TRILOGY2 D1.1 Software Platforms

Total Page:16

File Type:pdf, Size:1020Kb

TRILOGY2 D1.1 Software Platforms ICT-317756 TRILOGY2 Trilogy2: Building the Liquid Net Specific Targeted Research Project FP7 ICT Objective 1.1 – The Network of the Future D1.1 Software Platforms Due date of deliverable: 31 December 2013 Actual submission date: 3 January 2014 Start date of project 1 January 2012 Duration 36 months Lead contractor for this deliverable Universitatea Politehnica Bucuresti (UPB) Version v1.0, January 3, 2014 Confidentiality status Public c TRILOGY2 Consortium 2014 Page 1 of (128) Abstract This document captures the research carried in the first year of the Trilogy2 project related to the de- velopment of software platforms. It presents advances in the design, implementation and evaluation of tools which allow the creation of bandwidth, CPU and storage liquidity. Finally, the document con- cludes by describing the setup of a testbed that Trilogy2 partners are setting up in order to support liquidity experiments. Target Audience The target audience for this document is the networking research and development community, partic- ularly those with an interest in Future Internet technologies and architectures. The material should be accessible to any reader with a background in network architectures, including mobile, wireless, service operator and data centre networks. Disclaimer This document contains material, which is the copyright of certain TRILOGY2 consortium parties, and may not be reproduced or copied without permission. All TRILOGY2 consortium parties have agreed to the full publication of this document. The commercial use of any information contained in this document may require a license from the proprietor of that information. Neither the TRILOGY2 consortium as a whole, nor a certain party of the TRILOGY2 consortium warrant that the information contained in this document is capable of use, or that use of the information is free from risk, and accept no liability for loss or damage suffered by any person using this information. This document does not represent the opinion of the European Community, and the European Community is not responsible for any use that might be made of its content. Impressum Full project title TRILOGY2: Building the Liquid Net Title of the workpackage D1.1 Software Platforms Editor Alexandru Agache, UPB Project Co-ordinator Marcelo Bagnulo Braun, UC3M Copyright notice c 2014 Participants in project TRILOGY2 Page 2 of (128) c TRILOGY2 Consortium 2014 Executive Summary This document describes various software platforms developed for the Trilogy2 project which allow pooling of resources such as bandwidth, CPU and storage. Where possible, it also provides experimental results showing the extent to which liquidity can be created and deals with important topics such as performance and security. In terms of bandwidth liquidity, we present two mechanisms, Multipath TCP and Polyversal TCP. The section on bandwidth liquidity starts by tackling three important aspects of Multipath TCP. The first is an evaluation of performance based on executing controlled experiments with MPTCP under the influence of factors such as capacity, queuing and propagation delay, loss and congestion control. The goal of these experiments is to verify if MPTCP can achieve its goals of improving throughput and balancing congestion. The results show this is possible and also provide further insight on the influence that various parameters and network phenomena have on MPTCP performance. The second deals with MPTCP security, and proposes a set of improvements. A residual threat analysis reveals a number of possible attacks, describes the prerequisite steps and information required in order to enact them, and establishes their relative threat level. Multiple security enhancements are proposed to address each shortcoming, and an outline describes the steps that will be taken as future work. The third aspect related to MPTCP is the exploration of novel use cases. We propose to use it to explicitly include middleboxes in MPTCP connections. This mechanism accommodates several widely encountered use cases, including load balancing, DDoS filtering and anycast services. We also show how MPTCP can be used in mobile devices to improve cellular connectivity. Polyversal TCP (PVTCP), the next topic of this section, provides a mean to enable liquidity across different transports. It is based on the argument that sockets are an ossified and monolithic construct. They currently fail to take into account the actual context where communication takes place, and this has a less than ideal effect on entities running in tightly coupled contexts, such as processes which find themselves running on the same machine. A polyversal network stack seeks to select the best underlying communication mechanism, while shielding the application from unnecessary details. This allows PVTCP to pool the bandwidth of different available communication avenues not limited to a single transport. We rely on virtualization as a key concept to achieve processing liquidity. We work on two flavors of CPU liquidity, one in mobiles and another one in network functions. The first mechanism for creating CPU liq- uidity presented in this document deals with virtual machine migration for mobile devices. They have been rapidly adopted by users but continue to lack a unified user experience. The goal is to transfer running apps and data between mobile devices running Android without changing the app state and preserving its network connectivity. The virtualization support can be used as a layer that separates data and applications from the environment of the mobile device. The other topic concerning CPU liquidity and efficient scaling is an ex- ample of turning specialized hardware middleboxes into one or multiple virtualized sofware devices that can run on inexpensive commodity hardware. We have used this paradigm for two key components of an ISP c TRILOGY2 Consortium 2014 Page 3 of (128) network: the Broadband Remote Access Server (BRAS) and the Customer Provider Edge (CPE). A proof-of- concept implementation based on a lightweight Xen virtual machine for the BRAS case is presented, together with performance evaluation results. The first mechanism that enables storage liquidity presented in this document is Irminsule, a Database-as- a-Service (DBaaS) solution focused on distributed storage, which presents a file-system layer solution for distributing data. It has the ability to checkpoint everything in independent branches and allows the rollback of entire distributed clusters. Storage liquidity is also enabled by Trevi, which uses fountain coding to tackle the distributed storage problem. Trevi represents a radical departure from what is currently the state of the art, by being free of TCP and incorporating fountain codes to multicast striped blobs across storage nodes. It does not require changes to the network stack or any network protocol. It is currently under implementation, and uses UDP or even raw Ethernet frames for network communication. The final section of this document summarizes the implementation work done in the project and presents the testbed created with the concerted effort of multiple Trilogy2 partners. A description of the current hardware infrastructure is provided, together with details related to authorization and guidelines regarding the use of servers. Page 4 of (128) c TRILOGY2 Consortium 2014 List of Authors Authors Alexandru Agache, Pedro Aranda, Mohamed Ahmed, Marcelo Bagnulo, Giacomo Bernini, Gino Carrozzo, Julian Chesterfield, Jon Crowcroft, Rares, Dumitrescu, Felipe Huici, Valentin Ilie, Anil Madhapeddy, Joao Martins, George Milescu, Cat˘ alin˘ Moraru, Dragos, Niculescu, Cat˘ alin˘ Nicut,ar, Christoph Paasch, Costin Raiciu, John Thomson Participants Intel, NEC, NXW, OnApp, TID, UC3M, UCAM, UCL-BE, UPB Work-package WP1 Security Public (PU) Nature R Version 1.0 Total number of pages 128 c TRILOGY2 Consortium 2014 Page 5 of (128) Contents Executive Summary 3 List of Authors 5 List of Figures 10 List of Tables 12 Acronyms 13 1 Introduction 14 1.1 Motivation............................................ 14 1.2 A brief guide to the T2 architecture and the first set of deliverables.............. 15 1.3 Deliverable outline ....................................... 16 2 Bandwidth Liquidity 17 2.1 MPTCP............................................. 17 2.1.1 Evaluating MPTCP’s resource-pooling ........................ 17 2.1.1.1 Experimental Design ............................ 18 2.1.1.2 Experimenting with MPTCP ........................ 19 2.1.1.3 Evaluation.................................. 21 2.1.1.4 Sensitivity Analysis............................. 26 2.1.2 MPTCP security improvements ............................ 26 2.1.2.1 ADD ADDR attack............................. 28 2.1.2.2 DoS attack on MP JOIN........................... 32 2.1.2.3 SYN flooding amplification......................... 32 2.1.2.4 Eavesdropper in the initial handshake.................... 33 2.1.2.5 SYN/JOIN attack .............................. 34 2.1.2.6 Next steps.................................. 34 2.1.3 New MPTCP use cases................................. 35 2.1.3.1 Integrating middleboxes with MPTCP ................... 35 2.1.3.2 Improving cellular connectivity with the Mobile Kibbutz ......... 45 2.2 Polyversal TCP......................................... 65 2.2.1 Related work...................................... 66 2.2.1.1 Name based sockets............................. 66 2.2.1.2 Protocol independent transport API..................... 66 Page 6 of (128) c TRILOGY2 Consortium 2014 2.2.1.3 ZeroMQ..................................
Recommended publications
  • The Challenges of Dynamic Network Interfaces
    The Challenges of Dynamic Network Interfaces by Brooks Davis brooks@{aero,FreeBSD}.org The Aerospace Corporation The FreeBSD Project EuroBSDCon 2004 October 29-31, 2004 Karlsruhe, Germany Introduction ● History of Dynamic Interfaces ● Problems ● Possible Solutions ● Advice to Implementors ● Future Work Early UNIX ● Totally static. ● All devices must be compiled in to kernel ● Fast and easy to program ● Difficult to maintain as the number of devices grows Autoconfiguration ● Introduced in 4.1BSD (June 1981) ● One kernel can serve multiple hardware configurations ● Probe – Test for existence of devices, either using stored addresses or matching devices on self-identifying buses ● Attach – Allocate a driver instance (as of 6.0, this must be fully dynamic) Kernel Modules ● Allows drivers to be added at run time ● LKM (Loadable Kernel Modules) – Introduced in 2.0 by Terry Lambert – Modeled after the facility in SunOS ● KLD (dynamic kernel linker) – Introduced along with newbus in 3.0 by Doug Rabson – Added a generic if_detach() function PC Card & CardBus ● Initial PC Card (PCMCIA) support via PAO in 2.0 ● Fairly good support in 3.0 ● Most PAO changes merged in 4.0 – PAO development ceased ● CardBus support in 5.0 Other Removable Devices ● USB Ethernet (4.0) ● Firewire (fwe(4) in 4.8, fwip(4) in 5.3) ● Bluetooth (5.2) ● Hot plug PCI ● Compact PCI ● PCI Express ● Express Card Netgraph ● Node implement network functions ● Arbitrary connection of nodes allowed ● ng_iface(4) node creates interfaces on demand Interface Cloning ● Handles most pseudo
    [Show full text]
  • Introduzione Al Mondo Freebsd
    Introduzione al mondo FreeBSD Corso avanzato Netstudent Netstudent http://netstudent.polito.it E.Richiardone [email protected] maggio 2009 CC-by http://creativecommons.org/licenses/by/2.5/it/ The FreeBSD project - 1 ·EÁ un progetto software open in parte finanziato ·Lo scopo eÁ mantenere e sviluppare il sistema operativo FreeBSD ·Nasce su CDROM come FreeBSD 1.0 nel 1993 ·Deriva da un patchkit per 386BSD, eredita codice da UNIX versione Berkeley 1977 ·Per problemi legali subisce un rallentamento, release 2.0 nel 1995 con codice royalty-free ·Dalla release 5.0 (2003) assume la struttura che ha oggi ·Disponibile per x86 32 e 64bit, ia64, MIPS, ppc, sparc... ·La mascotte (Beastie) nasce nel 1984 The FreeBSD project - 2 ·Erede di 4.4BSD (eÁ la stessa gente...) ·Sistema stabile; sviluppo uniforme; codice molto chiaro, ordinato e ben commentato ·Documentazione ufficiale ben curata ·Licenza molto permissiva, spesso attrae aziende per progetti commerciali: ·saltuariamente esterni collaborano con implementazioni ex-novo (i.e. Intel, GEOM, atheros, NDISwrapper, ZFS) ·a volte no (i.e. Windows NT) ·Semplificazione di molte caratteristiche tradizionali UNIX Di cosa si tratta Il progetto FreeBSD include: ·Un sistema base ·Bootloader, kernel, moduli, librerie di base, comandi e utility di base, servizi tradizionali ·Sorgenti completi in /usr/src (~500MB) ·EÁ giaÁ abbastanza completo (i.e. ipfw, ppp, bind, ...) ·Un sistema di gestione per software aggiuntivo ·Ports e packages ·Documentazione, canali di assistenza, strumenti di sviluppo ·i.e. Handbook,
    [Show full text]
  • Microsoft DNS
    1 a. Domain Name Service (DNS) encompassing Microsoft DNS From Wikipedia, the free encyclopedia Jump to: navigation, search Microsoft DNS is the name given to the implementation of domain name system services provided in Microsoft Windows operating systems. Contents [hide] 1 Overview 2 DNS lookup client o 2.1 The effects of running the DNS Client service o 2.2 Differences from other systems 3 Dynamic DNS Update client 4 DNS server o 4.1 Common issues 5 See also 6 References 7 External links [edit] Overview The Domain Name System support in Microsoft Windows NT, and thus its derivatives Windows 2000, Windows XP, and Windows Server 2003, comprises two clients and a server. Every Microsoft Windows machine has a DNS lookup client, to perform ordinary DNS lookups. Some machines have a Dynamic DNS client, to perform Dynamic DNS Update transactions, registering the machines' names and IP addresses. Some machines run a DNS server, to publish DNS data, to service DNS lookup requests from DNS lookup clients, and to service DNS update requests from DNS update clients. The server software is only supplied with the server versions of Windows. [edit] DNS lookup client Applications perform DNS lookups with the aid of a DLL. They call library functions in the DLL, which in turn handle all communications with DNS servers (over UDP or TCP) and return the final results of the lookup back to the applications. 2 Microsoft's DNS client also has optional support for local caching, in the form of a DNS Client service (also known as DNSCACHE). Before they attempt to directly communicate with DNS servers, the library routines first attempt to make a local IPC connection to the DNS Client service on the machine.
    [Show full text]
  • The Challenges of Dynamic Network Interfaces
    The Challenges of Dynamic Network Interfaces Brooks Davis The FreeBSD Project Seattle, WA brooks@{aero,FreeBSD}.org Abstract vices to the modern age of near complete dynamism. Following this history, the problems caused by this dynamism are discussed in detail. Then solutions to On early BSD systems, network interfaces were some of these problems are proposed and analyzed, static objects created at kernel compile time. To- and advice to implementers of userland applications day the situation has changed dramatically. PC is given. Finally, the issues are summarized and fu- Card, USB, and other removable buses allow hard- ture work is discussed. ware interfaces to arrive and depart at run time. Pseudo-device cloning also allows pseudo-devices to be created dynamically. Additionally, in FreeBSD and Dragonfly, interfaces can be renamed by the ad- 2 History ministrator. With these changes, interfaces are now dynamic objects which may appear, change, or dis- appear at any time. This dynamism invalidates a In early versions of UNIX, the exact set of devices number of assumptions that have been made in the on the system had to be compiled in to the kernel. If kernel, in external programs, and even in standards the administrator attempted to use a device which such as SNMP. This paper explores the history of was compiled in, but not installed, a panic or hang the transition of network interfaces from static to dy- was nearly certain. This system was easy to pro- namic. Issues raised by these changes are discussed gram and efficient to execute. Unfortunately, it was and possible solutions suggested.
    [Show full text]
  • PC-BSD 9 Turns a New Page
    CONTENTS Dear Readers, Here is the November issue. We are happy that we didn’t make you wait for it as long as for October one. Thanks to contributors and supporters we are back and ready to give you some usefull piece of knowledge. We hope you will Editor in Chief: Patrycja Przybyłowicz enjoy it as much as we did by creating the magazine. [email protected] The opening text will tell you What’s New in BSD world. It’s a review of PC-BSD 9 by Mark VonFange. Good reading, Contributing: especially for PC-BSD users. Next in section Get Started you Mark VonFange, Toby Richards, Kris Moore, Lars R. Noldan, will �nd a great piece for novice – A Beginner’s Guide To PF Rob Somerville, Erwin Kooi, Paul McMath, Bill Harris, Jeroen van Nieuwenhuizen by Toby Richards. In Developers Corner Kris Moore will teach you how to set up and maintain your own repository on a Proofreaders: FreeBSD system. It’s a must read for eager learners. Tristan Karstens, Barry Grumbine, Zander Hill, The How To section in this issue is for those who enjoy Christopher J. Umina experimenting. Speed Daemons by Lars R Noldan is a very good and practical text. By reading it you can learn Special Thanks: how to build a highly available web application server Denise Ebery with advanced networking mechanisms in FreeBSD. The Art Director: following article is the �nal one of our GIS series. The author Ireneusz Pogroszewski will explain how to successfully manage and commission a DTP: complex GIS project.
    [Show full text]
  • Absolute BSD—The Ultimate Guide to Freebsd Table of Contents Absolute BSD—The Ultimate Guide to Freebsd
    Absolute BSD—The Ultimate Guide to FreeBSD Table of Contents Absolute BSD—The Ultimate Guide to FreeBSD............................................................................1 Dedication..........................................................................................................................................3 Foreword............................................................................................................................................4 Introduction........................................................................................................................................5 What Is FreeBSD?...................................................................................................................5 How Did FreeBSD Get Here?..................................................................................................5 The BSD License: BSD Goes Public.......................................................................................6 The Birth of Modern FreeBSD.................................................................................................6 FreeBSD Development............................................................................................................7 Committers.........................................................................................................................7 Contributors........................................................................................................................8 Users..................................................................................................................................8
    [Show full text]
  • Governance Structures of Free/Open Source Software Development
    Uitnodiging GOVERNANCE STRUCTURES OF FREE/OPEN 51 SOURCE SOFTWARE DEVELOPMENT Voor het bijwonen van de George Dafermos openbare verdediging van het Modularity theory makes a compelling argument: modular product design increases the potential number of persons that could work on a distributed project and has a positive effect proefschrift: on their labour productivity because it allows them to work independently of each other, with little or no need for central coordination. This doctoral dissertation sets out to put this argument to the test by studying a phenomenon that combines both scale and modularity: Governance Structures Free and open source software (FOSS) development. Its central question is: Does modularity mitigate the adverse effects of increasing scale in FOSS development? of Free/Open Source Software Development In exploring the effect of modularity and increasing scale on the dynamic of development of FreeBSD, a large and well-known FOSS project, over a period of fifteen years, the dissertation addresses several related empirical issues: How are FOSS projects organised? How are they governed? And most interestingly, how do they manage increasing scale? Does their ability to self-organise diminish as they grow larger, thereby necessitating hierarchical coordination? Op maandag 10 december 2012 om 15 uur precies in de Frans Source Software Development Source Software Governance Structures of Free/Open van Hasseltzaal van de Aula van de Technische Universiteit Delft, Mekelweg 5 te Delft The Next Generation Infrastructures Foundation George Dafermos represents an international consortium of knowledge institutions, market players and governmental bodies, which joined forces to cope with the challenges faced Governance Structures by today’s and tomorrow’s infrastructure systems.
    [Show full text]
  • Netmap: a Novel Framework for Fast Packet I/O
    netmap: a novel framework for fast packet I/O Luigi Rizzo,∗ Universita` di Pisa, Italy Abstract high rate raw packet I/O required by these applica- tions is not the intended target of general purpose OSes. Many applications (routers, traffic monitors, firewalls, Raw sockets, the Berkeley Packet Filter [14] (BPF), the etc.) need to send and receive packets at line rate even on AF SOCKET family, and equivalent APIs have been very fast links. In this paper we present netmap, a novel used to build all sorts of network monitors, traffic gen- framework that enables commodity operating systems erators, and generic routing systems. Performance, how- to handle the millions of packets per seconds traversing ever, is inadequate for the millions of packets per sec- 1..10 Gbit/s links, without requiring custom hardware or ond (pps) that can be present on 1..10 Gbit/s links. In changes to applications. search of better performance, some systems (see Sec- In building netmap, we identified and successfully re- tion 3) either run completely in the kernel, or bypass the duced or removed three main packet processing costs: device driver and the entire network stack by exposing per-packet dynamic memory allocations, removed by the NIC’s data structures to user space applications. Ef- preallocating resources; system call overheads, amor- ficient as they may be, many of these approaches depend tized over large batches; and memory copies, elimi- on specific hardware features, give unprotected access to nated by sharing buffers and metadata between kernel hardware, or are poorly integrated with the existing OS and userspace, while still protecting access to device reg- primitives.
    [Show full text]
  • Network Stack Virtualization for Freebsd 7.0 Marko
    Network stack virtualization for FreeBSD 7.0 Marko Zec [email protected] University of Zagreb September 2007. Network stack virtualization for FreeBSD 7.0 slide 1 of 64 Tutorial outline ● Network stack virtualization concepts ● Management interface ● Application scenarios ● Implementation in FreeBSD 7.0 kernel Network stack virtualization for FreeBSD 7.0 slide 2 of 64 Tutorial outline ● Hands-on work encouraged! ● Bootable system image alternatives: – USB stick – LiveCD – VMWare player image ● Neither option will touch anything on your HD ● If already running a recent 7.0-CURRENT, you'll need to copy the kernel from the stick or CD, or compile your own Network stack virtualization for FreeBSD 7.0 slide 3 of 64 Tutorial outline ● Virtualized networking == preview technology – What we learn / try out today might look different in 3 months, particularly the management API – Your input may influence the final version of the virtualization framework ● Do not hesitate to ask questions! Network stack virtualization for FreeBSD 7.0 slide 4 of 64 Server virtualization: two sides of the spectrum VM #1 VM #2 Applications Applications VM #1 VM #2 Operating System Operating System Applications Applications Virtual Machine Virtual Machine Private Resources Private Resources (network, CPU...) (network, CPU...) Virtual Machine Monitor Operating System Physical Machine Physical Machine Strong isolation model Efficient resource utilization Independent OS instances No extra I/O overhead VM migration possible Scaling Network stack virtualization for FreeBSD 7.0
    [Show full text]
  • Network Working Group T. Pauly Internet-Draft Apple Inc
    Network Working Group T. Pauly Internet-Draft Apple Inc. Intended status: Informational C. Perkins Expires: September 6, 2018 University of Glasgow K. Rose Akamai Technologies, Inc. C. Wood Apple Inc. March 05, 2018 A Survey of Transport Security Protocols draft-pauly-taps-transport-security-02 Abstract This document provides a survey of commonly used or notable network security protocols, with a focus on how they interact and integrate with applications and transport protocols. Its goal is to supplement efforts to define and catalog transport services [RFC8095] by describing the interfaces required to add security protocols. It examines Transport Layer Security (TLS), Datagram Transport Layer Security (DTLS), Quick UDP Internet Connections with TLS (QUIC + TLS), MinimalT, CurveCP, tcpcrypt, Internet Key Exchange with Encapsulating Security Protocol (IKEv2 + ESP), SRTP (with DTLS), and WireGuard. This survey is not limited to protocols developed within the scope or context of the IETF. Status of This Memo This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet- Drafts is at https://datatracker.ietf.org/drafts/current/. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." This Internet-Draft will expire on September 6, 2018.
