User's Reference Guide

Total Page:16

File Type:pdf, Size:1020Kb

User's Reference Guide Netopia™ R7200 SDSL Router Nokia Speedlink™ certified User’s Reference Guide Copyright ©2000, Netopia, Inc., v.0300 All rights reserved. Printed in the U.S.A. This manual and any associated artwork, software, and product designs are copyrighted with all rights reserved. Under the copyright laws such materials may not be copied, in whole or part, without the prior written consent of Netopia, Inc. Under the law, copying includes translation to another language or format. Netopia, Inc. 2470 Mariner Square Loop Alameda, CA 94501-1010 U.S.A. Part Number For additional copies of this electronic manual, order Netopia part number 6160021-PF-02 Printed Copies For printed copies of this manual, order Netopia part number TER7200/Doc (P/N 6160021-00-02) Contents Welcome to the Netopia R7200 SDSL Router User’s Reference Guide. This guide is designed to be your single source for information about your Netopia R7200 SDSL Router. It is intended to be viewed on-line, using the powerful features of the Adobe Acrobat Reader. The information display has been designed to present the maximum information in the minimum space on your screen. You can keep this document open while you perform any of the procedures described and find useful information about the procedure you are performing. This Table of Contents page you are viewing consists of hypertext links to the chapters and headings listed. If you are viewing this on-line, just click any link below to go to that heading. Part I: Getting Started Chapter 1 — Introduction..........................................................1-1 Overview ....................................................................... 1-1 Features and capabilities ............................................... 1-1 G How to use this guide .................................................... 1-2 B Chapter 2 — Setting Up Internet Services .................................2-1 Finding an Internet service provider................................. 2-1 Unique requirements ............................................ 2-2 Pricing and support .............................................. 2-2 Endorsements ..................................................... 2-2 Deciding on an ISP account ............................................ 2-2 Setting up a Netopia R7200 account ..................... 2-2 Obtaining an IP address........................................ 2-2 Obtaining information from the ISP.................................. 2-3 Local LAN IP address information to obtain ............ 2-3 Chapter 3 — Making the Physical Connections..........................3-1 Find a location............................................................... 3-1 What you need .............................................................. 3-2 Identify the connectors and attach the cables .................. 3-2 Netopia R7200 SDSL Router back panel ports ................ 3-3 Netopia R7200 SDSL Router status lights ....................... 3-4 Chapter 4 — Connecting to Your Local Area Network.................4-1 Overview ....................................................................... 4-1 Readying computers on your local network....................... 4-1 Connecting to an Ethernet network.................................. 4-3 10Base-T............................................................. 4-4 iv User’s Reference Guide Adding an external modem ............................................. 4-5 Connecting to a LocalTalk network ................................. 4-6 Chapter 5 — Setting up your Router with the SmartStart Wizard 5-1 Before running SmartStart ............................................. 5-2 Setting up your Router with the SmartStart Wizard........... 5-3 SmartStart Wizard configuration screens ............... 5-3 Easy option.......................................................... 5-4 Advanced option .................................................. 5-5 Sharing the Connection .................................................. 5-6 Configuring TCP/IP on Windows 95, 98, or NT computers ........................................................... 5-6 Configuring TCP/IP on Macintosh computers ........ 5-10 Chapter 6 — Console-Based Management .................................6-1 Connecting through a Telnet session............................... 6-2 Configuring Telnet software ................................... 6-3 Connecting a console cable to your router ....................... 6-3 Navigating through the console screens .......................... 6-4 Chapter 7 — Easy Setup ...........................................................7-1 Easy Setup console screens........................................... 7-1 Accessing the Easy Setup console screens............ 7-1 Quick Easy Setup connection path .................................. 7-3 SDSL Line Configuration ....................................... 7-4 Easy Setup Profile ................................................ 7-5 IP Easy Setup ...................................................... 7-6 Easy Setup Security Configuration ......................... 7-7 Part II: Advanced Configuration Chapter 8 — WAN and System Configuration .............................8-1 WAN configuration.......................................................... 8-1 Creating a new Connection Profile ................................... 8-3 The default profile.......................................................... 8-6 Contents v IP parameters (default profile) screen .................... 8-8 IPX parameters (default profile) screen .................. 8-9 System configuration screens ........................................ 8-9 Navigating through the system configuration screens...... 8-10 System configuration features............................. 8-11 Network protocols setup..................................... 8-12 Filter sets (firewalls) ........................................... 8-12 IP address serving ............................................. 8-12 Date and time.................................................... 8-12 Console configuration ......................................... 8-13 G SNMP (Simple Network Management Protocol)..... 8-14 Security............................................................. 8-14 Upgrade feature set ........................................... 8-14 Logging ............................................................. 8-14 Installing the Syslog client .................................. 8-15 Chapter 9 — Line Backup .........................................................9-1 WAN Configuration ......................................................... 9-2 Backup Configuration screen................................. 9-3 IP Setup screen ............................................................. 9-4 Connection Profiles........................................................ 9-5 Using Scheduled Connections with Backup ...................... 9-5 Management/Statistics.................................................. 9-7 QuickView ..................................................................... 9-9 Event Logs .................................................................... 9-9 SNMP Support .............................................................. 9-9 Chapter 10 — IP Setup and Network Address Translation ........10-1 Network Address Translation features ........................... 10-1 Using Network Address Translation ............................... 10-3 Associating port numbers with nodes .................. 10-6 Advanced IP/IPX router configuration options ................. 10-7 Connection Profiles...................................................... 10-8 Network Address Translation guidelines ............. 10-10 vi User’s Reference Guide IP setup .................................................................... 10-11 IP subnets ....................................................... 10-15 Static routes.................................................... 10-17 IP address serving..................................................... 10-21 IP Address Pools.............................................. 10-24 DHCP NetBIOS Options..................................... 10-26 MacIP (KIP forwarding) setup ............................ 10-28 Chapter 11 — IPX Setup.........................................................11-1 IPX features ................................................................ 11-1 IPX definitions ............................................................. 11-1 Internetwork Packet Exchange (IPX) ..................... 11-1 IPX address ....................................................... 11-2 Socket .............................................................. 11-2 Routing Information Protocol (RIP) ....................... 11-2 Service Advertising Protocol (SAP)....................... 11-2 NetBIOS ............................................................ 11-3 IPX spoofing....................................................... 11-3 IPX setup screen ......................................................... 11-3 IPX routing tables ........................................................ 11-5 Chapter 12 — AppleTalk Setup................................................12-1 AppleTalk networks ...................................................... 12-1 AppleTalk protocol .............................................. 12-1 MacIP................................................................ 12-3 AURP................................................................. 12-3 Routers and seeding .......................................... 12-3 Installing AppleTalk .....................................................
Recommended publications
  • Mac Os Serial Terminal App
    Mac Os Serial Terminal App Panting and acetous Alaa often scag some monoplegia largo or interdict legitimately. Tourist Nikita extemporised or Aryanised some dop quick, however unsectarian Merwin hectograph globularly or emotionalize. Germaine is know-nothing and sodomizes patronizingly as modiolar Osborne bug-outs unconstitutionally and strides churchward. Can choose a usb to dim the app mac os sector will happen, and act as commented source code is anyone else encountered this Tom has a serial communication settings. Advanced Serial Console on Mac and Linux Welcome to. Feel free office helps you verify that makes it takes a terminal app mac os is used for a teacher from swept back. Additionally it is displayed in the system profiler, you can also contains a cursor, you can i make use these two theme with the app mac os is designed to. Internet of Things Intel Developer Zone. Is based on the latest and fully updated RPiOS Buster w Desktop OS. Solved FAS2650 serial port MAC client NetApp Community. Mac Check Ports In four Terminal. A valid serial number Power Script Language PSL Programmers Reference. CoolTerm for Mac Free Download Review Latest Version. Serial Port Drivers and Firmware Upgrade EV West. Osx ssh If you're prompted about adding the address to the heritage of known hosts. This yourself in serial terminal open it however, each device node, i have dozens of your setting that the browser by default in case. 9 Alternatives for the Apple's Mac Terminal App The Mac. So that Terminal icon appears in the Dock under the recent apps do the.
