Token Ring Converse with with UNIX and Every Other Operating Media

Total Page:16

File Type:pdf, Size:1020Kb

Token Ring Converse with with UNIX and Every Other Operating Media Introduction Who Should Read This Book? To the computer semi-literate, the administrator is “the source.” He is the person who knows everything that there is to know about computers and networking. LAN adminis- trators like this reputation and, where novice users are concerned, it is not difficult to maintain. As more and more people begin to see computing as a way of life, however, the knowledge required for the administrator to maintain her reputation for omnipo- tence is increasing at a rapid rate. That’s where this book comes in. It may just be a casual question from a user, regarding something that he saw on his monitor, like “What does IPX stand for, anyway?” It may be a practical complaint, like “Why can’t I print from my Macintosh to the laser printer near my desk, rather than walking all the way over to Marketing, where the Apple printers are?” Given the way in which computing and the Internet has invaded the mainstream media, it may be a guy from Sales, who has a computer at home, stopping by your office, sticking his head in the door and saying, “Hey, what’s the difference between a SLIP and a PPP connection?” Or, worst of all, it may be your boss, telling you that “I want us to be on the Internet by the end of the month.” Whatever the case, there is going to be, at some point, something that you don’t know or that you can’t handle, and when it comes to networking, this book is designed to be the first place for the LAN administrator to go for information. Product manuals give you the “How?” This book is about the “What?” and the “Why?” For instructions on how to install a stand-alone printer on your network, you go to a product manual. You have already made the decisions as to what kind of printer to buy and what kind of network connection you are going to use. This book is designed to help you in making those decisions. Its value comes earlier in the process, when you are asking the most basic questions, like “How can I provide printing services to the greatest number of different clients, with the fewest administration headaches, for the least amount of money?” What Are the Main Objectives of This Book? You may be the new LAN Administrator at a company, faced with a lot of equipment with which you are unfamiliar. This book can help you get up to speed. You may be working for a growing company that wants to expand its computing services around the office, around the building, the country, or the world. This book is the first step, telling Introduction you what is involved in a certain procedure, providing you with information that will be useful in talking to salespeople and evaluating products and pointing you in the right direction for the next step in the process. This is the age of the heterogeneous network. Computers and LANs that may have been installed as separate systems are now being interconnected to provide uniform access to hardware and information resources and to simplify administration and maintenance. A company may be in the process of phasing out their mainframe systems and replacing them with LANs. In the interim, however, the two will have to be connected. The ben- efits of connecting a company’s remote offices and traveling personnel to a central information source are now widely recognized, and the technology has been developed to make this practice logistically and economically feasible. The vast resources of the Internet are rapidly becoming a fixture, not only in offices but in private homes as well. It is very likely that, within five to ten years, Internet connections will be as common as telephones and televisions. To the non-technical corporate management, a LAN administrator is expected to know something about all of these things. Telecommunications, cable installation, electrical engineering, systems analysis, project management, and technical training are just some of the disciplines involved. We’ve come a long way from the time when a person could learn how to use DOS, take a few NetWare courses, and hang out her shingle as a net- work administrator. Unfortunately, in most companies, management has little concep- tion of the true breadth of knowledge required to cover all of these divergent needs. A typical network administrator may know a great deal about some of these disciplines, a little about all of them, or even nothing about any of them, in some cases. For every practitioner, in every profession, there are elements of his field about which he is expected to know but doesn’t. Most are aware of it, and some are even smug about it (I once met a Professor of English Literature who admitted to having never read Hamlet!). The LAN administrator is no different, and the savvy ones are those who have arrived at the point when faced with a subject that they have heard of and should be familiar with, but aren’t, will nod their heads knowingly, promise to look into the situation, and then read up on it at the next opportunity. This is the book that they should turn to first. Will it tell them absolutely everything that they need to know? Of course not. A single work that covered every aspect of modern computer networking would be the size of the Encyclopedia Britannica and would have to be revised at least once a week. The field is growing and developing at an incredibly rapid rate, and a network administrator must continuously expand and update his knowledge in order to remain current. That is why great pains have been taken in this book to cover the latest developments in the net- working industry. You will find information on a great many of the new technologies that are just entering into general use or are soon to be so. We are not talking about speculative possibilities, though, but concrete products and services that exist in the real world and not just on a drawing board. What Should You Get Out of This Book? No one can predict whether or not an emerging technology will become a networking standard. That is as much a question about marketing as it is about the technology itself. Keeping current in today’s networking industry consists largely of anticipating new trends and making sensible judgments as to when (or if) it would be safe, practical, and economical to adopt them for use at your network installation. Those who judge wisely, remain employed. Those who don’t, usually end up making a big mess that must be cleaned up by the next administrator. Unfortunately, a good portion of the effort de- voted to the development of an emerging technology is expended on devising ways to convince you that this product or service is the one that you need and that, until you have it, you will never be up to speed with the industry. We hope, in this book, to sepa- rate the publicity from the facts and provide you with more of the latter than the former. What Should You Get Out of This Book? Computer networking, and indeed computing in general, is about communications. To accomplish even the simplest task using a computer, literally dozens of different forms of electronic signaling and communications are used by the various components involved. People speak of this as the digital age and of binary code as the fundamental communi- cations medium for all computers, everywhere. But how do the zeroes and ones get from one place to another? Just as you can telescope in on a video, audio, or textual format to see its binary code, you can zoom in even farther and look at how electrical currents or light pulses are used to make up the binary format. Many people know a lot about computers, but no one person knows everything about them. From the microscopic inner workings of a microprocessor to the sealed environ- ment where magnetic particles store data on the platters of a hard disk drive all the way up to the microwave and satellite technologies used to transmit data between computers located thousands or even millions of miles apart, the variety and complexity of the signaling and communications techniques involved in networking is colossal in scope. You don’t need to know how to design a microprocessor to purchase a computer. You don’t need to know how to build a space shuttle to bounce a signal off of a satellite. Indeed, you probably do both more frequently than you think, without even knowing it. But there may well be times when you want to know something about what goes on within these “transparent” systems. When you are charged with making a decision as to which processor to have in the thousand computers that your company may be purchas- ing this year, it is good to know something more about the subject than you would nor- mally get in a magazine ad or a TV commercial. That’s what this book is for. The more that you know about the inner workings of a com- puter or a network, the more sense can be made from its outside manifestations, and your troubleshooting skills become that much more acute as a result. Introduction No one is expected to sit down and read a book like this, from cover to cover. It is more likely to be used as a point of reference, a background source that examines most of the tasks that are likely to be asked of a network administrator as well as most of the technol- ogy with which he comes into daily contact.

  1195
Recommended publications
  • STATEMENT of WORK: SGS File System
    ATTACHMENT A STATEMENT OF WORK: SGS File System DOE National Nuclear Security Administration & the DOD Maryland Office April 25, 2001 File Systems SOW April 25, 2001 Table of Contents TABLE OF CONTENTS ..................................................................................................................................2 1.0 OVERVIEW.................................................................................................................................................4 1.1 INTRODUCTION ..........................................................................................................................................4 2.0 MOTIVATION ............................................................................................................................................5 2.1 THE NEED FOR IMPROVED FILE SYSTEMS .................................................................................................5 2.2 I/O CHARACTERIZATION OF IMPORTANT APPLICATIONS...........................................................................6 2.3 CURRENT AND PROJECTED ENVIRONMENTS AT LLNL, LANL, SANDIA, AND THE DOD .........................6 2.4 SUMMARY OF FIVE TECHNOLOGY CATEGORIES ........................................................................................9 3.0 MINIMUM REQUIREMENTS (GO/NO-GO CRITERIA)..................................................................12 3.1 POSIX-LIKE INTERFACE [MANDATORY]........................................................................................12 3.2 INTEGRATION
    [Show full text]
  • Deliverable D2.2 TERRANOVA System Architecture Work Package 2 - System Requirements, Concept and Architecture
    Ref. Ares(2018)1364959 - 13/03/2018 D2.2 – TERRANOVA system architecture This project has received funding from Horizon 2020, European Union’s Framework Programme for Research and Innovation, under grant agreement No. 761794 Deliverable D2.2 TERRANOVA system architecture Work Package 2 - System Requirements, Concept and Architecture TERRANOVA Project Grant Agreement No. 761794 Call: H2020-ICT-2016-2 Topic: ICT-09-2017 - Networking research beyond 5G Start date of the project: 1 July 2017 Duration of the project: 30 months TERRANOVA Project Page 1 of 116 D2.2 – TERRANOVA system architecture Disclaimer This document contains material, which is the copyright of certain TERRANOVA contractors, and may not be reproduced or copied without permission. All TERRANOVA consortium partners have agreed to the full publication of this document. The commercial use of any information contained in this document may require a license from the proprietor of that information. The reproduction of this document or of parts of it requires an agreement with the proprietor of that information. The document must be referenced if used in a publication. The TERRANOVA consortium consists of the following partners. No. Name Short Name Country 1 University of Piraeus Research Center UPRC Greece (Coordinator) 2 Fraunhofer Gesellschaft (FhG-HHI & FhG-IAF) FhG Germany 3 Intracom Telecom ICOM Greece 4 University of Oulu UOULU Finland 5 JCP-Connect JCP-C France 6 Altice Labs ALB Portugal 7 PICAdvanced PIC Portugal TERRANOVA Project Page 2 of 116 D2.2 – TERRANOVA system architecture Document Information Project short name and number TERRANOVA (653355) Work package WP2 Number D2.2 Title TERRANOVA system architecture Version v1.0 Responsible unit FhG Involved units JCP-C, FhG, ICOM, UOULU, UPRC, ALB, PIC Type1 R Dissemination level2 PU Contractual date of delivery 28.02.2018 Last update 12.03.2018 1 Types.
    [Show full text]
  • Introduction to Computer Concepts
    MANAGING PUBLIC SECTOR RECORDS A Training Programme Understanding Computers: An Overview for Records and Archives Staff INTERNATIONAL INTERNATIONAL RECORDS COUNCIL ON ARCHIVES MANAGEMENT TRUST MANAGING PUBLIC SECTOR RECORDS: A STUDY PROGRAMME UNDERSTANDING COMPUTERS: AN OVERVIEW FOR RECORDS AND ARCHIVES STAFF MANAGING PUBLIC SECTOR RECORDS A STUDY PROGRAMME General Editor, Michael Roper; Managing Editor, Laura Millar UNDERSTANDING COMPUTERS: AN OVERVIEW FOR RECORDS AND ARCHIVES STAFF INTERNATIONAL RECORDS INTERNATIONAL MANAGEMENT TRUST COUNCIL ON ARCHIVES MANAGING PUBLIC SECTOR RECORDS: A STUDY PROGRAMME Understanding Computers: An Overview for Records and Archives Staff © International Records Management Trust, 1999. Reproduction in whole or in part, without the express written permission of the International Records Management Trust, is strictly prohibited. Produced by the International Records Management Trust 12 John Street London WC1N 2EB UK Printed in the United Kingdom. Inquiries concerning reproduction or rights and requests for additional training materials should be addressed to International Records Management Trust 12 John Street London WC1N 2EB UK Tel: +44 (0) 20 7831 4101 Fax: +44 (0) 20 7831 7404 E-mail: [email protected] Website: http://www.irmt.org Version 1/1999 MPSR Project Personnel Project Director Anne Thurston has been working to define international solutions for the management of public sector records for nearly three decades. Between 1970 and 1980 she lived in Kenya, initially conducting research and then as an employee of the Kenya National Archives. She joined the staff of the School of Library, Archive and Information Studies at University College London in 1980, where she developed the MA course in Records and Archives Management (International) and a post-graduate research programme.
    [Show full text]
  • Winreporter Documentation
    WinReporter documentation Table Of Contents 1.1 WinReporter overview ............................................................................................... 1 1.1.1.................................................................................................................................... 1 1.1.2 Web site support................................................................................................. 1 1.2 Requirements.............................................................................................................. 1 1.3 License ....................................................................................................................... 1 2.1 Welcome to WinReporter........................................................................................... 2 2.2 Scan requirements ...................................................................................................... 2 2.3 Simplified Wizard ...................................................................................................... 3 2.3.1 Simplified Wizard .............................................................................................. 3 2.3.2 Computer selection............................................................................................. 3 2.3.3 Validate .............................................................................................................. 4 2.4 Advanced Wizard....................................................................................................... 5 2.4.1
    [Show full text]
  • Release Notes: Junos® OS Release 17.4R3 for the ACX Series, EX Series, MX Series, NFX Series, PTX Series, QFX Series, SRX Series, and Junos Fusion
    1 Release Notes: Junos® OS Release 17.4R3 for the ACX Series, EX Series, MX Series, NFX Series, PTX Series, QFX Series, SRX Series, and Junos Fusion 17 September 2021 Contents Introduction | 13 New Features in 17.4R3 | 13 Junos OS Release Notes for ACX Series | 13 New and Changed Features | 14 Release 17.4R3 New and Changed Features | 14 Release 17.4R2 New and Changed Features | 15 Release 17.4R1 New and Changed Features | 15 Changes in Behavior and Syntax | 16 Management | 17 Network Management and Monitoring | 17 Platform and Infrastructure | 18 Security | 19 Software Licensing | 19 Subscriber Management and Services | 19 Known Behavior | 20 General Routing | 20 Known Issues | 21 General Routing | 22 Interfaces and Chassis | 24 2 Layer 2 Features | 24 MPLS | 24 Routing Protocols | 24 Virtual Chassis | 24 Resolved Issues | 25 Resolved Issues: 17.4R3 | 25 Resolved Issues: 17.4R2 | 27 Resolved Issues: 17.4R1 | 29 Documentation Updates | 29 Migration, Upgrade, and Downgrade Instructions | 30 Upgrade and Downgrade Support Policy for Junos OS Releases | 30 Junos OS Release Notes for EX Series Switches | 31 New and Changed Features | 32 Release 17.4R3 New and Changed Features | 33 Release 17.4R2 New and Changed Features | 33 Release 17.4R1 New and Changed Features | 34 Changes in Behavior and Syntax | 39 EVPNs | 39 Interfaces and Chassis | 40 Management | 40 Multicast | 40 Network Management and Monitoring | 40 Platform and Infrastructure | 41 Routing Protocols | 42 Security | 42 Software Licensing | 42 Subscriber Management and Services |
    [Show full text]
  • Chapter 9– Computer File Formats
    PERA Employer Manual Chapter 9 - Computer File Formats IN THIS CHAPTER: • Testing Process Chapter 9– • Contribution (SDR) File Computer File Formats Layout » Contribution File Over 800 employers use PERA’s online Employer Reporting and Header Information System (ERIS) to send computer files to PERA for pro- » Plan Summary Record cessing. » Detail Transactions » Reporting an PERA has the following computer file formats. Adjustment • Contribution Edits 1. The Contribution file (also called the SDR file) provides the pay • Demographic File Layout period salary and contribution data for electronic submission of • Exclusion Report File the Salary Deduction Report (SDR). The file includes three types » Excel Format of records: the header, plan summary, and detail member trans- » Text File Format actions. As a general rule, the Contribution data file must be a fixed length text file. Employers that have more than 50 active members and do not have technical support to convert their pay- roll data into the text format may contact PERA staff at 651-296- 3636 or 1-888-892-7372 option #2 to discuss submitting their data via Excel. Last chapter 9 revision: 2. The Demographic Data Record format has a single record July 9, 2018 type that used to enroll new employees into a PERA plan or to update a member’s retirement account status as employment changes, such as leaves of absence or terminations occur, or to report member’s personal data changes, such as changes in name or address. 3. The Exclusion Report file is used to comply with the annual legal requirement of providing information about all employees – including elected officials – who worked during the reporting 9-1 PERA Employer Manual Chapter 9 - Computer File Formats year and were not members of a PERA Defined Benefit or Defined Contribution Plan or another Minnesota public retirement system.
    [Show full text]
  • Product Guide Transceivers, Transponders, and Active Cables for Datacom and Telecom Applications
    World’s Largest Supplier of Optical Communication Components and Subsystems Product Guide Transceivers, Transponders, and Active Cables for Datacom and Telecom Applications CFP4 QSFP SFP+ XFP BOA Active Cable Transceivers, Transponders, and Active Cables for Datacom and Telecom Applications Finisar’s broad product selection and innovative technology have made us the optical module manufacturer of choice for all major networking equipment vendors worldwide. We have taken a leading role in transforming the datacommunications and telecommunications equipment market from utilizing discrete optical components to leveraging the design and pay-as-you-grow flexibility offered by pluggable modules. Our products are fully compliant with Ethernet, Fibre Channel, Infiniband, SONET/SDH/OTN and PON standards and operate at data rates up to 100 Gb/s. They are capable of distances ranging from very short reach within a datacenter to campus, access, metro, and long-haul reaches. They feature outstanding performance over extended voltage and temperature ranges, while minimizing jitter, electromagnetic interference (EMI) and power dissipation. Finisar Modules are available in a wide variety of form factors: SFP (copper and optical; longwave, shortwave and WDM) – DatacoM applications using Fast Ethernet, Gigabit Ethernet, 1x/2x/4x Fibre Channel – TelecoM applications using OC-3/STM-1, OC-12/STM-4 and OC-48/STM-16 across all reaches Features • 3.3 V operating voltage • Distances from very short links up to 100+ km SFP • Wide operating temperature range • Metal
    [Show full text]
  • File Management – Saving Your Documents
    File Management – Saving Your Documents You will save everything to your H: drive. This is your personal drive that is out on the server and only you have access to it. It is not accessible by others. Your H: drive is accessible from any CCPS computer or from home via Remote Access. Accessing Your H: Drive To access your H: drive via the desktop: 1. Double-click the “This PC” icon. 2. Under Network Locations, double-click the drive that begins with your username and ends with the letter “H”. To access your H: drive via File Explorer: 1. Click the yellow folder at the bottom left corner of the screen. 2. Under Network Locations, double-click the drive that begins with your username and ends with the letter “H”. Accessing Shared Drives If shared drives have been added to your profile, they will be located under Network Locations. If you need access to a departmental or school shared drive, please submit a work order so it can be added to your profile or email [email protected]. Creating Shortcuts on the Desktop Do not save documents/items directly to the desktop. If you would like to place documents on the desktop for quick- access, save your master documents to your H: drive and place a shortcut to the document on the desktop. To create a shortcut on the desktop to a program or file do the following: 1. Right-click an open area on the desktop, Select New, and then click Shortcut. 2. Click Browse. 3. Locate the program or file to which you want to create a shortcut, click the program or file, click Open, and then click Next.
    [Show full text]
  • Extending File Systems Using Stackable Templates
    THE ADVANCED COMPUTING SYSTEMS ASSOCIATION The following paper was originally published in the Proceedings of the USENIX Annual Technical Conference Monterey, California, USA, June 6-11, 1999 Extending File Systems Using Stackable Templates _ Erez Zadok, Ion Badulescu, and Alex Shender Columbia University © 1999 by The USENIX Association All Rights Reserved Rights to individual papers remain with the author or the author's employer. Permission is granted for noncommercial reproduction of the work for educational or research purposes. This copyright notice must be included in the reproduced paper. USENIX acknowledges all trademarks herein. For more information about the USENIX Association: Phone: 1 510 528 8649 FAX: 1 510 548 5738 Email: [email protected] WWW: http://www.usenix.org Extending File Systems Using Stackable Templates Erez Zadok, Ion Badulescu, and Alex Shender Computer Science Department, Columbia University ezk,ion,alex @cs.columbia.edu { } Abstract Kernel-resident native file systems are those that inter- Extending file system functionality is not a new idea, act directly with lower level media such as disks[9] and but a desirable one nonetheless[6, 14, 18]. In the several networks[11, 16]. Writing such file systems is difficult years since stackable file systems were first proposed, only because it requires deep understanding of specific operat- a handful are in use[12, 19]. Impediments to writing new ing system internals, especially the interaction with device file systems include the complexity of operating systems, drivers and the virtual memory system. Once such a file the difficulty of writing kernel-based code, the lack of a system is written, porting it to another operating system true stackable vnode interface[14], and the challenges of is just as difficult as the initial implementation, because porting one file system to another operating system.