    [Show full text]
  • Introduzione Al Mondo Freebsd Corso Avanzato
    Introduzione al mondo FreeBSD corso Avanzato •Struttura •Installazione •Configurazione •I ports •Gestione •Netstudent http://netstudent.polito.it •E.Richiardone [email protected] •Novembre 2012 •CC-by http://creativecommons.org/licenses/by/3.0/it/ The FreeBSD project - 1 • E` un progetto software open • Lo scopo e` mantenere e sviluppare il sistema operativo FreeBSD • Nasce su CDROM come FreeBSD 1.0 nel 1993 • Deriva da un patchkit per 386BSD, eredita codice da UNIX versione Berkeley 1977 • Per problemi legali subisce un rallentamento, release 2.0 nel 1995 con codice royalty-free • Dalla release 4.0 (2000) assume la struttura che ha oggi • Disponibile per x86 32 e 64bit, ia64, MIPS, ppc, sparc... • La mascotte (Beastie) nasce nel 1984 The FreeBSD project - 2 • Erede di 4.4BSD (e` la stessa gente...) • Sistema stabile; sviluppo uniforme; codice molto chiaro, ordinato e ben commentato • Documentazione ufficiale ben curata • Licenza molto permissiva, spesso attrae aziende per progetti commerciali: • saltuariamente progetti collaborano con implementazioni ex-novo (i.e. Intel, GEOM, NDISwrapper, ZFS, GNU/Linux emulation) • Semplificazione di molte caratteristiche tradizionali UNIX Di cosa si tratta Il progetto FreeBSD include: • Un sistema base • Bootloader, kernel, moduli, librerie di base, comandi e utility di base, servizi tradizionali • Sorgenti completi in /usr/src (~500MB) • E` gia` completo (i.e. ipfw, ppp, bind, ...) • Un sistema di gestione per software aggiuntivo • Ports e packages • Documentazione, canali di assistenza, strumenti
    [Show full text]
  • IRIX® Admin: Networking and Mail (日本語版)
    IRIX® Admin: Networking and Mail (日本語版) ドキュメント番号 007-2860-007JP 編集協力者 執筆 Arthur Evans、Jeffrey B. Zurschmeide 改訂 Pam Sogard、Helen Vanderberg、Bob Bernard、Terry Schultz、Julie Boney 編集 Christina Cary、Cindy Kleinfeld、Susan Wilkening 制作 Amy Swenson、Glen Traefald、Karen Jacobson 技術協力 Scott Henry、Carlin Otto、Kam Kashani、Chris Wagner、Paul Mielke、Robert Stephens、Joe Yetter、Gretchen Helms、John Schimmel、 Robert Mende、Vernon Schryver、 Michael Nelson、Landon Noll イラスト Dany Galgani 本書の著作権について © 1996 - 2002 Silicon Graphics, Inc. All Rights Reserved. このマニュアルには下記の商標・著作に関する注意にある通り、サード・パーティが著作権を保有して いる部分が含まれます。本書の内容の一部あるいは全部について(ソフトウェアを含む)、Silicon Graphics, Inc. から事前に文書による明確な許諾を得ず、いか なる形態においても複写、複製することは禁じられております。 LIMITED AND RESTRICTED RIGHTS LEGEND The electronic (software) version of this document was developed at private expense; if acquired under an agreement with the USA government or any contractor thereto, it is acquired as "commercial computer software" subject to the provisions of its applicable license agreement, as specified in (a) 48 CFR 12.212 of the FAR; or, if acquired for Department of Defense units, (b) 48 CFR 227-7202 of the DoD FAR Supplement; or sections succeeding thereto. Contractor/manufacturer is Silicon Graphics, Inc., 1600 Amphitheatre Pkwy 2E, Mountain View, CA 94043-1351, USA. 商標・著作 IRIX および IRIS は、Silicon Graphics, Inc. の登録商標であり、4DDN、4DLT、Challenge、CHALLENGE、FDDI Visualyzer、IRIS InSight、IRIX NetWorker、 IRIS 4D、NetVisualyzer、Onyx、SGI、および SGI ロゴは、Silicon Graphics, Inc. の商標です。DSI は、Digicom Systems, Inc. の商標です。FLEXlm は、GLOBEtrotter Software, Inc の登録商標です。Hayes は、Hayes Microcomputer Products, Inc. の登録商標です。IBM 3270 は、International Business Machines, Inc. の商標で す。Intel は、Intel Corporation の登録商標です。Macintosh は、Apple Computer Corporation の登録商標です。MS-DOS は、Microsoft Corporation の登録商標 です。Sun と RPC は、Sun Microsystems, Inc.
    [Show full text]