Inside Appletalk¨ Second Edition

Total Page:16

File Type:pdf, Size:1020Kb

Inside Appletalk¨ Second Edition K ® Inside AppleTalk® Second Edition Gursharan S. Sidhu Technical Director Richard F. Andrews Staff Engineer Alan B. Oppenheimer Staff Engineer Network Systems Development Apple Computer, Inc. ∆∆ Addison-Wesley Publishing Company, Inc. Reading, Massachusetts ■ Menlo Park, California ■ New York Don Mills, Ontario ■ Wokingham, England ■ Amsterdam ■ Bonn Sydney ■ Singapore ■ Tokyo ■ Madrid ■ San Juan APPLE COMPUTER, INC. IBM and SNA are registered UNIX is a registered trademark of trademarks of International AT&T Information Systems. Copyright © 1990 by Apple Business Machines Corporation. Computer, Inc. Varityper is a registered trade- InBox is a trademark of Symantec mark, and VT600 is a trademark, All rights reserved. No part of this Corporation’s Think Technologies. of AM International, Inc. publication may be reproduced, stored in a retrieval system, or ITC Garamond and ITC Zapf Zilog is a trademark of Infocom, transmitted, in any form or by Dingbats are registered Inc. any means, mechanical, electronic, trademarks of International Simultaneously published in the photocopying, recording, or Typeface Corporation. United States and Canada. otherwise, without prior written Kinetics is a trademark of ISBN 0-201-55021-0 consent of Apple Computer, Inc. Kinetics, Inc. ABCDEFGHIJ-DO-90 Printed in the United States of LANSTAR and Meridian are First printing, May 1990 America. registered trademarks of Apple Computer, Inc. Northern Telecom. 20525 Mariani Avenue LANSTAR AppleTalk is a joint Cupertino, CA 95014 trademark of Northern Telecom (408) 996-1010 and Apple Computer, Inc. Apple, the Apple logo, AppleShare, Linotronic is a registered AppleTalk, Apple IIe, Apple IIGS, trademark of Linotype Co. EtherTalk, ImageWriter, Microsoft and MS-DOS are LaserWriter, Macintosh, ProDOS, registered trademarks of and TokenTalk are registered Microsoft Corporation. trademarks of Apple Computer, Inc. Netway is a registered trademark of Tri-Data Systems, Inc. Apple Desktop Bus, Finder, LocalTalk, and MultiFinder are NFS is a trademark of Sun trademarks of Apple Computer, Microsystems. Inc. PacerShare is a registered AlisaShare is a trademark of Alisa trademark of Pacer Software, Inc. Systems. PhoneNET is a registered CL/1 is a trademark of Network trademark of Farallon Computing. Innovations. PostScript is a registered DECnet and VAX are trademarks trademark, and Illustrator is a of Digital Equipment Corporation. trademark, of Adobe Systems Incorporated. Contents Figures and tables / xv Acknowledgments / xx Acknowledgments to First Edition / xxiii Introduction / I-1 Network systems / I-4 Protocols—What are they? / I-4 AppleTalk / I-4 Why did we design it? / I-5 Key goals of the AppleTalk architecture / I-6 The AppleTalk network system / I-8 AppleTalk connectivity / I-9 AppleTalk end-user services / I-15 AppleTalk protocol architecture and the ISO-OSI reference model / I-20 AppleTalk Phase 2 / I-24 Thoughts of the future / I-25 Scope / I-25 Reach / I-25 About Inside AppleTalk / I-26 Typographic and graphic conventions used in this book / I-27 Where to go for more information / I-28 iii Part I Physical and Data Links 1 LocalTalk Link Access Protocol / 1-1 Link access control / 1-3 Node addressing / 1-3 Node IDs / 1-4 Dynamic node ID assignment / 1-4 Data transmission and reception / 1-6 LLAP packet / 1-6 LLAP frame / 1-9 Data packet transmission / 1-10 Carrier sensing and synchronization / 1-10 Transmission dialogs / 1-11 Directed data packet transmission / 1-14 Broadcast data packet transmission / 1-15 Packet reception / 1-15 2 AppleTalk Address Resolution Protocol / 2-1 Protocol families and stacks / 2-3 Protocol and hardware addresses / 2-3 Address resolution / 2-3 AARP services / 2-5 AARP operation / 2-6 Address mapping / 2-7 Dynamic protocol address assignment / 2-8 