⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 rfc1276.txt

📁 著名的RFC文档,其中有一些文档是已经翻译成中文的的.
💻 TXT
📖 第 1 页 / 共 3 页
字号:
5  DSA NamingAll DSAs must be named in the DIT, and the master definition of thepresentation address stored in this entry.  X.500 (including some ofthe extension work) implies that the presentation address informationis extensively replicated (manually).  The management overhead impliedby this is not acceptable.Care must be taken to prevent deadlock in determining a DSAs address.This is solved by:1.  Use of a well known DSA with ``root knowledge''2.  Naming DSAs in a manner which prevents deadlocks.  Currently this    is done by giving DSAs names high in the DIT.The Internet Pilot will need to define detailed policies for namingDSAs, in conjunction with the replication policy.  This will bedefined in a future RFC.6  Knowledge RepresentationKnowledge information is represented in the DIT. It seems unreasonableto manage this by any other means.  Knowledge information isrepresented in an entry by use of knowledge attributes.  Theseattributes are considered separately from all the other attributes inthe entry which are termed ``user attributes''.  Each entry in amaster EDB will be in one of four categories.1.  The entry is a leaf entry mastered in this EDB, and so only    contains user attributes2.  The level below has an associated EDB (i.e., the DIT continues    downwards to use the data model of this specification).  All    attributes of this entry will be mastered in this entry.  The    entry will contain an attribute with the name of the DSA which    holds the master of the associated EDB. Optionally, it will    contain an attribute holding the names of DSAs which hold slave    EDBs.  The entry may not hold a subordinate reference attribute.    The DIT is followed by use of the master and slave attributes.Hardcastle-Kille                                                Page 6RFC 1276         Internet Directory Replication          November 19913.  The entry is mastered in a DSA which does not follow this    specification.  The entry in the EDB will contain a master    attribute, which holds a subordinate reference (or cross    reference) to the DSA which holds the master entry.  The user    attributes of the entry will be mastered in the DSA pointed to by    the reference.  The DSA holding the master EDB, which actually    acts as an intermediate shadow for this entry, will read these    attributes from the DSA indicated by the reference, so that it    will have a full copy of the entry, using a standared DSP Read    operation.  This technique is called ``spot shadowing''.  Any    access control on the entry being spot shadowed must be configured    so that all attributes can be copied by the DSA holding the master    EDB. DSAs taking slave copies of the EDB will not do spot    shadowing.  However, the knowledge attributes will be copied, and    may be used by this DSA (e.g., for modify operations).4.  The entries at the level below are held in DSAs which do not    follow this specification, and all of these are indicated by a set    of NSSRs (Non Specific Subordinate Reference).  The NSSRs are    stored as an attribute of the entry.  The user attributes are    either mastered in the EDB.    It is important to note that NSSRs are stored at the level above    subordinate references.  At a given point in the DIT, if there are    subordinate references, these are stored in shadow entries below    that point, and named by the RDN. If there are NSSRs, they are    stored in the entry itself, as there is no RDN associated with an    NSSR. This approach is cleanest where there are either NSSRs or    subordinate references, but not both.  For example, consider an    Organisation HP, whose many OUs are stored in a set of DSAs    indicated by by NSSRs.  Here, the NSSR attributes will be used to    identify these DSAs.    This model of replication is not tightly integrated with NSSRs.    Where there is a mixture of NSSRs and Subordinate references at a    given point in the DIT, this is handled by giving a single    subordinate reference to a DSA which follows standard X.500    distributed operations and can cleanly handle this mixture.  In    practice, this is equivalent to not allowing a mixture of    subordinate references and NSSRs.The information framework needed to support this is defined inFigure_1.______________________________________________________________Hardcastle-Kille                                                Page 7RFC 1276         Internet Directory Replication          November 1991InternetDSNonLeafObject ::= OBJECT-CLASS        SUBCLASS OF top        MUST CONTAIN {masterDSA}        MAY CONTAIN {slaveDSA}ExternalDSObject ::= OBJECT-CLASS        SUBCLASS OF top        MAY CONTAIN {SubordinateReference, CrossReference,          10                NonSpecificSubordinateReference}                        -- will contain exactly one of these referencesMasterDSA ::= ATTRIBUTE    WITH ATTRIBUTE-SYNTAX distinguishedNameSyntax    SINGLE VALUESlaveDSA ::= ATTRIBUTE    WITH ATTRIBUTE-SYNTAX distinguishedNameSyntax                                                                    20SubordinateReference ::= ATTRIBUTE    WITH ATTRIBUTE-SYNTAX AccessPoint    SINGLE VALUECrossReference ::= ATTRIBUTE    WITH ATTRIBUTE-SYNTAX AccessPoint    SINGLE VALUENonSpecificSubordinateReference ::= ATTRIBUTE    WITH ATTRIBUTE-SYNTAX AccessPoint                               30AccessPoint ::= SET {        ae-title [0] Name,        address  [2] PresentationAddress OPTIONAL }                -- Same definition as X.500 AccessPoint,                -- but presentation address is optional___________________Figure_1:__Knowledge_Attributes_____________________Two object classes are defined to support this approach:Hardcastle-Kille                                                Page 8RFC 1276         Internet Directory Replication          November 1991InternetDSNonLeafObject This is for where the level below follows the    model defined here, and there is an Entry Data Block (EDB)    containing the sibling entries.  The Entry itself contains master    data.  The associated attributes are:    MasterDSA The name of the DSA where the master EDB is held.    SlaveDSA The names of DSAs which hold slave copies of the EDB for        public access.ExternalDSObject This is for where the entry and levels below are    mastered according to X.500.  There are attributes corresponding    to the standard knowledge references, which are used to resolve    queries.  The presentation address is optional in these    attributes.  If not present, it should be looked up in the DSAs    own entry.  For NonSpecificSubordinateReference, the master of the    entry will be in the master EDB, For SubordinateReference or    CrossReference1 the DSA which masters the EDB will ``spot shadow''    the entry, by reading it at intervals.  This will ensure that the    master EDB contains a copy of each entry.  Single level searching    can then be done efficiently where it is not required to access    the master copy of the data.  DSAs holding slave copies of the EDB    do not perform spot shadowing, but do receive copies of the    references.7  Replication Protocol_______________________________________________________________________GetEntryDataBlock ABSTRACT-OPERATION        ARGUMENT GetEntryDataBlockArgument        RESULT GetEntryDataBlockResult        ERRORS {nameError,ServiceError,SecurityError,EDBVersionError}EDBVersionError ABSTRACT-ERROR        PARAMETER versionHeld EDBVersionGetEntryDataBlockArgument ::= SET {                                 10----------------------------    1. These references are really the same.  The function and valueare the same.  The name depends on where the reference is stored.  Itmay be preferable to have only one attribute.Hardcastle-Kille                                                Page 9RFC 1276         Internet Directory Replication          November 1991        entry [0] DistinguishedName,        CHOICE {                sendIfMoreRecentThan [1] EDBVersion,                getVersionNumber [2] NULL,                getEDB [3] NULL,        -- force retrieval                continuation [4] SEQUENCE {                        EDBVersion,                        nextEntryPosition INTEGER }                },        maxEntries [5] INTEGER OPTIONAL                             20                        -- if omitted return whole EDB in                        -- one operation}GetEntryDataBlockResult ::= SEQUENCE {                versionHeld [0] EDBVersion,                [1] SEQUENCE OF RelativeEntry OPTIONAL,                        -- if omitted, only version is returned                nextEntryPostion INTEGER OPTIONAL                        -- if omitted there are no more entries     30        }RelativeEntry ::= SEQUENCE {        RelativeDistinguishedName,        SET OF Attribute        }EDBVersion ::= UTCTime                                              40___________________Figure_2:__Replication_Protocol_____________________A ROS operation to support replication is defined in Figure 2.  Thispulls an entire copy of the EDB. In normal use, the initiatorspecifies the EDB Version held.  If the responder has a more recentversion, then all of the entries in the EDB are returned.  There areoptions to rerequest only the version of EDB held, or to return thefull EDB irrespective of the version held by the initiator.For large EDBs, transfer of an entire EDB in a single operation wouldlead to very large ROS PDUs.  This gives a definite scalinglimitation.  To overcome this, the protocol allows an EDB to beretrived in chunks of a size (in number of entries) specified by theHardcastle-Kille                                               Page 10RFC 1276         Internet Directory Replication          November 1991initiator.  The responder specifies a number which indicates the nextentry to be transferred.  The same operation can be used to retrievethe next chunk of the EDB, with EDBVersion and the same integer asparameters.This approach is simple to implement.  It is less efficient than anincremental technique.  When scaling dictates that an incrementaltechnique must be used, it is expected that a suitable standard willbe available.An implementation issue that must be noted is how to deal with updateswhilst a multi-operation transfer is in progress.  There are twopossible approaches:1.  Refuse/block updates until the EDB is transferred.  This may cause    problems where the rate of update and transfer is high, as this    may make update very difficult (for the manager).2.  Create a new version of the EDB, whilst retaining the old EDB to    complete the bulk transfer.  A suitable retentions strategy would    be to hold an EDB version as long as the association on which it    is being pulled it remains active.3.  Allow the update and fail subsequent transfer requests for the    EDB. This may cause both transfer failure and excessive waste of    bandwidth due to retries if the rate of update and transfer is    high.If option 1.  or 3.  is chosen, for a widely replicated EDB where theupdate rate is greater than a few changes per day, it is recommendedto configure the master EDB in a DSA which only replicates to oneother DSA. This second DSA can then control its update rate, andsafely perform a large fanout of replications (option 3).  The firstDSA will have reasonable availability for modifications (option 1).This protocol will be used by DSAs to obtain copies of EDBs high inthe tree (typically root and national EDBs).  DSAs which need thesecopies should establish bilateral agreements to access them2.This protocol should only transfer user attributes.  In particular,implementation specific attributes such as those needed to support----------------------------    2. QUIPU defines some attributes to register such agreements, butthese are probably not appropriate for this specification.Hardcastle-Kille                                               Page 11RFC 1276         Internet Directory Replication          November 1991

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -