Network Working Group J. Reynolds Request for Comments: 1700 J

Total Page:16

File Type:pdf, Size:1020Kb

Network Working Group J. Reynolds Request for Comments: 1700 J Network Working Group J. Reynolds Request for Comments: 1700 J. Postel STD: 2 ISI Obsoletes RFCs: 1340, 1060, 1010, 990, 960, October 1994 943, 923, 900, 870, 820, 790, 776, 770, 762, 758,755, 750, 739, 604, 503, 433, 349 Obsoletes IENs: 127, 117, 93 Category: Standards Track ASSIGNED NUMBERS Status of this Memo This memo is a status report on the parameters (i.e., numbers and keywords) used in protocols in the Internet community. Distribution of this memo is unlimited. OVERVIEW This RFC is a snapshot of the ongoing process of the assignment of protocol parameters for the Internet protocol suite. To make the current information readily available the assignments are kept up-to- date in a set of online text files. This RFC has been assembled by catinating these files together with a minimum of formatting "glue". The authors appologize for the somewhat rougher formatting and style than is typical of most RFCs. We expect that various readers will notice specific items that should be corrected. Please send any specific corrections via email to <[email protected]>. Reynolds & Postel [Page 1] RFC 1700 Assigned Numbers October 1994 INTRODUCTION The files in this directory document the currently assigned values for several series of numbers used in network protocol implementations. ftp://ftp.isi.edu/in-notes/iana/assignments The Internet Assigned Numbers Authority (IANA) is the central coordinator for the assignment of unique parameter values for Internet protocols. The IANA is chartered by the Internet Society (ISOC) and the Federal Network Council (FNC) to act as the clearinghouse to assign and coordinate the use of numerous Internet protocol parameters. The Internet protocol suite, as defined by the Internet Engineering Task Force (IETF) and its steering group (the IESG), contains numerous parameters, such as internet addresses, domain names, autonomous system numbers (used in some routing protocols), protocol numbers, port numbers, management information base object identifiers, including private enterprise numbers, and many others. The common use of the Internet protocols by the Internet community requires that the particular values used in these parameter fields be assigned uniquely. It is the task of the IANA to make those unique assignments as requested and to maintain a registry of the currently assigned values. Requests for parameter assignments (protocols, ports, etc.) should be sent to <[email protected]>. Requests for SNMP network management private enterprise number assignments should be sent to <[email protected]>. The IANA is located at and operated by the Information Sciences Institute (ISI) of the University of Southern California (USC). If you are developing a protocol or application that will require the use of a link, socket, port, protocol, etc., please contact the IANA to receive a number assignment. Joyce K. Reynolds Internet Assigned Numbers Authority USC - Information Sciences Institute 4676 Admiralty Way Marina del Rey, California 90292-6695 Electronic mail: [email protected] Phone: +1 310-822-1511 Reynolds & Postel [Page 2] RFC 1700 Assigned Numbers October 1994 Most of the protocols are documented in the RFC series of notes. Some of the items listed are undocumented. Further information on protocols can be found in the memo, "Internet Official Protocol Standards" (STD 1). Data Notations The convention in the documentation of Internet Protocols is to express numbers in decimal and to picture data in "big-endian" order [COHEN]. That is, fields are described left to right, with the most significant octet on the left and the least significant octet on the right. The order of transmission of the header and data described in this document is resolved to the octet level. Whenever a diagram shows a group of octets, the order of transmission of those octets is the normal order in which they are read in English. For example, in the following diagram the octets are transmitted in the order they are numbered. 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | 1 | 2 | 3 | 4 | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | 5 | 6 | 7 | 8 | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | 9 | 10 | 11 | 12 | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Transmission Order of Bytes Whenever an octet represents a numeric quantity the left most bit in the diagram is the high order or most significant bit. That is, the bit labeled 0 is the most significant bit. For example, the following diagram represents the value 170 (decimal). 0 1 2 3 4 5 6 7 +-+-+-+-+-+-+-+-+ |1 0 1 0 1 0 1 0| +-+-+-+-+-+-+-+-+ Significance of Bits Similarly, whenever a multi-octet field represents a numeric quantity the left most bit of the whole field is the most significant bit. When Reynolds & Postel [Page 3] RFC 1700 Assigned Numbers October 1994 a multi-octet quantity is transmitted the most significant octet is transmitted first. Special Addresses There are five classes of IP addresses: Class A through Class E. Of these, Classes A, B, and C are used for unicast addresses, Class D is used for multicast addresses, and Class E addresses are reserved for future use. With the advent of classless addressing [CIDR1, CIDR2], the network-number part of an address may be of any length, and the whole notion of address classes becomes less important. There are certain special cases for IP addresses. These special cases can be concisely summarized using the earlier notation for an IP address: IP-address ::= { <Network-number>, <Host-number> } or IP-address ::= { <Network-number>, <Subnet-number>, <Host-number> } if we also use the notation "-1" to mean the field contains all 1 bits. Some common special cases are as follows: (a) {0, 0} This host on this network. Can only be used as a source address (see note later). (b) {0, <Host-number>} Specified host on this network. Can only be used as a source address. (c) { -1, -1} Limited broadcast. Can only be used as a destination address, and a datagram with this address must never be forwarded outside the (sub-)net of the source. (d) {<Network-number>, -1} Directed broadcast to specified network. Can only be used as a destination address. Reynolds & Postel [Page 4] RFC 1700 Assigned Numbers October 1994 (e) {<Network-number>, <Subnet-number>, -1} Directed broadcast to specified subnet. Can only be used as a destination address. (f) {<Network-number>, -1, -1} Directed broadcast to all subnets of specified subnetted network. Can only be used as a destination address. (g) {127, <any>} Internal host loopback address. Should never appear outside a host. REFERENCES [COHEN] Cohen, D., "On Holy Wars and a Plea for Peace", IEEE Computer Magazine, October 1981. [CIDR1] Fuller, V., T. Li, J. Yu, and K. Varadhan, "Classless Inter-Domain Routing (CIDR): an Address Assignment and Aggregation Strategy", RFC 1519, September 1993. [CIDR2] Rekhter, Y., and T. Li, "An Architecture for IP Address Allocation with CIDR", RFC 1518, September 1993. [] URL = ftp://ftp.isi.edu/in-notes/iana/assignments/introduction Reynolds & Postel [Page 5] RFC 1700 Assigned Numbers October 1994 VERSION NUMBERS In the Internet Protocol (IP) [RFC791] there is a field to identify the version of the internetwork general protocol. This field is 4 bits in size. Assigned Internet Version Numbers Decimal Keyword Version References ------- ------- ------- ---------- 0 Reserved [JBP] 1-3 Unassigned [JBP] 4 IP Internet Protocol [RFC791,JBP] 5 ST ST Datagram Mode [RFC1190,JWF] 6 SIP Simple Internet Protocol [RH6] 7 TP/IX TP/IX: The Next Internet [RXU] 8 PIP The P Internet Protocol [PXF] 9 TUBA TUBA [RXC] 10-14 Unassigned [JBP] 15 Reserved [JBP] REFERENCES [RFC791] Postel, J., ed., "Internet Protocol - DARPA Internet Program Protocol Specification", STD 5, RFC 791, USC/Information Sciences Institute, September 1981. [RFC1190] Topolcic, C., Editor, "Experimental Internet Stream Protocol, Version 2 (ST-II)", RFC 1190, CIP Working Group, October 1990. PEOPLE [JPB] Jon Postel <[email protected]> [JWF] Jim Forgie <[email protected]> [RH6] Robert Hinden <[email protected]> [RXU] Robert Ullmann <[email protected]> [PXF] Paul Francis <[email protected]> [RXC] Ross Callon <[email protected]> [] Reynolds & Postel [Page 6] RFC 1700 Assigned Numbers October 1994 URL = ftp://ftp.isi.edu/in-notes/iana/assignments/version-numbers Reynolds & Postel [Page 7] RFC 1700 Assigned Numbers October 1994 PROTOCOL NUMBERS In the Internet Protocol (IP) [DDN], [RFC791] there is a field, called Protocol, to identify the next level protocol. This is an 8 bit field. Assigned Internet Protocol Numbers Decimal Keyword Protocol References ------- ------- -------- ---------- 0 Reserved [JBP] 1 ICMP Internet Control Message [RFC792,JBP] 2 IGMP Internet Group Management [RFC1112,JBP] 3 GGP Gateway-to-Gateway [RFC823,MB] 4 IP IP in IP (encasulation) [JBP] 5 ST Stream [RFC1190,IEN119,JWF] 6 TCP Transmission Control [RFC793,JBP] 7 UCL UCL [PK] 8 EGP Exterior Gateway Protocol [RFC888,DLM1] 9 IGP any private interior gateway [JBP] 10 BBN-RCC-MON BBN RCC Monitoring [SGC] 11 NVP-II Network Voice Protocol [RFC741,SC3] 12 PUP PUP [PUP,XEROX] 13 ARGUS ARGUS [RWS4] 14 EMCON EMCON [BN7] 15 XNET Cross Net Debugger [IEN158,JFH2] 16 CHAOS Chaos [NC3] 17 UDP User Datagram [RFC768,JBP] 18 MUX Multiplexing [IEN90,JBP] 19 DCN-MEAS DCN Measurement Subsystems [DLM1] 20 HMP Host Monitoring [RFC869,RH6] 21 PRM Packet Radio Measurement [ZSU] 22 XNS-IDP XEROX NS IDP [ETHERNET,XEROX] 23
Recommended publications
  • Impactos Sócio-Culturais Da Evolução Dos Jogos Eletrônicos E Ferramentas Comunicacionais: Um Estudo Sobre O Desenvolvimento De Comunidades Virtuais De Jogadores
    Impactos sócio-culturais da evolução dos jogos eletrônicos e ferramentas comunicacionais: um estudo sobre o desenvolvimento de comunidades virtuais de jogadores Lia Carrari Rodrigues Rodrigo A. S. Pereira Lopes Pollyana Notargiacomo Mustaro Universidade Presbiteriana Mackenzie, Dept. Ciência da Computação, Brasil Abstract Neste sentido, será realizada uma análise do futuro This work studies the evolutionary process of das comunidades virtuais de jogos em relação às novas electronic games, virtual communities and ferramentas comunicacionais proporcionadas pelo communicational tools and their impact on social avanço tecnológico. interaction and culture. Additionally, an analysis is presented about different types of metacommunication 2. História dos Jogos Eletrônicos developed in the communities formed by online games. Finally a conclusion is presented towards the future of Os jogos fazem parte da história da evolução humana, those communities and the new communicational tools constituindo uma parte fundamental na cultura. provided by technological advancement. Segundo Huizinga [1971], o jogo é primitivo, anterior à cultura, e é parte da vida individual e da sociedade. Keywords: Online games, virtual communities, Portanto, é um processo inerente a esta, e não o communicational tools, metacommunication resultado de uma expressão cultural. Para este autor, o jogo é essencial para a humanidade, parte integrante da Authors’ contact: vida e tem função vital para a sociedade e cultura. {lia.carrari,rodlopes}@gmail.com [email protected] Entre as características mais significativas dos jogos está o "fazer de conta". Presente em todos os 1. Introdução jogos eletrônicos, ele auxiliou a revolucionar o mundo do jogo, transformando-o em um ambiente totalmente O desenvolvimento de jogos em versões eletrônicas interativo.