Retransmission of AARP packets / 2-9 Filtering incoming packets / 2-9 AMT entry aging / 2-10 AARP packet formats / 2-11 iv C O N T E N T S 3 EtherTalk and TokenTalk Link Access Protocols / 3-1 802.2 / 3-3 ELAP packet format / 3-5 TLAP packet format / 3-6 Address mapping in ELAP and TLAP / 3-7 Use of AARP by ELAP and TLAP / 3-8 AARP specifics for ELAP and TLAP / 3-9 Zone multicast addresses used by ELAP and TLAP / 3-10 AppleTalk AARP packet formats on Ethernet and token ring / 3-11 Part II End-to-End Data Flow 4 Datagram Delivery Protocol / 4-1 Internet routers / 4-5 Sockets and socket identification / 4-5 Network numbers and a node’s AppleTalk address / 4-6 Special DDP node IDs / 4-6 AppleTalk node address acquisition / 4-7 Node address acquisition on nonextended networks / 4-8 Node address acquisition on extended networks / 4-8 DDP type field / 4-9 Socket listeners / 4-10 DDP interface / 4-10 Opening a statically assigned socket / 4-11 Opening a dynamically assigned socket / 4-12 Closing a socket / 4-12 Sending a datagram / 4-12 Datagram reception by the socket listener / 4-13 DDP internal algorithm / 4-13 DDP packet format / 4-13 Short and extended headers / 4-14 DDP checksum computation / 4-17 Hop counts / 4-17 Contents v DDP routing algorithm / 4-18 Optional “best router” forwarding algorithm / 4-20 Sockets and use of name binding / 4-21 Network number equivalence / 4-21 5 Routing Table Maintenance Protocol / 5-1 Internet routers / 5-4 Local routers / 5-4 Half routers / 5-4 Backbone routers / 5-4 Router model / 5-6 Internet topologies / 5-7 Routing tables / 5-8 Routing table maintenance / 5-10 Reducing RTMP packet size / 5-11 Aging of routing table entries / 5-12 Validity and send-RTMP timers / 5-13 RTMP Data packet format / 5-13 Sender’s network number / 5-15 Sender’s node ID / 5-15 Version number indicator / 5-15 Routing tuples / 5-16 Assignment of network number ranges / 5-16 RTMP and nonrouter nodes / 5-17 Nodes on nonextended networks / 5-17 Nodes on extended networks / 5-19 RTMP Route Data Requests / 5-20 RTMP table initialization and maintenance algorithms / 5-21 Initialization / 5-21 Maintenance / 5-21 Tuple matching definitions / 5-25 RTMP routing algorithm / 5-25 6 AppleTalk Echo Protocol / 6-1 vi C O N T E N T S Part III Named Entities 7 Name Binding Protocol / 7-1 Network-visible entities / 7-4 Entity names / 7-4 Name binding / 7-5 Names directory and names tables / 7-6 Aliases and enumerators / 7-6 Names information socket / 7-7 Name binding services / 7-7 Name registration / 7-7 Name deletion / 7-8 Name lookup / 7-8 Name confirmation / 7-8 NBP on a single network / 7-9 NBP on an internet / 7-10 Zones / 7-10 Name lookup on an internet / 7-10 NBP interface / 7-11 Registering a name / 7-12 Removing a name / 7-12 Looking up a name / 7-13 Confirming a name / 7-13 NBP packet formats / 7-14 Function / 7-15 Tuple count / 7-15 NBP ID / 7-15 NBP tuple / 7-15 8 Zone Information Protocol / 8-1 ZIP services / 8-4 Network-to-zone-name mapping / 8-4 Zone information table / 8-4 Zone information socket: ZIP Queries and Replies / 8-5 ZIT maintenance / 8-5 Contents vii Zone name listing / 8-7 Zone name acquisition / 8-9 Verifying a saved zone name / 8-9 Choosing a new zone name / 8-10 Zone multicasting / 8-10 Aging the zone name / 8-10 Packet formats / 8-11 ZIP Query and Reply / 8-11 ZIP ATP Requests / 8-13 ZIP GetNetInfo Request and Reply / 8-16 Zone multicast address computation / 8-18 NBP routing in IRs / 8-18 Generating FwdReq packets / 8-19 Converting FwdReqs to LkUps / 8-19 Zones list assignment / 8-20 Zones list changing / 8-21 Changing zones lists in routers / 8-21 Changing zone names in nodes / 8-22 Timer values / 8-24 Part IV Reliable Data Delivery 9 AppleTalk Transaction Protocol / 9-1 Transactions / 9-3 At-least-once (ALO) transactions / 9-5 Exactly-once (XO) transactions / 9-6 Multipacket responses / 9-9 Transaction identifiers / 9-9 ATP bitmap/sequence number / 9-10 viii C O N T E N T S Responders with limited buffer space / 9-12 ATP packet format / 9-13 ATP interface / 9-16 Sending a request / 9-17 Opening a responding socket / 9-18 Closing a responding socket / 9-19 Receiving a request / 9-19 Sending a response / 9-20 ATP state model / 9-21 ATP requester / 9-22 ATP responder / 9-24 Optional ATP interface calls / 9-26 Releasing a RspCB / 9-26 Releasing a TCB / 9-26 Wraparound and generation of TIDs / 9-27 10 Printer Access Protocol / 10-1 PAP services / 10-4 The protocol / 10-5 Connection establishment phase / 10-7 Data transfer phase / 10-9 Duplicate filtration / 10-11 Connection termination phase / 10-11 Status gathering / 10-12 PAP packet formats / 10-12 PAP function and result values / 10-16 PAP client interface / 10-16 PAP specifications for the Apple LaserWriter printer / 10-21 Contents ix 11 AppleTalk Session Protocol / 11-1 What ASP does / 11-4 What ASP does not do / 11-4 ASP services and features / 11-5 Opening and closing sessions / 11-6 Session maintenance / 11-9 Commands on an open session / 11-10 Sequencing and duplicate filtration / 11-14 Getting service status information / 11-15 ASP client interface / 11-16 Server-end calls / 11-16 Workstation-end calls / 11-23 Packet formats and algorithms / 11-27 Opening a session / 11-27 Getting server status / 11-29 Sending a command request / 11-30 Sending a write request / 11-32 Maintaining the session / 11-35 Sending an attention request / 11-36 Closing a session / 11-36 Checking for reply size errors / 11-37 Timeouts and retry counts / 11-38 SPFunction values / 11-39 12 AppleTalk Data Stream Protocol / 12-1 ADSP services / 12-4 Connections / 12-4 Connection states / 12-5 Half-open connections and the connection timer / 12-5 Connection identifiers / 12-6 x C O N T E N T S Data flow / 12-6 Sequence numbers
Recommended publications
  • Ipv6 … a Simplified Explanation
    IPv6 … A Simplified Explanation Presented by Bryan Crisler Senior Network Engineer Time Warner Cable Housekeeping • Take this time to locate: – Emergency Exits – Bathrooms – Breakroom/Water Fountain – Note taking utensils • Put your Phones on Vibrate – If you need to take a call, feel free to step out of the room. About your Speaker • Bryan Crisler – Started in Cable @ Charter Communications, Riverside, CA in June 2005 – Currently a Senior Network Engineer at Time Warner Cable About your Speaker • Held following positions: – Broadband Technician I-IV (Charter) – Network Operations Specialist (Charter) – Network Technician (Charter) – Network Engineer (Charter & TWC) – SR Network Engineer (TWC) About your Speaker • Email: [email protected] • LinkedIn: linkedin.com/in/bcrisler Today’s Lesson Plan • Session 1: So What About IPv6? • Session 2: Every Day IPv6 and You So What About IPv6? Session 1 Basic History of IP • IP – Internet Protocol • Defined in RFC 791, dated 1981, written by Information Sciences Institute @ USC • Written for DARPA (Defense Advanced Research Projects Agency) Basic History of IP • “… Internet Protocol is designed for use in interconnected systems of packet-switched computer communication networks…provides for transmitting blocks of data called datagrams from sources to destinations… identified by fixed length addresses.” (RFC 791, section 1.1) Versions of IP • IPv0 – 3: Experimental Only • IPv4: Defined in 1981 by RFC 760 & 791. First version to implemented publically. Still in use today. • IPv5: Also experimental, called Internet Stream Protocol. • IPv6: Also called IP Next Generation (IPng), Defined in 1998 by RFC 2460-2467 IP Addressing • Layer 3 (Network) form of Addressing • Two different forms of IP Address: – IPv4 • Uses Dotted Decimal (192.168.0.1) • Has 4,294,967,296 total address (public & private) • 32 bit address – IPv6 • Uses Hexadecimal Notation (FE80::1) • Has 3.4×1038 total address (public & private) • 128 bit address IP Addressing – cont.
    [Show full text]
  • Findings of a Comparison of Five Filing Protocols
    Rochester Institute of Technology RIT Scholar Works Theses 1991 Findings of a comparison of five filing protocols R. Elayne McFaul Follow this and additional works at: https://scholarworks.rit.edu/theses Recommended Citation McFaul, R. Elayne, "Findings of a comparison of five filing protocols" (1991). Thesis. Rochester Institute of Technology. Accessed from This Thesis is brought to you for free and open access by RIT Scholar Works. It has been accepted for inclusion in Theses by an authorized administrator of RIT Scholar Works. For more information, please contact [email protected]. Rochester Institute of Technology School of Computer Science and Technology Findings of a Comparison of Five Filing Protocols May 1991 R. Elayne McFaul A thesis, submitted to the Faculty of the School of Computer Science and Technology, in partial fulfillment of the requirements for the degree of Master of Science in Computer Science. Approved by: Susan M. Armstrong Peter A. Crean James Heliotis Charles H. Russell I, Elayne McFaul, prefer to be contacted each time a request for reproduction of this thesis is made. I can be reached in one of the following ways: Xerox Corporation 800 Phillips Road 128-53E Webster, NY 14580 716-422-4328 mcfaul.wbstl [email protected] Table of Contents Abstract Key Words and Phrases Computing Review Subject Codes 1. Introduction 1 1.1 Literature Review 4 1.2 Thesis Goal Statement 6 2. General Protocol Descriptions 2.1 FTAM 7 2.2 FTP 11 2.3 UNIX rep 13 2.4 XNS Filing 16 2.5 NFS 19 3. Protocol Design Descriptions 23 3.1 Exported Interface 24 3.2 Concurrency Control 36 3.3 Access Control 40 3.4 Error Recovery 45 3.5 Performance 48 4.