    [Show full text]
  • Linux Networking Cookbook.Pdf
    Linux Networking Cookbook ™ Carla Schroder Beijing • Cambridge • Farnham • Köln • Paris • Sebastopol • Taipei • Tokyo Linux Networking Cookbook™ by Carla Schroder Copyright © 2008 O’Reilly Media, Inc. All rights reserved. Printed in the United States of America. Published by O’Reilly Media, Inc., 1005 Gravenstein Highway North, Sebastopol, CA 95472. O’Reilly books may be purchased for educational, business, or sales promotional use. Online editions are also available for most titles (safari.oreilly.com). For more information, contact our corporate/institutional sales department: (800) 998-9938 or [email protected]. Editor: Mike Loukides Indexer: John Bickelhaupt Production Editor: Sumita Mukherji Cover Designer: Karen Montgomery Copyeditor: Derek Di Matteo Interior Designer: David Futato Proofreader: Sumita Mukherji Illustrator: Jessamyn Read Printing History: November 2007: First Edition. Nutshell Handbook, the Nutshell Handbook logo, and the O’Reilly logo are registered trademarks of O’Reilly Media, Inc. The Cookbook series designations, Linux Networking Cookbook, the image of a female blacksmith, and related trade dress are trademarks of O’Reilly Media, Inc. Java™ is a trademark of Sun Microsystems, Inc. .NET is a registered trademark of Microsoft Corporation. Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and O’Reilly Media, Inc. was aware of a trademark claim, the designations have been printed in caps or initial caps. While every precaution has been taken in the preparation of this book, the publisher and author assume no responsibility for errors or omissions, or for damages resulting from the use of the information contained herein.
    [Show full text]
  • Administration Guide
    DSLMAX™ Administration Guide Part Number: 7820-0393-003 For software version 8.0 April 2000 Copyright© 2000 Lucent Technologies. All rights reserved. This material is protected by the copyright laws of the United States and other countries. It may not be reproduced, distributed, or altered in any fashion by any entity (either internal or external to Lucent Technologies), except in accordance with applicable agreements, contracts, or licensing, without the express written consent of Lucent Technologies. For permission to reproduce or distribute, please email your request to [email protected]. Notice Every effort was made to ensure that the information in this document was complete and accurate at the time of printing, but information is subject to change. Safety, Compliance, and Warranty Information Before handling any Lucent Access Networks hardware product, read the Access Networks Safety and Compliance Guide included in your product package. See that guide also to determine how products comply with the electromagnetic interference (EMI) and network compatibility requirements of your country. See the warranty card included in your product package for the limited warranty that Lucent Technologies provides for its products. Security Statement In rare instances, unauthorized individuals make connections to the telecommunications network through the use of access features. Trademarks 4ESS, 5ESS, A Network of Expertise, AnyMedia, AqueView, AUDIX, B-STDX 8000, B-STDX 9000, ...Beyond Compare, CaseView, Cajun, CajunDocs, CAJUNVIEW, Callmaster,
    [Show full text]
  • User Guide for Uplogix Local Managers
    User Guide for Uplogix Local Managers Version 4.7 July 2014 uplogix.com Information in this document is subject to change without notice. © 2014 Uplogix, Inc. All Rights Reserved. Uplogix, the Uplogix logo, and SurgicalRollback are trademarks of Uplogix, Inc. in the United States and other jurisdictions. All other marks referenced are those of their respective owners. Uplogix, Inc. 7600-B North Capital of Texas Highway Suite 220 Austin, Texas 78731 USA Contents About this guide ..................................................................................................... 1 Target audience .................................................................................................................... 1 Typographical conventions ..................................................................................................... 1 Safety summary ................................................................................................................... 2 Uplogix Glossary ................................................................................................................... 3 Introduction to the Uplogix Local Manager ............................................................ 4 Chassis views and indicator lights ........................................................................................... 4 Uplogix 5000 ..................................................................................................................... 4 Uplogix 500 ......................................................................................................................
    [Show full text]
  • USB to RS-232 Adapter Driver Installation Manual
    USB to RS-232 Adapter Driver Installation Manual For Win OS 98SE/ME/2000/XP/Vista/7/8/8.1/10; Win server OS 2008/2008R2/2012, Mac OS Contents Introduction Features & Specifications System Requirements Installing the Device Uninstalling the Device Disclaimer Introduction The USB to RS-232 adapter is your smart and convenient accessory for connecting RS-232 devices to your USB equipped Windows host computer. It provides a bridge connection with a standard DB-9 pin male RS-232 port connector in one end and a standard Type A USB plug connector on the other end. You simply attach the RS-232 device onto the RS-232 port of the cable and plug the USB connector into your PC USB port. It allows a simple and easy way of adding RS-232 connections to your PC without having to go thru inserting a RS-232 card and traditional port configuration. This USB to RS-232 adapter is ideal for connecting modems, cellular phones, PDAs, digital cameras, card readers and other RS-232 devices to your computer. It provides RS-232 connections up to 250Kbps of data transfer rate. And since USB does not require any IRQ resource, more devices can be attached to the system without the previous hassles of device and resource conflicts. Finally, the USB to RS-232 adapter is a fully USB Specification compliant device and therefore supports advanced power management such as suspend and resume operations as well as remote wakeup. The USB to RS-232 cable adapter is designed to work on Windows operating systems.
    [Show full text]
  • Mac Serial Terminal Program
    Mac Serial Terminal Program sprauchleWillard still illuminatingly. manhandled oviparously while inferrible Wynn paganised that bedstraw. Kelly matt tempestuously? Meniscoid Chase When a friends and will still worked under the serial terminal program the clients Serial port device events via Mac Applications CoolTerm Application from the creator simple serial-port terminal application no terminal emulation. Three Alternatives to Arduino's Serial Monitor Bald Engineer. Transform your mac program to the widgets where the features of new best serial consoles at the internet on. In excel window might be displayed the MAC addresses aka physical. Unix programs but we are doing anything that becomes a mac? Check which serial port is being used for the device. Open terminal program that you have their respective device is also be eol, terminal emulator that both have had terminals of airconsole ready for superior image. Your salesperson is working perfectly. I answer the 'serial' program though which is late most stable serial console interface I've pool for mac. The 32-bit builds are still available and table be downloaded here Mac Win. I saw have the USB-to-Serial adapter All I need until a program that instance can out to name up the com port I'm looking because the screen option built into the terminal. Run Python code to commence out serial output from Mac OX Lion. Com port for mac os x folder, if there is powered usb connected hardware serial port! If lan settings can choose from arduino information using a select your very well if you type emulation program is not worth creating a signed state.
    [Show full text]
  • Origin™ 200 and Origin 200 Gigachannel™ Owner's Guide
    Origin™ 200 and Origin 200 GIGAchannel™ Owner’s Guide Document Number 007-3708-002 CONTRIBUTORS Written by Kameran Kashani and Carolyn Curtis Illustrated by Francesca Angelesco, Cheri Brown, and Kameran Kashani Production by Carlos Miqueo Engineering contributions by Jim Gath, Jeffrey Heller, Dave Parry, Ken Hibbard, Eric Williams, Demick Boyden, Steve Smithson, Dilip Amin, Richard Wright, Brad Morrow, Matt Robinson, Tim Wong, Tom Jackman, and Carl Strasen St. Peter’s Basilica image courtesy of ENEL SpA and InfoByte SpA. Disk Thrower image courtesy of Xavier Berenguer, Animatica. © 1996-1999, Silicon Graphics, Inc.— All Rights Reserved The contents of this document may not be copied or duplicated in any form, in whole or in part, without the prior written permission of Silicon Graphics, Inc. RESTRICTED RIGHTS LEGEND Use, duplication, or disclosure of the technical data contained in this document by the Government is subject to restrictions as set forth in subdivision (c) (1) (ii) of the Rights in Technical Data and Computer Software clause at DFARS 52.227-7013 and/or in similar or successor clauses in the FAR, or in the DOD or NASA FAR Supplement. Unpublished rights reserved under the Copyright Laws of the United States. Contractor/manufacturer is Silicon Graphics, Inc., 2011 N. Shoreline Blvd., Mountain View, CA 94043-1389. Silicon Graphics, Indigo, CHALLENGE, and Onyx are registered trademarks and the Silicon Graphics logo, O2, Origin, Origin200, XFS, IRIS InSight, Personal IRIS, Onyx2, POWER Series, Indigo2, IRIX, and SGI are trademarks of Silicon Graphics, Inc. Indy is a registered trademark, used under license in the U.S. and owned by Silicon Graphics, Inc.