    [Show full text]
  • ADMINISTRATION GUIDE Version 7.2
    GUIDE STORMSHIELD ENDPOINT SECURITY ADMINISTRATION GUIDE Version 7.2 Document last update: June 2, 2021 Reference: ses-en-administration_guide-v7.2 SES - ADMINISTRATION GUIDE - V 7.2 Table of contents Preface 9 Thanks! 9 What is the target audience? 9 Contact 9 1. Use environment 10 1.1 Recommendations on security watch 10 1.2 Recommendations on keys and certificates 10 1.3 Recommendations on algorithms 10 1.4 Recommendations on administrators 10 1.5 Recommendations on workstations 10 1.6 Recommendations on administration workstations 11 1.7 Certification and qualification environment 11 2. Stormshield Endpoint Security Overview 12 2.1 Concepts 12 2.1.1 Concept 1: Integrated security 12 2.1.2 Concept 2: Proactive protection 12 2.1.3 Concept 3: Adaptive control 13 2.1.4 Concept 4: Flexible policy control 13 2.1.5 Concept 5: Application of policies based on the organization's directory 13 2.1.6 Concept 6: Information feedback 13 2.1.7 Concept 7: Data encryption 13 2.2 Protection mechanisms 13 2.2.1 Rule-based protection 14 2.2.2 Automatic protections 14 2.3 Architecture 15 2.3.1 Concepts 15 2.3.2 Stormshield Endpoint Security components 15 2.4 Packages and licenses 18 2.4.1 Packages 18 2.4.2 Licenses 21 3. Stormshield Endpoint Security Installation and Uninstallation 24 3.1 Downloading the Stormshield Endpoint Security software 24 3.1.1 Downloading from the client area 24 3.1.2 Checking software authenticity 24 3.2 System prerequisites for Stormshield Endpoint Security under Windows 25 3.2.1 Active Directory prerequisites 25 3.2.2 Stormshield
    [Show full text]
  • Amigaos 3.2 FAQ 47.1 (09.04.2021) English
    $VER: AmigaOS 3.2 FAQ 47.1 (09.04.2021) English Please note: This file contains a list of frequently asked questions along with answers, sorted by topics. Before trying to contact support, please read through this FAQ to determine whether or not it answers your question(s). Whilst this FAQ is focused on AmigaOS 3.2, it contains information regarding previous AmigaOS versions. Index of topics covered in this FAQ: 1. Installation 1.1 * What are the minimum hardware requirements for AmigaOS 3.2? 1.2 * Why won't AmigaOS 3.2 boot with 512 KB of RAM? 1.3 * Ok, I get it; 512 KB is not enough anymore, but can I get my way with less than 2 MB of RAM? 1.4 * How can I verify whether I correctly installed AmigaOS 3.2? 1.5 * Do you have any tips that can help me with 3.2 using my current hardware and software combination? 1.6 * The Help subsystem fails, it seems it is not available anymore. What happened? 1.7 * What are GlowIcons? Should I choose to install them? 1.8 * How can I verify the integrity of my AmigaOS 3.2 CD-ROM? 1.9 * My Greek/Russian/Polish/Turkish fonts are not being properly displayed. How can I fix this? 1.10 * When I boot from my AmigaOS 3.2 CD-ROM, I am being welcomed to the "AmigaOS Preinstallation Environment". What does this mean? 1.11 * What is the optimal ADF images/floppy disk ordering for a full AmigaOS 3.2 installation? 1.12 * LoadModule fails for some unknown reason when trying to update my ROM modules.
    [Show full text]
  • Wirtschaft Der Verschwendung Die Biologie Der Allmende
    Wirtschaft der Verschwendung Die Biologie der Allmende Andreas Weber Öko-logisch: Die wahre Ökonomie der Biosphäre Es gibt eine seit Milliarden von Jahren erfolgreiche Allmendewirtschaft: die Biosphäre. Deren Öko- logie ist jener irdische Haushalt von Energie, Stoffen, Wesen, Beziehungen und Bedeutungen, der die menschengemachte Öko-nomie enthält und erst ermöglicht. Licht, Sauerstoff, Trinkwasser, Klima, Boden, Energie versorgen auch den Homo oeconomicus der Gegenwart, der sich nach wie vor von Erzeugnissen der Biosphäre ernährt. Die Natur ist das gemeinwirtschaftliche Paradigma par excellence. Damit meine ich nicht nur, dass der Mensch mit den übrigen Wesen während einer überwältigenden Zeitspanne nach den Standards einer Commons-Wirtschaft zusammenlebte. Ich bin vielmehr überzeugt, dass die Beziehungen innerhalb der Biosphäre nach Allmendegesichtspunkten verlaufen. Darum kann uns die Natur eine schlagkräftige Methodologie für die Allmende als eine neue natürliche und soziale Ökologie liefern. Eine solche »existentielle Ökologie der Allmende« soll hier skizziert werden. Wirtschaftsliberalismus als heimliche Metaphysik des Lebens Aber von welcher Natur ist die Rede? Um den Haushalt der Lebewesen ohne die Lasten der liberalistischen Ökonomie bzw. Natur-Metaphorik zu betrachten, ist es zunächst nötig, Öko-logie und Öko-nomie des natürlichen Haushaltens neu zu verstehen. Wir können dabei in der Natur eine Entfaltungsgeschichte der Freiheit erkennen, zu der hin sich autonome Subjekte in gegenseitiger Abhängigkeit entwickeln. Diese Auffassung steht freilich im Gegensatz zum gängigen Bild des Lebens und Stoffaustausches in Biologie und Wirtschaftslehre. Wenige Modelle der Wirklichkeit waren in den letzten 200 Jahren so eng miteinander verschwistert wie die Theorie der Natur und die Theorie unseres Haushaltens. Beide Disziplinen fanden ihre heutige Form im viktorianischen England, beide prägten die entscheidenden Metaphern der jeweils anderen.
    [Show full text]
  • Final Version of Thesis
    JAPANESE INNOVATION STRATEGY AND THE ACQUISITION OF UK INFORMATION TECHNOLOGY FIRMS T H W Minshall Christ’s College, Cambridge A dissertation submitted to the University of Cambridge for the Degree of Doctor of Philosophy Cambridge University Engineering Department April 1997 Preface Except for commonly understood and accepted ideas, or where specific reference is made, the work reported in this dissertation is my own and includes nothing which is the outcome of work done in collaboration. No part of the dissertation has been previously submitted to any university for any degree, diploma or other qualification. T H W Minshall Cambridge April 1997 Acknowledgements I am particularly grateful to my supervisor, Elizabeth Garnsey, for her guidance and support throughout the course of this research. In addition, thanks are due to Nick Oliver and Hugh Whittaker, and all my colleagues at the Manufacturing and Management Division of the Engineering Department, and at the Judge Institute of Management Studies for their advice and constructive criticism. On the industry side, my gratitude to the companies in the UK and Japan who agreed to contribute to the contents of this dissertation. Finally, my thanks to my family, for encouraging me, and to Nicola, for all her support and for applying her new-found skills at proof-reading. This programme of research was supported by a Postgraduate Training Award (J00 429 332012) from the ESRC. Table of contents Chapter 1 Introduction ...........................................................................................................
    [Show full text]
  • Ÿþa G 0 8 E N
    Amiga - for people on the move #amigaISSUE 1 - 2009 - VOLUME 3 guide - News - Scene: Useless of Spaceballs - AROS / MOS / AmigaOS news Photo: Freefoto.com Printed with permission .info Amiga websites AmigaWeb.net http://amigaweb.net Amigaworld.net http://amigaworld.net Over: «Amiga OS 3.5 includes an html v3 capable web browser called AwebII. It has the very advanced feature of being optional - a feature so advanced that Microsoft has as of yet been unable to completely Amigans.net replicate it.» | Under: Screenshot from AmigaOS4.1 http://amigans.net Amiga.org http://amiga.org polarboing http://polarboing.com #amiga guide magazine wants to thank: #amiga guide magazine wants to thank: Radio Reboot http://jm-as.no http://radioreboot.net 3 - ReadMe.First - What’s the point? frowned, until you almost believe Can you swim upstreams all the what they tell you: «Your dreams time? Does fish feel ok with won’t come true! Give up!» We 2 Adverticement AmigaOS4.0 classic swimming upstreams all the should listen to them? We all time? Do you always fight the should buy us a PC with bravest against good resistance? Windows or a Mac with MacOS 4 ReadMeFirst - Editorial Is a windy road the one that or a Linux computer with BSD or gives the most strength? X and slip into the grey masses of mainstream computer users? Disk.info - news No. 5 No! You need some luck from day to day, and not just always Because it is the grey eminence Useless of Spaceballs resistance. Of course I am now that is the loosing part in a future - Music and computers is a good combination, thinking of our beloved computer not too far away.