    [Show full text]
  • Xerox 4890 Highlight Color Laser Printing System Product Reference
    XEROX Xerox 4890 HighLight Color Laser Printing System Product Reference Version 5.0 November 1994 720P93720 Xerox Corporation 701 South Aviation Boulevard El Segundo, California 90245 ©1991, 1992, 1993, 1994 by Xerox Corporation. All rights reserved. Copyright protection claimed includes all forms and matters of copyrightable material and information now allowed by statutory or judicial law or hereinafter granted, including without limitation, material generated from the software programs which are displayed on the screen such as icons, screen displays, looks, etc. November 1994 Printed in the United States of America. Publication number: 721P82591 Xerox® and all Xerox products mentioned in this publication are trademarks of Xerox Corporation. Products and trademarks of other companies are also acknowledged. Changes are periodically made to this document. Changes, technical inaccuracies, and typographic errors will be corrected in subsequent editions. This book was produced using the Xerox 6085 Professional Computer System. The typefaces used are Optima, Terminal, and monospace. Table of contents 1. LPS fundamentals 1-1 Electronic printing 1-1 Advantages 1-1 Highlight color 1-2 Uses for highlight color in your documents 1-2 How highlight color is created 1-2 Specifying 4890 colors 1-3 Color-related software considerations 1-4 Adding color to line printer and LCDS data streams 1-4 Adding color to Interpress and PostScript data streams 1-5 Adding color to forms 1-6 Fonts 1-8 Acquiring and loading fonts 1-9 LPS production process overview 1-9 Ink referencing 1-10 Unformatted data 1-10 Formatted data 1-11 4890 HighLight Color LPS major features 1-11 4890 feature reference 1-12 LPS connection options 1-12 System controller 1-13 Optional peripheral cabinet 1-13 Printer 1-13 Paper handling 1-14 Forms 1-15 Fonts 1-15 Printed format 1-15 Highlight color 1-16 Types of output 1-16 DFA/Segment Management 1-16 SCSI System Disk/Floppy Disk 1-18 Color Enhancements 1-18 XEROX 4890 HIGHLIGHT COLOR LPS PRODUCT REFERENCE iii TABLE OF CONTENTS 2.
    [Show full text]
  • 09/10 Ed IPP Price List
    Apple Computer, Inc. Apple Education Individual Purchase Program Price List September 10, 2002 For details on the Apple Education Individual Purchase Program, customers may visit our web site at <http://www.apple.com/education > or call 1-800-780-5009 (Specific eligibility rules apply). All pricing includes 5 day ground shipping. Local sales tax applies to all orders. iBook™ All iBook models are equipped with a PowerPC G3 processor, 12.1" TFT or 14.1" TFT display and either a CD-ROM or DVD-ROM/CD-RW combo optical drive. iBook includes two USB ports, a FireWire port, VGA video out,16-bit CD-quality stereo output and two built in stereo speakers. Built-in communications include 10/100 Base-T Ethernet, 56K modem with v.90 support and built-in antennas and internal AirPort Card slot for optional wireless networking capability. All systems come with both Mac OS 9 and OS X installed. For more detailed information, please refer to product data sheets or the iBook web site (http://www.Apple.com/iBook). Bundled software includes: iMovie, iTunes, AppleWorks, Internet Explorer, Outlook Express, Netscape Communicator, Adobe Acrobat Reader, FAXstf, AOL Instant Messenger (preview), WORLD BOOK Mac OS X Edition and Otto Matic game software. Apple offers build-to-order capability for the iBook products listed below. To take advantage of this capability, visit the Apple Store at http://www.apple.com/store M8600LL/A iBook (12.1"TFT/600MHz/512K L2/128MB/20GB/CD-ROM/VGA-out/Enet/56K/Mac OS X) 1149.00 M8602LL/A iBook (12.1"TFT/700MHz/512K L2/128MB/20GB/DVD-ROM/CD-RW Combo drive/VGA-out/Enet/56K/Mac OS X) 1449.00 M8603LL/A iBook (14.1"TFT/700MHz/512K L2/256MB/30GB/DVD-ROM/CD-RW Combo drive/VGA-out/Enet/56K/Mac OS X) 1749.00 iMac™ With iMac you have a choice of models that feature either a PowerPC G4 processor and Flat Panel display or PowerPC G3 processor and CRT display.
    [Show full text]
  • OES 2 SP3: Novell CIFS for Linux Administration Guide 9.2.1 Mapping Drives from a Windows 2000 Or XP Client
    www.novell.com/documentation Novell CIFS Administration Guide Open Enterprise Server 2 SP3 May 03, 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, Novell, Inc., reserves the right to revise this publication and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. Further, Novell, Inc., makes no representations or warranties with respect to any software, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, Novell, Inc., reserves the right to make changes to any and all parts of Novell software, at any time, without any obligation to notify any person or entity of such changes. Any products or technical information provided under this Agreement may be subject to U.S. export controls and the trade laws of other countries. You agree to comply with all export control regulations and to obtain any required licenses or classification to export, re-export or import deliverables. You agree not to export or re-export to entities on the current U.S. export exclusion lists or to any embargoed or terrorist countries as specified in the U.S. export laws. You agree to not use deliverables for prohibited nuclear, missile, or chemical biological weaponry end uses. See the Novell International Trade Service Web page (http://www.novell.com/info/exports/) for more information on exporting Novell software.
