⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 rfc681.txt

📁 著名的RFC文档,其中有一些文档是已经翻译成中文的的.
💻 TXT
📖 第 1 页 / 共 2 页
字号:
NWG/RFC# 681                                  JBP 14-MAY-75 14:38  321573/18/75     NETWORK UNIX                                     S. Holmgren                            NETWORK UNIX                               1                         RFC 681 NIC 32157                             2INTRODUCTION                                                           3   THE  UNIX  TIME-SHARING  SYSTEM  [1] PRESENTS SEVERAL INTERESTING   CAPABILITIES AS AN ARPA NETWORK MINI-HOST.   IT  OFFERS POWERFUL   LOCAL  PROCESSING FACILITIES IN TERMS OF USER PROGRAMS, SEVERAL   COMPILERS, AN EDITOR BASED ON QED, A  VERSATILE  DOCUMENT   PREPARATION  SYSTEM,  AND  AN EFFICIENT FILE SYSTEM FEATURING   SOPHISTICATED ACCESS CONTROL, MOUNTABLE AND DE-MOUNTABLE   VOLUMES, AND A UNIFIED TREATMENT OF PERIPHERALS AS SPECIAL FILES.  3a   THE NETWORK CONTROL PROGRAM (NCP), IS  INTEGRATED  WITHIN THE   UNIX FILE SYSTEM.  NETWORK CONNECTIONS ARE TREATED AS SPECIAL   FILES WHICH CAN BE ACCESSED THROUGH STANDARD UNIX I/O CALLS; VIZ.   READ,  WRITE,  OPEN, CLOSE.  SPECIAL FILES HAVE DIRECTORY ENTRIES   SIMILAR TO NORMAL FILES EXCEPT THAT CERTAIN FLAG  BITS  ARE  SET.   THESE FLAG BITS CAUSE SYSTEM I/O ROUTINES TO TAKE SPECIAL ACTION.   IN UNIX, SPECIAL FILES SIGNIFY PERIPHERAL DEVICES.  FOR  EXAMPLE,   I/O  TRANSACTION  WITH  MAGTAPE ZERO WOULD BE ACCOMPLISHED BY   ACCESSING THE SPECIAL FILE, "/DEV/MT0".  FOR THE UNIX NETWORK   SYSTEM,  ADDITIONAL  SPECIAL FILES WERE CREATED EACH OF WHICH   SPECIFIES A HOST ON THE  ARPA  NETWORK.  FOR  EXAMPLE   "/DEV/NET/HARV" REPRESENTS  THE PDP-10 AT HARVARD.  THIS SIMPLE   ACCESS MECHANISM, THROUGH THE FILING SYSTEM, ALLOWS STANDARD ARPA   PROTOCOLS SUCH AS TELNET  AND  FTP  TO  BE  IMPLEMENTED AS   SWAPPABLE USER PROGRAMS, RESIDENT ONLY WHEN NEEDED.  FURTHERMORE,   A USER MAY WRITE HIS OWN PROGRAMS TO COMMUNICATE WITH THESE   SPECIAL FILES JUST AS THE TELNET PROGRAM DOES.  THE SAMPLE   PROGRAM  FOUND BELOW  DEPICTS  THE ESSENTIALS OF NETWORKING FROM   UNIX.                                                              3bSTANDARD I/O                                                           4   TO  PRESENT  THE  BASIC PROPERTIES OF UNIX I/O, THE READ, WRITE,   OPEN, AND CLOSE FUNCTION CALLS ARE SUMMARIZED BELOW.  EACH CALL   MAY RESULT IN AN ERROR CODE OF MINUS ONE.                          4a   TO MANIPULATE AN EXISTING FILE WITH READS OR  WRITES,  IT MUST   FIRST BE OPENED WITH THE FOLLOWING CALL:                           4bNWG/RFC# 681                                  JBP 14-MAY-75 14:38  321573/18/75     NETWORK UNIX                                     S. Holmgren      FILEDES = OPEN( "ANYFILENAME",FLAG )                           4b1   WHERE  "ANYFILENAME" IS THE ARBITRARY NAME OF THE FILE TO BE   OPENED.  THE SECOND PARAMETER INDICATES WHETHER THE FILE IS TO BE   READ,  WRITTEN, OR UPDATED.  THE RETURNED VALUE "FILEDES", IS   CALLED A FILE DESCRIPTOR. IT IS AN INTEGER USED TO  IDENTIFY  THE   FILE IN SUBSEQUENT CALLS TO READ AND WRITE.                        4c   ONCE A FILE HAS BEEN OPENED, THE FOLLOWING CALLS  MAY  BE USED:    4d      NBYTES = READ( FILEDES,BUFFER,COUNT );      NBYTES = WRITE( FILEDES,BUFFER,COUNT );                        4d1   COUNT IS THE NUMBER OF BYTES TO  BE  TRANSMITTED  BETWEEN THE   FILE REPRESENTED BY 'FILEDES' AND THE BYTE ARRAY REPRESENTED BY   'BUFFER'.  NBYTES IS THE NUMBER ACTUALLY TRANSMITTED.  FOR THE   READ  CALL,  'NBYTES' MAY BE ZERO TO INDICATE THE END OF FILE; IN   EITHER CASE, MINUS ONE WILL BE RETURNED IF THERE WAS AN ERROR.     4e   FOR EACH OPEN FILE, THE SYSTEM MAINTAINS A POINTER TO THE NEXT   BYTE TO BE READ OR WRITTEN.  IF N BYTES ARE TRANSMITTED, THE   POINTER  ADVANCES  N  BYTES.   DATA WRITTEN TO A FILE AFFECT ONLY   THOSE BYTES IN THE FILE WHICH ARE INDICATED BY  THE  POSITION  OF   THE  WRITE  POINTER  AND  THE COUNT; NO OTHER PART OF THE FILE IS   CHANGED.  IF THE SYSTEM POINTER INDICATES THAT  ANY  BYTES  BEING   WRITTEN  WOULD  LIE  BEYOND  THE END OF THE FILE, THE FILE IS   ENLARGED AS NEEDED.                                                4f   ONCE  THE  USER HAS FINISHED PROCESSING A FILE, IT SHOULD BE   CLOSED.  THIS IS AFFECTED WITH THE FOLLOWING CALL:                 4g      CLOSE( FILEDES );                                              4g1   ALTHOUGH IT IS NOT ABSOLUTELY NECESSARY TO DO A  SPECIFIC CLOSE   ON A FILE WHEN FINISHED, (THE SYSTEM CLOSES ALL FILES WHEN A   PROGRAM EXITS), IT IS A GOOD PRACTICE, SINCE THE  USER  IS   ALLOWED ONLY SIXTEEN OPEN FILES.                                   4h   THERE ARE SEVERAL ADDITIONAL SYSTEM CALLS RELATED TO  I/O WHICH   WILL NOT BE DISCUSSED IN DETAIL.  A FEW OF THE MORE NOTABLE ONES   ALLOW THE USER TO: GET THE STATUS OF A FILE, CHANGE THE   PROTECTION  OR OWNERSHIP OF A FILE, CREATE A FILE, CREATE A   DIRECTORY, MAKE A LINK TO AN EXISTING FILE,  AND  DELETE  ANWG/RFC# 681                                  JBP 14-MAY-75 14:38  321573/18/75     NETWORK UNIX                                     S. Holmgren   FILE.   FOR FURTHER INFORMATION CONCERNING THE DIFFERENT I/O   CALLS THE READER IS DIRECTED TO THE UNIX PROGRAMMER'S MANUAL,   FIFTH  EDITION,  K. THOMPSON, AND D. M. RITCHIE, JUNE 1974.        4i   THE USER COMMUNICATES WITH THE  NETWORK  VIA  THESE  SAME SYSTEM   CALLS.   FOR EXAMPLE, IF ONE WISHED TO CONNECT TO THE THE PDP-10   AT HARVARD, THE FOLLOWING SEQUENCE OF CALLS MIGHT BE USED.         4j      FILEDES = OPEN( "/DEV/NET/HARV",2 );      IF( FILEDES < 0 )         PRINTF(" HARVARD IS DEAD");      ELSE         WHILE( (NBYTES=READ(FILEDES,BUF,80)) > 0 )            WRITE( 0,BUF,NBYTES );                                   4j1   THE OPEN INSTRUCTS THE SYSTEM TO OPEN A TELNET CONNECTION TO   HARVARD, IF MINUS ONE IS RETURNED, THE PROGRAM PRINTS A MESSAGE   AND EXITS,  OTHERWISE THE PROGRAM WILL READ ANY BYTES SENT BY   HARVARD AND PRINT THEM OUT ON THE CONTROLLING TELETYPE. THIS WILL   GO  ON UNTIL  HARVARD  CLOSES THE CONNECTION (READ WILL RETURN   MINUS ONE WHEN THE CONNECTION IS CLOSED).                          4kUNIX TELNET                                                            5   IN ORDER TO COMMUNICATE WITH REMOTE  HOSTS  ON  THE  ARPA   NETWORK,  ONE  FIRST  LOGS IN TO UNIX AS A NORMAL USER.  THE USER   THEN RUNS A PROGRAM, TELNET, WHICH AFTER ANNOUNCING ITSELF LEAVES   HIM WITH SEVERAL OPTIONS.                                          5a   HE MAY CONTINUE WITH HIS  NORMAL  UNIX  ACTIVITIES.  WHEN TELNET   SEES  A  UNIX  COMMAND, IT WILL INITIATE THE REQUEST AS A   PARALLEL TASK, IN THE SAME MANNER AS THE UNIX  COMMAND  PROCESSOR   (THE SHELL).  SINCE THIS MAY BE DONE REGARDLESS OF WHETHER OR NOT   A NETWORK CONNECTION IS OPEN, THE USER MAY SIMULTANEOUSLY RECEIVE   OUTPUT  FROM A FOREIGN HOST'S SERVER TELNET AND CONVERSE WITH THE   LOCAL UNIX SYSTEM.                                                 