    [Show full text]
  • MAX™ Administration Guide
    MAX™ Administration Guide Part Number: 7820-0678-001 For software version 8.0.1 March 2000 Copyright© 2000 Lucent Technologies. All rights reserved. This material is protected by the copyright laws of the United States and other countries. It may not be reproduced, distributed, or altered in any fashion by any entity (either internal or external to Lucent Technologies), except in accordance with applicable agreements, contracts, or licensing, without the express written consent of Lucent Technologies. For permission to reproduce or distribute, please email your request to [email protected]. Notice Every effort was made to ensure that the information in this document was complete and accurate at the time of printing, but information is subject to change. Safety, Compliance, and Warranty Information Before handling any Lucent Access Networks hardware product, read the Access Networks Safety and Compliance Guide included in your product package. See this guide also to determine how products comply with the electromagnetic interference (EMI) and network compatibility requirements of your country. See the warranty card included in your product package for the limited warranty that Lucent Technologies provides for its products. Security Statement In rare instances, unauthorized individuals make connections to the telecommunications network through the use of access features. Trademarks 4ESS, 5ESS, A Network of Expertise, AnyMedia, AqueView, AUDIX, B-STDX 8000, B-STDX 9000, ...Beyond Compare, CaseView, Cajun, CajunDocs, CAJUNVIEW, Callmaster,
    [Show full text]
  • HOWTO Terminal Texte Pour Linux
    HOWTO Terminal Texte pour Linux David S. Lawyer <mailto:[email protected]> , traduit par Julien Garnault <mailto:judge@ club-internet.fr> v1.09, 28 Novembre 1999 Ce document explique ce que sont les terminaux en mode texte, comment ils fonctionnent, comment les installer et les configurer, et fournit des informations sur la mani`ere de les r´eparer. Cela peut ˆetre utile mˆeme si vous n’avez pas le manuel du terminal. Bien qu’il soit ´ecrit pour de vrais terminaux reli´es`aun syst`eme Linux, certaines informations de ce manuel sont applicables `al’´emulation de terminal et peuvent ˆetreutiles pour des syst`emes diff´erentsde Linux. Contents 1 Introduction 10 1.1 Copyright, marques d´epos´ees, avertissement et cr´edits ...................... 10 1.1.1 Copyright ........................................... 10 1.1.2 Avertissement ......................................... 11 1.1.3 Marques d´epos´ees ...................................... 11 1.1.4 Cr´edits ............................................ 11 1.2 Plans pour l’avenir : vous pouvez m’aider ............................. 11 1.3 Nouvelles versions de ce HOWTO .................................. 12 1.4 HOWTOs connexes .......................................... 12 1.5 Terminologie utilis´eedans ce document .............................. 12 1.6 Qu’est-ce qu’un terminal ? ...................................... 12 2 Types de terminaux 13 2.1 Terminaux passifs .......................................... 13 2.2 Terminaux texte ........................................... 13 2.3 Terminaux graphiques ........................................ 14 2.3.1 Terminaux graphiques sur ligne s´erie ............................ 14 2.3.2 Terminaux graphiques rapides (d’autres noms leur sont souvent donn´es) ........ 14 2.4 Network Computers (NC, ordinateurs de r´eseau) ......................... 15 2.5 Emulation´ sur un PC ......................................... 15 3 Installation rapide 15 4 Pourquoi utiliser un terminal ? 16 4.1 Introduction sur le fait d’utiliser un terminal ..........................
    [Show full text]
  • ANSI Escape Code - Wikipedia
    11/12/2017 ANSI escape code - Wikipedia ANSI escape code ANSI escape sequences are a standard for in-band signaling to control the cursor location, color, and other options on video text terminals. Certain sequences of bytes, most starting with Esc and '[', are embedded into the text, which the terminal looks for and interprets as commands, not as character codes. ANSI sequences were introduced in the 1970s to replace vendor-specific sequences and became widespread in the computer equipment market by the early 1980s. They were used by the nascent bulletin board systems to offer improved displays compared to earlier systems lacking cursor movement, a primary reasons they became a standard adopted by all manufacturers. Although hardware text terminals have become increasingly rare in the 21st century, the relevance of the ANSI standard persists because most terminal emulators interpret at least some of the ANSI escape sequences in output text. One notable exception was the Win32 console of Microsoft Windows before Windows 10 update TH2.[1] Contents 1 History 2 Platform support 2.1 Windows and DOS 3 Escape sequences 4 CSI sequences 5 SGR (Select Graphic Rendition) parameters 6 Colors 6.1 3/4 bit 6.2 8-bit 6.3 24-bit 7 Examples 7.1 Example of use in shell scripting 8 Invalid and ambiguous sequences in use 9 See also 10 Notes 11 References 12 External links History Almost all manufacturers of video terminals added vendor-specific escape sequences to perform operations such as placing the cursor at arbitrary positions on the screen. One example is the VT52 terminal, which allowed the cursor to be placed at an x,y location on the screen by sending the ESC character, a y character, and then two characters representing with numerical values equal to the x,y location plus 32 (thus starting at the ASCII space character and avoiding the control characters).
    [Show full text]
  • Giga-ROM 2.0 Index
    Giga-ROM Archives version 2.0 ASCII Text Index This listing file was generated by FileTree™, a ShareWare program written and copyright © 1986, 1987 by Jody S. Kravitz. Your financial support is encouraged. Thank you. Size File Name ------ -------------------- Giga-ROM™ 2.0: Giga-ROM™ 2.0:Art: Giga-ROM™ 2.0:Art:Applications: 27233 Giga-ROM™ 2.0:Art:Applications:3D-Edit 43676 Giga-ROM™ 2.0:Art:Applications:Buggli 71129 Giga-ROM™ 2.0:Art:Applications:DesignerDr 7224 Giga-ROM™ 2.0:Art:Applications:Drawpaint 17664 Giga-ROM™ 2.0:Art:Applications:EarthQuake! v1.0 52392 Giga-ROM™ 2.0:Art:Applications:EscherDraw 38640 Giga-ROM™ 2.0:Art:Applications:EZP 104364 Giga-ROM™ 2.0:Art:Applications:GreyV 8600 Giga-ROM™ 2.0:Art:Applications:JoyPa 49942 Giga-ROM™ 2.0:Art:Applications:MacBillboard 39493 Giga-ROM™ 2.0:Art:Applications:MandelZot 1.4.1 7731 Giga-ROM™ 2.0:Art:Applications:Microbe Swarm 7194 Giga-ROM™ 2.0:Art:Applications:Pet 7432 Giga-ROM™ 2.0:Art:Applications:ShowGIF 3644 Giga-ROM™ 2.0:Art:Applications:ThrowPaint™ 12139 Giga-ROM™ 2.0:Art:Applications:ViewPaint 68618 Giga-ROM™ 2.0:Art:Applications:XVT-D Giga-ROM™ 2.0:Art:Demos: 7786 Giga-ROM™ 2.0:Art:Demos:4-D Cube 6835 Giga-ROM™ 2.0:Art:Demos:AniR 4731 Giga-ROM™ 2.0:Art:Demos:Boxes 3307 Giga-ROM™ 2.0:Art:Demos:BrainDamag 1267 Giga-ROM™ 2.0:Art:Demos:Brownian Motion 4429 Giga-ROM™ 2.0:Art:Demos:Bubba 4789 Giga-ROM™ 2.0:Art:Demos:Chaos 1 53775 Giga-ROM™ 2.0:Art:Demos:Chaos v1.0 5550 Giga-ROM™ 2.0:Art:Demos:Christmas Wish 4292 Giga-ROM™ 2.0:Art:Demos:Circles 3526 Giga-ROM™ 2.0:Art:Demos:Convert
    [Show full text]
  • Secure Content Distribution Using Untrusted Servers Kevin Fu
    Secure content distribution using untrusted servers Kevin Fu MIT Computer Science and Artificial Intelligence Lab in collaboration with M. Frans Kaashoek (MIT), Mahesh Kallahalla (DoCoMo Labs), Seny Kamara (JHU), Yoshi Kohno (UCSD), David Mazières (NYU), Raj Rajagopalan (HP Labs), Ron Rivest (MIT), Ram Swaminathan (HP Labs) For Peter Szolovits slide #1 January-April 2005 How do we distribute content? For Peter Szolovits slide #2 January-April 2005 We pay services For Peter Szolovits slide #3 January-April 2005 We coerce friends For Peter Szolovits slide #4 January-April 2005 We coerce friends For Peter Szolovits slide #4 January-April 2005 We enlist volunteers For Peter Szolovits slide #5 January-April 2005 Fast content distribution, so what’s left? • Clients want ◦ Authenticated content ◦ Example: software updates, virus scanners • Publishers want ◦ Access control ◦ Example: online newspapers But what if • Servers are untrusted • Malicious parties control the network For Peter Szolovits slide #6 January-April 2005 Taxonomy of content Content Many-writer Single-writer General purpose file systems Many-reader Single-reader Content distribution Personal storage Public Private For Peter Szolovits slide #7 January-April 2005 Framework • Publishers write➜ content, manage keys • Clients read/verify➜ content, trust publisher • Untrusted servers replicate➜ content • File system protects➜ data and metadata For Peter Szolovits slide #8 January-April 2005 Contributions • Authenticated content distribution SFSRO➜ ◦ Self-certifying File System Read-Only
    [Show full text]