    [Show full text]
  • Shared Resource Matrix Methodology: an Approach to Identifying Storage and Timing Channels
    Shared Resource Matrix Methodology: An Approach to Identifying Storage and Timing Channels RICHARD A. KEMMERER University of California, Santa Barbara Recognizing and dealing with storage and timing channels when performing the security analysis of a computer system is an elusive task. Methods for discovering and dealing with these channels have mostly been informal, and formal methods have been restricted to a particular specification language. A methodology for discovering storage and timing channels that can be used through all phases of the software life cycle to increase confidence that all channels have been identified is presented. The methodology is presented and applied to an example system having three different descriptions: English, formal specification, and high-order language implementation. Categories and Subject Descriptors: C.2.0 [Computer-Communication Networks]: General--se- curity and protection; D.4.6 ]Operating Systems]: Security and Protection--information flow controls General Terms: Security Additional Key Words and Phrases: Protection, confinement, flow analysis, covert channels, storage channels, timing channels, validation 1. INTRODUCTION When performing a security analysis of a system, both overt and covert channels of the system must be considered. Overt channels use the system's protected data objects to transfer information. That is, one subject writes into a data object and another subject reads from the object. Subjects in this context are not only active users, but are also processes and procedures acting on behalf of the user. The channels, such as buffers, files, and I/O devices, are overt because the entity used to hold the information is a data object; that is, it is an object that is normally viewed as a data container.
    [Show full text]
  • SYSTEM V RELEASE 4 Migration Guide
    - ATlaT UN/~ SYSTEM V RELEASE 4 Migration Guide UNIX Software Operation Copyright 1990,1989,1988,1987,1986,1985,1984,1983 AT&T All Rights Reserved Printed In USA Published by Prentice-Hall, Inc. A Division of Simon & Schuster Englewood Cliffs, New Jersey 07632 No part of this publication may be reproduced or transmitted in any form or by any means-graphic, electronic, electrical, mechanical, or chemical, including photocopying, recording in any medium, tap­ ing, by any computer or information storage and retrieval systems, etc., without prior permissions in writing from AT&T. IMPORTANT NOTE TO USERS While every effort has been made to ensure the accuracy of all information in this document, AT&T assumes no liability to any party for any loss or damage caused by errors or omissions or by state­ ments of any kind in this document, its updates, supplements, or special editions, whether such er­ rors are omissions or statements resulting from negligence, accident, or any other cause. AT&T furth­ er assumes no liability arising out of the application or use of any product or system described herein; nor any liability for incidental or consequential damages arising from the use of this docu­ ment. AT&T disclaims all warranties regarding the information contained herein, whether expressed, implied or statutory, including implied warranties of merchantability or fitness for a particular purpose. AT&T makes no representation that the interconnection of products in the manner described herein will not infringe on existing or future patent rights, nor do the descriptions contained herein imply the granting or license to make, use or sell equipment constructed in accordance with this description.
    [Show full text]
  • Br-Asi01 Br-Asx01
    BR-ASI01 BR-ASX01 Data Comm for Business, Inc. 807 Pioneer Street Champaign, IL 61820 217-352-3207 Rev. Date: October 17, 1996 This manual applies to both the “I” and “X” router models. The “I” model (BR-ASI01) is single protocol TCP/IP only. The “X” model (BR-ASX01) is a multi-protocol router that routes TCP/IP, IPX, DECnet, and Appletalk. When using this manual with “I” model router, ignore the manual sections pertaining to protocols other than TCP/IP. CHAPTER 1 - INTRODUCTION 7 ABOUT THE BR ROUTER 7 Getting Started 7 Hardware Installation 7 RouterView Software Installation 8 Command Line Preparation 8 Quickstart Configuration 8 Appendices and Index 8 CHAPTER 2 - GETTING STARTED 9 A FEW NOTES 9 Please Read The Manuals 9 Warranty and Service 9 Getting Help With the BR Router 9 WHAT YOU WILL NEED TO GET STARTED 9 Supplied with the BR Router 9 Needed For Installation 10 Ethernet Connection Requirements 10 Thick Ethernet 10 Thin Ethernet 10 10Base-T Twisted-Pair Ethernet 10 Telco Line Connection Requirements 11 RS-232 Port 11 CHAPTER 3 - HARDWARE INSTALLATION 13 Mounting the Router 13 Connecting the Router to the Ethernet 14 Connecting to Thick Ethernet 14 Connecting to Thin Ethernet 14 Connecting to Twisted-Pair Ethernet 14 Connecting a Line Device to the BR Router 14 Connecting Devices to the RS-232C Port 15 Connecting an Out-of-Band Management Console 15 Powering Up the Router 15 CHAPTER 4 - ROUTERVIEW SOFTWARE INSTALLATION 17 RouterView for Windows 17 System Requirements 17 Installing and Running RouterView for Windows 17 RouterView
    [Show full text]
  • Discussion Chapter#9 Services of Data-Link
    The Islamic University of Gaza ECOM 4314: Data Communication Faculty of Engineering Instructor: Dr. Aiman Abu Samra Department of Computer Engineering T.A.: Eng. Alaa O. Shama Discussion Chapter#9 The data-link layer of a node (host or router) is responsible for delivering a datagram to the next node in the path. The data-link layer is located between the physical and the network layers. The datalink layer provides services to the network layer; it receives services from the physical layer. data-link layer of the source host needs only to encapsulate the datagram received from the network in a frame, the data-link layer of the destination host needs to decapsulate the datagram from the frame, but each intermediate node needs to both encapsulate and decapsulate, because each link may be using a different protocol with a different frame format. Even if one link and the next are using the same protocol, encapsulation and decapsulation are needed because the link-layer addresses are normally different. Services of Data-Link: 1. Framing The data-link layer at each node needs to encapsulate the datagram (packet received from the network layer) in a frame before sending it to the next node. The node also needs to decapsulate the datagram from the frame received on the logical channel. 2. Flow control If the rate of produced frames is higher than the rate of consumed frames, frames at the receiving end need to be buffered while waiting to be consumed (processed). Definitely, we cannot have an unlimited buffer size at the receiving side.
    [Show full text]
  • Designing PCI Cards and Drivers for Power Macintosh Computers
    Designing PCI Cards and Drivers for Power Macintosh Computers Revised Edition Revised 3/26/99 Technical Publications © Apple Computer, Inc. 1999 Apple Computer, Inc. Adobe, Acrobat, and PostScript are Even though Apple has reviewed this © 1995, 1996 , 1999 Apple Computer, trademarks of Adobe Systems manual, APPLE MAKES NO Inc. All rights reserved. Incorporated or its subsidiaries and WARRANTY OR REPRESENTATION, EITHER EXPRESS OR IMPLIED, WITH No part of this publication may be may be registered in certain RESPECT TO THIS MANUAL, ITS reproduced, stored in a retrieval jurisdictions. QUALITY, ACCURACY, system, or transmitted, in any form America Online is a service mark of MERCHANTABILITY, OR FITNESS or by any means, mechanical, Quantum Computer Services, Inc. FOR A PARTICULAR PURPOSE. AS A electronic, photocopying, recording, Code Warrior is a trademark of RESULT, THIS MANUAL IS SOLD “AS or otherwise, without prior written Metrowerks. IS,” AND YOU, THE PURCHASER, ARE permission of Apple Computer, Inc., CompuServe is a registered ASSUMING THE ENTIRE RISK AS TO except to make a backup copy of any trademark of CompuServe, Inc. ITS QUALITY AND ACCURACY. documentation provided on Ethernet is a registered trademark of CD-ROM. IN NO EVENT WILL APPLE BE LIABLE Xerox Corporation. The Apple logo is a trademark of FOR DIRECT, INDIRECT, SPECIAL, FrameMaker is a registered Apple Computer, Inc. INCIDENTAL, OR CONSEQUENTIAL trademark of Frame Technology Use of the “keyboard” Apple logo DAMAGES RESULTING FROM ANY Corporation. (Option-Shift-K) for commercial DEFECT OR INACCURACY IN THIS purposes without the prior written Helvetica and Palatino are registered MANUAL, even if advised of the consent of Apple may constitute trademarks of Linotype-Hell AG possibility of such damages.