    [Show full text]
  • Hexadecimal Numbers
    AP Computer Science Principles How Computers Work: Computer Architecture and Data Storage What You Will Learn . How to disassemble and rebuild a computer . How to choose the parts to build a new computer . Logic Gates . Data storage: . Binary . Hexadecimal . ASCII . Data compression . Computer Forensics . Limits of computing 2 2 Introduction to Computer Hardware 33 The Parts of a Computer 4 Image: By Gustavb. Source Wikimedia. License: CC BY-SA 3.0 4 Main parts of a computer . Case . Power supply . Motherboard . CPU . RAM . Adapter Cards . Internal and External Drives . Internal and External Cables 5 55 The Motherboard . The motherboard provides the electrical connections between the computer components. Comes in different sizes called “form factors.” . All the other components of the computer connect to the motherboard directly or through a cable. Image: By skeeze. Source Pixabay. License: CC BY-SA 3.0 6 66 A Case Needs to Name size (mm) be a Form BTX 325 × 266 ATX 305 × 244 Factor as Larger EATX 305 × 330 or Larger than (Extended) LPX 330 × 229 the microBTX 264 × 267 Motherboard. microATX 244 × 244 Mini-ITX 170 × 170 7 7 Image: By Magnus Manske. Source Wikimedia. License: CC BY-7SA 3.0 The Power Supply . Power Supplies come in different form factors and should match the form factor of the case. Power supplies are rated in watts and should have a rating larger than the total required watts of all the computer components. 8 8 Image: By Danrock Source: Wikimedia License: CC BY-SA 3.0 8 The Power Supply Connectors . The Power Supply will have lots of extra connectors so you can add additional components to your computer at a later time.
    [Show full text]
  • Beyond 400G Technical White Paper Beyond 400G Technical White Paper
    Beyond 400G Technical White Paper Beyond 400G Technical White Paper Beyond 400G Technical White Paper Version Date Author Reviewer Remark V1.0 2021/07/13 ZTE ZTE First Released © 2021 ZTE Corporation. All rights reserved. ZTE CONFIDENTIAL: This document contains proprietary information of ZTE and is not to be disclosed or used without the prior written permission of ZTE. Due to update and improvement of ZTE products and technologies, information in this document is subjected to change without notice. All rights reserved. No spreading without permission of ZTE 1 Beyond 400G Technical White Paper Contents 1 Introduction..................................................................................................................................... 3 2 B400G Technologies and Solutions......................................................................................... 4 2.1 B400G Technologies....................................................................................................................4 2.1.1 Forward Error Correction (FEC)..............................................................................................5 2.1.2 Baud Rate and High-Order Modulation Modes.................................................................... 5 2.1.3 Polarization Multiplexing...........................................................................................................6 2.1.4 Special Fibers...........................................................................................................................
    [Show full text]
  • Network File Sharing Protocols
    Network File Sharing Protocols Lucius quests her hotchpotch ethnologically, she contradistinguish it self-righteously. Dialogic Millicent catch prayingly. Sheridan usually foils stintedly or pirouette anaerobiotically when trilobed Saxon disposes genotypically and homeward. It is recommended that this type be accepted by all FTP implementations. So how do you protect yourself from these malware infected movies? Which protocol is even an option for you is based on your use scenario. Learn about the latest issues in cybersecurity and how they affect you. As more clients access the file, share important files digitally and work as a team even sitting miles apart. Friendly name of the printer object. SMB is built in to every version of Windows. As you can see NFS offers a better performance and is unbeatable if the files are medium sized or small. Processes utilizing the network that do not normally have network communication or have never been seen before are suspicious. You are correct, thank you. It syncs files between devices on a local network or between remote devices over the internet. Sets the maximum number of channels for all subsequent sessions. Session control packets Establishes and discontinues a connection to shared server resources. Please fill in all required fields before continuing. File names in CIFS are encoded using unicode characters. The configured natural language of the printer. After entering its resources or network protocols that protocol over the server supports file services while originally connected you must be set. Download a free fully functional evaluation of JSCAPE MFT Server. The File Transfer Protocol follows the specifications of the Telnet protocol for all communications over the control connection.
    [Show full text]