⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 rfc1543.txt

📁 中、英文RFC文档大全打包下载完全版 .
💻 TXT
📖 第 1 页 / 共 3 页
字号:
         "RFC-Editor@ISI.EDU".13.  Distribution Lists   The RFC announcements are distributed via two mailing lists: the   "IETF-Announce" list, and the "RFC-DIST" list.  You don't want to be   on both lists.   To join (or quit) the IETF-Announce list send a message to IETF-   Request@cnri.reston.va.us.   To join (or quit) the RFC-DIST list send a message to RFC-   Request@NIC.DDN.MIL.Postel                                                         [Page 11]RFC 1543              Instructions to RFC Authors           October 199314.  RFC Index   Several organizations maintain RFC Index files, generally using the   file name "rfc-index.txt".  The contents of such a file copied from   one site may not be identical to that copied from another site.15.  Security Considerations   This RFC raises no security issues (however, see Section 6).16.  References   [1]  Postel, J., "Internet Official Protocol Standards", STD 1, RFC        1540, Internet Architecture Board, October 1993.17.  Author's Address   Jon Postel   USC/Information Sciences Institute   4676 Admiralty Way   Marina del Rey, CA  90292   Phone: 310-822-1511   Fax:   310-823-6714   EMail: Postel@ISI.EDUPostel                                                         [Page 12]RFC 1543              Instructions to RFC Authors           October 199318.  Appendix - RFC "nroff macros"   Generally, we use the very simplest nroff features.  We use the "ms"   macros.  So, "nroff -ms input-file > output-file".  However, we could   not get nroff to do the right thing about putting a form feed after   the last visible line on a page and no extra line feeds before the   first visible line of the next page.  We want:        last visible line on page i        ^L        first visible line on page i+1   So, we invented some hacks to fix this including a "sed" script   called "fix.sh" and a "c" program we called "pg" (pg is called from   fix).  So the command to process the file becomes:        nroff -ms input-file | fix.sh > output-file   Now as to the nroff features we actually use, I'll append a sample   memo, prepared in RFC style.   The sed script fix.sh is:        sed -e 's/FORMFEED\[Page/        \[Page/' $* | pg -n5The pg program is:                     ~~~Beginning of pg program~~~/* $Header$ * *  Remove N lines following any line that contains a form feed (^L). *  (Why can't this be done with awk or sed?) * *  OPTION: *      -n#     Number of lines to delete following each ^L (0 default). * $Log$ */#include <stdio.h>#define FORM_FEED       '\f'#define OPTION          "n:N:"          /* for getopt() */extern char *optarg;extern int optind;main(argc, argv)int     argc;char    *argv[];Postel                                                         [Page 13]RFC 1543              Instructions to RFC Authors           October 1993{  int   c,                              /* next input char */        nlines = 0;                     /* lines to delete after ^L */  void  print_and_delete();             /* print line starting with ^L,                                           then delete N lines *//* Process option (-nlines) */  while ((c = getopt(argc, argv, OPTION)) != EOF)    switch(c)    {      case 'n' :      case 'N' :  nlines = atoi(optarg);                  break;    }/* READ AND PROCESS CHARS */  while ((c = getchar()) != EOF)    if (c == FORM_FEED)      print_and_delete(nlines);  /* remove N lines after this one */    else      putchar(c);                /* we write the form feed */  exit(0);}/* Print rest of line, then delete next N lines. */void print_and_delete(n)int  n;                                 /* nbr of lines to delete */{  int   c,                              /* next input char */        cntr = 0;                       /* count of deleted lines */  while ((c = getchar()) != '\n')       /* finish current line */    putchar(c);  putchar('\n');                        /* write the last CR */  putchar(FORM_FEED);  for ( ; cntr < n; cntr++)    while ((c = getchar()) != '\n')      if (c == EOF)        exit(0);                        /* exit on EOF */  putchar(c);                           /* write that last CR */}                        ~~~End of pg program~~~Postel                                                         [Page 14]RFC 1543              Instructions to RFC Authors           October 1993.pl 10.0i.po 0.ll 7.2i.lt 7.2i.nr LL 7.2i.nr LT 7.2i.ds LF Waitzman.ds RF FORMFEED[Page %].ds CF.ds LH RFC 1149.ds RH 1 April 1990.ds CH IP Datagrams on Avian Carriers.hy 0.ad l.in 0Network Working Group                                        D. WaitzmanRequest for Comments: 1149                                       BBN STC                                                            1 April 1990.ceA Standard for the Transmission of IP Datagrams on Avian Carriers.ti 0Status of this Memo.fi.in 3This memo describes an experimental method for the encapsulation of IPdatagrams in avian carriers.  This specification is primarily usefulin Metropolitan Area Networks.  This is an experimental, not recommendedstandard.  Distribution of this memo is unlimited..ti 0Overview and RationalAvian carriers can provide high delay, low throughput, and lowaltitude service.  The connection topology is limited to a singlepoint-to-point path for each carrier, used with standard carriers, butmany carriers can be used without significant interference with eachother, outside of early spring.  This is because of the 3D ether spaceavailable to the carriers, in contrast to the 1D ether used byIEEE802.3.  The carriers have an intrinsic collision avoidance system,which increases availability.  Unlike some network technologies, suchas packet radio, communication is not limited to line-of-sightdistance.  Connection oriented service is available in some cities,usually based upon a central hub topology.Postel                                                         [Page 15]RFC 1543              Instructions to RFC Authors           October 1993.ti 0Frame FormatThe IP datagram is printed, on a small scroll of paper, inhexadecimal, with each octet separated by whitestuff and blackstuff.The scroll of paper is wrapped around one leg of the avian carrier.A band of duct tape is used to secure the datagram's edges.  Thebandwidth is limited to the leg length.  The MTU is variable, andparadoxically, generally increases with increased carrier age.  Atypical MTU is 256 milligrams.  Some datagram padding may be needed.Upon receipt, the duct tape is removed and the paper copy of thedatagram is optically scanned into a electronically transmittableform..ti 0DiscussionMultiple types of service can be provided with a prioritized peckingorder.  An additional property is built-in worm detection anderadication.  Because IP only guarantees best effort delivery, loss ofa carrier can be tolerated.  With time, the carriers areself-regenerating.  While broadcasting is not specified, storms cancause data loss.  There is persistent delivery retry, until thecarrier drops.  Audit trails are automatically generated, and canoften be found on logs and cable trays..ti 0Security Considerations.in 3Security is not generally a problem in normal operation, but specialmeasures must be taken (such as data encryption) when avian carriersare used in a tactical environment..ti 0Author's Address.nfDavid WaitzmanBBN Systems and Technologies CorporationBBN Labs Division10 Moulton StreetCambridge, MA 02238Phone: (617) 873-4323EMail: dwaitzman@BBN.COMPostel                                                         [Page 16]

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -