OPEN SYSTEMS NETWORKING TCP/IP and OSI David M

Total Page:16

File Type:pdf, Size:1020Kb

OPEN SYSTEMS NETWORKING TCP/IP and OSI David M OPEN SYSTEMS NETWORKING TCP/IP AND OSI David M. Piscitello and A. Lyman Chapin Addison-Wesley Publishing Company Reading, Massachusetts Menlo Park, California New York Don Mills, Ontariao Wokingham, England Amsterdam Bonn Sydney Singapore Tokyo Madrid San Juan Paris Seoul Milan Mexico City Taipei OPEN SYSTEMS NETWORKING Addison-Wesley Professional Computing Series Brian W. Kernighan, Consulting Editor Ken Arnold/John Peyton, A C User’s Guide to ANSI C Tom Cargill, C++ Programming Style David A. Curry, UNIX® System Security: A Guide for Users and System Administrators Scott Meyers, Effective C++: 50 Specific Ways to Improve Your Programs and Designs Robert B. Murray, C++ Strategies and Tactics Craig Partridge, Gigabit Networking Radia Perlman, Interconnections: Bridges and Routers David M. Piscitello/A. Lyman Chapin, Open Systems Networking: TCP/IP and OSI Stephen A. Rago, UNIX® System V Network Programming W. Richard Stevens, Advanced Programming in the UNIX® Environment W. Richard Stevens, TCP/IP Illustrated, Volume 1 The publisher offers discounts on this book when ordered in quantity for special sales. For more information please contact: Corporate & Professional Publishing Group Addison-Wesley Publishing Company One Jacob Way Reading, Massachusetts 01867 Library of Congress Cataloging-in-Publication Data Piscitello, David M. Open systems networking : TCP/IP and OSI / David M. Piscitello and A. Lyman Chapin. p. cm. - - (Addison-Wesley professional computing series) Includes bibliographical references and index. ISBN 0-201-56334-7 (alk. paper) 1. OSI (Computer network standard) 2. TCP/IP (Computer network proto- col) 3. Computer networks. I. Chapin, A. Lyman. II. Title. III. Series. TK5105.55.P57 1993 004.6'2 - - dc20 93-17791 CIP Copyright © 1993 by Addison-Wesley Publishing Company All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form, or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior consent of the publisher. Printed in the United States of America. Published simultaneously in Canada. Cover photo by Steven Hunt, The Image Bank Text design by Carol Keller ISBN 0-201-56334-7 Text printed on recycled and acid-free paper. 1 2 3 4 5 6 7 8 9 10 MU 96959493 First printing, August 1993 CONTENTS PREFACE xiii Why This Book, Now? xiii Demystifying Open Systems xvii Equal Treatment xvii Opinions Are Good! xix Historical Asides and Authors’ Insights xix Who Should Read This Book? xx Contributors xxi Acknowledgments xxi PART ONE INTRODUCTION TO OPEN SYSTEMS 1 CHAPTER 1 INTRODUCTION 3 Organization of This Book 9 CHAPTER 2 OPEN SYSTEMS STANDARDS 13 OSI Standards 13 Internet Standards 21 Parting Comments on Open Systems Standards Processes 26 v vi OPEN SYSTEMS NETWORKING: TCP/IP AND OSI PART TWO OPEN NETWORK ARCHITECTURES 31 CHAPTER 3 CONCEPTS AND TERMINOLOGY OF OPEN SYSTEMS 33 Introduction 33 Architectures 34 Open Systems 35 Architecture Wars 37 Layers 37 Terminology 45 Entities 46 Notation 47 Services 47 The Queue Model 50 Connections and Connectionless 51 What about Protocols? 54 Protocol Headers and User Data 57 Relating Service to Protocol 58 Time-Sequence Diagrams 59 A Final Fling with OSI Fundamentals 60 Conclusion 61 CHAPTER 4 THE LANGUAGES OF OPEN SYSTEMS 63 Introduction 63 “Open” Languages—Breaking Language Barriers 64 Data Representation 65 Abstract Syntax Notation 68 ASN.1 Data Types and Tags 69 Modules 72 Transfer Syntax—Basic Encoding Rules (BER) for ASN.1 73 Do I Really Have to Deal with All This? 75 Languages and the TCP/IP Community 76 Conclusion 79 CONTENTS vii CHAPTER 5 NAMES AND ADDRESSES 81 Names 82 Addresses 88 Registration Authorities 88 Object Identifiers 96 Conclusion 97 PART THREE UPPER LAYERS 99 CHAPTER 6 OPEN SYSTEMS APPLICATIONS 101 Distributed Applications Services 106 Conclusion 109 CHAPTER 7 DIRECTORIES 111 The Telephony Model 112 Directory System Principles 113 Open System Directories 114 The Domain Name System 115 The OSI Directory 122 The Directory Model129 The Relationship Between the OSI Directory and Message Handling Services 135 The OSI Directory in the Internet 137 Other Internet Directory Utilities 139 Resource Location 141 Conclusion 145 CHAPTER 8 OPEN SYSTEMS MESSAGING: ELECTRONIC MAIL 147 OSI Message Handling System (X.400 MHS, MOTIS) 148 viii OPEN SYSTEMS NETWORKING: TCP/IP AND OSI Internet Mail 163 Interworking between MHS and Internet Mail172 Conclusion 174 CHAPTER 9 NETWORK MANAGEMENT 177 The Internet Approach: Keep It Simple 178 OSI Common Management: Flexibility, At A Price 189 Putting It All Together 205 Where To from Here? 208 Conclusion 211 CHAPTER 10 “CORE” APPLICATION SERVICE ELEMENTS 213 Association-Control Service Element 214 Reliable Transfer Service Element 223 Remote Operations Service Element 232 “Core ASE Wanna-bes” 243 Conclusion 245 CHAPTER 11 THE PRESENTATION AND SESSION LAYERS 247 Presentation Layer 247 Session Layer 261 Putting It All Together 281 The Future of OSI Upper Layers 284 Conclusion 285 PART FOUR MIDDLE LAYERS 287 CHAPTER 12 THE TRANSPORT LAYER 289 OSI’s Connection-oriented Transport Service 290 CONTENTS ix TCP/IP’s Reliable Stream Service 291 Interfaces to Transport Services 292 Transport Addressing 300 Five Classes of OSI Transport Protocol 301 Conformance 309 Comparing TP4 to TCP 310 OSI Transport Connection Establishment 311 Setting It All to UNIX 317 Frozen References 320 TCP Connection Establishment 320 Normal Data Transfer in OSI Transport Protocol 325 Reliability Mechanisms to Deal with the Real World 328 Data Transfer in TCP—More of the Same 334 Window Considerations for TP4 and TCP 337 OSI’s Expedited Data 340 TCP’s Urgent Data 341 Timers and Open Transport Protocols 342 Connection Release (Connection Refusal) in the OSI Transport Protocol 354 Connection Release (Refusal) in TCP 356 Datagram Transport Protocols—CLTP and UDP 358 Conclusion 360 CHAPTER 13 THE NETWORK LAYER 361 Architecture: The Internal Organization of the Network Layer 362 Connection-oriented Network Service 372 Connectionless Network Service 379 Internetworking Protocols 383 NL Protocol Identification in TCP/IP and Multiprotocol Environments 397 Network Layer Addresses 398 Conclusion 411 CHAPTER 14 ROUTING 413 Source Routing and “Hop-by-Hop” Routing 414 Routing Principles 415 Routing Protocols 424 Conclusion 465 x OPEN SYSTEMS NETWORKING: OSI & TCP CHAPTER 15 DATA LINK AND PHYSICAL LAYERS 467 Taxonomy of Data Link Standards 468 Point-to-Point Connection Standards 469 Multiaccess Channel Standards 471 Metropolitan Area Networks: FDDI and IEEE 802.6 DQDB 473 Fast Packet Services and Technologies 482 Very High Bandwidth as an Enabling Vehicle for OSI 500 Conclusion 500 PART FIVE THE FUTURE OF OPEN SYSTEMS NETWORKING 503 CHAPTER 16 MULTIPROTOCOL OPEN SYSTEMS 505 The Myth of “OSI Migration” 505 OSI Is an Alternative, Not a Substitute 507 OSI and TCP/IP Coexistence: Networking Détente 510 Bringing OSI into a Network 520 Are the Instrumentation and Expertise Available to Operate OSI Networks? 522 Conclusion 522 CHAPTER 17 AN ARCHITECTURAL ALTERNATIVE FOR THE INTERNET 525 What Is “the Internet”? 525 A Naming-based Concept of Internet Connectivity 527 CHAPTER 18 A READING FROM THE BOOK OF GENEBITS 533 APPENDIX A NETWORKING ACRONYMS 537 CONTENTS xi APPENDIX B SOURCES 559 How and Where to Obtain Useful Information 559 Information about TCP/IP and the Internet 560 Information about OSI 564 Authors’ Electronic Mail Addresses 566 REFERENCES 567 INDEX 587 PREFACE Why This Book, Now? Open systems—in particular, Open Systems Interconnection (OSI) and TCP/IP1—are all the rage. There are plenty of books that discuss OSI and plenty more that discuss TCP/IP. However, despite the facts that the architecture and goals of OSI and TCP/IP are essentially the same, and that they are really just currently popular manifestations of the same fun- damental principles and techniques, no previous book has examined the two in parallel. This book covers both Open Systems Interconnection and the Internet architecture and protocols, commonly known as TCP/IP. There are many compelling reasons for examining these architectures in parallel, which is what this book intends to do. TCP/IP Has Strongly Influenced the Design of OSI Many of the fea- tures and functions present in OSI trace their roots back to TCP/IP; for example, OSI’s transport protocol class 4 and connectionless network protocol (CLNP) are functionally equivalent to TCP and IP. Furthermore, OSI’s application services—Message Handling System, File Transfer Access and Management, the Directory, and Virtual Terminal—are all attempts to improve upon their TCP/IP ancestors; the OSI Message Handling System, for example, is intended to improve upon the highly successful electronic-mail facilities provided in the TCP/IP protocol suite by the Simple Mail Transfer Protocol by permitting facsimile, images, and voice to accompany text in a mail envelope. The OSI Message Handling 1. Transmission control protocol (TCP) and internet protocol (IP) are the core protocols of the Internet architecture. xiii xiv OPEN SYSTEMS NETWORKING: TCP/IP AND OSI System also provides a platform for Electronic Data Interchange and Of- fice Document Interchange, and the OSI Directory will provides a power- ful, object-oriented, global information base that can be accessed by humans as well as by distributed applications such as electronic mail and network file and resource management, building on services hitherto provided by TCP/IP applications such as FINGER, WHOIS,
Recommended publications
  • E-Commerce [R15a0571] Lecture Notes
    E-COMMERCE [R15A0571] LECTURE NOTES B.TECH IV YEAR – II SEM (R15) (2019-2020) DEPARTMENT OF INFORMATION TECHNOLOGY MALLA REDDY COLLEGE OF ENGINEERING & TECHNOLOGY (Autonomous Institution – UGC, Govt. of India) Recognized under 2(f) and 12 (B) of UGC ACT 1956 (Affiliated to JNTUH, Hyderabad, Approved by AICTE ‐ Accredited by NBA & NAAC – ‗A‘ Grade ‐ ISO 9001:2015 Certified) Maisammaguda, Dhulapally (Post Via. Hakimpet), Secunderabad – 500100, Telangana State, India IV Year B.Tech IT – II Sem L T /P/D C 5 -/-/- 4 (R15A0571) E-COMMERCE (Elective-VI) OBJEVES Identify the major categories and trends of e-commerce applications. Identify the essential processes of an e-commerce system. Identify several factors and web store requirements needed to succeed in e-commerce. Discuss the benefits and trade-offs of various e-commerce clicks and bricks alternatives. Understand the main technologies behind e-commerce systems and how these technologies interact. Discuss the various marketing strategies for an online business. Define various electronic payment types and associated security risks and the ways to protect against them. UNIT - I Electronic Commerce-Frame work, anatomy of E-Commerce applications, E-Commerce Consumer applications, E-Commerce organization applications. Consumer Oriented Electronic commerce - Mercantile Process models. UNIT - II Electronic payment systems - Digital Token-Based, Smart Cards, Credit Cards, Risks in Electronic Payment systems. Inter Organizational Commerce - EDI, EDI Implementation, Value added networks. UNIT - III Intra Organizational Commerce - work Flow, Automation Customization and internal Commerce, Supply chain Management. UNIT - IV Corporate Digital Library - Document Library, digital Document types, corporate Data Warehouses. Advertising and Marketing - Information based marketing, Advertising on Internet, on-line marketing process, market research.
    [Show full text]
  • Digital Notes on E-Commerce [R17a1212] B.Tech Iv Year – Ii Sem (2020-2021)
    DIGITAL NOTES ON E-COMMERCE [R17A1212] B.TECH IV YEAR – II SEM (2020-2021) DEPARTMENT OF INFORMATION TECHNOLOGY MALLA REDDY COLLEGE OF ENGINEERING & TECHNOLOGY (Autonomous Institution – UGC, Govt. of India) Recognized under 2(f) and 12 (B) of UGC ACT 1956 (Affiliated to JNTUH, Hyderabad, Approved by AICTE ‐ Accredited by NBA & NAAC – ‗A‘ Grade ‐ ISO 9001:2015 Certified) Maisammaguda, Dhulapally (Post Via. Hakimpet), Secunderabad – 500100, Telangana State, India MALLA REDDY COLLEGE OF ENGINEERING AND TECHNOLOGY IV Year B.Tech IT –II Sem L T /P/D C 4 -/-/- 4 (R17A1212) E-COMMERCE (Core Elective-VI) Course Objectives • Identify the major categories and trends of e-commerce applications. • Learn the essential processes of an e-commerce system. • Understand the main technologies behind e-commerce systems and how these technologies interact. • Learn the various marketing strategies for an online business and various electronic payment types and associated security risks and the ways to protect against them. UNIT – I Electronic Commerce-Framework, anatomy of E-Commerce applications, E-Commerce Consumer applications, E-Commerce organization applications. Consumer Oriented Electronic commerce - Mercantile Process models. UNIT - II Electronic payment systems - Digital Token-Based, Smart Cards, Credit Cards, electronic wallets, Risks in Electronic Payment systems. Inter Organizational Commerce - EDI, EDI Implementation, Value added networks. Intra Organizational Commerce - Work Flow, Automation Customization and internal Commerce, Supply chain Management. UNIT – III Corporate Digital Library - Document Library, digital Document types, corporate Data Warehouses. Advertising and Marketing - Information based marketing, Advertising on Internet, on-line marketing process, market research-Consumer Search and Resource Discovery - Information search and Retrieval, Commerce Catalogues, Information Filtering.
    [Show full text]
  • The FCC Public Message Services Policy Change: an ETIP Evaluability
    National Bureau of Standards Library, E-01 Admin. Bldg. OCT 6 1981 1911*12 ^T OF k QC /CO L(67 Q t&S TECHNICAL NOTE 1104 \ J ^EAU Of Volume 1 NATIONAL BUREAU OF STANDARDS The National Bureau of Standards' was established by an act of Congress on March 3, 1901. The Bureau's overall goal is to strengthen and advance the Nation's science and technology and facilitate their effective application for public benefit. To this end, the Bureau conducts research and provides: (1) a basis for the Nation's physical measurement system, (2) scientific and technological services for industry and government, (3) a technical basis for equity in trade, and (4) technical services to promote public safety. The Bureau's technical work is per- formed by the National Measurement Laboratory, the National Engineering Laboratory, and the Institute for Computer Sciences and Technology. THE NATIONAL MEASUREMENT LABORATORY provides the national system of physical and chemical and materials measurement; coordinates the system with measurement systems of other nations and furnishes essential services leading to accurate and uniform physical and chemical measurement throughout the Nation's scientific community, industry, and commerce; conducts materials research leading to improved methods of measurement, standards, and data on the properties of materials needed by industry, commerce, educational institutions, and Government; provides advisory and research services to other Government agencies; develops, produces, and distributes Standard Reference Materials; and provides
    [Show full text]
  • Networking: the Linking of People, Resources and Ideas TABLE of CONTENTS About the Network
    ISSN 0889-6194 Networking: The Linking of People, Resources and Ideas TABLE OF CONTENTS About the Network . ...................................................................... 1 CUSS Network Advisory Board Members .................................................... 2 Services Available ....................................................................... 3 CUSS Electronic Network ................................................................. 4 Notes From The Editor ................................................................... 5 Articles, Reviews and Reports Considering A PC-based Local Area Network? by G. Puckett .......................................... 5 Research at the Human Performance Institute, U. of Texas at Arlington by George Kondraske .................. 7 Selected Information from Fidonet News ....................................................... 9 Information from the CUSSnet Conference Area ................................................. 11 Selected Listings of Files from Several CUSSnet Nodes ........................................... 13 Members Comments and Activities Network Activities ....................................................................... 17 Research Projects and Reports ............................................................. 17 Health and Mental Health ................................................................. 18 Disabilities ............................................................................ 18 Resources and Materials Electronic Information Resources ...........................................................
