP mit Itanium Prozessoren und dem HP-UX Betriebssystem • M9000 bzw. SPARC M5-32 Server von Oracle mit Sparc Prozessoren und dem Solaris Betriebssystem. Ein verwandtes Produkt wird von der Firma Fujitsu unter dem Namen „SPARC Enterprise Server“ vertrieben. • System p von IBM mit PowerPC Prozessoren und dem AIX Betriebssystem Neben den proprietären Unix Dialekten ist auf diesen Rechnern auch Linux verfügbar. Performance Unix versus z/OS Die I/O Leistung eines Rechners wird gemessen in der Anzahl von I/O Operationen pro Sekunde unter realistischen Betriebsbedingungen. Konkrete Untersuchungen sind nie veröffentlicht worden, aber es wird allgemein angenommen, dass die z/OS I/O Leistung vielleicht um einen Faktor 3 - 10 höher als die I/O Leistung von großen Unix Rechnern wie Superdome und M9000 ist. 17-1 17.1.2 Was definiert ein Unix System ? Unix wurde ursprünglich von Ken Thompson und Dennis Ritchie an den Bell Telephone Laboratories für Rechner der Digital Equipment Corporation (DEC) entwickelt und 1971 erstmalig im praktischen Betrieb eingesetzt. Schon bald entstanden (fast) kompatible Implementierungen für andere Rechner. Aus Bemühungen um einen einheitlichen Unix Standard entstand die Portable Operating System Interface (POSIX).
    [Show full text]
  • The Long Road to 64 Bits
    DOI:10.1145/1435417.1435431 Double, double toil and trouble —Shakespeare, Macbeth, Act 4, Scene 1 BY JOHN MASHEY The Long Road To 64 Bits SHAKESpeare’S WORDS OFTEN cover circumstances beyond his wildest dreams. Toil and trouble accompany major computing transitions, even when people plan ahead. Much of tomorrow’s software will still be driven by decades-old decisions. Past decisions have unanticipated side effects that last decades and can be difficult to undo. ranging from high-level strategies down For example, consider the overly to programming specifics. long, often awkward, and sometimes contentious process by which 32-bit Fundamental Problem (late 1980s) microprocessor systems evolved into Running out of address space is a long 64/32-bitters needed to address larger tradition in computing, and often quite storage and run mixtures of 32- and 64- predictable. Moore’s Law grew DRAM bit user programs. Most major general- approximately four times bigger every purpose CPUs now have such versions, three to four years, and by the mid- so bits have “doubled,” but “toil and 1990s, people were able to afford 2GB trouble” are not over, especially in soft- to 4GB of memory for midrange micro- ware. processor systems, at which point sim- This example illustrates the interac- ple 32-bit addressing (4GB) would get tions of hardware, languages (especial- awkward. Ideally, 64/32-bit CPUs would ly C), operating system, applications, have started shipping early enough standards, installed-base inertia, and (1992) to have made up the majority of industry politics. We can draw lessons the relevant installed base before they Chronology: Multiple E K Interlocking RANS IBM S/360 F EN 32-bit, with 24-bit B Threads addressing (16MB total) BY H P of real (core) memory HOTOGRA P 1964 1965 JANUary 2009 | VOL.
    [Show full text]
  • Validated Products List: Programming Languages, Database Language
    NISTIR 469 (Supersedes NISTIR 4623) VALIDATED PRODUCTS LIST 1991 No. 4 Programming Languages Database Language SQL Graphics ®OSIP Judy B. Kailey POSIX Editor U.S. DEPARTMENT OF COMMERCE National Institute of Standards and Technology Computer Systems Laboratory Software Standards Validation Group Gaithersburg, MD 20899 October 1991 (Supersedes July 1991 issue) U.S. DEPARTMENT OF COMMERCE Robert A. Mosbacher, Secretary NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY John W. Lyons, Director — QC 100 .U56 NIST //4690 1991 V C.2 NISTIR 4690 (Supersedes NISTIR 4623) - ' J JF VALIDATED PRODUCTS LIST 1991 No. 4 Programming Languages Database Langucige SQL Graphics GOSIP Judy B. Kailey POSIX Editor U.S. DEPARTMENT OF COMMERCE National Institute of Standards and Technology Computer Systems Laboratory Software Standards Validation Group Gaithersburg, MD 20899 October 1991 (Supersedes July 1991 issue) U.S. DEPARTMENT OF COMMERCE Robert A. Mosbacher, Secretary NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY John W. Lyons, Director FOREWORD The Validated Products List (formerly called the Validated Processor List) is a collection of registers describing implementations of Federal Information Processing Standards (FIPS) that have been tested for conformance to FIPS. The Validated Products List also contains information about the organizations, test methods and procedures that support the validation programs for the FIPS identified in this document. The Validated Products List is updated quarterly. TABLE OF CONTENTS 1. INTRODUCTION 1-1 1.1 Purpose 1-1 1.2 Document Organization 1-1 1.2.1 Programming Languages 1-1 1.2.2 Database Language SQL 1-2 1.2.3 Graphics 1-2 1.2.4 GOSIP 1-2 1.2.5 POSIX 1-2 1.2.6 FIPS Conformance Testing Products 1-2 2.
    [Show full text]
  • Amdahl 580 Series
    70C-Q.Ht.tM-'l" Computers Amdahl 580 Series MANAGEMENT SUMMARY Amdahl Corporation's 5890 Series is posi­ UPDATE: As a manufacturer of IBM plug-compatible tioned as a price/performance alternative to products, Amdahl has scaled profitable peaks andfallen into the IBM 3090 Series. The older Amdahl 580 some less than profitable valleys. At the moment, Amdahl is models are now in "limited new produc­ perched on another peak. The volume shipment ofAmdahl tion," according to Amdahl. 5890-300 mainframes, which compete against the IBM 3090, in addition to the sale ofdouble-capacity 6380E disks MODELS: 5840, 5850, 5860, 5867, 5868, made 1986 a financially satisfying year for Amdahl, to say 5870, 5880, and 5890-190E, -200E, the least. After coming off a very profitable 1986, Amdahl -300E, -400E, and -600E. responded to IBM's January 3090 liE" model announce­ CONFIGURATION: One, two, three, or four ments with the February introduction of a new three-way CPUs, up to 512MB of main memory, and up 5890-400E processor and the announcement ofperformance to 128 I/O channels. enhancements to existing 5890 models. Similar to IBM, COMPETITION: IBM 4381, IBM 308X, Amdahl also appended an liE" to the end ofeach ofits new IBM 3090, NAS AS/XL Series. and existing 5890 IBM-compatible machines. In January, PRICE: Prices range from $1,270,000 to Amdahl also announced a new 5890-190 uniprocessor $12,220,000. which has since been upgraded to a 5890.. ']90E. The new Amdahl 5890-190E, the first single-processor offering in the model line, establishes a new 5890 entry point for Amdahl CHARACTERISTICS 580 users contemplating a move to Amdahfs latest main­ frame generation.
    [Show full text]
  • Multithreading the Sunos Kernel
    BeyondMultiprocessing: Multithreadingthe SUnOSKernel t. 4. Fyt4olg S, R. Kleimaq S. Børton,R. Faulkner,A. Shivalingiah, M. Smith,D. Stein,J. Voll, M. Weeks,D. Williams- SunSoft,[nc. ABSTRACT Preparingthe SUnOSiSVR4kernel for today'schallenges: symmetric multiprocessing, multi-th¡eadedapplications, real-time, and multimedia,led to the incorporationof several innovativetechniques. In particular,the kernelwas re-structuredaround threads. Threads are usedfor most asynchronousprocessing, including interrupts. The resultingkernel is fully preemptibleand capableof real-timeresponse. The combinationprovides a robustbase for highly concurrent,responsive operation. Introduction having only a small data structure and a stack. Switchingbetween When we started to investigateenhancements kernelthreads does not requirea changeof virtual memory to the SunOSkernel to supportmultiprocessors, we addressspace information, so it is relatively realized that we wanted to go further than merely inexpensive.Kernel threadsare fully preemptible addinglocks to the kernel and keepingthe userpro- and may be scheduledby any of the scheduling cessmodel unchanged.It was importantfor the ker- classesin the system,including the real-time(fixed priority) nel to be capableof a high degreeof concurrencyon class. Sinceall other exe- cution entities tightly coupled symmetricmultiprocessors, but it are built using kernel th¡eads,they representa fully preemptible, was also a goal to supportmore thanone threadof real-time"nucleus" within the kernel. controlwithin a userprocess. These threads must be capableof executingsystem calls and handlingpage Kernel th¡eads use synchronizationprimitives faults independently. On multiprocessorsystems, that supportprotocols for preventingpriority inver- theseth¡eads of control must be capableof running sion, so a thread'spriority is determinedby which concurently on different processors.[Powell 1991] activitiesit is impedingby holdinglocks as well as describedthe user-visiblethread architecture.
    [Show full text]
  • Unix System Services
    Betriebssysteme it-Akademie Bayern z/OS und OS/390 Lehrgang 2009 Prof. Dr.-Ing. Wilhelm G. Spruth Teil 12 z/OS Unix System Services bs 1001 ww6 © copyright W. G. Spruth, 10-2000 wgs 03-95 Unix Welche Betriebssysteme findet man in der Praxis ? • Windows, verschiedene Varianten • Unix, verschiedene Varianten • i-Series OS/400 • zSeries Betriebssysteme – z/OS, zVM, zVSE, TPF Welche wesentlichen Unix Varianten existieren ? • HP/UX • SunSolaris • IBM AIX • Siemens Sinix • MacOS (BSD) • Linux, einschließlich zLinux • z/OS Unix System Services Literatur OS/390 Unix System Services. IBM Form No. SC28- 1891-8 Jürgen Gulbins: “Unix”. Springer Verlag , 3. Auflage, 1988. ISBN 3-540-19248-4 Gutes Handbuch, um mit den einzelnen Unix Shell befehlen zu arbeiten. History of Unix Operating Systems z/OS vs. Unix OS/390 mehrere 1000 E/A Operationen / s Unix mehrere 100 E/A Operationen / s Native Unix Betriebssysteme für S/390 Amdahl UTS (Universal Time Sharing System) Marktführer, < 300 Installationen Hitachi HI-OSF/1-M IBM AIX/ESA (nicht mehr verfügbar) z/OS Unix System Services früher als Open Edition MVS (OMVS) bezeichnet 1100 Unix API´s es 0519z ww6 wgs 09-99 The work on Portable Operating Systems Interface (Posix) started out as an effort to standardize UNIX and was performed by a work group under IEEE (Institute of Electrical and Electronic Engineers). What they defined was an application programming interface which could be applied not only to UNIX systems but to other operating systems, like OS/390. Posix is now a set of standards that define common interfaces across operating systems.
    [Show full text]
  • AUUGN Volume 11, Number 3 June 1990
    AUUGN Volume 11, Number 3 June 1990 The Australian UNIX* systems User Group Newsletter Volume 11 Number 3 June 1990 CONTENTS AUUG General Information .......................... 3 Editorial ................................ 4 AUUG Institutional Members ........................ 6 Letters tothe Editor ................. ACSnet Survey .......................... 10 SESSPOOLE Information ...................... 13 Call For Papers: AFUU Convention UNIX ’91 .............. 14 AUUG Book Club - Reviews & Order Form ............... 17 Perth Summer’90 Technical Meeting Report ................ 23 Using UNIX as a Persistent Programming Environment (From Summer’90 Victoria) . 25 UNIX System V Release 4 and OSF/1 (From Summer’90 Sydney) ....... 30 Optimizing The B5FS File System .................... 38 Open Buzzwords And NPA’s .................. 46 Bulgeria In Turmoil ......................... 48 USENIX Association News For AUUG Members ............. 5O AUUGN Back Issues ........................ 54 WAUG Information ................. ¯ . 55 AUUG Membership Information .................. 56 AUUG Forms .......................... 57 AUUGN 1 Vol 11 No 3 Copyright © 1990 AUUG Incorporated. All rights reserved. AUUGN is the journal of the Australian UNIX1 systems User Group (AUUG Incorporated). Copying without fee is permitted provided that copies are made without modification, and are not made or distributed for commercial advantage. Credit to AUUGN and the author must be given. Abstracting with credit is permitted. No other reproduction is permitted without prior consent of AUUG Incorporated. 1 UNIX is a registered trademark of AT&T in the USA and other countries. Vol 11 No 3 2 AUUGN AUUG General Information Memberships and Subscriptions Membership, Change of Address, and Subscription forms can be found at the end of this issue. All correspondence concerning membership of the AUUG should be addressed to:- The AUUG Membership Secretary P.O. Box 366 Phone: (02) 361 5994 Kensington, N.S.W.
    [Show full text]
  • Kermit News March 1995 Brazil: Election Day 1994
    Number 6 Kermit News March 1995 Brazil: Election Day 1994 Brazil's October 1994 general election was almost certainly the world's largest and most complex ever. Kermit software played a crucial role. In Rio de Janeiro, ballots are transcribed to PCs for transmission to the tabulating center by MS-DOS Kermit. Article on page 19. Kermit News Number 6, March 1995 CONTENTS Editor's Notes . 1 New Releases MS-DOS Kermit 3.14 . 3 and BBSs . 4 and Business Communication . 5 C-Kermit 5A(190) . 6 for UNIX . 6 for VMS . 7 for OS/2 . 7 for Stratus VOS . 10 IBM Mainframe Kermit-370 4.3.1 . 11 Digital PDP-11 Kermit-11 3.62-8 . 11 Other New Kermit Releases . 11 New Features File Transfer Recovery . 12 Auto-Upload, Auto-Download, Auto-Anything . 12 Character Sets: Circumnavigating the Web with MS-DOS Kermit . 15 People and Places Cover Story: Kermit in the Brazilian Elections. 19 Kermit Helps Automate Mail Delivery . 23 Kermit and Market Research in the UK . 24 Computer Access for Persons with Print-Handicaps . 25 Down to Business Ordering Information . 28 Kermit Version List . 29 Order Form . 31 Kermit News (ISSN 0899-9309) is published periodically free of charge by Kermit Development and Distribution, Columbia University Academic Information Systems, 612 West 115th Street, New York, NY 10025, USA. Contributed articles are welcome. Editor: Christine M. Gianone E-Mail: cmg@ columbia.edu Copyright 1995, Trustees of Columbia University in the City of New York. Material in Kermit News may be quoted or reproduced in other publications without permis- sion, but with proper attribution.
    [Show full text]