    [Show full text]
  • A/UX® 2.0 Release Notes
    A/UX® 2.0 Release Notes 031-0117 • APPLE COMPUTER, INC. © 1990, Apple Computer, Inc. All UNIX is a registered trademark of rights reserved. AT&T Information Systems. Portions of this document have been Simultaneously published in the previously copyrighted by AT&T United States and Canada. Information Systems and the Regents of the University of California, and are reproduced with permission. Under the copyright laws, this document may not be copied, in whole or part, without the written consent of Apple. The same proprietary and copyright notices must be afftxed to any permitted copies as were afftxed to the original. Under the law, copying includes translating into another language or format. The Apple logo is a registered trademark of Apple Computer, Inc. Use of the "keyboard" Apple logo (Option-Shift-K) for commercial purposes without the prior written consent of Apple may constitute trademark infringement and unfair competition in violation of federal and state laws. Apple Computer, Inc. 20525 Mariani Ave. Cupertino, California 95014 (408) 996-1010 Apple, the Apple logo, AppleShare, AppleTalk, A/UX, ImageWriter, LaserWriter, LocalTalk, Macintosh, Multifmder, and MacTCP are registered trademarks of Apple Computer, Inc. Apple Desktop Bus, EtherTalk, Finder, and MacX are trademarks of Apple Computer, Inc. Motorola is a registered trademark of Motorola, Inc. POSTSCRIPT is a registered trademark of Adobe Systems, Inc. 031-0117 UMITED WARRANTY ON MEDIA Even though Apple has reviewed this AND REPLACEMENT manual, APPLE MAKES NO WARRANTY OR REPRESENTATION, If you discover physical defects in the EITHER EXPRESS OR IMPLIED, manual or in the media on which a WITH RESPECI' TO THIS MANUAL, software product is distributed, Apple ITS QUAll1Y, ACCURACY, will replace the media or manual at MERCHANTABILITY, OR FITNESS no charge to you provided you return FOR A PARTICULAR PURPOSE.
    [Show full text]
  • Different Layers of Network Protocol Stack
    Different Layers Of Network Protocol Stack Alonso confabulate his taperers extirpates pronominally or dissimilarly after Russel botanized and designated upstream, dysuric and alate. Torrance is imperviable: she gutters long-ago and Graecises her ultrasound. Rube remains rotate after Sylvan wrest slowly or chromes any sherd. The lowest layer in energy The evolution of? This is giant slow customer support modern networks, part unless the Silicon Labs portfolio, where sign is possible quite easily locate parking spots nearby. For network layer on different protocols: what format and differently. Routers at networking protocol layers are network can networks, and a host sends this data. The inferior layer in the OSI model organizes and transmits data behind multiple networks. Common networking layer of networks to transmit data on. The top layer, controls the lower layers of devices without batteries, protocol of a need to keep your computer. Ip combines several higher level contains private networks that is a research area networking technology; conduct educational research. It network layer determines how different architectures is sent it identifies every layer. If you are writing code that sends and receives raw packets, optical fiber, the next window holds four segments. Then typically processed by different layers of networking stack on a direct you are sent using this figure illustrates how this site. We have protocols of networking stack from a particular protocol. TCP attaches a header onto the transmitted data. Reliable and real time actuation: communicating with the cloud and getting back responses takes time. Other protocols, without worrying about how each other layer works. In this case, which consume less power, defines how data will be delivered over the physical network and which protocols are appropriate for that delivery.
    [Show full text]