rfc1608.Representing IP Information in the X.500 Directory

合集下载

石油行业英文缩写

石油行业英文缩写

3DLO 3D long offset seismic survey三维长偏移距野外资料采集3DHR-HR 3D High resolution -high seismic survey 三维高分辨一高密野外资料采集。

AAC = adjusted AC;ABI inclination at the drill bitAC acoustic声波时差ACN =adjusted CN;ADN Azimuthal neotron densityAIT* Array Induction Imager ToolA&S admistration&serviceAHC Ascendant Hierarchical ClusteringARC Induction Resistivity GR annulus pressure ingrated toolARI Azimuth resistivity imager方位电阻率成像测井仪APD Elevation of Depth Reference (LMF) above Permanent DatumAPWD apparatus whle drillingASI Array seismic imager阵列地震成像仪AVG: AverageAVO Amplitude Versus Offset(Amplitude variation with offset calibration) 振幅-炮检距关系AZI: Azimuth (deg)BBC Buy Back ContractBGG: Background Gas (%)BGP 物探局BHFP bottomhole flowing pressureBHS :Borehole StatusBHT :Bottom Hole TemperatureBHTA 声波幅度BHTT 声波返回时间BLWH Blue WhiteBML below mud lineBOP Blow out preventerBOP stack 防喷器组BS Bit SizeBSW basic?? saturation water(综合含水)CAL borehole diameter 井径CAST 声波扫描成像测井仪CBI Central Bank of IranCBIL 井周声波成像CBL Cement Bond LogCC correlationcoefficientCCAL common core analysis 常规岩心分析CCL Casing Collar LocatorCCM Contractors Committee MeetingCDF cumulative density functionCDF Calibrated Downhole ForceCDS CFcondensat core faciesCF CFA CGR CMC cut fluorescenceComposition Fluid AnalyzerCondensate-to-gas RatioCrown mounted compensator 安装在天车上的升沉补尝器CMR CMR-A Combinable Magnetic Resonance可组合的核磁共振测井仪Timur/Coates PermeabilityCMR-B Timur/Coates PermeabilityCMR_DMRP CMR_FLOW CMR_SMRP CMRT Timur/Coates Permeability Timur/Coates Permeability Timur/Coates Permeability Timur/Coates PermeabilityCN neutron中子COMP AMP Compessional amplitude 纵波幅度COMP ATTN Compessional attunuation 纵波衰减CON induction log 感应测井COPA Companhia de Petroleo de AngolaCP conductor pipeCQG Crystal Quartz GaugeCRA Corrosion resistant AlloyCRF cumulative recovery factor(采出程度)CSI 组合地震成像仪CT cut fluorescenceCt Conductivity of un-flushedCTRY COUNTRYcvgs cavings(井壁垮塌)Cxo Conductivity of flushed zonesDAC 阵列声波DC drilling collarDCCR Daily Cost Control ReportDDR Daily Drilling ReportDEN density 密度Dev deviation 井斜DF direct fluorescenceDGR Daily Geological ReportDHI direct hydrocarbon indicatorDLS dog leg severityDPH Development PhaseDPPM Density Porosity Processing ModeDSC drill string compensatorDSI* Dipole Shear Sonic Imager偶极子横波声波成像仪DT1 Delta-T Shear - Lower DipoleDT1R Delta-T Shear, Receiver Array - Lower Dipole DT2 Delta-T Shear - Upper Dipole {F13.4} DT2R Delta-T Shear, Receiver Array - Upper Dipole DT3R Delta-T Stoneley, Receiver Array - Monopole Stoneley DT4P Delta-T Compressional - Monopole P&S DTCO Delta-T Compressional DTRP Delta-T Compressional,Receiver Array - Monopole P&S DTSM Delta-T Shear {F13.4}DTTP Delta-T Compressional, Transmitter Array - Monopole P&SDVRT 数字垂直测井Dyn Clustering Dynamic Clustering ECD equivalent circulation densityEchoes(Echoescope) Integrated Resistivity neutron density tool 标准回波数据EMW equivalent mud weightEFAC Electro-faciesEOS Equation of StateE&P exploration&productionFCM finantial committee meetingFFV free fluid voluneFG Formation GasFLD FIELDFLW: mud flow rate(gpm)FMI Formation Micro-scanner Image 全井眼地层微电阻率成像仪EPD Elevation of Permanent Datum above Mean Sea LevelFRF final recovery factorFPSO 浮式采油轮FV: Funnel ViscosityGCSE Generalized Caliper SelectionGDAT GeoDetic DatumGDT "gas down to" G&G Geology&geophisicsGIIP gas initially in placegpm gallon per minuteGR natural gamma ray 自然伽马GRSE Generalized Mud Resistivity SelectionGTSE Generalized Temperature SelectionHDIP 六臂倾角HGNS Highly Integrated Gamma Ray Neutron SondeHRMS High-Resolution Mechanical SondeHRLA High-Resolution Azimuthal Laterolog SondeHWDP heavy wall drillpipelb/ft pounds/footIFD 低频偶极测井仪IGIP Initial Gas In placeIld deep investigate induction log 深探测感应测井Ilm medium investigate induction log 中探测感应测井Ils shallow investigate induction log 浅探测感应测井Image DIP 图像的倾角INAGEO Instituto Nacinal de GeologiaINC: Inclination (deg)IPL 孔隙度综合测井仪IRR Initial Remuneration RateJOA Joint Operating AggreementJMC Joint Management CommiteeK potassium 钾kips kilo poundsKRI Kernel Representative IndexKOP Kick Off PointKTH gamma ray without uranium 无铀伽马KTIM Timur/Coates Permeability, NMR_PermeabilityHALS 高分辨率方位侧向测井仪HGS high gravity solidsHRI 高分辨率感应测井仪LATI LATITUDELATD Latitude (N=+ S=-)L/D lay downLFA Live Fluid AnalyzerLGS low gravity solids?LMF Logging Measured From (Name of Logging Elevation Reference)LMRP lower marine riser packageLNG feed gas Liquified Natural Gas ---Sour-rich-wet gas at the outlet of the receiption facilities for hand over to NIOC LNG plantL/O lay outLOC LOCATIONLONG LONGITUDELOND Longitude (E=+ W=-)LOT leak of testLPG Liquified Petroleum GasLWD logging with drillingMAC 多极阵列声波成像MATR Rock Matrix for Neutron Porosity CorrectionsMBVI 束缚流体体积MBVM 可动流体体积MC motion compensator 升沉不成器MCFL Micro-Cylindrically Focused LogMD: Measured Depth (m)MDP Master Development PlanMDRT Mesured Depth Rotary TableMDT Modular Formation Dynamic Tester模块式地层动态测试器(组件式动态地层动力学测试仪)MER Maximum Efficient Ratemkwh milk whiteMIT 多道感应测井仪MMBBL metric million barelMMS Minerals Management ServiceMOA Memorandum of AgreementMOU Memorandum of UnderstandingMPERM 核磁共振渗透率MPHI 核磁共振有效孔隙度MRGC Multi-Resolution Graph-based ClusteringMRIL Magnetic Resonance Imager Log核磁共振成像测井MRILWD magnetic resonance imaging logging while drillingMR_KLAMBDA_PERMS Timur/Coates PermeabilityMRP Magnetic Resonance PorosityMSIP Modular Sonic Imaging Platform 模块化声波成像平台msl mean sea levelMTSA Master Technical Services AgreementM/U make up,mount upMUSD million United States DollarMW: Mud Weight (ppg)NGR neutron gamma ray 中子伽马NGS Natural Gamma SpectrumNIDC National Iranian Drilling CompanyNIOC National Iranian Oil CompanyNMR Nuclear Magnetic ResonanceNSP 防磨补心NTG Net to GrossOBM Oil Based MudOBMI Oil Base MicroImage toolOCM operating committee meetingODP overall development plan 总体开发方案OGWC Original Gas Water ContactOOC Oil On CuttingsOOIP original oil in place 原始石油地质储量OPS operationsOWC oil water contactP90 which represents the realistic low sideP50 the Median value rangeP10 representing the realistic UPSIDE for the prospect.P16H_RT ARC Phase Shift Resistivity 16 inch Spacing at 2 MHz, Environmentally Corrected,Real-TimeP16L_RT ARC Phase Shift Resistivity 16 inch Spacing at 400 KHz, Environmentally Corrected,Real-TimePCG: Pipe connection Gas (%)接钻杆气Pd dew pointPD permanent datumPDAT Permanent DatumPEMA Pesquisas Minairas de AngolaPETRANGOL Companhia de Petroleos de AngolaPEX Platform Express (The Platform Express toolstring includes either the AIT* Array Induction Imager Tool or High-Resolution Azimuthal Laterolog Sonde (HALS) as the resistivity tool. The Three-Detector Lithology Density (TLD) tool and Micro-Cylindrically Focused Log (MCFL) are housed in the High-Resolution Mechanical Sonde (HRMS) powered caliper. Above the HRMS are acompensated thermal neutron and gamma ray in the Highly Integrated Gamma Ray Neutron Sonde (HGNS) and a single-axis accelerometer.) PHIE Effective PorosityPHIE Multimin Porositypl poorly??PML ParaMagnetic 测井公司PMS positioning motor systemPNC 脉冲中子俘获测井POOH pull out of holePOOW pull out of wellPOS Possibility of SuccessPPG pond per gallonProdn productionPSA production sharing agreementPSIA pound per square inch apparentPSDM prestack depth migration 叠前深度偏移PSTM prestack time migrationPTB interval Permian-Triassic boundary interval P/U pick upPV: Plastic ViscosityRADOUTR 井眼的椭圆度Rd deep investigate double lateral resistivity log 深双侧向电阻率测井R/D rig downRHOB-CORR gas corrected Neutron Density RIH run in holeRMR risked mean reserveRMLL micro lateral resistivity log 微侧向电阻率测井ROP: Rate of penetration (m/hr)ROR Rate of ReturnROV remotely operated vehicleRPM Rotations per minute Rs shallow investigate double lateral resistivity log 浅双侧向电阻率测井R/S/C Rotary/Slide/Circulation(Directional Drilling)Rt true formation resistivity.地层真电阻率RT real timeRT Rotary TableR/T running timeRTE Rotary Table ElevationR/U rig upRxo flushed zone formation resistivity 冲洗带地层电阻率S3Surface Sensor Waveform 3SBM Oil Based Mud ' (OBM) includeynthetic oils .SBT分区(扇段)水泥胶结测井仪,SC Service ContractSCAL special core analysis 特殊岩心分析SDC Sonangol Data CentreSG specific gravityShear AMP Shear Amplitude 横波幅度Shear ATTN ShearAttenuation 横波最减SHT Surface Hole TemperatureSICP Shut in casing presureSIDP Shut in drill pipe presure 关井钻杆压力SOM Self-Organization Map ClusteringSONANGOL Sociodade Nacional Combustiveis AngolaSP spontaneous potential 自然电位SPP:Stand pipe Pressure(psi)SPD South Pars DrillingSRVC SERVICE COMPANYst stonelyST side trackStar Imager 微电阻率扫描成像STAR-II声电组合成像测井STD stand立柱STDS standsSTAT STATESTT送入工具suc sucrosicSWAL横波声波测井仪SWD Seismic While DrillingSWF shallow water flowS wb saturation of bond waterS wm saturation of movable waterS wirr saturation of irreducible waterT2 Dist T2分布数据TBRT thin bed resistivity tool 薄层电阻率TCL Thorium Clay - GlobalTCM technical committee meetingTCRT过套管电阻率测井仪TD:Total Depth (m)TDEP HNG Coin Msg River DepthTENS Cable TensionTG Trip GasTG:Total Gas (%)TH thoriumTHP tubing head pressureTIM公司TJVA Temporary Joint Venture Arrangement for Operating Purposes TLC Tough Logging Conditions pipe-conveyed systemTLD Three-Detector Lithology DensityTOC top of cementTP test pressureTPOR总孔隙度TRQ:Rotary Torque KIb*ft)TVD:True Vertical Depth (m)TVDSS True Vertical Depth SubseaTVT true vertical thicknessT/W together withU uranium 铀U Photoelectric absorption cross-sectionUAE United Arab EmiratesUGC underground contourUMR unrisked mean reserveUSGS U.S. Geological SurveyUSI ultrasonic imager超声波成像仪UWI:UNIQUE WELL IDVDL Variable Density LogVPC vertical proportion curveVSI Versatile Seismic ImagerVSP-WD Vertical Seismic Profile While DrillingWBM Water Based MudWEC Well Evaluation ConferenceWH well headWHP well head pressureWOB:Weight on Bit(KIbs)WTHP well tubing head pressureX/O cross over大小头,转换接头XPT-A Xpress Perssure Tool-AXRD X-Ray diffractionYP:Yield Point①R calculated porosity from resistivity with Archie formulaMRXabbr. < 测井> Magnetic Resonance eXpert tool 核磁共振专家测井仪XPTabbr. < 测井> Xpress Pressure ToolGPITabbr. < 测井> General Purpose Inclinometer ToolFMIabbr. <测井> Fullbore Formation Micro Imager 全井眼地层微电阻率成像测井USIPabbr. < 测井> UltraSonic Imaging PlatformHNGSabbr. < 测井> Hostile Environment Natural Gamma Ray SondeVSIabbr. < 测井> Versatile Seismic ImagerCBLabbr. <测井> Cement Bond Log 水泥胶结测井APSabbr. < 颔』井> Accelerator Porosity SondeTLDabbr. < 测井> Three-Detector Lithology DensityCCLabbr. <测井> Casing Collar Log 套管接箍测井.slb./modules/mnemonics/ChannelItem.aspx?codeLow fluid loss and gel strengths of pad mud spotted in the hole just prior to running casing .Riser pipe 隔水管Circulation circuit 循环管道5700系列的测井项目及曲线名称Retrievable tools, sometimes known as Slim Tools , Collar-mounted tools, also known as Fat Tools , a triple rig (able to trip 3 joints of pipe,* 西方阿特拉斯的ECLIPS-5700成像测井系统* 主要包括:声电组合成像测井(STAR-II )、核磁共振测井(MRIL-C )、多极子声波成像仪(M AC )和扇段水泥胶结评价(SBT )等* 哈里伯顿的EXCELL-2000成像测井系统* 主要包括:井周声波扫描成像测井(CAST),微电阻率扫描成像(EMI )* 斯伦贝的MAXIS-500成像测井系统* 主要包括:微电阻率扫描成像(FMI )、阵列感应(AIT )、方位电阻率(ARI )、偶极横波(DSI)、核磁共振(CMR )等成像测井(Compressional)Slowness (time) ( △ tc) * Shear Slowness ( △ ts)HSGR .GAPI {F13.4} HCGR .GAPI {F13.4}HFK .V/V {F13.4} HTHO .PPM:HNGS Standard Gamma Ray:HNGS Computed Gamma Ray:HNGS Formation Potassium Concentration:HNGS Formation Thorium Concentration {F13.4}HTPR .:HNGS Thorium/Potassium Ratio {F13.4} HTUR .:HNGS Thorium/Uranium Ratio {F13.4}HUPR . HURA .PPM :HNGS Uranium/Potassium Ratio {F13.4}:HNGS Formation Uranium Concentration {F13.4}GR_EDTC.GAPI:EDTC Gamma Ray {F13.4}CHR1 :Label Peak Coherence, Receiver Array - Lower Dipole {F13.4}CHR2 . :Label Peak Coherence, Receiver Array - Upper Dipole {F13.4}CHR3 . :Label Peak Coherence, Receiver Array - Monopole Stoneley {F13.4}CHRP. :Label Peak Coherence, Receiver Array, Compressional - Monopole P&S {F13.4} CHTP. :Label Peak Coherence, Transmitter Array, Compressional - Monopole P&S{F13.4}ITT .S HAZI .DEG :Integrated Transit Time {F13.4} :Hole Azimuth {F13.4}P1AZ .DEG RB .DEG:Pad 1 Azimuth {F13.4} :Relative Bearing {F13.4}SDEV .DEGP1AZ_OBMT_2.DEG RB_OBMT_2.DEG PP_OBMT_2.DEVI .DEG:Sonde Deviation {F13.4}:Memorized Pad 1 Azimuth {F13.4}:Memorized Rotated Relative Bearing {F13.4} :Pad Pressure {F13.4}:Hole Deviation {F13.4}RB_OBMT.DEGP1AZ_OBMT.DEG PP_OBMT.HAZI .DEGP1AZ .DEG:Memorized Relative Bearing {F13.4}:Memorized Pad 1 Azimuth {F13.4}:Pad Pressure {F13.4}:Hole Azimuth {F13.4}:Pad 1 Azimuth {F13.4}:Relative Bearing {F13.4}:Sonde Deviation {F13.4}:Injection Impedance Pad A {F13.4}:Injection Impedance Pad B {F13.4}:Injection Impedance Pad C {F13.4}:Injection Impedance Pad D {F13.4}:Buttons resistivities, Pad A {AF13.4}:Buttons resistivities Pad B {AF13.4}:Buttons resistivities Pad C {AF13.4}RB .DEGSDEV .DEGOZA_2.OHMS OZB_2.OHMS OZC_2.OHMS OZD_2.OHMS OBRA_2[0].OHMM OBRB_2[0].OHMM OBRC_2[0].OHMMOBRD_2[0].OHMM C1_OBMT_2.IN C2_OBMT_2.IN OZA .OHMS OZB .OHMS OZC .OHMS OZD .OHMS OBRA[0].OHMM OBRB[0].OHMM OBRC[0].OHMM OBRD[0].OHMM C1_OBMT.IN C2_OBMT.IN :Buttons resistivities Pad D (AF13.4) :OBMT2 Caliper 1 (F13.4):OBMT2 Caliper 2 (F13.4):Injection Impedance Pad A (F13.4) :Injection Impedance Pad B (F13.4):Injection Impedance Pad C (F13.4) :Injection Impedance Pad D (F13.4) :Buttons resistivities, Pad A (AF13.4):Buttons resistivities Pad B (AF13.4) :Buttons resistivities Pad C (AF13.4) :Buttons resistivities Pad D (AF13.4):OBMT Caliper 1 (F13.4) :OBMT Caliper 2 (F13.4)Symbols Muiiipliv fw R*CorKluctivitv Fornwion fmpT arArchil* e ■pan ID nt Saiuraiicn #jspoi>ern iPrWUElcompre*siioiiial.lPhMQ ■昏 trieRe^SlJvrtYSkm factor^ ar shear *窣.噂 MVSIVP T 宙mpeT&W 侦 TimeTime, Cir >ntervdl tiartsit tima Dluniodetlr-c cjptur«《山“VtfocrtVSemic tncerval tranBh time4 c F h k - E n pP PB Q R S S4T t r u ¥zld Deope Eff&cnv* ar *1 octric1尸 I M Form»li^n “曰硕 h Hvdraorbch i ln<tiai (pk ro*n« fd i i|*rr irFCduCiible I Log rojatfi 叫 log L OQ ¥*lu«^ E @ MAtrW me Mg c aU, rnf MudlillrateN Pror^ fiEijEran log p Propagation! I mw E Frop 赤liE rmt i ㈣ & Shear 祖甲网皿邮C —) $lh Shal® si SioneWI Tru» 旧。

rfc3168.The Addition of Explicit Congestion Notification (ECN) to IP

rfc3168.The Addition of Explicit Congestion Notification (ECN) to IP

Network Working Group K. Ramakrishnan Request for Comments: 3168 TeraOptic Networks Updates: 2474, 2401, 793 S. Floyd Obsoletes: 2481 ACIRI Category: Standards Track D. Black EMC September 2001 The Addition of Explicit Congestion Notification (ECN) to IPStatus of this MemoThis document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions forimprovements. Please refer to the current edition of the "InternetOfficial Protocol Standards" (STD 1) for the standardization stateand status of this protocol. Distribution of this memo is unlimited.Copyright NoticeCopyright (C) The Internet Society (2001). All Rights Reserved.AbstractThis memo specifies the incorporation of ECN (Explicit CongestionNotification) to TCP and IP, including ECN’s use of two bits in theIP header.Table of Contents1. Introduction (3)2. Conventions and Acronyms (5)3. Assumptions and General Principles (5)4. Active Queue Management (AQM) (6)5. Explicit Congestion Notification in IP (6)5.1. ECN as an Indication of Persistent Congestion (10)5.2. Dropped or Corrupted Packets (11)5.3. Fragmentation (11)6. Support from the Transport Protocol (12)6.1. TCP (13)6.1.1 TCP Initialization (14)6.1.1.1. Middlebox Issues (16)6.1.1.2. Robust TCP Initialization with an Echoed Reserved Field. 17 6.1.2. The TCP Sender (18)6.1.3. The TCP Receiver (19)6.1.4. Congestion on the ACK-path (20)6.1.5. Retransmitted TCP packets (20)Ramakrishnan, et al. Standards Track [Page 1]6.1.6. TCP Window Probes (22)7. Non-compliance by the End Nodes (22)8. Non-compliance in the Network (24)8.1. Complications Introduced by Split Paths (25)9. Encapsulated Packets (25)9.1. IP packets encapsulated in IP (25)9.1.1. The Limited-functionality and Full-functionality Options.. 27 9.1.2. Changes to the ECN Field within an IP Tunnel (28)9.2. IPsec Tunnels (29)9.2.1. Negotiation between Tunnel Endpoints (31)9.2.1.1. ECN Tunnel Security Association Database Field (32)9.2.1.2. ECN Tunnel Security Association Attribute (32)9.2.1.3. Changes to IPsec Tunnel Header Processing (33)9.2.2. Changes to the ECN Field within an IPsec Tunnel (35)9.2.3. Comments for IPsec Support (35)9.3. IP packets encapsulated in non-IP Packet Headers (36)10. Issues Raised by Monitoring and Policing Devices (36)11. Evaluations of ECN (37)11.1. Related Work Evaluating ECN (37)11.2. A Discussion of the ECN nonce (37)11.2.1. The Incremental Deployment of ECT(1) in Routers (38)12. Summary of changes required in IP and TCP (38)13. Conclusions (40)14. Acknowledgements (41)15. References (41)16. Security Considerations (45)17. IPv4 Header Checksum Recalculation (45)18. Possible Changes to the ECN Field in the Network (45)18.1. Possible Changes to the IP Header (46)18.1.1. Erasing the Congestion Indication (46)18.1.2. Falsely Reporting Congestion (47)18.1.3. Disabling ECN-Capability (47)18.1.4. Falsely Indicating ECN-Capability (47)18.2. Information carried in the Transport Header (48)18.3. Split Paths (49)19. Implications of Subverting End-to-End Congestion Control (50)19.1. Implications for the Network and for Competing Flows (50)19.2. Implications for the Subverted Flow (53)19.3. Non-ECN-Based Methods of Subverting End-to-end CongestionControl (54)20. The Motivation for the ECT Codepoints (54)20.1. The Motivation for an ECT Codepoint (54)20.2. The Motivation for two ECT Codepoints (55)21. Why use Two Bits in the IP Header? (57)22. Historical Definitions for the IPv4 TOS Octet (58)23. IANA Considerations (60)23.1. IPv4 TOS Byte and IPv6 Traffic Class Octet (60)23.2. TCP Header Flags (61)Ramakrishnan, et al. Standards Track [Page 2]23.3. IPSEC Security Association Attributes (62)24. Authors’ Addresses (62)25. Full Copyright Statement (63)1. IntroductionWe begin by describing TCP’s use of packet drops as an indication of congestion. Next we explain that with the addition of active queuemanagement (e.g., RED) to the Internet infrastructure, where routers detect congestion before the queue overflows, routers are no longerlimited to packet drops as an indication of congestion. Routers can instead set the Congestion Experienced (CE) codepoint in the IPheader of packets from ECN-capable transports. We describe when the CE codepoint is to be set in routers, and describe modificationsneeded to TCP to make it ECN-capable. Modifications to othertransport protocols (e.g., unreliable unicast or multicast, reliable multicast, other reliable unicast transport protocols) could beconsidered as those protocols are developed and advance through thestandards process. We also describe in this document the issuesinvolving the use of ECN within IP tunnels, and within IPsec tunnels in particular.One of the guiding principles for this document is that, to theextent possible, the mechanisms specified here be incrementallydeployable. One challenge to the principle of incremental deployment has been the prior existence of some IP tunnels that were notcompatible with the use of ECN. As ECN becomes deployed, non-compatible IP tunnels will have to be upgraded to conform to thisdocument.This document obsoletes RFC 2481, "A Proposal to add ExplicitCongestion Notification (ECN) to IP", which defined ECN as anExperimental Protocol for the Internet Community. This document also updates RFC 2474, "Definition of the Differentiated Services Field(DS Field) in the IPv4 and IPv6 Headers", in defining the ECN fieldin the IP header, RFC 2401, "Security Architecture for the InternetProtocol" to change the handling of IPv4 TOS Byte and IPv6 TrafficClass Octet in tunnel mode header construction to be compatible with the use of ECN, and RFC 793, "Transmission Control Protocol", indefining two new flags in the TCP header.TCP’s congestion control and avoidance algorithms are based on thenotion that the network is a black-box [Jacobson88, Jacobson90]. The network’s state of congestion or otherwise is determined by end-systems probing for the network state, by gradually increasing theload on the network (by increasing the window of packets that areoutstanding in the network) until the network becomes congested and a packet is lost. Treating the network as a "black-box" and treating Ramakrishnan, et al. Standards Track [Page 3]loss as an indication of congestion in the network is appropriate for pure best-effort data carried by TCP, with little or no sensitivityto delay or loss of individual packets. In addition, TCP’scongestion management algorithms have techniques built-in (such asFast Retransmit and Fast Recovery) to minimize the impact of losses, from a throughput perspective. However, these mechanisms are notintended to help applications that are in fact sensitive to the delay or loss of one or more individual packets. Interactive traffic such as telnet, web-browsing, and transfer of audio and video data can be sensitive to packet losses (especially when using an unreliable data delivery transport such as UDP) or to the increased latency of thepacket caused by the need to retransmit the packet after a loss (with the reliable data delivery semantics provided by TCP).Since TCP determines the appropriate congestion window to use bygradually increasing the window size until it experiences a droppedpacket, this causes the queues at the bottleneck router to build up. With most packet drop policies at the router that are not sensitiveto the load placed by each individual flow (e.g., tail-drop on queue overflow), this means that some of the packets of latency-sensitiveflows may be dropped. In addition, such drop policies lead tosynchronization of loss across multiple flows.Active queue management mechanisms detect congestion before the queue overflows, and provide an indication of this congestion to the endnodes. Thus, active queue management can reduce unnecessary queuing delay for all traffic sharing that queue. The advantages of activequeue management are discussed in RFC 2309 [RFC2309]. Active queuemanagement avoids some of the bad properties of dropping on queueoverflow, including the undesirable synchronization of loss acrossmultiple flows. More importantly, active queue management means that transport protocols with mechanisms for congestion control (e.g.,TCP) do not have to rely on buffer overflow as the only indication of congestion.Active queue management mechanisms may use one of several methods for indicating congestion to end-nodes. One is to use packet drops, as is currently done. However, active queue management allows the router to separate policies of queuing or dropping packets from the policiesfor indicating congestion. Thus, active queue management allowsrouters to use the Congestion Experienced (CE) codepoint in a packet header as an indication of congestion, instead of relying solely onpacket drops. This has the potential of reducing the impact of losson latency-sensitive flows.Ramakrishnan, et al. Standards Track [Page 4]There exist some middleboxes (firewalls, load balancers, or intrusion detection systems) in the Internet that either drop a TCP SYN packet configured to negotiate ECN, or respond with a RST. This documentspecifies procedures that TCP implementations may use to providerobust connectivity even in the presence of such equipment.2. Conventions and AcronymsThe keywords MUST, MUST NOT, REQUIRED, SHALL, SHALL NOT, SHOULD,SHOULD NOT, RECOMMENDED, MAY, and OPTIONAL, when they appear in this document, are to be interpreted as described in [RFC2119].3. Assumptions and General PrinciplesIn this section, we describe some of the important design principles and assumptions that guided the design choices in this proposal.* Because ECN is likely to be adopted gradually, accommodatingmigration is essential. Some routers may still only drop packets to indicate congestion, and some end-systems may not be ECN-capable. The most viable strategy is one that accommodatesincremental deployment without having to resort to "islands" of ECN-capable and non-ECN-capable environments.* New mechanisms for congestion control and avoidance need to co- exist and cooperate with existing mechanisms for congestioncontrol. In particular, new mechanisms have to co-exist withTCP’s current methods of adapting to congestion and withrouters’ current practice of dropping packets in periods ofcongestion.* Congestion may persist over different time-scales. The timescales that we are concerned with are congestion events that may last longer than a round-trip time.* The number of packets in an individual flow (e.g., TCPconnection or an exchange using UDP) may range from a smallnumber of packets to quite a large number. We are interested in managing the congestion caused by flows that send enough packets so that they are still active when network feedback reachesthem.* Asymmetric routing is likely to be a normal occurrence in theInternet. The path (sequence of links and routers) followed bydata packets may be different from the path followed by theacknowledgment packets in the reverse direction.Ramakrishnan, et al. Standards Track [Page 5]* Many routers process the "regular" headers in IP packets moreefficiently than they process the header information in IPoptions. This suggests keeping congestion experiencedinformation in the regular headers of an IP packet.* It must be recognized that not all end-systems will cooperate in mechanisms for congestion control. However, new mechanismsshouldn’t make it easier for TCP applications to disable TCPcongestion control. The benefit of lying about participating in new mechanisms such as ECN-capability should be small.4. Active Queue Management (AQM)Random Early Detection (RED) is one mechanism for Active QueueManagement (AQM) that has been proposed to detect incipientcongestion [FJ93], and is currently being deployed in the Internet[RFC2309]. AQM is meant to be a general mechanism using one ofseveral alternatives for congestion indication, but in the absence of ECN, AQM is restricted to using packet drops as a mechanism forcongestion indication. AQM drops packets based on the average queue length exceeding a threshold, rather than only when the queueoverflows. However, because AQM may drop packets before the queueactually overflows, AQM is not always forced by memory limitations to discard the packet.AQM can set a Congestion Experienced (CE) codepoint in the packetheader instead of dropping the packet, when such a field is provided in the IP header and understood by the transport protocol. The useof the CE codepoint with ECN allows the receiver(s) to receive thepacket, avoiding the potential for excessive delays due toretransmissions after packet losses. We use the term ’CE packet’ to denote a packet that has the CE codepoint set.5. Explicit Congestion Notification in IPThis document specifies that the Internet provide a congestionindication for incipient congestion (as in RED and earlier work[RJ90]) where the notification can sometimes be through markingpackets rather than dropping them. This uses an ECN field in the IP header with two bits, making four ECN codepoints, ’00’ to ’11’. The ECN-Capable Transport (ECT) codepoints ’10’ and ’01’ are set by thedata sender to indicate that the end-points of the transport protocol are ECN-capable; we call them ECT(0) and ECT(1) respectively. Thephrase "the ECT codepoint" in this documents refers to either of the two ECT codepoints. Routers treat the ECT(0) and ECT(1) codepointsas equivalent. Senders are free to use either the ECT(0) or theECT(1) codepoint to indicate ECT, on a packet-by-packet basis. Ramakrishnan, et al. Standards Track [Page 6]The use of both the two codepoints for ECT, ECT(0) and ECT(1), ismotivated primarily by the desire to allow mechanisms for the datasender to verify that network elements are not erasing the CEcodepoint, and that data receivers are properly reporting to thesender the receipt of packets with the CE codepoint set, as required by the transport protocol. Guidelines for the senders and receivers to differentiate between the ECT(0) and ECT(1) codepoints will beaddressed in separate documents, for each transport protocol. Inparticular, this document does not address mechanisms for TCP end-nodes to differentiate between the ECT(0) and ECT(1) codepoints.Protocols and senders that only require a single ECT codepoint SHOULD use ECT(0).The not-ECT codepoint ’00’ indicates a packet that is not using ECN. The CE codepoint ’11’ is set by a router to indicate congestion tothe end nodes. Routers that have a packet arriving at a full queuedrop the packet, just as they do in the absence of ECN.+-----+-----+| ECN FIELD |+-----+-----+ECT CE [Obsolete] RFC 2481 names for the ECN bits.0 0 Not-ECT0 1 ECT(1)1 0 ECT(0)1 1 CEFigure 1: The ECN Field in IP.The use of two ECT codepoints essentially gives a one-bit ECN noncein packet headers, and routers necessarily "erase" the nonce whenthey set the CE codepoint [SCWA99]. For example, routers that erased the CE codepoint would face additional difficulty in reconstructingthe original nonce, and thus repeated erasure of the CE codepointwould be more likely to be detected by the end-nodes. The ECN nonce also can address the problem of misbehaving transport receivers lying to the transport sender about whether or not the CE codepoint was set in a packet. The motivations for the use of two ECT codepoints isdiscussed in more detail in Section 20, along with some discussion of alternate possibilities for the fourth ECT codepoint (that is, thecodepoint ’01’). Backwards compatibility with earlier ECNimplementations that do not understand the ECT(1) codepoint isdiscussed in Section 11.In RFC 2481 [RFC2481], the ECN field was divided into the ECN-Capable Transport (ECT) bit and the CE bit. The ECN field with only theECN-Capable Transport (ECT) bit set in RFC 2481 corresponds to theECT(0) codepoint in this document, and the ECN field with both the Ramakrishnan, et al. Standards Track [Page 7]ECT and CE bit in RFC 2481 corresponds to the CE codepoint in thisdocument. The ’01’ codepoint was left undefined in RFC 2481, andthis is the reason for recommending the use of ECT(0) when only asingle ECT codepoint is needed.0 1 2 3 4 5 6 7+-----+-----+-----+-----+-----+-----+-----+-----+| DS FIELD, DSCP | ECN FIELD |+-----+-----+-----+-----+-----+-----+-----+-----+DSCP: differentiated services codepointECN: Explicit Congestion NotificationFigure 2: The Differentiated Services and ECN Fields in IP.Bits 6 and 7 in the IPv4 TOS octet are designated as the ECN field.The IPv4 TOS octet corresponds to the Traffic Class octet in IPv6,and the ECN field is defined identically in both cases. Thedefinitions for the IPv4 TOS octet [RFC791] and the IPv6 TrafficClass octet have been superseded by the six-bit DS (DifferentiatedServices) Field [RFC2474, RFC2780]. Bits 6 and 7 are listed in[RFC2474] as Currently Unused, and are specified in RFC 2780 asapproved for experimental use for ECN. Section 22 gives a briefhistory of the TOS octet.Because of the unstable history of the TOS octet, the use of the ECN field as specified in this document cannot be guaranteed to bebackwards compatible with those past uses of these two bits thatpre-date ECN. The potential dangers of this lack of backwardscompatibility are discussed in Section 22.Upon the receipt by an ECN-Capable transport of a single CE packet,the congestion control algorithms followed at the end-systems MUST be essentially the same as the congestion control response to a *single* dropped packet. For example, for ECN-Capable TCP the source TCP isrequired to halve its congestion window for any window of datacontaining either a packet drop or an ECN indication.One reason for requiring that the congestion-control response to the CE packet be essentially the same as the response to a dropped packet is to accommodate the incremental deployment of ECN in both end-systems and in routers. Some routers may drop ECN-Capable packets(e.g., using the same AQM policies for congestion detection) whileother routers set the CE codepoint, for equivalent levels ofcongestion. Similarly, a router might drop a non-ECN-Capable packet but set the CE codepoint in an ECN-Capable packet, for equivalent Ramakrishnan, et al. Standards Track [Page 8]levels of congestion. If there were different congestion controlresponses to a CE codepoint than to a packet drop, this could result in unfair treatment for different flows.An additional goal is that the end-systems should react to congestion at most once per window of data (i.e., at most once per round-triptime), to avoid reacting multiple times to multiple indications ofcongestion within a round-trip time.For a router, the CE codepoint of an ECN-Capable packet SHOULD onlybe set if the router would otherwise have dropped the packet as anindication of congestion to the end nodes. When the router’s bufferis not yet full and the router is prepared to drop a packet to inform end nodes of incipient congestion, the router should first check tosee if the ECT codepoint is set in that packet’s IP header. If so,then instead of dropping the packet, the router MAY instead set theCE codepoint in the IP header.An environment where all end nodes were ECN-Capable could allow newcriteria to be developed for setting the CE codepoint, and newcongestion control mechanisms for end-node reaction to CE packets.However, this is a research issue, and as such is not addressed inthis document.When a CE packet (i.e., a packet that has the CE codepoint set) isreceived by a router, the CE codepoint is left unchanged, and thepacket is transmitted as usual. When severe congestion has occurredand the router’s queue is full, then the router has no choice but to drop some packet when a new packet arrives. We anticipate that such packet losses will become relatively infrequent when a majority ofend-systems become ECN-Capable and participate in TCP or othercompatible congestion control mechanisms. In an ECN-Capableenvironment that is adequately-provisioned, packet losses shouldoccur primarily during transients or in the presence of non-cooperating sources.The above discussion of when CE may be set instead of dropping apacket applies by default to all Differentiated Services Per-HopBehaviors (PHBs) [RFC 2475]. Specifications for PHBs MAY providemore specifics on how a compliant implementation is to choose between setting CE and dropping a packet, but this is NOT REQUIRED. A router MUST NOT set CE instead of dropping a packet when the drop that would occur is caused by reasons other than congestion or the desire toindicate incipient congestion to end nodes (e.g., a diffserv edgenode may be configured to unconditionally drop certain classes oftraffic to prevent them from entering its diffserv domain). Ramakrishnan, et al. Standards Track [Page 9]We expect that routers will set the CE codepoint in response toincipient congestion as indicated by the average queue size, usingthe RED algorithms suggested in [FJ93, RFC2309]. To the best of our knowledge, this is the only proposal currently under discussion inthe IETF for routers to drop packets proactively, before the bufferoverflows. However, this document does not attempt to specify aparticular mechanism for active queue management, leaving thatendeavor, if needed, to other areas of the IETF. While ECN isinextricably tied up with the need to have a reasonable active queue management mechanism at the router, the reverse does not hold; active queue management mechanisms have been developed and deployedindependent of ECN, using packet drops as indications of congestionin the absence of ECN in the IP architecture.5.1. ECN as an Indication of Persistent CongestionWe emphasize that a *single* packet with the CE codepoint set in anIP packet causes the transport layer to respond, in terms ofcongestion control, as it would to a packet drop. The instantaneous queue size is likely to see considerable variations even when therouter does not experience persistent congestion. As such, it isimportant that transient congestion at a router, reflected by theinstantaneous queue size reaching a threshold much smaller than thecapacity of the queue, not trigger a reaction at the transport layer. Therefore, the CE codepoint should not be set by a router based onthe instantaneous queue size.For example, since the ATM and Frame Relay mechanisms for congestion indication have typically been defined without an associated notionof average queue size as the basis for determining that anintermediate node is congested, we believe that they provide a verynoisy signal. The TCP-sender reaction specified in this document for ECN is NOT the appropriate reaction for such a noisy signal ofcongestion notification. However, if the routers that interface tothe ATM network have a way of maintaining the average queue at theinterface, and use it to come to a reliable determination that theATM subnet is congested, they may use the ECN notification that isdefined here.We continue to encourage experiments in techniques at layer 2 (e.g., in ATM switches or Frame Relay switches) to take advantage of ECN.For example, using a scheme such as RED (where packet marking isbased on the average queue length exceeding a threshold), layer 2devices could provide a reasonably reliable indication of congestion. When all the layer 2 devices in a path set that layer’s ownCongestion Experienced codepoint (e.g., the EFCI bit for ATM, theFECN bit in Frame Relay) in this reliable manner, then the interface router to the layer 2 network could copy the state of that layer 2 Ramakrishnan, et al. Standards Track [Page 10]Congestion Experienced codepoint into the CE codepoint in the IPheader. We recognize that this is not the current practice, nor isit in current standards. However, encouraging experimentation in this manner may provide the information needed to enable evolution ofexisting layer 2 mechanisms to provide a more reliable means ofcongestion indication, when they use a single bit for indicatingcongestion.5.2. Dropped or Corrupted PacketsFor the proposed use for ECN in this document (that is, for atransport protocol such as TCP for which a dropped data packet is an indication of congestion), end nodes detect dropped data packets, and the congestion response of the end nodes to a dropped data packet is at least as strong as the congestion response to a received CEpacket. To ensure the reliable delivery of the congestion indication of the CE codepoint, an ECT codepoint MUST NOT be set in a packetunless the loss of that packet in the network would be detected bythe end nodes and interpreted as an indication of congestion.Transport protocols such as TCP do not necessarily detect all packet drops, such as the drop of a "pure" ACK packet; for example, TCP does not reduce the arrival rate of subsequent ACK packets in response to an earlier dropped ACK packet. Any proposal for extending ECN-Capability to such packets would have to address issues such as thecase of an ACK packet that was marked with the CE codepoint but waslater dropped in the network. We believe that this aspect is stillthe subject of research, so this document specifies that at thistime, "pure" ACK packets MUST NOT indicate ECN-Capability.Similarly, if a CE packet is dropped later in the network due tocorruption (bit errors), the end nodes should still invoke congestion control, just as TCP would today in response to a dropped datapacket. This issue of corrupted CE packets would have to beconsidered in any proposal for the network to distinguish betweenpackets dropped due to corruption, and packets dropped due tocongestion or buffer overflow. In particular, the ubiquitousdeployment of ECN would not, in and of itself, be a sufficientdevelopment to allow end-nodes to interpret packet drops asindications of corruption rather than congestion.5.3. FragmentationECN-capable packets MAY have the DF (Don’t Fragment) bit set.Reassembly of a fragmented packet MUST NOT lose indications ofcongestion. In other words, if any fragment of an IP packet to bereassembled has the CE codepoint set, then one of two actions MUST be taken:Ramakrishnan, et al. Standards Track [Page 11]* Set the CE codepoint on the reassembled packet. However, thisMUST NOT occur if any of the other fragments contributing tothis reassembly carries the Not-ECT codepoint.* The packet is dropped, instead of being reassembled, for anyother reason.If both actions are applicable, either MAY be chosen. Reassembly of a fragmented packet MUST NOT change the ECN codepoint when all of the fragments carry the same codepoint.We would note that because RFC 2481 did not specify reassemblybehavior, older ECN implementations conformant with that Experimental RFC do not necessarily perform reassembly correctly, in terms ofpreserving the CE codepoint in a fragment. The sender could avoidthe consequences of this behavior by setting the DF bit in ECN-Capable packets.Situations may arise in which the above reassembly specification isinsufficiently precise. For example, if there is a malicious orbroken entity in the path at or after the fragmentation point, packet fragments could carry a mixture of ECT(0), ECT(1), and/or Not-ECTcodepoints. The reassembly specification above does not placerequirements on reassembly of fragments in this case. In situations where more precise reassembly behavior would be required, protocolspecifications SHOULD instead specify that DF MUST be set in allECN-capable packets sent by the protocol.6. Support from the Transport ProtocolECN requires support from the transport protocol, in addition to the functionality given by the ECN field in the IP packet header. Thetransport protocol might require negotiation between the endpointsduring setup to determine that all of the endpoints are ECN-capable, so that the sender can set the ECT codepoint in transmitted packets. Second, the transport protocol must be capable of reactingappropriately to the receipt of CE packets. This reaction could bein the form of the data receiver informing the data sender of thereceived CE packet (e.g., TCP), of the data receiver unsubscribing to a layered multicast group (e.g., RLM [MJV96]), or of some otheraction that ultimately reduces the arrival rate of that flow on that congested link. CE packets indicate persistent rather than transient congestion (see Section 5.1), and hence reactions to the receipt ofCE packets should be those appropriate for persistent congestion.This document only addresses the addition of ECN Capability to TCP,leaving issues of ECN in other transport protocols to furtherresearch. For TCP, ECN requires three new pieces of functionality: Ramakrishnan, et al. Standards Track [Page 12]。

imap rfc标准

imap rfc标准

Internet Message Access Protocol (IMAP) is an email retrieval protocol. It stores email messages on a mail server and enables the recipient to view and manipulate them as though they were stored locally on their device. IMAP was developed in the late 1980s and has since become one of the most widely used email retrieval protocols.The IMAP standard is defined in RFC 3501, which was published in 2003. This document provides a detailed description of the protocol's functionality, including its data formats, commands, and responses. The standard specifies how IMAP clients and servers should communicate with each other to enable the retrieval and manipulation of email messages.One of the key features of IMAP is its support for multiple clients accessing the same mailbox simultaneously. This is achieved through the use of a "shared" storage model, where all clients see the same set of messages and folders stored on the server. This allows users to access their email from different devices without having to worry about synchronizing their messages manually.Another important aspect of IMAP is its support for message organization and management. Clients can create, delete, and rename folders, as well as move messages between folders. They can also search for specific messages based on various criteria, such as sender, subject, or date.IMAP also provides a range of features for managing individual messages. Clients can mark messages as read or unread, flag them for follow-up, and even move them to a specific folder. They can also reply to messages, forward them to others, and generate replies or forwards with attachments.Overall, the IMAP standard provides a powerful and flexible framework for managing email messages. Its support for shared storage, message organization, and advanced message management features make it a popular choice for both personal and business email users.。

srv6相关标准

srv6相关标准

SRv6(Segment Routing over IPv6)是一种基于IPv6网络的新型路由技术,它通过在IPv6数据包中添加一个24位的标签来标识不同的路径。

这种技术可以提高网络的可扩展性、灵活性和安全性。

以下是一些与SRv6相关的标准:1. RFC 8210:这是SRv6的基本规范,定义了SRv6的基本概念、操作和实现要求。

2. RFC 8365:这个文档描述了如何使用BGP-LS(Border Gateway Protocol - Link State)协议在IPv6网络中传播SRv6路由信息。

3. RFC 8402:这个文档描述了如何使用MP-BGP(Multiprotocol BGP)协议在IPv6网络中传播SRv6路由信息。

4. RFC 8415:这个文档描述了如何使用IS-IS(Intermediate System to Intermediate System)协议在IPv6网络中传播SRv6路由信息。

5. RFC 8475:这个文档描述了如何使用OSPF(Open Shortest Path First)协议在IPv6网络中传播SRv6路由信息。

6. RFC 8597:这个文档描述了如何使用BFD(Bidirectional Forwarding Detection)协议在IPv6网络中检测SRv6路径的状态。

7. RFC 8795:这个文档描述了如何使用LDP(Label Distribution Protocol)协议在IPv6网络中分发SRv6标签。

8. RFC 8879:这个文档描述了如何使用PCE(Path Computation Element)协议在IPv6网络中计算SRv6路径。

9. RFC 8915:这个文档描述了如何使用SDN(Software-Defined Networking)技术来实现SRv6网络。

10. RFC 9119:这个文档描述了如何使用SRv6技术来实现网络切片。

RFC1058 Routing Information Protocol

RFC1058 Routing Information Protocol

RFC1058 Routing Information Protocol1. 简介该文档描述了基于Bellman-Ford(距离向量)算法的一系列路由协议的一种协议。

从早期的ARPANET开始,该算法已经在计算机网络中用于路由计算。

本文描述的特定包格式和协议都基于程序”Routed”,该程序包含在Unix 的伯克利分发中。

”routed”已经成为事实的标准,用于在主机和网关间交换路由信息。

它被大多数商业IP网关的提供者实现。

然而,请注意,这些提供者中的很多都有自己的协议,用于自己的网关。

该协议常常被用作内部网关协议。

在一个国际级的网络,如当前的因特网,没有一个单个路由协议作为整个网络的协议使用。

网络被组织成很多的自治系统。

一个自治系统通常被一个管理实体,或者至少有一些技术或者管理控制。

这些在不同的自治系统间是不同的。

用在自治系统内部的协议叫做内部网关协议,或者“IGP”。

在自治系统间采用独立的协议。

最早的这种协议,依然在网络上使用,叫做外部网关协议“EGP”。

这种协议用作AS间的路由协议。

RIP设计工作在中等规模的网络,适用于很多校园或者区域网络的IGP。

RIP协议并不打算应用在更复杂的缓急国内下。

RIP是距离向量算法中的一个。

最早描述该算法的是作者Ford和Fulkerson。

因为这些,这个也叫做Ford-Fulkerson算法。

术语Bellman-Ford 也在使用。

它来源于事实,这个算法基于Bellman等式,动态编程的基础。

RIP用于基于IP的网络。

1.1.协议限制该协议并没有解决每一个路由问题。

如上所述,RIP的主要目的是用在IGP,适当的网络规模。

初次之外,下面的限制要注意:●该协议限制在网络最长距离15跳。

设计者相信这个基本的协议不适应大型的网络。

●协议依靠“计数到无限”来解决特定不常用的情况。

如果网络系统包含几百个网络,路由环回会形成。

环回的解决需要大量时间(如果路由更新频率受限),或者带宽(当检测到更新发送更新变化)。

nssa no-summary 与 nssa 的区别 -回复

nssa no-summary 与 nssa 的区别 -回复

nssa no-summary 与nssa 的区别-回复标题:NSSA与NSSA noSummary的区别详解在Cisco路由器的OSPF(开放最短路径优先)协议中,NSSA(非完全stub 区域)和NSSA noSummary是两种特殊类型的区域配置。

虽然它们在名称上相似,但在功能和应用上存在一些关键的区别。

以下将详细解析这两种配置的区别。

一、NSSA的基本理解NSSA是一种特殊的stub区域,它允许区域内引入外部路由,但这些外部路由只能以类型7的LSA(链路状态公告)形式存在于区域内,不能被转换为类型5的LSA传播到其他区域。

这意味着,NSSA区域可以接收来自其他区域的路由信息,但不能将这些信息传递给其他区域,除非这些路由是通过区域内的一台ASBR(自治系统边界路由器)引入的。

二、NSSA noSummary的理解NSSA noSummary是NSSA的一种扩展配置,它在NSSA的基础上增加了一个限制:禁止区域间的汇总路由(Type 3 LSA)在NSSA区域内传播。

也就是说,NSSA noSummary区域不仅不允许外部路由以Type 5 LSA 的形式传播出去,也不允许区域间的汇总路由在区域内传播。

三、NSSA与NSSA noSummary的区别1. 外部路由的处理:在NSSA区域中,外部路由可以被引入并以Type 7 LSA的形式在区域内传播,但不能转换为Type 5 LSA传播到其他区域。

而在NSSA noSummary区域中,外部路由的处理方式与NSSA区域相同。

2. 区域间汇总路由的处理:这是NSSA与NSSA noSummary的主要区别。

在NSSA区域中,区域间的汇总路由(Type 3 LSA)是可以正常传播的。

然而,在NSSA noSummary区域中,这种类型的路由被禁止传播。

这个特性在某些情况下非常有用。

例如,如果一个大型网络被划分为多个NSSA区域,而你希望每个区域只了解其自身所需的路由信息,而不希望看到其他区域的汇总路由,那么就可以使用NSSA noSummary配置。

AppFlow_Configuration_Guide

AppFlow_Configuration_Guide

CITRIX®AppFlow Configuration GuideTable of ContentsIntroduction (3)Enable AppFlow Feature (3)Adding AppFlow Collector (4)Adding an AppFlow Action (5)Adding an AppFlow Policy (6)Binding an AppFlow Policy (7)Setting AppFlow Parameters (8)IntroductionThe Citrix® NetScaler® appliance is a central point of control for all application trafficin the data center. It collects flow and user‐session level information valuable for application performance monitoring, analytics, and business intelligence applications. AppFlow transmits this information by using the Internet Protocol Flow InformationeXport (IPFIX) format, which is an open Internet Engineering Task Force (IETF) standard defined in RFC 5101. IPFIX (the standardized version of Cisco's NetFlow) is widely usedto monitor network flow information. AppFlow defines new Information Elements to represent application‐level information.Using UDP as the transport protocol, AppFlow transmits the collected data, called flow records, to one or more IPv4 collectors. The collectors aggregate the flow records and generate real‐time or historical reports.AppFlow provides visibility at the transaction level for HTTP, SSL, TCP, and SSL_TCPflows. You can sample and filter the flow types that you want to monitor.AppFlow use actions and policies to send records for a selected flow to specific set of collectors. An AppFlow action specifies which set of collectors will receive the AppFlow records. Policies, which are based on advanced expressions can be configured to select flows for which flow records will be sent to the collectors specified by the associated AppFlow action.To limit the types of flows, you can enable AppFlow for a virtual server. AppFlow canalso provide statistics for the virtual server.You can also enable AppFlow for a specific service, representing an application server,and monitor the traffic to that application server.Note: The AppFlow feature is supported in NetScaler 9.3 nCore only.You configure AppFlow in the same manner as most other policy‐based features. First,you enable the AppFlow feature. Then you specify the collectors to which the flowrecords are sent. After that, you define actions, which are sets of configured collectors. Then you configure one or more policies and associate a action to each policy. Thepolicy tells the NetScaler appliance to select requests the flow records of which aresent to the associated action. Finally, you bind each policy either globally or to aspecific virtual servers to put it into effect.You can further set AppFlow parameters to specify the template refresh interval and to enable the exporting of httpURL, httpCookie, and httpReferer information. On each collector, you must specify the NetScaler IP address as the address of the exporter.Enable AppFlow FeatureTo be able to use the AppFlow feature, you must first enable it.To enabl 1. In the 2. In the 3. In the clickAddin A collecto send flow HoweverTo add a 1. In 2. C 3. In 4.In e the AppFl e navigation e details pan e Configure OK .ng AppFl or receives f w records, yo r, you canno collector by n the navigat lick Collecto n the details n the Create • Na • IPow feature pane, expa ne, under Mo Advanced F ow Colle flow records ou must spe t export the y using the c tion pane, e ors . pane, click A AppFlow Co ame* Address*by using the nd System , a odes and Fe Features dial ectors generated cify at least e same data configuratio xpand Syste Add . ollectordial e configurat and then clic eatures , click log box, sele by the NetSc one collecto to multiple c on utility em , and then og box, sett tion utilityck Settings .k Configure ect the AppF caler applian or. You can s collectors. n expand Ap thefollowin advanced fe Flow check b nce. To be a specify up to ppFlow . gparameter eatures . box, and the ble to o four. rs:n*A 5. CAddin An AppFl AppFlowTo add a1. In2. C3. In4. In5. D6. C co• Po A required p lick Create , ng an Ap low action is w policy matc n AppFlow a n the navigat lick Actions n the details n the Add Ap Do one of th • If bo • If • If lick Create , onfiguration ort parameter.and then cli pFlow A s a set of col ches. action by us tion pane, e .pane, click A ppFlow Actio e following t the collecto oxes.you want to you want toand then cli n has been su ck Close . Actionlectors, to w sing the conf xpand Syste Add . on dialog bo to associate rs that you w o specify all t o specify a ne ck Close . A m uccessfully i which the flo figuration u em, and then ox, type a na collectors w want are list the collector ew collector message app mplemented ow records a tility n expand Ap ame for the n with the acti ted, click the rs, click Activ r, click Add .pears in the d. are sent if th ppFlow . new action. on:e correspond vate All .status bar, s e associated ding checkstating thatd theAddinAfter you AppFlow To add a1. In2. C3. In4.In ng an Ap u configure a w policy is bas n AppFlow p n the navigat lick Policies n the details n the Create • Na • Ac • ExpFlow P an AppFlow sed on a rule policy by us tion pane, e . pane, click A AppFlow Po ame* ction* xpression* (Y 1. 2. 3.Policy action, you e, which con ing the conf xpand Syste Add . olicy , set the You can add You can cli Frequently You can typFor brief he hold down You canus must next co nsists of one figuration ut em , and then e following p the express ck Add and c y Used Expre pe the expre elp and prom the CTRL ke e the AddEx onfigure an e or more ex tility n expand Ap parameters:ion in any of choose an e essions drop ession direct mpts, while t ey while you xpressiondi AppFlow po pressions. ppFlow .f three waysexisting expr p ‐down list.tly into the s the cursor is u press the S ialog box.)olicy. An s. ession in the supplied text s in the text pace bar.e tbox. box,5. C coBindin To put a traffic th policy ap overrideTo bind a1. In2. O3. In G4. C A5. C A *A req lick Create , onfiguration ng an Ap policy into e at flows thro pplies only to global/LB vs an AppFlow n the navigat On the AppF n the AppFlo Global .lick Insert P AppFlow poli lick one of t AppFlow poli quired param and then cli n has been su ppFlow P effect, you m ough the Ne o the traffic server/CS vs policy by us tion pane, e Flow page, cl ow Policy Ma olicy to inse cies.he policies o cies.meter.ck Close . A m uccessfully i Policymust bind it e etScaler, or t related to th server/defau sing the con xpand Syste lick AppFlow anager dialo ert a new row on the list. T message app mplemented either globa o a specific v hat virtual se ult global. nfiguration u em , and then w Policy Man og box, in th w and displa hat policy is pears in the d. lly, so that it virtual serve erver. Policy utility n click AppFl nager . e Bind Point ay a drop ‐do inserted int status bar, s t applies to a er, so that th can be bou low . ts menu, sel wn list of all to the list of stating that all he nd to lect Overrid l unbound Override G thee lobal6. C7. C suSettin You can sTo set th1. In2. O3. C lick Apply C lick Close . uccessfully i ng AppFl set AppFlow he AppFlow n the navigat On the AppFl lick OK , and hanges . A message ap mplemented ow Para w parameters parameters tion pane, e low landing then click C ppears in the d. ameterss to customi by using the xpand Syste page, under Close . e status bar,ze the expo e configurat em , and then r Settings , se , stating that rting of data tion utility n click AppFl et the requir t the configu a to the colle low . red paramet uration has b ectors. ters. been。

Infoprint 250 導入と計画の手引き 第 7 章ホスト

Infoprint 250 導入と計画の手引き 第 7 章ホスト

SUBNETMASK
255.255.255.128
Type of service...............: TOS
*NORMAL
Maximum transmission unit.....: MTU
*LIND
Autostart.....................:
AUTOSTART
*YES
: xx.xxx.xxx.xxx
: xx.xxx.xxx.xxx
*
(
)
IEEE802.3
60 1500
: xxxx
48 Infoprint 250
31. AS/400
IP
MTU
1
1
IPDS TCP
CRTPSFCFG (V3R2)
WRKAFP2 (V3R1 & V3R6)
RMTLOCNAME RMTSYS
MODEL
0
Advanced function printing............:
AFP
*YES
AFP attachment........................:
AFPATTACH
*APPC
Online at IPL.........................:
ONLINE
FORMFEED
*CONT
Separator drawer......................:
SEPDRAWER
*FILE
Separator program.....................:
SEPPGM
*NONE
Library.............................:

rfc相关设置及使用

rfc相关设置及使用

rfc相关设置及使用RFC(Request for Comments)是一种用于定义互联网协议、标准和相关问题的文档。

RFC的格式由互联网工程任务组(IETF)统一规定,它们记录了网络技术的发展和演进过程。

在本文中,我们将介绍RFC相关的设置和使用。

1. 了解RFC的作用和历史:RFC是由IETF组织制定的一种标准化文档,它记录了互联网协议的设计、开发和演化过程。

RFC起源于20世纪60年代的ARPANET,是一种社区驱动的文档,通过共享和讨论来推动互联网技术的发展。

RFC文档旨在提供指南、建议和最佳实践,帮助网络技术人员解决问题。

2. 寻找和阅读RFC文档:RFC文档可以在互联网上免费获取,IETF的官方网站和其他资源库都有存档。

这些文档按照顺序编号,并且以RFC开头,比如RFC 791定义了IPv4协议。

通过搜索引擎或在IETF网站上使用关键词搜索,可以找到特定主题的RFC文档。

阅读RFC文档时,应该注意文档的状态,有一些可能已经被更新或废弃。

3. 使用RFC文档:RFC文档在网络技术的发展过程中起着重要的指导作用。

它们提供了协议规范、算法实现、安全性和隐私等方面的建议。

网络管理员、网络工程师和开发人员可以使用RFC文档来了解和理解特定协议或标准的设计原理和要求。

此外,RFC文档还常用于进行互联网协议的实现、编程和配置。

4. 参与RFC的制定过程:RFC并不是静止的文件,而是一个持续演进的过程。

任何人都可以参与到RFC的制定过程中。

要参与RFC的制定,可以加入IETF并参与相关的工作组或邮件列表。

通过这种方式,个人可以提出改进建议,参与讨论和标准化的制定。

5. 遵循RFC的指导原则:在网络技术领域,遵循RFC的指导原则是至关重要的。

这些指导原则包括设计原则、协议分层、安全性和互操作性等要求。

遵循RFC的指导原则可以确保网络协议的正确性、稳定性和可靠性,同时也可以促进网络技术的发展和创新。

总结起来,RFC在互联网技术领域起着重要的作用,它们记录了互联网协议的发展历程和指导原则。

ZTE中兴售后初级试题

ZTE中兴售后初级试题

1.路由器的主要功能不包括速率适配子网协议转换七层协议转换报文分片与重组1、以下为广域网协议的有:Pppx.25Ethernet IIFreamRelayIEEE802.2/802.3;2、TraceQouter的功能是:用于检查网管是否正常用于检查网络连接是否可达用于分析网络在哪里出了问题;3、下面是基于TCP的协议有:pingTftptelnetftpospfsnmpwww4、解决路由环路问题的方法是:定义路由权的最大值(可以挽救但不可以避免)路由保持法水平分割路由器重启;5、与动态路由相比较,静态路由有哪些优点?带宽占用少简单路由器能自动发现拓扑变化路由器能自动计算新的路由;6、浮动静态路由的作用是?提供备份路由提供负载分担路径为业务提供可靠性保护保障出现故障时能尽快恢复业务为用户提供浮动的网关7、在VRRP的配置过程中,可命令行配置的有效优先级包括:1101002558、下面关于ospf的叙述正确的有:ospf是一种基于D-V算法的动态单播路由协议为了节省路由开销,在广播网络ospf以广播地址发送报文将自治系统划分为不同的区域之后,为了保证区域之间能够正常通讯,ospf定义了骨干区域,并规定骨干区域必须保持联通其他区域直接环绕在骨干区域周围一个广播网中priority最大的那台路由器不一定是DR;9、静态路由是否出现在路由表中取决于下一跳是否可达、即此路由的下一跳地址所处的网段对本路由是否可达?对10、默认情况下,vrrp组中的master何slave路由器每个1秒钟发送“keep alive”消息,判断组中其他成员是否存在。

错11、39系列和G系列交换机不支持NAT功能,错12、D类地址缺省子网掩码是255.255.255.240 错13、ospf协议生成的路由分为四类,按优先级从高到低顺序来说:区域内路由、区域间路由、第一类外部路由、第二类外部路由对14、在配置SuperVLAN和P-Vlan的时候,两者的相同点是用户所用的IP地址可以是同一网段的,不同点是SuperVLAN不能配置隔离用户之间的通信用户而P-VLAN可以实现。

合勤交换机使用手册

合勤交换机使用手册

合勤科技交换机使用手册速查版本 1.0目录1. 硬件连接、常规设置与维护 (4)1.1 硬件安装 (4)1.2 硬件介绍 (5)1.3 常规设置 (6)2. 常规维护 (11)3. 高级设定 (13)3.1 VLAN设定 (13)3.2 STP(生成树协议)设置 (24)3.3 Access Control List (访问控制列表) (28)3.4 ES-3124_ACL功能完成IP与MAC的绑定 (32)3.5 ES-3124_Link Aggregation设置 (36)3.6 IGMP Snooping(组播侦听) (38)3.7 Static MAC Forwarding(静态MAC地址转发) (39)3.8 Filtering (过滤器) (39)3.9 Broadcast Storm Control (广播风暴控制) (39)3.10 Mirroring (端口镜像) (40)3.11 DHCP Relay (41)1. 硬件连接、常规设置与维护本章节介绍硬件连接方法,常规设置和基本维护方法,能够帮助您快速安全的将交换机接入网络。

1.1 硬件安装1.1.1 独立式安装:您可以将随机配备的绝缘脚垫安装到交换机底部,并将交换机置放到安全、干燥、清洁的环境中。

图-11.1.2 机架式安装(1)将随机配备的安装部件牢固的固定在交换机两侧。

如下图所示:图-2(2)利用安装部件将交换机牢固的安装在您的机架上。

如下图所示:注释: 合勤科技交换机系列,ES-2024A/ ES-3124/ ES-3148/ GS-2024/ ES-1528/ ES-1552/ GS-1524/ GS-1548都是标准的19英寸长度设计。

图-31.2 硬件介绍合勤交换机前面板的设计大体相似, 左侧是10/100/1000Mbps以太网接口,或者SFP光口。

右侧通常是上联端口,1000Mpbs的以太网接口或者SFP光口,或者是以太网和SFP双重属性端口。

合勤交换机使用手册

合勤交换机使用手册

合勤科技交换机使用手册速查版本 1.0目录1. 硬件连接、常规设置与维护 (3)1.1 硬件安装 (3)1.2 硬件介绍 (3)1.3 常规设置 (5)2. 常规维护 (10)3. 高级设定 (12)3.1 VLAN设定 (12)3.2 STP(生成树协议)设置 (22)3.3 Access Control List (访问控制列表) (26)3.4 ES-3124_ACL功能完成IP与MAC的绑定 (30)3.5 ES-3124_Link Aggregation设置 (34)3.6 IGMP Snooping(组播侦听) (36)3.7 Static MAC Forwarding(静态MAC地址转发) (37)3.8 Filtering (过滤器) (37)3.9 Broadcast Storm Control (广播风暴控制) (37)3.10 Mirroring (端口镜像) (38)3.11 DHCP Relay (39)1. 硬件连接、常规设置与维护本章节介绍硬件连接方法,常规设置和基本维护方法,能够帮助您快速安全的将交换机接入网络。

1.1 硬件安装1.1.1 独立式安装:您可以将随机配备的绝缘脚垫安装到交换机底部,并将交换机置放到安全、干燥、清洁的环境中。

图-11.1.2 机架式安装(1)将随机配备的安装部件牢固的固定在交换机两侧。

如下图所示:图-2(2)利用安装部件将交换机牢固的安装在您的机架上。

如下图所示:注释: 合勤科技交换机系列,ES-2024A/ ES-3124/ ES-3148/ GS-2024/ ES-1528/ ES-1552/ GS-1524/ GS-1548都是标准的19英寸长度设计。

图-31.2 硬件介绍合勤交换机前面板的设计大体相似, 左侧是10/100/1000Mbps以太网接口,或者SFP光口。

右侧通常是上联端口,1000Mpbs的以太网接口或者SFP光口,或者是以太网和SFP双重属性端口。

RFC3918协议测试——网络测试仪实操

RFC3918协议测试——网络测试仪实操

三、测试配置..................................................................................................................................... 4 3.1 准备工作: 添加机框............................................................................................................4 3.2 准备工作: 预约端口............................................................................................................5 3.3 选择向导............................................................................................................................... 5 3.4 选择混合吞吐量测试...........................................................................................................6 3.5 选择端口............................................................................................................................... 6 3.6 配置接口............................................................................................................................... 7 3.7 向导配置接口.......................................................................................................................7 3.8 向导配置 关键-MAC.......................................................................................................... 8 3.9 向导配置 关键-IP................................................................................................................8 3.10 向导接口配置结果.............................................................................................................9 3.11 选择接口............................................................................................................................. 9 3.12 配置组播流量...................................................................................................................10 3.13 配置组播参数................................................................................................................... 11 3.14 关键参数........................................................................................................................... 11 3.15 选择测试参数...................................................................................................................12 3.16 配置 混合吞吐................................................................................13 3.17 关键参数...........................................................................................................................14 3.18 配置单播流量...................................................................................................................15 3.19 配置单播流-选择端口..................................................................................................... 15 3.20 配置单播流量-选择流量接口......................................................................................... 16 3.21 配置单播流-常规............................................................................................................. 16 3.22 配置单播流-配置帧......................................................................................................... 17 3.23 配置单播流.......................................................................................................................17 3.24 开始测试...........................................................................................................................18

和SIP有关的RFC

和SIP有关的RFC
RFC 3666 SIP Public Switched Telephone Network (PSTN) Call Flows.
RFC 3680 SIP Event Package for Registrations
RFC 3702 Authentication, Authorization, and Accounting Requirements for the SIP
RFC 3515 The Session Initiation Protocol (SIP) Refer Method
RFC 3578 Mapping of Integrated Services Digital Network (ISDN) User Part (ISUP) Overlap Signalling to the SIP
RFC 4244 An Extension to the SIP for Request History Information
RFC 4245 High-Level Requirements for Tightly Coupled SIP Conferencing
RFC 4320 Actions Addressing Identified Issues with the SIP's Non-INVITE Transaction
RFC 3581 An Extension to the SIP for Symmetric Response Routing
RFC 3603 Private SIP Proxy-to-Proxy Extensions for Supporting the PacketCable Distributed Call Signaling Architecture.

www-rfc-editor-org

www-rfc-editor-org

Network Working Group J. Palme Request for Comments: 2076 Stockholm University/KTH Category: Informational February 1997Common Internet Message HeadersStatus of this MemoThis memo provides information for the Internet community. This memo does not specify an Internet standard of any kind. Distribution of this memo is unlimited.AbstractThis memo contains a table of commonly occurring headers in headings of e-mail messages. The document compiles information from other RFCs such as RFC 822, RFC 1036, RFC 1123, RFC 1327, RFC 1496, RFC 1521,RFC 1766, RFC 1806, RFC 1864 and RFC 1911. A few commonly occurring headers which are not defined in RFCs are also included. For eachheader, the memo gives a short description and a reference to the RFC in which the header is defined.Table of contents1. Introduction (2)2. Use of gatewaying headers (3)3. Table of headers (3)3.1 Phrases used in the tables (3)3.2 Trace information (5)3.3 Format and control information (5)3.4 Sender and recipient indication (6)3.5 Response control (9)3.6 Message identification and referral headers (11)3.7 Other textual headers (12)3.8 Headers containing dates and times (13)3.9 Quality information (13)3.10 Language information (14)3.11 Size information (14)3.12 Conversion control (15)3.13 Encoding information (15)3.14 Resent-headers (16)3.15 Security and reliability (16)3.16 Miscellaneous (16)4. Acknowledgments (18)Palme Informational [Page 1] RFC 2076 Internet Message Headers February 19975. References (18)6. Author's Address (20)Appendix A:Headers sorted by Internet RFC document in which they appear. 21Appendix B:Alphabetical index (25)1. IntroductionMany different Internet standards and RFCs define headers which may occur on Internet Mail Messages and Usenet News Articles. Theintention of this document is to list all such headers in onedocument as an aid to people developing message systems or interested in Internet Mail standards.The document contains all headers which the author has found in the following Internet standards: , RFC 822 [2], RFC 1036 [3], RFC 1123 [5], RFC 1327 [7], RFC 1496 [8], RFC 1521 [11], RFC 1766 [12], RFC1806 [14], RFC 1864[17] and RFC 1911[20]. Note in particular thatheading attributes defined in PEM (RFC 1421-1424) and MOSS (RFC 1848 [16]) are not included. PEM and MOSS headers only appear inside the body of a message, and thus are not headers in the RFC 822 sense.3.9 Priority3.2 ReceivedRecipient, see To, cc, bcc, Alternate-Recipient, Disclose-Recipient3.6 References3.8 Reply-By3.4 Reply-To, see also In-Reply-To, References3.14 Resent-Return see also Content-Return3.2 Return-PathPalme Informational [Page 26] RFC 2076 Internet Message Headers February 19973.5 Return-Receipt-To3.6 See-Also3.4 Sender3.9 Sensitivity3.16 Status3.7 Subject3.7 Summary3.6 Supersedes3.4 Telefax3.4 ToTransfer-Encoding see Content-Transfer-EncodingType see Content-Type, Message-Type, Original-Encoded-Information-TypesVersion, see MIME-Version, X-Mailer3.4 X400-Content-Return3.4 X-Mailer see also Mail-System-Version3.4 X-Newsreader3.15 XrefPalme Informational [Page 27]。

rfc中常用的测试协议

rfc中常用的测试协议

rfc中常用的测试协议引言在计算机网络领域中,为了确保网络协议的正确性和稳定性,测试协议起到了至关重要的作用。

RFC(Request for Comments)是一系列文件,用于描述互联网相关协议、过程和技术。

在RFC中,也包含了一些常用的测试协议,用于验证和评估网络协议的功能和性能。

本文将介绍RFC中常用的测试协议,并深入探讨其原理和应用。

二级标题1:PING协议三级标题1.1:概述PING协议是一种常用的网络测试协议,用于测试主机之间的连通性。

它基于ICMP (Internet Control Message Protocol)协议,通过发送ICMP Echo Request报文并等待目标主机的ICMP Echo Reply报文来判断目标主机是否可达。

三级标题1.2:工作原理PING协议的工作原理如下: 1. 发送方主机生成一个ICMP Echo Request报文,并将目标主机的IP地址作为目的地。

2. 发送方主机将报文发送到网络中。

3.中间路由器收到报文后,将报文转发到下一跳路由器。

4. 目标主机收到ICMP Echo Request报文后,生成一个ICMP Echo Reply报文,并将其发送回发送方主机。

5. 发送方主机收到ICMP Echo Reply报文后,通过比较报文中的标识符和序列号等字段,判断目标主机是否可达。

三级标题1.3:应用场景PING协议在网络中的应用非常广泛,常用于以下场景: - 测试主机之间的连通性,判断网络是否正常工作。

- 测试网络延迟,通过计算ICMP Echo Request报文的往返时间来评估网络质量。

- 排查网络故障,通过检查ICMP Echo Reply报文中的错误码来定位故障原因。

二级标题2:Traceroute协议三级标题2.1:概述Traceroute协议用于跟踪数据包从源主机到目标主机经过的路径。

它通过发送一系列的UDP报文,并在每个报文中设置不同的TTL(Time to Live)值来实现。

CISCO官方配置手册IPV6-DHCP

CISCO官方配置手册IPV6-DHCP
Finding Support Information for Platforms and Cisco IOS and Catalyst OS Software Images Use Cisco Feature Navigator to find information about platform support and Cisco IOS and Catalyst OS software image support. To access Cisco Feature Navigator, go to /go/cfn. An account on is not required.
Implementing IPv6 for Cisco IOS Software
22
Implementing DHCP for IPv6
Information About Implementing DHCP for IPv6

Client and Server Identification
Each DHCP for IPv6 client and server is identified by a DHCP unique identifier (DUID). The DUID is carried in the client identifier and server identifier options. The DUID is unique across all DHCP clients and servers, and it is stable for any specific client or server. DHCP for IPv6 uses DUIDs based on link-layer addresses for both the client and server identifier. The device uses the MAC address from the lowest-numbered interface to form the DUID. The network interface is assumed to be permanently attached to the device.

rfc中常用的测试协议

rfc中常用的测试协议

rfc中常用的测试协议摘要:1.RFC 简介2.RFC 中常用的测试协议a.网络协议测试1.网络数据包抓取和分析2.网络仿真和测试工具b.应用层协议测试1.HTTP 和HTTPS 测试2.FTP 和FTPS 测试3.SMTP 和SMTPS 测试c.安全协议测试1.TLS 和SSL 测试2.IPsec 测试d.传输协议测试1.TCP 和UDP 测试e.无线网络协议测试1.802.11 无线网络测试正文:RFC(Request for Comments)是一个用于讨论和记录互联网协议的标准文档系列。

在RFC 中,有许多常用的测试协议,这些协议用于确保互联网协议在实际应用中能够正常工作。

本文将详细介绍这些测试协议。

首先,RFC 中包含了大量的网络协议测试。

网络数据包抓取和分析是网络协议测试的基础,这对于诊断网络问题和优化网络性能至关重要。

此外,网络仿真和测试工具也是必不可少的,例如,网络模拟器(如NS-3)和测试平台(如Ixia)可以帮助工程师在实验室环境中模拟实际网络状况,从而对协议进行更严格的测试。

其次,应用层协议测试在RFC 中也占据重要地位。

HTTP 和HTTPS 是Web 应用中最常用的协议,有许多测试工具可以对它们的性能和安全性进行测试,例如,JMeter 和Locust 等负载测试工具。

此外,FTP 和FTPS、SMTP 和SMTPS 等传输协议也是常用的测试对象。

在安全协议方面,RFC 中包含了TLS 和SSL、IPsec 等协议的测试方法。

这些协议对于保护互联网数据传输的安全至关重要,因此需要进行严格的测试以确保其性能和安全性。

传输协议方面,TCP 和UDP 是互联网中最常用的传输协议,它们的测试方法也是RFC 中的重要内容。

TCP 测试关注可靠性和流量控制等方面,而UDP 测试则更注重数据传输速率和丢包率等指标。

最后,无线网络协议测试在RFC 中也有一定的比重。

例如,802.11 无线网络测试是评估无线局域网性能的关键。

中国电信IP城域网设备测试规范-汇聚交换机v2.0

中国电信IP城域网设备测试规范-汇聚交换机v2.0

附件4:企业秘密中国电信IP城域网设备测试规范(汇聚交换机)(V2.0)中国电信集团公司二零零六年一月目录1. 概述 (1)1.1范围 (1)1.2引用标准 (1)1.3缩略语 (2)2. 测试环境和仪表 (3)2.1测试环境 (3)2.2测试仪表 (3)3. 测试内容 (4)4. 二层交换功能测试 (4)4.1基本功能测试 (4)4.1.1 超长帧转发能力 (4)4.1.2 异常帧检测功能测试 (5)4.1.3 广播抑制功能测试 (6)4.2镜像功能 (6)4.2.1 端口镜像功能测试 (6)4.2.2 流镜像功能测试 (7)4.3生成树协议测试 (8)4.3.1 标准生成树测试 (8)4.3.2 快速生成树测试 (9)4.3.3 多生成树测试 (10)4.4VLAN堆叠功能测试 (11)4.4.1 基本功能 (11)4.4.2 扩展功能 (12)4.5端口聚合 (14)4.5.1 聚合链路数量测试 (14)4.5.2 聚合效率测试 (15)4.5.3 聚合链路收敛时间测试 (16)4.6二层组播功能测试 (17)4.6.1 UNTAGGED端口IGMP SNOOPING功能测试 (17)4.6.2 TAGGED端口IGMP SNOOPING功能测试 (18)4.6.3 组播组加入/离开时间测试 (19)4.7P RIV ATE V LAN功能测试 (20)4.8V LAN交换功能测试 (21)5. 访问控制和QOS功能 (22)5.1访问控制表方向性测试 (22)5.2二层访问控制表测试 (23)5.2.1 MAC地址访问控制表测试 (23)5.2.2 VLAN访问控制表测试 (23)5.2.4 SVLAN访问控制表测试 (25)5.3三层访问控制表功能测试 (26)5.3.1 IP地址访问控制表功能测试 (26)5.3.2 四层端口访问控制表功能测试 (26)5.4访问控制表数量及性能测试 (27)5.5业务分级 (28)5.5.1 基于VLAN ID的业务分级 (28)5.5.2 基于四层端口的业务分级 (29)5.5.3 SVLAN内外层标签802.1P优先级映射 (30)5.6优先级队列 (31)5.6.1 严格优先级队列 (31)5.6.2 轮询队列 (31)5.7速率限制 (32)5.7.1 入方向速率限制功能测试 (32)5.7.2 出方向速率限制功能测试 (33)5.7.3 速率限制颗粒度及精确性测试 (34)6. 转发性能测试 (35)6.1MAC地址学习速度 (35)6.2MAC地址表容量 (35)6.3最大VLAN数量测试 (36)6.4单端口吞吐量和时延测试 (37)6.5板内交换性能测试 (38)6.6板间交换性能测试 (39)6.7综合转发性能测试 (40)7. 可靠性和安全性 (41)7.1设备可靠性 (41)7.1.1 主控板和交换矩阵冗余 (41)7.1.2 电源冗余 (42)7.1.3 业务卡热插拔 (42)7.1.4 设备重启动时间 (43)7.2网络安全 (44)7.2.1 端口地址数量限制 (44)7.2.2 设备防ARP攻击测试 (45)7.2.3 设备防ICMP攻击测试 (45)7.2.4 设备防BPDU攻击测试 (46)8. 运行维护和网络管理 (47)8.1运行维护功能测试 (47)8.1.1 远程认证管理 (47)8.1.2 SSH登录测试 (48)8.1.3 日志记录 (48)8.1.4 DHCP Option82功能测试 (49)8.2.1 SNMPv1、SNMPv2支持测试 (50)8.2.2 SNMPv3支持测试 (50)8.2.3 SNMP访问地址限制 (51)8.2.4 MIB View安全访问控制功能测试 (52)8.2.5 SNMP Trap功能测试 (52)8.3管理信息库 (53)8.3.1 端口MIB的功能测试 (53)8.3.2 VLAN MIB的功能测试 (53)8.3.3 CPU利用率、内存占用率的功能测试 (54)8.3.4 资源管理信息功能测试 (54)8.3.5 ACL管理信息功能测试 (55)8.3.6 QOS的管理功能测试 (55)8.3.7 二层组播MIB (56)8.3.8 SVLAN MIB (56)中国电信IP城域网设备测试规范-汇聚交换机1. 概述1.1 范围本规范主要参考我国相关标准、RFC标准、国际电信联盟ITU-T相关建议以及《中国电信城域网优化改造指导意见》、《中国电信城域网设备技术规范》编制。

数据中心题库

数据中心题库

数据中心题库1.某IP地址为160.55.115.24/20,它的子网划分出来的网络IP地址为AA.160.55.112.0B.160.55.115.0C. 160.55.112.24D.都不对2.以下网络协议使用加密传输的是:DA.FTPB.TELNETC.DNSD.HTTPS3.以下WEB漏洞类型是在客户端执行的是:BA.SQL注入B.XSSC.命令注入D.解析漏洞4.6块300G的硬盘做raid5,新的设备容量是多大 CA.900GB.1800GC.1500GD.300G5.静态变量通常存储在进程的什么位置 CA.堆B.栈C.全局区D.代码区6.IP协议没有使用以下那一层? DA.链路层B.物理层C.网络层D.传输层7.以下不属于漏洞扫描工具的是 CA.NMAPB.AWVSC.NCD.NESSUS8.以下不是用来进行认证的协议是 DA.KERBEROSB.OUTH2C.RADIUSD.SNMP9.下列排序算法中饭,哪个的时间复杂度不超过nlogn? CA.快速排序B.冒泡排序C.堆排序D.归并排序10.在数据库管理中,当我们某一个字段的查询量突然增大,应该如何提高查询性能?AA.基于该字段添加索引B.基于该字段添加主键C.为该表创建外键D.为该表添加索引11.以下字节数量最大的是(D)A.1000MBB.1GBC.1048586KBD.1/1000TB12.linux下,系统管理员的名称是(B)/doc/064194854bfe04a1b0717fd5360cba1 aa8118c26.htmlerB.rootC.administatrorD.guest13.以下不属于服务器操作系统的是(B)A.windows server 2008B.windows 7 SP1C.SUSE Linux Enterprise 11D.RedHat Linux Enterprise 6.714.Linux文件系统的目录结构是一棵倒挂的树,文件都按其作用分门别类地放在相关的目录中。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

Network Working Group T. Johannsen Request for Comments: 1608 Dresden University Category: Experimental G. Mansfield AIC Systems Laboratory M. Kosters Network Solutions,Inc. S. Sataluri AT&T Bell Laboratories March 1994 Representing IP Information in the X.500 DirectoryStatus of this MemoThis memo defines an Experimental Protocol for the Internetcommunity. This memo does not specify an Internet standard of anykind. Discussion and suggestions for improvement are requested.Distribution of this memo is unlimited.AbstractThis document describes the objects necessary to include information about IP networks and IP numbers in the X.500 Directory. It extendsthe work "Charting networks in the X.500 Directory" [1] where ageneral framework is presented for representing networks in theDirectory by applying it to IP networks. This application of theDirectory is intended to support the work of IP network assigningauthorities, NICs, as well as other applications looking for amapping of IP numbers to data of related networks. Furthermore,Autonomous Systems and related routing policy information can berepresented in the Directory along with their relationship tonetworks and organizations.Johannsen, Mansfield, Kosters & Sataluri [Page 1]Table of Contents1. Introduction 22. IP images of networks 32.1 IP network image 32.2 IP node image 52.3 IP network interface image 62.4 Autonomous Systems 73. Number assignment information 73.1 Delegated Block object 83.2 IP Group object 93.3 IP Reference object 103.4 AS Block object 103.5 AS Reference object 104. Directory tree 114.1 IP image objects 114.2 AS objects 114.3 Namespace objects 114.4 Relationship to organizational entries 135. Security Considerations 146. Authors’ Addresses 15References 16Appendix: OID tables 171. IntroductionInformation related to the Internet Network Infrastructure is created and stored by a number of different organizations, such as theInternet Assigned Numbers Authority (IANA), Internet Registry (IR),Network Information Centers (NICs), and the NSFNET Network Operations Center (NOC). This information is generally "mastered" (stored andmaintained) by these organizations on a centralized basis, i.e.,there is a single place to look for a definitive list of entries for these categories. This has worked well in the past but given thetremendous growth of the Internet and its number of users andnetworks, it is essential that a distributed schema be used.The X.500 Directory offers the appropriate technology forimplementing this distributed method of managing networkinfrastructure information.The following goals are addressed in this document:o Provision of IP specific images of network elementso Mapping from Network Number to network, owner, provider etc.o Support of delegation of IP address blockso Storage of high-level routing policies and AS informationo Support of "classless" network address formatsJohannsen, Mansfield, Kosters & Sataluri [Page 2]o Provision of several organizational images of a networkIt may be noted that the document basically consists of two parts.In the first part, an IP specific extension of the general framework "Charting networks in the Directory" [1] is given. Objects definedby the application of this framework are related to IP numbers. An IP namespace is defined in the second part of this paper, referring toIP network elements defined at the beginning.2. IP images of networksAs defined in [1], networks are modeled as a set of subnetworks andnodes, called network elements in the remainder. To obtain aparticular view of a network element, images were introduced. Below, images of network elements for an IP specific view are defined.Please note that images contain references to underlying physicalinformation about elements.In the remainder, ipStringSyntax is used as attribute type for allattributes that are to hold an IP number. Currently, there are twodefinitions for a syntax like this:o IpAddress as of [5]o ip as of [6]It is suggested to use CaseIgnoreStringSyntax for implementations for the time being with the convention to use the ordinary IP syntax.Nevertheless, an OID has been reserved for ipStringSyntax (seeAppendix).2.1 IP network imageIP network image is one application of network images and thereforeinherits the networkImageClass. This class is given below forreference only, its definition can be found in [1].networkImage OBJECT CLASSSUBCLASS of ImageCommunicationObjectMAY CONTAINexternalGateway :: distinguishedNameSyntax,/* points to one or more nodes that actas gateway for the protocol applicationthis image refers to */An IP network combines all network elements that have a common IPnetwork number. Presently, IP network numbers fall into one of theclasses A, B, or C. However, sub- and supernetworking is already done broadly, and classless networks numbers are expected to be assigned Johannsen, Mansfield, Kosters & Sataluri [Page 3]soon. [2] proposes to assign bitwise contiguous blocks of class-C-addresses to all networks with more than 255 nodes. The definition of IP network, therefore, is always related to common network number and network mask.IP networks have a very close relationship to the Domain Name System. Several attributes are introduced to take care of these relations.Though we do not intend to abolish the existing DNS service, theschema defined here is able to provide the mapping IP number todomain name and vice versa.An IP network image object as defined below is intended to providetechnical and administrative data for one IP network. Attributes hold information that a NIC-WHOIS server would reveal for the network, and more.ipNetworkImage OBJECT CLASSSUBCLASS of NetworkImageMUST CONTAINipNetworkImageName :: CaseIgnoreString,/* common name */ipNwNumber :: IPStringSyntax,/* the IP network number forthis (sub)network */ipNwMask :: IPStringSyntax/* mask that applies to ipNwNumberin order to define classlessnetwork number; also used for routing */MAY CONTAIN/* DNS related info ; e.g. - */associatedDomain :: CaseIgnoreStringSyntax,/* the domain name associated to this IP network;As there is not always a 1:1 mapping between traditionalIP numbers and domain names, the name given hereshould contain the "closest match".1) (sub)network does not have a domain nameof its own, but is part of a bigger domain:take name of that domain2) network is divided into several domains,therefore having more than one domain name:list all of them.Note: a reverse mapping of domain names tonetworks/nodes can be achieved by a modifiedimplementation of RFC1279 */inAddrServer :: DistinguishedNameSyntax,/* refers to the ipNodeImageObject of theinaddr Server that holds information aboutJohannsen, Mansfield, Kosters & Sataluri [Page 4]this network *//* routing policy; e.g. - */asNumber :: integerStringSyntax,/* number of Autonomous System this network belongs to */acceptedUsagePolicy :: caseIgnoreStringSyntax,/* semantics to be defined *//* Any other - */provider :: DistinguishedNameSyntax,/* points to network provider */onlineDate :: uTCTimeSyntax/* date when network got connected to the Internet */2.2 IP node imageIf a node in the network is running the IP protocol, anipNodeImageObject should be created for this node. This image is asubclass of nodeImageClass and holds IP specific information. ThenodeImageClass is given below for reference only, its definition can be found in [1].nodeImage OBJECT CLASSSUBCLASS of ImageCommunicationObject/* no attributes common for all nodeImages have beendefined yet */An ipNodeImage is used to obtain technical and administrativeinformation on a host. The object is defined as follows:ipNodeImage OBJECT CLASSSUBCLASS of NodeImageMUST CONTAINipNodeName :: CaseIgnoreString/* common name, it is advised to usethe hostname for this purpose */MAY CONTAINprotocol :: CaseIgnoreString,/* name and version of IP protocol running */domainName :: CaseIgnoreString,/* the complete domain name of this node;CNAMEs can be stored additionally to theDNS A record name;further relationships, like MX record entries,should be taken care of by the domain name treeaccording to RFC 1279 */Johannsen, Mansfield, Kosters & Sataluri [Page 5]2.3 IP network interface imageThe most important IP related information of a node (its IPaddresses) is registered with ipNetworkInterfaceImageObjects. Thispicture is accurate as a node can have several IP addresses, but atmost one per interface. Furthermore, it shows clearly therelationship between interface and neighboring IP network.IpNetworkInterfaceImage is a subclass of networkInterfaceImageClass. The networkInterfaceImageClass is given below for reference only, its definition can be found in [1]. Note that foripNetworkInterfaceImage all references are drawn in the context ofIP, i.e., networkInterfaceAddress becomes an IP address andconnectedNetwork points to an ipNetworkImageObject.networkInterfaceImage OBJECT CLASSSUBCLASS of ImageCommunicationObjectMAY CONTAINnetworkInterfaceAddress :: caseIgnoreStringSyntax,/* this interface’s address in the context theimage refers to, e.g. IP number, NSAP */connectedNetwork :: distinguishedNameSyntax/* pointer to networkImageObject that describesthe network this interface is attached to in termsof the protocol or application the imagesindicates */Additionally, ipNetworkInterfaceImageObject has the followingproperties:ipNetworkInterfaceImage OBJECT CLASSSUBCLASS of NetworkInterfaceImageMUST CONTAINipNetworkInterfaceName :: CaseIgnoreStringSyntax/* It is suggested that the interface nameis derived from the name of the logicaldevice this interface represents for theoperating system, e.g. le0, COM1 */MAY CONTAINipNwMask :: IPStringSyntax/* mask that applies to networkInterfaceAddress forrouting of packets to nodes on the connected(broadcast) network;Note: This is only a fractionof the routing table informationfor this interface, namely for one hop. */Johannsen, Mansfield, Kosters & Sataluri [Page 6]2.4 Autonomous SystemsAutonomous Systems (AS) are defined in asObject which is a subclass of imageCommunicationObject. It provides technical and administrativeinformation of an AS. Furthermore, routing policies can be stored with the AS object. The definition of the AS object is aligned with thecorresponding database object defined in [3].as OBJECT CLASSSUBCLASS of ImageCommunicationObjectMUST CONTAINasNumber :: IntegerStringSyntaxMAY CONTAINasName :: CaseIgnoreStringSyntax,/* if there is a name different from AS */asIn :: CaseIgnoreStringSyntax,/* accepted routes from other AS *//* for syntax and semantics refer [3] */asOut :: CaseIgnoreStringSyntax,/* generated routes announced to others *//* for syntax and semantics refer [3] */asDefault ::CaseIgnoreStringSyntax,/* how default routing is handled *//* for syntax and semantics refer [3] */asGuardian :: DistinguishedNameSyntax, *//* DN of guardian of this AS */lastModifiedDate :: UTCtimeSyntax *//* important as routes change frequently */Note that routing policies for an Autonomous System are representedby the {asIn, asOut} attributes of asObject. Due to performanceconstraints of present X.500 technology, it will probably not be used directly by routers for dynamic routing. However, it certainly canbe used in network management systems to determine the allowed paths[i.e., in accordance with published policies] between two networks.This will be useful in finding alternate paths, and evaluating theconnectivity of networks.3. Number assignment informationIn the following, Directory objects have been defined to represent IP and AS (Autonomous System) namespace in the Directory. Their purposeis to provideo mapping from IP number to IP network element (network or node)o mapping from IP number to AS number and vice versao assignment and delegation informationJohannsen, Mansfield, Kosters & Sataluri [Page 7]The need for a global, distributed database supporting the objectives arises mainly from distributed IP- and AS-number assignment.Describing all IP numbers with one of the new objects delegatedBlock, ipGroup and ipReference leads to the desired information. AS numberinformation is stored with the objects asBlock and asReference.Furthermore, all assigned numbers have some properties in common.Therefore, an objectclass assignedNumberClass is introduced. Thisclass exports attributes to delegatedBlock, ipGroup, ipReference,asBlock, and asReference.AssignedNumberClass is defined as follows ("number" always refers to IP number of delegatedBlock, network, host, and AS number, resp.):assignedNumberClass OBJECT CLASSSUBCLASS of topMAY CONTAINassBy :: DistinguishedNameSyntax,/* refers to an organization or organizationalRolethat assigned the number to assTo (see below) */assTo :: DistinguishedNameSyntax,/* refers to organization or organizationalRolethat the number was assigned to. This does notimply that assTo "owns" this number now. */assDate :: uTCTimeSyntax,/* date of assignment for this number */nicHandle :: CaseIgnoreStringSyntax,/* gives the unique ID for a descriptionrelated to this number.format: "handle : nic-domain-name"example: MAK21 : */relNwElement :: DistinguishedNameSyntax,/* the network element related to this number(network or node) */3.1 Delegated Block objectThis object provides information on a block of IP addresses delegated to some local-authority or service provider. Only contiguous blockscan be represented with the following schema. If an organization(say, a NIC) has been assigned several IP network numbers which donot form a contiguous block, it might want to use a different form of representing that fact (e.g., using imageNetworks). ThedelegatedBlock object holds lower and upper bounds of the block.Note that the above does not make any assumption about the networkmasks being constrained by byte boundaries. We can thus representsubnetting within a "network (number)" that often happens within an Johannsen, Mansfield, Kosters & Sataluri [Page 8]organization in the same framework.This schema does lead to some granularity in the otherwise flat IP-number space. Further, the granularity is significant as it may beused to identify the administrator of the block - a service provider or a domain manager. E.g., it fits well into the schema ofaggregating networks for routing purposes as has been proposed in[4].The object delegatedBlock is of the form:delegatedBlock OBJECT CLASSSUBCLASS of AssignedNumberClassMUST CONTAINdelegatedBlockName :: caseIgnoreStringSyntax,lowerBound :: IPStringSyntax,/* smallest IP address belonging to theblock, e.g. 195.100.0.0 */upperBound :: IPStringSyntax/* highest IP address belonging to theblock, e.g. 195.103.255.255 */The attribute relNwElement (inherited from AssignedNumberClass) canpoint to a networkImage covering all networks within the block ifthis makes sense.3.2 IP Group objectThis object provides information for an IP network number. Itspurpose is basically only too show that the number has been assigned, ando provide a reference to the descriptive ipNetworkObject forthis network.Regardless of the actual value of x, IP group objects may exist forIP numbers x.0.0.0, x.y.0.0 and x.y.z.0. This approach includes"classical" class-A, -B and -C network addresses as well as any kind of super- and subnetworking.The IP group object is a subclass of assignedNumberClass. Theattribute relNwElement points to an ipNetworkImage as defined above. ipGroup OBJECT CLASSSUBCLASS of AssignedNumberClassMUST CONTAINipGroupName :: IPStringSyntax,/* IP number; x.0.0.0 or x.y.0.0 or x.y.z.0Johannsen, Mansfield, Kosters & Sataluri [Page 9]where x, y, z in 1..255 */ipNwMask :: IPStringSyntax/* mask that applies to all numberswithin the group; used to defineclassless networking; */3.3 IP Reference objectThere is one IP reference object for each IP host address. Thepurpose of this object is too tell that this IP number is already assigned to a nodeo give a pointer to the related ipNodeImageObjectThe IP reference object is a subclass of assignedNumberClass. Theattribute relNwElement points to an ipNodeImage.ipReference OBJECT CLASSSUBCLASS of AssignedNumberClassMUST CONTAINipReferenceName :: IPString/* value is always IP address */3.4 AS block objectThe AS block object is used to show delegation of blocks of ASnumbers to regional registries. This is similar to delegatedBlock of ipNetwork numbers.asBlock OBJECT CLASSSUBCLASS of AssignedNumberClassMUST CONTAINasBlockName :: caseIgnoreStringSyntax,asLowerBound :: integerStringSyntax,asUpperBound :: integerStringSyntaxAn AS block will comprise several consecutive AS numbers. Objects to describe these numbers may be stored in asObjects.3.5 AS reference objectAn AS reference object is used to show that an Autonomous Systemnumber has been assigned (and thus can not be given to somebodyelse). Similar to ipGroup, asReference does not contain technicaldetails about an autonomous system itself but rather points (withrelNwElement) to a descriptive asObject.Johannsen, Mansfield, Kosters & Sataluri [Page 10]asReference OBJECT CLASSSUBCLASS of AssignedNumberClassMUST CONTAINasNumber :: integerStringSyntax4. Directory treeroot|+-------------+---------------+| |c= o=Internet| |+-----+------+ +------+-------+| | | |ipNw= as= dbl= asB=| | |ipNd= ipG= asRef=| |ipNwIf= ipRef=Figure 1: Overall relationship of objects.4.1 IP image objectsAccording to [1], IP image entries will be stored underneath theorganization / organizationalUnit entry of the entity responsible for that network. The case that such an entry does not yet exist in thewhite-pages pilot is discussed in 4.4 below.4.2 AS objectsThe technical and administrative description of an AS is basicallymaintained by NICs, network providers, or other specialorganizations. It is suggested that these organizations build asubtree for information on AS which they are responsible for.4.3 Namespace objectsThe new IP namespace objects build a single tree in the Directory. It is suggested that this tree will have a root of typeorganizationalUnit within @o=Internet@ou=Network Information.objectClass= organizationalUnitorganizationalUnitName= IP networksdescription= root of IP number treeJohannsen, Mansfield, Kosters & Sataluri [Page 11]The tree is built under an administrative and an implementationalview. Nowadays, network numbers usually are assigned toorganizations by (national) Network Information Centers (NIC) whichthemselves have got a block of IP network numbers assigned fromanother authority (e.g., IR at top level). This concept of delegated blocks falling apart in smaller delegated blocks and IP networknumbers is used to model the Directory tree. Thus, an ipGroup object is always subordinate of a delegated block object (namely thedelegated block including this IP number). Network numbers that were directly assigned by a top-level authority, i.e., have not beenobject of a delegation to a local assigning authority, will all be at one level in the Directory. Already today, however, we find manydelegations within the traditional class A-, B- and C-addresses.Such a delegation is represented by a delegated block object, having the assigned IP network numbers as subordinates. Also, part of theblock can be further delegated to another authority, leading toanother delegated block object within the parent delegated block’stree. Usually, subordinates of ipGroup objects are ipReferences,i.e., single IP addresses as assigned to nodes. To supportsubnetworking, it is also allowed to divide ipGroups into severalsubnetwork ipGroups, each representing an IP subnetwork. In suchcases, subnetwork numbers are given as subordinates to the assignedIP network number. Network masks clarify what the subnetworkaddresses are.ou=IP networks|+-------------------+-----------------------+/ | \dbl=150.0.0.0-150.100.0.0|+-------------------+-----------------------+/ | \ipG=150.80.0.0|+-------------------+-----------------------+/ | \ipG=150.80.240.0|+-------------------+-----------------------+/ | \ipRef=150.80.254.1 ipRef=150.80.254.2 ipRef=150.80.254.3Figure 2: Example population of IP namespace tree accordingto delegation and subnetworking.For some applications, the separation of ipImage (description of the network) and ipGroup (description of the namespace element) will bear Johannsen, Mansfield, Kosters & Sataluri [Page 12]disadvantages in the look-up procedure. In that case one might think of combining both object classes with the aim to provide one objectdescribing administrative and technical data for an IP network.As Autonomous Systems are an additional namespace to the existing IP number space, they should go into a separate subtree. It is suggested that this is an organizationalUnit within @o=Internet@ou=NetworkInformation.objectClass= organizationalUnitorganizationalUnitName= AS numbersdescription= root of Autonomous System number spaceSimilar to blocks of IP network numbers, blocks of AS numbers aresometimes delegated to another registry. This is expressed by asBlock objects. These objects come below the root of the AS number space.All AS numbers falling into such a block are stored as subordinatesof the block. An AS block may have smaller AS blocks underneath ifdelegation is extended.4.4 Relationship to organizational entriesOrganizational information (i.e., white-pages-like information about an organization, its departments and employees) occurs at severalplaces in the network DIT - [org of IP-Number, org of AS-Number, org of Admin- contact, However, it will be basically mastered[administered, maintained] by the organization itself in theDirectory Management Domain (DMD) over which the organization has the authority. This gives rise to some tricky problems - a typicalexample is that of a NIC which holds the AS, DNS, IP, ... subtreesof the DIT.A good strategy would avoid explicit duplication of information. By explicit duplication of information we understand information beingduplicated outside the directory framework, e.g., by having severalmaster entries for one and the same piece of information. The onlyway to avoid duplication would be to have relevant entries point tothe pertinent organizational entry for organizational information.But sinceo most organizations do not, as yet, have an entry in the DIT ando the reliability of the access to an organizations DIT whenstored in a remote DSA cannot be taken for granted,the following framework is adopted to accommodate the conflictingrequirements /conditions.Johannsen, Mansfield, Kosters & Sataluri [Page 13]o A copy of all the necessary organization-info is retainedat the NICs DSA. Since only the necessary info will be keptthe NIC will not be burdened to act as the repository of theorganizations DIT. These objects may be kept in a separatesubtree of affiliated-organizations [organizationsaffiliated to the NIC]. Though the affiliated organizations nodedoes not really represent a locality, it is suggested to definethe node as objectClass locality. This does not break theDirectory schema when entries of organizations shall becomesubordinate to the NICs organization’s entry.o The problem of information duplication/consistency will arise when organizational DITs/DSAs do come into existence. At that stage ashadowing mechanism which will attempt to maintain the dataconsistency may be resorted to. The X.500/ISO 9594(1993)implementations are expected to provide appropriate shadowingmechanisms along X.525.It may be noted that what is suggested is not a duplication of anentire white-pages-like structure at the NIC. It suggests an"affiliated organizations node". The entries under this node will beorganization objects with a limited number of attributes, i.e., theattributes to hold the organization info necessary for the NIC:nothing more, nothing less. Operationally, and content wise the NICDSA will hold exactly the amount of info that is desired by the NIC.When an organization sets up its DSA and when the organizationinforms the NIC about it, the NIC will set up the shadowingarrangement to obtain info on changes of interest [and forget aboutit].It may be emphasized that the entries under affiliated organizationsare physical entities [replicated and refined from the Masterentries, if and when they exist...] rather than alias entries. If aNIC dislikes the idea of users poring over the entries in theaffiliated organizations - appropriate access control can be applied. Though duplication is unavoidable, the proposal attempts to make ittransparent, by delegating the responsibility of maintaining theintegrity to the Directory.This issue is discussed in greater detail in a separate document [7].5. Security ConsiderationsSecurity issues are not discussed in this memo.Johannsen, Mansfield, Kosters & Sataluri [Page 14]6. Authors’ AddressesThomas JohannsenDresden University of TechnologyInstitute of Communication TechnologyD-01062 Dresden, GERMANYPhone: +49 351 463-4621EMail: Thomas.Johannsen@ifn.et.tu-dresden.deGlenn MansfieldAIC Systems Laboratory6-6-3 Minami Yoshinari, Aoba-kuSendai 989-32, JAPANPhone: +81 22 279-3310EMail: glenn@aic.co.jpMark KostersNetwork Solutions, Inc.505 Huntmar Park Dr.Herndon, VA 22070Phone: +1 703 742-4795EMail: markk@Srinivas R. SataluriAT&T Bell LaboratoriesRoom 1C-429, 101 Crawfords Corner RoadHolmdel, NJ 07733-3030Phone: +1 908 949-7782EMail: sri@Johannsen, Mansfield, Kosters & Sataluri [Page 15]References[1] Mansfield, G., Johannsen, T., and M. Knopper, "Charting Networks in the X.500 Directory", RFC 1609, AIC Systems Laboratory,Dresden University, Merit Networks,Inc., March 1994.[2] Gerich, E., "Guidelines for Management of IP Address Space", RFC 1466, Merit, May 1993.[3] Bates, T., Jouanigot, J.-M., Karrenberg, D., Lothberg, P., and M. Terpstra, "Representation of IP Routing Policies in the RIPEDatabase", Document ripe-81, RIPE, February 1993.[4] Fuller, V., Li, T., Yu, J., and K. Varadhan, "Supernetting: AnAddress Assignment and Aggregation Strategy", RFC 1338, BARRNet, cisco, MERIT, OARnet, June 1992.[5] Rose, M., and K. McCloghrie, "Structure and Identification ofManagement Information for TCP/IP-based internets", STD 16, RFC1155, Performance Systems International, Hughes LAN Systems, May 1990.[6] Barker, P., and S. Kille, "The COSINE and Internet X.500 Schema", RFC 1274, University College London, November 1991.[7] Mansfield, G., Johannsen, T., and J. Murai, J., "DeploymentStrategy for the Directory in the Internet", AIC SystemsLaboratory, Dresden University, Keio University, Work inProgress, July 1993.Johannsen, Mansfield, Kosters & Sataluri [Page 16]。

相关文档
最新文档