    [Show full text]
  • Advanced Computer Networks Cs 538 Fall 2011
    Advanced Computer Networks cs 538 fall 2011 Brighten Godfrey [email protected] Fall 2011 slides ©2010-2011 by Brighten Godfrey except photographs (from Computer History Museum) and unless otherwise noted To d ay Course Overview Internet History Your Future This course • is instructed by Brighten Godfrey ([email protected], 3128 Siebel) • takes place Tue & Thu, 3:30 - 4:45 pm, in 1302 Siebel • comes with FREE office hours: currently, Tuesdays after class and by appointment • has a web site: http://www.cs.illinois.edu/~pbg/ courses/cs538fa11/ Your instructor • Ph.D. from UC Berkeley, 2009 • Dissertation on improving resilience and performance of distributed systems by taking advantage of heterogeneity • Research interests: • Reliable, flexible, and efficient networked systems • Algorithms for and analysis of distributed systems Course goal • Prepare ourselves to perform high-quality research advancing the field of networking Course components • Networking literature • The classics • The challenges • The latest • Research project • How to read, criticize, and present research Major topics • Core architecture • Classic Internet architecture • Congestion control • Forwarding • Routing • Naming • Making it work well • Reliability, scalability, selfishness, security • Domain-specific networks • Enterprise, data center, P2P, wireless Requirements & grading • Project (45%) • Midterm presentation (10%) • Final paper (20%) • Final poster presentation (15%) • Assignments, quizzes (15%) • Paper reviews (15%) • Paper presentations (15%) • Class participation
    [Show full text]
  • CONTACT, the Phoenix Project, March 1, 1999
    THE P&IOENIX PROJECT / “YE SHALL KNOW THE TRUTH AND THE TRUTH SHALL MAKE YOU MAD!” VOLUME 4, NUMBER 10 NEWS REVIEW $ 2.00 MARCH 1, 1994 “Ms.” Janet Reno Svmbol Of Clinton Team’s (Per)Version Of Justice 2128/94 #l HATONN there to say about this reflection on the moral are now fully in charge of the insane asylum. decency of your Nation? What’s more, the locos have convinced the WACO/RENO DEBACLE To protect Dharma from the myriad insults outside world that it is their victims and not and assaults by the Hounds of Hell I shall be themselves who are crazy! 1 have been asked to comment on the happy to offer you further insight into those Consider these rather astute and extremely convictions and acquittals of the ‘Davidians” ‘darlings” of the White House top advisory ruling revealing comments by Dick Hafer who has accused of murdering federal agents. [See team. We can begin today with Janet Reno. researched and documented the lives and hab- latest update on “The Trial Of The Branch Rather than repeat what we have already its of Clinton appointees: Davidians” on p. 33.) written-and in order to give YOU more wide- “Janet Reno is a woman [H: ??I of ‘unusual 1 have very few comments on the case which spread confirmation of the truth of that which tastes’. Unmarried, childless, and at 6’2’; an have not been made several times prior to this,%y we offer-1 simply offer you what is published imposing person. Ms. Reno relaxes in various me.
    [Show full text]
  • E-Commerce Technology Made Easy
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by International Journal of Innovative Technology and Research (IJITR) S. Sridhar* et al. (IJITR) INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGY AND RESEARCH Volume No.5, Issue No.3, April – May 2017, 6183-6198. E-Commerce Technology Made Easy S.SRIDHAR Professor & Director RV Centre for Cognitive & Central Computing, R.V.College of Engineering, Mysore Road Bangalore-560059 India Abstract: Electronic Commerce is the Modern Business Methodology To Address, Needs Of Organizations, Merchants, Commerce to Cut Costs and to do the following :-To improve quality/services/speed of delivery; more commonly associated with buying and selling of information, products and services via computer networks today; EDI – Electronic Data Interchange; Latest and dependable way to deliver electronic transactions by computer to computer communication combined with (JIT) ; Just in time manufacturing methods; EDI and email used for many years. e-commerce is a transaction of buying or selling online. Electronic commerce draws on technologies such as mobile commerce, electronic funds transfer, supply chain management, Internet marketing, online transaction processing, electronic data interchange (EDI), inventory management systems, and automated data collection systems. Key words : Modern Business Technology; EDI; Mobile Commerce; Internet Marketing; I. INTRODUCTION 2.1 Elements Of E-Commerce Applications Electronic Commerce is the Modern Business Methodology To Address, Needs Of Organizations, Merchants, Commerce to Cut Costs and to do the following :-To improve quality/services/speed of delivery; more commonly associated with buying and selling of information, products and services via computer networks today; EDI – Electronic Data Interchange; Latest and dependable way to deliver electronic transactions by computer to computer communication combined with (JIT) ; Just in time manufacturing methods; EDI and email used for many years.
    [Show full text]
  • The Telephone and Its Uses in 1980S U.S. Activism Today We Are Awash in Claims About the Transfor- Mative Effects of the Digital Revolution
    Journal of Interdisciplinary History, XLVIII:4 (Spring, 2018), 485–509. Barbara Keys The Telephone and Its Uses in 1980s U.S. Activism Today we are awash in claims about the transfor- mative effects of the digital revolution. Technology, we are told, is reshaping how we work, play, and live—even how our brains are wired. Smartphones and the internet have revolutionized society, commerce, and politics and even revolutionized revolutions, or so enthusiasts and detractors proclaim with equal conviction. Enthu- siasts argue that modern technologies enhance freedom and de- mocratize the flow of information, empowering movements such as Occupy Wall Street and the Arab Spring. Detractors coun- ter that social media and the internet foster “slactivism”—low-risk, low-effort commitments that achieve little other than to make users feel better.1 These claims rest on a weak understanding of communica- tions technologies in the pre-digital age. Before Facebook, the in- ternet, and mobile phones, political activists in many places during the second half of the twentieth century spread their message, re- cruited adherents, raised funds, and elicited action by using “tradi- tional” technologies, notably print and landline telephony. In Barbara Keys is Associate Professor of History, University of Melbourne. She is the author of Reclaiming American Virtue: The Human Rights Revolution of the 1970s (Cambridge, Mass., 2014). The research for this article was funded by an Australian Research Council Discovery Project grant. The author thanks Frank Costigliola, Jack Davies, Petra Goedde, Van Gosse, Patrick Kelly, Brad Simpson, and Keir Wotherspoon for useful suggestions. © 2018 by the Massachusetts Institute of Technology and The Journal of Interdisciplinary History, Inc., doi:10.1162/JINH_a_01196 1 Some observers claim that using the internet fosters social relationships; others find that fre- quent internet use correlates with spending less time with friends and families and that novice users can experience adverse psychological effects.
    [Show full text]
  • ED299427.Pdf
    DOCUMENT RESUME ED 299 427 CE 051 056 AUTHOR O'Neil, Sharon Lund; Everett, Donna R. TITLE Telecommunications/Networking. Course Four. Information Systems Curriculum. INSTITUTION Association of Information Systems Professionals, Deerfield, IL.; Houston Univ., Tex. Coll. of Technology. SPONS AGENCY Texas Higher Education Coordinating Board, Austin. PUB DATE 88 NOTE 173p.; For related documents, see CE 051 053-059. PUB TYPE Guides - Classroom Use - Guides (For Teachers) (052) EDRS PRICE MF01/PC07 Plus Postage. DESCRIPTORS Behavioral Objectives; *Business Education; *Computer Networks; Computer Oriented Programs; *Computer Science Education; Computer Software; Curriculum Guides; Higher Education; Information Processing; *Information Science; *Information Systems; Learning Activities; *Telecommunications; Word Processing ABSTRACT This course is the fourth of seven in the Information Systems curriculum. The purpose of the course is to review data, text, graphics, and voice communications technology. It includes an overview of telecommunications technology. An overview of the course sets forth the condition and performance standard for each of the five task areas in the course. These components are provided for each task area: behavioral objective, suggested teaching strategies, content, and summary. Topics covered include telecommunications/networking terms, concepts, vocabulary, and principles; hands-on operational knowledge of telecommunications/networking systems and sr- vices; factors to consider in comparison and evaluation, selection,
    [Show full text]
  • Helping a Future Internet Architecture Mature Craig Partridge Raytheon BBN Technologies [email protected]
    Helping A Future Internet Architecture Mature Craig Partridge Raytheon BBN Technologies [email protected] This article is an editorial note submitted to CCR. It has NOT been peer reviewed. The author takes full responsibility for this article’s technical content. Comments can be posted through CCR Online. ABSTRACT impact beyond the research community. I’m interested in helping Some of the challenges of developing and maturing a future good architecture ideas reach the development, implementation internet architecture (FIA) are described. Based on a talk given and product communities, as so many of those 1970s and 1980s at the Conference on Future Internet Technologies 2013. architectures did. This editorial is not about winning a protocol war. One of the Categories and Subject Descriptors characteristics of the 1980s was that the networking community understood how to borrow/import/steal good architectural ideas C.2.1 [Network Architecture and Design]. from each other’s architectures. That borrowing is important intellectual cross-fertilization, and requires architectures to be Keywords mature enough that they are worth borrowing from. Helping Network architecture, future internet architecture. today’s future Internet architectures reach that level of maturity is the goal of this paper. 1. INTRODUCTION The successful Future Internet Architecture (FIA) research 3. SIX PRINCIPLES initiatives in Asia, Europe and the United States have led to To help mature a future Internet architecture, I offer six principles. multiple proposed new Internet architectures. The maturity of these architectures varies widely. Some efforts are still refining 3.1 Stick to Your Vision their initial visions while others have working prototypes.
    [Show full text]
  • Legal Responses to Commercial Transactions Employing Novel Communications Media
    Michigan Law Review Volume 90 Issue 5 1992 Legal Responses to Commercial Transactions Employing Novel Communications Media John Robinson Thomas University of Michigan Law School Follow this and additional works at: https://repository.law.umich.edu/mlr Part of the Commercial Law Commons, Communications Law Commons, Internet Law Commons, and the Science and Technology Law Commons Recommended Citation John R. Thomas, Legal Responses to Commercial Transactions Employing Novel Communications Media, 90 MICH. L. REV. 1145 (1992). Available at: https://repository.law.umich.edu/mlr/vol90/iss5/8 This Note is brought to you for free and open access by the Michigan Law Review at University of Michigan Law School Scholarship Repository. It has been accepted for inclusion in Michigan Law Review by an authorized editor of University of Michigan Law School Scholarship Repository. For more information, please contact [email protected]. Legal Responses to Commercial Transactions Employing Novel Communications Media John Robinson Thomas It is becoming more and more important that the rules governing negotiations made by telegraph should be clearly defined and set­ tled, as contracts thus made are constantly increasing in number and magnitude. - Scott & Jarnagin, A Treatise Upon the Law of Telegraphs, 1868. 1 Electronic messaging systems and electronic data interchange are changing the way businesses negotiate and enter into contracts. These changes require a reexamination of fundamental contract principles. - American Bar Association, Report on Electronic Messaging, 1988.2 More than a century ago, the telegraph3 revolutionized communi­ cations. For the first time, telegraphed messages spanned distances of thousands of miles, eliminating barriers of time and space.
    [Show full text]
  • Signposts in Cyberspace: the Domain Name System and Internet Navigation
    Prepublication Copy—Subject to Further Editorial Correction Signposts in Cyberspace: The Domain Name System and Internet Navigation Committee on Internet Navigation and the Domain Name System: Technical Alternatives and Policy Implications Computer Science and Telecommunications Board Division on Engineering and Physical Sciences NATIONAL ACADEMIES PRESS Washington, D.C. www.nap.edu Prepublication Copy—Subject to Further Editorial Correction THE NATIONAL ACADEMIES PRESS 500 Fifth Street, N.W. Washington, D.C. 20001 NOTICE: The project that is the subject of this report was approved by the Governing Board of the National Research Council, whose members are drawn from the councils of the National Academy of Sciences, the National Academy of Engineering, and the Institute of Medicine. The members of the committee responsible for the report were chosen for their special competences and with regard for appropriate balance. Support for this project was provided by the U.S. Department of Commerce and the National Science Foundation under Grant No. ANI-9909852 and by the National Research Council. Any opinions, findings, conclusions, or recommendations expressed in this publication are those of the authors and do not necessarily reflect the views of the National Science Foundation or the Commerce Department. International Standard Book Number Cover designed by Jennifer M. Bishop. Copies of this report are available from the National Academies Press, 500 Fifth Street, N.W., Lockbox 285, Washington, D.C. 20055, (800) 624-6242 or (202) 334-3313 in the Washington metropolitan area. Internet, http://www.nap.edu Copyright 2005 by the National Academy of Sciences. All rights reserved. Printed in the United States of America Prepublication Copy—Subject to Further Editorial Correction The National Academy of Sciences is a private, nonprofit, self-perpetuating society of distinguished scholars engaged in scientific and engineering research, dedicated to the furtherance of science and technology and to their use for the general welfare.
    [Show full text]