5b   WHEN  THE  TELNET-USER OPENS A CONNECTION, TELNET ACCEPTS THE   HOST NAME AND ANY SPECIAL PARAMETERS, AND DOES AN OPEN ON THE   SPECIAL  FILE  CORRESPONDING  TO  THAT HOST.  WHEN CONTROL IS   RETURNED, THE CONNECTION IS OPEN.   ANY FURTHER DATA RECEIVED   FROM THE  TERMINAL NOT CONTAINING ESCAPE CHARACTER IS SENT TO THE                                   1NWG/RFC# 681                                  JBP 14-MAY-75 14:38  321573/18/75     NETWORK UNIX                                     S. Holmgren   NETWORK FILE.   ANY DATA RECEIVED IN RESPONSE TO A READ ON THE   NETWORK FILE, IS WRITTEN ON THE USER'S TYPEWRITER.                 5c   COMMUNICATION CONTINUES WITH  THE  HOST  UNTIL  THE  USER WISHES   TO CLOSE THE CONNECTION.  THE USER SIMPLY MAKES THIS KNOWN TO   TELNET VIA A COMMAND, AND TELNET DOES A STANDARD CLOSE ON  THE   NETWORK  FILE.  THE NEGOTIATION OF CLOSING THE NETWORK CONNECTION   IS LEFT TO THE SYSTEM, FREEING THE USER FOR  OTHER  COMPUTATIONAL   WORK.                                                              5d   THERE IS SOME CHARACTER TRANSLATION AND INVISIBLE CONTROL   INFORMATION  PASSED  BACK  AND FORTH BETWEEN THE FOREIGN HOST AND   THE TELNET PROCESS. THIS INVOLVES RECOGNITION OF TELNET IACS  AND   THE  TRANSLATION OF CARRIAGE RETURN(CR) AND LINE FEED(LF) TO LINE   FEED ON ALL DATA RECEIVED  FROM  THE  NETWORK,  AND  THE  INVERSE   TRANSLATION OF LF TO CR LF ON ALL DATA SENT TO THE NETWORK.        5eNCP STRUCTURE                                                          6   DUE  TO THE STRUCTURE OF BOTH THE IMP TO HOST[2] AND HOST TO   HOST[3] NETWORK PROTOCOLS, DATA COMES FROM  THE  NETWORK   DESTINED  NOT  ONLY  FOR  ONE  OF MANY ACTIVE PROCESSES, BUT FOR   THE INFORMATION OF THE LOCAL HOST AS A WHOLE.  FOR  EXAMPLE,   NETWORK TRAFFIC  SUCH  AS  A  HOST TO HOST RESET, WHICH GENERALLY   SIGNALS THAT A FOREIGN HOST HAS COME "ALIVE" MUST BE ACKNOWLEDGED   TO  LET THAT HOST KNOW THAT THE LOCAL HOST ITSELF IS "ALIVE".   THEREFORE, THE LOCAL HOST MUST MONITOR DATA COMING FROM THE NET   TO  PERFORM NOT  ONLY A MESSAGE SWITCHING FUNCTION, WHICH IS THE   BULK OF NETWORK TRAFFIC, BUT TO PROVIDE A CONTROL AND STATUS   FUNCTION.                                                          6a   FURTHER,  WHEN  A  PERSON  ASSOCIATED WITH THE LOCAL HOST WISHES   TO CARRY ON A CONVERSATION WITH A NETWORK SERVER, THE INITIAL   CONNECTION  PROTOCOL[4]  MUST  BE USED TO PROVIDE A LOGICAL PORT   AT EACH SITE FOR SUCCEEDING INFORMATION FLOW.                      6b   EXPERIENCE  WITH  THE  ANTS MARK I[5] AND ANTS MARK II[6] SYSTEMS   HAS SHOWN THAT THE ABOVE CLASSES OF  NETWORK  EVENTS  ARE   RELATIVELY  INFREQUENT, AND THAT MOST NETWORK TRAFFIC IS IN TERMS   OF USER DATA FLOW AND THE ASSOCIATED FLOW CONTROL( HOST  TO  HOST   ALLOCATES  AND  IMP TO HOST RFNMS).  IT IS ALSO THE CASE THAT THE   SOFTWARE REQUIRED TO IMPLEMENT THE STATUS AND CONTROL FUNCTION IS   THE BULKIEST PART OF AN NCP.                                       6c                                   2NWG/RFC# 681                                  JBP 14-MAY-75 14:38  321573/18/75     NETWORK UNIX                                     S. Holmgren   IN UNIX, THE KERNEL OF  THE  OPERATING  SYSTEM  IS  CORERESIDENT   AND  NON-SWAPPABLE.   A LARGE KERNEL REDUCES THE MEMORY AVAILABLE

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -