Internetnews:Ijsenet Transportfor Internetsites Richsalz - Opensoftware Foundation

Total Page:16

File Type:pdf, Size:1020Kb

Internetnews:Ijsenet Transportfor Internetsites Richsalz - Opensoftware Foundation InterNetNews:IJsenet transportfor Internetsites RichSalz - OpenSoftware Foundation ABSTRACT NNTP, the Network News Transfer Protocol, has been labelled the most widely implementedelective protocol in the Internet. The growth of the Internethas meant more sites-exchangingNNTP data. While the explosivegrowth in Usenettraffic placesdemands on all sites,the goal of fast networkaccess puts particulardemands on NNTP hosts. InterNetNewsis an implementationof the Usenettransport layer designedto address this situation. -It replacesthe standardLJNIx server a¡chitecturewith a single long-running serverthat handlesall incomingconnections. It has provento be quite succéssful,þroviding quick and efficientnews transfer. Introduction The Path header is used to prevent message Ioops. Usenetis a distributedbulletin board system, For example,an articlewritten at A could get built as a logical network on top of other networks sent to B, D, C, and then back to A. Before pro- pagating and connections. By design, messagesresemble an article, a site prependsits own name to standardInternet electronic mail messagesas defined the Path header. Before propagatingan article to a site, the receivinghost checksto in RFC822 [CrockerS2]. The Usenetmessage for- make sure that the mat is described in RFC1036 This site that would receivethe article doesnot appearin [Adams87]. the Path definessome additional headers. It also limits the line. For example,when the article arrived at site C, values of some of the standardheaders as well as the Path would containA!B!D, so site C giving someof them specialsemantics. would know not to sendthe article to.A. Sites Newsgroupsare the classificationsystem of alsokeep a recordof the Message-ID'sof all Usenet. The required Newsgroupsheader specifies articles they currently have. If D receives an article where a message,or article, should be frled upon from B, it will reject the article if C offers it reception. Sites are free to cafiy whatevergroups later. For self-protection,most sites keep a record of they want. Most sites carry the core set of so-callèd recent articles that they no longer have. This is very useful "mainstream" groups. There a¡e currently about when anothersite dumpsa (usuallyquite large) 730 of thesegroups, and one or two new-onesis batchof old newsback out to Usenet. createdevery week. For the pastfew years,the amountof data gen- eratedby Messagesgenerated at a site are sent to the Usenetsites has beendoubling every year. site's"neighbors" who processthem and relay them A site that receives all the mainstreamgroups is to their neighbors,and so on. Sites can be intercon- receivingover 77 megabytesa day spreadout over 11,000 nected- indeed,on the Internet,this is quite com- a¡ticles [Adams92]. About 20Voof the data mon. SeeFigure 1. is article headers,and while all of them must be scannedonly half of it is must be processedby the Usenetsoftware.l The numberof sitesparticipating in Usenethas been growing almost as quickly. Basedon articles his site receivesand survey data sent in by partic! pating sites, Brian Reid estimatesthat there are 36,000sites with 1.4 million participants[Reid91]. A "sendsys" messageto the "inet" distributionin June of 1989 receivedabout 200 replies in the first twenty-fourhours. A year later, nearly 700 replies were received. (Sendsysis a specialarticle that asks all receiving sites to send back an email message, usually without human intervention;by convention, inet is primarily the set of siteson the Internet.) Figure 1: Small Usenet topology (all links æe IYes, two-way). this means that, as far as the software is concerned,Usenet is over90Vo noise. '92 Summer USENIX - June 8-JuneL2,lgg2 - SanAntonio, TX 93 InterNetNews... Salz The NNTP protocol is definedin InternetRFC appropriaternews or relaynewsprogram processed it. 977 [Kantor86] publishedin February,L986. This In order to avoid processingan article the system was accompaniedby the generalpublic releaseof a already has, it first does a lookup on the history referenceimplementation, also called "nntp." This databaseto seeif the articleexists. It soonbecame hasbeen the only NNTP implementationthat is gen- apparentthat invoking relaynewsfor every article erallyavailable to uNIx sites. lost all of C News'sspeed gain, so the NNTP pack- age \¡/as changedto write ã set of articles into a UsenetSoftware batch,and offer the batchto relaynews, In addition to InterNetNews,there are two When articles arrive faster then relaynewscan major Usenetpackages available for UND(sites. All processthem, they must be spooled. If two sites (B threeshare several common implementation details. and C in the previousexamples) both offer a third A newsgroupname such as comp.foois mappedto a site (D) the samearticle at the "same time" then an directory comp/foo within a global spool directory. extra copy will be spooled,only to be rejectedwhen An article posted to a group is assigneda unique it is processed,wasting disk space;this problem increasingnumber basedon a file called the active multiplies- as the number of incoming sites file. If an article is postedto multiple groups,links increases./To alleviatethis problem,most sitesrun are usedso that only one copy of the data is kept. Paul Vixie's msgidd, a daemon that keeps a A sys file containspatterns describing what news- memory-residentlist of article Message-ID'soffered groupsthe site wishes to receive,and how articles within the last 24 hours. The NNTP server is shouldbe propagated.In most cases,this meansthat modifledso that it tells this daemonall of the arti- a recordof the article is written to a "batchfile" that cles that it is handingto Usenetand queriesthe dae- is processedoffJine to do the actualsending. mon before telling the remotesite that it needsthe The first Usenetpackage is called B News,also article. This is not a perfect solution - if the first, knownas BZ.tt, The B newsmodel is verv simole: spooled,copy of the article is lost or corrupted,the the programrnews is run to processeach lnconiing site will likely never be offered the article after the article. Locking is usedto make sure that only one msgidd cache entry has expired. Going further, rnews processtries to updatethe active file and his- msgiddis work-aroundfor a probleminherent in the tory database.At one site that receivedover 15,000 currentsoftware architecture. articlesper day, the locking would often fail so that Otherproblems, while not as severe,lead to the 10 to 100 duplicateswere not uncommon.Because conclusionthat a new implementationof Usenetis eacharticle is handledby a separateprocess, it is neededfor Internetsites. For examnle: impossibleto pre-calcuateor cacheany usefuldata. ¡ Since all articles are spooled,reløynews can- More importantly,file VO had becomea major not tell the NNTP serverthe ultimate disoosi- bottleneck.A site that feeds10 othersites does over tion of the article, and the servet cannol þ[ 150,000 open/append/closeoperations on its its peer at the other end of the wire. This batchfiles. It is generallyagreed that B newscannot hides transmissionproblems. For example,a keepup with cunent Usenetvolume; it is no longer site tracingthe communicationhas no way of being maintained,and its authorhas said more then finding out an article was rejectedbecause the oncethat the softwareshould be considered"dead." remotesite doesnot receivethat narticularset of newsgroups. C News gets much better performancethen B . news by processingarticles in batches The NNTP referenceimplementation is show- [CollyerST]. ing signs of Tlre relaynewsprogram is run severaltimes a day to age. Maintaining the server is becoming a maintenancenightmare; processall the articlesthat have beenreceived since over one-tenthof its 6,800lines the last run. Since only one relaynewsprogram is are#ifdef-related. o All articles are written running,it is not necessaryto do fine-grainlocking to disk at extra time. Disks are gettingbigger, of any of the supportingdata files. More impor- but not faster,while CPU's,memory, tantly, it can keep the entire active and sys file in andnetworks are. memory. It can also use buffered VO on its InterNetNewsarchitecture batchfrles,reducing the amount of system calls by one or two ordersof magnitude. There are four key programsin the lnterNet- Newspackage (see Figure 2): An alpha version of C News was releasedin Innd is the principal news server for incoming October, 1,987. Within four years it surpassed B newsfeeds; news in popularity, and there are now more sites runningC News then ever ran B news. - zThis is quite common for Internet sites, where From the beginning, the NNTP reference redundantfast newsfeedsare commonand wheremany implementationwas layered on top of the existing Usenetadministrato$ seem to be avid playersof the Usenetsoftware: an article receivedfrom a remote "exchangenews with asmany other people as possible" NNTP peer was written to a temporaryfile and the game. 94 Summer'92 USEND(- June8-June 12, lgg2 - SanAntonio, TX Salz InterNetNews ... in¡pcmítreads a file identifying articles and offers Until recently, ínramit used writev to send its them to anothersite; datato the remotehost. At start-upit filled a three- ctlìnnd sendscontrol commandsto inndi element struct iovec array with the following ele- nnrpd is an NNT? serveroriented for newsreaders. ments: Of theseprograms, the most importantis innd. t0] { ".", 1 }; We frrst mentionenough of its architectureto give a tll I placeholder!¡ contextfor the other programs,and then discussits t2l { "\r\n" } designand featuresin more detail
Recommended publications
  • Technical and Legal Approaches to Unsolicited Electronic Mail, 35 USFL Rev
    UIC School of Law UIC Law Open Access Repository UIC Law Open Access Faculty Scholarship 1-1-2001 Technical and Legal Approaches to Unsolicited Electronic Mail, 35 U.S.F. L. Rev. 325 (2001) David E. Sorkin John Marshall Law School, [email protected] Follow this and additional works at: https://repository.law.uic.edu/facpubs Part of the Computer Law Commons, Internet Law Commons, Marketing Law Commons, and the Privacy Law Commons Recommended Citation David E. Sorkin, Technical and Legal Approaches to Unsolicited Electronic Mail, 35 U.S.F. L. Rev. 325 (2001). https://repository.law.uic.edu/facpubs/160 This Article is brought to you for free and open access by UIC Law Open Access Repository. It has been accepted for inclusion in UIC Law Open Access Faculty Scholarship by an authorized administrator of UIC Law Open Access Repository. For more information, please contact [email protected]. Technical and Legal Approaches to Unsolicited Electronic Mailt By DAVID E. SORKIN* "Spamming" is truly the scourge of the Information Age. This problem has become so widespread that it has begun to burden our information infrastructure. Entire new networks have had to be constructed to deal with it, when resources would be far better spent on educational or commercial needs. United States Senator Conrad Burns (R-MT)1 UNSOLICITED ELECTRONIC MAIL, also called "spain," 2 causes or contributes to a wide variety of problems for network administrators, t Copyright © 2000 David E. Sorkin. * Assistant Professor of Law, Center for Information Technology and Privacy Law, The John Marshall Law School; Visiting Scholar (1999-2000), Center for Education and Research in Information Assurance and Security (CERIAS), Purdue University.
    [Show full text]
  • Lesson 1 Key-Terms Meanings: Internet Connectivity Principles
    Lesson 1 Key-Terms Meanings: Internet Connectivity Principles Chapter-4 L01: "Internet of Things " , Raj Kamal, 2017 1 Publs.: McGraw-Hill Education Header Words • Header words are placed as per the actions required at succeeding stages during communication from Application layer • Each header word at a layer consists of one or more header fields • The header fields specify the actions as per the protocol used Chapter-4 L01: "Internet of Things " , Raj Kamal, 2017 2 Publs.: McGraw-Hill Education Header fields • Fields specify a set of parameters encoded in a header • Parameters and their encoding as per the protocol used at that layer • For example, fourth word header field for 32-bit Source IP address in network layer using IP Chapter-4 L01: "Internet of Things " , Raj Kamal, 2017 3 Publs.: McGraw-Hill Education Protocol Header Field Example • Header field means bits in a header word placed at appropriate bit place, for example, place between bit 0 and bit 31 when a word has 32-bits. • First word fields b31-b16 for IP packet length in bytes, b15-b4 Service type and precedence and b3-b0 for IP version • Chapter-4 L01: "Internet of Things " , Raj Kamal, 2017 4 Publs.: McGraw-Hill Education IP Header • Header fields consist of parameters and their encodings which are as per the IP protocol • An internet layer protocol at a source or destination in TCP/IP suite of protocols Chapter-4 L01: "Internet of Things " , Raj Kamal, 2017 5 Publs.: McGraw-Hill Education TCP Header • Header fields consist of parameters and their encoding which are as
    [Show full text]
  • Newscache – a High Performance Cache Implementation for Usenet News 
    THE ADVANCED COMPUTING SYSTEMS ASSOCIATION The following paper was originally published in the Proceedings of the USENIX Annual Technical Conference Monterey, California, USA, June 6-11, 1999 NewsCache – A High Performance Cache Implementation for Usenet News _ _ _ Thomas Gschwind and Manfred Hauswirth Technische Universität Wien © 1999 by The USENIX Association All Rights Reserved Rights to individual papers remain with the author or the author's employer. Permission is granted for noncommercial reproduction of the work for educational or research purposes. This copyright notice must be included in the reproduced paper. USENIX acknowledges all trademarks herein. For more information about the USENIX Association: Phone: 1 510 528 8649 FAX: 1 510 548 5738 Email: [email protected] WWW: http://www.usenix.org NewsCache – A High Performance Cache Implementation for Usenet News Thomas Gschwind Manfred Hauswirth g ftom,M.Hauswirth @infosys.tuwien.ac.at Distributed Systems Group Technische Universitat¨ Wien Argentinierstraße 8/E1841 A-1040 Wien, Austria, Europe Abstract and thus provided to its clients are defined by the news server’s administrator. Usenet News is reaching its limits as current traffic strains the available infrastructure. News data volume The world-wide set of cooperating news servers makes increases steadily and competition with other Internet up the distribution infrastructure of the News system. services has intensified. Consequently bandwidth re- Articles are distributed among news servers using the quirements are often beyond that provided by typical Network News Transfer Protocol (NNTP) which is de- links and the processing power needed exceeds a sin- fined in RFC977 [2]. In recent years several exten- gle system’s capabilities.
    [Show full text]
  • Linux Network Administrators Guide
    Chapter 21. C News One of the most popular software packages for Netnews is C News. It was designed for sites that carry news over UUCP links. This chapter will discuss the central concepts of C News, basic installation, and maintenance tasks. C News stores its configuration files in /etc/news, and most of its binaries are kept below the /usr/lib/news/ directory. Articles are kept below /var/spool/news. You should make sure that virtually all files in these directories are owned by user news or group news. Most problems arise from files being inaccessible to C News. Use su to become the user news before you touch anything in the directory. The only exception is the setnewsids command, which is used to set the real user ID of some news programs. It must be owned by root and have the setuid bit set. In this chapter, we describe all C News configuration files in detail and show you what you have to do to keep your site running. Chapter 21. C News 402 21.1. Delivering News Articles can be fed to C News in several ways. When a local user posts an article, the newsreader usually hands it to the inews command, which completes the header information. News from remote sites, be it a single article or a whole batch, is given to the rnews command, which stores it in the /var/spool/news/in.coming directory, from where it will be picked up at a later time by newsrun. With any of these two techniques, however, the article will eventually be handed to the relaynews command.
    [Show full text]
  • A Review of MS-DOS Bulletin Board Software Suitable for Long Distance
    DOCUMENT RESUME ED 353 977 IR 015 940 AUTHOR Sessa, Anneliese TITLE A Review of MS-DOS Bulletin Board Software Sui:able for Long Distance Learning. PUB DATE 89 NOTE 7p.; For a related paper, see IR 015 939. PUB TYPE Information Analyses (070) Viewpoints (Opinion/Position Papers, Essays, etc.)(120) EDRS PRICE MFO1 /PCO1 Plus Postage. DESCRIPTORS 'Computer Networks; *Computer Software; Databases; Distance Education; *Electronic Mail; Online Systems; *Telecommunications IDENTIFIERS *MS DOS; NYCENET ABSTRACT This paper describes the advantages of using computer bulletin boards systems (BBS) for distance learning, including the use of the New York City Education Network (NYCENET) to access various databases and to communica1. with individuals or the public. Questions to be answered in order to determine the most appropriate software for running a BBS are listed; and the following public domain and shareware BBS software packages suitable for setting up a BBS for long distance learning are reviewed: Magpie, QBBS, PC Board, RBBS, and Opus. One commercial program--The Bread Board System (TBBS)--is also considered. A 1992 update of the information presented in this paper is appended. (ALF) *********************************************************************** Reproductions supplied by EDRS are the best that can be made from the original document. *********************************************************************** U.S DEPARTMENT OF FOUCATION Orfice of Educahonal Research and inproernent EDUCATIONAL RESOURCES INFORMATION CENTER IERICI This aoc umeni has oeen ,ecnoau, ea as I ece.ved I,Or- the person or organ catn, ortglnabng CM.otc-haflgesnel.ebetn,a0elc,,,rlo A Review of MS-DOS Bulletin Board Software reproduchondeahly Po.nts of v.e. or of:Pn'OnS Staled do.cu Suitable for Long distance Learning men! do r,01 necessanly epresent nIlor oil Reviewed By Anneliese Sessa (1989) OERI poshon The idea of using a computer for long distance learningis not very new.
    [Show full text]
  • Usenet News HOWTO
    Usenet News HOWTO Shuvam Misra (usenet at starcomsoftware dot com) Revision History Revision 2.1 2002−08−20 Revised by: sm New sections on Security and Software History, lots of other small additions and cleanup Revision 2.0 2002−07−30 Revised by: sm Rewritten by new authors at Starcom Software Revision 1.4 1995−11−29 Revised by: vs Original document; authored by Vince Skahan. Usenet News HOWTO Table of Contents 1. What is the Usenet?........................................................................................................................................1 1.1. Discussion groups.............................................................................................................................1 1.2. How it works, loosely speaking........................................................................................................1 1.3. About sizes, volumes, and so on.......................................................................................................2 2. Principles of Operation...................................................................................................................................4 2.1. Newsgroups and articles...................................................................................................................4 2.2. Of readers and servers.......................................................................................................................6 2.3. Newsfeeds.........................................................................................................................................6
    [Show full text]
  • Recognizing Legal Differences in Computer Bulletin Board Functions Eric Goldman Santa Clara University School of Law, [email protected]
    Santa Clara Law Santa Clara Law Digital Commons Faculty Publications Faculty Scholarship 1-1-1993 Cyberspace, the Free Market and the Free Marketplace of Ideas: Recognizing Legal Differences in Computer Bulletin Board Functions Eric Goldman Santa Clara University School of Law, [email protected] Follow this and additional works at: http://digitalcommons.law.scu.edu/facpubs Part of the Law Commons Recommended Citation 16 Hastings Comm. & Ent. L.J. 87 This Article is brought to you for free and open access by the Faculty Scholarship at Santa Clara Law Digital Commons. It has been accepted for inclusion in Faculty Publications by an authorized administrator of Santa Clara Law Digital Commons. For more information, please contact [email protected]. Cyberspace, the Free Market and the Free Marketplace of Ideas: Recognizing Legal Differences in Computer Bulletin Board Functions by ERIC SCHLACHTER* Table of Contents I. Difficult Issues Resulting from Changing Technologies.. 89 A. The Emergence of BBSs as a Communication M edium ............................................. 91 B. The Need for a Law of Cyberspace ................. 97 C. The Quest for the Appropriate Legal Analogy Applicable to Sysops ................................ 98 II. Breaking Down Computer Bulletin Board Systems Into Their Key Characteristics ................................ 101 A. Who is the Sysop? ......... 101 B. The Sysop's Control ................................. 106 C. BBS Functions ...................................... 107 1. Message Functions ..............................
    [Show full text]
  • Cisco Unified Border Element H.323-To-SIP Internetworking Configuration Guide, Cisco IOS Release 12.4T Iii
    Cisco Unified Border Element H.323-to- SIP Internetworking Configuration Guide, Cisco IOS Release 12.4T Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
    [Show full text]
  • Performance of Linear-Type Mobile Data Transmission
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 10, NO. 8, AUGUST 2011 2451 Performance of Linear-Type Mobile Data Transmission Chen-Yuan Chuang, Yi-Bing Lin, Fellow, IEEE, and Yu-Tien Yeh Abstract—In Next Generation Network (NGN), IP Multimedia Subsystem (IMS) plays an important role to offer IP-based multimedia services. Based on Chunghwa Telecom’s NGN/IMS, we develop linear-type data transmission applications such as Bulletin Board System (BBS) or forum-based websites to deliver new articles to the mobile users. We propose the push-N method that pushes every N articles from the BBS server to the user. When the user actually connects to the BBS, the not-yet-pushed messages are pulled by the user. Our study indicates that by selecting appropriate N values, push-N can balance against the push and the pull operations, and therefore improves the user access experience without wasting too much network resources. Index Terms—Forum-based website applications, mobile data transmission, IP multimedia subsystem (IMS). I. INTRODUCTION N Next Generation Network (NGN), IP Multimedia Sub- I system (IMS) supports IP-based broadband multimedia services through mobile devices [1], [2]. Chunghwa Telecom Fig. 1. A simplified NGN/IMS architecture. (CHT), Taiwan, has deployed one of the largest commer- cial NGN/IMS in Asia to provision enhanced voice, video, Based on CHT’s NGN/IMS, we have developed mobile and Internet-based multimedia services. The current CHT data transmission applications that allow pull or push of NGN/IMS capacity can accommodate commercial operation information from an application server (Figure 1 (4)) to a UE for about five hundred thousand subscribers.
    [Show full text]
  • Structure of IEEE 802.11 Packets at Various Physical Layers
    Appendix A: Structure of IEEE 802.11 Packets at Various Physical Layers This appendix gives a detailed description of the structure of packets in IEEE 802.11 for the different physical layers. 1. Packet Format of Frequency Hopping Spread-spectrum Physical Layer (FHSS PHY) The packet is made up of the following elements (Figure A.1): 1.1 Preamble It depends on the physical layer and includes: – Synch: a sequence of 80 bits alterning 0 and 1, used by the physical circuits to select the correct antenna (if more than one are in use), and correct offsets of frequency and synchronization. – SFD: start frame delimiter consists of a pattern of 16 bits: 0000 1100 1011 1101, used to define the beginning of the frame. 1.2 Physical Layer Convergence Protocol Header The Physical Layer Convergence Protocol (PLCP) header is always transmitted at 1 Mbps and carries some logical information used by the physical layer to decode the frame: – Length of word of PLCP PDU (PLW): representing the number of bytes in the packet, useful to the physical layer to detect correctly the end of the packet. – Flag of signalization PLCP (PSF): indicating the supported rate going from 1 to 4.5 Mbps with steps of 0.5 Mbps. Even though the standard gives the combinations of bits for PSF (see Table A.1) to support eight different rates, only the modulations for 1 and 2 Mbps have been defined. – Control error field (HEC): CRC field for error detection of 16 bits (or 32 bits). The polynomial generator used is G(x)=x16 + x12 + x5 +1.
    [Show full text]
  • Wireless Real-Time IP Services Enabled by Header Compression
    Wireless Real-time IP Services Enabled by Header Compression Krister Svanbrof, Hans Hannu f, Lars-Erik Jonsson f, Mikael Degermarkf f Ericsson Research f Dept. of CS & EE Ericsson Erisoft AB Lulei University of Technology Box 920, SE-971 28 Lulei, Sweden SE-971 87 Lulei, Sweden Abstract - The world of telecommunications is currently A major problem with voice over IP over wireless is the going through a shift of paradigm from circuit switched, large headers of the protocols used when sending speech connection oriented information transfer towards packet data over the Internet. An IPv4 packet with speech data switched, connection-less transfer. For application will have an IP header, a UDP header, and an RTP header independence and to decrease costs for transport and making a total of 20+8+12=40 octets. With IPv6, the IP switching it is attractive to go IP all the way over the air header is 40 octets for a total of 60 octets. The size of the ' interface to the end user equipment, i.e., to not terminate speech data depends on the codec, it can be 15-30 octets. the IP protocols before the air interface. A major reason to These numbers present a major reason for terminating the avoid using voice over IP over the air interface has, up to IP protocols before the air interface: the IP/UDP/RTP now, been the relatively large overhead imposed by the headers require a higher bit rate and would cause IP/UDP/RTP headers of voice packets. This paper presents inefficient use of the expensive radio spectrum.
    [Show full text]
  • Visual Basic 6.0 Internet Programming:Table of Contents
    To access the contents, click the chapter and section titles. Visual Basic 6.0 Internet Programming (Publisher: John Wiley & Sons, Inc.) Author(s): Carl Franklin ISBN: 0471314986 Publication Date: 02/01/99 Brief Full Advanced Search Search this book: Search Tips FOREWORD CHAPTER 1—THE INTERNET Attack of the Buzzwords! Protocols and Data Protocol Stacks and the OSI Model TCP/IP Names and Addresses Ports Name Resolution Sockets The TCP/IP Model CHAPTER 2—WINSOCK PROGRAMMING Introduction Why Not Use the Winsock API? Installing the Software Loading DSSOCK32.OCX into Visual Basic DSSOCK.BAS SocketConnect IsDotAddress ParseString Getting Started with dsSocket Making a Sockets Connection What’s Going On Here? SocketID and the Socket Property Closing the Connection Handling Multiple Connections on the Server Side Sending Data Receiving Data LineMode, EOLChar, and DataSize The Simple Approach A New Twist Splitting Up the Process with Flags A Slight Variation Event Driven = No Loops Which Approach Is Better? Error Handling Winsock Errors Error-Handling Techniques Minimal Error Trapping Debug.Print Error Trapping Message Dialog Reporting Error Log Reporting UDP—User Datagram Protocol Terminal—A Winsock Terminal Program Epilogue CHAPTER 3—SIMPLE PROTOCOLS Introduction NTP (Network Time Protocol) WHOIS FINGER SetTime Application Epilogue CHAPTER 4—USENET NEWS Introduction NNTP MessageIDs vs. Message Numbers NNTP Versions NNTP Commands Sample Conversation The WILDMAT Format Server Responses Usenet Article Format VB Programming Technique String Parsing
    [Show full text]