    [Show full text]
  • Janusz S. Bień Kodowanie Tekstów Polskich W Systemach Komputerowych
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Biblioteka Cyfrowa KLF UW (Digital Library of the Formal... Multimedia w nauczaniu jêzyka rodzimego jako obcego Janusz S. Bieñ Kodowanie tekstów polskich w systemach komputerowych 1. Wstęp W niniejszym artykule przedstawiono podstawowe pojęcia kodowania tekstów oraz omówiono wszystkie aktualnie obowiązujące polskie normy dotyczące tej problematyki, a także najważniejsze standardy międzynaro- dowe. 2. Podstawowe pojęcia kodowania tekstów 2.1. Klasyfikacja tekstów Pojęcie tekstu traktujemy jako pierwotne, którego nie będziemy tutaj definiować, wyróżnimy natomiast dwa podstawowe typy tekstów: „teksty fizyczne” i „teksty elektroniczne”. Za charakterystyczną cechę tekstów elek- tronicznych uznajemy fakt, że nie zmieniają one swojej tożsamości przy zmianie ich nośnika fizycznego: ten sam tekst elektroniczny może być zapi- sany na dyskietce, twardym dysku komputera lub na płycie CD-ROM i mimo to pozostaje tym samym tekstem. Tymczasem w przypadku tekstów fizycz- nych każde skopiowanie, bez względu na zastosowaną technikę, wprowadza mniejsze lub większe zmiany i zniekształcenia – w rezultacie po wielo- krotnym kopiowaniu tekst może np. znacznie zmniejszyć swoją czytelność. Teksty fizyczne dzielimy m.in. na: — teksty mówione, — teksty pisane ręcznie, — teksty drukowane. 4 POSTSCRIPTUM 27-29 Do wykazu tego można dołączyć teksty gestykulowane, stosowane przez głuchoniemych. Zasadniczym jednak powodem przedstawienia tego podziału jest podkreślenie istotnej różnicy między tekstami pisanymi ręcznie a tekstami drukowanymi – co widać wyraźnie np. przy wprowa- dzaniu tekstu do komputera za pomocą optycznego rozpoznawania zna- ków (ang. Optical Character Recognition, OCR); są one przez wielu lingwistów zbyt pochopnie traktowane łącznie jako jednorodna klasa tekstów pisanych. Niektóre teksty elektroniczne są po prostu mniej lub bardziej wiernym zapisem pewnych tekstów fizycznych – możemy mówić wtedy o tekście pierwotnym (fizycznym) i wtórnym (elektronicznym).
    [Show full text]
  • Free Software in Latin America Cesar Brod [email protected]
    Free Software in Latin America Cesar Brod [email protected] Version 1.1 January 23, 2003 Free Software in Latin America page 1 of 25 Revision History Version Date Comments Author First public available version before proof-reading. Draft 1 06.11.2002 Cesar Brod Expect some errors. Draft 2 10.11.2002 Text review, proof reading Cesar Brod Added text on the First National Free Software Forum for Universities in Brasil (São Carlos) V 1.0 19.11.2002 Cesar Brod Added text on São Carlos city project for free software adoption – page 12 Consolidation of several research data on the overall ICT usage in Latin America V 1.1 22.01.2003 Cesar Brod Overall review Free Software in Latin America page 2 of 25 Table of Contents Revision History...................................................................................................................................2 Acknowledgements..............................................................................................................................4 Executive Summary..............................................................................................................................5 The ICT presence in Latin America.....................................................................................................8 An overview of the presence of Free Software17 in Latin American Countries.................................13 Free Software in Mexico....................................................................................................................14 GNOME.........................................................................................................................................14
    [Show full text]
  • Cisco IOS Appletalk Configuration Guide Release 12.4
    Cisco IOS AppleTalk Configuration Guide Release 12.4 Corporate Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 526-4100 Customer Order Number: DOC-7817505= Text Part Number: 78-17505-01 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
    [Show full text]
  • Deliverable Report D6 SELF Platform Development: Localised and Tested System
    Project no. 034595 SELF Science, Education and Learning in Freedom Instrument: SSA - Specific Support Action Thematic Priority: IST-2005-2.5.5 ± Software and Services Deliverable Report D6 SELF Platform Development: localised and tested system Period covered: Due date: April 30th, 2008 from July 1st, 2006 to July 31st, 2008 Date of first submission: April 29th, 2008 Revision date: September 18th, 2008 Start date of project: Duration: July 1st, 2006 2 years Organisation name of lead contractor for this IR Homi Bhabha Center for Science Education Revision version 1.0 Dr. Nagarjuna G. Project co-funded by the European Commission within the Sixth Framework Programme (2002-2006) Dissemination Level PU Public PU PP Restricted to other programme participants (including the Commission Services) RE Restricted to a group specified by the consortium (including the Commission Services) CO Confidential, only for members of the consortium (including the Commission Services) Table of Contents Acknowledgements ......................................................................................................................... 3 1 Introduction .................................................................................................................................. 4 2 Roadmap and Development Methodology ................................................................................... 5 3 Setting up the Server Infrastructure .............................................................................................. 6 3.1 Technical specifications
    [Show full text]
  • Amiga®600 Computer
    C O M M O D O R E PERSONAL AMIGA®600 COMPUTER The Amiga 600 is an advanced a powerful, low-cost computer for and powerful personal computer in a courseware delivery, business AMIGA 600 FEATURES newly designed compact low-profile presentations and point of case. information displays. • Compact low-profile design Incorporating the unique features With sensational Amiga graphics • External PCMCIA expansion connector of the Amiga family of computers, the and animation capabilities, video • AmigaDOS"' Release 2 software in ROM Amiga 600 offers a Motorola® 68000 enthusiasts will find the Amiga 600 to microprocessor along with sophisti­ be a capable and inexpensive • Color composite, RF Modulated and RGB cated custom processors for production assistant. Video Output enhanced computing speed and versatility. The Amiga 600 is compatible with a wide range of standard The Amiga multitasking operating peripheral devices such as printers, STANDARD AMIGA FEATURES system allows users toJntegrate text, modems and disk drives. The~newly Features integrated into the system architecture graphics and sound and reaches new added PCMCIA industry standard and supported by the system software levels of affordable excellence in slot can provide additional storage on home and professional multimedia removable credit card size modules. • Advanced Custom Processors for DMA, computing. Video, Graphics, Sound and VO Control With an easy to use point and And with the ability to connect to click interface and quick connection • NTSC Video Horizontal Scan Rate Compatibility a variety of video display devices the to a display device even computer Amiga 600 is a great choice as an novices can be up and running with a • Multitasking Operating System entry level system for home minimum of effort.
    [Show full text]
  • Local Infrastructures for School Networking: Current Models and Prospects
    DOCUMENT RESUME ED 349 957 IR 015 693 AUTHOR Newman, Denis; And Others _TITLE Local Infrastructures for School Networking: Current Models and Prospects. Technical Report No. 22. INSTITUTION Center for Technology in Education, New York, NY. SPONS AGENCY Department of Education, Washington, DC.; National Science Foundation, Washington, D.C. PUB DATE May 92 CONTRACT 1-135562167-Al; MDR-9154006 NOTE 30p. PUB TYPE Information Analyses (070) Viewpoints (Opinion/Position Papers, Essays, etc.) (120) EDRS PRICE MF01/PCO" Plus Postage. DESCRIPTORS Communications; Comparative Analysis; *Computer Networks; Educational Change; Educational Technology; Elementary Secondary Education; *Futures (of Society); Information Networks; *Local Area Networks; Microcomputers; *Models; *Telecommunications IDENTIFIERS *Wide Area Networks ABSTRACT This paper identifies a paradigm shift that must take place in school networking. The ultimate goal is to retool the schools with a local technical infrastructure that gives teachersand students immediate access to communication systems andinformation resources, thereby supporting the implementation of advancesin pedagogy and educational technology. The current notionof telecomputing cannot address the information requirements locally within the school and, ultimately, will fragment and inhibit any move toward universal access to information resources. A technologyis needed that combines local and wide area networking(LAN and WAN), making access to remote resources part of the everyday work with school computers. This report contains the following sections: (1) The Problem: Combining Local and Wide Area Communication--facts about the current state of school networks and the dissociation of school LANs and WANs;(2) A Brief History of Network Technology;(3) A Convergence of School LAN's and WAN's--integrating and simplifying a school internetwork;(4) Current Models of School LAN-WAN Connectivity--a comparison of six models; and (5) Prospects for the Future.
    [Show full text]