229
Apl.l AT commands The AT commands are preceded by the attention code AT. They are: A Go on-line in answer mode Instructs the modern to go off-hook immediately and then make a connection with a remote modern Bn Select protocol to 300 bps to 1200 bps BO Selects CCITT operation at 300 bps or 1200 bps B1 Selects BELL operation at 300 bps or 1200 bps D Go on-line in originate mode Instructs the modern to go off-hook and automatically dials the number contained in the dial string which follows the D command En Command echo EO Disable command echo El Enables command echo (default) Fn Select line modulation FO Select auto-detect mode F1 SelectV.21 or Bell 103 F4 Select V.22 or Bell 212A 1200 bps F5 Select V.22bis line modulation. F6 Select V.32bis or V.32 4800 bps line modulation F7 Select V.32bis or V.32 7200 bps line modulation F8 Select V.32bis or V.32 9600 bps line modulation F9 Select V.32bis 12000 line modulation FlO Select V.32bis 14400 line modulation Hn Hang-up HO Go on-hook (hang-up connection) HI Goes off-hook In Request product code or ROM checksum IO Reports the product code 11/12 Reports the hardware ROM checksum 13 Reports the product revision code 14 Reports response programmed by an OEM 15 Reports the country code number Ln Control speaker volume LO Low volume 11 Low volume L2 Medium volume (default) L3 High volume Mn Monitor speaker onloff MOIM Speaker is always off Ml Speaker is off while receiving carrier (default) M2 Speaker is always on Nn Automode enable M3 Speaker is on when dialing but is off at any other time NO Automode detection is disabled N1 Automode detection is enabled

Apl.l AT commands - Springer LINK

Embed Size (px)

Citation preview

Apl.l AT commands The AT commands are preceded by the attention code AT. They are:

A Go on-line in answer mode

Instructs the modern to go off-hook immediately and then make a connection with a

remote modern

Bn Select protocol to 300 bps to 1200 bps

BO Selects CCITT operation at 300 bps or 1200 bps

B1 Selects BELL operation at 300 bps or 1200 bps

D Go on-line in originate mode

Instructs the modern to go off-hook and automatically dials the number contained in

the dial string which follows the D command

En Command echo

EO Disable command echo El Enables command echo (default)

Fn Select line modulation

FO Select auto-detect mode

F1 SelectV.21 or Bell 103

F4 Select V.22 or Bell 212A 1200 bps

F5 Select V.22bis line modulation.

F6 Select V.32bis or V.32 4800 bps line modulation

F7 Select V.32bis or V.32 7200 bps line modulation

F8 Select V.32bis or V.32 9600 bps line modulation

F9 Select V.32bis 12000 line modulation

FlO Select V.32bis 14400 line modulation

Hn Hang-up

HO Go on-hook (hang-up connection)

HI Goes off-hook

In Request product code or ROM checksum

IO Reports the product code

11/12 Reports the hardware ROM checksum

13 Reports the product revision code

14 Reports response programmed by an OEM 15 Reports the country code number

Ln Control speaker volume

LO Low volume 11 Low volume

L2 Medium volume (default) L3 High volume

Mn Monitor speaker onloff

MOIM Speaker is always off Ml Speaker is off while receiving carrier (default)

M2 Speaker is always on

Nn Automode enable

M3 Speaker is on when dialing but is off at any other

time

NO Automode detection is disabled N1 Automode detection is

enabled

On Return to the on-line state

00 Enters on-line data mode with a retrain

01 Enters on-line data mode without a retrain

P Set pulse dial as default

Q Result code display

QO Send result codes to the computer

QI No return codes

Sn Reading and writing to S registers

Sn? Reads the Sn register Sn=val Writes the value of val to the Sn register

T Set tone dial as default

Vn Select word or digit result code VO Display result codes in a numeric form

VI Display result code in a long form (default)

Wn Error correction message control

WO When connected report computer connection speed

WI When connected report computer connection speed, error

correcting protocol and line speed W2 When connected report modem connection speed

Xn Select result code

XO Partial connect message, dial-tone monitor off, busy tone monitor off

Xl Full connect message, dial-tone monitor off, busy tone monitor off X2 Full connect message, dial-tone monitor on, busy tone monitor off X3 Full connect message, dial-tone monitor off, busy tone monitor on X4 Full connect message, dial-tone monitor on, busy tone monitor on

Yn Enables or disables long space disconnection

YO Disables long space disconnect (default)

YI Enables long space disconnect

Zn Reset ZO Resets modem and load stored profile 0 ZI Resets modem and load stored profile 1

&Cn Select DCD options &CO Sets DCD permanently on &Cl Use state of carrier to set DCD (default)

&Dn DTR option This is used with the &Qn setting to determine the operation of the DTR signal

&00 &01 &02 &03

&QO a c d e

&Ql b c d e

&Q2 d d d d

&Q3 d d d d

&Q4 b c d e

&Q5 a c d e

&Q6 a c d e

where a - modem ignore DTR signal

b - modem disconnects and sends OK result code c - modem goes into command mode and sends OK result code

1406 Handbook of the Internet

d - modem disconnects and sends OK result code.

&F Restore factory configuration

&Gn Set guard tone &GO Disables guard tone (default)

&Gl Disables guard tone

&G2 Selects 1800 Hz guard tone

&Kn DTE/modem flow control

&KO Disables DTEIDCE flow control

&K3 Enables RTS/CTS handshaking flow control (default)

&K4 Enables XON /XOFF flow control

&K5 Enables transparent XON /XOFF flow control

&K6 Enables RTS/ CTS and XON /XOFF flow control

&L Line selection &LO Selects dial-up line operation (default)

&Ll Selects leased line operation

&Mn Communications mode &Pn Select pulse dialing make/break ratio

&PO Sets a 39/61 make-break ratio at 10 pps (default)

&Pl Sets a 33/67 make-break ratio at 10 pps (default)

&P2 Sets a 39/61 make-break ratio at 20 pps (default)

&P3 Sets a 33/67 make-break ratio at 20 pps (default)

&Qn Asynchronous/synchronous mode selection

&QO Set direct asynchronous operation &Q1 Set synchronous operation with asynchronous off-line &Q2 Set synchronous connect mode with asynchronous off-line &Q3 Set synchronous connect mode

&Q5 Modem negotiation for error-corrected link

&Q6 Set asynchronous operation in normal mode

&Rn RTS/CTS option &RO In synchronous mode, CIS changes with RTS (the delay is defined by

the S26 register)

&Rl In synchronous mode, CTS is always ON &Sn DSR option

&SO DSR is always ON (default)

&Sl DSR is active after the answer tone has been detected &Tn Testing and diagnostics

&TO Terminates any current test &TI Local analogue loopback test &T2 Local digital loop back test

&V View configuration profiles

&Wn Store the current configuration in non-volatile RAM

&WO Writes current settings to profile 0 in nonvolatile RAM

&W1 Writes current settings to profile 1 in nonvolatile RAM

&Xu Clock source selection

&XO Selects internal timing, where the modem uses its own clock for

transmitted data

&Xl Selects external timing, where the modem gets its timing from the DTE (computer)

Modem codes 1407

&X2 Selects slave receive timing, where the modem gets its timing from the

received signal

&Yn Select default profile

&YO Use profile 0 on power-up (default)

&Yl Use profile 1 on power-up

&Zn Store telephone numbers

&ZO Store telephone number 1 &ZI Store telephone number 2

&Z2 Store telephone number 3 &Z3 Store telephone number 4

IAn Maximum MNP block size

lAO 64 characters IAI 128 characters

IA2 192 characters IA3 256 characters

IBn Transmit break

IBI Break length 100 ms IB2 Break length 200 ms

IB3 Break length 300 ms (Default) and so on.

IGn Modem/modem flow control

IGO Disable (Default) IGI Enable

lIn Enable/disable DTE auto rate adjustment

110 Disable In Enable

IKn Break control

IKO Enter on-line command mode with no break signal

IKI Clear data buffers and send a break to the remote modem

IK3 Send a break to the remote modem immediately

IK5 Send a break to the remote modem with transmitted data

ILn MNP block transfer control

ILO Use stream mode for MNP connection (default)

ILl Use interactive MNP block mode.

Apl.2 Result codes After the modem has received an AT command it responds with a return code. A complete set of return

codes are given in Table Ap 1. 1.

Table Ap1.1 Modem return codes

OK 0 Command executed without errors

CONNECT 1 A connection has been made

RING 2 An incoming call has been detected

NO CARRIER 3 No carrier detected

ERROR 4 Invalid command

CONNECT 1200 5 Connected to a 1200bps modem

NO DIAL-TONE 6 Dial-tone not detected

BUSY 7 Remote line is busy

NO ANSWER 8 No answer from remote line

CONNECT 600 9 Connected to a 600 bps modem

CONNECT 2400 10 Connected to a 2400 bps modem

CONNECT 4800 11 Connected to a 4800 bps modem

CONNECT 9600 13 Connected to a 9600bps modem

CONNECT 14400 15 Connected to a 14 400 bps modem

1408 Handbook ofthe Internet

CONNECT 19200 16 Connected to a 19200bps modem

CONNECT 28400 17 Connected to a 28400 bps modem

CONNECT 38400 18 Connected to a 38400 bps modem

CONNECT 115200 19 Connected to a 115200 bps modem

FAX 33 Connected to a FAX modem in FAX mode

DATA 35 Connected to a data modem in FAX mode

CARRIER 300 40 Connected to V.21 or Bell 103 modem

CARRIER 1200175 44 Connected to V.23 backward channel carrier

modem

CARRIER 7511200 45 Connected to V.23 forwards channel carrier mo-

dem

CARRIER 1200 46 Connected to V.22 or Bell 212 modem

CARRIER 2400 47 Connected to V.22 modem

CARRIER 4800 48 Connected to V.32bis 4800 bps modem

CONNECT 7200 49 Connected to V.32bis 7200 bps modem

CONNECT 9600 50 Connected to V.32bis 9600 bps modem

CONNECT 12000 51 Connected to V.32bis 12000 bps modem

CONNECT 14400 52 Connected to V.32bis 14400 bps modem

CONNECT 19200 61 Connected to a 19 200 bps modem

CONNECT 28800 65 Connected to a 28 800 bps modem

COMPRESSION: CLASS 5 66 Connected to modem with MNP Class 5 com-

pression

COMPRESSION: V.42bis 67 Connected to a V.42bis modem with compres-

sion

COMPRESSION: NONE 69 Connection to a modem with no data compres-

sion

PROTOCOL: NONE 70

PROTOCOL: LAPM 77

ALT 80

Apl.3 S-registers The modem contains various status registers called the S-registers which store modem settings. Table

Ap 1.2 lists these registers.

S14 Bitmapped options

o Bit 1 EO

Bit2 QO

Bit 3 VO

Bit4 Reserved

Bit 5 T (tone dial)

Bit 6 Reserved

El

Ql

VI

P (pulse dial)

Bit 7 Answer mode Originate mode

S 16 Modem test mode register

o Bit 0 Local analogue loop back

terminated

Local analogue loopback

test in progress

Modem codes 1409

Bit2 Local digitalloopback

terminated

Bit 3 Remote modem analogue

loop back test terminated

Bit 4 Remote modem digital

loopback test terminated

Bit 5 Remote modem digital

self-test terminated

Bit 6 Remote modem analogue

self-test terminated

Bit 7 Unused

S21 Bitmapped options

0 1

Bit 0 &JO &Jl

Bit 1

Bit2 &RO &Rl

Bit 5 &CO &Cl

Bit 6 &SO &Sl

Bit 7 YO Y1

Bit 4, 3 = 00 &DO

Bit 4, 3 = 01 &01

Bit 4, 3 = 10 &D2

Bit 4, 3 = 11 &D3

Local digital loop back

test in progress

Remote modem analogue

loopback test in progress

Remote modem digital

loopback test in progress

Remote modem digital

self-test in progress

Remote modem analogue

self-test in progress

S22 Speaker/results bitmapped options

Bit 1, 0 = 00 La

Bit1,0=0111

Bit!, 0 = 10 L2

Bit 1, 0= 11 L3

Bit 3, 2 = 00 MO

Bit 3,2 = 01 Ml

Bit 3, 2 = 10 M2

Bit 3, 2 = 11 M3

Bit 6, 5, 4 = 000 XO

Bit 6, 5, 4 = 001 Reserved

Bit 6, 5, 4 = 010 Reserved

Bit 6, 5, 4 = 011 Reserved

Bit 6, 5, 4 = 100 Xl

Bit 6,5,4 = 101 X2

Bit 6,5,4 = 110 X3

Bit 6, 5, 4 = 111 X4

Bit 7 Reserved

S23 Bitmapped options

o 1

BitO &T5

Bit 3, 2, 1 = 000

Bit3, 2,1 = 001

Bit 3, 2, 1 = 010

Bit3, 2,1 = 011

1410 Handbook of the Internet

&T4

300 bps communications rate 600 bps communications rate

1200 bps communications rate

2400 bps communications rate

Bit3, 2,1 = 100

Bit 3, 2,1 = 101

Bit 3, 2, 1 = 11 0

Bit 3, 2, 1 = III

Bit 5, 4 = 00

Bit5,4=01

Bit 5, 4 = 10

Bit 5, 4 = 11

Bit 7,6 = 00

Bit7,6=01

Bit 7, 6= 10

Bit 7, 6 = 11

523 Bitmapped options

4800 bps communications rate

9600 bps communications rate

19200 bps communications rate

Reserved

Even parity

Not used

Odd parity

No parity

GO Gl

G2

G3

Bit 3, 1,0 = 000 &MO or &QO

Bit 3,1,0 = 001 &Ml or &Ql

Bit 3,1,0 = 010 &M2 or &Q2

Bit 3, 1,0 = 011 &M3 or &Q3

Bit 3, 1,0 = 100 &Q3

Bit 3,1,0 = 101 &Q4

Bit 3,1,0 = 110 &Q5

Bit 3, 1,0= III &Q6

o 1

Bit 2 &LO &Ll

Bit6 BO Bl

Bit 5, 4 = 00 XO

Bit 5, 4 = 01 Xl

Bit 5, 4 = 10 X2

528 Bitmapped options

Bit 4, 3 = 00 &PO

Bit4,3=01 &Pl

Bit 4, 3 = 10 &P2

Bit 4, 3 = 11 &P3

531 Bitmapped options

o Bit 1 NO

Bit 3, 2 = 00 WO

Bit 3,2 = 01 WI

Bit 3,2 = 10 W2

536 LAPM failure control

Nl

Bit 2, 1,0 = 000 Modem disconnect

Bit 2, 1, 0 = 001 Modem stays on line and a direct mode connection

Bit 2, 1,0 = 010 Reserved

Bit 2,1,0 = 011 Modem stays on line and normal mode connection is established

Bit 2, 1, 0 = 100 An MNP connection is made, if it fails then the modem disconnects

Bit 2, 1,0 = 101 An MNP connection is made, if it fails then the modem makes a direct

connection

Bit 2, 1,0 = 110 Reserved

Bit 2, 1, 0 = III An MNP connection is made, if it fails then the modem makes a normal

Modem codes 141 1

mode connection

S37 Desired line connection speed

Bit 3, 2, 1,0 = 0000 Auto mode connection (FO)

Bit 3,2, 1,0 = 0001 Modem connects at 300 bps (FI)

Bit 3, 2, 1,0 = 0010 Modem connects at 300 bps (FI)

Bit 3,2, 1,0 = 0011 Modem connects at 300 bps (FI)

Bit 3, 2, 1,0 = 0100 Reserved

Bit 3,2,1,0 = 0101 Modem connects at 1200 bps (F4)

Bit 3,2, 1,0 = 0110 Modem connects at 2400 bps (F5)

Bit 3,2,1,0 = 0111 Modem connects atV.23 (F3)

Bit 3,2, 1, 0 = 1000 Modem connects at 4800 bps (F6)

Bit 3,2, 1,0 = 1001 Modem connects at 9600 bps (F8)

Bit 3,2, 1, 0 = 1010 Modem connects at 12000 bps (F9)

Bit 3,2, 1,0 = 1011 Modem connects at 144000 bps (FlO)

Bit 3, 2, 1,0 = 1100 Modem connects at 7200 bps (F7)

S39 Flow control

Bit 2, 1,0 = 000

Bit2,I,0=01l

Bit 2, 1,0 = 100

Bit 2, 1,0 = 101

Bit2,I,0=IlO

No flow control

RTS/CTS (&K3)

XON/XOFF (&K4)

TransparentXON (&K5)

RTS/CTS and XON IXOFF (&K6)

S39 General bitmapped options

Bit 5, 4, 3 = 000 \KO

Bit 5, 4, 3 = 001 IKI

Bit 5,4,3 = 010 IK2

Bit 5,4,3 = 011 IK3

Bit 5, 4, 3 = 100

Bit 5, 4, 3 = 101

Bit 7, 6 = 00

Bit 7,6 = 01

Bit7,6=IO

Bit 7, 6= 11

IK4

IK5 MNP 64 character block size (lAO)

MNP 128 character block size (IAI)

MNP 192 character block size (\A2)

MNP 256 character block size (\A3)

Table Ap1.2 Modem registers

J!i?ffi:steL.~unc!i()~ ___ ~_. _____ ._ .. __ .!!f!:!'lJJiLJ!1'PiEal t!ifEu1tL __ .••.... SO Rings to Auto·answer 0-255 rings [Orings]

SI Ring counter

S2 Escape character

S3 Carriage return character

S6 Wait time for dial-tone

S7 Wait time for carrier

S8 Pause time for automatic dialing

S9 Carrier detect response time

SIO Carrier loss disconnection time

Sll DTMF tone duration S12 Escape code guard time

S13 Reserved

SI4 General bitmapped options

1412 Handbook of the Internet

0-255 rings [Orings]

[43]

[13]

2-255 s [2s]

1-255 s [50s]

0-255 s [2s]

1-255 in 0.1 s units [6]

1-255 in 0.1 s units [14]

50-255 in 0.001 s units [95]

0-255 in 0.02 s units [50]

[8Ah (WOO 1010b)]

515 Reserved

516 Test mode bitmapped options (&T) lOr

517 Reserved

518 Test timer 0-255 s [O}

S19-520 Reserved

S21 V.24/General bitmapped options [04h (0000 OlOOb)}

522 5peak/results bitmapped options [75h (Olll OlOlb)}

523 General bitmapped options [37h (001l Olllbl}

524 Sleep activity timer 0-255 s to}

525 Delay to D5R off 0-255 s [5}

526 RTS-CT5 delay 0-255 in 0.01 s [l}

527 General bitmapped options [49h (0100 1001b)}

528 General bitmapped options [OOh}

529 Flash dial modifier time 0-255 in 10 ms [01

530 Disconnect inactivity timer 0-255 in 10 s to}

531 General bitmapped options [02h (0000 0010b)}

532 XON character [Cntrl-Q, llh (0001 OOOlb)}

533 XOFF character [Cntrl-5, 13h (0001 OOllb)}

534-535 Reserved

S36 LAMP failure control [7}

537 Line connection speed [O}

S38 Delay before forced hang-up 0-255 s [20}

539 Flow control [3}

540 General bitmapped options [69h (01l0 1001b)}

541 General bitmapped options [3J

542-545 Reserved

546 Data compression control [8Ah (1000 1010b)}

548 V.42 negotiation control [07h (0000 Olllbl}

580 Soft -switch functions to}

582 LAPM break control [40h (0100 OOOObl}

S86 Call failure reason code 0-255

591 P5TN transmit attenuation level 0-15 dBm [IO}

592 Fax transmit attenuation level 0-15 dBm [101

595 Result code message control to}

Modem codes 1413

Ap2 HTML Reference

Ap2.1 Introduction Ap2.1.1 Data Characters

Characters which are not markup text are mapped directly to strings of data characters. An ampersand followed by a character reference or a number value can be used to define a character. Table Ap2.1 defines these characters (the equivalent ampersand character refer­ence is given in brackets). For example:

Fred&#174&ampBert&iquest

will be displayed as:

An ampersand is only recognized as markup when it is followed by a letter or a '#' and a digit:

Fred & Bert

will be displayed as:

Fred & Bert

In the HTML document character set only three control characters are allowed: Horizontal Tab, Carriage Return, and Line Feed (code positions 9,13, and 10).

Table Ap2.1 Character mappings

&#00-&#08 Unused &#09 Horizontal tab &#10 Line feed &#11,&#12 Unused &#13 Carriage Return &#14-&#31 Unused &#32 Space &#33 Exclamation mark &#34 Quotation mark (&quot) &#35 Number sign &#36 Dollar sign &#37 Percent sign &#38 Ampersand (&amp) &#39 Apostrophe &#40 Left parenthesis &#41 Right parenthesis &#42 Asterisk &#43 Plus sign &#44 Comma &#45 Hyphen &#46 Period (full stop) &#47 Solidus &#48-&#57 Digits 0-9 &#58 Colon &#59 Semi-colon &#60 Less than (&It) &#61 Equals sign &#62 Greater than (&gt) &#63 Question mark &#64 Commercial at

&#65-&#90 Letters A-Z &#92 Reverse solidus (\) &#94 Caret

&#91

&#93

&#95

Left square bracket Right square bracket Underscore

&#96 Acute accent &#97-&#122 Letters a-z &#123 Left curly brace &#124 Vertical bar &# 125 Right curly brace &#126 Tilde &#127-&#159 Unused &#160 Non-breaking Space (&nbsp) &#161 Inverted exclamation, i (&iexcl) &#162 Cent sign ¢ (&cent) &#163 Pound sterling £ (&pound) &#164 General currency sign, a (&curren) &#165 Yen sign, ¥ (&yen) &#166 Broken vertical bar, I (&brvbar) &#167 Section sign, § (&sect) &#168 Umlaut, .. (&uml) &#169 Copyright, © (&copy) &#170 Feminine ordinal, • (&ordf) &#171

&#172

&#173

&#174

&#175

&#176

&#177

&#178

&#179

&#180 &#181

&#182

&#183 &#184

&#185

&#186

&#187

&#188

&#189

&#190

&#191

&#192

&#193

&#194

&#195

&#196

&#197

&#198

&#199

&#200

Left angle quote, « (&laquo) Not sign, -, (&not) Soft hyphen, - (&shy) Registered trademark, ® (&reg) Macron accent, - (&macr) Degree sign, 0 (&deg) Plus or minus, ± (&plusmn) Superscript two, 2 (&sup2) Superscript three, 3 (&sup3) Acute accent, - (&acute) Micro sign, fl (&micro) Paragraph sign, ~ (&para) Middle dot, . (&middot) Cedilla, , (&cedil) Superscript one, 1 (&supl) Masculine ordinal, 0 (&ordm) Right angle quote, » (&raquo) Fraction one-fourth, 'A (&frac14) Fraction one-half, ~ (&frac12) Fraction three-fourths, % (&frac34) Inverted question mark, G (&iquest) Capital A, grave accent, A (&Agrave) Capital A, acute accent, A (&Aacute) Capital A, circumflex accent, A (&Acirc) Capital A, tilde, A (&Atilde) Capital A, dieresis, A (&Auml) Capital A, ring, A (&Ar ing) CapitalAE dip thong, 1E (&AElig) Capital C, cedilla, <;: (&Ccedil) Capital E, grave accent, E (&Egrave)

1416 Handbook of the Internet

&#201 &#202 &#203 &#204 &#205 &#206 &#207 &#208 &#209 &#210 &#211 &#212 &#213 &#214 &#215 &#216 &#217 &#218 &#219 &#220 &#221 &#222 &#223 &#224 &#225 &#226 &#227 &#228 &#229 &#230 &#231 &#232 &#233 &#234 &#235 &#236 &#237 &#238 &#239 &#240 &#241 &#242 &#243 &#244 &#245 &#246 &#247 &#248

Capital E, acute accent, E (&Eacute)

Capital E, circumflex accent, E (&Ecirc)

Capital E, dieresis, E (&Euml) Capital I, grave accent, 'i: (&Igrave) Capital I, acute accent, f (&Iacute) Capital I, circumflex accent, I (&Icirc) Capital I, dieresis, I (&Iuml) Capital Eth, Icelandic, D (&ETH) Capital N, tilde, N (&Ntilde) Capital 0, grave accent, 0 (&Ograve) Capital 0, acute accent, 6 (&Oacute)

Capital 0, circumflex accent, 6 (&Ocirc) Capital 0, tilde, is (&Otilde)

Capital 0, dieresis, 6 (&Ouml) Multiply sign, x (&times) Capital 0, slash, 0 (&Oslash) Capital U, grave accent, U (&Ugrave) Capital U, acute accent, U (&Uacute) Capital U, circumflex accent, U (&Ucirc) Capital U, dieresis or umlaut mark, U (&Uuml) Capital Y, acute accent, Y (&Yacute) Capital THORN, Icelandic, p (&THORN) Small sharp s, German, JS (&szlig) Small a, grave accent, a (&agrave) Small a, acute accent, a (&aacute) Small a, circumflex accent, a (&acirc) Small a, tilde, a (&atilde)

Small a, dieresis or umlaut mark, a (&auml) Small a, ring, a (&aring) Small ae dipthong, ce (&aelig) Small c, cedilla, <;: (&ccedil) Small e, grave accent, e (&egrave) Small e, acute accent, e (&eacute) Small e, circumflex accent, e (&ecirc) Small e, dieresis or umlaut mark, e (&euml) Small i, grave accent, i (&igrave) Small i, acute accent, i (&iacute) Small i, circumflex accent, l (&icirc) Small i, dieresis or umlaut mark, i (&iuml) Small eth, Icelandic, 0 (&eth) Small n, tilde, n (&ntilde) Small 0, grave accent, 0 (&ograve) Small 0, acute accent, 6 (&oacute) Small 0, circumflex accent, 0 (&ocirc) Small 0, tilde, 6 (&otilde) Small 0, dieresis or umlaut mark, 6 (&ouml) Division sign, -;- (&di vide) Small 0, slash, IZl (&oslash)

HTML reference 1417

Small u, grave accent, u (&ugrave)

Small u, acute accent, U (&uacute)

&#249

&#250

&#251

&#252

&#253

&#254

&#255

Small u, circumflex accent, u (&ucirc)

Small u, dieresis or umlaut mark, u (&uuml)

Small y, acute accent, y (&yacute)

Small thorn, Icelandic, p (&thorn),

Small y, dieresis or umlaut mark, y (&yuml)

The following gives a script which generates the range of the characters:

<script> var i; for (i=1;i<256;i++) document.write("&#" + i);

</script>

and a sample run is:

:::::::: :::::::::::::::::: '-=$00&'0 - ,- 01:!~-IS6-S9 <"'>~

~ABCDEFGHlJK.L~C"OPQRSTL y\\ "),.'Ylf 1 _. abcdefghijklmnopqrstu\'\\'X~"Z{ } -: €: f ': '°00

$,(E:i:: · ·~·_-n.ss,~:!:y It~ -t' .. -l-' =:}·I'r . .'o .. ,.w~~iliAA...u.<;mEnim);"66600 . OLl:'-(;t:.illnaaaaaare~c':':eiii! iioOOOo...mnruu}"p}'

Ap2.1.2 Tags

Tags are used to delimit elements such as headings, paragraphs, lists, character highlighting and links. Normally an HTML element consists of a start-tag, which gives the element name and attributes, followed by the content and then the end tag. A start -tags is defined between a '<' and '>', and end tags between a '</' and '>'. For example to display text as bold:

<B>Header Level l</B>

Some of the HTML only require a single start tag, these include:

</BR>

</LI>

</DD>

Line break. List Item. Definition Description.

</p>

</DT> Paragraph. Definition term.

Element content is a sequence of data character strings and nested elements. Some ele­ments, such as anchors, cannot be nested.

1418 Handbook of the Internet

»

Ap2.1.3 Names

Names consist of a letter followed by letters, digits, periods or hyphens (normally limited to 72 characters). Entity names are case sensitive, but element and attribute names are not. For example:

'<FONT>', '<Font>', and '<font>'

are equivalent, but

'&It' is different from' &LT'.

Start -tags always begin directly after the opening delimiter (' < ').

Ap2.1.4 Attributes

In a start-tag, white space and attributes are allowed between the element name and the closing delimiter. Attributes typically consist of an attribute name, an equal sign, and a value, which can be:

• A string literal, delimited by single quotes or double quotes and not containing any oc­currences of the delimiting character.

• A name token (a sequence of letters, digits, periods, or hyphens). Name tokens are not case sensitive.

Ap2.1.5 Comments

Comments are defined with a '<!' and ends with a '>'. Each comment starts with '--' and includes all text up to and including the next occurrence of' --'. When defining a comment, white space is allowed after each comment, but not before the first comment. The entire comment declaration is ignored.

< 1 DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">

<HEAD>

<TITLE>Comment Document</TITLE>

<1-- Comment field 1 -->

<1-- Comment field 2 -->

<!>

</HEAD> <BODY>

Ap2.1.6 HTML Public Text Identifiers

Documents that conform to the HTML 2.0 specification can include the following line at the start of the document:

< 1 DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">

Ap2.2 Document structure and block structuring An HTML document is a tree of elements, including a head and body, headings, paragraphs, lists, and so on. These include:

HTML reference 1419

<HTMb

<HEAD>

<TITLE> <BASE>

<IS INDEX>

<LINK>

<META>

<BODY>

<HI> ... <H6>

Document element. Consists of a head and a body. The head contains the title and optional elements, and the body is the main text consisting of paragraphs, lists and other elements. Head element. An unordered collection of information about the docu-ment. Title. Identifies the contents of the document in a global context. Base address. Provides a base address for interpreting relative URLs when the document is read out of context. Keyword index. Indicates that the user agent should allow the user to search an index by giving keywords. Link. Represents a hyperlink (see Hyperlinks) and has the same attributes as the <A> element. Associated meta-information. A container for identifying specialized document meta-information. Body element. Contains the text flow of the document, including head­ings, paragraphs, lists, etc. Headings. The six heading elements, <HI> to <H6> identify section head­ings. Typical renderings are: HI Bold, very-large centered font. One or two blank lines above and

below. HZ Bold, large flush -left font. One or two blank lines above and below. H3 Italic, large font, slightly indented from the left margin. One or two

blank lines above and below. H4 Bold, normal font, indented more than H3. One blank line above

and below. H5 Italic, normal font, indented as H4. One blank line above. H6 Bold, indented same as normal text, more than H5. One blank line

above. <P> Paragraph. Indicates a paragraph. Typically, paragraphs are surrounded

by a vertical space of one line or half a line. The first line in a paragraph is indented in some cases.

<PRE> Preformatted text. Represents a character cell block of text and can be used to define monospaced font. It may be used with the optional WIDTH attribute, which specifies the maximum number of characters for a line.

<ADDRESS> Address. Contains information such as address, signature and authorship. It is often used at the beginning or end of the body of a document.

<BLOCKQUOTE> Block quote. Contains text quoted from another source. A typical render­ing is a slight extra left and right indent, and/or italic font, and typically provides space above and below the quote.

<Ub, <LI> Unordered List. <Ub represents a list of items and is typically rendered as a bulleted list. The content of a <Ub element is a sequence of <LI> ele­ments.

<Ob Ordered List. <Ob represents an ordered list of items which are sorted by sequence or order of importance and is typically rendered as a numbered list. The content of a <OL> element is a sequence of <LI> elements.

<DIR> Directory List. <DIR> is similar to the <Ub element and represents a list of short items. The content of a <DIR> element is a sequence of <LI> ele­ments.

<MENU> Menu List. <MENU> is a list of items with typically one line per item. It is typically a more compact than an unordered list. The content of a <MENU> element is a sequence of <LI> elements.

<Db, <DT>, <DD> Definition list. Lists terms and corresponding definitions. Definition lists are typically formatted with the term flush-left and the definition, format-

1420 Handbook of the Internet

<CITE>

<CODE>

<EM>

<KBD>

<SAMP>

<STRONG>

<VAR>

<B> <I> <TT> <A>

<BR> <HR>

<lMG>

Ap2.3 !DOCTYPE

ted paragraph style, indented after the term. The content of a <Db ele­ment is a sequence of <DT> elements and/or <DD> elements, usually in pairs. Citation. <CITE> is used to indicate the title of a book or other citation. It is typically rendered as italics. Code. <CODE> indicates an example of code and is typically rendered in a mono-spaced font. It is intended for short words or phrases of code. Emphasis. <EM> indicates an emphasized phrase and is typically rendered as italics. Typed text. <KBD> indicates text typed by a user and is typically rendered in a mono-spaced font. Literal characters. <SAMP> indicates a sequence ofliteral characters and is typically rendered in a mono-spaced font. Strong emphasis. <STRONG> indicates strong emphasis and is typically rendered in bold. Placeholder variable. <VAR> indicates a placeholder variable and is typi­cally rendered as italic. Bold. <B> indicates bold text. Italic. <I> indicates italic text. Teletype. <IT> indicates teletype (monospaced) text. Anchor. The <A> element indicates a hyperlink . Attributes of the <A> ele­mentare: HREF URI of the head anchor of a hyperlink. NAME Name of the anchor. TITLE AdvISOry title of the destination resource. REL The REL attribute gives the relationship(s) described by the hy­

perlink. REV Same as the REL attribute, but the semantics of the relationship

are in the reverse direction. URN Specifies a preferred, more persistent identifier for the head an­

chor of the hyperlink. METHODS

Specifies methods to be used in accessing the destination, as a whitespace-separated list of names.

Line Break. <BR> specifies a line break between words. Horizontal Rule. <HR> is a divider between sections of text and is typically a full width horizontal rule. Image. <lMG> refers to an image or icon. Attributes are: ALIGN alignment of the image with respect to the text baseline: • 'TOP' specifies that the top of the image aligns with the tallest item on

the line containing the image. • 'MIDDLE' specifies that the center of the image aligns with the base­

line of the line containing the image. • 'BOTTOM' specifies that the bottom of the image aligns with the base-

line of the line containing the image. ALT Text to use in place of the referenced image resource. ISMAP Indicates an image map. SRC Specifies the URI of the image resource.

Elements A ACRONYM ADDRESS APPLET AREA

HTML reference 1421

B BASE BASEFONT BDO BGSOUND BIG

BLOCKQUOTE BODY BR BUTTON CAPTION CENTER

CITE CODE COL COLGROUP COMMENT custom

DD DEL DFN DIR DIY DL

DT EM EMBED FIELDSET FONT FORM

FRAME FRAMESET HEAD Hn HR HTML

HTML Comment IFRAME IMG INPUT

INPUT type=button INPUT type=checkbox

INPUT type=file INPUT type=hidden

INPUT type=image INPUT type=password

INPUT type=radio INPUT type=reset

INPUT type=submit INPUT type=text

INS ISINDEX KBD

lABEL LEGEND LI LINK LISTING MAP

MARQUEE MENU META NOBR NOFRAMES NOSCRIPT

OBJECT OL OPTION P PARAM PLAINTEXT

PRE Q RT RUBY S SAMP

SCRIPT SELECT SMALL SPAN STRIKE STRONG

STYLE SUB SUP TABLE TBODY TD

TEXTAREA TFOOT TH THEAD TITLE TR

IT U UL VAR WER XML

XMP

Ap2.4 ISO latin- 1 Character Set The following defines the ISO Latin-l character set, which corresponds to the first 256 char­acters of Unicode.

I Charactcr Decimal I Named entity I Description

code

- &/100; - Unused

- &1101; - Unused

&1102; - Unused

- &1103; - Unused

- &1104; - Unused

- &/105; - Unused

- &1106; - Unused

- &1107; - Unused

- &1108; - Unused

- &#09; - Ilorizonlaitab

- &11 10; - Line feed

- &111 1; - Unused

- &1112; - Unused

- &1113; - Carriage RClUrn

1422 Handbook of the Internet

- &#14; Unused

- &# 15; Unused

- &11 16; - Unused

- &11 17; - Unused

- &1118; - Unused

- &/1 19; - Unused

- &1120; - Unused

- &//2 1: - Unused

- &1122- - Unused

- &1123; - Unused

- &1124; - Unused

- &1125; - Unused

- &1t26; - Unused

- &#27; - Unused

- &#26; - Unused

- &//29; - Unused

- &#30; - Unused

- &1131; - Unused

&//32; - Space

! &#33; - Exclamation mark

" &/134; &quot; Quotation mark

/I &#35; - Number sign

$ &/136; - Dollar sign

% &//37; - Percent sign

& &//38: &amp; Ampersand . &//39; - Apostrophe

( &//40; - Left parenthesis

) &//41; - Right parelllhesis

• &1t42; - Asterisk

; + &1143; - Plus sign

, &1144; - Comma

- &1145; - Hyphen

&1146; - Period (fullstop)

I &/147; - Solidus (slash)

0 &//48: - Digit 0

J &1149; - Digit I

2 &1150; - Digit 2

3 &/15 1; - Digit 3

4 &1t52; - Digil4

HTML reference 1423

5 &/153; - Digit 5

6 &#54; - DigIt 6

7 &/155; - Digit 7

8 &#56; - Digit 8

9 &#57: - Digit 9

: &#58; - Colon

; &#59; - Semicolon

< &#60; &1t; Less lhan

= &/161: - Equals sign

;> &#62; &gt; Greater than

? &/163; - Question Illark

@ &#64; - Commercial al

A &1165; - Capital A

B &#66; - Capital B

C &#67; - Capital C

U &#68; - Capital U

E &1169; - Capital E

F &#70; - Capital F

G &/171; - Capital G

H &#72; - Capital ll

I &1173; - Capital j

J &/174; - Capital J

K &#75; - Capital K

L &/176: - Capital L

M &#77; - Capital M

N &1178; - Capital N

0 &#79; Capital 0

p &#80; - Capital P

Q &#81; - Capital Q

R &#82; - Capital R

S &#83; - Capital S

T &1184: - CapitalT

U &#85; - Capital U

V &1f86; - Capital V

W &#87; - CapitalW

X &1f88; - Capital X

y &/189; - Capital Y

Z &1f90; - Capital Z

I &#91; - Left square bracket

1424 Handbook ofthe Internet

\ &1192; · Heverse solidus (backslash)

I &#93; · Right square bracket

" &1194; · Caret

- &1195; · Horizontal bar (underscore)

&#96; Acute accent

a &1197; · Small a

b &#98; · Smal l b

c &1199; - Small c

d &11100; · Small d

e &#101; - Smalle

f &# 102; - Small f

g &11103; · Small g

h &11104; - Small h

i &11105; · Smalli

j &11 106; · Smallj

k &11107; - Small k

I &/t l08; - . Small I

m &/t l 09; Small m

n &11 110; · Small n

0 &11111 ; Small 0

p &11112; · Small p

q &/tJl3; · Small q

r &11 114; - Small r

s &11115; · Small s

t &11116; · Small l

u &111 17: - Smallu

v &#118; · Small v

w &#1I9; · Smallw

x &#120; - Small x

y &11121; · Smally

z &11122; - Smallz

{ &11123; · Left curly brace

I &11 124; · Vertical bar

I &11125; - Hight curly brace

- &/t126; · Tilde

- &/t127; - Unused

&11160; &nbsp: ~onbreaking space

i &11161; &iexcl; Inverted exclamation

It &11162; &cent; Cent sign

HTML reference 1425

I: &#163; &pound; Pound sterling

c &11164; &curren; General currency sign

y &#165; &yen; Yen sign

I &11166; &brvbar; or &brkbar; Broken vertical bar I

§ &11167; &sect; Section sign .. &11168; &uml; or &die; Oireresis I Umlaut

© &11169; &copy; Copyright

a &11170; &ordf; Feminine ordinal

" &11171; &Iaquo; Left angle quote, guillemot left

..... &11172; &nOI Not sign

&11173; &shy; Soft hyphen

® &11174; &reg; Hegistered trademark

- &#175; &macr; or &hibar; Macron acccnt . &#176; &deg; Degree sign

± &11177; &plusmn; Plus or minus

z &#178; &sup2; Superscript two

3 &#179; &sup3; Superscriptlhrec

&#180; &acule; Acute accent

p &#181; &micro; Micro sign

'I &/1182; &para; Paragraph sign

&/1183; &middOl; Middledot

&#184; &cedil; Cedilla

1 &11185; &supl; Superscript onc

0 &11186; &urdm; Masculine ordinal

» &11187; &raquo; RighI angle qUOle. guillemo[ right

1.4 &#188; &fracL4; Fraction one-fourlh

\12 &11189; &frac12; Fraction one-half

¥.. &11190; &frac34; Fraction three-fourths

l. &11191; &iquest; Invcrted question mark

A &/1192; &Agrave; Capital A, grave accent

A &11193; Macule; Capital A, acute accent

A &#194; &Acirc; Capital A, circumflex

A &11195; &Atilde; Capital J\, tilde

A &11196; &Allml; Capital A, dirercsis I umlaut

A &#197; &Aring; Capital A, ring

IE &11198; &A.Elig; Capital AE ligature

(. &11199; &Ccedil; Capital C, cedilla

E &11200; & Egrave; Capital E, grave accent

E &11201; &Eacure; Capital E. acute acceru

1426 Handbook ofthe Internet

~ &11202; &Ecirc; Ca pital E. c ircum flex

E &11203; &Euml ; Capital E. direresis { umlaut

1 &11204; &Igrave; Capital I. g rave accen t

r &11205; &lacUle; Capital I. acu te accenl

y &11206; &lcirc; Capital I, circumflex

J &11207; &Iuml; Capital !. d i~r~is { um laut

D &//208; &ETII ; Capital Elh. Icelandic

N &11209; &Ntilde; Capital N. ti lde

0 &1I2LO; &Ograve; Capita l O. grave accent

() &821 1; &Oacute; Capital O. acute accent

0 &11212; &Ocirc; Capital O. circumflex

0 &//2 13; &Otilde; Capital O. tilde

0 &82 14; &Oum l; Capital 0, d ireresis { umlaut

x &11215; &times; Mult iply sign

Q) &11216; &05Iash; Capital 0, slash

U &11217; &Ugrave; Ca pital U. grave accent

0 &#218; &Uacute; Capital U. acule accent

0 &//219; &Ucirc; Capi tal U, circumflex

0 &11220; &Uuml; Capital U, dire resis {umlaut

y &11221; &Yacute; Capital Y. acute accent

I> &11222; &TI-IO RN; Capital Thorn, Icelandic

B &11223; &szlig; Small sharp s, German sz

1'1 &//224; &agrave; Small a. grave accent

a &11225; &aacu te; Small a, acute accent

a &11226; &acirc; Small a. c ircumflex

ii &#227; &atildc; Small a. ti lde

a &11228; &auml; Sma ll a, direresis { umlaut

;\ &//229; &aring; Small a, ring

~ &11230; &aelig; Small ae ligature

t; &//231; &cccd il ; ~mall c, cedilla

C &11232; &egravc; Sma ll e. grave accent

e &11233; &eacute; Small e, acute accent

e &//234; &ccirc; Small e. circumflex

e &11235; &euml; Small e, di~resis { umlaut

I &11236: &igrave; Small i, grave accent

r &11237; &iacute; Small i. acute accent

i &11238; &icirc; Small i, circu mflex

"I &11239; &iuml ; Small i. di reresis {umlaut

i'J &11240; &erh; Small eth, Iceland ic

HTML reference 1427

Ii &11241; &ntilde; Small n, Lilde

0 &11242; &ograve; Small 0, grave accent

6 &11243; &oacute: Small o. acute accent

6 &11244; &ocirc; Small 0, circumOex

0 &11245; &otilde; Small 0, t ilde

0 &11246; &ouml; Small 0, dirorcsis { Wlllaut

+ &#247; &divide; Division sign

0 &11248; &oslasl1; Sma ll 0, slash

U &11249; &ugrave; Small u, grave accent

U &#250; &uacu tc; Small u, acute accent

0 &#251; &ucirc; Small u, circumnex

U &11252; &uuml; Smallu, dirorcsis {umlaut

y &11253; &yaclllc; Small y. acute accent

p &11254; &thorn; Small thorn, Icelandic

y &11255; &yuml; Sma ll )', dirorcsis {umlaut

Ap2.S Additional Named Entities for HTML The following gives additional names for entities.

Character Named entity Numeric character reference Description

Greek

A &Alpha; &#913; Greek capital lener alpha, U0391

B &Beta; &119 14; Greek capitallener beta. U0392

r &Gamma; &#9 15; Greek capitalleuer gamma, U0393 ISOgrk3

6 &Delta; &#9 16; Greek capi tallener delta, U0394 ISOgrk3

E &Epsilon; &#9 17; Greek capiwl leuer epsilon, U0395

Z &Zeta; &#9 18; Greek capital lcucr zeta, U0396

H &Eta; &#9 19; Greek capital letter eta, U0397

0 &Theta; &0920; Greek capitallerter lheta, U0398 ISOgrk3

I &Iota; &#921; Greek capital lener iota, U0399

K &Kappa; &#922' Greek capital letter kappa, U039A

/\ &Lambda; &#923; Greek capi tal letter lambda, U03913IS0grk3

M &M u; &#924: Greek capila l letter mu, U039C

N &Nu; &#925; Greek capital letter nu, U039D

- &Xi; &11926: Greek capilal lcller xi, U039E ISOgrk3

0 &Omicron; &11927; Greek capital leller omicron. U039F

n &Pi; &0928; Greek capital letter pi, U03AO ISOgrk3

p &Rho; &#929; Greek capital letter rho, U03A J

1428 Handbook ofthe Internet

I &Sigma: &11931: Greek capitalleller sigma, U03A3 ISOgrk3

T &Tau; &6932: Grcek capitalleller tau, U03M

y &Upsilon; &11933; Greek capitallcller upsilon. U03A5 ISOgrk3

<J> &Phi; &#934; Greek capitalleller phi, U03A6 ISOgrk3

X &Chi; &11935; Greek capilalleller chi, U03A7

'f' &Ploi: &11936; Greek capitallettcr psi, U03A8 ISOgrk3

0 &Omega; &11937; Greek capitallellcr omega, U03A9 ISOgrk3

()( &alpha; &6945: Greek small ICller alpha, U03B 1 ISOgrk3

~ &beta; &11946; Greek smaLllcHer bela, U03B2 ISOgrk3

Y &gamma: &6947; Greek small leller gamma, U03B3 ISOgrk3

I) &della; &6948; Grcek smallleller delta, U03B4 ISOgrk3

E &epsilon; &6949: Greek small lcller epsilon, U03B5 ISOgrk3

l; &zeta; &11950; Greek smallletler zela, U03B6 ISOgrk3

r) &ela; &11951; Greek smalileller eta. U03B7 ISOgrk3

e &thcta; &11952; Greek smalllcttcr lhela, U03B8 ISOgrkJ

l &iola; &11953; Greek smallleller iota, U03B9 ISOgrk3

K &kappa; &11954; Greek smallieller kappa, U03Bt\ ISOgrk3

" &Iambda; &//955; Creck smailieller lambda, U03BB ISOgrk3

II &mu; &//956; Greek smallieller mu, U03BC ISOgrk3

v &nu; &11957; Greek smallieller nu, U03BD ISOgrk3

~ &xi; &11958; Greek smalllctter xi. U03BE ISOgrk3

0 &omicron; &6959; Greek smalllcllcr omicron, U03BF ~EW

TT &pi; &6960; Grcck ~mall ieller pi. U03CO ISOgrk3

p &rho; &11961; Grcck smallietrer rho. U03C l ISOgrk3

C; &sigmaf; &11962; Greek small letter final sigma. U03C2 ISOgrk3

(1 &sigma: &//963; Grcek smallieller sigma, U03C3 ISOgrk3

T &tau; &//964; Greek smalllcller tau. U03C4 ISOgrk3

u &ups ilon; &11965; Greek small letter upsilon. U03C5 ISOgrk3

<jl &phi; &//966; Greek small ICller phi. U03C6 ISOgrk3

X &chi; &11967; Greek smalllcllcr chi. U03C7 ISOgrk3

4J &psi; &11968; Greek smaLllcner psi. U03C8 ISOgrk3

w &omcga; &6969; _ Greck smallieller omcga. U03C9 ISOgrk3

~ &lhctasym; &6977; Greek small ieller theta symbol, U03D I NEW

Y &upsih; &11978; Greek upsilon with hook symbol. U03D2 NEW

to &piv; &11982; Greek p i symbol. U03D6 ISOgrk3

Gelleral PUIlClIJat;oll

&bull ; &68226; bullcl. =black small circle, U2022 ISOpub

... &hell ip; &118230; hori~on t al cllipsis. =Ihrce dOl leader, U2026 ISOllub

HTML reference 1429

, &prime; &#8242; prime. =minutes. =feet. U2032 ISOtech

" &Prime; &1t8243; double prime. =seconds, =inches, U2033 ISOtech -

&oline; &1f8254; overline. =spacing overscore. U203E NEW

I &frasl; &1f8260; fraction slash, U2044 NEW

l.etle/'like Symbols

~ &weierp; &1t8472; script capital P, =power sct, =Weierstrass p, lI211S ISOamso

:J &image; &118465; blackletter capital I. =imaginary part, U2111 ISOamso

'R &real; &118476; blackleuer capital R, =real part symbol, U211 C ISOamso

TN &trade; &118482; trade mark sign, U21221S0num

N &alefsym; &#8501; alef symbol, : first transfinite cardinal, U2135 NEW

Arrows

&Iarr; &1t8592; leftward arrow, U2190 ISOmlln

r &uarr; &118593; upward arrow, U2) 91 rSOnum

&rarr; &#8594; rightward arrow, U2192 ISOnum

j &darr; &#8595; downward arrow. U21931S0num

- &harr; &118596; left right arrow, U2194 rSOamsa

&crarr; &118629; downward arrOw with corner leftward. =carriage return. U2l 85

NEW

<= &lArr; &118656; leftward double arrow, U21 DO IS0tech

11 &uArr; &118657; upward double arrow. LIZ 1 D I ISOamsa

~ &rArr; &118658; rightward double arrow, UZ) D2 lSOtech

II &dArr: &118659; downward double arrow. U21 03 ISOamsa

= &hArr; &118660; left right double arrow, U21 04 ISOamsa

MalhernalicalOperators

':J &foral!; &118704; for all , U2200 ISOtech

a &part; &118706; partial differential. U2202 ISOtech

3 &exist; &118707; there exIsts, U2203 ISOtcch

(2) &empty; &#8709; empty set, =rIull set, =diamcter, lJ2205 ISOamso

<:J &nabla; &#8711; nabla, =backward diITerence, U2207 ISOtech

E &isin; &118712; element of, U2208 ISOtech

f£ &notin; &1t87 I 3; no! an element of, U2209 ISOlech

3 &ni; &#8715; contains as member, U220B rSOtech

n &prod; &#8719; n-ary product. =product sign, U220F rSOamsb

- &sum; &118722; n-tlry sumation, U2211 ISOarnsb

- &minus; &#8722; minus Sign, U2212 ISOtech

* &Iowast; &1t8727; asterisk operator, U2217 ISOtech

" &radic; &118730; square root. =radical sign, U221A ISOtech

IX: &prop; &#8733; proportional to. U221 D ISOtech

1430 Handbook ofthe Internet

00 &inftn; &#8734; infmity, U221E ISO tech

L &ang; &1f8736; angle, U2220 ISOamso

1- &and; &#8869; logical and, =wedge, U2227 ISOtech

~ &or; &#8870; logical or, =vee, U2228 ISOtech

n &cap; &#8745; intersection, =cap, U2229 ISOtech

U &cup; &#8746; union, :cup, U222A ISOtech

f &int; &#8747; integral, U222B ISOtech

.. &there4; &#8756; therefore, U2234 ISOtech

- &sirn; &#8764; tilde operator, =varies with, =similar to, U223C ISOtech

- &cong; &#8773; approximately equal to, U2245 ISOtech

- &asymp; &#8773; almost equal to, =asymptotic to, U22481S0amsr

'* &ne; &#8800; not equal to, U2260 ISOtech

- &equiv; &#8801; identical to, U2261 ISOtech

s &Ie; &#8804; less-than or equal to, U2264 ISOtech

~ &ge; &#8805; greater-than or equal 10, U2265 ISO tech

c &sub; &#8834; subset of, U2282 ISO tech

:J &sup; &#8835; superset of, U2283 ISOtech

q. &nsub; &#8836; not a subset of, U2284 ISOamsn

£ &sube; &#8838; subset of or equal to. U2286 ISOtech

;1 &supe; &#8839; superset of or equal to. U2287 ISOtech

Ell &oplus; &#8853; circled plus. =direct sum. U2295 ISOamsb

® &otirnes; &#8855; circled times. =vector product. U2297 lS0amsb

1- &perp; &#8869; up tack. =orthogonal to. =perpendicular. U22A5 ISOtech

&sdol; &#8901; dot operator. U22C5 ISOamsb

Miscellaneous Technical

r &Iceil; &#8968; left ceiling. =apl upstile, U2308, ISOamsc

1 &rceil; &#8969; right ceiling. U2309, ISOamsc

l &lfloor; &118970; left floor. =apl downstile, U230A, ISOamsc

J &rOoor; &#8971; right floor. U230B. ISOamsc

) &Iang; &119001; left-pointing angle bracket. =bra. U2329 1S0tech

• &rang; &#9002; right-pointing angle bracket, =ket. U232A ISO tech

Geometric Shapes

0 &loz; &#9674; lozenge, U25CA ISO pub

Miscellaneous Symbols

• &spades; &#9824; black spade suit. U2660 ISO pub

+ &clubs; &#9827; black club suit, =shamrock. U2663 ISO pub

• &hearts; &#9829; black heart suit, =valentine. U2665 ISOpub

• &diams; &#9830; black diamond suit, U2666 ISOpub

HTML reference 1431

Ap2.6 Character Entities for Special Symbols Using NE NE NCR Using NCR

CO COl/lrols alld Basic Ultill

" &quot &#34; quotation mark, =apl quote, U0022 ISOnulll

& &amp &#38; ampersand, U0026 ISOnul11

< &J t &#60; less-than sign, U003C ISOnum

> &gr &#62; greater-than sign, V003E ISOnum

Lalill Extel1ded-A

CE &OElig &#338; Latin capi tal ligature oe, UO 152 ISOlal2

(E &oelig &#339; Latin smaU ligature oe, U0153 ISOlal2

S &Scaron &#352; Lati n capital letter s with caron, VOl60 ISOlat2

~ &scaron &1f353; Lalin small letter s with caron, UO]61 ISOlal2

'l &Yuml &1f376; Latin capira l letter y wi lh diaeresis, U01781S0lat2

Spacing Modifier Lei lefS . &circ &#710; modifier letter circumflex accent, U02e6 ISOpub

- &tilde &1f732; small t ilde. U020C ISOdia

Gelleral PUllctuatioll

&ensp &#8194; en space, U2002 ISOpub

&emsp &#8195; em space, U2003 ISOpub

. &rhinsp &1f8201 ; thin space, U2009 ISOpub

&zwnj &#8204; ~o width non-joiner, U200C NEW RFC 2070

&zwj &#8205; zero width joiner, U2000 NEW RFC 2070

&lrl11 &#8206; left-la-right mark, U200E NEW RFC 2070

&rIm &#8207; righI -to-left mark, U200F NE"" RFC 2070

- &ndash &#8211; ell dash, U2013 lSOpuh

- &mdash &11 151; em dash, U2014 ISOpub

&Isquo &118216; left single quotation mark, U2018 ISOnum

&rsquo &#8217; right single quotation mark. U20191S0nUl11

&shquo &118218; single low-9 quotation mark, U20 lA NEW

" &Jdquo &#8220; left double quotation mark, U201 C ISOnum .. &rdquo &118221; right double quotation mark, U201 0 ISOnum

.. &bdquo &118222; double low-9 quotation mark, U20 I E NEW

t &dagger & /18224; dagger, U2020 ISOpub

* &Dagger &118225; double dagger, U202 1 ISOpub

%0 &permil &118240; per mille sign, U2030 ISOtcch

( &Isaquo &#8249; single lert-pointing angle quotation mark, U2039 ISO proposed

, &rsaquo &#8250; single right-poi nti ng angle quotation mark, U203A ISO proposed

1432 Handbook of the Internet

Ap2.7 Character Set Recognition The META element can be used to define the character set for a document. The HTTP­EQUIV attribute is set to "Content-Type" and CONTENT attribute defines the content type. A character set is defined with the CHARSET= attribute. For example, the following defines the Windows-1251 character set:

<META HTTP-EQUIV="Content-Type" CONTENT="text/html; CHARSET=windows-1251 " >

If the META element is inserted before the BODY element, it affects the whole document. Example character sets are:

Display Preferred Additional Aliases MLang Supported Name CharsetID Code byVer-

Page sions Arabic ASMO-708 708 4CS,5

ASMO-708 Arabic DOS-nO no 4CS,5 (DOS) Arabic (ISO) ISO-8859-6 ISO_8859-6:1987,ISO-ir-127, 28596 4CS,5

ISO_8859-6, ECMA-ll4, arabic, csISOLatinArabic

Arabic (Win- Windows- 1256 4CS,5 dows) 1256 Baltic (ISO) ISO-8859-4 csISOLatin4, ISO-ir-llO, ISO_8859- 28594 4,5

4, ISO_8859-4:1988, 14, latin4 Baltic (Win- Windows- 1257 4,5 dows) 1257 Central IBM852 cp852 852 4,5

European (DOS) Central ISO-8859-2 csISOLatin2, ISO-ir-101, IS08859-2, 28592 3,4,5 European ISO_8859-2, ISO_8859-2:1987, 12, (ISO) latin2 Central Windows- x-cp1250 1250 3,4,5 European 1250 (Windows) Chinese Gb2312 chinese, csGB2312, 936 3,4,5 Simplified csIS058GB23128, GB2312, GBK, (GB2312) GB_2312-80,ISO-ir-58 Chinese Hz-gb-2312 52936 4,5 Simplified (HZ) Chinese Tra- big5 csbig5, x-x-big5 950 3,4,5 ditional Cyrillic Cp866 IBM866 866 4,5 (DOS)

HTML reference 1433

Cyrillic (ISO) ISO-8859-5 csISOLatinCyrillic, cyrillic, ISO-ir- 28595 4,5 144, ISO_8859-5, ISO_8859-5:1988

Cyrillic koi8-r csK0I8R, koi 20866 3,4,5 (K0I8-R) Cyrillic windows- x-cp1251 1251 3,4,5 (Windows) 1251 Greek (ISO) ISO-8859-7 csISOLatinGreek, ECMA-118, 28597 3,4,5

ELOT_928, greek, greek8, ISO-ir-126, ISO_8859-7, ISO_8859-7:1987

Greek (Win- Windows- windows-1253 1253 5 dows) 1253 Hebrew DOS-862 862 4CS,5 (DOS)

Hebrew ISO-8859-8 csISOLatinHebrew, hebrew, ISO-ir- 28598 4CS, 5 (ISO) 138, ISO_8859-8, visual, ISO-8859-8

Visual Hebrew windows- logical, ISO_8859-8:1988, ISO-ir-138 1255 3CS, 4CS, 5 (Windows) 1255 Japanese ISO-2022-jp csIS02022JP 50220 4,5 (JIS) Japanese csIS02022JP ISO-2022-jp 50221 4,5 (JIS-Allow 1-byte Kana) Japanese ISO-2022-jp csIS02022JP 50222 3,4,5 (JIS-Allow 1-byte Kana-SO/SI) Japanese euc-jp csEUCPkdFmtJapanese, Ex- 51932 3,4,5 (EUC) tended_ UNIX_ Code_Packed -

FormaCfocJapanese, x-euc, x-euc-jp

Japanese shiftjis csShiftJIS, csWindows3lJ, ms_Kanji, 932 3,4,5 (Shift-JIS) shift-jis, x-ms-cp932, x-sjis Korean ks_c_5601- csKSC56011987, euc-kr, korean, 949 3,4,5

1987 ks_c5601 Korean (ISO) ISO-2022-kr csIS02022KR 50225 3,4,5 Latin 3 (ISO) ISO-8859-3 28593 4,5

Thai (Win- ISO-8859-11 windows-874 874 3,4,5 dows) Turkish Windows- windows-1254 1254 3,4,5 (Windows) 1254 Turkish ISO-8859-9 csISOLatin5, ISO_8859-9, ISO_8859- 28599 3,4,5 (ISO) 9:1989, ISO-ir-148, 15, latin5

Ukrainian koi8-u 21866 4,5 (K0I8-U) Unicode utf-7 csUnicodellUTF7, unicode-l-l- 65000 4,5 (UTF-7) utf-7, x-unicode-2-0-utf-7

1434 Handbook of the Internet

Unicode utf-8 unicode-l-l-utf-8, unicode-2-0-utf- 65001 4,5 (UFT-8) 8, x-unicode-2-0-utf-8 Vietnamese windows- 1258 3,4,5 (Windows) 1258 Western Windows- 1252 5 European 1252 (Windows) Western ISO-8859-1 ANSCX3.4-1968, ANSCX3.4-1986, 1252 3,4,5 European ascii, cp367, cp819, csASCII, (ISO) IBM367, IBM819, ISO-ir-lOO, ISO-ir-

6, IS0646-US, IS08859-1, ISO_646.irv:1991,ISO_8859-1, ISO_8859-1:1987, latinI, us, us-ascii, x-ansi

HTML reference 1435

Ap3 ASCII Reference

Ap3.1 Standard ASCII ANSI defined a standard alphabet known as ASCII. This has since been adopted by the CCITT as a standard, known as lA5 (International Alphabet No.5). The following tables de-fine this alphabet in binary, as a decimal value, as a hexadecimal value and as a character.

Binary Decimal Hex Character Binary Decimal Hex Charac-ter

00000000 0 00 NUL 00010000 16 10 DLE 00000001 1 01 SOH 00010001 17 11 DC1 00000010 2 02 STX 00010010 18 12 DC2 00000011 3 03 ETX 00010011 19 13 DC3 00000100 4 04 EOT 00010100 20 14 DC4 00000101 5 05 ENQ 00010101 21 15 NAK 00000110 6 06 ACK 00010110 22 16 SYN 00000111 7 07 BEL 00010111 23 17 ETB 00001000 8 08 BS 00011000 24 18 CAN 00001001 9 09 HT 00011001 25 19 EM 00001010 10 OA LF 00011010 26 1A SUB 00001011 11 OB VT 00011011 27 1B ESC 00001100 12 OC FF 00011100 28 1C FS 00001101 13 OD CR 00011101 29 1D GS 00001110 14 OE SO 00011110 30 1E RS 00001111 15 OF S1 00011111 31 1F US

Binary Decimal Hex Character Binary Decimal Hex Charac-ter

00100000 32 20 SPACE 00110000 48 30 0 00100001 33 21 00110001 49 31 1 00100010 34 22 00110010 50 32 2 00100011 35 23 # 00110011 51 33 3 00100100 36 24 $ 00110100 52 34 4 00100101 37 25 % 00110101 53 35 5 00100110 38 26 & 00110110 54 36 6 00100111 39 27 / 00110111 55 37 7 00101000 40 28 ( 00111000 56 38 8 00101001 41 29 ) 00111001 57 39 9 00101010 42 2A * 00111010 58 3A 00101011 43 2B + 00111011 59 3B 00101100 44 2C 00111100 60 3C <

00101101 45 2D 00111101 61 3D 00101110 46 2E 00111110 62 3E > 00101111 47 2F / 00111111 63 3F ?

Binary Decimal Hex Character Binary Decimal Hex Charac-ter

01000000 64 40 @ 01010000 80 50 P

01000001 65 41 A 01010001 81 51 Q

01000010 66 42 B 01010010 82 52 R

01000011 67 43 C 01010011 83 53 S

01000100 68 44 D 01010100 84 54 T

01000101 69 45 E 01010101 85 55 U

01000110 70 46 F 01010110 86 56 V

01000111 71 47 G 01010111 87 57 W

01001000 72 48 H 01011000 88 58 X

01001001 73 49 I 01011001 89 59 Y

01001010 74 4A J 01011010 90 5A Z

01001011 75 4B K 01011011 91 5B [

01001100 76 4C L 01011100 92 5C \ 01001101 77 4D M 01011101 93 5D

01001110 78 4E N 01011110 94 5E

01001111 79 4F 0 01011111 95 5F

Binary Decimal Hex Character Binary Decimal Hex Charac-ter

01100000 96 60 01110000 112 70 P 01100001 97 61 a 01110001 113 71 q

01100010 98 62 b 01110010 114 72 r

01100011 99 63 c 01110011 115 73 s

01100100 100 64 d 01110100 116 74 t

01100101 101 65 e 01110101 117 75 u

01100110 102 66 f 01110110 118 76 v

01100111 103 67 9 01110111 119 77 w

01101000 104 68 h 01111000 120 78 x 01101001 105 69 i 01111001 121 79 Y

01101010 106 6A 01111010 122 7A z

01101011 107 6B k 01111011 123 7B

01101100 108 6C 1 01111100 124 7C

01101101 109 6D m 01111101 125 7D

01101110 110 6E n 01111110 126 7E

01101111 111 6F 0 01111111 127 7F DEL

1438 Handbook of the Internet

Ap3.2 Extended ASCII code The standard ASCII character has 7 bits and the basic set ranges from 0 to 127. This code is rather limited as it does not contain symbols such as Greek letters, lines, and so on. For this purpose the extended ASCII code has been defined. This fits into character numbers 128 to

255. The following four tables define a typical extended ASCII character set.

Binary Decimal Hex Character Binary Decimal Hex Charac-ter

10000000 128 80 ~ 10010000 144 90 E 10000001 129 81 U 10010001 145 91 iE

10000010 l30 82 e 10010010 146 92 10

10000011 l31 83 §. 10010011 147 93 6 10000100 l32 84 a 10010100 148 94 6

10000101 l33 85 a 10010101 149 95 0

10000110 134 86 it 10010110 150 96 11 10000111 l35 87 <; 10010111 151 97 U

10001000 l36 88 e 10011000 152 98 Y 10001001 l37 89 e 10011001 153 99 6 10001010 l38 8A e 10011010 154 9A U 10001011 139 8B i 10011011 155 9B ¢

10001100 140 8C i 10011100 156 9C £

10001101 141 8D i 10011101 157 9D ¥

10001110 142 8E A 10011110 158 9E ]?,

10001111 143 8F A 10011111 159 9F f

Binary Decimal Hex Character Binary Decimal Hex Charac-ter

10100000 160 AO a 10110000 176 BO

10100001 161 Al i 10110001 177 B1

10100010 162 A2 6 10110010 178 B2 I 10100011 163 A3 U 10110011 179 B3 I 10100100 164 A4 fi 10110100 180 B4 1 10100101 165 AS N 10110101 181 B5 ~ 10100110 166 A6 10110110 182 B6 11 10100111 167 A7 10110111 183 B7 11 10101000 168 A8 10111000 184 B8 1 10101001 169 A9 10111001 185 B9 ~I 10101010 170 AA 10111010 186 BA II 10101011 17l AB }> 10111011 187 BB 11 10101100 172 AC ';\ 10111100 188 BC JI

10101101 173 AD 10111101 189 BD .u 10101110 174 AE « 10111110 190 BE d

10101111 175 AF » 10111111 191 BF

ASCII reference 1439

Binary Decimal Hex Character Binary Decimal Hex Charac-ter

11000000 192 CO 11010000 208 DO JL

11000001 193 C1 1- 11010001 209 D1 T 11000010 194 C2 T 11010010 210 D2 11" 11000011 195 C3 ~ 11010011 211 D3 IL

11000100 196 C4 11010100 212 D4 b

11000101 197 C5 + 11010101 213 D5

11000110 198 C6 F 11010110 214 D6 II" 11000111 199 C7 If 11010111 215 D7 * 11001000 200 C8 lk 11011000 216 D8 " 11001001 201 C9 If 11011001 217 D9

11001010 202 CA J!, 11011010 218 DA r 11001011 203 CB 'if 11011011 219 DB I 11001100 204 cc If 11011100 220 DC • 11001101 205 CD 11011101 221 DD I 11001110 206 CE JL 11011110 222 DE I lr 11001111 207 CF ,!, 11011111 223 DF I

Binary Decimal Hex Character Binary Decimal Hex Charac-ter

11100000 224 EO ex 11110000 240 FO -11100001 225 E1 IS 11110001 241 F1 ± 11100010 226 E2 r 11110010 242 F2 ~

11100011 227 E3 IT 11110011 243 F3 S

ll100100 228 E4 l:: 11110100 244 F4 ( ll100101 229 E5 (] 11110101 245 F5 J ll100110 230 E6 )l lll10ll0 246 F6

11100111 231 E7 11110111 247 F7

ll101000 232 E8 (j) 11111000 248 F8

11101001 233 E9 e lll11001 249 F9

ll101010 234 EA Q 11111010 250 FA

lll010ll 235 EB /) lll11011 251 FB ;j

11101100 236 EC <p lll11100 252 Fe

11101101 237 ED <I>

11111101 253 FD

11101110 238 EE E 11111110 254 FE • 11101111 239 EF A 11111111 255 FF

1440 Handbook of the Internet

Ap4 Glossary

100Base-FX

100Base-TX (802.3u)

100VG-AnyLAN

lOBASE-T

802.10

IEEE-defined standard for 100 Mbps Ethernet using multimode fiber-optic cable.

IEEE-defined standard for 100 Mbps Ethernet using two pairs of Cat-5 twisted-pair cable.

HP-derived network architecture based on the IEEE 802.12 standard that uses 100 Mbps transmission rates. It uses a cen-trally controlled access method referred to as the Demand Priority Protocol (DPP), where the end node requests permis­sion to transmit and the hub determines which node may do so, depending on the priority of the traffic.

IEEE-defined standard for 10 Mbps Ethernet using twisted-pair cables.

IEEE-defined standard for LAN security. It is sometimes used by network switches as a VLAN protocol and uses a technique where frames on any IAN carry a virtual IAN identification. For large networks this can be modified to provided security over the Internet.

802.12 Demand Priority Protocol

802.1d

802.2

802.3

802.3u

802.4

802.5

AAL

IEEE-defined standard of transmitting 100 Mbps over voice grade (telephone) twisted-pair cabling. See 100VG-AnyLAN.

IEEE-defined bridging standard for Spanning Tree protocol that is used to determine factors on how bridges (or switches) for­ward packets and avoid networking loops. Networks which use redundant loops (for alternative routes) need to implement the IEEE 802.1d standard to stop packets from looping forever.

A set of IEEE-defined specifications for Logical Link Control (LLC) layer. It provides some network functions and interfaces the IEEE 802.5, or IEEE 802.3, standards to the transport layer.

IEEE-defined standard for CSMA/CD networks. IEEE 802.3 is the most popular implementation of Ethernet.

IEEE-defined standard for 100 Mbps Fast Ethernet. It also covers a technique called auto sensing which allows 100 Mbps devices to connecting to 10 Mbps devices.

IEEE-defined token bus specifications.

IEEE-defined standard for token ring networks.

ATM adaptation layer. A service-dependent sublayer of the data link layer, which accepts data from different applications and presents it to the ATM layer as a 48-byte ATM payload segment. MLs have two sublayers: CS and SAR. There are four types of ML, recommended by the ITU-T, these are: MLl, AAL2, ML3/4, andML5.

AALl

AAL2

AAL3/4

AAL5

AARP

AARP

ABM

ABR

Access list

Access method

Access server

Acknowledgment

ACR

ACSE

Active hub

Active monitor

ATM adaptation layer 1. Connection-oriented, delay-sensitive services requiring constant bit rates, such as uncompressed video and other isochronous traffic.

ATM adaptation layer 2. Connection-oriented services that sup­port a variable bit rate, such as some isochronous video and voice traffic.

ATM adaptation layer 3/4. Connectionless and connection­oriented links, but is primarily used for the transmission of SMDS packets over ATM networks.

ATM adaptation layer 5. Connection-oriented, VBR services, and is used predominantly for the transfer of classical IP over ATM and LANE traffic.

AppleTalk Address Resolution Protocol. An AppleTalk protocol which maps the data-link address to a network address.

AppleTalk probe packets. Data packets which determine if a node ID is being used by another node in a AppleTalk network. If the node determines that the node ID is not being used, the node will use it. If not, it will send out more AARP packets.

Asynchronous Balanced Mode. An HDLC communication mode supporting peer-oriented, point-to-point communications be­tween two nodes, where either station can initiate transmission.

Available bit rate. A QoS class defined by the ATM Forum for ATM networks. ABR is used for connections that do not require a timing relationships between source and destination. It also provides no guarantees in terms of cell loss or delay, providing only best -effort service.

A list which is kept by Cisco routers which define the control access for the router.

The method that network devices use to access the network medium.

A communications device that allows the connection of asyn­chronous devices, such as serial port terminals, to a LAN. It thus converts an asynchronous protocol to a synchronous one.

Notification sent from one network device to another to acknowledge an event.

Allowed cell rate. This is used in ATM and is used for traffic management.

Association control service element. This has been defined by the OSI and is used to establish, maintain, or terminate a con­nection between two applications.

Multiported device that amplifies LAN transmission signals.

A device which is responsible for managing a Token Ring. A node becomes the active monitor if it has the highest MAC ad­dress on the ring, and is responsible for such management tasks, such as ensuring that tokens are not lost, or that frames

1442 Handbook of the Internet

Adapter

do not circulate indefinitely.

Device which usually connects a node onto a network, normally called a network interface adapter (NIC).

Adaptive cut-through switching

A forwarding technique on a switch which determines when the error count on frames received has exceeded the pre-configured limits. When this count is exceeded, it modifies its own operat­ing state so that it no longer performs cut-through switching and goes into a store-and-forward mode. The cut-through method is extremely fast but suffers from the inability to check the CRC field. Thus if incorrect frames are transmitted they could have severe effects on the network segment. This is over­come with an adaptive cut-through switch by checking the CRC as the frame moves through the switch. When errors become too great the switch implements a store-and-forward method.

Adaptive delta modulation PCM

Similar to delta modulation PCM, but uses a number of bits to code the slope of the signal.

Adaptive Huffman coding Uses a variable Huffman coding technique which responds to local changes in probabilities.

ADCCP Advanced Data Communications Control Protocol. An ANSI­defined standard for a bit -oriented data link control protocol.

Address aging

Addressed call mode

Address resolution

The time that a dynamic address stays in the address routing table of a bridge or switch.

A mode that uses control signals and commands to establish and terminate calls in V.25bis.

Resolves the data link layer address from the network layer ad­dress.

Address tables These are used by routers, switches and hubs to store either physical (such as MAC addresses) or higher-level addresses (such as IP addresses). The tables map node addresses to net­work addresses or physical domains. These address tables are dynamic and change due to nodes moving around the network.

Address A unique label for the location of data or the identity of a com­munications device. This address can either be numeric or alphanumeric.

Administrative distance Rating of the trustworthiness of a routing information source (typically between 0 and 255). The higher the value, the lower the trustworthiness rating.

Address mask A combination of bits which define the address part and the host part.

Address resolution A method which resolves differences in addressing schemes, typically between data link and network addresses.

Administrative distance Used on Cisco routers to define the trustworthiness of a routing

Glossary 1443

Advertising

AEP

Agent

Aging

A-law

Alignment error

AM

ANSI

ASCII

AM

ASK

AppleTalk

Application layer

ARP

ARPA

ARPANET

ASN.l

information source. It varies between 0 and 255, where 255 gives the lowest trustworthiness rating.

Method used by routers where routing or service updates are sent at specified intervals so that other routers on the network can maintain lists of usable routes.

AppleTalk Echo Protocol. This is used to test the connectivity between two AppleTalk nodes.

A program which allows users to configure or fault-find nodes on a network, and also a program that processes queries and re­turns replies on behalf of an application.

The removal of an address from the address table of a router or switch that is no longer referenced to forward a packet.

The ITU -T companding standard used in the conversion be­tween analog and digital signals in PCM systems. Used mainly in European telephone networks.

In Ethernet, an error that occurs when the total number of bits of a received frame is not divisible by eight.

Amplitude modulation. Modulation technique which repre­sents the data as the amplitude of a carrier signal.

American National Standards Institute. ANSI is a non-profit making organization which is made up of expert committees that publish standards for national industries.

American Standard Code for Information Interchange. An ANSI-defined character alphabet which has since been adopted as a standard international alphabet for the interchange of characters.

Amplitude modulation. Information is contained in the ampli­tude of a carrier.

Amplitude-Shift Keying. Uses two, or more, amplitudes to rep­resent binary digits. Typically used to transmit binary over speech-limited channels.

Series of communications protocols designed by Apple Com­puter.

The highest layer of the OSI model.

Address Resolution Protocol. Internet protocol used to map an IP address to a MAC address.

Advanced Research Projects Agency. Research and develop­ment organization that is part of DoD. ARPA evolved into DARPA, but have since changed back to ARPA.

Advanced Research Projects Agency Network, which was devel­oped in the 1970s (funded by ARPA, then DARPA).

Abstract Syntax Notation One. OSI language for describing data types independent of particular computer structures and representation techniques.

1444 Handbook of the Internet

Asynchronous transmission

Asynchronous

ATM

ATMForum

ATMlayer

Attenuation

AUI

Transmission where individual characters are sent one-by-one. Normally each character is delimited by a start and a stop bit. With asynchronous communications the transmitter and re­ceiver only have to be roughly synchronized.

Communication which does not depend on a clock.

Asynchronous Transfer Mode. Networking technology which involves sending 53-byte fast packets (ATM cell), as specified by the ANSI TISl subcommittee. The first 5 bytes are the header and the remaining bytes are the information field which can hold 48 bytes of data. Optionally the data can contain a 4-byte ATM adaptation layer and 44 bytes of actual data. The ATM ad­aptation layer field allows for fragmentation and reassembly of cells into larger packets at the source and destination respec­tively. The control field also contains bits which specify whether this is a flow control cell or an ordinary data cell, a bit to indi­cate whether this packet can be deleted in a congested network, and so on.

Promotes standards-based implementation agreements for ATM technology.

Service-independent sublayer of the data link layer in an ATM network. The ATM layer receives the 48-byte payload segments from the AAL and attaches a 5-byte header to each, producing standard 53-byte ATM cells.

Loss of communication signal energy.

Attachment unit interface. In Ethernet, it is the interface be­tween an MAU and a NIC (network interface card).

Automatic broadcast control

Autonegotiation

Autonomous system

Autosensing

Back pressure

Technique which mlmmlzes broadcast and multicast traffic flooding through a switch. A switch acts as a proxy server and screens previously resolved ARP. This eliminates broadcasts as­sociated with them.

Technique used by an IEEE 802.3u node which determines whether a device that it is receiving or transmitting data in one of a number of Ethernet modes (lOOBase-TX, 100Base-TX Full Duplex, lOBase-T, lOBase-T Full Duplex or 100Base-T4). When the mode is learned, the device then adjusts to the required transmission speed.

A collection of networks which have a common administration and share a common routing strategy. Each autonomous sys­tem is assigned a unique l6-bit number by the lANA.

U sed by a 1 OOBase-TX device to determine if the incoming data is transmitted at lO Mbps or 1 00 Mbps.

Technique which slows the incoming data rate into the buffer of a 802.3 port preventing it from receiving too much data.

Glossary 1445

Backbone cabling

Backbone

Backoff

BACP

Bandwidth

Baseband

BRI

Baud rate

BER

BGP

Big-endian

Bit stuffing

BNC

BOOTP

Border gateway

Bridge

Switches which implement back pressure will transmit a jam signal to stop data input.

Cabling interconnects wiring closets, wiring closets, and between buildings.

The primary path for networked traffic.

The retransmission delay enforced when a collision occurs.

Bandwidth allocation control protocol. Protocol which moni­tors network traffic and allows or disallows access to users, depending on their needs. It is awaiting approval by the IETF.

In an analogue system it is defined as the range of frequencies contained in a signal. As an approximation it is the difference between the highest and lowest frequency in the signal. In a digital transmission system it is normally quoted as bits per second.

Data transmission using unmodulated signals.

Basic rate interface. Connection between ISDN and the user. It has three separate channels, one D-channel (which carries con­trol information) and two B channels (which carry data).

The number of signaling elements sent per second with RS-232, or modem, communications. In RS-232 the baud rate is equal to the bit-rate. With modems, two or more bits can be encoded as a single signaling element, such as 2 bits being represented by four different phase shifts (or one signaling element). The sig­naling element could change its amplitude, frequency or phase­shift to increase the bit-rate. Thus the bit-rate is a better meas­ure of information transfer.

Bit error rate. The ratio of received bits that contain errors.

Border Gateway Protocol. Interdomain routing protocol that replaces EGP.

Method of storing or transmitting data in which the most sig­nificant bit or byte is presented first.

The insertion of extra bits to prevent the appearance of a defined sequence. In HDLC the bit sequence 01111110 delimits the start and end of a frame. Bit stuffing stops this bit sequence from occurring anywhere in the frame by the receiver inserting a 0 whenever there are five consecutive l's transmitted. At the receiver if five consecutive l's are followed by a 0 then the 0 is deleted.

A commonly used connector for coaxial cable.

A standard TCP/IP protocol which allows nodes to be dynami­cally allocated an IP address from an Ethernet MAC address.

Router that communicates with routers in other autonomous systems.

A device which physically links two or more networks using the

1446 Handbook of the Internet

Broadband

Broadcast address

Broadcast domain

Broadcast storm

Broadcast

BSD

Buffer

Bus

Byte

Capacity

Cat-l cable

Cat-2cable

Cat-3 cable

Cat-4 cable

Cat-5 cable

CBR

CCITT

CDP

Cell relay

same communications protocols, such as Ethernet/Ethernet or token ring/token ring. It allows for the filtering of data between network segments.

Data transmission using multiplexed data using an analogue signal or high-frequency electromagnetic waves.

Special address reserved for sending a message to all stations. Generally, a broadcast address is a MAC destination address of all ones.

Network where broadcasts can be reported to all nodes on the network bounded by routers. Broadcast packets cannot traverse a router.

Flood of broadcast packets generated by a broadcast transmis­sion where high numbers of receivers are targeted for a long period of time.

Data packet that will be sent to all nodes on a network. Broad­casts are identified by a broadcast address.

Berkeley Standard Distribution. Term used to describe any of a variety of UNIX-type operating systems.

A temporary-storage space in memory.

A network topology where all nodes share a common transmis­sion medium.

A group of eight bits.

The maximum data rate in Mbps.

Used for telephone communications and is not suitable for transmitting data.

Used for transmitting data at speeds up to 4 Mbps.

An EIA/TIA-568 wiring standard for unshielded or shielded twisted pair cables. Up to 10 Mbps.

Used in Token Ring networks and can transmit data at speeds up to 16 Mbps.

An EIA/TIA-568 wiring standard for unshielded or shielded twisted-pair cables for the transmission of over 100 Mbps.

Constant bit rate. QOS class defined by the ATM Forum for ATM networks and is used for connections that depend on precise clocking to ensure undistorted delivery.

Consultative Committee for International Telegraph and Tele­phone. International organization responsible for the development of communications standards. Now named ITU­T. Cisco Discovery Protocol. Used in Cisco routers, bridges and switches to pass information on the connected networks.

Networking technology based on the use of small, fixed-size packets, or cells.

Glossary 1447

Cell

CEPT

CHAP

Cheapernet

Checksum

Circuit switching

Cisco lOS software

Client

CLP

Coaxial cable

Collapsed backbone

Collision domain

Collision

Connectionless

Connection -oriented

Contention

Convergence

CDm

The basic unit for ATM switching and multiplexing. Cells con­tain identifiers that specify the data stream to which they belong. Each cell consists of a 5-byte header and 48 bytes of payload.

Conference Europeenne des Postes et des Telecommunications. Association

Challenge-handshake authentication protocol. Identification method used by PPP to determine the originator of a connec­tion.

IEEE 802.3 lOBase2 standard.

An error-detection scheme in which bits are grouped to form integer values which are then summated. Normally, the nega­tive of this value is then added as a checksum. At the receiver, all the grouped values and the checksum are summated and, in the absence of errors, the result should be zero.

Switching system in which a dedicated physical circuit path must exist between sender and receiver for the call duration

Cisco Internetwork Operating System software. Provides an operating system for a Cisco router.

Node or program that connects to a server node or program.

Cell loss priority. Field in the ATM cell header that determines the probability of a cell being dropped if the network becomes congested.

A transmission medium consisting of one or more central wire conductors surrounded by an insulating layer and encased in either a wire mesh or extruded metal sheathing. It supports RF frequencies from 50 to about 500 MHz. It comes in either a 10-mm diameter (thick coax) or a 5-mm diameter (thin coax).

Non-distributed backbone in which all network segments are interconnected by way of an internetworking device.

The network area within which frames that have collided are propagated. Repeaters and hubs propagate collisions, but switches, bridges and routers do not.

Occurs when one or more devices try to transmit over an Ethernet network simultaneously.

Describes data transfer without the existence of a virtual circuit.

Describes data transfer that requires the establishment of a vir­tual circuit. See also connectionless.

Access method in which network devices compete to get access the physical medium.

The speed and ability of a group of internetworking devices run­ning a specific routing protocol to agree on the topology of an internetwork after a change in that topology.

Copper distributed data interface. FDDI over copper.

1448 Handbook of the Internet

:::ost

:::ount to infinity

:::RC

:::ross-talk

:::SMA/CD

:::utsheet

:::ut-through switching

DARPA

Data link layer

Data stream

Datagram

DCE

Decorative raceway

Delta modulation PCM

An arbitrary value used by routers to compare different routes. Typically it is measured by hop counts, typical time delays or bandwidth.

Occurs in routing algorithms that are slow to converge, where routers continuously increment the hop count to particular networks. It is typically overcome by setting an arbitrary hop­count limit.

Cyclic Redundancy Check. An error-detection scheme.

Interference noise caused by conductors radiating electromag­netic radiation to couple into other conductors.

Carrier sense multiple access collision detect. Media-access method in which nodes contend to get access to the common bus. If the bus is free of traffic (Carrier Sense) any of the nodes can transmit (Multiple Access). If two nodes gain access at the same time then a collision occurs (Collision Detection). A colli­sion then occurs, and the nodes causing the collision then wait for a random period of time before they retransmit. CSMA/CD access is used by Ethernet and IEEE 802.3.

Rough diagram indicating where cable runs are located and the numbers of rooms they lead to.

Technique where a switching device directs a packet to the des­tination port(s) as soon as it receives the destination and source address scanned from the packet header.

Defense Advanced Research Projects Agency. US government agency that funded research for and experimentation with the Internet.

Second layer of the OSI model which is responsible for link, er­ror and flow control. It normally covers the framing of data packets, error control and physical addressing. Typical data link layers includes Ethernet and FDDI.

All data transmitted through a communications line in a single read or write operation.

Logical grouping of information sent as a network layer unit over a transmission medium without prior establishment of a virtual circuit. IP datagrams are the primary information units in the Internet.

Data communications equipment. These are devices and con­nections of a communications network that comprise the network end of the user-to-network interface, such as modems and cables.

Wall-mounted channel with removable cover used to support horizontal cabling.

Uses a single-bit code to represent the analogue signal. A 1 is transmission when the current sample increases its level, else a o is transmitted. Delta modulation PCM requires a higher sam-

Glossary 1449

pIing rate that the Nyquist rate, but the actual bit rate is nor­mally lower.

Destination MAC address A 6-byte data unique of the destination MAC address. It is nor­mally quoted as a 12-digit hexadecimal number (such as A5:B2: 10:64:01 :44).

Destination network address

Differential encoding

A unique Internet Protocol (lP) or Internet Packet Exchange (IPX) address of the destination node.

Source coding method which is used to code the difference be­tween two samples. Typically used in real-time signals where there is limited change between one sample and the next, such as in audio and speech.

Distance vector routing algorithm

DNS

Dot address

DQDB

DTE

Dual homing

Routing algorithms which use the number of hops in a route to find a shortest-path spanning tree. With distance vector routing algorithms, each router to send its entire routing table in each update, but only to its neighbors. They be prone to routing loops, but are relatively simple as compared with link state rout­ing algorithms.

Domain Naming System. Used on the Internet to translated domain names into IP addresses.

Notation for IP addresses in the form <w.x.y.z> where each number represents, in decimal, 1 byte of the 4-byte IP address.

Distributed Queue Dual Bus. Data link layer communication protocol, specified in the IEEE 802.6 standard, designed for use in MANs.

Data terminal equipment. Device at the user end of a user­network interface that is a data source, destination, or both.

Topology where devices connect to the network by two inde­pendent access points (points of attachment). One gives the primary connection, and the other is the standby connection that is activated in the event of a failure of the primary connec­tion.

Dynamic address resolution

DHCP

Dynamic routing

El

Use of an address resolution protocol to determine and store address information on demand.

Dynamic host control protocol. It manages a pool of IP ad­dresses for computers without a known IP address. This allows a finite number of IP addresses to be reused quickly and effi­ciently by many clients.

Routing that adjusts automatically to network topology or traffic changes.

Wide-area digital transmission scheme that is used in Europe to carry data at a rate of 2.048 Mbps.

1450 Handbook of the Internet

Early token release

EGP

EIA

EIA/TIA-232

EIA/TIA-449

EIA/TIA-568

EIA/TIA-606

Encapsulation

End system

Entity

Entropy coding

Equalization

Ethernet address

Ethernet

ETSI

Even parity

EBCDIC

Used in Token Ring networks that allows stations to release the token onto the ring immediately after transmitting, instead of waiting for the first frame to return.

Exterior Gateway Protocol. Internet protocol for exchanging routing information between autonomous systems (RFC904). Replaced by BGP.

Electronic Industries Association. Specifies electrical transmis­sion standards.

Physical layer interface standard that supports unbalanced cir-cuits at signal speeds of up to 64 kbps.

Physical layer interface for rates up to 2 Mbps.

Characteristics and applications for UTP cabling.

Standard for the telecommunications infrastructure of com­mercial buildings, such as terminations, media, pathways, spaces and grounding.

Wrapping of data in a particular protocol header.

An end-user device on a network.

An individual, manageable network device.

Coding scheme which does not take into account the character­istics of the data and treats all the bits in the same way. It produces lossless coding. Typical methods used are statistical encoding and suppressing repetitive sequences.

Used to compensate for communications channel distortions.

48-bit number that identifies a node on an Ethernet network. Ethernet addresses are assigned by the Xerox Corporation.

A local area network which uses coaxial, twisted-pair or fiber­optic cable as a communication medium. It transmits at a rate of 10Mbps and was developed by DEC, Intel and Xerox Corpo­ration. The IEEE 802.3 network standard is based upon Ethernet.

European Telecommunication Standards Institute. Created by the European PTTs and the European Community (EC) for tele­communications standards in Europe.

An error-detection scheme where defined bit-groupings have an even number of l's.

Extended Binary Coded Decimal Interchange Code. An 8-bit code alphabet developed by IBM allowing 256 different bit pat­terns for character definitions.

Exterior gateway protocol Any internetwork protocol that exchanges routing information between autonomous systems.

Fast Ethernet

Fat pipe

See IEEE 802.3u standard.

Term used to indicate a high level of bandwidth the defined port.

Glossary 1451

FDDI

File server

FTP

Firewall

Flow control

Fiber Distributed Data Interface. A standard network technol­ogy that uses a dual counter-rotating token-passing fiber ring. It operates at 100 Mbps and provides for reliable backbone con­nections.

Computer that allows the sharing of files over a network.

File transfer protocol. A protocol for transmitting files between host computers using the TCP lIP protocol.

Device which filters incoming and outgoing traffic.

Procedure to regulate the flow of data between two nodes.

Forward adaptive bit allocation

This technique is used in audio compression and makes bit al­location decisions adaptively, depending on signal content.

Fragment free cut-through switching

FCS

Frame

FSK

Full duplex

Gateway

GIF

Half-duplex (HDX)

Handshake

Handshaking

HCC

HDLC

Hello packet

A modified cut-through switching technique where a switch or switch module waits until it has received a large enough packet to determine if it is error free.

Frame check sequence. Standard error detection scheme.

Normally associated with a packet which has layer 2 informa­tion added to it. Packets are thus contained within frames. Frames and packets have variable lengths as opposed to cells which have fixed lengths.

Frequency-shift Keying. Uses two, or more, frequencies to rep­resent binary digits. Typically used to transmit binary data over speech-limited channels.

Simultaneous, two-way communications.

A device that connects networks using different communica­tions protocols, such as between Ethernet and FDDI. It provides protocol translation, in contrast to a bridge which connects two networks that are of the same protocol.

Standard image compression technique which is copyrighted by CompuServe Incorporated. It uses LZW compression and sup­ports a palette of 256 24-bit colors (16.7M colors). GIF support local and global color tables and animated images.

Two-way communications, one at a time.

Messages or signals exchanged between two or more network devices to ensure transmission synchronization.

A reliable method for two devices to pass data.

Horizontal cross-connect. Wiring closet where the horizontal cabling connects to a patch panel which is connected by back­bone cabling to the main distribution facility.

ISO standard for the data link layer.

Message transmitted from a root bridge to all other bridges in the network to constantly verify the Spanning Tree setup.

1452 Handbook of the Internet

Heterogeneous network Network consisting of dissimilar devices that run dissimilar pro­tocols.

Hierarchical routing Routing based on a hierarchical addressing system. IP has a hierarchical structure as they use network numbers, sub net numbers, and host numbers.

Holddown A router state where they will not advertise information on a specific route, nor accept advertisements about the route for a specific length of time (the hold-down period). This time is used to flush bad information about a route from all routers in the network, or when a fault occurs on a route.

Hop count

Hop

Host number

Host

Hub

Huffman coding

Hybrid network

HTML

lAB

lANA

ICMP

IETF

IGP

IGRP

ISDN

Used by the RIP routing protocol to measure the distance be-tween a source and a destination.

The number of gateways and routers in a transmission path.

Part of an IP address which identifies the node on a subnetwork.

A computer that communicates over a network. A host can both initiate communications and respond to communications that are addressed to it.

A hub is a concentration point for data and repeats data from one node to all other connected nodes. Hubs can be active (where they repeat signals sent through them) or passive (where they do not repeat, but merely split, signals sent through them).

Uses a variable length code for each of the elements within the data. It normally analyses the probability of the element in the data and codes the most probable with fewer bits than the least probable.

Internetwork made up of more than one type of network technology.

Hypertext markup language. Standard language that allows the integration of text and images over a distributed network.

Internet Architecture Board. A group that discusses important matters relating to the Internet.

Internet Assigned Numbers Authority. Organization which delegates authority for IP address-space allocation and domain­name assignment to the NIC and other organizations.

Internet Control Message Protocol. Used to report errors and provides other information relevant to IP packet processing.

Internet Engineering Task Force. Consists of a number of work­ing groups which are responsible for developing Internet standards.

Interior Gateway Protocol. Used to exchange routing informa­tion within an autonomous system.

Interior Gateway Routing Protocol. Developed by Cisco for large and heterogeneous networks.

Integrated systems digital network. Communication technology

Glossary 1453

ITU-TSS

Internet address

IETF

Internet

internet

Intranet

InverseARP

IP (Internet Protocol)

IP address

IP multicast

IPX

IPXaddress

ISO

that contains two data channels (2B) and a control channel (H). It supports two 64 kbps data channels and sets up a circuit­switched connection.

International Telegraph Union Telecommunications Standards Sector. Organization which has replaced the CCITT.

An address that conforms to the DARPA-defined Internet proto­col. A unique, four byte number identifies a host or gateway on the Internet. This consists of a network number followed by a host number. The host number can be further divided into a sub net number.

Internet Engineering Task Force. A committee that reviews and supports Internet protocol proposals.

Connection of nodes on a global network which use a DARPA­defined Internet address.

Two or more connected networks that may, or may not, use the same communication protocol.

A company specific network which has additional security against external users.

Inverse Address Resolution Protocol. This is a method of build­ing dynamic routes in a network, and allows an access server to discover the network address of a device associated with a vir­tual circuit.

Part of the TCP lIP which provides for node addressing.

An address which is used to identify a node on the Internet.

Addressing technique that allows IP traffic to be propagated from one source to a group of destinations.

Internet Packet Exchange. Novell NetWare communications protocol which is similar to the IP protocol. The packets include network addresses and can be routed from one network to an­other.

Station address on a Novell NetWare network. It consists of two fields: a network number field and a node number field. The node number is the station address of the device and the net­work number is assigned to the network when the network is started up. It is written in the form: NNNNNNNN:XXXXXX­XXXXXX, where N's represent the network number and X's rep­resent the station address. An example of an IPX address is: DCI05333:542ClO-FF1432.

International Standards Organization.

Isochronous transmission Asynchronous transmission over a synchronous data link. Isochronous signals require a constant bit rate for reliable trans­port.

ITU-T The Consultative Committee for International Telephone and Telegraph (now known at the ITU-TSS) is an advisory commit­tee established by the United Nations. It attempts to establish

1454 Handbook of the Internet

Jabber

Jitter

JPEG

Keep alive interval

Latency

Learning bridge

Leased line

Lempel-Ziv coding

LZWcoding

Line driver

Link layer

Link segment

standards for inter-country data transmission on a worldwide basis.

Occurs when the transmission of network signals exceeds the maximum allowable transmission time (20 ms to 150 ms). The medium becomes overrun with data packets. This is caused by a faulty node or wiring connection.

Movement of the edges of pulse over time, that may introduce error and loss of synchronization.

Image compression technique defined by the Joint Photo­graphic Expert Group (JPEG), a subcommittee of the ISO/lEe. It uses a DCT, quantization, run-length and Huffman coding.

Time period between each keep alive message.

Defines the amount of time between a device receiving data and it being forwarded on. Hubs have the lowest latency (less than lOJ.1s), switches the next lowest (between 40J.1s and 60J.1s), then bridges (200 J.1s to 300 J.1s) and routers have the highest latency (around 1000J.1s).

Bridge which learns the connected nodes to it. It uses this in­formation to forward or drop frames.

A permanent telephone line connection reserved exclusively by the leased customer. There is no need for any connection and disconnection procedures.

Coding method which takes into account repetition in phases, words or parts of words. It uses pointers to refer to previously defined sequences.

Lempel-Ziv Welsh coding. Coding method which takes into ac­count repetition in phases, words or parts of words. It builds up a dictionary of previously sent (or stored) sequences.

A device which converts an electrical signal to a form that is transmit-table over a transmission line. Typically, it provides the required power, current and timing characteristics.

Layer 2 of the OSI model.

A point-to-point link terminated on either side by a repeater. Nodes cannot be attached to a link segment.

Link state routing algorithm

Little-endian

LLC

Routing algorithm where each router broadcasts or multicasts information regarding the cost of reaching each of its neighbors to all nodes in the internetwork. These algorithms create a con­sistent view of the network but are much more complete that distance vector routing algorithms).

Storage method in which the least byte is stored first.

Logical Link Control. Higher of the two data link layer sublayers defined by the IEEE, which provides error control, flow control, framing, and MAC-sublayer addressing (IEEE 802.2).

Glossary 1455

Lossless compression

Lossy compression

LSA

MAC address

Masking effect

MDI

MAC

MIC

MAU

Microsegmentation

Modem

MTU

Multicast

Multimode fiber

NDIS

Network layer

NTl

NFS

Where information, once uncompressed, is identical to the original uncompressed data.

Where information, once uncompressed, cannot be fully recov­ered.

Link-state advertisement. Used by link-state protocols to adver­tise information about neighbors and path costs.

A 6-byte data unique data-link layer address. It is normally quoted as a 12-digit hexadecimal number (such as A5:B2: 10:64:01 :44).

Where noise is only heard by a person when there are no other sounds to mask it.

Medium Dependent Interface. The IEEE standard for the twisted-pair interface to lOBase-T (or 100Base-TX).

Media Access Control. Media-specific access-control for Token Ring and Ethernet.

Media Interface Controller. Media-specific access-control for Token Ring and Ethernet.

Medium Attachment Unit. Method of converting digital data into a form which can be transmitted over a band-limited channel. Methods use either ASK, FSK, PSK or a mixture of ASK, FSKand PSK.

Division of a network into smaller segments. This helps to in­crease aggregate bandwidth to network devices.

Modulator-Demodulator. A device which converts binary digits into a form which can be transmitted over a speech-limited transmission channel.

Maximum Transmission Unit. The largest packet that the IP protocol will send through the selected interface or segment.

Packets which are sent to all nodes on a sub net of a group within a network. This differs from a broadcast which forwards packet to all users on the network.

Fiber-optic cable that has the ability to carry more than one frequency (mode) of light at a time.

Network driver interface specification. Software specification for network adapter drivers. It supports multiple protocols and multiple adapters, and is used in many operating systems, such as Windows.

Third layer of the OSI model, which is responsible for ensuring that data passed to it from the transport layer is routed and de­livered through the network. It provides end-to-end addressing and routing. It provides support for a number of protocols, in­cluding IP, IPX, CLNP, X.25, or DDP.

Network termination. Network termination for ISDN.

Network File System. Standard defined by Sun Microsystems for

1456 Handbook of the Internet

NIS

NLM

Node

N-series connectors

Octet

Odd parity

ODLI

Optical repeater

Packet switching

Packet

PAP

Patch panel

PLL

PSK

Physical layer

Ping

POP

PPP

accessing remote file systems over a network.

Network Information Service. Standard defined by Sun Micro­systems for the administration of network-wide databases.

NetWare Loadable Module. Program that can be loaded into the NetWare NOS.

Any point in a network which provides communications ser­vices or where devices interconnect.

Connector used with thick coaxial cable.

Same as a byte, a group of eight bits (typically used in commu­nications terminology).

An error-detection scheme where a defined bit-grouping has an odd number of l's.

Open Data-Link Interface. Software specification for network adapter drivers used in NetWare and Apple networks. It sup­ports multiple protocols and multiple adapters.

A device that receives, restores, and re-times signals from one optical-fiber segment to another.

Network switching in which data is processed in units of whole packets rather than attempting to process data by dividing packets into fixed-length cells.

A sequence of binary digits that is transmitted as a unit in a computer network. A packet usually contains control informa­tion and data. They normally are contained with data link frames.

Password authentication protocol. Protocol which checks a user's password.

An assembly of pin locations and ports which are typically mounted on a rack or wall bracket in the wiring closet.

Phase-Locked Loop. Tunes into a small range offrequencies in a signal and follows any variations in them.

Phase-Shift Keying. Uses two, or more, phase-shifts to represent binary digits. Typically used to transmit binary data over speech-limited channels.

Lowest layer of the OSI model which is responsible for the elec­trical, mechanical, and handshaking procedures over the interface that connects a device to a transmission medium

Standard protocol used to determine if TCP lIP nodes are alive. Initially a node sends an ICMP (Internet Control Message Pro­toco\) echo request packet to the remote node with the specified IP address and waits for echo response packets to return.

Point of presence. Physical access point to a long distance car­rier interchange.

Point-to-point protocol. Standard protocol to transfer data over the Internet asynchronously or synchronously.

Glossary 1457

Port

POST

Protocol

Quantization

Quartet signaling

Repeater

HARP

RJ-45

RMON

Routing node

RS-232C

RS-422,423

RS-449

RS-485

RLE

SAP

SAP

Segment

Physical connection on a bridge or hub that connects to a net­work, node or other device.

Power-on self test. Hardware diagnostics that runs on a hard­ware device when that device is powered up.

Specification for coding of messages exchanged between two communications processes.

Involves converting an analogue level into a discrete quantized level. The number of bits used in the quantization process de­termines the number of quantization levels.

Signaling technique used in 100VG-AnyLAN networks that al­lows data transmission at 100Mbps over frame pairs of UTP cabling.

A device that receives, restores, and re-times signals from one segment of a network and passes them on to another. Both seg­ments must have the same type of transmission medium and share the same set of protocols. A repeater cannot translate pro­tocols.

Reverse address resolution protocol. The opposite of ARP which maps an IP address to a MAC address.

Connector used with US telephones and with twisted-pair ca­bles. It is also used in ISDN networks, hubs and switches.

An SNMP MIB that specifies the types of information listed in a number of special MIB groups that are commonly used for traf­fic management. Some of the popular groups used are Statistics, History, Alarms, Hosts, Hosts Top N, Matrix, Filters, Events, and Packet Capture.

A node that transmits packets between similar networks. A node that transmits packets between dissimilar networks is called a gateway.

EIA-defined standard for serial communications.

EIA-defined standard which uses higher transmission rates and cable lengths than RS-232.

EIA-defined standard for the interface between a DTE and DCE for 9- and 37-way D-type connectors.

EIA-defined standard which is similar to RS-422 but uses a bal­anced connection.

Run-length encoding. Coding technique which represents long runs of a certain bit sequence with a special character.

Service Access Point. Field defined by the IEEE 802.2 specifica­tion that is part of the address specification.

Service Advertisement Protocol. Used by the IPX protocol to provide a means of informing network clients, via routers and servers of available network resources and services.

A segment is any length of LAN cable terminated at both ends.

1458 Handbook of the Internet

SLIP

Simplex

SNMP

Source encoding

Statistical encoding

In a bus network, segments are electrically continuous pieces of the bus, connected by repeaters. It can also be bounded by bridges and routers.

Serial line internet protocol. A standard used for the point-to­point serial connections running TCP/IP.

One-way communication.

Simple Network Management Protocol. Standard protocol for managing network devices, such as hubs, bridges, and switches.

Coding method which takes into account the characteristics of the information. Typically used in motion video and still image compression.

Where the coding analyses the statistical pattern of the data. Commonly occurring data is coded with a few bits and uncom­mon data by a large number of bits.

Suppressing repetitive sequences

Compression technique where long sequences of the same data is compressed with a short code.

Switch A very fast, low-latency, multiport bridge that is used to seg­ment local area networks.

Synchronous

Tl

TCP

Tep/IP Internet

Telnet

TIFF

Time to live

Token

Topology

Transceiver

Transform encoding

Transport layer

Data which is synchronized by a clock.

Digital WAN carrier facility for 1.544 Mbps transmission.

Part of the TCP/IP protocol which provides an error-free con­nection between two cooperating programs.

An Internet is made up of networks of nodes that can commu­nicate with each other using TCP lIP protocols.

Standard program which allows remote users to log into a sta­tion using the TCP /IP protocol.

Graphics format that supports many different types of images in a number of modes. It is supported by most packages and, in one mode, provides for enhanced high-resolution images with 48-bit color.

A field in the IP header which defines the number of routers that a packet is allowed to traverse before being discarded.

A token transmits data around a token ring network.

The physical and logical geometry governing placement of nodes on a network.

A device that transmits and receives signals.

Source-encoding scheme where the data is transformed by a mathematical transform in order to reduce the transmitted (or stored) data. A typical technique is the discrete cosine transform (DCT) and the fast Fourier transform (FFT).

Fourth layer of the OSI model. It allows end-to-end control of transmitted data and the optimized use of network resources.

Glossary 1459

UART

V.24

V.2Sbis

V.321V.32bis

V.34

V.3S

V.42

VLC-LZW code

Vertical cabling

Virtual circuit

Workgroup

X.I21

X.21

X.2Ibis

X.2S

X.28

X.29

X.3

X.400

X.SOO

X3T9.S

X-ON/X-OFF

Universal asynchronous receiver transmitter. Device which converts parallel data into a serial form, which can be transmit­ted over a serial line, and vice-versa.

ITU -T -defined specification, similar to RS-232C.

ITU -T specification describing procedures for call set-up and disconnection over the DTE-DCE interface in a PSDN.

ITU -T standard serial communication for bi -directional data transmissions at speeds of 4.8 or 9.6 Kbps, or 14.4 Kbps for V.32bis.

Improved v.32 specification with higher transmission rates (28.8 Kbps) and enhanced data compression.

ITU -T standard describing a synchronous, physical layer proto­col used for communications between a network access device and a packet network.

ITU -T standard protocol for error correction.

Variable-length-code LZW code. Uses a variation ofLZW coding where variable-length codes are used to replace patterns de­tected in the original data.

Backbone cabling.

Logical circuit which connects two networked devices together.

Collection of nodes on a LAN which exchange data with each other.

ITU-T standard for an addressing scheme used in X.2S net­works.

ITU -T -defined specification for the interconnection of DTEs and DCEs for synchronous communications.

ITU-T standard for the physical layer protocol for communica­tion between DCE and DTE in an X.25 network.

ITU -T -defined for packet -switched network connections.

ITU-T recommendation for terminal-to-PAD interface in X.25 networks.

ITU-T recommendation for control information in the terminal­to-PAD interface used in X.25 networks.

ITU-T recommendation for PAD parameters used in X.25 net­works.

ITU -T recommendation for electronic mail transfer.

ITU -T recommendation for distributed maintenance of files and directories.

ANSI Task Group definition of FDDI.

The Transmitter Onl Transmitter Off characters are used to control the flow of information between two nodes.

1460 Handbook ofthe Internet

ApS AA AAL AAN ABM AbMAN ABNF AC ACAP ACK ACL ADC ADPCM ADPCM AEP AES API AGENTX AGP AM AMI ANSI APCM API ARM ARP ARPA AS ASCII ASK AT ATM AUI BCC BCD BGP BIOS B-ISDN BMP BNC BOM BOOTP BPDU bps BVCP

Abbreviations

auto-answer ATM adaptation layer autonomously attached network asynchronous balanced mode Aberdeen MAN augmented BNF access control application configuration access protocol acknowledge access control list analogue-to-digital converter adaptive delta pulse code modulation adaptive differential pulse code modulation AppleTalk Echo Protocol audio engineering society authority and format identifier agent extensibility protocol accelerated graphics port amplitude modulation alternative mark inversion American National Standards Institute adaptive pulse code modulation application program interface asynchronous response mode address resolution protocol Advanced Research Projects Agency Autonomous system American standard code for information exchange amplitude-shift keying attention asynchronous transfer mode attachment unit interface blind carbon copy binary coded decimal border gateway protocol basic input! output system broadband ISDN bitmapped British Naval Connector beginning of message bootstrap protocol bridge protocol data units bits per second Banyan Vines control protocol

CAD CAN CASE CATNIP CC CCITT CD CD CDE CDFS CD-R CD-ROM CF CGI CGM CHAP CHAP CHARGEN CIF CMC CMOS CN COM CON-MD5 CPCS CPI CPSR CPU CRC CRLF CRT CSDN CSMA CSMA/CA CSMA/CD CS-MUX CSPDN CTS DA DM DAC DAC DARPA DAS DASS DAT DAYTIME dB

computer-aided design concentrated area network common applications service elements common architecture for the Internet carbon copy International Telegraph and Telephone Consultative carrier detect compact disk common desktop environment CD file system CD-recordable compact disk - read-only memory control field common gateway interface computer graphics metafile challenge handshake authentication protocol Challenge Handshake Authentication Protocol character generator protocol common interface format common mail call complementary MaS common name continuation of message content-MD5 header field convergence protocol communications sublayer common part indicator computer professionals for social responsibility central processing unit cyclic redundancy check carriage return, line feed cathode ray tube circuit -switched data network carrier sense multiple access CSMA with collision avoidance CSMA with collision detection circuit -switched multiplexer circuit -switched public data network clear to send destination address digest access authentication digital-to-analogue converter dual attachment concentrator Defense Advanced Research Projects Agency dual attachment station distributed authentication security digital audio tape daytime protocol decibel

1462 Handbook of the Internet

DBF DC DCC DCD DCE DC-MIB DCI DD DDE DENI DES DHCP DIB DIB DISC DISCARD DLC DLL DM DMA DNS DNS-SEC DOS DPCM DPSK DQDB DR DRAM DSN DSP DSS DIE DIR EASE EaStMAN EBCDIC EBU ECHO ECP EEPROM EF EFF EFM EGP EIA EISA EMF ENQ

NetBEUI frame direct current digital compact cassette data carrier detect data circuit -terminating equipment dial control MIB discrete cosine transform double density dynamic data exchange Department of Education for Northern Ireland data encryption standard dynamic host configuration program device-independent bitmaps directory information base disconnect discard protocol data link control dynamic link library disconnect mode direct memory access domain name server domain name system security extensions disk operating system differential PCM differential phase-shift keying distributed queue dual bus dynamic range dynamic RAM delivery status notifications domain specific part digital signature standard data terminal equipment data terminal ready embedded advanced sampling environment Edinburgh/Stirling MAN extended binary coded decimal interchange code European Broadcast Union echo protocol extended communications port electrically erasable PROM emptyfiag electronic frontier foundation eight -to-fourteen modulation exterior gateway protocol Electrical Industries Association extended international standard interface enhanced metafile inquiry

Abbreviations 1463

EOM EOT EPP EPROM EPS ESP ETB ETHER-MIB ETX FAT FATMAN FAX FC FCS FDDI FDDI-MIB FDM FDX FEC FF FFIF FIFO FINGER FM FRMR FS FSK FTP FYI GFI GGP GIF GQOS GSSAP GUI HAL HD HDB3 HDLC HDTV HDX HEFCE HEFCW HF HMUX HPFS HTML HTTP

end of message end of transmission enhanced parallel port erasable PROM encapsulated postscript IP encapsulating security payload end of transmitted block ethernet MIB end oftext file allocation table Fife and Tayside MAN facsimile frame control frame check sequence fiber distributed data interface FDDI management information base frequency division multiplexing full duplex forward error correction full flag file format for internet fax first in, first out finger protocol frequency modulation frame reject frame status frequency-shift keying file transfer protocol for your information group format identifier gateway-gateway protocol graphics interface format guaranteed quality of service generic security service application graphical user interface hardware abstraction layer high density high-density bipolar code no. 3 high-level data link control high-definition television half duplex Higher Education Funding Councils of England Higher Education Funding Councils of Wales high frequency hybrid multiplexer high performance file system Hypertext Mark-up Language Hypertext Transfer Protocol

1464 Handbook of the Internet

Hz I/O 1A5 lAB lAP IARP

IBM ICMP ICP IDEA IDENT IDI IDP IDPR IEEE IEFF IFS IGMP IGMP IGP ILD IMAC IMAP lOS IP IP-ARC IP-ARPA IP-ATM IP-CMPRS IP-DC IP-E IP-EE IP-FDDI IP-FR IP-HC IP-RIPPI IP-IEEE IP-IPX IP-MTU IP-NETBIOS IPNG IPP IP-SLIP IP-SMDS IP-TR-MC IPV6-FDDI IPv6-Jumbo IPV6-PPP

Hertz input! output international alphabet no. 5 Internet Advisory Board internet access provider inverseARP International Business Machines internet control message protocol internet connectivity provider international data encryption algorithm identification Protocol initial domain identifier initial domain part inter-domain policy routing Institute of Electrical and Electronic Engineers Internet Engineering Task Force installable file system Internet group management protocol Internet group multicast protocol interior gateway protocol injector laser diode isochronous MAC Internet message access protocol input! output supervisor Internet protocol IP over ARCNET networks IP over ARPANET IPover ATM IP with compressed headers IP over DC Networks IP over ethernet networks IP over experimental ethernet networks IP over FDDI networks IP over frame relay IP over hyperchannel IP over RIP PI IP over IEEE 802 IP over IPX networks path MTU discovery IP over NETBIOS IP next generation internet presence provider IP over serial lines IP datagrams over SMDS IP Multicast over token-ring fANs IPv6 over FDDI IPv6 Jumbograms IPv6 over PPP

Abbreviations 1465

IP-WB IPX IP-X.25 IPX-IP IRQ ISA ISDN IS-IS ISO ISP ITOT ITU JANET JFIF JISC JPEG KDC KERBEROS LAN LAPB LAPD LCN LDAP-URL LD-CELP LED LGN LIP LLC LRC LSL LSP LSRR LZ LZW MAC MAIL-MIB MAN MAP MAU MD MDCT MDI MHS MIB-II MIC MIME MLID MODEM

IP over wideband network Internet packet exchange IP over ISDN IPX over IP interrupt request international standard interface integrated services digital network immediate system to intermediate system International Standards Organization internet service provider ISO transport service on top of TCP International Telecommunications Union joint academic network JPEG file interchange format Joint Information Systems Committee Joint Photographic Expert Group key distribution centre Kerberos network authentication service local area network link access procedure balanced link access procedure logical channel number LDAP URL Format low-delay code excited linear prediction light emitting diode logical group number large IPX packets logical link control longitudinal redundancy check link support level link state protocol loose source and record route Lempel-Ziv LZ-Welsh media access control mail monitoring MIB metropolitan area network messaging API multi-station access unit message digest modified discrete cosine transform media dependent interface message handling service management information base-II media interface connector mUlti-purpose internet mail extension multi-link interface driver modulation/ demodulator

1466 Handbook of the Internet

MOS MPEG MPI MSL MTP NAK NCP NCSA NDIS NDS NETBEUI NETFAX NHRP NIC NICNAME NIS NLSP NNTP NRZI NSAP NSCA NSM-MIB NSS NTE NTFS NTP NTSC ODI OH ONE-PASS OSI OSI-UDP OSPF OUI PA PAL

PAP PC PCM PCT PDN PGP PHY PING PISO PKP

PLL PLS

metal oxide semiconductor Motion Picture Experts Group multi-precision integer maximum segment lifetime multicast transport protocol negative acknowledge NetWare control protocols National Center for Supercomputer Applications network device interface standard Novell Directory Services NetBIOS extended user interface network file format for the exchange of images next hop resolution protocol network interface card whois protocol network information system netware link-state routing protocol network news transfer protocol non-return to zero with inversion network service access point National Center for Supercomputing Applications network services monitoring MIB named service server network terminal equipment NT file system network time protocol National Television Standards Committee open data-link interface off-hook one-time password system open systems interconnection OSITSon UDP open shortest path first originator's unique identifier point of attachment phase alternation line password authentication protocol personal computer pulse code modulation personal communications technology public data network pretty good privacy physical layer protocol packet Internet gopher parallel-in -serial-out public-key partners phase-locked loop physical signaling

Abbreviations 1467

PMA PMD POP3 POP-URL PPP PPP-AAL PPP-CCP PPP-CHAP PPP-EAP PPP-HDLC PPP-IPCP PPP-ISDN PPP-LINK PPP-MP PPP-NBFCP PPP-SNACP PPP-SONET PPP-X25 PPSDN PS PSDN PSE PSK PSTN QAM QCIF QIC QoS QT QUOTE RADIUS RAID RAM RD REJ RFC RGB RI RIF RIP RIP2-MD5 RIP2-MIB RIPNG-IPV6 RIP-TRIG RLE RMON RMON-MIB RNR

physical medium attachment physical medium dependent post office protocol, Version 3 POP URL Scheme point -to-point protocol PPPoverAAL PPP compression control protocol PPP challenge handshake authentication PPP extensible authentication protocol PPP in HDLC framing PPP control protocol PPP over ISDN PPP link quality monitoring PPP multilink protocol PPP NetBIOS frames control protocol PPP SNA control protocol PPP over SONET /SDH PPP inX.25 public packet -switched data network postscript packet -switched data network packet switched exchange phase-shift keying public-switched telephone network quadrature amplitude modulation quarter common interface format quarter inch cartridge quality of service quicktime quote of the day protocol remote authentication dial-in service redundant array of inexpensive disks random-access memory receive data reject request for comment red, green and blue ring in routing information field routing information protocol RIP-2 MD5 Authentication RIP Version 2 MIB Extension RIPng for IPv6 Trigger RIP run-length encoding remote monitoring remote network monitoring MIB receiver not ready

1468 Handbook of the Internet

RO ROM RPC RPSL RR RSA RSVP RTF RTMP RTP RTSP S/PDIF SA SABME SAC SAP SAPI SAR SARPDU SAS SASL SASL-ANON SB-ADCMP SCMS SCSI SCSP SD SD SDH SDIF SDLC SDNSDU SDP SECAM SEL SHEFC SIPO SIPP SLM-APP SLP SMDS SMI SMP SMT SMTP SNA SNA SND

ring out read-only memory remote procedure call routing policy specification language receiver ready Rivest, Shamir and Adleman resource reservation protocol rich text format routing table maintenance protocol real-time transport protocol real-time streaming protocol Sony/Philips digital interface format source address set asynchronous balanced mode extended single attachment concentrator service advertising protocol service access point identifier segment and reassemble segmentation and reassembly protocol data unit single attachment station simple authentication and security layer anonymous SASL mechanism sub-band ADPCM serial copy management system small computer systems interface server cache synchronization protocol sending data start delimiter synchronous digital hierarchy Sony digital interface synchronous data link control secure domain name system dynamic update session description protocol sequential couleur a memoire selector / extension local address Scottish Higher Education Funding Council serial-in parallel-out simple Internet protocol plus system-level managed objects for applications service location protocol switched multi-bit data stream structure of management information symmetrical multiprocessing station management simple mail transfer protocol serial number arithmetic systems network architecture (IBM) send

Abbreviations 1469

SNMP SNMP-AT SNMP-IPX SNMP-OSI SNR SONET SPKM SPX SQTV

SRAM SSL SSM SSRR STA STM STP SVGA TCB TCC TCP TDAC TDM TEl TELNET TFTP TIFF TIFF TIME TIP TMUX TOS TP-TCP TR TSR TTL TUBA UDP UI UNI UNI UPS URI URL USB USERS UTF-8 UTP UV

simple network management protocol SNMP over AppleTalk SNMP over IPX SNMP over OSI signal-to-noise ratio synchronous optical network simple public-key GSS-API mechanism sequenced packet exchange studio-quality television static RAM secure socket layer single sequence message strict source and record route spanning-tree architecture synchronous transfer mode shielded twisted-pair superVGA transmission control block transmission control code transmission control protocol time-division aliasing cancellation time-division multiplexing terminal equipment identifier telnet protocol trivial file transfer protocol tag image file format tagged input file format time server protocol transaction internet protocol transport multiplexing protocol type of service ISO transport service on top of the TCP transmit data terminate and stay resident time-to-live TCP and UDP with bigger addresses user datagram protocol unnumbered information universal network interface user network interface uninterruptable power supplies universal resource identifier uniform resource locator universal serial bus active users protocol UTF-8 transformation format oflSO 10646 unshielded twisted pair ultra violet

1470 Handbook of the Internet

VCI VCO VCR VDD VGA VIM VLC-LZW VLM VMM VRC VRRP WAIS WAN WIMPs WINS WINSOCK WORM WWW

XDR XOR ZIP

virtual circuit identifier voltage controller oscillator video cassette recorder virtual device driver variable graphics adapter vendor-independent messaging variable-length-code LZW virtualloadable modules virtual machine manager vertical redundancy check virtual router redundancy protocol wide area information servers wide area network Windows, icons, menus and pointers Windows Internet name service windows sockets write-once read many World Wide Web external data representation exclusive-OR Zone Information Protocol

Abbreviations 1471

Ap6 Quick reference

Ap6.1 Miscellaneous

NetBIOS name types

Microsoft networks identify computers by their NetBIOS name. Each is 16 characters long, and the 16th character represents the purpose of the name. An example list of a WINS data­base is:

Name Type Status FRED <00> UNIQUE Registered BERT <00> UNIQUE Registered STAFF <IC> GROUP Registered STAFF <IE> GROUP Registered

The values for the 16th byte are:

00 Workstation 03 Message service 06 RAS server service IB Domain master browser lC Domain group name lD Master browser's name IE Normal group name (workgroup) IF NetDDE service 20 Server service 21 RAS client BE Network Monitor Agent BF Network Monitor Utility

On Microsoft Windows, the names in the WINS database can be shown with the nbstat

command.

Windows NT TCP lIP setup

Microsoft Windows uses the files LMHOSTS, HOSTS and NETWORKS to map TCP lIP names and network addresses. These are stored in the <winNT roob\SYSTEM32\DRIVERS\ETC.

LMHOSTS maps IP addresses to a computer name. An example format is:

#IP-address 146.176.1.3 146.176.144.10

host-name billsyc fred_pc #DOM: STAFF

where comments have a preceding '#' symbol. To preserve compatibility with previous ver­sions of Microsoft LAN Manager, special commands have been included after the comment symbol. These include:

#PRE #DOM: domain #INCLUDE fname #BEGIN_ALTERNATE #END ALTERNATE

where #PRE specifies that the name is preloaded into the memory of the computer and no

further references to the LMHOSTS file will be made. #DOM : domain specifies the name of the domain that the node belongs to. #BEGIN_ALTERNATE and #END_ALTERNATE are used to group multiple #include's #include fname specifies other LMHOST files to include.

The HOSTS file format is IP address followed by the fully qualified name (FQDN) and then any aliases. Comments have a preceding '#' symbol. For example:

#IP Address FQDN Aliases 146.176.1.3 superjanet janet 146.176.144.10 hp 146.176.145.21 mimas 146.176.144.11 mwave 146.176.144.13 vax 146.176.146.23 oberon 146.176.145.23 oberon

Microsoft Windows TCP lIP commands (quick reference)

Command Description Examples arp Modifies Address Resolution Protocol tables. arp - s 146.176.151.10

finger

ftp

hostname

-s IP-address [MAC-address] ; manually modifY

-a [IP-address] ; display ARP entry - dIP-address ; delete entry

Queries users on a remote computer.

@hostname

puter

; name of remote com-

-1 ; extend list

Remote file transfer. After connection the

following commands can be used:

ascii binary bye cd dir get hash help led Is mget mput open prompt pwd quit remote help user

Displays the rCP/IP hostname ofthe local

node.

ipconf ig Displays the rCP/IP settings on the local

computer.

I all ; show all settings

1474 Handbook of the Internet

FF-AA-10-3F-Al-3F

finger -1 fred@miranda

finger @moon

ftp inte1. com

hostname

ipconfig lall

Ipr

nbs tat

netstat

Sends a query to a TCP /IP host or printer.

- S princserver

-p printer

Prints to a TCP lIP-based printer.

-s princserver -P printer

Displays mapping of NetBIOS names to IP

addresses.

- a NetBIOS-name ; display name table for

; computer

- AlP-address ; display name table for

; computer

-n ; display NetBIOS table

of

; local computer

Displays status of TCP /IP connections.

-p protocol

to col

-r

-s

-R

-S

by

-s

by

; display for given pro-

; show routing tables

; display statistics

; reload HMHOSTS

; display NetBIOS sessions

; NetBIOS names

; display NetBIOS sessions

; IP addresses

nslookup Queries DNS servers. After connection the

following commands can be used:

help finger [usernamel

port=port

querytype=type

; type can be A (address),

; CNAME (canonical name which is an alias

for

; another host), MX (mail exchanger which

; handles mail for a given host), NS (name

server

; for the domain), PTR (pointer record

Ipq -p Ip_laser

Ipq -s mirands -p dot matrix

Ipr -p Ip_laser file.ps

nbstat -A freds

See Section 5.9.5

See Section 5.9.3

Quick reference 1475

ping

rcp

rexec

route

rsh

telnet

tftp

tracert

which

; maps an IP address to a hostname), SOA

(start

; of authority record) or ANY.

Test TCP lIP connectivity.

- a ; resolve IP addresses to host-

names

- n count ; set number of echo packets

- 1 size ; specify packet size

- t ; continuously ping

- i ttl ; set time-to-live field

-w timeout; specify timeout in ms

Remote copy.

[hostname[ . usernamell

- a ; ASCII copy

- b ; binary copy

-h ; also hidden files

- r ; recursively copy

Execute remote command.

Manipulates TCP/IP routing table.

- f ; delete all routes

-p

add

change

delete

gateway

mask netmask print

; make a permanent route

; add a route

; modify an existing route

; delete a route

; specifies gateway

; define subnet mask

; print current table

Executes remote shell.

-1 username ; user name

command ; command to execute

Remote login.

Trivial FTP (uses UDP).

Trace route.

1476 Handbook of the Internet

rcp -r \*.txt

miranda.bill/home

rexec miranda -1 bill "Is -1"

route gateway 146.151.176.12

rsh -1 bill "Is -1"

telnet www.intel.com

-d ; do not resolve IP addresses

- h max_hops ; maximum number of hops

-w timeout ; specify timeout

Windows NT system administration commands (quick reference)

Com-

at

attrib

backup

cacls

chkdsk

cmd

Description

Runs commands at a specified time. Op­

tions include:

\\computer-name time / every: da te ; such as day of the week such

; as M/T/W/Th/F/S/Su or day ; ofthe month

Displays or changes file attributes. Attrib­

utes include:

+r, -r, (read) +a, -a, (archive) +8, -8, (system) +h, -h, (hidden) /8 (include sub-directories)

Backup program.

Command-line Access Control Lists

(ACLs).

/ g username: right; grant user the follow­

ing

; rights: r (read), c

(change),

; f (full control).

/p username ; replace rights, these are

as

; above, but n (none) is

added

/ r username ; delete all rights

/ t ; recursive change

Checks disk. Options include:

/ f ; automatically fix errors

Run command-line shell.

Examples

at 14:00 \\freds

"cmd ping miranda> log"

at 00:00 /every:M/W/F

"cmd lpr log.txt"

attrib +h test.txt

calcs list.txt Ig fred:cf

calcs *.* Ir bill It

chkdsk c: If

Quick reference 1477

convert

conv1og

Converts drive partition from FAT to

NTFS.

Converts files from Microsoft Information

Server, FTP server and Gopher servers, and

produces log files in NSCA or EMWAC

format.

-t [emwave I ncsaJ ; specify EMWAC or

; NCSA

- s [fl wig]; specify FTP (f), WWW (w) or

; Gopher (g)

- 0 outdir ; specify output directory

diskperf Toggles the disk performance counter.

ipxroute IPXrouting.

servers ; list NetWare servers

j etpack Compacts WINS databases.

netmon

ntbackup

rasadmin

rasautou

rasdia1

rasphone

rdisk

regedit

restore

start

Network monitoring tool.

Backup file system.

Remote Access Server (RAS) administra­

tion.

Remote Access Server (RAS) debugging.

Remote Access Server (RAS) dial-up.

/phone tel; telephone number

Edit RAS phonebook.

Create emergency repair disk.

Edit registry.

Restores files after a backup.

Starts applications from the command

line.

1478 Handbook of the Internet

convert d: /fs:ntfs

conv1og -sg -ncsa -0 c:\temp

*.log

ipxsroute servers

net stop wins

jetpack win.mdb tmp.mdb

net start wins

rasdia1 miranda /phone:1112222

winnt32

16-bit Window NT installation program.

/ r dir ; specify install directory

/ s dir ; installation source files

32-bit Window NT installation program.

Microsoft Windows control services commands (quick reference)

Command Description net accounts Controls account settings

/ domain dom ; specify default domain

net computer Adds or deletes computers from current

domain.

net config server

\ \computer-name / add; add computer

/del; delete computer

Configure server.

net conf ig Configure workstation. workstation

net continue Unpauses a command that was paused

with net pause.

net file

net group

net help

Closes an opened file. When used on its

own without arguments it gives the lD of

all opened files. The / close option is

used with the ID number to close a given file.

/close ; close file

Creates, edits or deletes groups.

/add ; add new group or users to the

named group

; specified group

/delete

; delete group or users to the named

group

; specified group

Help messages for net.

Example

net computer \\freds /add

net computer \\bills /del

net group "Staff" /add

net group "Staff" /add fred

Quick reference 1479

net helpmsg

net local­group

net name

net pause

net print

net send

net session

net share

net start

net statis­tics

net stop

net time

net use

net user

Detailed help for a given error message.

Create or deletes local groups or local

users.

Administers list of names for the Mes­

senger service.

Pauses a service.

Administers print queues.

\ \Computer-name

Idelete ;deletejob

Sends a text message to users or com­

puters.

Displays information of a current ses­

sion.

Administers networks sharing.

Starts a service.

Displays service statistics.

Stops a service.

Sets or queries time on a remote com­

puter.

Administers networked resources.

Administers user accounts.

password

word

; prompts for pass-

/active: [yin]

/add

; active status

; add user

/ delete ; delete user

/ expires: [date I NEVER] ; expire time

/ fullname: "name" ; full name

/homedir: homedirpath; home direc­

tory

/passwdchg: [y In]

change

; password

Itimes: [times I ALL] ; login times

1480 Handbook of the Internet

net pause lpdsvc

; pause print service

net send bill "Hello"

net start snmp

;startSNMP

net stop lpdsvc

; stop print server

net user bill c /add

net user bill c /active:y

net Displays networked resources.

\ \computer-name

/ domain [domain] ; list of domain or

; computers within

the

; specified domain

Ap6.2 Windows NT architecture Windows NT 12000 uses two modes:

net view \\freds

net view /domain

• Kernel mode. This is a privileged mode of operation and allows all code direct access to the hardware and memory, including memory allocated to user mode processes. Kernel mode processes also have a higher priority over user mode processes.

• User mode. This is a lower privileged mode than kernel mode. It has no direct access to the hardware or to memory. It interfaces to the operating system through well-defined API (Application Program Interface) calls.

Figure B.l shows an outline of the architecture of NT 12000. It can be seen that only the ker­nel mode has access to the hardware. This kernel includes executive services which include managers (for 110, interprocess communications, and so on) and device drivers (which con­trol the hardware). Its parts include:

• Microkernel. Controls basic operating system services, such as interrupt handling and scheduling.

• HAL (Hardware Abstraction Layer). This is a library of hardware-specific programs which give a standard interface between the hardware and software. This can either be Microsoft-written or manufacturer-provided. They have the advantage of allowing for transportability of programs across different hardware platforms.

• Win32 Window Manager. Supports Win32, MS-DOS and Windows 3.x applications.

User mode

Kernel mode

Figure Ap6.1 Windows architecture

Quick reference 1481

Ap7 Quick questions

Question: I would like some discipline in the design of my network. Thus, what are the main design steps?

It is important to properly design your network, as incorrect planning can cause problems in the future. The basic steps are:

• Analyze requirements. This involves understanding and specifying the requirements of the network, especially its major uses. If possible, future plans should be incorporated. One of the key features is the bandwidth requirements and the size of the network.

• Develop LAN structure. This step involves developing a LAN structure for these re­quirements. Typically in organizational networks this will be based on a star topology using Ethernet hubs!switches.

• Set up addressing and routing. The final step involves setting up IP addresses and sub nets to add structure.

The most important information that is required is the structure of the organization and how information flows between the units, as the designed network is likely to reflect this structure. The information will include:

• Understand the current network (if one exists) especially its strengths and weaknesses. • Gather information on geographical locations. • Determine current applications, and future plans for each site and for the organization. • Develop organizational contacts. These will be the important people who will be in­

volved in the development of the network. A mixture of technical and business skills always helps. Technical people tend to be driven by technology ('it should transfer files faster', 'it's easier to install', and so on), whereas business people tend to be driven by applications ('I just want access to a good spreadsheet', 'I want to be able to send e­mails to anyone in the company', and so on). It is also important to get someone in­volved who has experience of legal matters, and! or someone involved in Personnel matters.

• Determine the requirements for external network connections. This is an important decision as the security of the whole network may depend on the choices made on the external connections. Many large companies have a single point of connection to the external Internet as this allows organizations to properly manage internal and external connections to the Internet.

• Determine key objectives of the organization, especially related to mission-critical data and mission-critical operations. These should have top priority over other parts of the network. For example, a hospital would declare its ambulance service as a mission­critical unit, whereas the cuts and bruises unit (if there was one) would not be.

• Determine who is in control of information services. This may be distributed over the organization or over centralized in an MIS (Management Information Service) unit.

Question: What are the main requirements in designing a network?

• Business requirements. • Technical requirements. The main issues are media contention, reducing excessive

broadcasts (routing tables, ARP requests, and so on), backbone requirements, support

for real-time traffic and addressing issues. • Performance requirements. This is likely to involve a network load requirement analy­

sis for the typical loading on the network, and also for the worst -case traffic loading. This will determine the requirement for client/server architectures. An analysis should also be made for the impact of new workstations being added to the network. It should also involve an analysis of the requirements for application software, especially in its bandwidth requirements. Multimedia applications tend to have a large bandwidth re­quirement, along with centralized database applications and file servers.

• New application requirements. • Availability requirements. This defines the usefulness of the network, such as response

time, resource availability, and so on.

Question: How do I try to limit the number of collisions on an Ethernet segment?

Ethernet collisions occur when two nodes try and transmit onto a network segment at the same time. When the transmitting nodes detect this, they transmit a jamming signal to the rest of the network. All the other nodes on the network detect this, and wait for one of the two colliding nodes to get access onto the network segment. These collisions reduce the overall bandwidth of the network segment. An important concept is the collision domain, which defines the physical distance by which a collision is propagated. Repeaters and hubs propagate collisions, but switches, bridges and routers do not. Thus if you want to reduce the amount of collision insert either a switch, a router or a bridge in a network segment.

Question: I've analyzed the traffic on the network, and I've found that a large portion of the network traffic is related to broadcasts. How can I reduce their effect?

Broadcasts are sent out when a node wants help from other nodes. Typically, this happens when a node requires the MAC address for a known network address. The broadcast do­main defines the physical distance by which a broadcast will be propagated. Hub, bridges and switches all propagate broadcasts, but routers do not. Thus, if you want to reduce the number of broadcasts on a network segment, insert a router, and it will intelligently route data packets into and out of a network segment without too many broadcasts (as the router handles external data routing).

Question: Can I use the OSI model to design my network?

Yes. The OS1 model can split the network up into identifiable areas. These are:

• Physical layer. Network media (typically Cat-5 cable or fiber-optic cable), hubs and repeaters. Cables are normally run conforming to the EIA/TIA-568A standard. This layer should allow for future expansion.

• Data link layer. Switches and bridges. These devices will define the size of the collision and broadcast domains.

• Network layer. Routers, addressing. This layer filters data packets between network segments.

1484 Handbook of the Internet

Question: I have a local Ethernet hub which I connect to. How far can I run a cable from the hub to my computer?

If you use Cat-5 horizontal cable, you can get a maximum distance of 100m (if you were to use fiber cable you could get up to 400m). A hub can thus cover an area of 200 meters square (assuming that the hub is located in the center of the area).

Question: Did you mention something about a cat?

Yes. There are five categories ofUTP cables defined in EIA/TIA-568A. Cat-l is only suitable for telephone communications, Cat -2 supports up to 4 Mbps, Cat -3 supports up to 10 Mbps, Cat-4 supports up to 16Mbps and Cat-5 supports up to 100Mbps.

Question: Which is best, enterprise servers or workgroup servers?

Well it all depends on your organization. Enterprise servers are typically used when all the users within an organization require access to a single resource, such as with electronic mail. Workgroup servers provide local access to data and application programs, and isolate traffic around these servers. Workgroup servers should be physically located where they are most required. Typically, enterprise servers require to be more centralized in their location, and are more robust than workgroup servers, as the whole organization depends on them. Mirror servers (servers which have exact copies of the main enterprise server) can be used with an enterprise in order to reduce data traffic to the main server.

Question: Will I do damage if I connect using incorrectly wired cable, also how do I know that I've connected everything correctly? For example, I have a fiber cable which has two connec­tors and both are the same, how do I get the TX to the RX, and vice-versa?

It is unlikely that you will do any damage if you connect your cables round the wrong way, as all the inputs and outputs are electrically buffered. This allows them to sustain short­circuits, and incorrect wiring. The key of knowing if your connection is working is to look at the 'keep-alive' signal, which is typically a green LED on the NIC, hub, switch or router. If it is active, or flashing, you have made a proper connection.

With fiber-optic connections, the transceiver unit will activate two green LEDs when you have made a correct connection. If they are not active, swap the connections round and reconnect.

Question: You have said that Ethernet connections have a cross-over, but when I look at my patch cable, there isn't a cross-over, and pin 1 wires to pin 1, pin 2 to pin 2, and so on? Where's the crossover?

You are totally correct, and so am 1. The standard Ethernet connection must have a cross­over to connect the transmit to the receive, and vice-versa, but most hubs implement the

Quick questions 1485

cross-over inside the hub. Thus, all you need is a straight-through cable. I've listed the stan­dard cross-over connections in Section 12.18 (and Figure 11.24), but most ofthe time you do not need a cross-over when you're connecting to the front of a hub or a switch. It is only at the back of the hub that you may need a cross-over cable. If in doubt look at the 'keep-alive' LED. If it is off after you connect, it is likely that you've got the wrong cable (or the power isn't on, or you've not connected the other end, or the power isn't on the computer, and so on).

Question: If IP has been such a success, why do we need a new address scheme?

IP has been a victim of its own success. No one could have imagined how popular it would be. As it has a 32-bit address it can only support up to 4 billion addresses. Unfortunately, not all these addresses can be used, as network addresses are allocated to organizations for their maximum requirement. Also, if an organization uses subnets, then it is unlikely that every sub net has its maximum capacity of hosts.

There are possibly enough IP addresses for all the computers in the world, but the next big wave is going to come from granting IP addresses to virtually every electronic device, such as mobile phones, faxes, printers, traffic lights, telephones, and so on. The stage after this is to grant every object in the world an IP address. This could include cars, trains, peo­ple, and even our pets.

Question: Apart from increasing the number of IP addresses, why change the format, The Internet works, doesn't it, so why change it?

Ah. Your perception of the Internet is based on what's available now. Few technologies have expanded so fast, and without virtually any inputs from the governments of the world. Look at the worldwide telephone system infrastructure, if it was based on the system that we had thirty years ago there's no way we could communicate as efficiently as we do. The Internet must do the same, if it is to keep pace with the increase in users, devices and the amount of information that can be transferred. At present, you possibly imagine that the Internet is an infrastructure of computers that have big boxes and sit on your desk, and are congregated around servers, and ISPs. In ten or twenty years this perception will change, and computers will almost become invisible, as will the Internet. To cope with this change we need a differ­ent infrastructure. To do this we need to identify its weaknesses:

• The Internet and its addressing structure was never really designed to be a global infra-structure and is constraining the access to resources and information.

• Information and databases tend to be static, and fixed to location. • Difficult to group individual objects into larger objects. • Difficult to add resources to the Internet (requires an ISP and a valid IP address). • Search engines are not very good at gathering relevant information. On the WWW, typi­

cally users get pages of irrelevant information, which just happens to have the keyword which they are searching for.

• Resources are gathered around local servers. • Resources are tied to locations with an IP address. • IP addresses are not logically organized. The IP address given does not give any infor­

mation about the geographical location of the destination. This then requires complex routing protocols in which routers pass on information about how to get to remote networks.

1486 Handbook of the Internet

Question: Can devices have more than one IP address?

Yes. Many devices have more than one IP address. In fact each port that connects to a net­work must have an IP address. A good example of this is with routers, as they connect to two or more networks. Each of the ports of the router must have an IP address which relates to the network to which it connects to. For example if a router connects to three networks of:

146.176.151.0 146.176.152.0 146.176.140.0

then one IP address from each of the networks must be assigned to the router. Thus, it could be assigned the following addresses for its ports:

146.176.151.1 146.176.152.1 146.176.140.1

Question: Can these addresses be used again for one of the hosts on the connected networks?

No way. No two ports on the Internet can have the same address.

Question: Okay, sorry I asked. So what addresses cannot be used for the ports, or the hosts?

All zeros in the host field, as this identifies the network, and aliI's in the host field as this identifies the broadcast address. Thus in the example above, 146.176.151.0 and 146.176.151.255 could not be used (these addresses use a Class B address with a sub net in the third field).

Question: Sometimes when I connect to the Internet everything seems fine, but I cannot access WWW sites, and it seems to load pages from a WWW cache?

This is a common problem, and it is likely that you are connected to the Internet, but the Domain Name Server is not reachable. This means that you cannot resolve domain names into IP addresses. The way to check this is to use the IP address in the URL. For example:

http://www.mypage.com/index.html

could be accessed with:

http://199.199.140.10/index.html

If you can get access with this, you should investigate your DNS. Remember you can nor­mally specify several DNS's, thus find out the address of a remote DNS, just in case your local one goes off-line.

Quick questions 1487

Question: When I connect to an I5P, what is my IP address, and my domain name? Can I have the same IP address each time, and the same domain name?

When you connect to your ISP you will be granted an IP address from a pool of assigned IP addresses. There is no guarantee that this will be the same each time you connect. Your domain name will also change, as it is bound to the IP address. It is possible to be allocated a static IP address, but you would have to pay some money to your ISP for the privilege. The advantage of this is that remote computers could connect to you when you connected via your ISP.

You can determine your current IP address if you use the command WINIPCFG (or IPCONFIG). This is particularly useful if you are playing games over the Internet.

Question: If I move my computer from one network to another, does the IP and MAC address stay the same, and what do I need to change?

The MAC address will not change as the network card stays with the computer. If the com­puter is moved to a different sub net or onto a completely different network, the IP address must change, or the data will be routed back to the wrong network. Data would leave the relocated computer, and would arrive at the destination, but any data coming back would be routed to the previously attached network (and thus get lost). Another thing that is likely to change is the gateway. Nodes cannot communicate with the hosts outside their network if they do not know the IP address of the gateway (normally a router), thus if the network changes then the gateway is likely to be different.

The user may also have to set a new Domain Name Server (although a host can have several DNS entries). The first one listed in the DNS entries should be the one that is the most reliable and, possibly, the fastest.

Other changes may be to change the sub net mask (on a Class B network, with a sub net this is typically 255.255.255.0).

Question: 50 why do you only have to specify the IP address of the gateway?

Because the host uses an ARP request to determine the MAC address of the gateway.

Question. If a computer has no permanent storage, how does it know its own IP address?

Diskless hosts use the RARP protocol, which broadcasts a message to a RARP server. The RARP server looks-up the MAC address in the source address field in the data frame and sends back its IP address in a reply to the host.

Question. How is it possible to simply connect a computer to an Ethernet network, and all the computers on the network are able to communicate with it, and how do they know when a computer has been disconnected?

Computers use the ARP protocol, which allows nodes to determine the MAC address of computers on the network, from given IP addresses. Once they discover the destination MAC address, they update their ARP cache. After a given time, the entries in the table are updated (known as aging the entry).

1488 Handbook of the Internet

Question: How does a node broadcast to the network?

There are two types of broadcasts. The first is a flooded broadcast, which has l's in all parts of the IP address (255.255.255.255). The other it a directed broadcast, which has aliI's in the host part of a IP address. For example, to broadcast to the 146.176.151.0 network, the broad­cast address is 146.176.151. 255, as aliI's in the host part of the address specifies a broadcast. Routers forward directed broadcasts, but not flooded addresses (as these are lo­cal). All hosts and routers must thus know what the sub net mask is.

Question: Okay. I understand that both the MAC address and the IP address need to be speci­fied for a node to receive data, but how does a node know the MAC address of the remote destination?

1. A host looks up its local ARP cache (which is in its own RAM, and not stored to the per­manent storage) to see if it knows the MAC address for a known IP address.

2. If it does not find the MAC address, it transmits an ARP request to the whole of the net­work (ARP requests do not travel over routers). The host who matches the transmitted IP address then responds with an ARP reply with its own MAC address in the source ad­dress field in the data frame. This is received by the originator of the request, which updates its local ARP cache, and then transmits with the required MAC address.

Question: Oh, yes. I think I see it now, but what if the destination is on another network, pos­sibly in another country, how does it determine the address of the destination?

1. The host knows the IP address of the gateway for the network (normally a router). It then uses the MAC address of the gateway, but with the destination IP address of the host that the data is destined for. The gateway senses that the data frame is addressed to itself, and forwards it to the next gateway, and so on.

2. If the node does not know the MAC address of the gateway it will send out an ARP re­quest to the network with the IP address of the gateway.

Question: Does it matter which port I connect my workstation to the hub with? Do I have to start from port 1, then port 2, and so on.

No. Hubs and switches are autosensing and automatically use the port that you connect to. You should hopefully see an LED become active when you connect to the port. You can also connect to a cascaded hub/ switch to anyone of the ports.

Question: I've got a duall 011 00 switching hub. Can I communicate at 1 00 Mbps, even though I only have a 1 0 Mbps networking card?

No. The switching hub will automatically sense the speed of your networking card, and use that rate. The great advantage of buying a dual speed switch is that you can upgrade your network card over time.

Quick questions 1489

Question: What's the difference between a data segment and a data packet?

The transport layer uses data segments, whereas the network layer uses data packets. Data segments allow two or more applications to share the same transport connection. These segments are then split into data packets which have a given maximum size (typically for IP packets this is 64KB) and each are tagged with a source and destination network address. Different applications can send data segments on a first -come, first -served basis.

Question: How does a router know that it is getting routing information, and not an IP data packet?

A routing packet is identified in the protocol field in the IP header. For example the OSPF routing protocol is defined by an 89 in the IP protocol field of the IP header (TCP is defined as 6, and UDP as 17). Example protocol numbers are:

1 Internet Control Message (lCMP) 3 Gateway-to-Gateway (GGP) 8 Exterior Gateway Protocol (EGP) 9 Any private interior gateway (IGP) 45 Inter-Domain Routing Protocol (IDRP) 86 Dissimilar Gateway Protocol (DGP) 88 Interior GRP (IGRP) 89 OSPF

Question: Some people talk about gateways, and I've got a gateway option in my settings for my network connection. So what's the difference between a gateway and a router?

A gateway is an old fashioned way of defining the entry and exit point of a network. Most of the time a gateway is a router. You need to define the IP address of the gateway (the router) before you can communicate with external networks.

Question: So isn't a gateway a better definition for it?

Well I suppose it is, but it's a router, really. In the past computers were sometimes set up to

run a routing protocol and had two or more network cards. These systems acted as gate­ways.

Question: Most of the systems I have worked with use the RIP routing protocol. If it is so popular, why should I use anything else?

RIP is a distance-vector routing protocol which uses a metric to determine the best route to a network. A metric-based system is not really a problem, but RIP uses a very simple method to define the metric: the hop count. This in no way defines the bandwidth on any of the in­terconnected networks, or the delay, or really anything, apart from the number of routers that it encounters. Another major problem is that the maximum hop count is set at 15, thus if a destination is further than 15 routers away, it cannot be reached.

1490 Handbook of the Internet

I could go on all day talking about the problems of RIP, but I will not because it's what makes a lot of networks work. A major problem, though, is that, unlike link-state protocols, each router transmits the complete contents of its routing table to all of its neighbors (even if there have been no changes to its connected networks). This occurs every 30 seconds, and is thus wasteful of bandwidth.

Routing loops can also occur, but these can be overcome with hold-down timers, which do not allow any updates to the metric for a network which is known to be down, for a given time (the hold-down time).

If you really must have a distance-vector approach, choose IGRP, as it better defines the best route, as it uses things like bandwidth, delay, and so on, to define the metric. It also only has an update time period of once every 90 seconds, rather that once every 30 seconds for RIP. Typically routers can run one of many routing protocols, and you can choose the one that fits your network.

Question: So which is better distance-vector or link-state?

Well there are advantages and disadvantages with both types. With a distance-vector ap­proach each router sends their complete routing table to their neighbors, at given time intervals. If the network interconnections are not varying this can be wasteful of bandwidth. Another problem is that updates to the network is done on a step-by-step basis (ripple ef­fect), and networks may take some time to converge (that is, to have a consistent view of the complete network).

Link-state routing protocols have the advantage in that they only transmit updates to the rest of the interconnected network when they sense a change in the interconnected pa­rameters. These changes are then broadcast to the rest of the interconnected network. This is thus more efficient in its use of bandwidth, but suffers from initial flooding when the net­work is first switched on. The convergence is faster than distance-vector, as each router should have the same routing table.

Question: What's an autonomous system and how does it help with routing?

An autonomous system (AS) simplifies the structure of the Internet, and is a logical group­ing of routers within one or more organizations. InterNIC assigns unique 16-bit AS addresses to organizations. A typical protocol that uses ASs is IGRP (Interior Gateway Rout­ing Protocol) .

Question: So what's the difference between interior and exterior routing protocols?

Exterior routing protocols route between AS's, whereas interior routing protocols route with a single AS. Typical interior routing protocols are IGRP (distance-vector), Enhanced IGRP (balanced hybrid), RIP (distance-vector) and OSPF (link state).

Question: You say that high-quality audio uses 16 bits for each sample, but my CD player says that it uses 1- bit conversion. Is this right?

Yes. It is. It uses one bit at a time, as this is thought to give a smoother response. A major

Quick questions 1491

problem with CD recordings is that they sometimes lack warmth, and are a little sharp (as they are too perfect). One bit tracking tries to follow the movement of the audio signal. So your CD still uses 16-bit coding.

Question: I can't understand it. I've just bought a brand-new, state-of-the-art 56kbps mo­dem, and all I ever get is a maximum transfer speed of 4.19 KEls. Where am I going wrong, do 1 need a new lSP?

No. Your ISP is providing an excellent service, as 56kbps is split between sending and re­ceiving. As users who access the Internet from modems typically need to receive more data than they send, the bandwidth for receiving is greater than the bandwidth for sending. You can thus receive at a faster rate than you can send. The maximum receiving rate is 33 kbps, which relates to a maximum transfer rate of 4.125KB/s (there are 8 bits in a byte). If you need a higher-rate you should try ISDN which gives a total transfer rate of 128kbps (l6KB/s). Otherwise, consider ADSL (Asymmetric Digital Subscriber Line), which gives up to 9 Mbps receiving and 1.1 Mbps sending, over standard telephone lines.

Question: Everyone seems to be talking about MP-3, but what's so good about it?

MP-3 audio is set to revolutionize the way that music is distributed and licensed. A typical audio track is sampled at 44100 times per second, for two channels at 16 bits per sample. Thus the data rate is 1.411Mbps (176400B/s), giving a total of 52920000B (50.47MB) for a five-minute song. As the storage of a CD is around 650MB, it is possible to get 64 min­utes from the CD.

Obviously it would take too long, with present bandwidths to download a five-minute audio file from the Internet in its raw form (over 3 hours with a 56 kbps modem). If the audio file was compressed with MP-3, it can be reduced to one-tenth of its original size, without losing much of its original content.

So, it is now possible, with MP-3, to get over 10 hours of hi-fi quality music on a CD. But the big change is likely to occur with songs being sampled, and downloaded over the Inter­net. Users would then pay for the license to play the music, and not for purchasing the CD.

Question: Why, with video and images, do you convert from RGB into something else?

Video cameras have sensors for Red, Green and Blue (the primary colors for video informa­tion). In TV, before color TV, these colors where converted into luminance (Y). When color TV arrived they had to hide the extra color information and then send it as U and V (Redness and Blueness). Thus for TV, RGB is converted into YUV. With images, the human eye is very sensitive to changes in brightness in any object, and not so sensitive to color changes. Thus color changes can be compressed more than the luminance. This is why RGB is converted in YCbC;, For example, 4:2:2 uses twice as many samples for luminance than redness and blue­ness, and 4:1:1 uses four times as many samples.

Question: Why when I watch digital TI1, or a DVD movie, does the screen sometimes display large rectangular blocks, or objects which seem to move incorrectly across the screen?

MPEG splits images up into blocks. As part of the compression process, MPEG splits each

1492 Handbook of the Internet

frame into a series of blocks. These blocks are then transformed. To increase compression, MPEG sends the complete picture every so often, and then just sends updates in the differ­ences between the frames. Thus if your reception is not very good then you may fail to get the complete update of the picture, and only receive parts for the update. Also MPEG tries to track moving objects, it will then group the moving object, and transmit how the object moves. Sometimes this has not been encoded very well, and the object seems to move in­correctly across the screen. Normally this is because there are not enough updates to the complete frame.

Question: Why does MPEG have to send/store the complete picture every few frames. Would it not be possible to send/store one complete frame, and then just send/store the changes from frame to frame?

This would work fine, and would give excellent compression, but the user would not be able to move quickly through the MPEG film, as the decoder would have to read the initial frame, and then all the updates to determine how the frames changed. Also if there were corrupt data, it would propagate through the whole film. Thus there is a compromise between the number of intermediate frames between each complete frame.

Question: All music seems to be becoming digital, but what's the great advantage when you lose something in the conversion?

Yes. Something is lost in the conversion (the quantization error), but this stays constant, whereas the analogue value is likely to change. The benefits of converting to digital audio outweigh the drawbacks, such as:

• The quality of the digital audio system only depends on the conversion process, whereas the quality of an analogue audio system depends on the component parts of the system.

• Digital components tend to be easier and cheaper to produce than high-specification analogue components.

• Copying digital information is relatively easy and does not lead to a degradation of the signal.

• Digital storage tends to use less physical space than equivalent analogue forms. • It is easier to transmit digital data. • Information can be added to digital data so that errors can be corrected. • Improved signal-to-noise ratios and dynamic ranges are possible with a digital audio

system.

Question: I've been told that I should not use copper cables to connect networks between two buildings. Why?

Networks use digital signals. These digital signals are referenced to a local ground level (which eventually connects to the earth connection). The ground level can vary between different buildings (and can be large enough to give someone an electrical shock). Thus the ground connection between the two buildings must be broken. If possible for safety, and for reliable digital transmission, you should use a fiber-optic connection.

Also, copper cables can carry electrical surges (such as from lightning strikes), and air­borne electrical noise. Electrical surges can cause great damage, and noise can cause the

Quick questions 1493

network performance to degrade (as it can cause bit errors). If possible use fiber-optic cables for any long run of networking media. They tend to

produce fewer problems, and allow for easy upgrades (as they have a much greater band­width than copper-based cables).

Question: I thought that Ethernet was a bus-type network, but you have said that it has a star connection.

Ethernet networks use a bus-type network, but when it connects to a hub the network can be seen as a physical star topology as the hub can be seen as a central point. If it were to fail, then the whole network may fail. Inside the hub the Ethernet connection still uses a bus network.

This is also the case for a ring network which uses MAU (Multistation Access Units) which is like a hub but creates a virtual ring. The MAU can be seen as a physical star, al­though the actual network is a ring topology.

Question: What do I need to create a basic network?

All you really need is two computers, two Ethernet NICs, a hub, and some patch cables. The patch cables connect the computers to the hub, and the hub creates the network. The com­puters can then simply make a peer-to-peer connection with each.

UNIX/Linux will allow you to access one computer from another, using TELNET, FTP, NDS, and so on, but you would have to assign each computer a unique IP address. As long as you do not connect onto the Internet, you can choose any IP address.

Microsoft Windows uses its own protocol (NetBEUI) to make a peer-to-peer connection (with file/printer sharing).

Question: Everywhere I read, it says that Ethernet has so many problems, and isn't really a very good networking technique. So why is it so popular?

Local area networks have evolved over the years. At one time, the big contest was between Token Ring, and Ethernet. Which was best? Well Token Ring was always better at coping with network traffic than Ethernet, especially when the network traffic was heavy. But, re­member these were the days before hubs. Thus, most network connections were made from computer to computer with coaxial cable. The big problem with Token Ring was when there was a bad connection or when a computer was disconnected from the network, as this brought the whole network down. Ethernet (lOBASE) proved much easier to add and delete computers to and from the network. Thus it triumphed over Token Ring. Soon Ethernet NICs cost much less than Token Ring cards, and were available from many sources (typi­cally, these days, Token Ring cards will cost up to over five times as much as Ethernet ones).

Ethernet has coped well with the evolving networks, and the new hubs made it even eas­ier to connect computers to a network. It faced a big problem, though, when the number of users of a network increased by a large factor. Its answer to this was 100BASE, which ramped up the bit rate by a factor of ten. This worked well, but it suffered when handling traffic over wide areas. Ethernet had a final trump card: 1000BASE, which gives a bit rate of 1 Gbps.

Thus, whatever we throw at Ethernet, it fights back by either ramping up the bit rate (from 10 Mbps to 100 Mbps to 1 Gbps) or it allows mUltiple simultaneous network connec-

1494 Handbook ofthe Internet

tions (through Ethernet switches). So, don't dismiss the King, he's going to be around for a while yet.

Question: How do you connect a fiber -optic cable to a connector?

It takes a little bit of skill, but it is just glued onto the end.

Question: And, how do you get an RJ-45 connector onto twisted-pair cable?

You strip about 0.5 inch of the outer jacket and fan-out the wires in the correct order. Next you push them fully into the RJ-45 connector, and finally use the special crimping tool to clamp the cable, and make the required contacts. No soldering is involved.

Question: What's so good about routers?

Routers are the key components of the Internet. They communicate with each other and try and determine the best way to get to a remote network. As every computer which connects to the Internet must have an IP address, they use these addresses to route data around the Internet. Without routers we would not have an Internet. Routers are generally the best de­vice to isolate traffic from one network and another, as they will only forward data packets if the destination is not on the current network.

Advantages of routers: • Intelligently route data to find the best path using the network address. A bridge will

route if the MAC address is not on the originating segment, whereas a router will intelli­gently decide whether to forward, or not.

• They do not forward broadcasts, thus they reduce the effect of broadcast storms.

Disadvantages of routers: • Slower than bridges, as they must process the data packet at a higher level. The data

frame is then forwarded in a modified form. • They are network protocol dependent, whereas bridges will forward any high-level pro­

tocol as it is operating on the level 2 (as long as it connects two networks of the same types, such as Ethernet -to-Ethernet). Routers interpret the network level data using the required protocol, such as IP or IPX.

Question: I live in Edinburgh, and my friend lives in London. How long does it take for a digi­tal pulse to travel from Edinburgh to London?

Well, there are a lot of assumptions to be made. First we'll assume that there are no inter­mediate devices in the cable that connects Edinburgh and London, and we'll assume that it is fiber-optic cable, which propagates light pulses at one-third the speed of light (10" m/s). Thus for a distance of 500 miles (804.65km,) the time will be:

T = Distance = 804.65 x I 03 = 0.0080465 Speed lxl08

=8.05 ms

Quick questions 1495

Question: What are the main rules that I should use when I install network cables?

Well, the initial installation is important as well installed cable will reduce the likelihood of problems in the future. Cabling problems tend to be one of the top causes of network prob­lems. The rules can be summarized as:

• Untwisting cables. The maximum amount of untwisted in a Cat -5 cable is V2 in; this is to maximize the cancellation effect.

• Cable bend. The maximum cable bend is 90°. • Staples should never be used as these pierce the outer jacket of the cable. Attach cable

ties to cables going on the same path, but never secure them too tightly. If possible secure the cable with cable ties, cable support bars, wire management panels and re­leasable Velcro straps.

• Try and minimize outer cable twists and stretching the cable, and never allow the ca­ble to become kinked, as this changes the characteristic impedance of the cable. The cables within can untwist when stretched.

• Leave enough cable at each end so that it can be properly terminated. It is less expen­sive to add an extra few meters onto the length at either end, than it is to have to re-run the whole cable. Typically, the cable run will have an extra few meters hidden below in the floor, or above in the ceiling, in order to compensate for extra lengths.

Question: I use a Dial-up connection from home and an Ethernet connection at work. Is there any difference in the way that my applications operate?

None at all (when you use TCP/IP communications). TCP/IP provides the interface between the networking technology and the application program, and has been designed so that the networking type is transparent to the application program, so, for example, it doesn't matter to a WWW browser that you connect to a modem or over a IAN.

Question: I'm a user administrator. What are good practices for user accounts, so that I can secure my network?

1. GUEST ACCOUNT. A guest account should always have a password, and should only be used in low-security domains.

2. RENAME ADMIN. If the network connects to the Internet, the administrator account should be renamed to deter hackers.

3. LIMIT ADMINISTRATOR. Only log on as an administrator when required. This stops the administrator from accidentally making changes which are incorrect, as the ad­ministrator has the right to do anything (every user, no matter how good they are, has deleted something that they didn't intend to).

4. PASSWORDS FOR ALL. User accounts should always have a password. On medium­security and high-security domains, the password should expire after a given time, and will require a completely new password (not just the same one as given previously). Some systems remember the best few passwords, and bar the user from using any of them.

5. CHANGE WHEN FIRST. New users should change their password after they first log onto a domain. This forces users to protect their own account.

6. RANDOM NEW PASSWORDS. In medium-security and high-security networks, initial passwords should be random assigned.

1496 Handbook of the Internet

7. BAD LOCK-OUTS. User accounts should be locked-out after a given number of bad logins. In low-security domains this should be a simple time out for a number of min­utes, but on medium-security and high-security domains this should set to forever (that is, until the system administrator has reset the account, possibly after investigat­ing the cause).

8. PASSWORD SIZE. On medium-security and high-security domains, passwords should be at least a given number of characters, and should typically not include words from a standard dictionary, and also include a number. Typically passwords are at least six characters long.

9. GROUPS. The user must be assigned to a well-defined group, as members of their group tend to have a high-privilege to the user's resources as any other user.

10. DELETE OLD ACCOUNTS. User accounts should have a defined time limit before they become inactive. Users who leave an organization should be deleted as quickly as pos­sible.

Question: And what other techniques can I apply to my network?

1. REGULAR BACKUPS. No network is secure from loss of data, either through hard­ware/software failure, accidental deletion, and external hackers. The only sure way to recover the data on a network is to backup the system, and restore it, if required.

2. PROPERLY DEFINE AUDIT POLICY. This should relate to security policies, resource usage, and so on.

3. PROPERLY DEFINE USERS AND GROUPS. Domains which split into proper groups are often easier to administer and control than domains which have a few loosely defined groups.

4. SECURE THE SERVER. The server is likely to be the most important computer within the domain, as any downtime can affect the whole domain. The server should thus be secure against attack or accidental damage.

5. MAKE SERVERS ROBUST. Servers should be protected against failure, especially through mains spikes, and power outages. This typically requires UPS and RAID tech­nology.

6. DEFINE DOMAINS. Each domain has at least one server. The larger the domain be­comes the more difficult it is to administer it, and the slower it becomes. If possible, define the limits of the domain for effective sharing of information.

7. DEFINE HOW RESOURCES ARE SHARED. It is important that resources are shared properly, and certain users should be restricted from certain resources.

8. SETUP BACKUP RESOURCES. Key resources should have a backup which will guard against failure. Typically this will involve a backup server, which contains a mirror of the data on the main server.

9. MAKE NETWORK ROBUST. The network should be designed so that failures are con­fined to small areas. Typically, routers and bridges are used to segment the network, and contain faults.

10. LIMIT EXTERNAL CONNECTIONS. On secure domains the number of external connec­tions should be limited. Many organizations do not allow modems to be used to connect to a computer, as this could be used by an external user to gain access to the network, without first going through the organizational firewall.

Question: What are best practices tor a secure network?

1. BAN EXTERNAL CONNECTIONS. In a highly secure network, all external traffic should go through a strong firewall. There should be no other external connections on the net­work. If possible, telephone lines should be monitored to stop data being transferred over without going through firewall.

2. BAN FLOPPY DISKS AND DATA STORAGE DEVICES. Employees should not be able to

Quick questions 1497

enter or leave the organization with any data on disk. Some organizations remove floppy disk drives from their computers to try and limit the possibility of transferring data.

3. NO USER CAN INSTALL SOFTWARE. Viruses can be easily spread if users are allowed to install their own software.

4. SECURE ACCESS TO RESOURCES. Typically users must use swipe cards, or some bio­metric technique to gain access to a restricted domain.

5. LIMIT INTERNET ACCESS. Only key personnel should be given rights to access the ex­ternal Internet. If possible the computers which access the Internet should be well protected against malicious programs.

6. FIREWALLS USED BETWEEN DOMAINS. Internal hackers can be as big a problem as external hackers. Thus firewalls should be used between domains to limit access.

7. BASE AUTHENTICATION ON MAC ADDRESSES. Network addresses do not offer good authentication of a user, as they can be easily spoofed. An improved method is to check the MAC address of the computer (as no two computers have the same MAC address).

8. EVERY FILE AND OBJECT SHOULD HAVE UNIQUELY DEFINED PRMLEGES. Every file and resource should have uniquely setup for user privileges which can limit access.

9. EMPLOY SECURITY MANAGER. The security manager will be responsible for the de­sign of the initial security model, and any changes to it.

10. LOG EVERY EVENT. All the important security related events should be monitored within each domain. If possible they should be recorded over a long period of time. Software should be used to try and determine incorrect usage.

Question: How secure is Microsoft Windows?

The US Government defines certain security levels: D, CI, C2, BI, B2, B3 and AI, which are published in the Trusted Computer Security Evaluation Criteria books (each which have different colored cover to define their function), these include:

• Orange Book. Describes system security. • Red Book. Interpretation of the Orange book in a network context. • Blue Book. Application of Orange book to systems not covered in the original book.

Microsoft Windows NT /2000 uses the C2 security level. It has the following features:

• Object control. Users own certain objects and they have control over how they are ac­cessed.

• User names and passwords. • No object reuse. Once a user or a group has been deleted, the user and group numerical

IDs are not used again. New users or groups are granted a new ID number. • Security auditing system. This allows the system administrator to trace security as­

pects, such as user login, bad logins, program access, file access, and so on. • Defined keystroke for system access. In Windows NT/2000, the CNTRL-ALT-DEL key­

stroke is used by a user to log into the system.

Question: What does the orange book define?

The Orange Book produced by the US Department of Defense (DOD) defines levels of secu-

1498 Handbook ofthe Internet

rity for systems. There are four main divisions, which split into seven main security ratings. Division D is the lowest security level and Division A is the highest. The ratings are:

• Division D. This rating provides no protection on files or for users. For example, a DOS­based computer has no real security on files and users, thus it has a Division D rating.

• Division C. This rating splits into two groups: Cl rating and C2 rating. Cl contains a trust computing base (TCB) which separates users and data. It suffers from the fact that all the data on the system has the same security level. Thus, users cannot make distinc­tions between highly secure data and not-so secure data. A Cl system has user names and passwords, as well as some form of control of users and objects. C2 has a higher level of security and provides for some form of accountability and audit. This allows events to be logged and traced, for example, it might contain a list of user logins, net­work address logins, resource accesses, bad logins, and so on.

• Division B. This rating splits into three groups: Bl, B2 and B3. Division B rated systems have all the security of a C2 rating, but have more security because they have a different level of security for all system accesses. For example, each computer can have a differ­ent security level, each printer can also have different security levels, and so on. Each object (such as a computer, printer, and so on) has a label associated with it. It is with this label that the security is set by. Non-labeled resources cannot be connected to the system. In a B2 rated system, users are notified of any changes of an object that they are using. The TCB also includes separate operator and administrator functions. In a B3 rated system the TCB excludes information which is not related to security. The system should also be designed to be simple to trace, but also well tested to prevent external hackers. It should also have a full-time administrator, audit trails and system recovery methods.

• Division A. This is the highest level of security. It is similar to B3, but has formal meth­ods for the systems security policy. The system should also have a security manager, who should document the installation of the system, and any changes to the security model.

Question: What are the standard groups defined in Microsoft Windows?

Standard NT accounts

• Administrator. Used for administration of a domain. • Guest. Designed for limited-time or occasional user. On medium-security and high­

security • domains, this account should be disabled. Guests should be given unique accounts. • System. Used to run many of the server pro-cesses and for assigning file access permis­

sion.

Standard NT domain groups

• Domain Admins. Used to assign the administrators group within the domain. • Domain Users. Used to assign the users accounts in the domain. • Domain Guests. Used to assign the guest accounts in the domain.

Quick questions 1499

Standard NT local groups

• Administrators. Contains the Administrators account and the Domain Admins domain group.

• Account Operators, Backup Operators, Print Operators and Server Operators. Less privileged than the Administrators but more than user accounts. Each perform a spe­cific task for an administrative function.

• Replicators. Used by the Directory Replicator Service, which allows for automatic copy­ing of files between systems within a domain.

• Users. A group which holds ordinary users. • Guests. A group which holds guest accounts for the local domain.

1500 Handbook of the Internet

Ap8 Ethernet monitoring system The schematic below shows an Ethernet monitoring system. Its component values are:

R1==lkQ R6== lOQ XTAL==20MHz

~

Ap6.1

R2 == 500 Q R3==10MQ R4 == 39 Q R5 == 1.5 kQ

Ll == 1:1, 200 IlH C1 == 100 mF C2 == O.lIlF C3 == 1.5 pF

~

~ S6OSOVWN

- " . ~ .. i:I u~

IIII ~ ~d

fM ;'/

10 ~~ f---ot.

~ ! fli .riJl fi 11~1i!1~ltd~lli lI.il~1 ~I :! ~'~3;S= • • ! ~ e t ~ : = ~ :. - .. "" '" .. . .. ..

orolms slell! II :i ~I~I

_ H ~ '" .. • ~ .. • e inl.~ :l Iii ~I SI ~I i II ~

I I ~ I HI ~ .. 0 lr ~ .

...-J

aIW!;! slil ~ ~ It :d [681Ft Ir.!-- a.: - ,.. ... ... .... . ... U~~wllIWIj(1

I» 1 ,.a.-m • .. ~ o •• ~ .. r --..!!!.. • ~ u

11..- n:' < " !... § : II! 18JJ~I~1 -;1' I to < toe-

'!: :: :: :. • • • "1" t9ltL ~~ ;; :: ... .. ... .. ... . ...

Ii ..

I L!l..!I; I ~18 i 8\ II I

lil

Ap9 Java reference

Ap9.1 Package jovo.opplet Ap9.1.1 Class java.applet.Applet

The Applet class is a superclass of any applet.1t provides a standard interface between ap­plets and their environment. The following are defined:

II Constructors public Applet();

II Methods public void destroy(); public AppletContext getAppletContext(); public String getAppletlnfo() ; public AudioClip getAudioClip(URL url) ; public AudioClip getAudioClip(URL url, String name); public URL getCodeBase(); public URL getDocumentBase(); public Image getlmage(URL url) ; public Image getlmage(URL url, String name); public String getLocale(); II Java 1.1 public String getParameter(String name); public String [] [] getparameterlnfo () ; public void init(); public boolean isActive(); public void play(URL url) ; public void play(URL url, String name) ; public void resize(Dimension d); public void resize(int width, int height); public final void setStub(AppletStub stub) ; public void showStatus(String msg); public void start(); public void stop();

Ap9.1.2 Interface java.applet.AppletContext

The AppletContext interface corresponds to the applet's environment. The following are defined:

II Methods public abstract Applet getApplet(String name); public abstract Enumeration getApplets(); public abstract AudioClip getAudioClip(URL url); public abstract Image getlmage(URL url); public abstract void showDocument(URL url); public abstract void showDocument(URL url, String target); public abstract void showStatus(String status);

Ap9.1.3 Interface java.applet.AppletStub

The AppletStub interface acts as the interface between the applet and the browser envi­ronment or applet viewer environment. The following are defined:

II Methods public abstract void appletResize(int width, int height);

public abstract AppletContext getAppletContext(); public abstract URL getCodeBase(); public abstract URL getDocumentBase(); public abstract String getParameter(String name) ; public abstract boolean isActive();

Ap9.1.4 Interface java.applet.AudioClip

The AudioClip interface is a simple abstraction for playing a sound clip. Multiple Audio­

Clip items can be playing at the same time, and the resulting sound is mixed together to produce a composite. The following are defined:

II Methods public abstract void loop(); public abstract void play(); public abstract void stop();

Ap9.2 Package java.awt

Ap9.2.1 Class java.awt.BorderLayout

The BorderLayout class contains members named "North", "South", "East", "West", and "Center". These are laid out with a given size and constraints. The "North" and "South" components can be stretched horizontally and the "East" and "West" components can be stretched vertically. The "Center" component can be stretched horizontally and vertically. The following are defined:

II Constructors public BorderLayout(); public BorderLayout(int hgap, int vgap); II Constants public static final String public static final String public static final String public static final String public static final String II Methods

CENTER; II EAST; II NORTH; II SOUTH; II WEST; II

Java 1.1

Java 1.1 Java 1.1 Java 1.1 Java 1.1

public void addLayoutComponent(Component comp, Object obj); public void addLayoutComponent(String name, Component comp); public int getHgap(); II Java public float getLayoutAlignmentX(Container parent); II Java public float getLayoutAlignmentY(Container parent); II Java public int getVgap(); II Java public void invalidateLayout(Container target); II Java public void layoutContainer(Container target);

II II

1.1 1.1 1.1 1.1 1.1

public Dimension maximumLayoutSize(Container target) ;11 Java 1.1 public Dimension minimumLayoutSize(Container target); public Dimension preferredLayoutSize(Container target); public void removeLayoutComponent(Component comp); public int setHgap(); public int setVgap(); public String toString();

Ap9.2.2 Class java.awt.Button

II Java 1.1 II Java 1.1

Java 1.1 Java 1.0

The Button class creates labelled buttons, which can have an associated action when pushed. Three typical actions are: normal, when it has the input focus (the darkening of the outline lets the user know that this is an active object) and when the user clicks the mouse

1504 Handbook of the Internet

over the button. The following are defined:

II Constructors public Button(); public Button(String label);

II Methods public synchronized void addActionListener(ActionListern 1); public void addNotify(); public String getActionCommand() ; public String getLabel(); protected String paramString() ; public synchronized void removeActionListener(ActionListener

public setActionCommand(String command) ; public void setLabel(String label);

Ap9.2.3 Class jovo.owt.Checkbox

II Java 1.1

II Java 1.1

1) ;

II Java 1.1 II Java 1.1

The Checkbox class contains a checkbox which has an on/off state. The following are de­fined:

II Constructors public Checkbox() ; public Checkbox(String label); public Checkbox(String label, boolean state); II Java 1.1 public Checkbox(String label, boolean state, Checkbox group); II Java 1.1 public Checkbox(String label, CheckboxGroup group, boolean state) ;

II Methods public synchronized void addltemListener(ItemListener 1); public void addNotify() ; public CheckboxGroup getCheckboxGroup(); public String getLabel(); public boolean getState(); public Object[] getSelectedObject(); protected String paramString(); public synchronized void removeltemListener(ItemListener 1); public void setCheckboxGroup(CheckboxGroup g); public void setLabel(String label); public void setState(boolean state) ;

Ap9.2.4 Class jovo.owt.CheckboxGroup

II Java 1.1

II Java 1.1

II Java 1.1

The CheckGroup class groups a number of checkbox buttons. Only one of the checkboxes can be true (on) at a time. When one button is made true (on) the others will become false (off). The following are defined:

II Constructors public CheckboxGroup() ;

II Methods public Checkbox getCurrent() ; II Java 1.0 public Checkbox getSelectedCurrent() ; II Java 1.1 public void setCurrent(Checkbox box); II Java 1.0 public void setSelectedCheckbox(Checkbox box) ; II Java 1.1 public String toString();

Java reference 1505

Ap9.2.S Closs java.awt.CheckboxMenultem

The CheckboxMenuItem class allows for a checkbox that can be included in a menu. The following are defined:

II Constructors public CheckboxMenultem(); II Java 1.1 public CheckboxMenultem(String label); public CheckboxMenultem(String label, boolean state) ; II Java 1.1

II Methods public synchronized void addltemListener(ItemListener 1); public void addNotify();

II Java 1.1

public boolean getState(); public synchronized Object[] getSelectObjects(); public String paramString(); public synchronized void removeltemListener(ItemListener public void setState(boolean t);

Ap9.2.6 Closs java.awt.Choice

1) ;

The Choice class allows for a pop-up menu. The following are defined:

II Constructors public Choice();

II Methods public synchronized add (String item); public void addltem(String item); public synchronized void addltemListener(ItemListener 1); public void addNotify(); public int countltems(); public String getltem(int index); public String getltemCount(); public int getSelectedlndex(); public String getSelectedltem() ; protected String paramString(); public synchronized Object[] getSelectedObjects(); public synchronized void insert(String item, int index); public synchronized void remove(String item); public synchronized void remove (int position); public synchronized void removeAII(); public synchronized void removeltemListener(ItemListener public void select(int pas) ; public void select(String str);

Ap9.2.7 Closs java.awt.Color

1) ;

II Java 1.1

II Java 1.1

II Java 1.1

II Java 1.1

II Java 1.0

II Java 1.1

II Java 1.1 II Java 1.1 II Java 1.1 II Java 1.1 II Java 1.1 II Java 1.1

This Color class supports the RGB colour format. A colour is represented by a 24-bit value of which the red, green and blue components are represented by an 8-bit value (0 to 255). The minimum intensity is 0, and the maximum is 255. The following are defined:

II Constants public final static Color black, blue, cyan, darkGray, gray, green; public final static Color lightGray, magenta, orange, pink, red; public final static Color white, yellow;

II Constructors public Color(float r, float g, float b); public Color(int rgb); public Color(int r, int g, int b);

1506 Handbook of the Internet

II Methods public Color brighter() ; public Color darker() ; public static Color decode (Strimg nm); II Java 1.1 public boolean equals (Object obj); public int getBlue(); public static Color getColor(String nm) ; public static Color getColor(String nm, Color v); public static Color getColor(String nm, int v); public int getGreen() ; public static Color getHSBColor(float h, float s, float b) ; public int getRed(); public int getRGB(); public int hashCode() ; public static int HSBtoRGB(float hue, float saturation, float brightness); public static float[] RGBtoHSB(int r, int g, int b, float hsbvals[]); public String toString() ;

Ap9.2.B Class java.awt.Component

The Component class is the abstract superclass for many of the Abstract Window Toolkit classes. The following are defined:

II Constants public static final float BOTTOM_ALIGNMENT, CENTER_ALIGNMENT; public static final float LEFT_ALIGNMENT, RIGHT_ALIGNMENT; public static final float TOP_ALIGNMENT;

II Methods public boolean action(Event evt, Object what); II Java 1.0 public synchronized void add(PopupMenu popup); II Java 1.1 public synchronized void addComponentListener(ComponentListener 1);

II Java 1.1 public synchronized void addFocusListener(FocusListener 1); II Java 1.1 public synchronized void addKeyListener(KeyListener 1); II Java 1.1 public synchronized void addMouseListener(MouseListener 1); II Java 1.1 public synchronized void addMouseMotionListener(MouseMotionListener 1);

II Java 1.1 public void addNotify(); public Rectangle bounds(); II Java l.0 public int checkImage(Image image, ImageObserver observer) ; public int checkImage(Image image, int width, int height,

ImageObserver observer) ; public boolean contains (int x, int y) ; II Java l.1 public boolean contains (Point p); II Java l.1 public Image createImage(ImageProducer producer); public Image createImage(int width, int height) ; public void deliverEvent(Event evt) ; II Java 1.0 public void disable(); II Java 1.0 public final void displayEvent(AWTEvent e) ; II Java l.1 public void doLayout(); II Java 1.1 public void enable(); II Java 1.0 public void enable(boolean cond); II Java 1.0 public float getAlignmentX() ; II Java 1.1 public float getAlignmenty() ; II Java 1.1 public Color getBackground(); public Rectangle getBounds(); II Java 1.1 public ColorModel getColorModel(); public Component getComponentAt(int x, int y) ; II Java 1.1 public Component getComponentAt(Point p) ; II Java 1.1 public Cursor getCursor(); II Java 1.1 public Font getFont() ;

Java reference 1507

public FontMetrics getFontMetrics(Font font); public Color getForeground() ; public Graphics getGraphics(); public Locale getLocale(); II Java 1.1 public Point getLocation(); II Java 1.1 public Point getLocationOnScreen(); II Java 1.1 public Dimension getMaximumSize(); II Java 1.1 public Dimension getMinimumSize(); II Java 1.1 public Container getParent() ; public Component Peer getPeer(); II Java 1.0 public Dimension getPreferredSize(); II Java 1.1 public Dimension getSize(); II Java 1.1 public Toolkit getToolkit(); public final Object getTreeLock(); II Java 1.1 public boolean gotFocus(Event evt, Object what); II Java 1.0 public boolean handleEvent(Event evt); II Java 1.0 public void hide(); II Java 1.0 public boolean imageUpdate(Image img, int flags, int x, int y, int w, int h); public boolean inside(int x, int y); II Java 1.0 public void invalidate(); public boolean isEnabled(); public boolean isFocusTransversable(); II Java 1.1 public boolean isShowing() ; public boolean isValid() ; public boolean isVisible(); public boolean keyDown(Event evt, int key); II Java 1.0 public boolean keyUp(Event evt, int key); II Java 1.0 public void 1ayout(); II Java 1.0 public void list(); public void list(PrintStream out); public void list (PrintStream out, int indent); public void list (PrintStream out); II Java 1.1 public Component locate(int x, int y); II Java 1.0 public Point location () ; I I Java 1.0 public boolean lostFocus(Event evt, Object what); II Java 1.0 public Dimension minimumSize(); II Java 1.0 public boolean mouseDown(Event evt, int x, int y); II Java 1.0 public boolean mouseDrag(Event evt, int x, int y); II Java 1.0 public boolean mouseEnter(Event evt, int x, int y); II Java 1.0 public boolean mouseExit(Event evt, int x, int y); II Java 1.0 public boolean mouseMove(Event evt, int x, int y); II Java 1.0 public boolean mouseUp(Event evt, int x, int y); II Java 1.0 public void move (int x, int y); I I Java 1.0 public void nextFocus(); II Java 1.0 public void paint(Graphics g); public void paintAII(Graphics g); protected String paramString() ; pUblic boolean postEvent(Event evt); II Java 1.0 public Dimension preferredSize(); II Java 1.0 public boolean prepare Image (Image image, ImageObserver observer); public prepareImage(Image image, int width, int height, ImageObserver ob­server) ; public void print (Graphics g); public void printAll(Graphics g); public synchronized void remove(MenuComponent popup); II Java 1.1 public synchronized void removeComponentListener(ComponentListener 1);

I I Java 1.1 public synchronized void removeFocusListener(FocusListener 1) ;11 Java 1.1 public synchronized void removeKeyListener(KeyListener 1); II Java 1.1 public synchronized void removeMouseListener(MouseListener 1) ;11 Java 1.1 public synchronized void removeMouseMotionListener(MollseMotionListener 1);

II Java 1.1 public void removeNotify() ;

1508 Handbook of the Internet

void repaint() ; void repaint (int x, int y, int width, int height); void repaint(long tm) ;

public public public public public public public public public public public public public public public public public public public public public public public public public public public public public

void repaint (long tm, int x, int y, int width, int height); void requestFocus(); void reshape(int x, int y, int width, int height); II Java 1.0 void resize(Dimension d); II Java 1.0 void resize(int width, int height); II Java 1.0 void setBackground(Color c) ; void setBounds(int x, int y, int width, int height); II Java 1.1 void setBounds(Rectangle r); II Java 1.1 synchronized void setCursor(Cursor cursor); II Java 1.1 void setEnabled(boolean b); II Java 1.1 void set Font (Font f); void setForeground(Color c) ; void setLocale(Locale 1); void setLocation(int x, int void setLocation(Point p) ; void setName(String name); void setSize(int width, int void setSize(Dimension d) ; void setVisible(boolean b); void show(); II Java 1.0

II Java 1.1 y) ; I I Java 1.1 II Java 1.1 II Java 1.1

height); II Java 1.1 II Java 1.1 II Java 1.1

void show(boolean cond); II Java 1.0 Dimension size(); II Java 1.0 String toString(); void transferFocus(); II Java 1.1 void update (Graphics g); void validate();

Ap9.2.9 Class java.awt.Container

The Container class is the abstract superclass representing all components that can hold other components. The following are defined:

II Methods public Component add (Component comp); public Component add (Component comp, int pos) ; public Component add (String name, Component comp); public void add (Component comp, Object constraints); II Java 1.1 public void add(Component comp, Object constraints, int index); II Java 1.1 public void addContainerListener(ContainerListener 1); II Java 1.1 public void addNotify(); public int countComponents(); II Java 1.0 public void deliverEvent(Event evt); II Java 1.0 public void doLayout(); II Java 1.1 public void getAlignmentX(); II Java 1.1 public void getAlignmenty(); II Java 1.1 public Component getComponent(int n); public Component getComponentAt(int x, int y); II Java 1.1 public Component getComponentAt(Point p); II Java 1.1 public int getComponentCount(); II Java 1.1 public Component[) getComponents(); public getlnsets(); II Java 1.1 public LayoutManager getLayout() ; public Dimension getMaximumSize(); II Java 1.1 public Dimension getMinimumSize(); II Java 1.1 public Dimension getPreferredSize(); II Java 1.1 public Insets insets(); II Java 1.0 public void invalidate(); II Java 1.1 pubic boolean isAncestorOf(Component c); II Java 1.1 public void layout(); II Java 1.0 public void list (PrintStream out, int indent);

Java reference 1509

public void list(PrintWriter out, int indent); II Java 1.1 public Component locate (int x, int y) ; I I Java 1. 0 public Dimension minimumSize(); II Java 1.0 public void paintComponents(Graphics g); protected String paramString(); public Dimension preferredSize(); II Java 1.0 public void print (Graphics g); II Java 1.1 public void printComponents(Graphics g); public void remove (int index); II Java 1.1 public void remove (Component comp); public void removeAII(); public void removeContainerListener(ContainerListener 1); II Java 1.1 public void removeNotify(); public void setLayout(LayoutManager mgr); public void validate();

Ap9.2.10 Class java.awt.Cursor

The Cursor class represents a mouse cursor. The following are defined:

II Constructors public Cursor(int type); II Java 1.1

II Constants public static final int DEFAULT_CURSOR; II Java 1.1 public static final int CROSSHAIR_CURSOR, HAND_CURSOR; II Java 1.1 public static final int MOVE_CURSOR; II Java 1.1 public static final int TEXT_CURSOR, WAIT_CURSOR; II Java 1.1 public static final int N_RESIZE_CURSOR, S_RESIZE_CURSOR; public static final int E_RESIZE_CURSOR, W_RESIZE_CURSOR; public static final int NE_RESI ZE_CURSOR, NW_RESIZE_CURSOR; public static final int SE_RESIZE_CURSOR, SW_RESIZE_CURSOR;

II Methods public static Cursor getDefaultCursor(); II Java 1.1 public static Cursor getPredefinedCursor(); II Java 1.1

Ap9.2.11 Class java.awt.Dialog

II II

Java 1.1 Java 1.1 II Java II Java

1.1 1.1

The Dialog class supports a dialog window, in which a user can enter data. Dialog windows are invisible until the show method is used. The following are defined:

II Constructors public Dialog(Frame parent); II Java 1.1 public Dialog(Frame parent, boolean modal) ; public Dialog(Frame parent, String title); II Java 1.1 public Dialog(Frame parent, String title, boolean modal);

II Methods public void addNotify(); public String getTitle(); public boolean isModal(); public boolean isResizable(); public void setModal(boolean b); II Java 1.1 protected String paramString() ; public void setResizable(boolean resizable); public void setTitle(String title); public void show(); II Java 1.1

1510 Handbook of the Internet

Ap9.2.12 Class jovo.owt.Dimension

The Dimension class contains the width and height of a component in an object. The fol­lowing are defined:

II Fields public int height; public int width;

II Constructors public Dimension() ; public Dimension(Dimension d) ; public Dimension(int width, int height) ;

II Methods public boolean equals (Object obj); II Java 1.1 public Dimension getSize(); II Java 1.1 public void setSize(Dimension d); II Java 1.1 public void setSize (int width, int height); I I Java 1.1 public String toString();

Ap9.2.13 Class jovo.owt.Event

The Event class encapsulates user events from the GUI. The following are defined:

II Fields public Object arg; public int clickCount; public Event evt; public int id; public int key; public int modifiers; public Object target; public long when; public int x' public int y;

II possible values for the id field public final static int ACTION_EVENT, GOT_FOCUS; public final static int KEY_ACTION, KEY_ACTION_RELEASE; public final static int KEY_PRESS, KEY_RELEASE; public final static int LIST_DESELECT, LIST_SELECT; public final static int LOAD_FILE, LOST_FOCUS; public final static int MOUSE_DOWN, MOUSE_DRAG; public final static int MOUSE_ENTER, MOUSE_EXIT; public final static int MOUSE_MOVE, MOUSE __ UP; public final static int SAVE_FILE, SCROLL_ABSOLUTE; public final static int SCROLL_BEGIN, SCROLL_END; II Java public final static int SCROLL_LINE_DOWN, SCROLL_LINE_UP; public final static int SCROLL_PAGE_DOWN, SCROLL_PAGE_UP; public final static int WINDOW_DEICONIFY, WINDOW_DESTROY; public final static int WINDOW_EXPOSE, WINDOW_ICONIFY; public final static int WINDOW_MOVED;

II possible values for the key field when the II action is KEY_ACTION or KEY ACTION_RELEASE public final static int DOWN, END;

1.1

public final static int Fl, F2, F3, F4, F5, F6, F7, Fa, F9, FlO, Fll, F12 public final static int HOME, LEFT, PGDN, PGUP, RIGHT, UP; public final static int INSERT, DELETE; II Java 1.1 public final static int BACK SPACE, ENTER; II Java 1.1 public final static int TAB, ESCAPE; II Java 1.1

Java reference 151 I

public final static int CAPS_LOCK, NUM_LOCK; II Java public final static int SCROLL_LOCK, PAUSE; II Java 1.1 public final static int PRINT_SCREEN; II Java 1.1

II possible masks for the modifiers field public final static int ALT_MASK: public final static int CTRL_MASK: public final static int META_MASK; public final static int SHIFT_MASK;

II Constructors public Event(Object target, int id, Object arg); public Event(Object target, long when, int id,

int x, int y, int key, int modifiers) ; public Event(Object target, long when, int id,

int x, int y, int key, int modifiers, Object arg);

II Methods public boolean controlDown(); public boolean metaDown(); protected String paramString(); public boolean shiftDown() ; public String toString(); public void translate(int dX, int dY);

Ap9.2.14 Class java.awt.FileOialog

1.1

The FileDialog class displays a dialog window. The following are defined:

II Fields public final static int LOAD, SAVE;

II Constructors public FileDialog(Frame parent); II Java 1.1 public FileDialog(Frame parent, String title) ; public FileDialog(Frame parent, String title, int mode); II Methods public void addNotify(); public String getDirectory(); public String getFile(); public FilenameFilter getFilenameFilter(); public int getMode(); protected String paramString() ; public void setDirectory(String dir) ; public void setFile(String file); public void setFilenameFilter(FilenameFilter filter);

Ap9.2.15 Class java.awt.FlowLayout

The FlowLayout class arranges components from left to right. The following are defined:

II Fields public final static int CENTER, LEFT, RIGHT;

II Constructors public FlowLayout(); public FlowLayout(int align); public FlowLayout(int align, int hgap, int vgap);

II Methods public void addLayoutComponent(String name, Component comp); public int getAlignment(); II Java 1.1

1512 Handbook of the Internet

public int getHgap(); II Java 1.1 public int getVgap(); II Java 1.1 public void layoutContainer(Container target); public Dimension minimumLayoutSize(Container target); public Dimension preferredLayoutSize(Container target); public void removeLayoutComponent(Component comp); public void setAlignment(int align); II Java 1.1 public void setHgap(int hgap); II Java 1.1 public void setVgap(int vgap); II Java 1.1 public String toString() ;

Ap9.2.16 Class java.awt.Font

The Font class represents fonts. The following are defined:

II Fields protected String name; protected int size; protected int style;

II style has the following bit masks public final static int BOLD, ITALIC, PLAIN;

II Constructors public Font (String name, int style, int size);

II Methods public static Font decode(String str); II Java 1.1 public boolean equals (Object obj); public String getFamily(); public static Font getFont(String nm); public static Font getFont(String nm, Font font); public String getName(); public int getSize(); public int getStyle(); public FontPeer getPeer(); II Java 1.1 public int hashCode() ; public boolean isBold(); public boolean isItalic(); public boolean isPlain(); public String toString();

Ap9.2.17 Class java.awt.FontMetrics

The FontMetrics class provides information about the rendering of a particular font. The following are defined:

II Fields protected Font font;

II Constructors protected FontMetrics(Font font);

II Methods public int bytesWidth(byte data [] , int off, int len) ; public int charsWidth(char data[], int off, int len) ; public int charWidth(char chi ; public int charWidth(int chi ; public int getAscent() ; public int getDescent() ; public Font getFont() ; public int getHeight() ;

Java reference 1513

public int getLeading(); public int getMaxAdvance(); public int getMaxAscent(); public int getMaxDescent(); II Java 1.0 public int[] getWidths(); public int stringWidth(String str) ; public String toString() ;

Ap9.2.18 Class java.awt.Frame

The Frame class contains information on the top-level window. The following are defined:

II possible cursor types for the setCursor method public final static int CROSSHAIR_CURSOR, DEFAULT_CURSOR; public final static int E_RESIZE_CURSOR, HAND_CURSOR; public final static int MOVE_CURSOR, N_RESIZE_CURSOR; public final static int NE_RESI ZE_CURSOR, NW_RESIZE_CURSOR; public final static int S_RESIZE_CURSOR, SE_RESIZE_CURSOR; public final static int SW_RESIZE_CURSOR, TEXT_CURSOR; public final static int W_RESI ZE_CURSOR, WAIT_CURSOR; II Constructors public Frame () ; public Frame(String title); II Methods public void addNotify() ; public void dispose(); public int getCursorType(); II Java 1.0 public Image getlconlmage(); public MenuBar getMenuBar(); public String getTitle() ; public boolean isResizable(); protected String paramString() ; public void remove (MenuComponent m); public void setCursor(int cursorType); II Java 1.0 public void setlconlmage(Image image); public void setMenuBar(MenuBar mb); public void setResizable(boolean resizable); public void setTitle(String title);

Ap9.2.19 Class java.awt.Graphics

The Graphics class is an abstract class for all graphics contexts. This allows an application to draw onto components or onto off-screen images. The following are defined:

II Constructors protected Graphics();

II Methods public abstract void clearRect(int x, int y, int width, int height); public abstract void clipRect(int x, int y, int width, int height); public abstract void copyArea(int x, int y, int width, int height,

int dx, int dy); public abstract Graphics create(); public Graphics create(int x, int y, int width, int height); public abstract void dispose(); public void draw3DRect(int x, int y, int width, int height, boolean raised) ; public abstract void drawArc(int x, int y, int width, int height,

int startAngle, int arcAngle); public void drawBytes(byte data[], int offset, int length, int x, int y); public void drawChars(char data[], int offset, int length, int x, int y); public abstract boolean drawlmage(Image img, int x, int y, Color bgcolor,

ImageObserver observer) ;

1514 Handbook of the Internet

public abstract boolean drawImage(Image img, int x, int y, ImageObserver observer) ;

public abstract boolean drawImage(Image img, int x, int y, int width, int height, Color bgcolor, ImageObserver observer);

public abstract boolean drawImage(Image img, int x, int y, int width, int height, ImageObserver observer) ;

public abstract boolean drawImage(Image img, int x, int y, int width, int height, Color bgcolor, ImageObserver observer); II Java 1.1

public abstract void drawLine(int xl, int y1, int x2, int y2) ; public abstract void drawOval(int x, int y,int width, int height); public abstract void drawPolygon(int xPoints[], int yPoints[], int nPoints); public void drawPolygon(Polygon p) ; public abstract void drawPolyline(int xPoints[], int yPoints[], int nPoints);

II Java 1.1 public void drawRect(int x, int y, int width, int height); public abstract void drawRoundRect(int x, int y, int width,

int height, int arcWidth, int arcHeight); public abstract void drawString(String str, int x, int y); public void fill3DRect(int x, int y, int width, int height, boolean raised); public abstract void fillArc(int x, int y, int width, int height,

int startAngle int arcAngle) ; public abstract void fillOval(int x, int y, int width, int height); public abstract void fillPolygon(int xPoints[], int yPoints[], int nPoints); public void fillPolygon(Po1ygon p) ; public abstract void fillRect(int x, int y, int width, int height); public abstract void fillRoundRect(int x, int y, int width, int height,

int arcWidth, int arcHeight); public void finalize() ; public abstract Shape getClip(); II Java 1.1 public abstract Rectangle getClipBounds(); II Java 1.1 public abstract Rectangle getClipRect(); II Java 1.0 public abstract Color getColor(); public abstract Font getFont(); public FontMetrics getFontMetrics(); public abstract FontMetrics getFontMetrics(Font f); public abstract void setClip(int x, int y, int width, int height); II Java 1.1 public abstract void setClip(Shape clip); II Java 1.1 public abstract void setColor(Color c); public abstract void setFont(Font font); public abstract void setPaintMode(); public abstract void setXORMode(Color c1) ; public String toString() ; public abstract void translate(int x, int y);

Ap9.2.20 Class java.awt.lmage

The Image abstract class is the superclass of all classes that represents graphical images.

II Constants public static final int SCALE_AREA_AVERAGING, SCALE_DEFAULT; public static final int SCALE_FAST, SCALE REPLICATE; public static final int SCALE_SMOOTH;

II Fields public final static Object UndefinedProperty;

II Constructors public Image();

II Methods public abstract void flush() ;

Java reference 1515

public abstract Graphics getGraphics(); public abstract int getHeight(ImageObserver observer); public abstract Object getProperty(String name, ImageObserver observer) ; public Image getScaledInstance(int width, int height, int hints); II Java 1.1 public abstract ImageProducer getSource(); public abstract int getWidth(ImageObserver observer)

Ap9.2.21 Class java.awt.lnsets

The Insets object represents borders of a container and specifies the space that should be left around the edges of a container. The following are defined:

II Fields public int bottom, left; public int right, top; II Constructors public Insets(int top, int left, int bottom, int right);

II Methods public Object clone(); public boolean equals (Object obj); II Java 1.1 public String toString();

Ap9.2.22 Class java.awt.Label

The label class is a component for placing text in a container. The following are defined: II Fields public final static int CENTER, LEFT, RIGHT;

II Constructors public Label () ; public Label (String label); public Label(String label, int alignment);

II Methods public void addNotify() ; public int getAlignment(); public String getText(); protected String paramString(); public void setAlignment(int alignment); public void setText(String label);

Ap9.2.23 Class java.awt.List

The List object can be used to produce a scrolling list of text items. It can be set up so that the user can either pick one or many items. The following are defined:

II Constructors public List(); public List(int rows); II Java 1.1 public List(int rows, boolean multipleSelections);

II Methods public void add(String item); II Java 1.1 public void addActionListener(ActionListener 1); II Java 1.1 public void addItem(String item); public void addItem(String item, int index); public synchronized void addItemListener(ItemListener 1); II Java 1.1 public void addNotify(); public boolean allowsMultipleSelections(); II Java 1.0 public void clear(); II Java 1.0

1516 Handbook of the Internet

public int countItems(); II Java 1.0 public void delItem(int position) ; public void delItems(int start, int end); II Java 1.0 public void deselect (int index); public String getItem(int index); public int getItemCount(); II Java 1.1 public synchronized String[] getItems(); II Java 1.1 public Dimension getMinimumSize(int rows); II Java 1.1 public Dimension getMinimumSize(); II Java 1.1 public Dimension getPreferredSize(int rows); II Java 1.1 public Dimension getPreferredSize(); II Java 1.1 public int getRows(); public int getSelectedIndex() ; public int[] getSelectedIndexes(); public String getSelectedItem() ; public String[] getSelectedItems(); public Object[] getSelectedObjects(); II Java 1.1 public int getVisibleIndex(); public boolean isIndexSelected(int index); II Java 1.1 public MultipleMode(); II Java 1.1 public boolean isSelected(int index); II Java 1.0 public void makeVisible(int index); public Dimension minimumSize(); II Java 1.0 public Dimension minimumSize(int rows); II Java 1.0 protected String paramString(); public Dimension preferredSize(); II Java 1.0 public Dimension preferredSize(int rows); II Java 1.0 public synchronized void remove (String item); II Java 1.1 public synchronized void remove(int position); II Java 1.1 public synchronized void removeActionListener(ActionListener 1); II Java 1.1 public synchronized void removeAll(); II Java 1.1 public synchronized void removeItemListener(ItemListener 1); II Java 1.1 public void removeNotify() ; public void replaceItem(String newValue, int index); public void select(int index); public synchronized void setMultipleMode(boolean b); II Java 1.1 public void setMultipleSelections(boolean v);

Ap9.2.24 Class java.awt.MediaTracker

The MediaTracker class contains a number of media objects, such as images and audio. The following are defined:

II Fields public final static int ABORTED, COMPLETE; public final static int ERRORED, LOADING;

II Constructors public MediaTracker(Component comp);

II Methods public void addImage(Image image, int id); public void addImage(Image image, int id, int w, int h) ; public boolean checkAll(); public boolean checkAll(boolean load); public boolean checkID(int id); public boolean checkID(int id, boolean load); public Object[] getErrorsAny(); public Object[] getErrorsID(int id); public boolean isErrorAny() ; public boolean isErrorID(int id); public synchronized removeImage(Image image); II Java 1.1 public synchronized removeImage(Image image, int id); II Java 1.1

Java reference 1517

public synchronized removelmage(Image image, int id, int width, int height); II Java 1.1

public int statusAll(boolean load); public int statusID(int id, boolean load); public void waitForAll(); public boolean waitForAll(long ms); public void waitForID(int id); public boolean waitForID(int id, long ms) ;

Ap9.2.25 Class java.awt.Menu

The Menu object contains a pull-down component for a menu bar. The following are de­fined:

II Constructors public Menu(); II Java 1.1 public Menu(String label) ; public Menu(String label, boolean tearOff);

II Methods Menultem add(Menultem mil ; void add (String label); void addNotify() ; void addSeparator(); int countltems(); Menultem getltem(int index); int getltemCount(); II Java 1.1

public public public public public public public public public public public public public public

synchronized void Insert(Menultem menuitem, int index) ;11 Java 1.1 void InsertSepatator(int index); II Java 1.1 boolean isTearOff(); void remove (int index); void remove(MenuComponent item); synchronized void removeAll(); II Java 1.1 void removeNotify();

Ap9.2.26 Class java.awt.MenuBar

The MenuBar object contains a menu bar which is bound to a frame. The following are de­fined:

II Constructors public MenuBar();

II Methods Menu add (Menu m) ; void addNotify(); int countMenus();

public public public public public public public public public public public public public

void deleteShortCut(MenuShortCut s); II Java 1.1 Menu getHelpMenu(); Menu getMenu(int i); int getMenuCount(); II Java 1.1 Menultem getShortcutMenultem(MenuShortcut s); II Java 1.1 void remove(int index); void remove(MenuComponent m); void removeNotify() ; void setHelpMenu(Menu m); synchronized Enumeration shortcuts();

Ap9.2.27 Class java.awt.MenuComponent

II Java 1.1

The MenuComponent abstract class is the superclass of all menu-related components. The

1518 Handbook of the Internet

following are defined:

II Constructors public MenuComponent();

II Methods public final void dispatchEvent(AWTEvent e); II Java 1.1 public Font getFont(); public String getName(); II Java 1.1 public MenuContainer getParent(); public MenuComponentPeer getPeer(); II Java 1.0 protected String paramString() ; public boolean postEvent(Event evt); public void removeNotify(); public void setFont(Font f); public void setName(String name); II Java 1.1 public String toString();

Ap9.2.28 Class java.awt.Menultem

The MenuItern class contains all menu items. The following are defined:

II Constructors public Menultem(); II Java 1.1 public Menultem(String label); public Menultem(String label, MenuShortcut s); II Java 1.1

II Methods public void addActionListener(ActionListener 1); II Java 1.1 public void addNotify(); public void deleteShortcut(); II Java 1.1 public void disable(); II Java 1.0 public void enable(); II Java 1.0 public void enable (boolean cond); II Java 1.0 public String getLabel(); public MenuShortcut getShortcut(); II Java 1.1 public boolean isEnabled() ; public String paramString(); public synchronized void removeActionListener(ActionListener 1);

II Java 1.1 public void setActionCommand(String command); II Java 1.1 pUblic synchronized void setEnabled(boolean b); II Java 1.1 pUblic void setLabel(String label); public void setShortcut(MenuShortcut s); II Java 1.1

Ap9.2.29 Class java.awt.MenuShortcut

The MenuShortcut class has been added with Java 1.1. It represents a keystroke used to select a Menu I tern. The following are defined:

II Constructors public MenuShortcut(int key); II Java 1.1 public MenuShortcut(int key, boolean useShiftModifier); II Java 1.1

II Methods public boolean equals(MenuShortcut s); II Java 1.1 public int getKey(); II Java 1.1 public String toString(); II Java 1.1 public boolean usesShiftModifier(); II Java 1.1

Java reference 1519

Ap9.2.30 Class jovo.owt.Ponel

The Panel class provides space into which an application can attach a component. The following are defined:

II Constructors public Panel(); public Panel(LayoutManger layout); II Java 1.1

II Methods public void addNotify();

Ap9.2.31 Class jovo.owt.Point

The Point class represents an (x, y) co-ordinate. The following are defined:

II Fields public int x; public int y;

II Constructors public Point(); II Java 1.1 public Point(Point p); II Java 1.1 public Point(int x, int y);

II Methods public boolean equals(Object obj); public Point getLocation(); II Java 1.1 public int hashCode(); public void move (int x, int y); public void setLocation(Point p); II Java 1.1 public void setLocation(int x, int y); II Java 1.1 public String toString(); public void translate(int dx, int dy);

Ap9.2.32 Class javo.awt.Polygon

The Polygon class consists of an array of (x, y), which define the sides of a polygon. The following are defined:

II Fields public int npoints, xpoints[) ,ypoints[];

II Constructors public Polygon(); public Polygon(int xpoints[), int ypoints[), int npoints);

I I Methods public void addPoint(int x, int y); public boolean contains (Point p); II Java 1.1 public boolean contains (int x, int y); II Java 1.1 public Rectangle getBoundingBox(); II Java 1.0 public Rectangle getBounds(); II Java 1.1 public boolean inside(int x, int y); II Java 1.0

Ap9.2.33 Class jovo.owt.PopupMenu

The PopupMenu class has been added with Java 1.1. It represetns a pop-up menu rather than a pull-down menu. The following are defined:

1520 Handbook of the Internet

II Constructors public PopupMenu(); II Java 1.1 public PopupMenu(String label); II Java 1.1

II Methods public synchronized void addNotify(); II Java 1.1 public void show(Component origin, int x, int y); II Java 1.1

Ap9.2.34 Class java.awt.Rectangle

The Rectangle class defines an area defined by its top-left (x, y) co-ordinate, its width and its height. The following are defined:

II Fields public int height, width, x, y;

II Constructors public Rectangle(); public Rectangle(Rectangle r); II Java 1.1 public Rectangle(Dimension d); public Rectangle(int width, int height); public Rectangle(int x, int y, int width, int height); public Rectangle(Point p); public Rectangle(Point p, Dimension d); II Methods public void add(int newx, int newy); public void add (Point pt) ; public void add (Rectangle r); public boolean contains (Point p); II Java 1.1 public boolean contains (int x, int y); II Java 1.1 public boolean equals (Object obj); public Rectangle getBounds(); II Java 1.1 public Point getLocation(); II Java 1.1 public Dimension getSize(); II Java 1.1 public void grow(int h, int v) ; public int hashCode(); public boolean inside(int x, int y); II Java 1.0 public Rectangle intersection(Rectangle r); public boolean intersects(Rectangle r); public boolean isEmpty(); public void move (int x, int y); I I Java 1.0 public void reshape(int x, int y, int width, int height); II Java 1.0 public void resize(int width, int height); II Java 1.0 public void setBounds(Rectangle r); II Java 1.1 public void setBounds(int x, int y, int width, int height); II Java 1.1 public void setLocation(Point p); II Java 1.1 public void setLocation(int x, int y); II Java 1.1 public void setSize(Dimension d); II Java 1.1 public void setSize (int x, int y); I I Java 1.1 public String toString() ; public void translate(int dx, int dy); public Rectangle union(Rectangle r);

Ap9.2.35 Class java.awt.Scrolibar

The Scrollbar class is a convenient means of allowing a user to select from a range of val­ues. The following are defined:

II Fields public final static int HORIZONTAL, VERTICAL;

II Constructors

Java reference 1521

public Scrollbar(); public Scrollbar(int orientation); public Scrollbar(int orientation, int value, int visible, int minimum,

int maximum);

II Methods public synchronized void addAdjustmenuListener(AdjustmentListener 1);

II Java 1.1 public void addNotify() ; public int getBlocklncrement(); II Java 1.1 public int getLinelncrement(); II Java 1.0 public int getMaximum() ; public int getMinimum(); public int getOrientation(); public int getPagelncrement(); public int getUnitlncrement(); public int getValue();

II Java 1.0 II Java 1.1

public int getVisible(); II Java 1.0 protected String paramString() ; public void setLinelncrement(int 1); II Java 1.0 public synchronized void setMaximum(int max); II Java 1.1 public synchronized void setMinimum(int min); II Java 1.1 public synchronized void setOrientation(int orien); II Java 1.1 public void setPagelncrement(int 1); II Java 1.0 public void setValue(int value); public void setValues(int value, int visible, int minimum, int maximum); public void setVisibleAmount(int am); II Java 1.1

Ap9.2.36 Class java.awtJextArea

The TextArea class allows for a multi-line area for displaying text. The following are de­fined:

II Constructors public TextArea(); public TextArea(int rows, int cols); public TextArea(String text); public TextArea(String text, int rows, int cols); public TextArea(String text, int rows, int cols, int scrollbars);

II Java 1.1 II Constants public static final int SCROLLBARS_BOTH; II Java 1.1 public static final int SCROLLBARS_HORIZONTAL_ONLY; II Java 1.1 public static final int SCROLLBARS_NONE; II Java 1.1 public static final int SCROLLBARS_VERTICAL_ONLY; II Java 1.1

II Methods public void addNotify(); public synchronized void append(String str); II Java 1.1 public void appendText(String str); II Java 1.0 public int getColumns(); public Dimension getMinimumSize(int rows, int cols); II Java 1.1 public Dimension getMinimumSize(); II Java 1.1 public Dimension getPreferredSize(int rows, int cols); II Java 1.1 public Dimension getPreferredSize(); II Java 1.1 public int getRows(); public int getScrollbarVisibility(); II Java 1.1 public void insertText(String str, int pos); II Java 1.1 public Dimension minimumSize(); II Java 1.0 public Dimension minimumSize(int rows, int cols); II Java 1.0 protected String paramString() ; public Dimension preferredSize(); II Java 1.0 public Dimension preferredSize(int rows, int cols); II Java 1.0

1522 Handbook of the Internet

public void replaceText(String str, int start, int end); public void setColumns(int cols); II Java 1.1 public void setRows(int rows); II Java 1.1

Ap9.2.37 Class jovo.owt.TextComponent

II Java 1.0

The TextComponent class is the superclass of any component that allows the editing of some text. The following are defined:

II Methods public void addTextListener(TextListener 1); II Java 1.1 public int getCaretPosition(); II Java 1.1 public String getSelectedText(); public int getSelectionEnd() ; public int getSelectionStart(); public String getText(); public boolean isEditable(); protected String paramString(); public void removeNotify(); public void removeTextListener(TextListener 1); II Java 1.1 public void select(int selStart, int selEnd); public void selectAll(); public void setCaretPosition(int position); II Java 1.1 public void setEditable(boolean t); public synchronized setSelectionEnd(int selectionEnd); II Java 1.1 public synchronized setSelectionStart(int selectionStart); II Java 1.1 public void setText(String t);

Ap9.2.38 Class jovo.owtJextField

The TextField class is a component that presents the user with a single editable line of text. The following are defined:

II Constructors public TextField() ; public TextField(int cols); public TextField(String text) ; public TextField(String text, int cols);

II Methods public synchronized void addActionListener(ActionListener 1); II Java 1.1 public void addNotify() ; public boolean echoCharIsSet(); public int getColumns(); public char getEchoChar() ; public Dimension getMinimumSize(int cols); II Java 1.1 public Dimension getMinimumSize(); II Java 1.1 public Dimension getPreferredSize(int cols); II Java 1.1 public Dimension getPreferredSize(); II Java 1.1 public Dimension minimumSize(); II Java 1.0 public Dimension minimumSize(int cols); II Java 1.0 protected String paramString() ; public Dimension preferredSize(); II Java 1.0 public Dimension preferredSize(int cols); II Java 1.0 public void setColumns(int cols); II Java 1.1 public void setEchoChar(char c); II Java 1.1 public void setEchoCharacter(char c); II Java 1.0

Ap9.2.39 Class jovo.owtJoolkit

The Toolki t class is the abstract superclass of all actual implementations of the Abstract

lava reference 1523

Window Toolkit. The following are defined:

II Constructors public Toolkit();

II Methods public abstract int beep(); II Java 1.1 public abstract int checkImage(Image image, int width,

int height, ImageObserver observer) ; public abstract Image createImage(ImageProducer producer); public Image createImage(byte[] imagedatea); II Java 1.1 public Image createImage(byte[] imagedata, int imageoffset,

int image length) ; II Java 1.1 public abstract ColorModel getColorModel(); public static Toolkit getDefaultToolkit(); public abstract String[] getFontList(); public abstract FontMetrics getFontMetrics(Font font); public abstract Image getImage(String filename); public abstract Image getImage(URL urI); public int getMenuShortcutKeyMask(); II Java 1.1 public abstract PrintJob getPrintJob(Frame frame, String jobtitle,

Properties props); II Java 1.1 public abstract int getScreenResolution(); public abstract Dimension getScreenSize(); public abstract Clipboard getSystemClipbaord(); II Java 1.1 public abstract EventQueue getSystemEventQueue(); II Java 1.1 public abstract boolean prepareImage(Image image, int width,

int height, ImageObserver observer) ; public abstract void sync();

Ap9.2.40 Class java.awt.Window

The Window class is the top-level window; it has no borders and no menu bar. The following are defined:

II Constructors public Window(Frame parent) ; II Methods public void addNotify() ; public synchronized void addWindowListener(WindowListener 1); II Java 1.1 public void dispose(); public Component getFocusOwner(); II Java 1.1 public Locale getLocale(); II Java 1.1 public Toolkit getToolkit(); public final String getWarningString(); public boolean isShowing(); II Java 1.1 public void pack(); public postEvent(Event e); II Java 1.1 public synchronized void removeWindowListener(WindowListener 1); public void show() ; public void toBack(); public void toFront();

Ap9.3 Package java.awt.datatransfer Ap9.3.1 Class java.awt.datatransfer.Clipboard

The Clipboard class has been added with Java 1.1. It represents a clipboard onto which data can be transferred using cut-and-paste techniques. The following are defined:

1524 Handbook of the Internet

II Constructors public Clipboard(String name); II Java 1.1

II Methods public synchronized Transferable getContents(Object requestor);

II Java 1.1 public String getName(); II Java 1.1 public synchronized void setContents(Transferable contents,

Clipboard owner); II Java 1.1

Ap9.4 Package java.awt.event Ap9.4.1 Class java.awt.event.ActionEvent

The ActionEvent class has been added with Java 1.1. It occurs when a event happens for a Button, List, MenuItem or TextField. The following are defined:

II Constructors public ActionEvent(Object src, String cmd); II Java 1.1

II Methods public String getActionCommand(); II Java 1.1 public int getModifiers(); II Java 1.1 public int paramString(); II Java 1.1

Ap9.4.2 Interface java.awt.event.ActionListener

The ActionListener interface has been added with Java 1.1. It defines the method which is called by anActionEvent. The following is defined:

public void actionPerformed(ActionEvent e); II Java 1.1

Ap9.4.3 Class java.awt.event.AdjustmentEvent

The AdjustmentEvent class has been added with Java 1.1. It occurs when a event happens for a Scrollbar. The following are defined:

II Constructors public AdjustmentEvent(Object src, int id, int type, int value); II Java 1.1

II Methods public Adjustable getAdjustable(); II Java 1.1 public int getAdjustmentType(); II Java 1.1 public int getValue(); II Java 1.1 public String paramString(); II Java 1.1

Ap9.4.4 Class java.awt.event.AdjustmentListener

The AdjustmentListener interface has been added with Java 1.1. It defines the method which is called by an Adj ustmentEvent. The following is defined:

public void adjustmentValueChanged(AdjustmentEvent e); II Java 1.1

Ap9.4.S Class java.awt.event.ComponentEvent

The ComponentEvent class has been added with Java 1.1. It occurs when a event happens for a Component. The following are defined:

II Constructors

lava reference 1525

public ComponentEvent(Object src, int id, int type, int value);

II Methods public Component getComponent(); II Java 1.1 public String paramString(); II Java 1.1

Ap9.4.6 Class java.awt.event.ComponentListener

The ComponentListener interface has been added with Java 1.1. It defines the method which is called by a ComponentEvent. The following are defined:

public void componentHidden(ComponentEvent e); II Java 1.1 public void componentMoved(ComponentEvent e) ; II Java 1.1 public void componentResized(ComponentEvent e) ; I I Java 1.1 public void componentShown(ComponentEvent e); II Java 1.1

Ap9.4.7 Class java.awt.event.ContainerEvent

The Component Event class has been added with Java 1.1. It occurs when a event happens for a Container. The following are defined:

II Constructors public ContainerEvent(Component src, int id, Compoent child);

II Methods public Component getChild(); II Java 1.1 public Component getContainer(); II Java 1.1 public String paramString(); II Java 1.1

Ap9.4.8 Class java.awt.event.ContainerListener

The ContainerListener interface has been added with Java 1.1. It defines the method which is called by a ContainerEvent. The following are defined:

public void componentAdded(ComponentEvent e); II Java 1.1 public void componentRemoved(ComponentEvent e); II Java 1.1

Ap9.4.9 Class java.awt.event.ltemEvent

The ItemEvent class has been added with Java 1.1. It occurs when a event happens for a Container. The following are defined:

II Constructors public ItemEvent(ItemSelectable src, int id, Object item, int stateChanged);

II Java 1.1

II Methods public Object getltem(); II Java 1.1 public ItemSelectable getltemSelectable(); II Java 1.1 public int getStateChange(); II Java 1.1 public String paramString(); II Java 1.1

Ap9.4.10 Class java.awt.event.ltemListener

The ItemListener interface has been added with Java 1.1. It defines the method which is called by an ItemEvent. The following is defined:

public void itemStateChanged(ItemEvent e); II Java 1.1

1526 Handbook of the Internet

Ap9.4.11 Class java.awt.event.KeyEvent

The KeyEvent class has been added with Java 1.1. It occurs when a event happens for a keypress. The following are defined:

II Constructors public KeyEvent(Component src, int id, long when, int modifiers,

int keyCode, char keyChar); II Java 1.1

II Constants public static final int KEY_LAST, KEY_PRESSED, KEY_RELEASED, KEY_TYPED;

II Undefined Key and Character (Java 1.1) public static final int VK_UNDEFINED, CHAR_UNDEFINED;

II Alphanumeric keys (Java 1.1) public static final int VK_A, VK_B, VK C, VK_D, VK_E, VK_F, VK_G, VK H; public static final int VK_I, VK_J, VK_K, VK_L, VK_M, VK_N, VK_O, VK_P; public static final int VK_Q, VK_R, VK_S, VK_T, VK_U, VK_V, VK_W, VK X; public static final int VK_Y, VK_Z; public static final int VK_SPACE; public static final int VK_O, VK_l, VK_2, VK_3, VK_4, VK_5, VK_6, VK_7; public static final int VK_S, VK_9; public static final int VK_NUMPADO, VK_NUMPAD1, VK_NUMPAD2, VK_NUMPAD3; public static final int VK_NUMPAD4, VK_NUMPADS, VK_NUMPAD6, VK_NUMPAD7; public static final int VK_NUMPADS, VK_NUMPAD9;

II Control keys (Java 1.1) public static final int VK_BACK_SPACE, VK_ENTER, VK_ESCAPE, VK_TAB;

II Modifier keys (Java 1.1) public static final int VK_ALT, VK_CAPS LOCK, VK_CONTROL, VK_META, VK_SHIFT;

II Function keys (Java 1.1) public static final int VK_FO, VK_Fl, VK_F2, VK_F3, VK_F4, VK_FS, VK_F6; public static final int VK_F7, VK_FS, VK_F9; public static final int VK_PRINTSCREEN, VK_SCROLL_LOCK, VK_PAUSE; public static final int VK_PAGE_DOWN, VK_PAGE_UP; public static final int VK_DOWN, VK_UP, VK_RIGHT, VK_LEFT; public static final int VK_END, VK_HOME, VK_ACCEPT, VK_NUM_LOCK, VK_CANCEL; public static final int VK_CLEAR, VK_CONVERT, VK_FINAL, VK HELP; public static final int VK_KANA, VK_KANJI, VK_MODECHANGE, VK_NONCONVERT;

II Punctuation keys (Java 1.1) public static final int VK_ADD, VK_BACK_QUOTE, VK_BACK_SLASH; public static final int VK_CLOSE_BRACKET, VK_COMMA, VK_DECIMAL; public static final int VK_DIVIDE, VK_EQUALS, VK_MULTIPLY; public static final int VK_OPEN_BRACKET, VK_PERIOD, VK_QUOTE; public static final int VK SEMICOLON, VK_SEPARATER, VK_SLASH; public static final int VK_SUBTRACT;

II Methods public void getKeyChar() ; II Java 1.1 public int getKeyCode() ; II Java 1.1 public boolean isActionKey() ; II Java 1.1 public String paramString(); II Java 1.1 public void setKeyChar(char keyChar); II Java 1.1 public void setKeyCode(int keyCode) ; II Java 1.1 public void setModifiers(int modifiers); II Java 1.1

Ap9.4.12 Class java.awt.event.Keylistener

The KeyListener interface has been added with Java 1.1. It defines the method which is called by a KeyEvent. The following is defined:

public void keyPressed(KeyEvent e); II Java 1.1 public void keyReleased(KeyEvent e); II Java 1.1 public void keyTyped(KeyEvent e); II Java 1.1

Java reference 1527

Ap9.4.13 Class java.awt.event.MouseEvent

The MouseEvent class has been added with Java 1.1. It occurs when a event happens for a MouseEvent. The following are defined:

II Constructors public MouseEvent(Component src, int id, long when, int modifiers, int x,

int y, intclickCount, boolean popupTrigger); II Java 1.1

II Constants public static final int MOUSE_CLICKED, MOUSE_DRAGGED; public static final int MOUSE_ENTERED, MOUSE_EXITED; public static final int MOUSE_FIRST, MOUSE_LAST; public static final int MOUSE_MOVED, MOUSE_PRESSED; public static final int MOUSE_RELEASED;

II Methods public int getClickCount(); II Java 1.1 public Point getPoint(); II Java 1.1 public int getX(); II Java 1.1 public int gety(); II Java 1.1 public boolean isPopupTrigger(); II Java 1.1 public String paramString(); II Java 1.1 public synchronized void translatePoint(int x, int y); II Java 1.1

Ap9.4.14 Class java.awt.event.MouseListener

The MouseListener interface has been added with Java 1.1. It defines the method which is called by a mouse click event. The following are defined: public void mouseClicked(MouseEvent e); II Java 1.1 public void mouseEntered(MouseEvent e); II Java 1.1 public void mouseExited(MouseEvent e); II Java 1.1 public void mousePressed(MouseEvent e); II Java 1.1 public void mouseReleased(MouseEvent e); II Java 1.1

Ap9.4.1S Class java.awt.event.MouseMouseListener

The MouseMouseListener interface has been added with Java 1.1. It defines the method which is called by a mouse drag or move event. The following are defined:

public void mouseDragged(MouseEvent e); II Java 1.1 public void mouseMoved(MouseEvent e); II Java 1.1

Ap9.4.16 Class java.awt.eventTextEvent

The TextEvent class has been added with Java 1.1. It occurs when a event happens for an event within TextField, TextArea or other TextComponent. The following are defined:

II Constructors public TextEvent(Object src, int id); II Java 1.1

II Constants public static final int TEXT_FIRST, TEXT_LAST; public static final int TEXT_VALUE_CHANGED;

II Methods public String paramString(); II Java 1.1

1528 Handbook of the Internet

Ap9.4.17 Class jovo.owt.event.TextListener

The TextListener interface has been added with Java 1.1. It defines the method which is called by a TextEvent. The following is defined:

public void textValueChanged(TextEvent e); II Java 1.1

Ap9.4.18 Class jovo.owt.eventWindowEvent

The WindowEvent class has been added with Java 1.1. It occurs when an event happens within a Window object. The following are defined:

II Constructors public WindowEvent(Window src, int id); II Java 1.1

II Constants public static final int WINDOW_ACTIVATED, WINDOW_CLOSED; public static final int WINDOW_CLOSING, WINDOW_DEACTIVATED; public static final int WINDOW_DEICONIFIED, WINDOW_FIRST; public static final int WINDOW_ICONIFIED, WINDOW_LAST; public static final int WINDOW_OPENED;

II Methods public Window getWindow(); II Java 1.1 public String paramString(); II Java 1.1

Ap9.4.19 Class jovo.owt.event.WindowListener

The WindowListener interface has been added with Java 1.1. It defines the method which is called by an WindowEvent. The following are defined:

public void windowActivated(WindowEvent e); II Java 1.1 public void windowClosed(WindowEvent e); II Java 1.1 public void windowDeactivated(WindowEvent e); II Java 1.1 public void windowDeiconified(WindowEvent e); II Java 1.1 public void windowIconified(WindowEvent e); II Java 1.1 public void windowOpened (WindowEvent e); 1/ Java 1.1

Ap9.S Package java.awt.image This package has been added with Java 1.1 and supports image processing classes.

Ap9.6 Packagejava.io

Ap9.6.1 Class jovo.io.BufferedOutputStreom

The BufferedOutputStream implements a buffered output stream. These streams allow the program to write to an input device without having to worry about the interfacing method. The following are defined:

II Fields protected byte bufll; protected int count;

II Constructors

Java reference 1529

public BufferedOutputStream(OutputStream out) ; public BufferedOutputStream(OutputStream out, int size);

II Methods public void flush(); public void write (byte b[], int off, int len); public void write (int b);

Ap9.6.2 Class javaJo.BufferedReader

The BufferReader class has been added with Java 1.1. It represents a buffered character input stream. The following are defined:

II Constructors public BufferedReader(Reader in, int sz); II Java 1.1 public BufferedReader(Reader in); II Java 1.1

II Methods public void close() throws IOException; II Java 1.1 public void mark(int readAheadLimit) throws IOException;11 Java 1.1 public boolean markSupported() throws IOException; II Java 1.1 public int read() throws IOException; II Java 1.1 public int read(char [] cbuf, int off, int len) throws IOException; II Java 1.1 public String readLine() throws IOException; II Java 1.1 public boolean ready() throws IOException; II Java 1.1 public void reset() throws IOException; II Java 1.1 public long skip (long n) throws IOException; II Java 1.1

Ap9.6.3 Class java.io.BufferedWriter

The BufferWriter class has been added with Java 1.1. It represents a buffered character output stream. The following are defined:

II Constrsuctors public BufferedWriter(Writer out, int sz); II Java 1.1 public BufferedWriter(Writer in); II Java 1.1

II Methods public void close() throws IOException; II Java 1.1 public void flush() throws IOException; II Java 1.1 public void newLine() throws IOException; II Java 1.1 public void write(int c) throws IOException; II Java 1.1 public void write (char [] cbuf, int off, int len) throws IOException;

II Java 1.1

Ap9.6.4 Class javaJo.ByteArraylnputStream

The ByteArraylnputStream class supports input from a byte array. The following are defined:

II Fields protected byte buf[]; protected int count; protected int mark; II Java 1.1 protected int pos;

II Constructors public ByteArraylnputStream(byte buf[]); public ByteArraylnputStream(byte buf[], int offset, int length);

1530 Handbook of the Internet

II Methods public int available(); public void mark(int markpos); II Java 1.1 public boolean markSupported(); II Java 1.1 public int read(); public int read(byte b[], int off, int len); public void reset(); public long skip(long n);

Ap9.6.S Class java.io.ByteArrayOutputStream

The ByteArrayOutputStream class allows supports output to a byte array. The following are defined:

II Fields protected byte buf[l; protected int count;

II Constructors public ByteArrayOutputStream() ; public ByteArrayOutputStream(int size);

II Methods public void reset(); public int size(); public byte[] toByteArray(); public String toString(); public String toString(int hibyte); II Java 1.0 public String toString(String enc); II Java 1.1 public void write (byte b[], int off, int len); public void write(int b); public void writeTo(OutputStream out);

Ap9.6.6 Interface java.io.Datalnput

The DataInput interface gives support for streams to read in a machine-independent way. The following are defined:

II Methods public abstract boolean readBoolean(); public abstract byte readByte() ; public abstract char readChar() ; public abstract double readDouble() ; public abstract float readFloat() ; public abstract void readFully(byte b[l) ; public abstract void readFully(byte b[] , int off, int len); public abstract int readlnt() ; public abstract String readLine() ; public abstract long readLong(); public abstract short readShort() ; public abstract int readUnsignedByte() ; public abstract int readUnsignedShort() ; public abstract String readUTF(); public abstract int skipBytes(int n);

Ap9.6.7 Class java.io.DatalnputStream

The DataInputStream class allows an application to read data in a machine-independent way. It uses standard Unicode strings which conforms to the UTF-Sl specification. The fol­lowing are defined:

Java reference 1531

II Constructors public DatalnputStream(InputStream in) ;

II Methods public final int read(byte b[]); public final int read(byte b[], int off, int len) ; public final boolean readBoolean(); public final byte readByte(); public final char readChar(); public final double readDouble(); public final float readFloat(); public final void readFully(byte b []); public final void readFully(byte b[L int off, int len) ; public final int readlnt() ; public final String readLine(); II Java 1.0 public final long readLong(); public final short readShort(); public final int readUnsignedByte() ; public final int readUnsignedShort() ; public final String readUTF(); public final static String readUTF(Datalnput in) ; public final int skipBytes(int n);

Ap9.6.8 Interface java.io.DataOutput

The DataOutput interface gives support for streams to write in a machine-independent way. The following are defined:

II Methods public abstract void write(byte b[]); public abstract void write(byte b[], int off, int len) ; public abstract void write(int b); public abstract void writeBoolean(boolean v) ; public abstract void writeByte(int v); public abstract void writeBytes(String s) ; public abstract void writeChar(int v); public abstract void writeChars(String s) ; public abstract void writeDouble(double v); public abstract void writeFloat(float v) ; public abstract void writelnt(int v); public abstract void writeLong(long v) ; public abstract void writeShort(int v); public abstract void writeUTF(String str) ;

Ap9.6.9 Class java.io.DataOutputStream

The DataOutputStream class allows an application to write data in a machine­independent way. It uses standard Unicode strings which conforms to the UTF-81 specifica­tion. The following are defined:

II Fields protected int written; II Constructors public DataOutputStream(OutputStream out);

II Methods public void flush(); public final int size(); public void write(byte b[], int off, int len); public void write(int b);

1532 Handbook of the Internet

public final void writeBoolean(boolean v) ; public final void writeByte(int v); public final void writeBytes(String s) ; public final void writeChar(int v); public final void writeChars(String s) ; public final void writeDouble(double v); public final void writeFloat(float v); public final void writelnt(int v); public final void writeLong(long v); public final void writeShort(int v); public final void writeUTF(String str) ;

Ap9.6.10 Class java.io.EOFException

Exception that identifies that the end-of-file has been reached unexpectedly during input. The following are defined:

II Constructors public EOFException() ; public EOFException(String s);

Ap9.6.11 Class java.io.File

The File class implements the file manipulation operations in an operating system inde­pendent way. The following are defined:

II Fields public final static String pathSeparator; public final static char pathSeparatorChar; public final static String separator; public final static char separatorChar;

II Constructors public File(File dir, String name); public File(String path); public File(String path, String name);

II Methods public boolean canRead() ; public boolean canWrite() ; public boolean delete() ; public boolean equals (Object obj) ; public boolean exists(); public String getAbsolutePath() ; public String getCanonicalPath() ; II public String getName() ; public String getParent() ; public String getPath() ; public int hashCode() ; public boolean isAbsolute() ; public boolean isDirectory() ; public boolean isFile(); public long lastModified () ; public long length() ; public String [] list ();

Java 1.1

public String [] list (FilenameFilter filter) ; public boolean mkdir(); public boolean mkdirs(); public boolean renameTo(File dest) ; public String toString() ;

Java reference 1533

Ap9.6.12 Class java.io.FileDescriptor

The FileDescriptor class provides a way to cope with opening files or sockets. The fol­lowing are defined:

II Fields public final static FileDescriptor err, in, out;

II Constructors public FileDescriptor();

II Methods public void sync(); II Java 1.1 public boolean valid();

Ap9.6.13 Class java.io.FilelnputStream

The FilelnputStream class provides supports for an input file. The following are defined:

II Constructors public FilelnputStream(File file); public FilelnputStream(FileDescriptor fdObj); public FilelnputStream(String name) ;

II Methods public int available(); public void close(); protected void finalize(); public final FileDescriptor getFD(); public int read(); public int read(byte b[]); public int read(byte b[], int off, int len); public long skip(long n);

Ap9.6.14 Interface java.io.FilenameFilter

The F i 1 ename F i 1 e interface is used to filter filenames. The following is defined:

II Methods public abstract boolean accept (File dir, String name);

Ap9.6.1S Class java.io.FileNotFoundException

Exception that identifies that a file could not be found. The following are defined:

II Constructors public FileNotFoundException(); public FileNotFoundException(String s);

Ap9.6.16 Class java.io.FileOutputStream

The FileOutputStream class provides supports for an output file. The following are de­fined:

II Constructors public FileOutputStream(File file); public FileOutputStream(String name, boolean append) ;11 Java 1.1 public FileOutputStream(Fi1eDescriptor fdObj); public FileOutputStream(String name) ;

1534 Handbook of the Internet

II Methods public void close(); protected void finalize(); public final FileDescriptor getFD(); public void write (byte b[]); public void write (byte b(], int off, int len); public void write (int b) ;

Ap9.6.17 Class java.io.FilterlnputStream

The Fil terInputStream class is the superclass of all classes that filter input streams. The following are defined:

II Fields protected InputStream in;

II Constructors protected FilterInputStream(InputStream in) ;

II Methods public int available(); public void close(); public void mark(int readlimit); public boolean markSupported(); public int read(); public int read(byte b[]); public int read(byte b[], int off, int len); public void reset(); public long skip(long n) ;

Ap9.6.18 Class java.io.FilterOutputStream

The Fil terOutputStream class is the superclass of all classes that filter output streams. The following are defined:

II Fields protected Output Stream out;

II Constructors public FilterOutputStream(OutputStream out) ;

II Methods public void close(); public void flush(); public void write (byte b[]); public void write (byte b[], int off, int len); public void write(int b);

Ap9.6.19 Class java.io.lnputStream

The InputStream class is the superclass of all classes representing an input stream of bytes. The following are defined:

II Constructors public InputStream();

II Methods public int available(); public void close() ; public void mark(int readlimit);

Java reference 1535

public boolean markSupported() ; public abstract int read(); public int read(byte b[]); public int read(byte b[], int off, int len); public void reset(); public long skip(long n);

Ap9.6.20 Class java.io.lnterruptedIOException

Exception that identifies that an 1/0 operation has been interrupted. The following are de­fined:

II Fields public int bytesTransferred;

II Constructors public InterruptedIOException(); public InterruptedIOException(String s) ;

Ap9.6.21 Class java.io.IOException

Exception that identifies that an I/O exception has occurred. The following are defined:

II Constructors public IOException(); public IOException(String s) ;

Ap9.6.22 Class java.io.LineNumberlnputStream

The LineNumberInputStream class provides support for the current line number in an input stream. Each line is delimited by either a carriage return character ('\r'), new-line character ('\n') or both together. The following are defined:

II Constructors public LineNumberInputStream(InputStream in) ;

II Methods public int available(); public int getLineNumber(); public void mark (int readlimit); public int read(); public int read(byte b[], int off, int len); public void reset(); public void setLineNumber(int lineNumber); public long skip(long n);

Ap9.6.23 Class java.io.OutputStream

The InputStream class is the superclass of all classes representing an output stream of bytes. The following are defined:

II Constructors public OutputStream() ;

II Methods public void close(); public void flush(); public void write (byte b[]); public void write (byte b[], int off, int len);

1536 Handbook of the Internet

public abstract void write(int b);

Ap9.6.24 Class java.io.PipedlnputStream

The PipedInputStream class provides support for pipelined input communications. The following are defined:

II Constructors public PipedlnputStream() ; public PipedlnputStream(PipedOutputStream src) ;

II Methods public void close(); public void connect(PipedOutputStream src); public int read(); public int read(byte b[l, int off, int len);

Ap9.6.25 Class java.io.PipedOutputStream

The PipedOutputStream class provides support for pipelined output communications. The following are defined:

II Constructors public PipedOutputStream(); public PipedOutputStream(PipedlnputStream snk) ;

II Methods public void close(); public void connect (PipedlnputStream snk); public void write (byte b[l, int off, int len); public void write(int b);

Ap9.6.26 Class java.io.PrintStream

The PrintStream class provides support for output print streams. The following are de­fined:

II Constructors public PrintStream(OutputStream out); II Java 1.0 public PrintStream(OutputStream out, boolean autoflush) ;11 Java 1.0

II Methods public boolean checkError(); public void close(); public void flush(); public public public public public public public public public public public public public public public

void void void void void void void void void void void void void void void

print (boolean b) ; print (char c) ; print (char s [l) ; print (double d) ; print (float f) ; print (int i) ; print (long 1) ;

print (Object obj) ; print (String s) ; println() ; println(boolean b); println(char c) ; println(char s [] ) ; println(double d) ; println(float f) ;

Java reference 1537

public void println(int i); public void println(long 1); public void println(Object obj); public void println(String s) ; public void write (byte b[], int off, int len); public void write(int b);

Ap9.6.27 Class java.io.PushbacklnputStream

The PushbacklnputStream class provides support to put bytes back into an input stream. The following are defined:

II Fields protected int pushBack;

II Constructors public PushbacklnputStream(InputStream in);

II Methods public int available(); public boolean markSupported() ; public int read(); public int read(byte bytes[], int offset, int length); public void unread(int ch);

Ap9.6.28 Class java.io.RandomAccessFile

The RandomAccessFile class support reading and writing from a random access file. The following are defined: II Constructors public RandomAccessFile(File file, String mode); public RandomAccessFile(String name, String mode);

II Methods public void close(); public final FileDescriptor getFD(); public long getFilePointer(); public long length() ; public int read(); public int read(byte b[]); public int read(byte b[], int off, int len); public final boolean readBoolean(); public final byte readByte(); public final char readChar(); public final double readDouble(); public final float readFloat(); public final void readFully(byte b[]); public final void readFully(byte b[], int off, int len); public final int readlnt(); public final String readLine(); public final long readLong(); public final short readShort(); public final int readUnsignedByte(); public final int readUnsignedShort(); public final String readUTF(); public void seek(long pos); public int skipBytes(int n); public void write (byte b[]); public void write (byte b[], int off, int len); public void write(int b); public final void writeBoolean(boolean v); public final void writeByte(int v) ;

1538 Handbook of the Internet

public final void writeBytes(String s) ; public final void writeChar(int v); public final void writeChars(String s) ; public final void writeDouble(double v); public final void writeFloat(float v); public final void writeInt(int v); public final void writeLong(long v) ; public final void writeShort(int v); public final void writeUTF(String str) ;

Ap9.6.29 Class java.io.SequencelnputStream

The SequenceInputStream supports the combination of several input streams into a sin­gle input stream. The following are defined:

II Constructors public SequenceInputStream(Enumeration e) ; public SequenceInputStream(InputStream sl, InputStream s2) ;

II Methods public void avialable(); II Java 1.1 public void close(); public int read(); public int read(byte buf[l, int pos, int len);

Ap9.6.30 Class java.io.StreamTokenizer

The StreamTokenizer class splits an input stream into tokens. These tokens can be de­fined by number, quotes strings or comment styles. The following are defined:

II Fields public double nval; public String sval; public int ttype;

II possible values for the ttype field public final static int TT_EOF, TT_EOL, TT_NUMBER, TT_WORD;

II Constructors public StreamTokenizer(InputStream I) ;

II Methods public void commentChar(int ch); public void eolIsSignificant(boolean flag); public int lineno(); public void lowerCaseMode(boolean fl); public int nextToken(); public void ordinaryChar(int ch) ; public void ordinaryChars(int low, int hi); public void parseNumbers(); public void pushBack(); public void quoteChar(int ch); public void resetSyntax() ; public void whitespaceChars(int low, int hi); public void slashStarComments(boolean flag); public String toString() ; public void whitespaceChars(int low, int hi); public void wordChars(int low, int hi);

Java reference 1539

Ap9.6.31 Class java.io.StringBufferlnputStream

The StringBufferlnputStream class supports stream input buffers. The following are defined:

II Fields protected String buffer; protected int count, pos;

II Constructors public StringBufferlnputStream(String s);

II Methods public int available(); public int read(); public int read(byte b[], int off, int len); public void reset(); public long skip(long n);

Ap9.6.32 Class java.io.UTFDataFormatException

Exception that identifies that a malformed UTF-8 string has been read in a data input stream. The following are defined:

II Constructors public UTFDataFormatException(); public UTFDataFormatException(String s);

Ap9.7 Pockagejava.lang Ap9.7.1 Class java.lang.ArithmeticException

Exception that is thrown when an exceptional arithmetic condition has occurred, such as a division-by-zero or a square root of a negative number. The following are defined:

II Constructors public ArithmeticException() ; public ArithmeticException(String s) ;

Ap9.7.2 Class java.lang.ArraylndexOutOfBoundsException

Exception that is thrown when an illegal index term in an array has been accessed. The fol­lowing are defined:

II Constructors public ArraylndexOutOfBoundsException() ; public ArraylndexOutOfBoundsException(int index); public ArraylndexOutOfBoundsException(String s);

Ap9.7.3 Class java.lang.ArrayStoreException

Exception that is thrown when the wrong type of object is stored in an array of objects. The following are defined:

II Constructors public ArrayStoreException();

1540 Handbook of the Internet

public ArrayStoreException(String s) ;

Ap9.7.4 Class javaJang.Boolean

The Boolean class implements the primitive type boolean of an object. Other methods are included for a converting a boolean to a String and vice versa. The following are defined:

public final static Boolean FALSE, TRUE; public final static Boolean TYPE; II Java 1.1

II Constructors public Boolean(boolean value) ; public Boolean(String s);

II Methods public boolean booleanValue(); public boolean equals(Object obj); public static boolean getBoolean(String name) ; public int hashCode() ; public String toString(); public static Boolean valueOf(String s);

Ap9.7.5 Class java.lang.Character

The Character class implements the primitive type character of an object. Other methods are defined for determining the type of a character, and converting characters from upper­case to lowercase and vice versa. The following are defined:

II Constants public final static int MAX_RADIX, MAX_VALUE; public final static int MIN_RADIX, MIN_VALUE; public final static int TYPE; II Java 1.1 II Character type constants public final static byte COMBINING_SPACE_MARK; II Java 1.1 public final static byte CONNECTOR_PUNCUATION, CONTROL; II Java 1.1 public final static byte CURRENCY_SYMBOL, DASH PUNCTUATION; II Java 1.1 public final static byte DIGIT_NUMBER, ENCLOSING_MARK; II Java 1.1 public final static byte END_PUNCTUATION, FORMAT; II Java 1.1 public final static byte LETTER_NUMBER, LINE_SEPERATOR; II Java 1.1 public final static byte LOWERCASE_LETTER, MATH_SYMBOL; II Java 1.1 public final static byte MODIFIER_LETTER, MODIFIER_SYMBOL; II Java 1.1 public final static byte NON_SPACING_MARK, OTHER_LETTER;II Java 1.1 public final static byte OTHER_NUMBER, OTHER_PUNCTUATION; II Java 1.1 public final static byte OTHER_SYMBOL, PARAGRAPH_SEPARATOR;II Java 1.1 public final static byte PRIVATE_USE, SPACE_SEPARATOR; II Java 1.1 public final static byte START_PUNCTUATION, SURROGATE; II Java 1.1 public final static byte TITLECASE_LETTER, UNASSIGNED; II Java 1.1 public final static byte UPPERCASE_LETTER; II Java 1.1

II Constructors public Character(char value);

II Methods public char charValue(); public static int digit(char ch, int radix); public boolean equals (Object obj); public static char forDigit(int digit, int radix); public static char getNumericValue(char ch); II Java 1.1 public static char getType(char ch); II Java 1.1 public static boolean iSDefined(char ch);

Java reference 1541

public static boolean isDigit(char ch) ; public static boolean isISOControl(char ch) ; I I Java l.1 public static boolean isldentifierIgnoreable(char ch) ; II Java l.1 public static boolean isJavalndentierPart(char ch); II Java l.1 public static boolean isJavalndentierStart(char ch); II Java l.1 public static boolean isJavaLetter(char ch); II Java l.0 public static boolean isJavaLetterOrDigit(char ch) ; II Java l.0 public static boolean isLetter(char ch); public static boolean isLetterOrDigit(char ch); public static boolean isLowerCase(char ch); public static boolean isSpace(char ch); II Java l.0 public static boolean isSpaceChar(char ch) ; II Java l.0 public static boolean iSTitleCase(char ch); public static boolean isUnicodeldentifierPart(char ch); II Java l.1 public static boolean isUnicodeldentifierStart(char ch) ;11 Java l.1 public static boolean isUpperCase(char ch); public static boolean isWhitespace(char ch); II Java l.1 public static char toLowerCase(char ch); public String toString () ; public static char toTitleCase(char ch) ; public static char toUpperCase(char ch) ;

Ap9.7.6 Class java,lang.Class

The Class class implements the class Class and interfaces in a running Java application. The following are defined:

II Methods public static Class forName(String className); public ClassLoader getClassLoader(); public Class[] getlnterfaces(); public String getName(); public Class getSuperclass(); public boolean islnterface(); public Object newlnstance(); public String toString();

Ap9.7.7 Class java,lang. ClassCastException

Exception that is thrown when an object is casted to a subclass which it is not an instance. The following are defined:

II Constructors public ClassCastException() ; public ClassCastException(String s);

Ap9.7.8 Class java,lang.Compiler

The Compiler class supports Java-to-native-code compilers and related services. The fol­lowing are defined:

II Methods public static Object command(Object any); public static boolean compileClass(Class clazz); public static boolean compileClasses(String string); public static void disable(); public static void enable();

1542 Handbook of the Internet

Ap9.7.9 Class java.lang.Double

The Double class implements the primitive type double of an object. Other methods are included for a converting a double to a String and vice versa. The following are defined:

II Fields public final static double MAX_VALUE, MIN_VALUE; public final static double NaN, NEGATIVE_INFINITY, POSITIVE_INFINITY; public final static double TYPE; II Java 1.1

II Constructors public Double(double value); public Double(String s);

II Methods public static long doubleToLongBits(double value); public double doubleValue(); public boolean equals(Object obj); public float floatValue(); public int hashCode(); public int intValue(); public boolean isInfinite(); public static boolean isInfinite(double v); public boolean isNaN(); public static boolean isNaN(double v) ; public static double longBitsToDouble(long bits) ; public long longValue(); public String toString(); public static String toString(double d) ; public static Double valueOf(String s);

Ap9.7.10 Class java.lang.Error

Exception that is thrown when there are serious problems that a reasonable application should not try to catch. The following are defined:

II Constructors public Error () ; public Error(String s);

Ap9.7.11 Class java.lang.Exception

Exception that is thrown that indicates conditions that a reasonable application might want to catch.

II Constructors public Exception(); public Exception(String s) ;

Ap9.7.12 Class java.lang.Float

The Float class implements the primitive type float of an object. Other methods are in­cluded for a converting a float to a String and vice versa. The following are defined:

II Fields public final static float MAX_VALUE MIN_VALUE; public final static float NaN, NEGATIVE_INFINITY, POSITIVE_INFINITY; public final static float TYPE; II Java 1.1

II Constructors

Java reference 1543

public Float (double value); public Float(float value); public Float(String s);

II Methods public double doubleValue(); public boolean equals(Object obj); public static int floatToIntBits(float value); public float floatValue(); public int hashCode(); public static float intBitsToFloat(int bits); public int intValue(); public boolean isInfinite(); public static boolean isInfinite(float v); public boolean isNaN() ; public static boolean isNaN(float v); public long longValue(); public String toString(); public static String toString(float f); public static Float valueOf(String s);

Ap9.7.13 Closs java.lang.lllegalAccessError

Exception that is thrown when an application attempts to access or modify a field, or to call a method that it does not have access to. The following are defined:

II Constructors public IllegalAccessError(); public IllegalAccessError(String s);

Ap9.7.14 Closs java.lang.lllegaIArgumentException

Exception that is thrown when a method has been passed an illegal or inappropriate argu­ment. The following are defined:

II Constructors public IllegalArgumentException(); public IllegalArgumentException(String s);

Ap9.7.15 Closs java.lang.lllegaIThreadStateException

Exception that is thrown to indicate that a thread is not in an appropriate state for the re­quested operation. The following are defined:

II Constructors public IllegalThreadStateException(); public IllegalThreadStateException(String s);

Ap9.7.16 Closs java.lang.lndexOutOfBoundsException

Exception that is thrown to indicate that an index term is out of range. The following are defined:

II Constructors public IndexOutOfBoundsException(); public IndexOutOfBoundsException(String s);

1544 Handbook of the Internet

Ap9.7.17 Class java.lang.lnteger

The Integer class implements the primitive type integer of an object. Other methods are included for a converting a integer to a String and vice versa. The following are defined:

II Fields public final static int MAX_VALUE, MIN_VALUE; public final static int TYPE; II Java 1.1

II Constructors public Integer(int value) ; public Integer(String s) ;

II Methods public Integer decode (String nrn); II Java 1.1 public double doubleValue(); public boolean equals (Object obj); public float floatValue(); public static Integer getInteger(String nrn); public static Integer getInteger(String nrn, int val); public static Integer getInteger(String nrn, Integer val) ; public int hashCode(); public int intValue(); public long longValue(); public static int parseInt(String s); public static int parseInt(String s, int radix); public static String toBinaryString(int i); public static String toHexString(int i); public static String toOctalString(int i); public String toString(); public static String toString(int i); public static String toString(int i, int radix); public static Integer valueOf(String s); public static Integer valueOf(String s, int radix);

Ap9.7.18 Class java.lang.lnternalError

Exception that is thrown when an unexpected internal error has occurs. The following are defined:

II Constructors public InternalError(); public InternalError(String s);

Ap9.7.19 Class java.lang.lnterruptedException

Exception that is thrown when a thread is waiting, sleeping. or otherwise paused for a long time and another thread interrupts it using the interrupt method in class Thread. The fol­lowing are defined:

II Constructors public InterruptedException(); public InterruptedException(String s) ;

Ap9.7.20 Class java.lang.long

The Long class implements the primitive type long of an object. Other methods are in­cluded for a converting a long to a String and vice versa. The following are defined:

II Fields

Java reference 1545

public final static long MAX_VALUE, MIN_VALUE; public final static long TYPE; II Java 1.1

II Constructors public Long(long value) ; public Long(String s);

II Methods public double doubleValue() ; public boolean equals (Object obj); public float floatValue(); public static Long getLong(String nm); public static Long getLong(String nm, long val); public static Long getLong(String nm, Long val); public int hashCode(); public int intValue(); public long longValue(); public static long parseLong(String s); public static long parseLong(String s, int radix); public static String toBinaryString(long i); public static String toHexString(long i); public static String toOctalString(long i); public String toString(); public static String toString(long i); public static String toString(long i, int radix); public static Long valueOf(String s); public static Long valueOf(String s, int radix);

Ap9.7.21 Class java. lang. Math

The Ma th class contains methods to perform basic mathematical operations. The following are defined:

II Fields public final static double E' public final static double PI;

II Methods public static double abs(double a); public static float abs(float a); public static int abs(int a); public static long abs(long a); public static double acos(double a); public static double asin(double a); public static double atan(double a) ; public static double atan2(double a, double b); public static double ceil(double a); public static double cos (double a); public static double exp(double a); public static double floor(double a); public static double IEEEremainder(double f1, double f2); public static double log (double a); public static double max (double a, double b) ; public static float max (float a, float b); public static int max(int a, int b); public static long max (long a, long b); public static double min (double a, double b); public static float min (float a, float b); public static int min(int a, int b) ; public static long min (long a, long b); public static double pow (double a, double b) ; public static double random(); public static double rint(double a);

1546 Handbook ofthe Internet

public static long round(double a) ; public static int round (float a) ; public static double sin (double a) ; public static double sqrt(double a) ; public static double tan (double a) ;

Ap9.7.22 Class java.lang.NegativeArraySizeException

Exception that is thrown when an array is created with a negative size.

II Constructors public NegativeArraySizeException(); public NegativeArraySizeException(String s);

Ap9.7.23 Class java.lang.NuliPointerException

Exception that is thrown when an application attempts to use a null pointer. The following are defined:

II Constructors public NullPointerException() ; public NullPointerException(String s) ;

Ap9.7.24 Class java.lang.Number

The Number class contains the superclass of classes for float, double, integer and long. It can be used to convert values into int, long, float or double. The following are defined:

II Methods public abstract double doubleValue(); public abstract float floatValue(); public abstract int intValue(); public abstract long longValue() ;

Ap9.7.25 Class java.lang.NumberFormatException

Exception that is thrown when an application attempts to convert a string to one of the nu­me ric types, but that the string does not have the appropriate format.

II Constructors public NumberFormatException() ; public NumberFormatException(String s);

Ap9.7.26 Class java.lang.Object

The Obj ect class contains the root of the class hierarchy. The following are defined:

II Constructors public Object() ;

II Methods protected Object clone() ; public boolean equals(Object obj); protected void finalize(); public final Class getClass(); public int hashCode(); public final void notify() ; public final void notifyAll(); public String toString();

Java reference 1547

public final void wait(); public final void wait (long timeout); public final void wait (long timeout, int nanos);

Ap9.7.27 Class java.lang.OutOtMemoryError

Exception that is thrown when an application runs out of memory. The following are de­fined:

II Constructors public OutOfMemoryError(); public OutOfMemoryError(String s);

Ap9.7.28 Class java.lang.Process

The Process class contains methods which are used to control the process. The following are defined:

II Constructors public Proeess(); II Methods public abstract void destroy(); public abstract int exitValue(); public abstract InputStream getErrorStream() ; public abstract InputStream getlnputStream() ; public abstract OutputStream getOutputStream(); public abstract int waitFor();

Ap9.7.29 Class java.lang.Runtime

The Runtime class allows the application to interface with the environment in which it is running. The following are defined:

II Methods public Process exee(String command); public Process exee(String command, String envpl]); public Process exee(String cmdarrayl]); public Process exee(String cmdarrayl], String envpl]); public void exit(int status); public long freeMemory(); public void ge(); public InputStream getLoealizedlnputStream(InputStream in); II public Output Stream getLoealizedOutputStream(OutputStream out); public static Runtime getRuntime(); public void load(String filename); public void loadLibrary(String libname); public void runFinalization(); public long totalMemory(); public void traeelnstructions(boolean on); public void traeeMethodCalls(boolean on);

Ap9.7.30 Class java.lang.SecurityManager

Java 1.0 I I Java 1. a

The Securi tyManager class is an abstract class that allows applications to determine if it is safe to execute a given operation. The following are defined:

II Fields protected boolean inCheck;

II Constructors

1548 Handbook of the Internet

protected SecurityManager();

II Methods public void checkAccept(String host, int port) ; public void checkAccess(Thread g); public void checkAccess(ThreadGroup g); public void checkConnect(String host, int port); public void checkConnect(String host, int port, Object context); public void checkCreateClassLoader() ; public void checkDelete(String file); public void checkExec(String cmd); public void checkExit(int status); public void checkLink(String lib); public void checkListen(int port) ; public void checkPackageAccess(String pkg); public void checkPackageDefinition(String pkg) ; public void checkPropertiesAccess(); public void checkPropertyAccess(String key); public void checkRead(FileDescriptor fd); public void checkRead(String file) ; public void checkRead(String file, Object context); public void checkSetFactory() ; public boolean checkTopLevelWindow(Object window) ; public void checkWrite(FileDescriptor fd); public void checkWrite(String file); protected int classDepth(String name) ; protected int classLoaderDepth() ; protected ClassLoader currentClassLoader(); protected Class[] getClassContext(); public boolean getlnCheck(); public Object getSecurityContext(); protected boolean inClass(String name); protected boolean inClassLoader();

Ap9.7.31 Class java.lang.StackOverflowError

Exception that is thrown when a stack overflow occurs. The following are defined:

II Constructors public StackOverflowError(); public StackOverflowError(String s);

Ap9.7.32 Class java.lang.String

The String class represents character strings. As in C, a string is delimted by inverted com­mas. It contains string manipulation methods, such as concat (string concatenation), equals (if string is equal to), toLowCase (to convert a string to lowercase), and so on. The following are defined:

II Constructors public String(); public String(byte ascii[], int hibyte); II Java 1.0 public String(byte ascii[], int hibyte, int offset, int count); II Java 1.0 public String(char value[]); public Stringlchar value[], int offset, int count); public StringlString value) ; public String(StringBuffer buffer) ; public String(byte ascii[], int offset, int length, String enc); II Java 1.1

II Methods

Java reference 1549

public char charAt(int index); public int compareTo(String anotherString); public String concat(String str); public static String copyValueOf(char data[]); public static String copyValueOf(char data[], int offset, unt count); public boolean endsWith(String suffix) ; public boolean equals(Object anObject); public boolean equalsIgnoreCase(String anotherString); public void getBytes(int srcBegin, int srcEnd, byte dst[], int dstBegin); public void getChars(int srcBegin, int srcEnd, char dst[], int dstBegin); public int hashCode(); public int indexOf(int ch); public int indexOf(int ch, int fromIndex); public int indexOf(String str); public int indexOf(String str, int fromIndex); public String intern(); public int lastlndexOf(int ch); public int lastlndexOf(int ch, int fromIndex); public int lastlndexOf(String str); public int lastlndexOf(String str, int fromIndex); public int length(); public boolean regionMatches(boolean ignore Case , int toffset,

String other, int ooffset, int len); public boolean regionMatches(int toffset, String other, int offset, int len); public String replace (char oldChar, char newChar); public boolean startsWith(String prefix) ; public boolean startsWith(String prefix, int toffset); public String substring(int beginIndex); public String substring(int beginIndex, int endIndex); public char[] toCharArray(); public String toLowerCase(); public String toLowerCase(Locale locale); II Java 1.1

public String toString () ; public String toUpperCase() ; public String toUpperCase(Locale locale) ; I I Java 1.1 public String trim() ; public static String valueOf(boolean b); public static String valueOf(char c); public static String valueOf(char data[]); public static String valueOf(char data[], int offset, public static String valueOf(double d) ; public static String valueOf (float f) ; public static String valueOf (int i) ; public static String valueOf(long 1) ;

public static String valueOf(Object obj) ;

Ap9.7.33 Class java.lang.StringBuffer

int count) ;

The StringBuffer class implements a string buffer. The following are defined:

II Constructors public StringBuffer(); public StringBuffer(int length); public StringBuffer(String str); II Methods public StringBuffer append(boolean b) ; public StringBuffer append(char c); public StringBuffer append(char str[]); public StringBuffer append(char str[], int offset, int len); public StringBuffer append(double d) ; public StringBuffer append(float f); public StringBuffer append(int i);

1550 Handbook of the Internet

public StringBuffer append(long 1); public StringBuffer append(Object obj); public StringBuffer append(String str) ; public int capacity(); public char charAt(int index); public void ensureCapacity(int minimumCapacity) ; public void getChars(int srcBegin, int srcEnd, char dst[], int dstBegin); public StringBuffer insert(int offset, boolean b); public StringBuffer insert(int offset, char c); public StringBuffer insert(int offset, char str[]); public StringBuffer insert(int offset, double d); public StringBuffer insert(int offset, float f); public StringBuffer insert(int offset, int i); public StringBuffer insert(int offset, long 1); public StringBuffer insert(int offset, Object obj); public StringBuffer insert(int offset, String str); public int length(); public StringBuffer reverse(); public void setCharAt(int index, char ch); public void setLength(int newLength) ; public String toString();

Ap9.7.34 Class java.lang.StringlndexOutOfBoundsException

Exception that is thrown when a string is indexed with a negative value or a value which is greater than or equal to the size of the string. The following are defined:

II Constructors public StringIndexOutOfBoundsException(); public StringIndexOutOfBoundsException(int index); public StringIndexOutOfBoundsException(String s)

Ap9.7.35 Class java,lang.System

The System class implements a number of system methods. The following are defined:

II Fields public static PrintStream err, in, out; II Methods public static void arraycopy(Object src, int src~osition,

Object dst, int dst_position, int length); public static long currentTimeMillis(); public static void exit (int status); public static void gc(); public static Properties getProperties(); public static String getProperty(String key); public static String getProperty(String key, String def); public static SecurityManager getSecurityManager() ; public static void load(String filename); public static void loadLibrary(String libname); public static void runFinalization(); public static void setProperties(Properties props); public static void setSecurityManager(SecurityManager s);

Ap9.7.36 Class java,lang.Thread

The Thread class implements one or more threads. The following are defined:

II Fields public final static int MAX_PRIORITY, MIN_PRIORITY, NORM_PRIORITY;

Java reference 1551

II Constructors public Thread() ; public Thread(Runnable target); public Thread(Runnable target, String name); public Thread(String name); public Thread(ThreadGroup group, Runnable target); public Thread(ThreadGroup group,Runnable target, String name); public Thread(ThreadGroup group, String name);

II Methods public static int activeCount(); public void checkAccess(); public int countStackFrames(); public static Thread currentThread(); public void destroy(); public static void dumpStack(); public static int enumerate(Thread tarray[]); public final String getName(); public final int getPriority(); public final ThreadGroup getThreadGroup(); public void interrupt(); public static boolean interrupted() ; public final boolean isAlive(); public final boolean isDaemon(); public boolean isInterrupted(); public final void join(); public final void join(long millis); public final void join(long millis, int nanos) public final void resume(); public void runt) ; public final void setDaemon(boolean on) ; public final void setName(String name); public final void setPriority(int newPriority); public static void sleep(long millis); public static void sleep(long millis, int nanos) public void start(); public final void stop(); public final void stop(Throwable obj); public final void suspend(); public String toString() ; public static void yield() ;

Ap9.7.37 Class java.lang.ThreadGroup

The ThreadGroup class implements a set ofthreads. The following are defined:

II Constructors public ThreadGroup(String name); public ThreadGroup(ThreadGroup parent, String name);

II Methods public int activeCount(); public int activeGroupCount(); public final void checkAccess(); public final void destroy() ; public int enumerate(Thread list[]); public int enumerate(Thread list[], boolean recurse); public int enumerate(ThreadGroup list[]); public int enumerate(ThreadGroup list[], boolean recurse); public final int getMaxPriority() ; public final String getName(); public final ThreadGroup getParent(); public final boolean isDaemon();

1552 Handbook of the Internet

public void list(); public final boolean parentOf(ThreadGroup g); public final void resume(); public final void setDaemon(boolean daemon) ; public final void setMaxPriority(int pri) ; public final void stop() ; public final void suspend(); public String toString(); public void uncaughtException(Thread t, Throwable e);

Ap9.7.38 Class java.lang.Throwable

The Throwable class is the superclass of all errors and exceptions in the Java language. The following are defined:

II Constructors public Throwable(); public Throwable(String message) ;

II Methods public Throwable filllnStackTrace(); public String getMessage(); public void printStackTrace(); public void printStackTrace(PrintStream s); public String toString();

Ap9.7.39 Class java.lang.UnknownError

Exception that is thrown when an unknown error occurs. The following are defined:

II Constructors public UnknownError() ; public UnknownError(String s) ;

Ap9.8 Package java.net

Ap9.8.1 Class java.net.DatagramPacket

The DatagramPacket class implements datagram packets. The following are defined:

II Constructors public DatagramPacket(byte[] ibuf, int ilength); public DatagraamPacket (byte [] ibuf, int ilength, inetAddress iadd, int iport);

II Methods public synchronized InetAddress getAddress(); public synchronized byte[] getData(); public synchronized int getLength() ; public synchronized int getPort(); public synchronized void setAddress(InetAddress iaddr); II Java 1.1 public synchronized void setDate(byte[] ibuf); II Java 1.1 public synchronized void setLength(int ilength); II Java 1.1 public synchronized void setPort(int iport); II Java 1.1

Ap9.8.2 Class java.net.lnetAddress

The InetAddress class represents Internet addresses. The following are defined:

Java reference 1553

II Methods public InetAddress[] getAIIByName(String host); public InetAddress getByName(String host); public InetAddress getLocalHost(String host); public boolean equals(Object obj); public byte[] getAddress(); public String getHostAddress(); public String getHostName(); public int hashCode(); public boolean isMulticastAddress(); II Java 1.1 public String toString();

Ap9.B.3 Class java.net.ServerSocket

The ServerSocket class represents servers which listen for a connection from clients. The following are defined:

II Constructors public ServerSocket(int port); public ServerSocket(int port, int backlog); public ServerSocket(int port, int backlog, InetAddress bindAddr);

II Java 1.1 II Methods public Socket accept(); public void close(); public InetAddress getlnetAddress(); public synchronized int getSoTimeout(); II Java 1.1 public String toString() ;

Ap9.B.4 Class java.net.Socket

The Socket class represents socket connections over a network. The following are defined:

II Constructors public Socket (String host, int port); public Socket(InetAddress addr, int port); public Socket(InetAddress addr, int port, boolean stream); II Java 1.0 public Socket(String host, int port, InetAddress addr, int localport);

II Java 1.1 public Socket(InetAddress addr, int port, InetAddress localAddress,

int localport); II Java 1.1

II Methods public synchronized void close(); public InetAddress getlnetAddress(); public InputStream getlnputStream(); public InetAddress getLocalAddress(); II Java 1.1 public int getLocalPort(); public Output Stream getOutputStream() ; public int getPort(); public int getSoLinger(); II Java 1.1 public synchronized int getSoTimed(); II Java 1.1 public boolean getTcpNoDelay(); II Java 1.1 public void setSoLinger(boolean on, int val); II Java 1.1 public synchronized void setSoTimed(int timeout); II Java 1.1 public void setTcpNoDelay(boolean on); II Java 1.1 public String toString();

1554 Handbook of the Internet

Ap9.8.S Class jovo.net.Socketlmpl

The SocketImpl class represents socket connections over a network. The following are defined:

II Methods public abstract void accept (Socketlmpl s); public abstract int available(); public abstract void bind(InetAddress host, int port) ; public abstract void close(); public abstract void connect (String host, int port); public abstract void connect (InetAddress addr, int port); public abstract void create(boolean stream); public FileDescriptor getFileDescriptor(); public InetAddress getlnetAddress(); public abstract InetAddress getlnputStream() ;

Ap9.8.6 Class jovo.net.URL

The URL class represents Uniform Resource Locators. The following are defined:

II Constructors public URL(String protocol, String host, int port, String file) ; public URL(String protocol, String host, String file); public URL(String spec); public URL(URL context, String spec);

II Methods public boolean equals (Object obj); public final Object getContent(); public String getFile(); public String getHost(); public int getPort(); public String getProtocol(); public String getRef(); public int hashcode(); public URLConnection openConnection() ; public final InputStream openStream() ; public boolean sameFile(URL other); public String toExternalForm(); public String toString();

Ap9.9 Package java.utils

Ap9.9.1 Class jovo.utils.BitSet

The Bi tSet class implements boolean operations. The following are defined:

II Constructors public BitSet(); public BitSet(int nbits);

II Methods public void and(BitSet set); public void clear(int bit); public Object clone(); public boolean equals (Object obj); public boolean get (int bit); public int hashCode();

Java reference 1555

public void or(BitSet set); public void set(int bit); public int size(); public String toString() ; public void xor(BitSet set);

Ap9.9.2 Class java.utils.Calender

The Calender class has been added with Java 1.1. It supports dates and times.

Ap9.9.3 Class java.utiis.Date

The Date class supports dates and times. The following are defined:

II Constructors public Date () ; public Date(int year, int month, int date); II Java 1.0 public Date(int year, int month, int date, int hrs, int min); II Java 1.0 public Date (int year, int month, int date, int hrs, int min, int sec);

II Java 1.0 public Date (long date); II Java 1.0 public Date (String s); II Java 1.0

II Methods public boolean after(Date when); public boolean before (Date when); public boolean equals(Object obj); public int getDate(); II Java 1.0 public int getDay(); II Java 1.0 public int getHours(); II Java 1.0 public int getMinutes(); II Java 1.0 public int getMonth(); II Java 1.0 public int getSeconds(); II Java 1.0 public long getTime(); public int getTimezoneOffset(); II Java 1.0 public int getYear(); II Java 1.0 public int hashCode(); public static long parse (String s); public void setDate(int date); II Java 1.0 public void setHours(int hours); II Java 1.0 public void setMinutes(int minutes); II Java 1.0 public void setMonth(int month); II Java 1.0 public void setSeconds(int seconds); II Java 1.0 public void setTime(long time); public void setYear(int year); II Java 1.0 public String toGMTString(); II Java 1.0 public String tOLocaleString(); II Java 1.0 public String toString(); public static long UTC(int year, int month, int date, int hrs, int min,

int sec); II Java 1.0

Ap9.9.4 Class java.utils.Dictionary

The Dictionary class is the abstract parent of any class which maps keys to values. The following are defined:

II Constructors public Dictionary();

II Methods public abstract Enumeration elements();

1556 Handbook of the Internet

public abstract Object get (Object key); public abstract boolean isEmpty(); public abstract Enumeration keys(); public abstract Object put (Object key, Object value); public abstract Object remove(Object key); public abstract int size();

Ap9.9.S Class java.utils.EmptyStackException

The EmptyStackException is thrown when the stack is empty. The following is defined:

II Constructors public EmptyStackException();

Ap9.9.6 Class java.utils.Hashtable

This Hashtable class supports a hashtable which maps keys to values. The following are defined:

II Constructors public Hashtable(); public Hashtable(int initialCapacity); public Hashtable(int initialCapacity, float 10adFactor); II Methods public void clear(); public Object clone(); public boolean contains (Object value); public boolean containsKey(Object key); public Enumeration elements(); public Object get (Object key); public boolean isEmpty() ; public Enumeration keys(); public Object put (Object key, Object value); protected void rehash() ; public Object remove(Object key); public int size(); public String toString();

Ap9.9.7 Class java.utils.NoSuchElementException

The NoSuchElementException is thrown when there are no more elements in the enu­meration. The following are defined:

II Constructors public NoSuchElementException() ; public NoSuchElementException(String s);

Ap9.9.8 Class java.utils.Observable

The Observable class represents an observable object. The following are defined:

II Constructors public Observable() ; II Methods public void addObserver(Observer 0);

protected void clearChanged() ; public int countObservers(); public void deleteObserver(Observer 0); public void deleteObservers(); public boolean hasChanged();

Java reference 1557

public void notifyObservers(); public void notifyObservers(Object arg); protected void setChanged() ;

Ap9.9.9 Class java.ufils.Properfies

The Properties class represents a persistent set of properties. The following are defined:

II Fields protected Properties defaults;

II Constructors public properties(); public Properties(Properties defaults);

II Methods public String getProperty(String key) ; public String getProperty(String key, String defaultValue); public void list (PrintStream out); public void 10ad(InputStream in); public Enumeration propertyNames(); public void save(OutputStream out, String header);

Ap9.9.10 Class java.ufils.Random

The Random class implements pseudo-random generator functions. The following are de­fined: II Constructors public Random() ; public Random(long seed);

II Methods public double nextDouble(); public float nextFloat(); public double nextGaussian() ; public int nextlnt(); public long nextLong(); public void setSeed(long seed) ;

Ap9.9.11 Class java.ufils.Sfack

The Stack class implements a last-in-first-out (LIFO) stack.

II Constructors public Stack () ;

II Methods public boolean empty(); public Object peek() ; public Object pop(); public Object push(Object item); public int search(Object 0);

Ap9.9.12 Class java.ufils.SfringTokenizer

The StringTokenizer class allows strings to be split into tokens. The following are de­fined:

II Constructors public StringTokenizer(String str) ;

1558 Handbook of the Internet

public StringTokenizer(String str, String delim); public StringTokenizer(String str, String delim, boolean returnTokens);

II Methods public int countTokens(); public boolean hasMoreElements(); public boolean hasMoreTokens(); public Object nextElement(); public String nextToken() ; public String nextToken(String delim);

Ap9.9.13 Class java. uti Is. Vector

The Vector class implements a growable array of objects. The following are defined:

II Fields protected int capacitylncrement; protected int elementCount; protected Object elementData[];

II Constructors public Vector() ; public Vector(int initialCapacity); public Vector(int initialCapacity, int capacitylncrement);

II Methods public final void addElement(Object obj); public final int capacity(); public Object clone(); public final boolean contains(Object elem); public final void copylnto(Object anArray[]) ; public final Object elementAt(int index); public final Enumeration elements(); public final void ensureCapacity(int minCapacity) public final Object firstElement(); public final int indexOf(Object elem); public final int indexOf(Object elem, int index); public final void insertElementAt(Object obj, int index); public final boolean iSEmpty() ; public final Object lastElement(); public final int lastlndexOf(Object elem); public final int lastlndexOf(Object elem, int index); public final void removeAllElements(); public final boolean removeElement(Object obj); public final void removeElementAt(int index); public final void setElementAt(Object obj, int index); public final void setSize(int newSize); public final int size(); public final String toString(); public final void trimToSize();

Java reference 1559

Ap 10 NIS, NFS, RC, FTP and DNS

Ap 10.1 Example Internet domain name server files In the following example setup, there are two name servers (ees99 and eepc02) within the eece . napier. ac . uk domain. The Internet domain naming process is run with the named

program and reads from the named. boot file (to use a file other than /etc/named.boot the­b option is used). Its contents are given next and it lists six main sub net (146.176.144.X to 146.176 .151.X). The files net/net144 to net/net151 contain the definition ofthe hosts that connect to these sub nets.

@(#)named.boot.slave 1.13 (Berkeley) 87/07/21 boot file for secondary name server

Note that there should be one primary entry for each SOA record.

directory

; type

primary primary primary primary primary primary primary primary primary cache

/usr/local/adm/named

domain

eece.napier.ac.uk 144.176.146.in-addr.arpa 145.176.146.in-addr.arpa 146.176.146.in-addr.arpa 147.176.146.in-addr.arpa 150.176.146.in-addr.arpa 151.176.146.in-addr.arpa 0.0.127.IN-ADDR.ARPA 0.0.127.IN-ADDR.ARPA

source host/file

eece.napier.ac.uk net/net144 net/net145 net/net146 net/net147 net/net150 net/net151 named. local named. local root.cache

backup file

The first line (after the comments, which begin with a semi-colon) defines that the master file (eece. napier. ac. uk) contains authoritative data for the eece. napier. ac. uk domain. All domain names are then relative to this domain. For example, a computer within this domain which has name pc444 will have the full domain name of:

pc444.eece.napier.ac.uk

The second line of the file defines that the file net/net144 contains the authoritative data on the l44.1 76.146. in-addr. arpa domain, and so on. The cache line specifies that data in the root. cache file is to be place in the backup cache.

The following shows the contents of the eece . napier. ac . uk file on the ees9 9 computer. Each master zone should begin with an SOA record for the zone. The A entry defines an ad­dress, NS defines a name server, CNAME defines an alias and MX a mail server. It can be seen that ees99 has the mw alias, thus ees99. eece. napier. ac. uk is the same as mw. eece. napier.

ac.uk.

@ IN SOA ees99.eece.napier.ac.uk. mike.ees99.eece.napier.ac.uk. 199806171 Serial 10800 Refresh every 3 hrs 1800 Retry every 1/2 hr 604800 Expire (seconds) 259200 Minimum time-to-live

IN NS ees99.eece.napier.ac.uk.

IN NS eepc02.eece.napier.ac.uk. localhost IN A 127.0.0.1 @ IN MX 11 146.176.151.139. hp350 IN A 146.176.144.10 mwave IN A 146.176.144.11 hplb69 IN CNAME mwave vax IN A 146.176.144.13 miranda IN A 146.176.144.14 triton IN A 146.176.144.20 mimas IN A 146.176.146.21 ees99 IN A 146.176.151.99 mw IN CNAME ees99

The SOA lists a serial number. which has to be increased each time the master file is changed. This is because secondary servers check the serial number at an interval specified by the refresh time (Refresh). If the serial number increases then a zone transfer is done to load the new data. If the master server cannot be contacted when a refresh is due then the retry time (Retry) specifies the interval at which refreshes occur. If the master server cannot be contacted within the expire time interval (Expire) then all data from the zone is discard by secondary servers.

The following file lists some of the contents of the net/net151 file. The NS entry defines the two name servers (ees99 and eepc02) and the PTR entry maps an IP address to a domain name.

@ IN SOA ees99.eece.napier.ac.uk. mike.ees99.eece.napier.ac.uk. 199706091 Serial 10800 Refresh 1800 Retry 604800 Expire 259200 Minimum

IN NS ees99.eece.napier.ac.uk. IN NS eepc02.eece.napier.ac.uk.

50 IN PTR ee50.eece.napier.ac.uk. 61 IN PTR eepcOl.eece.napier.ac.uk. 62 IN PTR eepc02.eece.napier.ac.uk. 222 IN PTR pctest.eece.napier.ac.uk. 2 IN PTR pc345.eece.napier.ac.uk. 3 IN PTR pc307.eece.napier.ac.uk. 4 IN PTR pc320.eece.napier.ac.uk. 5 IN PTR pc331.eece.napier.ac.uk. 6 IN PTR pc401.eece.napier.ac.uk. 7 IN PTR pc404.eece.napier.ac.uk.

and for the net/netlSl file:

@ IN SOA ees99.eece.napier.ac.uk. mike.ees99.eece.napier.ac.uk. 199806171 Serial 10800 Refresh 1800 Retry 604800 Expire 259200 Minimum

IN NS ees99.eece.napier.ac.uk. IN NS eepc02.eece.napier.ac.uk.

10 IN PTR ees10.eece.napier.ac.uk. 11 IN PTR ees11.eece.napier.ac.uk. 12 IN PTR ees12.eece.napier.ac.uk. 13 IN PTR ees13.eece.napier.ac.uk. 14 IN PTR ees14.eece.napier.ac.uk. 15 IN PTR ees15.eece.napier.ac.uk.

1562 Handbook of the Internet

The entries take the form:

where domain

resourceJecord

<opec/ass> <type> <resourceJecord_data>

either a . which defines the root domain, a @ which defines the current origin, or a standard domain name. If it is a standard domain and it does not end with a ., then current origin is appended to the domain, else the domain names unmodified. is an optional number for the time to live. is the object address type. This can be IN (for DARPA Internet) or HS (for Hesiod class). This contains one of the following definitions:

• A (address). • CNAME (canonical name which is an alias for another host). • GID (group ID). • HlNFO (host information) • ME (mailbox domain name). • MG (mailbox domain name). • MIFO (mailbox or mail list information). • MR (mail rename domain name). • MX (mail exchanger which handles mail for a given host). • NS (name server for the domain). • PTR (pointer record which maps an IP address to a hostname). • SOA (start of authority record). The domain of originating host,

domain address of maintainer, a serial and the other parameters (refresh, retry time, expire time and minimum TTL) are also de­fined.

• TXT (text string). • UID (user information). • WKS (well known service). This defines an IP address followed by a

list of services.

The contents ofthe sobasefile is given next. This defines the two domain name servers.

@ IN

IN IN

SOA ees99.eece.napier.ac.uk. mike.ees99.eece.napier.ac.uk.

NS NS

19970307 Serial 10800 Refresh 1800 Retry 604800 Expire 259200 Minimum

ees99.eece.napier.ac.uk. eepc02.eece.napier.ac.uk.

AplO.2 TCP/IP services Port Protocol Service Comment 1 TCP TCPmux 7 TCPIUDP echo 9 TCP/UDP discard Null

NIS, NFS, RC, FTP and DNS 1563

11 TCP systat Users 13 TCP/UDP daytime 15 TCP netstat 17 TCP qotd Quote 18 TCP/UDP msp Message send protocol 19 TCPIUDP chargen ttytst source 21 TCP fip 23 TCP telnet 25 TCP smtp Mail 37 TCPIUDP time Timserver 39 UDP rip Resource location 42 TCP nameserver IEN 116 43 TCP whois Nicname 53 TCPIUDP domain Domain name server 57 TCP mtp Deprecated 67 TCP bootps BOOTP server 67 UDP bootps 68 TCPIUDP bootpc BOOTP client 69 UDP tftp 70 TCPIUDP gopher Internet Gopher 77 TCP rje Netrjs 79 TCP finger 80 TCPIUDP www WWWHTTP 87 TCP link Ttylink 88 TCPIUDP kerberos Kerberos v5 95 TCP supdup 101 TCP hostnames 102 TCP iso-tsap ISODE. 105 TCPIUDP csnet-ns CSO name server 107 TCPIUDP rtelnet Remote Telnet 109 TCPIUDP pop2 POP version 2 110 TCPIUDP pop3 POP version 3 III TCPIUDP sunrpc 113 TCP auth Rap identity authentication 115 TCP sftp 117 TCP uucp-path 119 TCP nntp USENET News Transfer Protocol 123 TCPIUDP ntp Network Time Protocol 137 TCPIUDP netbios-ns NETBIOS Name Service 138 TCP/UDP netbios-dgm NETBIOS Datagram Service 139 TCPIUDP netbios-ssn NETBIOS session service 143 TCPIUDP imap2 Interim Mail Access Protocol Ver2 161 UDP snmp Simple Net Management Protocol 162 UDP snmp-trap SNMP trap 163 TCP/UDP cmip-man ISO management over IP (CMOT) 164 TCPIUDP cmip-agent 177 TCPIUDP xdmcp X Display Manager 178 TCPIUDP nextstep NeXTStep NextStep 179 TCPIUDP bgp BGP 191 TCPIUDP prospero 194 TCPIUDP irc Internet Relay Chat 199 TCPIUDP smux SNMP Unix Multiplexer 201 TCPIUDP at-rtmp AppleTalk routing 202 TCPIUDP at-nbp AppleTalk name binding 204 TCPIUDP at-echo AppleTalk echo 206 TCPIUDP at-zis AppleTalk zone information

1564 Handbook of the Internet

210 TCPIUOP z3950 NISO Z39.50 database 213 TCP/UOP ipx 1PX 220 TCPIUOP imap3 Interactive Mail Access 372 TCPIUDP ulistserv UNIX Listserv 512 TCPIUOP exec Comsat 513 TCP login 513 UOP who Whod 514 TCP shell No passwords used 514 UOP syslog 515 TCP printer Line printer spooler 517 UOP talk 518 UOP ntalk 520 UOP route RlP 525 UOP timed Timeserver 526 TCP tempo Newdate 530 TCP courier Rpc 531 TCP conference Chat 532 TCP netnews Readnews 533 UOP netwall Emergency broadcasts 540 TCP uucp Uucp daemon 543 TCP klogin Kerberized 'rJogin' (v5) 544 TCP kshell Kerberized 'rsh' (v5) 556 TCP remotefs Brunhoff remote file system 749 TCP kerberos-adm Kerberos 'kadmin' (v5) 750 UOP #kerberos Kerberos (server) UOP 750 TCP #kerberos Kerberos (server) TCP 760 TCP krbupdate Kerberos registration 761 TCP kpasswd Kerberos "passwd" 765 TCP webster Network dictionary 871 TCP supfilesrv SUP server 1127 TCP supti1edbg SUP debugging 1524 TCP ingres10ck 1524 UOP ingreslock 1525 TCP prospero-np Prospero non-privileged 1525 UDP prospero-np 2105 TCP eklogin Kerberos encrypted rlogin 5002 TCP rfe Radio Free Ethernet

Apl0.3 netnfsrc file This sections outlines an example netnfsrc (NFS startup file) file. In the script portion given below the NFS CLIENT is set to a 1 if the host is set to a client (else it will be 0) and the

NFS _SERVER parameter is set to a 1 if the host is set to a server (else it will be 0). Initially the

NFS clients and servers are started. Note that a host can be a client, a server, both or neither.

Next the mountd daemon is started, after which the NFS daemons (nfsd) are started

(only on servers). After this the biod daemon is run.

NFS CLIENT=l NFS SERVER=l START MOUNTD=O # Read in jete/exports if [ $LFS -eq 0 -a $NFS_SERVER -ne 0 -a -f jete/exports I ; then

> /ete/xtab /usr/ete/exportfs -a && eeho" Reading in /ete/exports" set return

NIS, NFS, Re, FTP and DNS 1565

fi

if [ $NFS SERVER -ne 0 -a $START~MOUNTD -ne 0 -a -f /usr/etc/rpc.mountd then

fi ##

/usr/etc/rpc.mountd && echo "starting up the mountd" && echo "\t/usr/etc/rpc.mountd"

set return

if [ $LFS -eq 0 -a $NFS SERVER -ne 0 -a -f /etc/nfsd J ; then

fi ##

/etc/nfsd 4 && echo "starting up the NFS daemons" && echo "\t/etc/nfsd 4" set return

if [ $NFS~CLIENT -ne 0 J ; then

fi

fi

if [ -f /etc/biod J ; then /etc/biod 4 && echo

"starting up the BIO daemons" && echo "\t/etc/biod 4" set return

/bin/cat /dev/null > /etc/nfs.up

The next part of the netnfsrc file deals with the NIS services. There are three states: NIS _ MASTER_SERVER, NIS SLAVE SERVER and NIS CLIENT. A host can either be a mas­ter server or a slave server, but cannot be both. All NIS servers must also be NIS clients, so the NIS_MASTER_SERVER or NIS_SLAVE_SERVER parameters should be set to 1. Initially the domain name is set using the command domainname (in this case it is eece).

NIS MASTER SERVER=l ~ ~

NIS SLAVE SERVER=O NIS CLIENT=l NISDOMAIN=eece NISDOMAIN ERR=""

if [ "$NISDOMAIN" -a -f /bin/domainname then echo "\t/bin/domainname $NISDOMAIN" /bin/domainname $NISDOMAIN if [ $? -ne 0 J ; then

echo "Error: NIS domain name not set" >&2 NISDOMAIN ERR=TRUE fi

else

fi

echo "\tNIS domain name not set" NISDOMAIN ERR=TRUE

Next portmap is started for ARPA clients.

if [ -f /etc/portmap J ; then

fi

echo "\t/etc/portmap" /etc/portmap if [ $? -ne 0 J ; then

echo "Error: NFS portmapper NOT powered up" >&2

exit 1 fi

1566 Handbook of the Internet

Next the NIS is started.

if [ "$NISDOMAIN_ERR" -0 \( $NIS_MASTER SERVER -eq 0 -a $NIS SLAVE SERVER -eq 0\

-a $NIS CLIENT -eq 0 \) 1 ; then echo II

else Network Information Service not started."

echo " starting up the Network Information Service"

HOSTNAME='hostname'

if [ $NIS_MASTER_SERVER -ne 0 -0 $NIS SLAVE SERVER -ne 0 1; then NIS SERVER=TRUE fi

if [ $NIS_MASTER_SERVER -ne 0 -a $NIS SLAVE SERVER -ne 0 1; then echo "NOTICE:both NIS MASTER SERVER and NIS SLAVE SERVER variables set;" echo "\t$HOSTNAME will be only a NIS slave server." NIS MASTER SERVER=O

fi

if $NIS CLIENT -eq 0 1; then echo "NOTICE:$HOSTNAME will be a NIS server, but the NIS CLIENT variable is" echo "\tnot set; $HOSTNAME will also be a NIS client." NIS CLIENT=l fi

Next the yp services are started.

# The verify_ypserv function determines if it is OK to start ypserv(lM) # (and yppasswdd(lM) for the master NIS server). It returns its result # in the variable NISSERV OK - if non-null, it is OK to start ypserv(lM); # if it is null, ypserv(lM) will not be started. # # First, the filesystem containing /usr/etc/yp is examined to see if it # supports long or short filenames. Once this is known, the proper list # of standard NIS map filenames is examined to verify that each map exists # in the NIS domain subdirectory. If any map is missing, verify_ypserv # sets NISSERV OK to null and returns. ##

verify _ypserv () ## # LONGNAMES are the names of the NIS maps on a filesystem that # supports long filenames. ##

LONGNAMES="group.bygid.dir group.bygid.pag group.byname.dir \ group.byname.pag hosts.byaddr.dir hosts.byaddr.pag \ hosts.byname.dir hosts.byname.pag networks.byaddr.dir \ networks.byaddr.pag networks.byname.dir networks.byname.pag \ passwd.byname.dir passwd.byname.pag passwd.byuid.dir \ passwd.byuid.pag protocols.byname.dir protocols.byname.pag \ protocols.bynumber.dir protocols.bynumber.pag \ rpc.bynumber.dir rpc.bynumber.pag services.byname.dir \ services.byname.pag ypservers.dir ypservers.pag"

## # SHORTNAMES are the names of the NIS maps on a filesystem that # supports only short filenames (14 characters or less) . ##

NIS, NFS, RC, FTP and DNS 1567

SHORTNAMES="group.bygi.dir group.bygi.pag group.byna.dir \ group.byna.pag hosts.byad.dir hosts.byad.pag \ hosts.byna.dir hosts.byna.pag netwk.byad.dir \ netwk.byad.pag netwk.byna.dir netwk.byna.pag \ passw.byna.dir passw.byna.pag passw.byui.dir \ passw.byui.pag proto.byna.dir proto.byna.pag \ proto.bynu.dir proto.bynu.pag rpc.bynu.dir \ rpc.bynu.pag servi.byna.dir servi.byna.pag \ ypservers.dir ypservers.pag"

NISSERV OK=TRUE

if '/usr/etc/yp/longfiles'; then NAMES=$LONGNAMES

else NAMES=$SHORTNAMES

fi

for NAME in $NAMES ; do if [ ! -f /usr/etc/yp/$NISDOMAIN/$NAME then

fi done

NISSERV OK= return

Next ypserv and ypbind are started.

or"

if [ "$NIS_SERVER" -a -f /usr/etc/ypserv then verify_ypserv if [ "$NISSERV _OK" 1 ; then

/usr/etc/ypserv && echo "\t/usr/etc/ypserv" set return

else

fi fi

echo "\tWARNING: echo "\t

/usr/etc/ypserv not started: either" the directory /usr/etc/yp/$NISDOMAIN does not exist

echo "\t some or all of the $NISDOMAIN NIS domain's" echo l1\t maps are missing. II

echo "\tTo initialize $HOSTNAME as a NIS server, see ypinit(lM)." returnstatus=l

if [ $NIS_CLIENT -ne 0 -a -f /etc/ypbind then /etc/ypbind && echo "\t/etc/ypbind "

set return

## # check if the NIS domain is bound. If not disable NIS ## CNT=O; MAX NISCHECKS=2 NIS CHECK=YES echo" Checking NIS binding." while [ ${CNT} -Ie ${MAX NISCHECKS} -a "${NIS_CHECK}" "YES" l; do

/usr/bin/ypwhich 2>&1 I /bin/fgrep 'not bound ypwhich' > /dev/null

if [ $? -eq 0 l; then CNT='expr $CNT + l' if [ ${CNT} -Ie 2 l; then

sleep 5

1568 Handbook of the Internet

fi

fi

##

else echo" Unable to bind to NIS server using domain $ {NISDOMAIN} ." echo" Disabling NIS" /bin/domainname "" /bin/ps -e I /bin/grep ypbind I \

kill -15 '/usr/bin/awk ,{ print $1 }" NIS CHECK:NO returnstatus:l break; fi

else

fi

echo" Bound to NIS server using domain ${NISDOMAIN}." NIS CHECK:NO

done

if [ $NIS_MASTER_SERVER -ne 0 -a -f /usr/etc/rpc.yppasswdd then if [ "$NISSERV _OK" 1 ; then

echo "\t/usr/etc/rpc.yppasswdd" /usr/etc/rpc.yppasswdd /etc/passwd -m passwd PWFILE:/etc/passwd

set return else

fi fi

echo "\tWARNING: /usr/etc/rpc.yppasswdd not started: refer to the" echo "\t reasons listed in the WARNING above."

returnstatus:l

Finally the PC-NFS daemons (pcnfsd) and the lock manager daemon (rpc .lockd) status monitor daemon (rpc. statd) are started.

PCNFS SERVER:l if [ $LFS -eq 0 -a $PCNFS SERVER -ne 0 -a -f /etc/pcnfsd 1 ; then

/etc/pcnfsd && echo "starting up the PC-NFS daemon" && echo "\t/etc/pcnfsd" set return

fi

if [ $NFS_CLIENT -ne 0 -0 $NFS_SERVER -ne 0 1 ; then if [ -f /usr/etc/rpc.statd 1 ; then

/usr/etc/rpc.statd && echo "starting up the Status Monitor daemon" && echo "\t/usr/etc/rpc.statd"

set return fi if [ -f /usr/etc/rpc.lockd 1 ; then

/usr/etc/rpc.lockd && echo "starting up the Lock Manager daemon" && echo "\t/usr/etc/rpc.lockd"

set return fi

fi exit $returnstatus

Ap 10.4 rc file The rc file is executed when the UNIX node starts. It contains a number of functions (such as localrc (), hfsmount (), and so on) which are called from a main section. The example script given next contains some of the functions defined in Table Ap 1 0.1.

NIS, NFS, RC, FTP and DNS 1569

Function localrc ()

hfsmount ()

map_keyboard ( )

syncer_start()

net start ()

Table Ap10.1 Sample rc functions

Add local configuration to the node. In the example script the Bones-Licensing 2.4 is started locally on the node. This part of the script will probably be the only function which is different on differ­entnodes.

Mounts local disk drives

Loads appropriate keymap

The syncer helps to minimize file damage when this is a power fail­ure or a system crash

Starts the lp (line printer) scheduler

Starts networking through net 1 inkrc

Starts swapping on alternate swap devices

ini tialize () {

if ["$SYSTEM_NAME" "" 1 then SYSTEM_NAME=pollux

export SYSTEM NAME fi

localrc () {

#%%CS1BeginFeature: Bones-Licensing 2.4 DES1GNERHOME=/win/designer-2.0 export DES1GNERHOME

echo -n "Starting Bones-Licensing 2.4 if [ -f ${DES1GNERHOME}/bin/start-lmgrd l; then

${DES1GNERHOME}/bin/start-lmgrd echo " lmgrd."

else echo " failed."

fi

if [ $SET_PARMS_RUN -eq 0 1 ; then if [ $T1MEOUT -ne 0 1 ; then

echo "\0071s the date 'date' correct? (y or n, default: y) \c" reply='line -t $TIMEOUT-echo

if [ "$reply" = y -0 "$reply" 11 I' -0 "$replyll Y 1

1570 Handbook of the Internet

fi

then return

else

fi

if [ -x /etc/set_parms 1; then /etc/set_parms time_only

fi

fi # if SET PARMS RUN

hfsmount () {

# create /etc/mnttab with valid root entry /etc/mount -u >/dev/null

# enable quotas on the root file system # (others are enabled by mount) [ -f /quotas -a -x /etc/quotaon 1 && /etc/quotaon -v /

# Mount the HFS volumes listed in /etc/checklist: /etc/mount -a -t hfs -v # (NFS volumes are mounted via net start () function)

# Uncomment the following mount command to mount CDFS's /etc/mount -a -t cdfs -v

# Preen quota statistics [ -x /etc/quotacheck 1 && echo checking quotas && /etc/quotacheck -aP

map keyboard ( ) { -

# ltemap option="" if [ -f /etc/kbdlang then

fi

read MAP NAME filler < /etc/kbdlang if [ $MAP _NAME 1 then

ltemap optlon="-l $MAP_NAME" fi

if [ -x /etc/itemap 1 then

itemap -i -L $itemap option -w /etc/kbdlang fi }

syncer start ( ) {

if /usr/bin/rtprio 127 /etc/syncer then

echo syncer started fi

lp start () {

if [ -s /usr/spool/lp/pstatus then

fi

lpshut > /dev/null 2>&1 rm -f /usr/spool/lp/SCHEDLOCK lpsched echo line printer scheduler started

NIS, NFS, RC, FTP and DNS 1571

clean ex () { -

if [ -x /usr/bin/ex then

fi

echo "preserving editor files (if any)" ( cd /tmp; expreserve -a )

clean uucp () { -

if [ -x /usr/lib/uucp/uuclean then

fi

echo "cleaning up uucp" /usr/lib/uucp/uuclean -pSTST -pLCK -nO

net start () {

}

if [ -x /etc/netlinkrc 1 && /etc/netlinkrc then

echo NETWORKING started. fi

swap start () {

if /etc/swapon -a then

echo 'swap device(s) active' fi

cron start () { -

if [ -x /etc/cron then

fi

if [ -f /usr/lib/cron/log then

mv /usr/lib/cron/log /usr/lib/cron/OLDlog fi /etc/cron && echo cron started

audio start ()

#

# Start up the audio server if [ -x /etc/audiorc 1 && /etc/audiorc then

echo "Audio server started" fi

# The main section of the rc script #

# Where to find commands: PATH=/bin:/usr/bin:/usr/lib:/etc

# Set termio configuration for output device. stty clocal icanon echo opost onlcr ixon icrnl ignpar

if [ ! -f /etc/rcflag 1 # Boot time invocation only

1572 Handbook of the Internet

then # /etc/rcflag is removed by /etc/brc at boot and by shutdown touch /etc/rcflag

hfsmount map_keyboard setparms initialize switch over uname -S $SYSTEM_NAME hostname $SYSTEM_NAME

swap_start syncer_start lp_start clean ex clean_uucp net start audio start localrc

fi

Ap 10.5 FTP commands ABOR Abort previous command

ALLO Allocate storage

CDUP Go to directory above

DELE Delete a file

LIST List directory (Is -I)

MDTM Show last modification time

NLST Give name oflist of files

PASS Specify password

PORT Specify port

QUIT Quit session

RETR Retrieve a file

RNFR Specify rename-from filename

SITE Non-standard commands

STOR Store a file

STRU Specify data transfer structure

TYPE Specify data transfer type

XCUP Change of parent of current working

directory

XMKD Make a directory

XRMD Remove a directory

ACCT SjJecify account

APPE Append to a file

CWD Change working directory

HELP Show help information

MKD Make directory

MODE Specify data transfer mode

NOOP No operation (to prevent discon

tion)

PASV Prepare for server-to-server tran

PWD Display current working directo

REST Restart incomplete session

RMD Remove a directory

RNTO Spread rename-to filename

SIZE Return size of file

STOU Store a file with a unique name

SYST Show operation system type

USER Specify user name

XCWD Change working directory

XPWD Print a directory

The ftpd daemon is run from the Internet daemon (inetd and inetd. conf). It is automatically run when there is a request from the ftp port which is specified in the / etc/ services file (typi­cally port 21). Users who use ftp must have an account in the /etc/password file and any users who are barred from ftp access should be listed in the / etc / ftpusers file.

Anonymous FTP logins are where the user logs in as anonymous (typically using their e­mail address as the password). The user then uses the -ftp directory for all transfers. Typi-

NIS, NFS, RC, FTP and DNS 1573

cally the structure is:

-ftp/bin -ftp/etc

-ftp/etc/passwd -ftp/etc/group -ftp/pub

Contains a copy of the /bin/ 1 s file. Contains the passwd, group and logingroup files for the users which own files within -ftp. Defines users who own files within -ftp. Defines groups who own files within -ftp. General area where files can be uploaded to or downloaded from.

Note that anonymous FTP is inherently dangerous to system security. To protect against damage the -1 option in the ftpd daemon can be used to log all accesses to the system log. The - t option in the f t pd daemon defines the timeout time for a session.

In order to permit anonymous FTP, a line similar to the following must be added to the / etc/password file:

ftp:*:400:10:anonymousFTP:/user/ftp:/bin/fa1se

where, in this case, 400 is the unique user ID for the ftp login, 10 is the group ID number for the guest group and /user / ftp specifies the home directory for the anonymous ftp ac­count.

AplO.6 Telnet The Internet daemon (inetd) starts the te1netd daemon when there is a request from the telnet port which is specified in the / etc/ services files (typically port 23). To start the te1netd the / etc/ inetd. conf file must contain the line:

te1net stream tcp nowait root /etc/te1netd te1netd -b/etc/issue

1574 Handbook of the Internet

Apll RFC's The lAB (Internet Advisor Board) has published many documents on the TCP/IP protocol family. They are known as RFC (request for comment) and can be obtained using FTP from the following:

• Internet Network Information Center (NIC) at nie ddn mil, or one of several other FTP sites, such as from the InterNIC Directory and Database Services server at ds.internie.net

• Through electronic mail from the automated InterNIC Directory and Database Services mail server at mailserv@ds. internie. net The main body of the message should contain the command:

doeument-by-name rfeNNNN

where NNNN is the number of the RFC Multiple requests can be made by sending a single message with each specified document separated by comma-separated list.

The main RFC documents are:

RFC768 RFC775 RFC78 I RFC783 RFC786 RFC791 RFC792 RFC793 RFC799 RFC8l3 RFC8l5 RFC821 RFC822 RFC823 RFC827 RFC877 RFC879 RFC886 RFC893 RFC894 RFC895

RFC896 RFC903 RFC904 RFC906 RFC919 RFC920 RFC932 RFC949 RFC950 RFC95 I

User Datagram Protocol Directory-Oriented FTP Commands Specification of the Internet Protocol Timestamp Option TFTP Protocol User Datagram Protocol (UDP) Internet Protocol (IP) Internet Control Message Protocol (ICMP) Transmission Control Protocol (TCP) Internet Name Domains Window and Acknowledgment in TCP IP Datagram Reassembly Algorithms Simple Mail-Transfer Protocol (SMTP) Standard for the Format of ARPA Internet Text Messages DARPA Internet Gateway Exterior Gateway Protocol (EGP) Standard for the Transmission ofIP Datagrams over Public Data Networks TCP Maximum Segment Size and Related Topics Proposed Standard for Message Header Munging Trailer Encapsulations Standard for the Transmission of IP Datagrams over Ethernet Networks Standard for the Transmission of IP Datagrams over Experimental Ethernet Net­works Congestion Control in TCP/IP Internetworks Reverse Address Resolution Protocol Exterior Gateway Protocol Formal Specifications Bootstrap Loading Using TFTP Broadcast Internet Datagram Domain Requirements Subnetwork Addressing Schema FTP Unique-Named Store Command Internet Standard Subnetting Procedure Bootstrap Protocol

RFC959 RFC974 RFC980 RFCI009 RFCIOll RFClO13 RFCI014 RFCI027 RFCI032 RFCI033 RFCI034 RFCI035 RFC1041 RFCI042 RFCI043 RFCI044 RFC1053 RFCI055 RFCI056 RFCI058 RFC1068 RFClO72 RFC1073 RFC1074 RFCI079 RFC1080 RFC1084 RFCI088 RFC1089 RFCI091 RFCI094 RFCllOl RFC 11 02 RFCll04 RFCIl12 RFC1l22 RFCl123 RFC1124 RFCl125 RFCll27 RFCl129 RFCl143 RFCl147 RFCl149 RFCl155

RFC1156

RFC1157 RFCll63 RFCl164 RFC 11 66 RFC1l71 RFCll72 RFCI173 RFCl175

File Transfer Protocol Mail Routing and the Domain System Protocol Document Order Information Requirements for Internet Gateways Official Internet Protocol X Windows System Protocol XDR: External Data Representation Standard Using ARP to Implement Transparent Subnet Gateways Domain Administrators Guide Domain Administrators Operation Guide Domain Names - Concepts and Facilities Domain Names - Implementation and Specifications Telnet 3270 Regime Option Standard for the Transmission of IP Datagrams over IEEE 802 Networks Telnet Data Entry Terminal Option Internet Protocol on Network System's HYPERchannel Telnet X 3 PAD Option Nonstandard for Transmission of IP Datagrams over Serial Lines PCMAIL: A Distributed Mail System for Personal Computers Routing Information Protocol Background File Transfer Program (BFTP) TCP Extensions of Long-Delay Paths Telnet Window Size Option NSFNET Backbone SPF-based Interior Gateway Protocol Telnet Terminal Speed Option Telnet Remote Flow Control Option BOOTP Vendor Information Extensions Standard for the Transmission ofIP Datagrams over NetBIOS Network SNMP over Ethernet Telnet Terminal-Type Option NFS: Network File System Protocol Specification DNS Encoding of Network Names and Other Types Policy Routing in Internet Protocols Models of Policy-Based Routing Host Extension for IP Multicasting Requirement for Internet Hosts - Communication Layers Requirement for Internet Hosts - Application and Support Policy Issues in Interconnecting Networks Policy Requirements for Inter-Administrative Domain Routing Perspective on the Host Requirements RFC Internet Time Protocol Q Method ofImplementing Telnet Option Negotiation FYI on a Network Management Tool Catalog Standard for the Transmission of IP Datagrams over Avian Carriers Structure and Identification of Management Information for TCP/IP-Based Inter­nets Management Information Base for Network Management of TCP/IP-Based Inter­nets Simple Network Management Protocol (SNMP) Border Gateway Protocol (BGP) Application of the Border Gateway Protocol in the Internet Internet Numbers Point-to-Point Protocol for the Transmission of Multi-Protocol Datagrams Point-to-Point Protocol Initial Configuration Options Responsibilities of Host and Network Managers FYI on Where to Start: A Bibliography of Internetworking Information

1576 Handbook of the Internet

RFCl178 RFCl179 RFCI184 RFC1187 RFC1188 RFC1195 RFC1J96 RFCl198 RFC1201 RFC1205 RFC1208 RFC1209 RFC1212 RFC1213 RFC1214 RFC1215 RFC1219 RFC1220 RFC1224 RFC1227 RFC1228 RFC1229 RFC1230 RFC1231 RFC1232 RFC1233 RFC1236 RFC1238 RFC1239 RFC1243 RFC1245 RFC1246 RFC1247 RFCI253 RFC1254 RFCI267 RFC1271 RFCI321 RFC1340 RFCI341 RFC1360 RFC1522

RFCI521

RFCI583 RFC1630 RFC1738 RFC1752 RFCI771 RFCI808 RFC1809 RFC1825 RFC1826 RFCl827 RFCl828

Choosing a Name For Your Computer Line Printer Daemon Protocol Telnet Linemode Option Bulk Table Retrieval with the SNMP Proposed Standard for the Transmission ofTP Datagrams over FDOl Networks Use of OS I IS-IS for Routing in TCP/IP and Dual Environments Finger User Information Protocol FYI on the X Windows System Transmitting IP Traffic over ARCNET Networks 520 Telnet Interface Glossary of Networking Terms Transmission of IP Datagrams over the SMDS Service Concise MIB Definitions MIB for Network Management of TCP/IP-Based Internets OST Internet Management: Management Information Base Convention for Defining Traps for Use with the SNMP On the Assignment of Subnet Numbers Point-to-Point Protocol Extensions for Bridges Techniques for Managing Asynchronous Generated Alerts SNMP MUX Protocol and MIB SNMP-DPI: Simple Network Management Protocol Distributed Program Interface Extensions to the Generic-interface MIB IEEE 802 4 Token Bus MIB IEEE 802 5 Token Ring MIB Definitions of Managed Objects for the DS 1 Interface Type Definitions of Managed Objects for the DS3 Interface Type IP to X 121 Address Mapping for DDN IP CLNS MIB for Use with Connectionless Network Protocol Reassignment of Experiment MIBs to Standard MIBs Appletalk Management Information Base OSPF Protocol Analysis Experience with the OSPF Protocol OSPF Version2 OSPF Version2: Management Information Base Gateway Congestion Control Survey A Border Gateway Protocol (BGP-3) Remote Network Monitoring Management Information Base The MD5 Message-Digest Algorithm Assigned Numbers MIME Mechanism for Specifying and Describing the Format ofInternet Message Bodies lAB Official Protocol Standards MIME (Multipurpose Internet Mail Extensions) Part Two: Message Header Extensions for Non-ASCII Text MIME (Multipurpose Internet Mail Extensions) Part One: Mechanisms for Specifying and Describing the Format ofInternet Mail Message Bodies) OSPF Version2 Universal Resource Identifiers in WWW Uniform Resource Identifiers (URL) The Recommendation for the IP Next-Generation Protocol A Border Gateway Protocol 4 (BGP-4) Relative Uniform Resource Identifiers Using the Flow Label in TPv6 Security Architecture for the Internet Protocol IP Authentication Header IP Encapsulating Security Payload (ESP) IP Authentication Using Keyed MD5

RFC's 1577

RFC1829 RFC1883 RFC1884 RFC1885

RFC1886 RFC1887 RFCl901 RFCl902 RFCI903 RFC1904 RFC1905 RFC1906 RFC1907 RFC1908

RFC1909 RFC1910 RFC19l1 RFC19l2 RFC1913 RFC1914 RFC1915

RFC1916 RFC1917

RFC1918 RFC1919 RFC1920 RFC1922 RFC1923 RFCl924 RFC1925 RFC1926 RFCl927 RFC1928 RFCl929 RFC1930 RFC1931 RFC1932 RFC1933 RFC1934 RFC1935 RFC1936 RFC1937 RFC1938 RFC1939 RFCl940 RFC1941 RFCl942 RFCl943 RFC1944 RFC1945 RFC1946 RFC1947

The ESP DES-CBC Transform Internet Protocol, Version 6 Specification IP Version 6 Addressing Architecture Internet Control Message Protocol (ICMPv6) for the Internet Protocol Version-6 (IPv6) Specification DNS Extensions to Support IP Version 6 An Architecture for IPv6 Unicast Address Allocation Introduction to Community-Based SNMPv2 Structure of Management Information for SNMPv2 Textual Conventions for SNMPv2 Conformance Statements for SNMPv2 Protocol Operations for SNMPv2 Transport Mappings for SNMPv2 Management Information Base for SNMPv2 Coexistence Between Version land Version2 ofthe Internet-Standard Network Man­agement Framework An Administrative Infrastructure for SNMPv2 User-based Security Model for SNMPv2 Voice Profile for Internet Mail Common DNS Operational and Configuration Errors Architecture of the Whois++ Index Service How to Interact with a Whois++ Mesh Variance for The PPP Connection Control Protocol and The PPP Encryption Control Protocol Enterprise Renumbering: Experience and Information Solicitation An Appeal to the Internet Community to Return Unused IP Networks (Prefixes) to the lANA Address Allocation for Private Internets Classical versus Transparent IP Proxies INTERNET OFFICIAL PROTOCOL STANDARDS Chinese Character Encoding for Internet Messages RIPvl Applicability Statement for Historic Status A Compact Representation of I Pv6 Addresses The Twelve Networking Truths An Experimental Encapsulation ofIP Datagrams on Top of ATM Suggested Additional MIME Types for Associating Documents SOCKS Protocol Version 5 Username/Password Authentication for SOCKS V5 Guidelines for creation, selection, and registration of an Autonomous System (AS) Dynamic RARP Extensions for Automatic Network Address Acquisition IP over A TM: A Framework Document Transition Mechanisms for IPv6 Hosts and Routers Ascend's Multilink Protocol Plus (MP+) What is the Internet, Anyway? Implementing the Internet Checksum in Hardware "Local/Remote" Forwarding Decision in Switched Data Link Subnetworks A One-Time Password System Post Office Protocol - Version 3 Source Demand Routing: Packet Format and Forwarding Specification (Version 1) Frequently Asked Questions for Schools HTML Tables Building an X 500 Directory Service in the US Benchmarking Methodology for Network Interconnect Devices Hypertext Transfer Protocol -- HTTPIl 0 Native ATM Support for ST2+ Greek Character Encoding for Electronic Mail Messages

1578 Handbook of the Internet

RFCl948 RFCl949 RFCl950 RFCl95l RFCl952 RFCl953 RFC1954 RFC1955 RFC1956 RFC1957 RFCl958 RFC1959 RFC1960 RFC1961 RFCl962 RFC1963 RFCl964 RFCl965 RFC1966 RFC1967 RFC1968 RFC1969 RFC1970 RFC1971 RFC1972 RFCI973 RFCl974 RFC1975 RFC1976 RFC1977 RFC1978 RFCl979 RFC1980 RFC1981 RFC1982 RFC1983 RFCl984 RFCl985 RFCl986

RFC1987 RFC1988

RFC1989 RFCl990 RFC1991 RFC1992 RFCI993 RFCI994 RFC1995 RFCI996 RFC1997 RFC1998 RFC1999 RFC2000 RFC2001

Defending Against Sequence Number Attacks Scalable Multicast Key Distribution ZLIB Compressed Data Format Specification version 3 3 DEFLATE Compressed Data Format Specification version 1 3 GZIP file format specification version 4 3 Ipsilon Flow Management Protocol Specification for IPv4 Version 1 0 Transmission of Flow Labelled IPv4 on ATM Data Links Ipsilon Version 1 0 New Scheme for Internet Routing and Addressing (ENCAPS) for IPNG Registration in the MIL Domain Some Observations on Implementations of the Post Office Protocol (POP3) Architectural Principles of the Internet An LDAP URL Format A String Representation ofLDAP Search Filters GSS-API Authentication Method for SOCKS Version 5 The PPP Compression Control Protocol (CCP) PPP Serial Data Transport Protocol (SDTP) The Kerberos Version 5 GSS-API Mechanism Autonomous System Confederations for BGP BGP Route Reflection An alternative to full mesh IBGP PPP LZS-DCP Compression Protocol (LZS-DCP) The PPP Encryption Control Protocol (ECP) The PPP DES Encryption Protocol (DESE) Neighbor Discovery for IP Version 6 (IPv6) IPv6 Stateless Address Autoconfiguration A Method for the Transmission of IPv6 Packets over Ethernet Networks PPP in Frame Relay PPP Stac LZS Compression Protocol PPP Magnalink Variable Resource Compression PPP for Data Compression in Data Circuit-Terminating Equipment (DC E) PPP BSD Compression Protocol PPP Predictor Compression Protocol PPP Deflate Protocol A Proposed Extension to HTML : Client-Side Image Maps Path MTU Discovery for IP version 6 Serial Number Arithmetic Internet Users' Glossary lAB and IESG Statement on Cryptographic Technology and the Internet SMTP Service Extension for Remote Message Queue Starting Experiments with a Simple File Transfer Protocol for Radio Links using Enhanced Trivial File Transfer Protocol (ETFTP) Ipsilon's General Switch Management Protocol Specification Version I I Conditional Grant of Rights to Specific Hewlett-Packard Patents In Conjunction With the Internet Engineering Task Force's Internet-Standard Network Management Framework PPP Link Quality Monitoring The PPP Multilink Protocol PGP Message Exchange Formats The Nimrod Routing Architecture PPP GandalfFZA Compression Protocol PPP Challenge Handshake Authentication Protocol (CHAP) Incremental Zone Transfer in DNS A Mechanism for Prompt Notification of Zone Changes BGP Communities Attribute An Application of the BGP Community Attribute in Multi-home Routing Request for Comments Summary RFC Numbers 1900-1999 INTERNET OFFICIAL PROTOCOL STANDARDS TCP Slow Start, Congestion Avoidance, Fast Retransmit, and Fast

RFC's 1579

RFC2002 RFC2003 RFC2004 RFC2005 RFC2006 RFC2007 RFC2008 RFC2009 RFC2010 RFC2011 RFC2012

RFC2013 RFC2014 RFC2015 RFC2016 RFC2017 RFC2018 RFC2019 RFC2020 RFC2021 RFC2022 RFC2023 RFC2024 RFC2025 RFC2026 RFC2027

RFC2028 RFC2029 RFC2030 RFC2031 RFC2032 RFC2033 RFC2034 RFC2035 RFC2036 RFC2037 RFC2038 RFC2039 RFC2040 RFC2041 RFC2042 RFC2043 RFC2044 RFC2045

RFC2046 RFC2047

RFC2048 RFC2049

RFC2050 RFC2051 RFC2052

IP Mobility Support IP Encapsulation within IP Minimal Encapsulation within IP Applicability Statement for IP Mobility Support The Definitions of Managed Objects for IP Mobility Support using SMIv2 Catalogue of Network Training Materials Implications of Various Address Allocation Policies for Internet Routing GPS-Based Addressing and Routing Operational Criteria for Root Name Servers SNMPv2 Management Information Base for the Internet Protocol using SMIv2 SNMPv2 Management Information Base for the Transmission Control Protocol using SMIv2 SNMPv2 Management Information Base for the User Datagram Protocol using SMlv2 IRTF Research Group Guidelines and Procedures MIME Security with Pretty Good Privacy (PGP) Uniform Resource Agents (URAs) Definition of the URL MIME External-Body Access-Type TCP Selective Acknowledgement Options Transmission of IPv6 Packets Over FDDI IEEE 802 12 Interface MIB Remote Network Monitoring Management Information Base Version2 using SMIv2 Support for Multicast over UNI 3 0/3 I based A TM Networks IP Version 6 over PPP Definitions of Managed Objects for Data Link Switching using SMTv2 The Simple Public-Key GSS-API Mechanism (SPKM) The Internet Standards Process -- Revision 3 lAB and IESG Selection, Confirmation, and Recall Process: Operation of the Nominating and Recall Committees The Organizations Involved in the IETF Standards Process RTP Payload Format of Sun's CellB Video Encoding Simple Network Time Protocol (SNTP) IETF-ISOC relationship RTP Payload Format for H 261 Video Streams Local Mail Transfer Protocol SMTP Service Extension for Returning Enhanced Error Codes RTP Payload Format for IPEG-compressed Video Observations on the use of Components of the Class A Address Space within the Internet Entity MlB using SMIv2 RTP Payload Format for MPEG IIMPEG2 Video Applicability of Standards Track MIBs to Management of World Wide Web Servers The RC5, RC5-CBC, RC5-CBC-Pad, and RC5-CTS Algorithms Mobile Network Tracing Registering New BGP Attribute Types The PPP SNA Control Protocol (SNACP) UTF-8, a transformation format of Unicode and ISO 10646 Multipurpose Internet Mail Extensions (MIME) Part One: Format of Internet Message Bodies Multipurpose Internet Mail Extensions (MIME) Part Two: Media Types MIME (Multipurpose Internet Mail Extensions) Part Three: Message Header Extensions for Non-ASCII Text Multipurpose Internet Mail Extension (MIME) Part Four: Registration Procedures Multipurpose Internet Mail Extensions (MIME) Part Five: Conformance Criteria and Examples INTERNET REGISTRY IP ALLOCATION GUIDELINES Definitions of Managed Objects for APPC using SMIv2 A DNS RR for specifying the location of services (DNS SRV)

1580 Handbook of the Internet

RFC2053 RFC2054 RFC2055 RFC2056 RFC2057 RFC2058 RFC2059 RFC2060 RFC2061 RFC2062 RFC2063 RFC2064 RFC2065 RFC2066 RFC2067 RFC2068 RFC2069 RFC2070 RFC2071 RFC20n RFC2073 RFC2074 RFC2075 RFC2076 RFC2077 RFC2078 RFC2079

RFC2080 RFC2081 RFC2082 RFC2083 RFC2084 RFC2085 RFC2086 RFC2087 RFC2088 RFC2089 RFC2090 RFC2091 RFC2092 RFC2093 RFC2094 RFC2095 RFC2096 RFC2097 RFC2098 RFC2099 RFC2l00 RFC210l RFC2l02 RFC2l03 RFC2l04 RFC2l05 RFC2l06 RFC2l07

The AM (Armenia) Domain WebNFS Client Specification WebNFS Server Specification Uniform Resource Locators for Z39 50 Source Directed Access Control on the Internet Remote Authentication Dial In User Service (RADIUS) RADIUS Accounting INTERNET MESSAGE ACCESS PROTOCOL - VERSION 4revl IMAP4 COMPATIBILITY WITH IMAP2BIS Internet Message Access Protocol - Obsolete Syntax Traffic Flow Measurement: Architecture Traffic Flow Measurement: Meter MIB Domain Name System Security Extensions TELNET CHARSET Option IP over HIPPI Hypertext Transfer Protocol -- HTTPIl 1 An Extension to HTTP: Digest Access Authentication Internationalization of the Hypertext Markup Language Network Renumbering Overview: Why would I want it and what is it anyway? Router Renumbering Guide An IPv6 Provider-Based Unicast Address Format Remote Network Monitoring MIB Protocol Identifiers IP Echo Host Service Common Internet Message Headers The Model Primary Content Type for Multipurpose Internet Mail Extensions Generic Security Service Application Program Interface, Version2 Definition of an X 500 Attribute Type and an Object Class to Hold Uniform Resource Identifiers (URIs) RIPng for IPv6 RIPng Protocol Applicability Statement RIP-2 MD5 Authentication PNG (Portable Network Graphics) Specification Considerations for Web Transaction Security HMAC-MD5 IP Authentication with Replay Prevention IMAP4 ACL extension IMAP4 QUOTA extension IMAP4 non-synchronizing literals V2ToVl Mapping SNMPv2 onto SNMPvl within a bi-lingual SNMP agent TFTP Multicast Option Triggered Extensions to RIP to Support Demand Circuits Protocol Analysis for Triggered RIP Group Key Management Protocol (GKMP) Specification Group Key Management Protocol (GKMP) Architecture IMAPIPOP AUTHorize Extension for Simple Challenge/Response IP Forwarding Table MIB The PPP NetBIOS Frames Control Protocol (NBFCP) Toshiba's Router Architecture Extensions for ATM : Overview Request for Comments Summary RFC Numbers2000-2099 The Naming of Hosts IPv4 Address Behavior Today Multicast Support for Nimrod: Requirements and Solution Approaches Mobility Support for Nimrod: Challenges and Solution Approaches HMAC: Keyed-Hashing for Message Authentication Cisco Systems' Tag Switching Architecture Overview Data Link Switching Remote Access Protocol Ascend Tunnel Management Protocol - A TMP

RFC's 1581

RFC2108 RFC2109 RFC21 10 RFC2111 RFC2112 RFC2113 RFC21l4 RFC2115 RFC21l6 RFC2 11 7 RFC2 11 8 RFC2119 RFC2120 RFC2121 RFC2122 RFC2l23 RFC2l24 RFC2l25

RFC2l26 RFC2l27 RFC2l28 RFC2l29 RFC2130 RFC2l31 RFC2132 RFC2133 RFC2l34 RFC2l35 RFC2136 RFC2137 RFC2138 RFC2139 RFC2140 RFC2141 RFC2142 RFC2143 RFC2l45 RFC2l46 RFC2147 RFC2l48 RFC2l49 RFC2150 RFC2151 RFC2l52 RFC2l53 RFC2154 RFC2l55 RFC2165 RFC2166 RFC2167 RFC2l68 RFC2169 RFC2170 RFC2171 RFC2172

Definitions of Managed Objects for IEEE 802 3 Repeater Devices using SMIv2 HTTP State Management Mechanism MIME E-mail Encapsulation of Aggregate Documents, such as HTML (MHTML) Content-ID and Message-ID Uniform Resource Locators The MIME MultipartiRelated Content-type IP Router Alert Option Data Link Switching Client Access Protocol Management Information Base for Frame Relay DTEs Using SMIv2 X 500 Implementations Catalog-96 Protocol Independent Multicast-Sparse Mode (PIM-SM): Protocol Microsoft Point-To-Point Compression (MPPC) Protocol Key words for use in RFCs to Indicate Requirement Level Managing the X 500 Root Naming Context Issues affecting MARS Cluster Size VEMMI URL Specification Traffic Flow Measurement: Experiences with NeTraMet Cabletron's Light-weight Flow Admission Protocol Specification The PPP Bandwidth Allocation Protocol (BAP) I The PPP Bandwidth Allocation Control Protocol (BACP) ISO Transport Service on top ofTCP (lTOT) ISDN Management Information Base using SMlv2 Dial Control Management Information Base using SMlv2 Toshiba's Flow Attribute Notification Protocol (FANP) The Report of the lAB Character Set Workshop held29 February - I March, 1996 Dynamic Host Configuration Protocol DHCP Options and BOOTP Vendor Extensions Basic Socket Interface Extensions for Ipv6 Articles of Incorporation of Internet Society Internet Society By-Laws ISOC Board of Trustees Dynamic Updates in the Domain Name System (DNS UPDATE) Secure Domain Name System Dynamic Update Remote Authentication Dial In User Service (RADIUS) RADIUS Accounting TCP Control Block Interdependence URN Syntax Mailbox Names for Common Services, Roles and Functions Encapsulating IP with the Small Computer System Interface Use and Interpretation ofHTTP Version Numbers US Government Internet Domain Names Federal Networking TCP and UDP over IPv6 Jumbograms Deployment of the Internet White Pages Service Multicast Server Architectures for MARS-based ATM multicasting Humanities and Arts: Sharing Center Stage on the Internet A Primer On Internet and TCP/IP Tools and Utilities UTF-7 A Mail-Safe Transformation Format of Unicode PPP Vendor Extensions OSPF with Digital Signatures Definitions of Managed Objects for APPN using SMIv2 Service Location Protocol APPN Implementer's Workshop Closed Pages Document DLSw v2 0 Enhancements Referral Whois (RWhois) Protocol VI 5 Resolution of Uniform Resource Identifiers using the Domain Name System A Trivial Convention for using HTTP in URN Resolution Application REQuested IP over ATM (AREQUIPA) MAPOS - Multiple Access Protocol over SONET/SDH Version 1 MAPOS Version 1 Assigned Numbers

1582 Handbook of the Internet

RFC2173 RFC2174 RFC2175 RFC2176 RFC2177 RFC2178 RFC2179 RFC2180 RFC2181 RFC2182 RFC2183

RFC2184

RFC2185 RFC2186 RFC2187 RFC2188

RFC2189 RFC2190 RFC2191 RFC2192 RFC2193 RFC2194 RFC2195 RFC2196 RFC2197 RFC2198 RFC2200 RFC2201 RFC2202 RFC2203 RFC2204 RFC2205 RFC2206 RFC2207 RFC2208

RFC2209 RFC2210 RFC22 1 I RFC2212 RFC22 13 RFC22 I 4

RFC2215 RFC2216 RFC2217 RFC22 1 8 RFC2219 RFC2220 RFC2221 RFC2222 RFC2223 RFC2224

A MAPOS version 1 Extension - Node Switch Protocol A MAPOS version 1 Extension - Switch-Switch Protocol MAPOS 16 - Multiple Access Protocol over SONET/SDH with 16 Bit Addressing IPv4 over MAPOS Version 1 IMAP4 IDLE command OSPF Version2 Network Security For Trade Shows IMAP4 Multi-Accessed Mailbox Practice Clarifications to the DNS Specification Selection and Operation of Secondary DNS Servers Communicating Presentation Information in Internet Messages: The Content-Disposition Header Field MIME Parameter Value and Encoded Word Extensions: Character Sets, Languages, and Continuations Routing Aspects of IPv6 Transition Internet Cache Protocol (ICP), version2 Application of Internet Cache Protocol (ICP), version2 AT &TINeda's Efficient Short Remote Operations (ESRO) Protocol Specification Version 12 Core Based Trees (CBT version2) Multicast Routing RTP Payload Format for H 263 Video Streams VENUS - Very Extensive Non-Unicast Service IMAP URL Scheme IMAP4 Mailbox Referrals Review of Roaming Implementations IMAP/POP AUTHorize Extension for Simple ChaJlenge/Response Site Security Handbook SMTP Service Extension for Command Pipelining RTP Payload for Redundant Audio Data INTERNET OFFICIAL PROTOCOL STANDARDS Core Based Trees (CBT) Multicast Routing Architecture Test Cases for HMAC-MDS and HMAC-SHA-l RPCSEC _ GSS Protocol Specification ODETTE File Transfer Protocol Resource ReSerVation Protocol (RSVP) -- Version 1 Functional Specification RSVP Management Information Base using SMIv2 RSVP Extensions for IPSEC Data Flows Resource ReSerVation Protocol (RSVP) -- Version I Applicability Statement Some Guidelines on Deployment Resource ReSerVation Protocol (RSVP) -- Version I Message Processing Rules The Use of RSVP with IETF Integrated Services Specification of the Controlled-Load Network Element Service Specification of Guaranteed Quality of Service Integrated Services Management Information Base using SMIv2 Integrated Services Management Information Base Guaranteed Service Extensions using SMIv2 General Characterization Parameters for Integrated Service Network Elements Network Element Service Specification Template Telnet Com Port Control Option A Common Schema for the Internet White Pages Service Use ofDNS Aliases for Network Services The Application/MARC Content-type IMAP4 Login Referrals Simple Authentication and Security Layer (SASL) Instructions to RFC Authors NFS URL Scheme

RFC's 1583

RFC2226 RFC2227 RFC2228 RFC2229 RFC2230 RFC2231

RFC2232 RFC2233 RFC2234 RFC2235 RFC2236 RFC2237 RFC2238 RFC2239

RFC2240 RFC2241 RFC2242 RFC2243 RFC2244 RFC2245 RFC2247 RFC2248 RFC2249 RFC2250 RFC2251 RFC2252 RFC2253

RFC2254 RFC2255 RFC2256 RFC2257 RFC2258 RFC2259 RFC2260 RFC226I RFC2262

RFC2263 RFC2264

RFC2265

RFC2266 RFC2267

RFC2268 RFC2269 RFC2270 RFC227 I RFC2272

RFC2273 RFC2274

IP Broadcast over ATM Networks Simple Hit-Metering and Usage-Limiting for HTTP FTP Security Extensions A Dictionary Server Protocol Key Exchange Delegation Record for the DNS MIME Parameter Value and Encoded Word Extensions: Character Sets, Languages, and Continuations Definitions of Managed Objects for DLUR using SMIv2 The Interfaces Group MIB using SMIv2 Augmented BNF for Syntax Specifications: ABNF Hobbes' Internet Timeline Internet Group Management Protocol, Version2 Japanese Character Encoding for Internet Messages Definitions of Managed Objects for HPR using SMlv2 Definitions of Managed Objects for IEEE 802 3 Medium Attachment Units (MAUs) us­ing SMlv2 A Legal Basis for Domain Name Allocation DHCP Options for Novell Directory Services NetWare/IP Domain Name and Information OTP Extended Responses ACAP -- Application Configuration Access Protocol Anonymous SASL Mechanism Using Domains in LDAP/X 500 Distinguished Names Network Services Monitoring MIB Mail Monitoring MIB RTP Payload Format for MPEGlIMPEG2 Video Lightweight Directory Access Protocol (v3) Lightweight Directory Access Protocol (v3): Attribute Syntax Definitions Lightweight Directory Access Protocol (v3): UTF-8 String Representation of Distin­guished Names The String Representation ofLDAP Search Filters The LDAP URL Format A Summary of the X 500(96) User Schema for use with LDAPv3 Agent Extensibility (AgentX) Protocol Version 1 Internet Nomenclator Project Simple Nomenclator Query Protocol (SNQP) Scalable Support for Multi-homed Multi-provider Connectivity An Architecture for Describing SNMP Management Frameworks Message Processing and Dispatching for the Simple Network Management Protocol (SNMP) SNMPv3 Applications User-based Security Model (USM) for version 3 of the Simple Network Management Protocol (SNMPv3) View-based Access Control Model (V ACM) for the Simple Network Management Proto­col (SNMP) Definitions of Managed Objects for IEEE 802 12 Repeater Devices Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing A Description of the RC2(r) Encryption Algorithm Using the MARS model in non-ATM NBMA networks Using a Dedicated AS for Sites Homed to a Single Provider An Architecture for Describing SNMP Management Frameworks Message Processing and Dispatching for the Simple Network Management Protocol (SNMP) SNMPv3 Applications User-based Security Model (USM) for version 3 of the Simple Network Management

1584 Handbook of the Internet

RFC2275

RFC2276 RFC2277 RFC2278 RFC2279 RFC2280 RFC228 I RFC2282

RFC2283 RFC2284 RFC2285 RFC2286 RFC2287 RFC2288 RFC2289 RFC2290 RFC2291

RFC2292 RFC2293 RFC2294 RFC2295 RFC2296 RFC2297 RFC2298 RFC2300 RFC2301 RFC2302 RFC2303 RFC2304 RFC2305 RFC2306 RFC2307 RFC2308 RFC2309 RFC2310 RFC2311 RFC2312 RFC2313 RFC2314 RFC2315 RFC2316 RFC2317 RFC2318 RFC2319 RFC2320

RFC2321 RFC2322 RFC2323 RFC2324 RFC2325

Protocol (SNMPv3) View-based Access Control Model (V ACM) for the Simple Network Management Proto­col (SNMP) Architectural Principles of Uniform Resource Name Resolution IETF Policy on Character Sets and Languages lANA Charset Registration Procedures UTF-8, a transformation format oflSO 10646 Routing Policy Specification Language (RPSL) Cisco Hot Standby Router Protocol (HSRP) lAB and IESG Selection, Confirmation, and Recall Process: Operation of the Nominating and Recall Committees Multiprotocol Extensions for BGP-4 PPP Extensible Authentication Protocol (EAP) Benchmarking Terminology for LAN Switching Devices Test Cases for HMAC-RIPEMD 160 and HMAC-RIPEMDI28 Definitions of System-Level Managed Objects for Applications Using Existing Bibliographic Identifiers as Uniform Resource Names A One-Time Password System Mobile-IPv4 Configuration Option for PPP IPCP Requirements for a Distributed Authoring and Versioning Protocol for the World Wide Web Advanced Sockets API for IPv6 Representing Tables and Subtrees in the X 500 Directory Representing the OIR Address hierarchy in the X 500 Directory Information Tree Transparent Content Negotiation in HTTP HTTP Remote Variant Selection Algorithm -- RVSAII Ipsilon's General Switch Management Protocol Specification Version2 0 An Extensible Message Format for Message Disposition Notifications INTERNET OFFICIAL PROTOCOL STANDARDS File Format for Internet Fax Tag Image File Format (TIFF) - image/tiffMIME Sub-type Registration Minimal PSTN address format in Internet Mail Minimal FAX address format in Internet Mail A Simple Mode of Facsimile Using Internet Mail Tag Image File Format (TIFF) - F Profile for Facsimile An Approach for Using LDAP as a Network Information Service Negative Caching ofDNS Queries (DNS NCACHE) Recommendations on Queue Management and Congestion Avoidance in the Internet The Safe Response Header Field SIMIME Version2 Message Specification SIMIME Version2 Certificate Handling PKCS #1: RSA Encryption Version 1 5 PKCS #10: Certification Request Syntax Version I 5 PKCS #7: Cryptographic Message Syntax Version 1 5 Report of the lAB Security Architecture Workshop Classless IN-AD DR ARPA delegation The textlcss Media Type Ukrainian Character Set KOT8-U Definitions of Managed Objects for Classical IP and ARP Over ATM Using SMIv2 (IPOA-MIB) RIT A -- The Reliable Internetwork Troubleshooting Agent Management oflP numbers by peg-dhcp IETF Identification and Security Guidelines Hyper Text Coffee Pot Control Protocol (HTCPCP/I 0) Definitions of Managed Objects for Drip-Type Heated Beverage Hardware Devices using SMIv2

RFC's 1585

RFC2326 RFC2327 RFC2328 RFC2329 RFC2330 RFC233 I RFC2332 RFC2333 RFC2334 RFC2335 RFC2336 RFC2337 RFC2338 RFC2339

RFC2340 RFC234 I RFC2342 RFC2343 RFC2344 RFC2345 RFC2346 RFC2347 RFC2348 RFC2349 RFC2350 RFC235I RFC2352 RFC2353 RFC2354 RFC2355 RFC2356 RFC2357 RFC2358 RFC2359 RFC2360 RFC2361 RFC2362 RFC2363 RFC2364 RFC2365 RFC2366 RFC2367 RFC2368 RFC2369

RFC2370 RFC2371 RFC2372 RFC2373 RFC2374 RFC2375 RFC2376 RFC2377 RFC2378 RFC2379

Real Time Streaming Protocol (RTSP) SDP: Session Description Protocol OSPF Version2 OSPF Standardization Report Framework for IP Performance Metrics ATM Signalling Support for IP over ATM - UNI Signalling 4 0 Update NBMA Next Hop Resolution Protocol (NHRP) NHRP Protocol Applicability Statement Server Cache Synchronization Protocol (SCSP) A Distributed NHRP Service Using SCSP Classical IP to NHRP Transition Intra-LIS IP multicast among routers over A TM using Sparse Mode PIM Virtual Router Redundancy Protocol An agreement between the Internet Society, the IETF and Sun Microsystems, Inc in the matter ofNFS V 4 protocols Nortel's Virtual Network Switching (VNS) Overview Cisco Layer Two Forwarding (Protocol) 'L2F' IMAP4 Namespace RTP Payload Format for Bundled MPEG Reverse Tunneling for Mobile IP Domain Names and Company Name Retrieval Making Postscript and PDF International TFTP Option Extension TFTP Blocksize Option TFTP Timeout Interval and Transfer Size Options Expectations for Computer Security Incident Response Mapping of Airline Reservation, Ticketing, and Messaging Traffic over IP A Convention For Using Legal Names as Domain Names APPNIHPR in IP Networks APPN Implementers' Workshop Closed Pages Document Options for Repair of Streaming Media TN3270 Enhancements Sun's SKIP Firewall Traversal for Mobile IP IETF Criteria For Evaluating Reliable Multicast Transport and Application Protocols Definitions of Managed Objects for the Ethernet-like Interface Types IMAP4 ULDPLUS extension Guide for Internet Standards Writers WAVE and A VI Codec Registries Protocol Independent Multicast-Sparse Mode (PIM-SM): Protocol Specification PPP Over FUNI PPP over AAL5 Administratively Scoped IP Multicast Definitions of Managed Objects for Multicast over UNI 3 0/3 I based ATM Networks PF _KEY Key Management API, Version2 The mailto URL scheme The Use ofURLs as Meta-Syntax for Core Mail List Commands and their Transport through Message Header Fields The OSPF Opaque LSA Option Transaction Internet Protocol Version 30 Transaction Internet Protocol - Requirements and Supplemental Information IP Version 6 Addressing Architecture An IPv6 Aggregatable Global Unicast Address Format IPv6 Multicast Address Assignments XML Media Types Naming Plan for Internet Directory-Enabled Applications The CCSO Nameserver (Ph) Architecture RSVP over ATM Implementation Guidelines

1586 Handbook of the Internet

RFC2380 RFC2381 RFC2382 RFC2383 RFC2384 RFC2385 RFC2386 RFC2387 RFC2388 RFC2389 RFC2390 RFC2391 RFC2392 RFC2396 RFC2397 RFC2398 RFC2400 RFC2401 RFC2402 RFC2410 RFC2411 RFC2413 RFC2414 RFC2415 RFC2416 RFC2417 RFC2418 RFC2419 RFC2420 RFC2421 RFC2422 RFC2423 RFC2424 RFC2425 RFC2426 RFC2427 RFC2428 RFC2429 RFC2430 RFC243 1 RFC2432 RFC2433 RFC2434 RFC2435 RFC2436 RFC2437 RFC2438 RFC2439 RFC2440 RFC2441 RFC2442 RFC2443 RFC2444 RFC2445 RFC2446

RSVP over A TM Implementation Requirements Interoperation of Controlled-Load Service and Guaranteed Service with ATM A Framework for Integrated Services and RSVP over ATM ST2+ over ATM Protocol Specification - UNl3 1 Version POP URL Scheme Protection ofBGP Sessions via the TCP MD5 Signature Option A Framework for QoS-based Routing in the Internet The MIME Multipart/Related Content-type Returning Values from Forms: multipart/form-data Feature negotiation mechanism for the File Transfer Protocol Inverse Address Resolution Protocol Load Sharing using IP Network Address Translation (LSNA T) Content-lD and Message-lD Uniform Resource Locators Uniform Resource Identifiers (URI): Generic Syntax The 'data' URL scheme Some Testing Tools for TCP Implementors INTERNET OFFICIAL PROTOCOL STANDARDS Security Architecture for the Internet Protocol IP Authentication Header The NULL Encryption Algorithm and Its Use With IPsec IP Security Document Roadmap Dublin Core Metadata for Resource Discovery Increasing TCP's Initial Window Simulation Studies of Increased Initial TCP Window Size When TCP Starts Up With Four Packets Into Only Three Buffers Definitions of Managed Objects for Multicast over UNI 3 0/3 1 based ATM Networks IETF Working Group Guidelines and Procedures The PPP DES Encryption Protocol, Version2 (DESE-bis) The PPP Triple-DES Encryption Protocol (3DESE) Voice Profile for Internet Mail- version2 Toll Quality Voice - 32 kbit/s ADPCM MIME Sub-type Registration VPIM Voice Message MIME Sub-type Registration Content Duration MIME Header Definition A MIME Content-Type for Directory Information vCard MIME Directory Profile Multiprotoco\ Interconnect over Frame Relay FTP Extensions for IPv6 and NATs RTP Payload Format for the 1998 Version of ITU-T Rec H 263 Video (H 263+) A Provider Architecture for Differentiated Services and Traffic Engineering (PASTE) RTP Payload Format for BT 656 Video Encoding Terminology for IP Multicast Benchmarking Microsoft PPP CHAP Extensions Guidelines for Writing an lANA Considerations Section in RFCs RTP Payload Format for JPEG-compressed Video Collaboration between ISOC/IETF and ITU-T PKCS #1: RSA Cryptography Specifications Version2 0 Advancement ofMIB specifications on the IETF Standards Track BGP Route Flap Damping OpenPGP Message Format Working with Jon Tribute delivered at UCLA The Batch SMTP Media Type A Distributed MARS Service Using SCSP The One-Time-Password SASL Mechanism Internet Calendaring and Scheduling Core Object Specification (iCalendar) iCalendar Transport-Independent Interoperability Protocol (iTIP) Scheduling Events, BusyTime, To-dos and Journal Entries

RFC's 1587

RFC2447 RFC2448 RFC2449 RFC2453 RFC2455 RFC2456 RFC2457 RFC2458 RFC2468

iCalendar Message-based Interoperability Protocol (iMIP) AT&T's Error Resilient Video Transmission Technique POP3 Extension Mechanism", RIP Version2 Carrying Additional Information", Definitions of Managed Objects for APPN", Definitions of Managed Objects for APPN TRAPS Definitions of Managed Objects for Extended Border Node Toward the PSTN/lntemet Inter-Networking --Pre-PINT Implementations I REMEMBER lANA

Quick Guide

802.12-MIB 802.3-MIB 802.5-MIB ABNF ACAP AGENTX APPN-MIB ARCH-SNMP ARP ATM-ENCAP BGP BOOTP CLDAP CON-MD5 CONTENT DM DASS DAYTIME DC-MIB DECNET-MIB DHCP DISCARD DNS DOMAIN DSN ECHO ENTITY-MIB ESP ETHER-MIB FDDI-MIB FFIF FINGER FRAME-MIB FTP GQOS GSSAP HOST-MIB HTML HTTP-l.l IARP ICMP IDENT IGMP IMAP

RFC2020 RFC2108 RFC1748 RFC2234 RFC2244 RFC2257 RFC2155 RFC2271 RFC26 RFC83/1695/1755 RFC1771/1745/1772/1657/1997/1269/1403 RFC95112132 RFC1798 RFC1864 RFC1049 RFC2069 RFC1507 RFC867 RFC2128 RFC1559 RFC2131/1534/2132/2241 RFC863 RFC2181/1886/1995/2163/974/2308/1996/1612/2065/1611/2136 RFC10341l035 RFC1894 RFC862 RFC2037 RFC1827 RFC1643 RFC1285/1512 RFC2301 RFC1288 RFC2115 RFC959/2389/1415/2228 RFC2212 RFC2078/1509/1964/1961 RFC1514 RFC1866/2070 RFC2068/2109 RFC2390 RFC792/1256/1885 RFC1413/1414 RFC2236/1112 RFC2086/1731/2177/2088/2221/2193/2342/2087 2359/2195/2192/2060

1588 Handbook of the Internet

IP-ARC IP-ARPA IP-ATM IP-FDDI IP-FR IP-IEEE IP-IPX IP-NETBIOS IPNG IP-SLIP IP-SMDS IPV6 IP ISDN-MIB IS-IS KERBEROS LDAP MAIL MHTML MIB MIME

MOBILEIP MODEM-MIB NETBIOS NETFAX NETWAREIP NHRP NICNAME NNTP NTP ONE-PASS OSI-NSAP OSI-UDP OSPF PEM POP3 PPP

QUOTE RADIUS RARP RIP RIPNG RMON-MIB RPC RPSL RREQ RSVP RTP RTSP SDP SIP-MIB SLM-APP SLP

RFCI RFC22 RFC25 RFC90 RFC2427 RFC42 RFC32 RFC88 RFC1752 RFC55 RFC1209 RFC1883/1826/1971/1972/2019/2147/1970/2023 RFC7 1 56/1552/1234 RFC2127 RFC1195 RFC15I0 RFC2252/2253/1960/1959/2255/2251 RFC822/2249/2142 RFC2110 RFC1212/1213/2011/2012/2013/1239 RFC2045/2422/2049/1767/1847/2231/2046/2077 2047/2015/2387/1892/1848/2426/2421/2423 RFC2005/2006/2002/2344 RFC1696 RFCI00l1l002 RFC1314 RFC2242 RFC2332/2333/2335 RFC954 RFC977 RFC1119/1305 RFC2289 RFC1629 RFC1240 RFC2328/1793/2370/1850/1584/1587 RFC1423/1422/1421/1424 RFC1939/1734/2384 RFC1661/1662/1474/1473/1471/1472/2364 1378/1638/1962/1994/1762/2284/1968/1973 2363/1332/1618/1570/1989/1990/2097/1377 2043/1619/1663/1598 RFC865 RFC2138 RFC3 RFC1723/1722/2082/1724/1582 RFC2080/2091 RFC2021 1207411757 RFC183112203 RFC2280 RFC1812 RFC2205/2208/2207/2210/2206/2209 RFC1889/1890/2029/2032/2035/2250/2198 RFC2326/2222 RFC2327 RFC1694 RFC2287 RFC2165

RFC's 1589

SMFAX-IM SMI SMTP SNA SNMP

SOCKSV5 SONET-MIB STR-LDAP TABLE-MIB TCP TELNET TFTP TIFF TIME TIP TMUX TOS TP-TCP TRANS-IPV6 TRANS-MIB TXT-DIR UDP UPS-MIB URI URL USERS UTF-8 VRRP WHOIS++ X.500 X25-MIB XDR

RFC2305 RFC1l551l902 RFC821/1870/1869/2197/1652/1891/2034/1985 RFC1982/2051/1666 RFC1157/1351/1419/1420/1381/1418/1353 1352/1441/1907/2273/1382/2274 RFC1928 RFC1595 RFC2254 RFC2096 RFC793/2018/1323/2001 RFC854/855 RFC1350/2347/2348/2349 RFC2302 RFC868 RFC2371 RFC1692 RFC1349 RFCI006 RFC1933 RFC1906 RFC2425 RFC768 RFC1628 RFC2079/2396 RFC1738/1808/2017/2368/2056 RFC866 RFC2279 RFC2338 RFC18351l9131l914 RFC1777/1778/1567 RFC1461 RFC1832

1590 Handbook of the Internet

Ap12 Assigned number values This section contains information extracted from RFCI700 [Reynolds and Postel] on as­signed number values.

Ap12.1 IP Special addresses The main forms of IP addresses are:

IP-address { <Network-number>, <Host-number> }

and

IP-address { <Network-number>, <Subnet-number>, <Host-number> }

Special addresses are:

{O,O}.

{O, <Host-number>} {-l,-l}.

Host on this network. This address can only be used as a source address Host on this network Limited broadcast. This address can only be used as a desti­nation address, and should not be forwarded outside the current sub net.

{<Network-number>, -I} Directed broadcast to specified network. This address can only be used as a destination address.

{<Network-number>, <Subnet-number>, -I} Directed broadcast to specified sub net. This address can only be used as a destination address.

{<Network-number>, -1, -l} Directed broadcast to all sub nets of specified subnetted network. This address can only be used as a destination ad­dress.

{l27, <any>} Internal host loopback address. This address should never appear outside a host.

where -1 represents an address of aliI's.

IPVersions

Decimal 0

1-3 4 5 6 7 8 9

10-14 15

Keyword

IP ST SIP TP/IX PIP TUBA

version Reserved Unassigned Internet Protocol ST Datagram Mode Simple Internet Protocol TP/IX: The Next Internet The P Internet Protocol TUBA Unassigned Reserved

IP protocol numbers

Decimal o 1 2 3 4 5 6 7

8 9

10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 61 62 63 64 65 66

Keyword

ICMP IGMP GGP IP ST TCP UCL EGP IGP BBN-RCC-MON NVP-II PUP ARGUS EMCON XNET CHAOS UDP MUX DCN-MEAS HMP PRM XNS-IDP TRUNK-1 TRUNK-2 LEAF-1 LEAF-2 RDP IRTP ISO-TP4 NETBLT MFE-NSP MERIT-INP SEP 3PC IDPR XTP DDP IDPR-CMTP TP++ IL SIP SDRP SIP-SR SIP-FRAG IDRP RSVP GRE MHRP BNA SIPP-ESP SIPP-AH I-NLSP SWIPE NHRP

CFTP

SAT-EXPAK KRYPTOLAN RVD

Protocol Reserved Internet Control Message Internet Group Management Gateway-to-Gateway IP in IP (encasulation) Stream Transmission Control UCL Exterior Gateway Protocol any private interior gateway BBN RCC Monitoring Network Voice Protocol PUP ARGUS EMCON Cross Net Debugger Chaos User Datagram Multiplexing DCN Measurement Subsystems Host Monitoring Packet Radio Measurement XEROX NS IDP Trunk-1 Trunk-2 Leaf-1 Leaf-2 Reliable Data Protocol Internet Reliable Transaction ISO Transport Protocol Class 4 Bulk Data Transfer Protocol MFE Network Services Protocol MERIT Internodal Protocol Sequential Exchange Protocol Third Party Connect Protocol Inter-Domain Policy Routing Protocol XTP Datagram Delivery Protocol IDPR Control Message Transport Proto TP++ Transport Protocol IL Transport Protocol Simple Internet Protocol Source Demand Routing Protocol SIP Source Route SIP Fragment Inter-Domain Routing Protocol Reservation Protocol General Routing Encapsulation Mobile Host Routing Protocol BNA SIPP Encap Security Payload SIPP Authentication Header Integrated Net Layer Security TUBA IP with Encryption NBMA Next Hop Resolution Protocol any host internal protocol CFTP any local network SATNET and Backroom EXPAK Kryptolan MIT Remote Virtual Disk Protocol

1592 Handbook of the Internet

67 68 69 70 71 72 73 74 75 76 77 78 79 80 81

IPPC

SAT-MON VISA IPCV CPNX CPHB WSN PVP BR-SAT-MON SUN-ND WB-MON WB-EXPAK ISO-IP VMTP

Internet Pluribus Packet Core any distributed file system SATNET Monitoring VISA Protocol Internet Packet Core Utility Computer Protocol Net.work Executive Computer Protocol Heart Beat Wang Span Network Packet Video Protocol Backroom SATNET Monitoring SUN ND PROTOCOL-Temporary WIDEBAND Monitoring WIDEBAND EXPAK ISO Internet Protocol VMTP

82 SECURE-VMTP SECURE-VMTP 83 VINES VINES 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99

100

TTP NSFNET-IGP DGP TCF IGRP OSPFIGP Sprite-RPC LARP MTP AX.25 IPIP MICP sec-sp ETHERIP ENCAP

GMTP

TTP NSFNET-IGP Dissimilar Gateway Protocol TCF IGRP OSPFIGP Sprite RPe Protocol Locus Address Resolution Protocol Multicast Transport Protocol AX.25 Frames IP-within-IP Encapsulation Protocol Mobile Internetworking Control Pro. Semaphore Communications Sec. Pro. Ethernet.-within-IP Encapsulation Encapsulation Header any private encryption scheme GMTP

Ports

a 1 tcpmux 2 compressnet 3 compressnet 5 rje 7 echo 11 discard 13 systat 15 daytime 17 qotd 18 msp 19 chargen 20 ftp-data 21 ftp 23 telnet 25 smtp 27 nsw-fe 29 msg-icp 31 msg-auth 33 dsp 37 time 38 rap 39 rlp 41 graphics 42 name server 43 nicname 44 mpm-flags

Reserved TCP Port Service Multiplexer Management Utility Compression Process Remote Job Entry Echo Discard Active Users Daytime Quote of the Day Message Send Protocol Character Generator File Transfer [Default Data] File Transfer [Control] Telnet Simple Mail Transfer NSW User System FE MSG ICP MSG Authentication Display Support Protocol Time Route Access Protocol Resource Location Protocol Graphics Host Name Server Who Is MPM FLAGS Protocol

Assigned number values 1593

45 46 47 48 49 50 51 52 53 54 55 56 58 61 62 64 65 66 67 68 69 70 71

72 73 74 76 78

79 80 81 82 83 84 85 86 88 89 90 91 92 93 94 95 96 97 98 99 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116

mpm mpm-snd ni-ftp auditd login re-mail-ck la-maint xns-time domain xns-ch isi-gl xns-auth xns-mail ni-mail acas covia tacacs-ds sql*net bootps boot pc tftp gopher netrjs-1 netrjs-2 netrjs-3 netrjs-4 deos vettcp finger www-http hosts2-ns xfer mit-ml-dev ctf mit-ml-dev mfcobol kerberos su-mit-tg dnsix mit-dov npp dcp objcall supdup ixie swift-rvf tacnews metagram hostname iso-tsap gppitnp acr-nema csnet-ns 3com-tsmux rtelnet snagas pop2 pop3 sunrpc mcidas auth audionews sftp ansanotify

Message Processing Module MPM [default send] NI FTP Digital Audit Daemon Login Host Protocol Remote Mail Checking Protocol IMP Logical Address Maintenance XNS Time Protocol Domain Name Server XNS Clearinghouse lSI Graphics Language XNS Authentication XNS Mail NI MAIL ACA Services Communications Integrator (CIl TACACS-Database Service Oracle SQL*NET Bootstrap Protocol Server Bootstrap Protocol Client Trivial File Transfer Gopher Remote Job Service Remote Job Service Remote Job Service Remote Job Service Distributed External Object St vettcp Finger World Wide Web HTTP HOSTS2 Name Server XFER Utility MIT ML Device Common Trace Facility MIT ML Device Micro Focus Cobol Kerberos SU/MIT Telnet Gateway DNSIX Securit Attribute Token MIT Dover Spooler Network Printing Protocol Device Control Protocol Tivoli Object Dispatcher SUPDUP DIXIE Protocol Specification Swift Remote Vitural File Prot TAC News Metagram Relay NIC Host Name Server ISO-TSAP Genesis Point-to-Point Trans N ACR-NEMA Digital Imag. & Comm. Mailbox Name Nameserver 3COM-TSMUX Remote Telnet Service SNA Gateway Access Server Post Office Protocol - Version 2 Post Office Protocol - Version 3 SUN Remote Procedure Call McIDAS Data Transmission Proto Authentication Service Audio News Multicast Simple File Transfer Protocol ANSA REX Notify

1594 Handbook of the Internet

U7 uucp-path U8 sqlserv U9 nntp 120 cfdptkt 121 erpc 122 smakynet 123 ntp 124 ansatrader 125 locus-map 126 unitary 127 locus-con 128 gss-xlicen 129 pwdgen 130 cisco-fna 131 cisco-tna 132 cisco-sys 133 statsrv 134 ingres-net 135 loc-srv 136 profile 137 netbios-ns 138 netbios-dgm 139 netbios-ssn 140 emfis-data 141 emfis-cntl 142 bl-idm 143 imap2 144 news 145 uaac 146 iso-tpo 147 iso-ip 148 cronus 149 aed-512 150 sql-net 151 hems 152 bftp 153 sgmp SGMP 154 netsc-prod 155 netsc-dev 156 sqlsrv 157 knet-cmp 158 pcmail-srv 159 nss-routing 160 sgmp-traps 161 snmp 162 snmptrap 163 cmip-man 164 cmip-agent 165 xns-courier 166 s-net 167 namp 168 rsvd 169 send 170 print-srv 171 multiplex 172 cl/1 173 xyplex-mux 174 mailq 175 vmnet 176 genrad-mux 177 xdmcp 178 nextstep 179 bgp 180 ris

UUCP Path Service SQL Services Network News Transfer Protocol CFDPTKT Encore Expedited Remote Pro.Ca SMAKYNET Network Time Protocol ANSA REX Trader Locus PC-Interface Net Map Ser Unisys Unitary Login Locus PC-Interface Conn Server GSS X License Verification Password Generator Protocol cisco FNATIVE cisco TNATIVE cisco SYSMAINT Statistics Service INGRES-NET Service Location Service PROFILE Naming System NETBIOS Name Service NETBIOS Datagram Service NETBIOS Session Service EMFIS Data Service EMFIS Control Service Britton-Lee IDM Interim Mail Access Protocol NewS UAAC Protocol ISO- IPO ISO-IP CRONUS-SUPPORT AED 512 Emulation Service SQL-NET HEMS Background File Transfer Program

NETSC NETSC SQL Service KNET/VM Command/Message Protocol PCMail Server NSS-Routing SGMP-TRAPS SNMP SNMPTRAP CMIP Manager eMIP Agent Xerox Sirius Systems NAMP RSVD SEND Network PostScript Network Innovations Multiplex Network Innovations CL/1 Xyplex MAILQ VMNET GENRAD-MUX X Display Manager Control Protocol NextStep Window Server Border Gateway Protocol Intergraph

Assigned number values 1595

181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 243 245 246 344 345 346 347 348 37l 372 373 374 375

unify audit ocbinder ocserver remote-kis kis aci mumps qft gacp pro spero osu-nms srmp ire dn6-nlm-aud dn6-smm-red dIs dls-mon smux src at-rtmp at-nbp at-3 at-echo at-5 at-zis at-7 at-8 tam z39.50 914c/g anet ipx vmpwscs softpc atls dbase mpp uarps imap3 fln-spx rsh-spx cdc sur-meas link dsp3270 pdap wserv zserv fatserv csi-sgwp clearcase ulistserv legent-1 legent-2 hassle

Unify Unisys Audit SITP OCBinder OCServer Remote-KIS KIS Protocol Application Communication Inte Plus Five's MUMPS Queued File Transport Gateway Access Control Protoco Prospero Directory Service OSU Network Monitoring System Spider Remote Monitoring Proto Internet Relay Chat Protocol DNSIX Network Level Module Aud DNSIX Session Mgt Module Audit Directory Location Service Directory Location Service Mon SMUX IBM System Resource Controller AppleTalk Routing Maintenance AppleTalk Name Binding AppleTalk Unused AppleTalk Echo AppleTalk Unused AppleTalk Zone Information AppleTalk Unused AppleTalk Unused Trivial Authenticated Mail Pro ANSI Z39.50 Texas Instruments 914C/G Termi ATEXSSTR IPX VM PWSCS Insignia Solutions Access Technology License Serv dBASE Unix Netix Message Posting Protocol Unisys ARPs Interactive Mail Access Protocol Berkeley rlogind with SPX auth Berkeley rshd with SPX auth Certificate Distribution Center Survey Measurement LINK Display Systems Protocol Prospero Data Access Protocol Perf Analysis Workbench Zebra server Fatmen Server Cabletron Management Protocol Clearcase Unix Listserv Legent Corporation Legent Corporation Hassle

376 nip Amiga Envoy Network Inquiry Pr 377 tnETOS NEC Corporation 378 dsETOS NEC Corporation 379 is99c TIA/EIA/IS-99 modem client 380 is99s TIA/EIA/IS-99 modem server 381 hp-collector hp performance data collector 382 hp-managed-nodehp performance data managed no 383 hp-alarm-mgr hp performance data alarm mana

1596 Handbook of the Internet

384 arns A Remote Network Server System 385 ibm-app IBM Application 386 asa ASA Message Router Object Def. 387 aurp Appletalk Update-Based Routing 388 unidata-ldm Unidata LDM Version 4 389 ldap Lightweight Directory Access P 390 uis UIS 391 synotics-relay SynOptics SNMP Relay Port 392 synotics-brokerSynOptics Port Broker Port 393 dis Data Interpretation System 394 embl-ndt EMBL Nucleic Data Transfer

netcp netware-ip mptn kryptolan work-sol ups genie decap nced nced ncld ncld

NETscout Control Protocol Novell Netware over IP Multi Protocol Trans. Net. Kryptolan Workstation Solutions Uninterruptible Power Supply Genie Protocol decap

imsp Interactive Mail Support Proto timbuktu Timbuktu

395 396 397 398 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432

prm-sm Prospero Resource Manager Sys. prm-nm Prospero Resource Manager Node decladebug DECLadebug Remote Debug Protoc rmt Remote MT Protocol synoptics-trap Trap Convention Port smsp SMSP infoseek InfoSeek bnet BNet silverplatter Silverplatter onmux Onmux hyper-g Hyper-G ariell Ariel smpte SMPTE arie12 Ariel arie13 Ariel opc-job-start IBM Operations opc-job-track IBM Operations icad-el I CAD smartsdp smartsdp svrloc Server Location ocs cmu OCS CMU ocs amu OCS AMU utmpsd UTMPSD utmpcd UTMPCD iasd IASD

433 nnsp NNSP 434 mobileip-agent MobileIP-Agent 435 mobi1ip-mn MobilIP-MN 436 dna-cml DNA-CML

comscm dsfgw dasp sgcp decvms-sysmgt cvc hostd https

comscm dsfgw dasp sgcp decvms-sysmgt cvc hostd https MCom

Planning Planning

and Co and Co

437 438 439 440 441 442 443 444 445 446 447 448

snpp microsoft-ds ddm-rdb ddm-dfm ddm-byte

Simple Network Paging Protocol Microsoft-DS DDM-RDB DDM-RFM DDM-BYTE

Assigned number values 1597

449 450 512 513 514 515 517

as-servermap tserver exec login cmd printer talk

518 ntalk 519 520 525 526 530 531 532 533 539 540 541 543 544 550 555 556 560 561 562 564 565 570 571 600 607 606 608 609 610 611 634 666 666 704 709 729 730 731 741 742 744 747 748 749

utime efs timed tempo courier conference netnews netwall apertus-Idp uucp uucpd uucp-rlogin klogin kshell new-rwho dsf remotefs rmonitor monitor chshell 9pfs who ami meter meter ipcserver nqs nqs urm sift -uft npmp-trap npmp-Iocal npmp-gui ginad mdqs doom elcsd entrustmanager netviewdml netviewdm2 netviewdm3 netgw netrcs flexlm fujitsu-dev ris-ern kerberos-adm

750 rfile 751 pump 752 qrh 753 rrh 754 tell send 758 nlogin 759 con 760 ns 761 rxe 762 quotad 763 cycleserv 764 omserv

AS Server Mapper TServer remote process execution; remote login like exec, but automatic spooler like tenex link, but across

unixtime extended file name server timeserver newdate rpc chat readnews for emergency broadcasts Apertus Technologies Load Dete

uucp-rlogin Stuart Lynne

krcmd new-who

rfs server rmonitord

chcmd plan 9 file service who ami demon udemon Sun IPC server

Cray Unified Resource Manager Sender-Initiated/Unsolicited F npmp-trap npmp-Iocal npmp-gui ginad

doom Id Software errlog copy/server daemon EntrustManager IBM NetView DM/6000 Server/Cli IBM NetView DM/6000 send IBM NetView DM/6000 receive/tc netGW Network based Rev. Cont. Sys. Flexible License Manager Fujitsu Device Control Russell Info Sci Calendar Mana kerberos administration

1598 Handbook of the Internet

765 webster 767 phonebook 769 vid 770 cadlock 771 rtip 772 cycleserv2 773 submit 774 rpasswd 775 entomb 776 wpages 780 wpgs 786 concert 800 mdbs daemon 801 device 996 xtreelic 997 maitrd 998 busboy 999 garcon 1000 cadlock

Multicast

224.0.0.0 224.0.0.1 224.0.0.2 224.0.0.3 224.0.0.4 224.0.0.5 224.0.0.6 224.0.0.7 224.0.0.8 224.0.0.9 224.0.0.10

phone

Concert

Central Point Software

Base Address (Reserved) All Systems on this Subnet All Routers on this Subnet Unassigned DVMRP Routers OSPFIGP OSPFIGP All Routers OSPFIGP OSPFIGP Designated Routers ST Routers ST Hosts RIP2 Routers IGRP Routers

224.0.0.11 Mobile-Agents 224.0.0.12-224.0.0.255 Unassigned 224.0.1.0 VMTP Managers Group 224.0.1.1 NTP Network Time Protocol 224.0.1.2 SGI-Dogfight 224.0.1.3 Rwhod 224.0.1.4 VNP 224.0.1.5 224.0.1.6 224.0.1.7 224.0.1.8 224.0.1.9 224.0.1.10 224.0.1.11 224.0.1.12 224.0.1.13 224.0.1.14 224.0.1.15 224.0.1.16 224.0.1.17 224.0.1.18 224.0.1.19 224.0.1.20 224.0.1.21 224.0.1.22 224.0.1.23

Artificial Horizons - Aviator NSS - Name Service Server AUDIONEWS - Audio News Multicast SUN NIS+ Information Service MTP Multicast Transport Protocol IETF-1-LOW-AUDIO IETF-1-AUDIO IETF-1-VIDEO IETF-2-LOW-AUDIO IETF-2 -AUDIO IETF-2-VIDEO MUSIC-SERVICE SEANET-TELEMETRY SEANET-IMAGE MLOADD any private experiment DVMRP on MOSPF SVRLOC XINGTV

224.0.1.24 microsoft-ds 224.0.1.25 nbc-pro 224.0.1.26 nbc-pfn 224.0.1.27-224.0.1.255 Unassigned 224.0.2.1 "rwho" Group (BSD) (unofficial)

Assigned number values 1599

224.0.2.2 224.0.3.000-224.0.3.255 224.0.4.000-224.0.4.255 224.0.5.000-224.0.5.127 224.0.5.128-224.0.5.255 224.0.6.000-224.0.6.127

SUN RPC PMAPPROC CALLIT RFE Generic Service RFE Individual Conferences CDPD Groups Unassigned Cornell ISIS Project

224.0.6.128-224.0.6.255 Unassigned 224.1.0.0-224.1.255.255 ST Multicast Groups 224.2.0.0-224.2.255.255 Multimedia Conference Calls 224.252.0.0-224.255.255.255 DIS transient groups 232.0.0.0-232.255.255.255 VMTP transient groups

IP type of service

TOS Value Description Default 0000

0001 0010 0100 1000 llll

Minimize Monetary Cost Maximize Reliability Maximize Throughput Minimize Delay Maximize Security

Type of Service recommended values:

Protocol TOS Value TELNET (1) 1000 FTP

Control 1000 Data (2 ) 0100

TFTP 1000 SMTP (3 )

Command phase 1000 DATA phase 0100

Domain Name Service UDP Query 1000 TCP Query 0000 Zone Transfer 0100

NNTP 0001 ICMP

Errors 0000 Requests 0000 (4 ) Responses <same as request> (4)

Any IGP 0010 EGP 0000 SNMP 0010 BOOTP 0000

IeMP type numbers

Type Name a Echo Reply 1 Unassigned 2 Unassigned 3 Destination Unreachable 4 Source Quench 5 Redirect 6 Alternate Host Address 7 Unassigned 8 Echo 9 Router Advertisement

10 Router Selection II Time Exceeded 12 Parameter Problem

1600 Handbook ofthe Internet

(minimize delay)

(minimize delay) (maximize throughput) (minimize delay)

(minimize delay) (maximize throughput)

(minimize delay)

(maximize throughput) (minimize monetary cost)

(maximize reliability)

(maximize reliability)

13 Timestamp 14 Timestamp Reply 15 Information Request 16 Information Reply 17 Address Mask Request 18 Address Mask Reply 19 Reserved (for Security) 20-29 Reserved (for Robustness Experiment) 30 Traceroute 31 Datagram Conversion Error 32 Mobile Host Redirect 33 IPv6 Where-Are-You 34 IPv6 I-Am-Here 35 Mobile Registration Request 36 Mobile Registration Reply 37-255 Reserved

Type Name o Echo Reply

Codes o No Code

3 Destination Unreachable Codes

o Net Unreachable 1 Host Unreachable 2 Protocol unreachable

Port Unreachable 4 Fragmentation Needed and Don't Fragment was Set 5 Source Route Failed 6 Destination Network Unknown 7 Destination Host Unknown 8 Source Host Isolated 9 Communication with Destination Network is

Administratively Prohibited 10 Communication with Destination Host is

Administratively Prohibited 11 Destination Network Unreachable for Type of Service 12 Destination Host Unreachable for Type of Service

4 Source Quench Codes

o No Code 5 Redirect

Codes o Redirect Datagram for the Network (or subnet) 1 Redirect Datagram for the Host 2 Redirect Datagram for the Type of Service and Network 3 Redirect Datagram for the Type of Service and Host

6 Alternate Host Address Codes

o Alternate Address for Host 7 Unassigned 8 Echo

Codes o No Code

9 Router Advertisement Codes

o No Code 10 Router Selection

Codes o No Code

11 Time Exceeded Codes

o Time to Live exceeded in Transit 1 Fragment Reassembly Time Exceeded

Assigned number values 160 I

12 Parameter Problem

13

14

15

16

17

18

30 31 32 33 34 35 36

Codes o Pointer indicates the error 1 Missing a Required Option 2 Bad Length

Timestamp Codes

0 No Code Timestamp Reply Codes

0 No Code Information Request Codes

0 No Code Information Reply Codes

0 No Code Address Mask Request Codes

0 No Code Address Mask Reply Codes

0 No Code Traceroute Datagram Conversion Error Mobile Host Redirect IPv6 Where-Are-You IPv6 I-Am-Here Mobile Registration Request Mobile Registration Reply

TCPoptions

Type Length Description 0 End of Option List 1 No-Operation 2 4 Maximum Segment Lifetime 3 3 WSOPT - Window Scale 4 2 SACK Permitted 5 N SACK 6 6 Echo (obsoleted by option 8) 7 6 Echo Reply (obsoleted by option by 8 10 TSOPT - Time Stamp Option 9 2 Partial Order Connection Permited 10 5 Partial Order Service Profile 11 CC 12 CC.NEW 13 CC.ECHO 14 3 TCP Alternate Checksum Request 15 N TCP Alternate Checksum Data 16 Skeeter 17 Bubba 18 3 Trailer Checksum Option

Domain Names

For the Internet (IN) class the following are defined:

TYPE Value Description A 1 Host address NS 2 Authoritative name server

8)

MD 3 Mail destination (Obsolete - use MX) MF 4 Mail forwarder (Obsolete - use MX)

1602 Handbook of the Internet

CNAME 5 Canonical name for an alias SOA 6 Start of a zone of authority MB 7 Mailbox domain name MG 8 Mail group member MR 9 Mail rename domain name NULL 10 Null RR WKS 11 Well-known service description PTR 12 Domain name pointer HINFO 13 Host information MINFO 14 Mailbox or mail list information MX 15 Mail exchange TXT 16 Text strings RP 17 For Responsible Person AFSDB 18 For AFS Data Base location

Mail encoder header types

Keyword Description EDIFACT EDIFACT format EDI-X12 EDI X12 format EVFU FORTRAN format FS File System format Hex Hex binary format LZJU90 LZJU90 format LZW LZW format Message Encapsulated Message PEM Privacy Enhanced Mail PGP Pretty Good Privacy Postscript Postscript format Shar Shell Archive format Signature Signature Tar Tar format Text Text uuencode uuencode format URL external URL-reference

BOOTP and DHCP parameters

Tag o 1

2 3 4

5 6 7

8 9

10 11 12 13 14 15 16 17 18 19 20 21 22 23 24

Name Data Length Pad Subnet Mask Time Offset Gateways Time Server Name Server Domain Server Log Server Quotes Server LPR Server Impress Server RLP Server Hostname Boot File Size Merit Dump File Domain Name Swap Server Root Path Extension File Forward On/Off SrcRte On/Off Policy Filter Max DG Assembly Default IP TTL MTU Timeout

o 4

4 N N

N N N

N N

N N N 2

N

N N N 1

1 N 2 1 4

Meaning None Subnet Mask Value Time Offset in Seconds from UTC N/4 Gateway addresses N/4 Timeserver addresses N/4 IEN-116 Server addresses N/4 DNS Server addresses N/4 Logging Server addresses N/4 Quotes Server addresses N/4 Printer Server addresses N/4 Impress Server addresses N/4 RLP Server addresses Hostname string Size of boot file in 512 byte chunks Client to dump and name the file to dump it to The DNS domain name of the client Swap Server addeess Path name for root disk Path name for more BOOTP info Enable/Disable IP Forwarding Enable/Disable Source Routing Routing Policy Filters Max Datagram Reassembly Size Default IP Time to Live Path MTU Aging Timeout

Assigned number values 1603

25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63

MTU Plateau MTU Interface MTU Subnet

N 2 1

Broadcast Address 4 Mask Discovery 1 Mask Supplier 1 Router Discovery 1 Router Request 4 Static Route N Trailers 1 ARP Timeout 4 Ethernet 1 Default TCP TTL 1 Keepalive Time 4 Keepalive Data 1 NIS Domain N NIS Servers N NTP Servers N Vendor Specific N NETBIOS Name Srv N NETBIOS Dist Srv N NETBIOS Note Type 1 NETBIOS Scope N X Window Font N X Window Manmager N Address Request 4 Address Time 4 Overload DHCP Msg Type DHCP Server Id

1

1

4 Parameter List N DHCP Message N DHCP Max Msg Size 2 Renewal Time 4 Rebinding Time 4 Class Id N Client Id N Netware/IP Domain N Netware/IP Option N

128-154 Reserved 255 End o

Directory system names

Keyword Attribute (X.520 keys) CN L ST o OU C

CommonName LocalityName StateOrProvinceName OrganizationName OrganizationalUnitName CountryName

Content types and subtypes

Type Subtype text plain

richtext tab-separated-val

multipart mixed alternative digest parallel appledouble header-set

1604 Handbook of the Internet

Path MTU Plateau Table Interface MTU Size All Subnets are Local Broadcast Address Perform Mask Discovery Provide Mask to Others Perform Router Discovery Router Solicitation Address Static Routing Table Trailer Encapsulation ARP Cache Timeout Ethernet Encapsulation Default TCP Time to Live TCP Keepalive Interval TCP Keepalive Garbage NIS Domain Name NIS Server Addresses NTP Server Addresses Vendor Specific Information NETBIOS Name Servers NETBIOS Datagram Distribution NETBIOS Note Type NETBIOS Scope X Window Font Server X Window Display Manager Requested IP Address IP Address Lease Time Overloaf !'sname'! or "file" DHCP Message Type DHCP Server Identification Parameter Request List DHCP Error Message DHCP Maximum Message Size DHCP Renewal (T1) Time DHCP Rebinding (T2) Time Class Identifier Client Identifier Netware/IP Domain Name Netware/IP sub Options

None

message rfc822 partial external-body news

application octet-stream postscript oda atomicmail andrew-inset slate wita dec-dx dca-rft activemessage rtf applefile mac-binhex40 news-message-id news-transmission wordperfect5.1 pdf zip macwriteii msword remote-printing

image jpeg gif ief tiff

audio basic video mpeg

quicktime

Character Sets

US-ASCII ISO-8859-4 ISO-8859-8

Access Types

FTP LOCAL-FILE

ISO-8859-1 ISO-8859-5 ISO-8859-9

ANON-FTP MAIL - SERVER

Conversion Values

7BIT 8BIT QUOTED-PRINTABLE

MIME I X.400 mapping table

MIME content-type text/plain

charset~us-ascii

charset~iso-8859-x

text/richtext application/oda application/octet-stream application/postscript image/g3fax image/jpeg image/gif audio/basic video/mpeg

ISO-8859-2 ISO-8859-6

TFTP AFS

BASE64 BINARY

X.400 Body Part

ia5-text

ISO-8859-3 ISO-8859-7

Extended Body Part - GeneralText no mapping defined Extended Body Part - ODA bilaterally-defined Extended Body Part - mime-postscript-body g3 - facsimile Extended Body Part - mime-jpeg-body Extended Body Part - mime-gif-body no mapping defined no mapping defined

Assigned number values 1605

X.400 to MIME Table

X.400 Basic Body Part MIME content-type ia5-text voice g3-facsimile g4-class1

text/plain;charset=us-ascii No Mapping Defined image/g3fax no mapping defined

teletex no mapping defined videotex no mapping defined encrypted bilaterally-defined nationally-defined externally-defined

no mapping defined application/octet-stream no mapping defined See Extended Body Parts

X.400 Extended body part conversion

X.400 Extended Body Part MIME content-type GeneralText ODA mime-postscript-body mime-jpeg-body mime-gif-body

text/plain;charset=iso-8859-x application/oda application/postscript image/jpeg image/gif

InverseARP

Number 1 2

3 4

5 6

7 8 9 10

Operation Code (op) REQUEST REPLY request Reverse reply Reverse DRARP-Request DRARP-Reply DRARP-Error InARP-Request InARP-Reply ARP-NAK

Number Hardware Type (hrd) 1 2 3 4

5

6 7

8 9

10 11 12 13 14 15 16 17 18 19 20 21

Ethernet (10Mb) Experimental Ethernet (3Mb) Amateur Radio AX.25 Proteon ProNET Token Ring Chaos IEEE 802 Networks ARCNET Hyperchannel Lanstar Autonet Short Address LocalTalk LocalNET Ultra link SMDS Frame Relay Asynchronous Transmission Mode HDLC Fibre Channel Asynchronous Transmission Mode Serial Line Asynchronous Transmission Mode

1606 Handbook of the Internet

IEEE 802 numbers of interest

Link Service Access Point IEEE Internet binary binary decimal Description

00000000 00000000 0 Null LSAP 01000000 00000010 2 Indiv LLC Sublayer Mgt 11000000 00000011 3 Group LLC Sublayer Mgt 00100000 00000100 4 SNA Path Control 01100000 00000110 6 Reserved (DOD IP) 01110000 00001110 14 PROWAY-LAN 01110010 01001110 78 EIA-RS 511 01111010 01011110 94 ISlIP 01110001 10001110 l42 PROWAY-LAN 01010101 10101010 170 SNAP 01111111 11111110 254 ISO CLNS IS 8473 11111111 11111111 255 Global DSAP

lANA Ethernet address block

The Internet Assigning Numbers Authority (lANA) owns the starting Ethernet address of:

0000000000000000 01U 1010 (which is 00-00-5EJ

This address can be used with the multicast bit (which is the first bit to the address) to cre­ate an Internet Multicast. It has the form:

1000 0000 0000 0000 0111 1010 xxxx xxxO xxxx xxxx xxxx xxxx

Multicast Bit o ~ Internet Multicast

1 = Assigned by lANA for

other uses

This gives an address range from 01-00-5E-00-00-00 to 01-00-5E-7F-FF-FF.

Ap6.1.2 Ethernet vendor address

An Ethernet address is 48 bits. The first 24 bits identifies the manufacturer and the next 24 bits identifies the serial number. The manufacturer codes include:

OOOOOC Cisco OOOOOE Fujitsu OOOOOF NeXT 000010 Sytek OOOOlD Cabletron 000020 DIAB 000022 Visual Technology 00002A TRW 000032 GEC Computers Ltd 00005A S & Koch 00005E lANA 000065 Network General 00006B MIPS 000077 MIPS 00007A Ardent 000089 Cayman Systems 000093 Proteon 00009F Ameristar Technology

Assigned number values 1607

OOOOA2 OOOOA3 OOOOA6 0000A7 0000A9 OOOOAA 0000B3 0000B7 OOOOBC OOOOCO 0000C5 0000C6 0000C8 0000C9 0000D7 OOOODD OOOODE 0000E2 OOOOEF OOOOFD 000102 001700 008064 00802D 00808C 0080C2 0080D3 OOAAOO OODDOO 00DD01 020701 020406 026086 02608C 02CF1F 080002 080003 080005 080008 080009 08000A 08000B 080011 080014 080017 08001A 08001B 08001E 080020 080022 080025 080026 080027 080028 08002B 08002E 08002F 080036 080037 080038 080039 080041 080046 080047

Wellfleet NAT Network General NCD Network Systems Xerox CIMLinc Dove Allen-Bradley Western Digital Farallon phone net card HP INO Altos Emulex Dartmouth College Gould Unigraph Acer Counterpoint Alantec High Level Hardvare BBN Kabel Wyse Technology Xylogics, Inc. Frontier Software Development IEEE 802.1 Committee Shiva Intel Ungermann-Bass Ungermann-Bass Racal InterLan BBN Satelcom MegaPac 3Com CMC 3Com ACC Symbo1ics BBN Hewlett-Packard Nestar Systems Unisys Tektronix, Inc. Excelan NSC Data General Data General Apollo Sun NBI CDC Norsk Data (Nord) PCS Computer Systems TI DEC Metaphor Prime Computer Intergraph Fujitsu-Xerox Bull Spider Systems DCA Sony Sequent

1608 Handbook of the Internet

080049 Univation 08004C Encore 08004E BICC 0800S6 Stanford University 0800SA IBM 080067 Comdesign 080068 Ridge 080069 Silicon Graphics 08006E Concurrent 08007S DDE 08007C Vital ink 080080 XIOS 080086 Imagen/QMS 080087 Xyplex 080089 Kinetics 08008B Pyramid 08008D XyVision 080090 Retix Inc 800010 AT&T

Ethernet multicast addresses

An Ethernet multicast address has a multicast bit, a 23-bit vendor identifier part and a 24-bit vendor assigned part.

Ethernet Type Address Field 01-00-SE-00-00-00- 0800 01-00-SE-7F-FF-FF 01-00-SE-80-00-00- ???? 01-00-SE-FF-FF-FF 01-80-C2-00-00-00 -802-09-00-02-04-00-01? 8080? 09-00-02-04-00-02? 8080? 09-00-09-00-00-01 800S 09-00-09-00-00-01 -802-09-00-09-00-00-04 800S? 09-00-1E-00-00-00 8019? 09-00-2B-00-00-00 6009? 09-00-2B-00-00-01 8039? 09-00-2B-00-00-02 803B? 09-00-2B-00-00-03 8038 09-00-2B-00-00-04 ???? 09-00-2B-00-00-OS ???? 09-00-2B-00-00-06 803D? 09-00-2B-00-00-07 8040? 09-00-2B-00-00-OF 6004 09-00-2B-00-00-1x ???? 09-00-2B-01-00-00 8038 09-00-2B-01-00-01 8038 09-00-4E-00-00-02? 8137? 09-00-S6-00-00-00- ???? 09-00-S6-FE-FF-FF 09-00-S6-FF-00-00- 80SC 09-00-S6-FF-FF-FF 09-00-77-00-00-01 ???? 09-00-7C-02-00-0S 8080? OD-1E-1S-BA-DD-06 ???? AB-00-00-01-00-00 6001 AB-00-00-02-00-00 6002 AB-00-00-03-00-00 6003 AB-00-00-04-00-00 6003 AB-OO-OO-OS-OO-OO ????

Usage Internet Multicast

Internet reserved by lANA

Spanning tree (for bridges) Vital ink printer Vitalink management HP Probe HP Probe HP DTC Apollo DOMAIN DEC MUMPS? DEC DSM/DTP? DEC VAXELN? DEC Lanbridge Traffic Monitor (LTM) DEC MAP End System Hello DEC MAP Intermediate System Hello DEC CSMA/CD Encryption? DEC NetBios Emulator? DEC Local Area Transport (LAT) DEC Experimental DEC LanBridge Copy packets DEC LanBridge Hello packets Novell IPX Stanford reserved

Stanford v Kernel, version 6.0

Retix spanning tree bridges Vital ink diagnostics HP DEC Maintenance Operation Protocol DEC Maintenance Operation Protocol DECNET Phase IV end node Hello DECNET Phase IV Router Hello packets Reserved DEC through

Assigned number values 1609

AB-00-03-FF-FF-FF AB-00-03-00-00-00 AB-00-04-00-xx-xx AB-00-04-01-xx-yy

CF-OO-OO-OO-OO-OO

Ethernet broadcast address

FF-FF-FF-FF-FF-FF FF-FF-FF-FF-FF-FF FF-FF-FF-FF-FF-FF FF-FF-FF-FF-FF-FF FF-FF-FF-FF-FF-FF FF-FF-FF-FF-FF-FF FF-FF-FF-FF-FF-FF FF-FF-FF-FF-FF-FF FF-FF-FF-FF-FF-FF

6004 ???? 6007

9000

0600 0800 0804 0806 o BAD 1600 8035 807C 809B

1610 Handbook of the Internet

DEC Local Area Transport (LAT) - old Reserved DEC customer private use DEC Local Area VAX Cluster groups Sys. Communication Architecture (SCA) Ethernet Configuration Test protocol (Loopback)

XNS packets, Hello or gateway search? IP (e.g. RWHOD via UDP) as needed CHAOS ARP (for IP and CHAOS) as needed Banyan VALID packets, Hello or gateway search? Reverse ARP Merit Internodal (INP) EtherTalk

Index

01111110,452,453,456,465-468,1438,1446

1.411200 Mbps, 198

1.536Mbps, 462, 463 1.544Mbps, 463, 818,1459

1.920Mbps, 462, 463

1000BASE-T,364,373,375

100BASE,364,366-369,371, 372,374, 382, 398

100BASE-FX, 366

100BASE-T4,366,368,369,382

100BASE-TX, 364,366,367,370, 371,375,398

100Mbps,26,28,330,333,351,355,356,366-

369,371-375,390,398,400,417,427,428, 447,990,1441,1445,1447,1452,1458

100Mbps Ethernet, 366,1441 100VG-AnyLAN, 366, 367, 370, 371, 390, 852,

1441, 1458

10BASE2,323,364,365

10BASE5, 364, 365

lOBASE-FL, 364

10BASE-T,323,364,365,367,368,371

10Mbps,26,214,259,323,333,355,356,358,

363-367,398,400,401,666,856,990,1441,

1445, 1447, 1451

128-bit code, 756 128-bitkey, 748,754, 755, 764 128kbps,200,462,818,1330 155Mbps,390,401,441,447,990 16kbps, 198,461,462,464,465,471

16Mbps,26,28,330,401,409,413,415,990 192kbps, 462, 464 2.048 Mbps, 463, 1450 2.4Gbps, 441

2'scomplement, 17, 18, 1142

200Mbps, 417 24-bit color, 179, 188, 190, 1195, 1452,

256 colors, 188-190,215,218,986 25Hz, 208

28.8 kbps, 295, 296, 297, 461, 818

2D luminance, 194

2Mbps, 214 300bps, 163,292,295,297

32 kbps, 462

3DES, 747

4:1:1,213

4:2:2,193,197,213

4 kHz, 200, 295, 471

400Mbps, 367,371

44.lkHz, 177, 198, 1330

4B/5B,418,420, 421

4Mbps,28,214,409,413,415

5. I-channel, 201

525 lines, 208, 212

622Mbps, 441

625 lines, 208, 212

64kbps, 170,200,461-465,471-473,818, 1451,

1454 6MHz, 157, 177

8 kHz, 461, 471, 806 8B/lOB, 373, 374

8B6T, 368, 369

8-to-14 bit modulation, 1463

96Mbps, 367, 371

A4 image, 201 AA,302, 755, 775, 776,1439,1461,1474

AAL

functionality, 442 service levels, 441

services, 442

type 2, 442 type 3/4, 443

type 5, 444 AC, 176,199,410,464,803,934, 1439, 1461 AC-3, 176, 199 ACK, 236, 451, 470, 537, 539, 543, 545-547,

1437, 1461

acknowledgement, 311, 320, 332, 438, 458,459,

468,476,478,480,482,483,531,533-535, 537,539,541,543,544,546,549,555,558,

559,567,793,798,877,921-923 ACL

standard, 721

extended,721

examples, 723

placing, 725 Active X, 786

adaptation layer, 434, 1445, 1461

adaptive dictionary data compression, 184 Adaptive Huffman, 183, 184, 1443 AJ)C,23, 198, 1461

address bus, 10, 12, 14-16 field,324,325,357,362,377,380, 423,435,

453,465,466,485,499,522,527,684

filtering, 699

resolution, 601,1443

addressable memory, 15, 16,401

addressing, 58, 94, 97, 152,360,405,437,495, 501,502,516,531,536,556,674,796,815, 892,922,1449,1453-1456,1460

ADPCM, 442, 471,1461,1469,1587 AES,1461 AFI,485,486,1461 AGP, 1461 AIX,56

alias, 902

alphabet shifting, 738

ALT,987,1188, 1191,1409, 1421, 1512,1527 AM,24, 150, 161-163, 167, 168,401, 1444,1461,

1581 AMI,463,464,1461

amplitude modulation, 150, 161, 164,208, 1461, 1468

amplitude-shift keying, 163 anchors, 989 AND, 227, 228, 258,1141-1144,1146 angle, 343,424, 767,1168,1170,1416 animation, 23, 176,697,815,820, 1181, 1249,

1325 anonymous,821,822,863,864, 1469, 1573,

1574 ANSI, 20,151,274,373,375,418,425,428,431,

434,983,1437,1444,1445,1460,1461 API,50, 57,81,605, 796, 797,804,889,1180,

1461,1466,1470,1481,1585,1586 Apple, 56,57,59,564, 796,952,1317,1319,

1330, 1444, 1457 applet viewer, 1132 AppleTalk, 59, 319, 607, 660, 668, 671, 876, 877,

1444, 1461, 1470

application layer, 313, 314, 316, 320, 536, 595, 1444

application level gateway, 700, 701 ARC, 1465 architecture, 2-5, 9, 10, 110,308,337,436,516,

1612 Handbook of the Internet

520,551,565,687,796,818,875,919,926, 1441,1462,1469,1470,1481

archive,885,1477

arithmetic operator, 1139, 1140 arp,325,376-380,529,601,658,660, 662,663,

666,671,855,856,893,983,1444,1445,

1454,1458,1461,1465,1474,1576,1585,

1588

arrowkeys, 1197 ASCII, 17,20,151,185,239,244,261-264,267,

292,296,297,598,742,744,745,747,765,

766,768-771,797,798,803,805-809,901, 916,983,1136,1137,1142,1151,1437, 1439,1444,1461,1476

BEL, 962,1437 bit stream timings, 263 CR,242,299, 799,800,801,811,1437 DCl, 265,1437

DC2,1437 DC3,1437 DC4, 265,1437 EDT, 451, 801, 813,1437,1464

FF, 325, 376-378, 381, 386, 411, 422, 529, 808,984,1437,1440,1464,1474

HT,1437 LF, 799,800,801,811,1437 NUL,1437 SUB, 970,1437 VI,1437

ASK, 163, 164,1444, 1456,1461 ASP, 1085-1130 aspect ratio, 215, 217 asymmetric and symmetric switches, 398 asymmetrical compression, 195 asynchronous,47,121,261,263,295,296,303,

422,423,452,455,457,468,476,1407, 1445, 1460, 1461, 1469

asynchronous modem, 296 AT,56,291,292,297,298,301-305,352,367,

757,962,1405,1408,1461,1470,1583,1588 at (execute commands at later date), 74 ATDT, 291, 297, 298, 300, 301 ATH, 292, 298-301

ATM,152,227,240,259,295,355,372,390, 398,401,429,431-442,444-447,451,461, 473,487,532,575,595,653,673,990,997, 1441, 1442, 1445, 1447, 1448, 1461, 1465, 1578-1582,1584-1587

adaptation layer, 434, 440, 1441, 1442, 1445,

1461

cells, 434, 436, 440,1445

data link, 440

flow control, 445

gateway, 440

header, 191,215-219,225,226,360,434,

435,441-445,476,477,479,498,499,

516-518,521,522,525,532,537-541,

556,558,640,685,691,692,749,783,

797,802-807,826-828,831-834,836,

912,922,970,991,1131,1225,1445,

1449, 1462, 1558

header (GFC), 435, 436, 813

header(VPI),435,436,437,439,440

ISDN and PCM-TDM, 433

objectives, 432

OSI model, 440, 441, 442

overIP, 1442, 1465

physical layer , 441

pipe, 445

routing, 434

routing cells, 434

routing protocols, 439

signaling and call set-up, 438

signaling packets, 439

switches, 434, 439, 445

TCP/IP, 56, 333, 357, 359, 360, 440, 495, 496,

498,500,531,552,553,560,565,567,

595,597,598,697,794,797,815,876,

877,889,892,919,924,926,938,939,

983,1131

UNI, 434, 436, 438, 440, 445, 1470, 1580,

1586, 1587

VCI header, 435

virtual channel and paths, 436

attachment stations, 425

attenuation, 26-29, 160,322,338,345,346,

348,351,427,429,430,1413,1445

attributes, 31,111-113,605,689,692,693,880,

885,889-892,898-901,1418-1420,1477

changing, 891, 900

AU, 705, 815, 933, 934, 1199, 1330

audio, 21,23, 157, 174-177, 187, 192, 198-201,

236,355,427,442,471,697,733,783,803,

806,824,835,952,998,999,1131,1181,

1199,1317,1319,1320,1325,1330,1331,

1450,1452,1461,1462,1493,1517,1572,

1573

compression, 198

digital, 198, 1462

audit log, 706, 883

audit policy, 883

authentication, 92-94,121,224,516,517,519,

685,686,691,703,710,733,747,764,771,

773,774,777-780,783,784,786,834,836,

843,1448,1457,1462,1466-1469

automatically answer, 292, 295, 298

automatically dial, 295

autonomous systems, 686, 687, 690-693

AVI, 176,815, 1317,1319, 1586

backbone, 307,327,347,355,364,365,373,

374,398,404,405,424,425,687,1448,1452

network, 373, 424, 425

background images, 985

backspace, 1136, 1137

bandwidth, 25, 152, 156--161, 163, 167, 168,

179,198,200,201,295,317,319,344-355,

369,371,372,374,398,401,403,431,439,

445,446,471,673,675,678,679,682,1321,

1325, 1331, 1449, 1451, 1456

contention, 152

bank cards, 735

baseband video, 204, 207

Baud, 164, 165,263-265,273,280,286,287,

296, 1446

Baud rate, 164, 263, 264, 273, 287, 296,1446

Baudot, 151

BCC, 797, 1461

BCD, 485, 1461

bee-sting, 364

BELL, 1137, 1405

Bell Laboratories, 2, 56, 889, 962

BER, 237, 1446

BGP, 324, 550, 678, 687, 689, 690, 691-694,

1446, 1451, 1461

specification, 690

big endian, 16, 17

binary file, 901

binary manipulation, 227

binary symmetric channel, 237

biod, 121, 1565, 1566

BIOS, 7,51,54,269,1461

B-ISDN, 461, 462

bit error rate, 237

bitrate, 26,157,160,164,165,169,170,192,

Index 1613

196,198,200,214,259,263,296,322,323,

330, 333, 355, 362, 366- 368, 374, 375, 390,

398,409,414,415,424,441-444,446,461,

464,465,471,666,1330,1442,1447,1450,

1454

bit shift, 251, 258, 745,1143

bit stuffing, 466, 1446

bitmapped, 174, 1409, 1410, 1411

bitmapped image, 189,215

bits, frames, packets and segments, 326

bitstream, 196, 197,202,235,253,258,362,

369,384,385,419,421,464,466-469,808

bitwise, 258, 1139,1142-1146

AND, 227, 228, 258, 314, 757, 928, 931-933,

1141-1144,1146

operator, 1142-1144

OR,262, 742-744, 747, 752, 755, 757,1141-

1144,1146,1186,1187,1471

XOR, 1142, 1144

black box, 946

black run length coding, 202

blanking, 208, 209

block terminator, 223, 224

blueness, 190, 191

B~P,23, 176, 189, 190, 1461

BNe, 28, 323, 355, 364, 365,384,1446,1461

Boolean, 1153, 1182

BOOTP, 520, 521, 549, 852, 854-857, 893,1446,

1461,1576,1582,1588

bps, 154, 155, 157, 163, 164,202,263,292,296,

297,299,302,675,1405,1408-1412,1461

bridges, 303, 304, 307, 321-325, 327, 335, 336,

350,374-376,381,390,397,400,417,495,

496,513,514,529,560,596-598,671,841,

851,924,1441,1443,1447,1448,1452,

1455, 1458, 1459, 1461, 1577

filtering rate, 323

forward rate, 323

source route, 323

source routing, 323

spanningtree,323,324,529,672,1450

brightness, 176, 190, 191, 201, 203, 208,1507

broadband ISDN, 461

broadcast, 116,318,325,326,335,376-378,

380,381,402-405,503-505,560,656,664-

668,675,924,937,1445,1447,1456

BS,1437

BSD, 56, 120,324,684,889, 1447

1614 Handbook of the Internet

B-tree, 885

buffer, 8, 69, 85-87, 264, 267, 268, 271-279,

281-288,319,331,383,384,386,400,409,

422,424,444,446,524,531,534,541,548,

601,610-612,661,667,671,775,1331,

1445, 1540, 1549, 1550

buffered distributors, 374

busnenvork,328,330,331,333,356,367,1459

bytecodes,952,1131

C++,274,951,962,964, 1131, 1134, 1156, 1160,

1165

classes, 962

data hiding, 962

1/0 stream support, 962

objects, 962

overloading, 962

template classes, 963

virtual functions, 963

cable,24-26,153, 159, 199,316,317,321,322,

328,333,336-339,344-352,356,363-367,

373-375,382,437,596,705,1441,1447-

1449, 1451, 1456, 1458

characteristics, 26

impedance, 365

standards, 346

testing, 351

types,25,317,321,365,414

cabling, 314, 317, 337, 339, 346-351, 373, 374,

404,414,1441,1449,1451,1452,1458,1460

cabling

backbone, 347, 1446, 1460

coaxial, 26, 316, 336-339, 348, 363, 364, 373,

1446, 1457

horizontal,347

standards, 346

vertical, 347, 404

cache,377,658,661,665,668, 672,823,825,

828,831,833,855,861,1469,1583,1586

calling party number, 470

CAN, 365,1437,1462

cancellation, 338, 339

capacitance, 27

capacity, 159, 1447

carriage return, 292, 297, 301, 799, 808, 1137,

1462, 1536

Cat-

1,346,1447

2,346,1447

3-5, 27-29,346,349,351, 366-369,373,

375,390,409,414,415,1441,1447

CATNIP, 516,1462

cc:Mail, 797, 807

CCIR 601, 190

CCITT,189,224,239-241,297,302,456,461-

463,469,474,486,1405,1437,1447,1454,

1462

CD audio, 1330

CDFS, 1462, 1571

CDP, 668, 669, 671,1447

CD-quality audio, 200

CD-R, 2,10,21,30,31,59,192,197,198,371,

712,1317,1321,1462

CD-ROM, 2,10,21,30,31,59,192,197,198,

235,371,712,1317,1321,1462

CERN, 815, 834, 969, 1317

CGl, 994,1462

script, 994

cgi-bin, 994

CGM,1462

channel identification, 470

character alphabet, 185, 983, 1444

characteristic impedance, 26-28, 338, 339, 363,

414

cheapernet, 364

checkboxes, 1200, 1206

checksum,239,539,540, 556,922, 1448, 1578

chrominance, 190, 193, 197,207-209,211-213

CIF, 1462, 1464

circuit-switched, 170,427,428,433,461,462,

473,818,1454,1462

circular wait, 88

Cisco discovery protocol, 668

Cisco router commands, 670

cladding, 342-344, 424

classes,90,374,442,502,525,634, 1131, 1132,

1156,1157,1165-1167,1507,1515,1529,

1535, 1536, 1547

declaration, 1184, 1190

libraries, 1165

classes.zip, 1131, 1132, 1166

client/server, 29, 31, 32, 1l0, 398, 520,595,

633,794,818,824,854,875,876,889

architecture, 818

Clipper chip, 736, 749

clock, 11,54,74,154,155,198,261,273,295,

296,317,357,368,369,384- 386,537,545,

670,671,675,706,937,1407,1445,1459

clock period, 154, 155

CMC, 796, 797,1462

coaxial, 26-28, 259,316,330,333,336-339,

346, 348,356,362-364,373,384,413,414,

656,1446, 1148, 1451, 1457

code

block, 234, 250

convolutional, 234, 235, 250

cyclic, 234, 250, 436

digital, 147, 166, 178,227

feedback,235,268,385,445,446,1323

feedforward, 235

gain, 237

machine, 942

mappings, 741

Morse code, 187

object, 942

simple, 186

source, 180,942,943, 1459

systematic code, 235

collision, 318, 333-335, 356, 358, 359, 362, 363,

365,367,372,375,383,469,1446,1449,

1462

detection, 318, 333, 356,1462

color

conversion, 190

pixels, 188

burst, 209, 211

conversion, 190

modulation, 209

saturation, 203

space conversion, 193

per pixel, 188

COMl, 53, 54, 260, 265, 269, 270, 273, 274, 280,

285,286

COM2,53,54, 260,269,270,287,288

combinations, 4, 13, 164, 165,232,710,739-

741

comments, 970, 1134, 1419, 1474, 1579, 1581

common words

standard English, 731, 737

communications

digital, 147

model, 24

protocols, 939

Communicator, 784

compact, 199, 1331,1420, 1462, 1463

Index 1615

companding, 1444

compatibility, 57, 297, 313, 355, 368, 372, 404,

567,605,780,877, 928, 939,1180,1321,

1473

compilation, 1168

compiler, 942, 943,1131-1133,1167, 117l,

1177, 1199, 1226

components, 958

composite video, 210

compression, 164, 174-176, 179-182, 184-193,

195,196,198- 202,214,222,224,295,297,

471,671,764,765,828,832,834,835,884,

897,905,907,952,986,999,1330,1331,

1409,1452,1455,1456,1459,1460,1468

images, 815

TV,214

methods, 179

ratio, 189, 190,202,214

time, 191

computational Difficulty, 734

concatenated, 765, 902, 1137

concentrator, 328,329,334,425, 1462, 1469

connection-oriented, 320, 321, 442, 443, 533,

537,558,567,877,922,1442,1448

connectors, 7, 26, 28, 153,260,317,323, 333,

338,352,355,364,365, 371,409,413,414,

1457, 1458

consecutive zeros, 418, 420, 421

console,323,656,658,661,664,866,1320

constants, 1163, 1170, 1504, 1506, 1507, 1510,

1515, 1522, 1527-1529, 1541

constructors, 1156, 1159, 1503-1506, 1510-

1559

content, 14, 157, 158, 160,401,689,765,784-

786,802,803,805-807,810, 813,827, 828,

830, 832,834,835,933, 1319-1325, 1330,

1452, 1462

advisor, 784, 785

contention, 53, 333, 355, 370-372, 398

continuous, 235, 250, 598,1330,1459

control

field, 359-361, 410, 411, 421, 422, 434, 435,

451,453-455,457,458,465,467,468,

831,1445,1462

token,331,332,409-411

convolutional code

coding tree, 251

kin code, 250

1616 Handbook ofthe Internet

maximim likelihood, 253

most favored route, 257

rate code, 235

Trellis diagram, 165, 251-258

Viteribi decoder, 253

co-operative multitasking, 42

cookies, 1063

core system components, 45

correction, 165,227,235,236,239,244,249,

297,314,451,458,1406,1460,1464

cosine, 190,191, 197, 1168, 1459, 1463,1466

counting to Infinity, 681

CR,242,299,799-801

CR character, 299, 800

CRC, 234,239-242,250, 357,358,372,410, 423,

443,444,456,469,667,1443,1449,1462

decoding, 241

-CCITT, 239, 240, 241, 456

-8,10,12,16,32,239,240,241

crossed -pair, 352

crosstalk,21, 26,28,29,159,236-338,339,351,

375, 1449

cross-talk, 21, 26, 159,345,375

near-end,351

CRT,1462

cryptographic keys, 736

cryptographics, 731

CSON, 170,473, 1462

CS1iA,333,334,356,362,371,372,390, 398,

1441,1449,1462

ICA,1462

ICO, 333, 334, 356, 362, 37l, 372, 390, 398,

1441, 1449, 1462

CSS, 1291-1299

Crt!,75, 602, 1188, 1190, 1512

Ctri-Alt-Oel,75

CTS, 261,265, 268,269,282-285, 1407, 1412,

1413, 1462

current, 72, 75, 896, 897, 909,1182,1192-1194,

1199

cut sheet, 350, 1449

cut-through switching, 400,1449

cyclic redundancy check, 234, 357, 358, 410,

456,469,1462

cyclic redundancy check, 234, 1449

cylinders, 342

OA,410,422,423,1440, 1462

OAC, 23,177,425,1462

daemons, 121

DARPA, 495, 501,1444,1449,1454,1462,1575

DAS, 425, 426, 1462

DAT, 31,1462

data

blocks, 190,215

compression, 181, 184,297,320,1409,1413,

1460, 1579

computer-type, 152, 179,236,431,432,447,

461

decryption, 734

encapsulation, 496, 497

encryption, 732, 734, 747, 749, 754

frame, 314, 318, 319, 321-323, 330-332, 335,

337,355,356,360,375,376-379,381,

400--402,404,409- 411,418,421,422,

424,427,428,441,456,496,596

integrity,418

link layer, 171,313,315-317,322,326,357,

360,361,375,404,440,451,465,474,

476,495,556,668,731,922,1441,1443,

1445, 1449, 1450, 1452, 1455

link, 495, 1578-1582

rate, 154,365,427

type conversion, 1145

type, 962, 1135, 1168, 1170, 1171, 1177,

1178,1182

datagram, 115, 120, 152,497- 500,517,518,

523,538,540,552,598,865,876,919,1470

datastream-oriented, 537

date, 51,74,633,768,769,802-804,810,831,

833,890,899,912,1221,1227,1228,1247,

1248, 1556

constructor, 1227

dB,26-29, 160,346, 1462

DB25S, 259, 260

DB9S, 260

DC, 157, 192,208,363,369,384,386,464,465,

1440, 1463, 1465

DC balancing, 464, 465

DCD, 1406, 1463

DCE, 259-261, 268, 269, 474, 475,1407,1449,

1458, 1460, 1463, 1579

D-channel contention, 468

DCT, 188, 191, 193, 195, 197, 1455, 1459, 1463

DCT conversion, 193, 197

DD, 377, 379, 775, 776, 983,1418,1420,1421,

1440, 1463

deadlock,37,61,86-90

avoidance, 88

detection and recovery, 90

debugger, 1132, 1133

DEC, 11,56,58,308,333,355,529,536, 1451

decimal, 12, 13, 18, 19,984,985, 1136, 1151,

1155, 1437-1440,1451

DECNET, 308, 536

decrement, 83,1139,1140

decryption, 734

dedicated line, 152, 169

Delphi,957-959

Demand Priority Access Method, 370

demand-paged,49

demodulator, 295, 1466

deprecation, 1180

DES, 94,732,734,747-751, 753, 754, 759, 760,

1463, 1579, 1587

generating the per-round keys, 750

mangler function, 748, 752, 754, 756

overview, 749

S-box, 752, 753, 754

Triple DES, 754

desktop switch, 398, 399

destination address, 152, 170,318,330,331,

333,356,357,362,377,378,400,409,410,

412,422,473,503,524,527,559,656,698,

703,923,1447,1462

detection of movement, 192

device driver, 50, 876,1471,1481

DHCP, 517, 520, 521, 603, 661, 854-858, 860,

881, 1450, 1463, 1582, 1584, 1588

DHTML,1271-1285

dialog boxes, 1200

DIB,48, 520, 844, 858, 1463

dictionary, 184, 185, 186,222,710,1455

dielectric, 28, 168, 342

differential encoding, 1450

Diffie-Hellman, 759, 772, 773

digital

ASK, 163, 164, 1444,1456, 1461

audio, 198, 1462, 1493

certificates, 780

code, 147,178,227

communications, 147

compact cassette, 486, 1463

FSK, 163, 164, 1452, 1456, 1464

modulation, 163

Index 1617

PSK, 163, 164,1456, 1457,1463, 1468

radio, 147

signatures, 774

TV, 6,151

digital-to-analogue, 23,177,1462

digitization, 21

digitized video, 431

digitizing TV signals, 211

directory structure, 894

disassembler, 1132

DISC,455-457,468,1463

disconnect mode, 468

discrete, 155, 162, 163,178, 190,191,197,759,

1458, 1459, 1463, 1466

cosine transform, 190, 191, 197, 1459, 1463,

1466

discriminate, 411, 693

disk

drives, 907, 911

duplexing, 878

mirroring, 878, 879, 938

striping, 878

distance-vector, 678, 679

distortion, 21, 26, 322, 344, 375

distributed clock, 417

DM, 455, 456, 468,1463

DMA,1463

DNS, 320, 512, 520, 540, 549, 600, 603, 617, 632,

669,670,700,785,853,858-860,881,893,

1450, 1463, 1475, 1576, 1578, 1579, 1580,

1582-1585, 1588

domain names, 117, 120,320,511,513,702,

785,881,1450

domains, 117,402,880-883, 1443

DOS, 33, 34, 36, 47, 49, 51, 55, 57-59, 553, 598,

714,860,875,884,903,919,934,938,1463,

1481

time, 72-74

DPCM,1463

DPSK, 164, 1463

DQDB, 434,1450,1463

DR, 205,1463

DRAM, 10, 1463

DSR,261,265,268, 282,284,285, 1407, 1413

DSS, 733, 759, 1463

DTE, 259-261, 267-269, 302, 474-476,1407,

1408,1450,1458,1460,1463

DTR,261,265,268,283,284,302,1406,1463

1618 Handbook ofthe Internet

D-type,259,260,295,364,656,1458

dynamic range, 1463, 1493

EaStMAN,307,308,429,430,448,599,1463

EBCDIC, 20,1136,1451,1463

EBU, 201,1463

echo cancellation, 164, 165

ECP, 1463

EGB, 324, 325, 684

EGP,115,687,690,693,893,1463

EU\,28,201,259,346-352, 1447, 1451, 1458,

1463

EU\/TU\-568,346-349,351,1447,1451 Eu\/TU\-568A, 346-349, 351

EISA,1463

electronic mail, 1,5,32,151,309- 311,314,

320,483,496,517,595,697,699,701,704,

708,711,714,731,736,747,765,766,768,

770,793,794,796-805,807,818,821,826,

828,841,863,893,894,927,994,995,1206-

1209, 1320, 1460, 1575, 1578

address, 821

API, 796

clients, 796

mail client, 794, 796

messaging protocol, 796

overview, 796

post office, 794, 796,1468

shared -file approach, 794

electronic token, 318, 329, 331, 409

elliptic curve, 759

EM optoelectronics spectrum, 341

EMI,338,339,350, 1463

encapsulation, 962

encoding, 193, 197,317,807,810,828,832,834

encrypted tunnels, 702

encryption, 1,94,314,320,516,664,667,702,

703,705,731-734,736,738-740, 742-744,

747-749,753-756,759- 761,764-767,771,

777,779,780,783,784,828,1463,1465

alphabet shifting (Caesar code), 738

applying a bit shift, 745

applying a key, 742

basic encryption principles, 738

code mappings, 741

computational difficulty, 734

cracking the code, 736

cryptography, 733

frequency analysis, 737

government pressure, 735

homophonic substitution code, 740

keys, 761

legal issues, 732

letter probabilities, 737

message hash, 747

OSI model, 731

program, 743

public key versus private key, 734

random number generators, 733

tunnels, 702

Vigenere code, 739, 740

end delimiter, 410, 411, 421, 466

end terminator, 223

end-to-end flow control, 445

English language, 737, 740

Enhanced parallel port, 1464

ENQ, 1437, 1463

Entropy, 180, 181, 190, 1451

coding, 180, 1451

encoding, 181, 190

EOT,1464

EPP,1464

Error

combinations, 232

control, 198,262,318,360,435,476,499,

536, 1449, 1455

detection, 165, 170,235- 239,249,262,314,

357,358,400,401,411,451,456,465,

469,473,499,556,922,1452

probability of error, 231

probability, 229, 230, 674

types, 236

escape sequence, 1137

establishing connections, 533

ETB, 1437, 1464

Ether, 97, 333, 356, 363, 384, 853

Ethernet, 1,58, 152, 153,214,240,315,316,

318,319,323,325,327,329-331,333,334,

337,346,348,352,355-357,359-367,370-

377,379,380,383-387,390,398,400-402,

409,410,417,424,431,440,459,495,496,

500,513,529,532,536,553,556,565,602,

603,656,662,663,666,668,669,796,853,

856,876,877,919,922,934,982,983,990,

997,1441,1444-1449,1451,1452,1456,

1501,1575,1576,1579

100 Mbps, 366,1441

100BASE-4T,368

lOOBASE-FX,366

100BASE-T, 364, 366-368, 369, 370,371,

375,382,390,398

100BASE-TX, 364,366,367,370, 371, 375,

398

100VG-AnylAN, 364366,367,370,371,390,

852, 1441, 1458

10BASE2, 323, 364, 365, 390

lOBASE5, 364, 365

lOBASE-FL,364

lOBASE-T connections, 368

lOBASE-T, 323, 352, 364- 368,371,398,

1441

AUI,362,1461

Cheapernet, 364, 1448

connections, 364, 365, 401

DSAP, 359, 360

Fast Ethernet, 355, 364, 366, 367, 370, 371,

373,374,390,1441,1451

II, 357, 553, 565,919

implementation, 386

interframe gap, 373

LLC protocol, 360

MDI,362

media access control layer, 357

migration, 370

PLS, 361,362

SNAP, 359, 553, 919

SSAP, 359, 360

thick-wire, 364, 365

thinnet, 364, 365

thin-wire, 364

transceiver, 363, 373, 386, 402

types, 364

ETSI, 431, 434,1451

ETX, 1437, 1464

event, 8, 11,42,47,75,81,83,230,242,278,

283,284,543,615,693,799,841,883,936,

937,955,1179,1180,1182-1185,1187,

1190, 1200, 1204, 1207, 1322, 1325, 1499,

1511

driven, 8, 278, 675, 684, 714, 948, 955,1179,

1200

handling, 1183, 1190

exceptions, 47, 1239

executable, 890, 892, 899, 901, 942, 998

Explorer, 323, 784, 786,819,823,952

Index 1619

explorer packets, 323

exponent, 1134, 1142

exponential, 1168

extended capability port, 1463, 1579

Faller and Gallager, 183

Fast Ethernet, 355, 364, 366, 367, 370, 371, 373,

374,390,1441,1451

fast packet, 434, 1445

FAT, 884, 885

fault tolerance, 331, 409, 420, 421, 424, 877,

878,927,938

FAJe,201,297,1206, 1207,1209-1213, 1409,

1464, 1585

FC,421,423, 1440, 1464

FCC Advisory Committee, 199

FCS, 171,358,360,362,410,453,456,469,474,

1452,1464

FDDI, 240, 315, 323, 332, 355, 372, 374, 390,

401,417-429,431,447,495,536,796,852,

877,982,990,997,1448,1449,1452,1460,

1464, 1465, 1577, 1580

applications, 424

attachments, 374, 425

backbone network, 424, 425

DAC, 425

DAS, 425, 426, 1462

data frame format, 421, 422

frame format, 421

layers, 418

management, 418,1464

media, 424

network,240, 417,419,421,424-426,429,

1465

restricted token, 418

SAC, 425,1469

SAS,425,426,1469

specification, 427, 428

timed token, 418

token format, 421, 422

token-passing, 417, 424,1452

unrestricted token, 418

FDM, 150, 166, 1464

FDX, 1464

FF,386,411,422,808,984

FGK algorithm, 183

Fiber Channel, 373

fiber-optic, 26, 153, 316,322,330,333,336,

338,340,344-347,356,364,366,367,373,

1620 Handbook ofthe Internet

374,990,1441,1451

absorption losses, 344

cables, 26, 338, 340

chromatic distortion, 344

material scattering, 344

modal dispersion, 344

radiation losses, 344

single-mode, 425

FIFO, 63, 81, 386,1464

file attributes, 889, 890, 898

file dialog, 1219

file servers, 310, 337, 876, 927

file system, 7, 36, 38, 42, 59,107-111,118,224,

310,560,671,794,820,875,879,881,884,

885,889,893,904,924,926,928,929,1457,

1462, 1464, 1465, 1467, 1478, 1571

FAT,884,885,1464,1477

HPFS, 884, 885,1464

NTFS, 880, 884, 885,1467,1477

file transfer protocol, 538, 595, 821, 893

filtering rate, 323

FINGER, 538, 540,1464,1588

finite-state machines, 75

firewall,697-703

application level, 698-700

network-level, 698, 699

open, 725

ring-fenced,701

firmware, 7

first-come, first-served, 65

flags and semaphores, 82,1011

flicker, 214

floating-point, 16, 17, 19,20,914, 1135, 1138,

1142,1145

flow control, 170, 171,265,318,320,355,360,

372,434,440,445,446,451,454-456,467,

469,473-477,480,483,531,537,558,922,

1407,1408,1412,1445,1449,1452,1455

FM, 24,147,150,157,161-163,166-168,211,

1464

radio, 147,157, 166, 167

font

Courier, 1225, 1226

Helvetica, 1225, 1226

italic, 970,1420,1421

Symbol, 420, 1225, 1226

Times Roman, 1225

form feed, 808

forms, 959, 994, 1587

forward error correction, 244, 375, 1464

forward rate, 323

fourier transform, 1459

fragment, 497, 499, 518, 523, 601, 1452

fragmentation, 434, 523, 525-528, 536, 537,

1445

frame, 166, 170, 175, 180, 192-197,208,211,

213,214,261,262,297,314,318,319,322,

323,331,332,357-364,371-373,376-379,

385,400-402,404,406,409-412,418,421-

424,427,428,441,444,446,451-458,462,

464-469,476,481,496,551,553,556,565,

567,640,667,669,671,817,818,877,919,

922,939,1443,1444,1446,1451,1458,

1463-1465,1518,1524

checksequence,357,358,410,423,453,

456,465,469,556,922,1452,1464

format, 261, 421, 464

framing bits, 360, 462, 463

rate, 196

reject, 468

frequency, 24, 26, 28, 150, 154-158, 160-164,

166-168,177,191-193,196-198,199-202,

205,208,210-213,236,272,275-277,338,

341,369,375,385,386,433,471,740,1446,

1447, 1456, 1464

carrier, 167

division multiplexing (FDM), 166

domain, 156, 193, 197

modulation (FM) , 162

shift keying (FSK), 163

FRMR,455,456,468,1464

FSK, 163, 164, 1452, 1456, 1464

FSR,242

FTP, 1,32,120,495, 517,531,538,540,549,

542,595,598,603,632, 633,664,698,699,

700,706,731,780,784,806,815, 819-822,

863,864,866, 881,893,1167,1452,1464,

1474, 1476,1478,1573-1576,1579,1583,

1584, 1587, 1588

commands, 1573

FIPS, 784

full-duplex, 154, 163,355,371-374,401,451

G.711,471

G.722,471

G.728,471

garbage collection, 1156, 1165

gateway, 115,307,324,327,359,377,378,440,

447,495-500,513,523,524,526,528,529,

552,560,598,599,603,669,674,684,686,

687,690,698,700-702,797,803,830,831,

836,853,892,893,919,924,1446,1451-

1454,1458,1461-1465,1476,1575-1577

protocols, 893

GDI, 47, 48

GF1, 476,1464

G1F,23, 176, 188-190,215-224,295,806,815,

985,986,1192,1317,1319,1452,1464

application extension, 216, 224

comment extension, 216, 223

data sub-blocks, 215

disposal method, 223

file signature, 215

global color table, 215, 217, 218, 220, 221,

1452

graphic control extension, 215, 223

header, 216

image conversion, 192

image description, 215

local color table, 215, 220-222

logical screen, 217

plain text extension, 216, 223

signature, 216

table based image data, 215, 221

trailer, 216

transparent color, 223

Version 87a, 215, 216

Version 89a, 189, 190,215,216,218,220

Gigabit Ethernet, 153,355,364,371-375

Ethernet Alliance, 371

Ethernet migration, 374

GMT, 767, 779,801,804,810,833,834,835,

912,937,1230

gopher, 549,597, 700,815,1467,1478

graphical device interface, 47, 48

graphical user interface, 33, 34, 57, 697, 1317,

1464,1511

gray scale, 190,201

ground,259-261,269,339,384

group address, 412

Group III, 201, 202

Group IV, 201

groupware, 697

GZ,815

hacking, 313, 705, 706, 710, 779,1499

Index 1621

methods, 706

problems, 711

HU\L,50, 1464, 1481

half-duplex, 153,368,372,401,451,1452

HALT, 419, 420

hamming

code, 244-247,249, 250

distance, 229, 237

handshaking, 153, 154,264,265,267-269,274,

279, 282,283,295,320,371,801,1407,

1452, 1457

hard-disk, 21, 97, 310

hardware handshaking, 264, 268

hardware Interrupts, 51

Hayes, 291, 297

hazards, 25, 85

HD,1464

HDLC, 451-454, 456, 458, 474, 476,1442,1446,

1452, 1464, 1468

HDTV, 203, 214, 215,1464

HDX, 1452, 1464

header files, 912,1131

heterogeneous, 99, 1453

hexadecimal, 14, 18-20,217,218,318,319,357,

658,775,808,984,985,1134,1137,1437,

1450, 1456

HFS, 1571

hierarchical decomposition, 948

hi-fi, 23, 152, 157, 174, 176, 177,201

higher-level primitives, 68

high-frequency, 28,196,197,199,375,1447

hiss, 23, 199

hold-down timers, 681, 682

homogeneous, 99

hop count, 556, 675, 678-681, 687, 922, 1449,

1453

horizontal lines, 988

host layers, 315

hot fixing, 885

HP, 56, 529, 929,1441

HPFS, 884, 885

HP-UX,56

HT~L,806,815,818,820,822,827,952,969,

970,979,980,982-995,997,1175,1176,

117~ 1179, 118~ 1183, 118~ 118~ 1193,

1195,1196,1198,1199,1319,1415,1418-

1420,1453,1464,1578,1579,1582,1588

anchors, 989

1622 Handbook of the Internet

background images, 985

colors, 984

definition lists, 983, 1420

displaying images, 986

horizontal lines, 988

input types, 995

links, 979, 980

lists, 980

menus, 997, 1200

ordered lists, 980

tables, 991

unordered lists, 980, 982

HTTP, 31, 540, 549, 595, 632, 698, 699, 700, 731,

779,780,783,784,820,822,824-827,829,

830,832-834,881,979,985,1167,1464,

1578, 1581, 1582, 1584, 1585

entity header fields, 832

full requests/responses, 826

general header fields, 831

message,783,826,833

reference, 832

request example, 827

simple requests/responses, 826

HTTPS, 784

hub,28,53,321,328,329,334,335,337,348,

350,352,356,364,365,367,368,370,371,

374,375,390,397,398,409,596,656,662,

841,1441-1443,1448,1453,1455,1458,

1459

hues, 203

huffman, 181-184, 186, 188, 190, 193, 195, 197,

202,222,224,1443,1453,1455

coding example, 182

coding, 181-184, 190,193,195, 197,202,

1443, 1453, 1455

modified, 202

human eye, 175, 176, 180, 190, 192, 193, 197,

199,203,341

hybrid, 678, 683, 1453

hypertext, 1317

hypertext, 595, 815, 819, 820, 822, 824,1453,

1464, 1578, 1581

I, P and B-frames, 195

I/O stream, 962

lA5, 1437, 1465

lAP,818,1465

IB~ 8228, 413

IB~ type A connectors, 413

IC~P, 115,499,518,521,522,524,527,528,

597-599,607,857,892,1453,1457,1465,

1575, 1588

ICP,818

IDE, 153

IDEO, 54

IDEl,54

IDEA, 732, 734, 747, 748, 754-756, 760, 764,

765, 1465

security, 756

IDI, 485, 486,1465

IDLE, 419, 420, 1583

IDP, 115,485,1465

IEC, 28,190,1455

IEEE, 323, 333, 355-362, 366,367,370, 371-

374,409-411,421,423,434,513,914,1169,

1441,1445,1451,1456,1458,1465,1576,

1577, 1580, 1582, 1584

802,12,367,370,1441,1580

802.2 and Ethernet SNAP, 359

802.2,359,1455,1458

802.3 frame format, 357, 358

802.3,333,346,355,357-362,366,367,370-

373,663,1441,1445,1448,1449,1451,

1582, 1584

802.3u, 366, 367,1445,1451

802.4,1577

802.5,370,409-411,423,1441,1577

802.6, 421,434, 1450

standards, 356

IETF, 670, 671, 685,783,824, 1419, 1446, 1453,

1454,1580,1583,1585-1587

ILD,1465

image compression, 188, 1455

image conversion, 192

image scanner, 201

images, 57, 147, 174-176, 179-181, 188-190,

192,194,201,203,214,215,224,295,311,

697,711,793,794,803,815,824,985-987,

1192,1317,1319,1320,1325,1452,1453,

1459,1467,1514,1515,1517

import statements, 1166

increment, 178,681,970,1139,1140,1449

indexing, 1170

inetd,120, 121,852,863,865, 1573, 1574

infra-red, 24, 25, 168,344

initialisation and exit methods, 1179, 1180

initialization, 332, 412, 480, 537, 694, 846, 933,

1138,1159,1179-1181,1199

input! output supervisor, 657, 663, 668, 669,

1448, 1465

installable file system, 1465

integer, 16-18,81-83,93,94,96, 197,362,775,

913-916, 1448, 1467

integer division, 1139, 1145

integrity check, 733

intensity, 191, 1330, 1506

interactive video, 433

interconnected networks, 314, 323, 432,436,

496,653,731,939

interconnection length, 322, 417

interface, 946, 952, 955, 957-959,1131,1134,

1181

interlace, 211, 220

interlaced, 188-190,208

internet, 115,315,495,497-502,504,525-528,

634,822,1454,1459,1464-1467,1469-1471

Internet

Access Provider, 818

addresses, 500, 501, 527, 634

Connectivity Provider, 818

datagram, 498, 500

email address, 797, 821

Engineering Task Force, 685, 783, 1453,

1454,1465,1579

example domain addresses, 513

Explorer, 784,786,819, 823,952

naming structure, 511, 934

presence provider, 818

primary domain names, 511

protocol, 308, 495, 516, 524, 666, 893, 1450,

1454,1575-1578,1580,1586

Security, 779

internetwork, 323, 673, 675-678, 682, 683, 685,

686,939,1448,1451,1455

Internetworking, 321, 495

interprocess communications, 81, 82

interrupt, 11,50-54,661

handling, 53, 54

hardware, 50, 52

request, 52, 53, 1466

software, 42, 51

vector, 53

control port, 818,1465,1583

service routine, 50, 52, 53, 69

vectors, 53

Index 1623

intranets, 697, 759, 815 IP,31,56,90, 113, 115, 117,152,314,315,318-

320,322,333,335,357,359,360,376,377, 378-380,382,404,432,437,440,447,495-505,512,513,515-528,529,531,532,536-538,540,550,552,553,555,560,565,567, 595,597,598,600-603,605,608,614,617, 619,632,633,635,637,653,656,660,662-666,668,669,671,672,674,684,693,697, 698-704, 706, 707, 731, 780, 785, 794, 797,

815,842,852- 854,855-858,860,861,876,

877,881,889,892,893,919,921,922,924,

926,938,939,983,1131,1442-1444,1446, 1449,1450,1452-1454,1456-1459,1464-

1466, 1473-1476, 1575-1589 address allocation, 519 address format, 501 address range, 503 address, 31, 113, 117, 152,318,320,322,

359,376-380,382,432,437,440,495, 496,498,499-505,512,513,515-524, 526,528,532,537,595,597,598,600, 601,603,608,614,617,619,632,633, 635,637,656,660,662-666,669,675, 684,693,698-700,702-704,706,785,

852-861,881,893,983,1131,1443,1444,

1446, 1450, 1453, 1454, 1457, 1458, 1473-1476

addressing, 152,432,495,501,502 class A, 442, 501-505,1580 class B, 442, 501-505, 506, 530 class C, 442, 501- 506,656,660 creating sub nets, 504 function, 497 group addresses, 515 header, 377, 499, 516-518,521-25,532,537,

540, 1459

multicasting, 515 protocol, 359, 360, 440, 497- 500,536,598,

794,797,892,1446,1452,1454,1456, 1459, 1575

spoofing, 703, 706 subnet masks, 505 time-to-live, 499, 523, 524, 556, 598, 599,

601,860,922,1470,1476 v6 header format, 517 v6,516-518, 1465, 1468 Ver4, 516, 517

1624 Handbook of the Internet

Ver6, 516-518, 532, 1578-1580, 1586 IPX,37, 59, 314,318,319,335,357, 516,529,

552-559,563,565,567,607,660,672,674, 875,876,877,919,921,922,923,925,926, 934,938,939,1450,1454,1456,1458,1465, 1466, 1470, 1478

.COM,876 ISPX,37, 59,357,553, 876,877,919 AppleTalk, 876 IPX.COM, 876

IPXODI, 564, 565, 876

ODI, 564, 565, 876

packet format, 922 IRQ, 53, 55,265,279, 1466

IRQO, 53, 54 IRQl, 47, 53, 54 IRQ12,54 IRQ13,54 IRQ14,54 IRQ15,54 IRQ2, 53, 54 IRQ3, 53, 54

IRQ4, 53, 54 IRQ5, 53, 54 IRQ6,54

IRQ7, 53, 54 IRQ8,54 IRQ9,54

ISA, 155, 1466 ISDN, 1, 152, 170,201,295,307,433,461-470,

532,703,817,818,1446,1453,1456,1458, 1461, 1466, 1468, 1582

basic rate, 461, 462, 464 B-channels, 462, 465, 469 B-ISDN, 461, 462,1461 broadband, 461

call clearing, 470 call establish, 470, 471 channels, 462 data link layer, 465 D-channel, 459, 462-469,1446 D-channel contention, 468 dial-up, 818 frame format, 464, 465 HO, 462, 1405 Hll, 462, 463 Hl2, 462, 463 information messages, 470

network layer, 462, 469

network messages, 470

physical, 462, 463

supervisory frame, 467

system connections, 274, 464

TEI,466, 468, 470, 1470

channels, 462

data link layer, 465

frame format, 464, 465

network layer, 462, 469

network messages, 470

physical layer, 462, 463

ISN, 539, 545

ISO,28,190,308,313,428,451,464,486,495,

518,550,835,1452-1455,1466,1470,1580,

1582, 1585

ISO/lEC, 28,1455

isochronous, 1442, 1465

ISO-IP, 495, 518

Isolator, 384

ISR, 50, 52, 53

ITD, 164,201,211,212,297,431,471,1441,

1444, 1447, 1454, 1460, 1466

jamming signal, 334, 356

JANET, 447, 599,1466

Java

applets, 951, 952, 1131, 1177, 1182, 1226

compiler, 952,1131-1133,1167,1177,1180,

1199

interpreter, 631,1131-1133,1165,1216

java.exe, 1132, 1133, 1216

JavaScript, 815, 818

JDK, 952,1131-1133,1166

JFIF, 189,806, 1466

JISc, 1466

jittery, 198

JPEG

23,176,187-193,197,295,806,815,985,

986,1192,1317,1319,1455,1466

data, 191

header, 191

compression, 190

data, 191

JPEG header, 191

JPG,23, 176, 188-190,295,815

kin rate code, 235

keep-alive, 666

kernel, 5, 36, 47, 62, 69, 81, 95, 553, 919, 939,

1481

key distribution centre, 773, 1466

key exchange, 772

keyboard, 7,54,903,905,906,911,942,1179,

1180,1182,1187,1190

data ready, 54

events, 1180, 1190

input, 1187

press, 1188-1190

stroke, 905

kill,73

LAN, 26, 28, 307, 309, 323, 327, 328, 333, 336,

337,347,349,356,364,397,402,414,446,

451,552,556,567,656,686,712-714,852,

875,876,877,919,922,939,990,1441,

1442, 1458, 1460, 1465, 1466, 1473, 1585

components, 336

LAPD, 459, 465, 469,1466

laser, 310, 373,1465,1475

last packet indicator, 411

LCN, 476, 484,1466

LCR, 269, 271-277

LD-CELP, 471,1466

least significant, 12, 14, 19, 239, 258, 263, 745,

913,914,1155

LED, 344, 596,1466

Lempel-Ziv, 165, 181, 184,835,907,1455,1455,

1466

LF,799,800, 801

LFE,201

LGN, 476, 484,1466

library, 45, 46, 50, 94-96, 605, 707, 709, 901,

912,1165,1168,1177,1225,1463,1481

line break, 259, 417, 970, 992, 1421

discipline, 318

driver, 384

link access procedure, 465, 476

link support layer, 876

linker, 942, 943

link-state, 678, 682, 683, 686,1456

Linux,36,56,57,697,889

list box, 1200, 1217

listeners, 1183, 1184, 1190, 1204, 1207

little endian, 16

LLC,357,359,360-362,422,424,451,459,

1441, 1455, 1466

protocol, 360

logical, 410, 484,1139-1141,1146,1441,1449,

Index 1625

1455, 1460

link control, 410, 459, 1466

logical operator, 1141, 1142

login,31,32,36,59, 113, 116, 120,309,314,

320,337,495,538,540,544,554,563,564,

595,659,564,665,668-711,786,820-822,

864,866,876,881,883,911,920,921,925-

930,933,936,1476,1480,1498,1574

loopback,274,303-305,333,666, 1407, 1409,

1410

lossless compression, 179, 180, 1456

lossy compression, 179, 188, 190, 1456

Lotus, 697, 796, 797

low frequency effects, 201

lowercase, 1233, 1541, 1549

LPTl,54,260

LPT2,54

LRC,244,250, 1466

LRC/VRC, 244

LSR, 269- 277

LUC,759

luminance, 176, 190, 193, 194, 197,203-208,

211-213

Lynx, 697,819,852,859

LZ coding, 165, 181, 184,835, 1455, 1466

-77, 184

-78,184

LZH,189

LZS, 1579

LZVV, 184, 186, 188-190,215,222-224,835,

1452, 1455, 1460, 1466, 1471

MAC,

address,57-59,69,214,318,319, 321-323,

325,335,337,356-362,375-382,401,

402, 404, 405, 409- 411, 418, 422, 423,

427,428,434,495,496,500,517,519,

520,556,564,560,601,660,662,666,

672,731,731,852,853,856,924,982,

1442-1447,1450,1456,14581465,1466,

1474

layer, 357, 361, 362, 383,409, 411,418, 427,

434,496,564,876

protocol, 411,423

MAC as, 57, 69

machine code, 942

macro blocks, 197

magnetic fields, 2, 23, 149,338

mail fragments, 807

1626 Handbook of the Internet

mailroom, 311, 793

maintainability, 1322

~,307,429,434,1450, 1461,1463, 1464,

1466

Manchester

coding, 363, 384-386,410

decoder, 383, 384

~,796,934, 1466,1571

M-ary, 164,227

ASK,164

modulation, 164

math co-processor, 54

math exceptions, 1241

mathematical, 47, 98,149,241,246,741,1148,

1152,1168,1170,1181,1459,1546

matrix representation, 246

MAU,333,362,413,414,1466

maximum error, 178, 179

maximum segment length, 358, 367

MD5 algorithm, 747, 764, 765, 774, 777, 810,

832,1462,1468,1577,1581,1587

MDCT,1466

media, 336

access control, 333, 362, 356, 357, 361, 410,

1466

interface connector, 426

layers, 315

megablocks, 194

memory, 3,6, 11, 15-17

buffering, 398, 399

paging, 49

paging, 49

menus, 997, 1200

bar, 1200, 1215

multiple, 1214

pop-up, 1200, 1210,1212, 1213,1506, 1520

Messages, 69-81,521, 783,829,1452

digests, 774

hash,747

passing, 69, 70

queuing, 81

recovery, 783

metafile, 1462, 1463

method overloading, 1156, 1160

metropolitan area network, 307, 429, 434

MHS, 796, 797,1466

MIC, 426,1456,1466

micro segmentation, 403, 1456

Microsoft LAN, 567, 877,1473

Microsoft Visual C++, 962

Microsoft Windows, 1,2,34,35,42,48-51,58,

67,69-71,109,111,265,300,359,520,567,

601,707,818,819,860,875-881,884,885,

927,1215,1317,1330,1473,1474,1479,

1498

control services commands (quick refer-

ence), 1479

networking, 876

scheduling, 71

TCP/IP commands (quick reference), 1474

microwaves, 167

migration, 11,59,93,215,367,370,374,939

MIME, 595, 634, 748, 780, 794, 797, 803-810,

826,827,831,832,998,1466,1577,1578,

1580,1582-1589

base64,809

boundary name, 805, 806

content types, 805

content -description, 804

content-id,804

content-transfer-encoding, 803, 808

content-type, 784, 803, 805-807, 832, 835,

1582, 1583, 1587

encoded,805,807,826

example,806-808

mail fragments, 807

transfer en co dings, 808

version, 804, 827, 1585

MIT,250, 503,524,732

MUD,565, 1466

MNP level 5, 164, 165

modem, 160, 163-165,263,291,295,296-299,

302,303,310,458,461,702,876,1446,1449

asynchronous, 296

AT commands, 164,292,298

AT prefix, 292, 297

auto-answer, 295, 300, 302, 1412

auto-dial, 295

commands, 297, 300, 301

connection, 1, 269, 274, 304, 305, 307, 495,

818, 1321, 1406

connection, 304, 305, 307, 818

dialing, 301

dial-up, 818

example return codes, 299,1408

indicator, 302

profile viewing, 302

profile, 302

registers, 300, 1412

return codes, 299

setups, 300

s-registers, 299,1409

standards, 297

synchronous, 296

test modes, 303

V.22bis, 164, 165,297,1405

V.32, 164, 165,297,306, 1405, 1409, 1460

V.32bis, 164, 165,297,1405,1409,1460

V.42bis, 164, 165,297,1409

modified discrete cosine transform, 1466

modular program, 947

modulation, 161, 164,375,1444

modulator, 162,295

modulo-2,227,228,234,238,240,242,243

arithmatic, 227, 240

modulus, 767,1139,1140,1155

Morse, 148, 186, 187

motion estimation, 193, 194, 195

motion video, 174-176, 192, 203,214,794,

1459

motion video compression, 192

mouse events, 1180, 1182

mouse selection, 1185

MOV, 815

moving objects, 1197

MP-3, 176, 187,200,1330, 1317

MPEG, 68,176,192-201,214,806- 808,815,

998,1317,1319,1330,1467,1586

-1,193,194,196,197,199

-2,201,214

B-frames, 195, 196

I-frame, 195, 196

P-frame, 195, 196

slices and macroblocks, 193

MR,302

MS-DOS, 2, 47, 49, 50, 55, 601, 875, 884,1481

mode support, 49

multicast, 503, 515, 672,1456,1465

multi-dimensional arrays, 1173

multilevel Feedback Queue Scheduling, 67, 68

multimedia, 1,6,390,817,997,998,1317,1319,

1320-1323

multiple-line text input, 1224

multiplexing, 83,150,165,166,169,438,461,

Index 1627

462,537,1448,1464,1470

multiplication, 228, 1140

multiprocessing, 39, 56, 97, 99, 889

scheduling, 99,1013

systems, 97

multi-station access unit, 333, 362, 413, 414,

1466

multitasking, 37, 39, 42, 43, 48, 49, 56, 58, 71,

132,310,311,875,889,1244,1245

co-operative, 42, 1245

pre-emptive, 39, 42, 56, 889, 1244

multithreading, 1244

MUSICAM, 199,200

mutual exclusion, 82, 84, 88

MUX, 427, 1462, 1577

NACK, 236, 451

NAK, 1437, 1467

name resolution, 320

named pipe, 81

NAT,726

programming, 727

National Bureau of Standards, 749

NCP packet format, 564, 926

NCSA, 815, 819,1467,1478

NDIS, 564, 876,1456,1467

NDS, 875, 926-938,1467

binderysenrices, 920,935,936

country object, 928-930, 934

CX,364,373,932,933

naming syntax, 931

object names, 931

structure, 928, 931

timestamp, 937

tree, 929, 930, 931

user class, 935

VLMs, 938

negative acknowledgment, 236

NetBEUI, 355, 536, 567, 876, 877, 1463

NetBIOS

name types, 1473

Netscape, 748, 779, 784,818,819,952

netstat, 121,544,549,601-603,1475

netstat/IPConfig, 602

NetWare, 1,31,35,37,42,59,314,318,319,

355,359,360,403,536,552-560,563-565,

710,797,875,876,919-929,933-939,1454,

1457, 1467, 1478, 1584

4.1 SMP, 939

1628 Handbook of the Internet

4.1,555,560,921,924,926,927,935,938,

939

architecture, 553, 554, 919, 920

binderysenrices, 554,920,935,936

container obects, 927

directory services, 555, 921, 927

leaf objects, 927

loadable modules, 553, 920

NCP, 558, 560, 563, 564, 921-926, 928, 938,

1467

NLMs, 920

protocols, 555, 921

SAP,359,555,560,561,921,924,925,936,

937,1458,1469

setup, 564

SMP,939

VLM,938

network

addresses, 14,319,320,322,325,466,503,

513,520,635,656,854,860,892,893,

1443, 1454, 1473

configuration files, 120

disadvantages, 313

Information Center, 504, 687, 1575

Information Senrice (NIS), 97,113

layer, 90,313,314,316,318-320, 322,324,

326,359,432,462,469,476,495,498,

531-533,537,552,555,674,876,877,

919,921,1443,1449

malfunctions, 420

management, 331, 370, 409, 410, 437, 553,

841,842,851,919,927,1470

operating systems, 1,875,889,919,941,979

protocols for reliable delivery, 319

topologies,318, 328, 514

traffic, 331,337,363,377,398,403,409,445,

523,559,560,673,684,825,841,923,

924,928,936,937,938,1446

transport protocol, 796

types and cables, 327

NETx,553,563-565,919,925,938

newline, 1137

NFS, 97, 110, Ill, 113, 118, 121,517,540,889,

893,927,1456,1565,1566,1569,1571,

1576, 1583, 1586

remote file access, 110, 118

RPC, 69, 79,90-96,110, Ill, 113, 114,117,

120,121,598,894,1469,1589

services protocol stack, III

XDR, 17,95,110,320,912,917,1471,1576,

1590

nfsd, 121, 1565, 1566

NIC, 317-319, 337,359,367,383, 504, 553,564, 565,687,876,919,1443,1445,1453,1467,

1575

nice, 73

NICs, 355,371,374,553,876,919 NIS, 110, 113, 115-120,893, 1457, 1467, 1566,

1567, 1568, 1569

commands, 119

database commponents, 117

domain, 115-120, 1566, 1567, 1568

master server and slave server, 116

NLSP, 939 NNTP, 784,1467

NNIPS, 784 noise, 21,22,23, 147, 156-159, 162, 163, 196,

198-200,204,236-339,345,352,375,384,

733, 1449, 1456, 1470, 1493

impulse, 159, 237

signal distortion, 158

thermal, 158, 236

non real-time, 21

non-zero,81,249,1146

Novell NetWare, 1, 31, 35, 37, 42, 59, 314, 318,

319,355,403,536,552,710,797,875,876,

919,1454 NRZI, 418, 419,1467 NSAP,484,485,486,1467 NSCA, 818,1467,1478

nslookup, 600, 601, 661, 860,1475 NI,49,50, 464,465,466,469,520,553,564,

567,710,757,854,875-881,884,885,919, 927, 1456, 1467, 1479, 1481, 1498

NIE,1467

NIFS, 880, 884, 885

NIP, 894,1467

NISC,203,208,212,214,1467 n-type, 364, 365 ~~,658,662,667

nyquist, 159, 1450

object-oriented, 935, 951, 955,1131,1156

objects, 554, 920, 921, 958, 962,1156,1195,

1200,1577,1580,1582,1584,1585-1588

occurrences of English letters, digrams,

trigrams and words, 757

octal, 14, 18, 19,891,900,1134,1135,1137,

ll55,1156

om, 553, 564-566, 876, 919, 933,1467

OH, 302,1467

OLE,58 one's complement, 238

operating system, 1,2, 4-ll, 17,31,33-39,41,

42,47-51,55-62,65,67,69,71,81,83,85-

90,94,97,110,308-311,315,324,336,355,

359,520,521,536,547,551-554,567,653,

658,662,664,665,697,706,707,713,724,

819,854,875-877,879,884,889,919,920,

931,939,1244,1245,1317,1321,1330,

1447, 1448, 1456, 1463, 1481, 1533

operators, 72,150,1139-1146

optical fibers, 166, 259, 342-345, 705

optical spectrum, 341

optoelectronics, 341

OR, ll86 orange Book, 1498 OS/2,551,553,567,877,884,885,919 OSFIl,56

OSFP, 324, 684

OSI,91, 110, 111,308,313-316,321,322,326, 334,356,361,418,432,440- 442,451,453,

463,474,476,495-498,516,536,537,564,

565,595,674,684,731,780,796,876,926,

982,1444,1449,1455-1459,1467,1470,

1577 IEEE 802.3 standard, 361 model, 90, 91, llO, lll, 313-316, 321, 322,

334,356,361,418,432,440,441,442, 495-498,536,537,564,565,595,674, 731,780,876,1444,1449,1455-1457,

1459 OSPF, 319, 324, 325, 674, 678, 682- 685,686,

687, 1467

OUI, 422,1467

P and v operations, 84 PA,421, 1467, 1511, 1527, 1582 packed bit field, 217, 220, 221

packet, 115, 152, 169-171,236,314,316,319-324,335,372,373,377-380,400-404,411,

427,428,434,438-440,451,458,474,476-

486,496,498,504,516-518,521,535-541,

544-547,552,555-564,567,595- 599,601,

634,653,656,658,675,681,684-689,698,

699,703,706,856,857,860,876,877,893,

Index 1629

919,921-926,939,1444-1447,1449,1452,

1453,1456-1460,1468,1470,1476

filters, 699, 702

Internet Gopher, 597

sniffing, 706

s~tched, 170,428,473,474,479,480,483,

484,1460,1468

PAL, 174, 193,203-214, 1317, 1467

palette, 188, 190, 1452

PAM, 375

paragraph,970, 1420, 1421

parallel port, 53, 54,153,260,1464

parameter list, 1170

parameter passing, 1131

parameters, 947, 988, 992,1175,1177,1187,

1193,1195

PARC, 57, 115

parity, 235, 238, 262, 284, 285, 878

even, 238,244,248,262,275-277,280

odd,238,244,261,262,749

passive, 110,329,413,542,547, 1453

password, 30, 31, 36, 95,113,114,116,119,

312,659,660, 664-668,685,686,702,703,

705,-711,767,786,811,820-822,834,863,

864,881,911,926,935,996,997,1223,

1457,1467,1480,1573,1574

patch,347,348,350,352,373,1452

patch panels, 350

PATH, 314, 693, 1131, 1572

PCM, 150, 166, 198,420,431,433,442,463,

464,471,1443,1444,1449,1463,1467

adaptive delta modulation, 1443

delta modulation, 471,1449

low-delay CELP, 471

TDM, 166,431,433,463 PCMCIA, 359

pcnfsd, 121, 1569

PCX, 188, 189, 190

PDN, 170,473,1467

PDUs, 326, 496

peer-to-peer, 29, 30, 31, 59, 81, 311, 542, 875,

881

perceived, 190, 199,200

permanent connection, 170,296,462,473

permutations, 1153

PGP, 733, 764 -770,777,778,1467,1579,1580

example encryption, 766

authentication, 777

1630 Handbook of the Internet

key management options, 766

phase

modulation (PM), 163

quadrature, 208

shift keying, 163

phases, 163, 165, 184,439, 1455

phone, 5,6, 147,292,295,298,512,702,1478

photographic, 23

PHY, 418, 428, 441,1467

physical, 314, 316, 318, 361, 362, 383, 418, 420,

428,495,603,705,876,1451,1457,1458

addresses, 318

layer, 313-317, 322, 361, 366, 373, 427, 441,

462,463,474,476,876,1451,1457,1460,

1467

media dependent, 418

signaling (PLS) and physical medium at­

tachment (PMA), 362

PIN numbers, 735

ping,495,521,595,597,598,601,670,671,

1467, 1476, 1477

pipeline, 98

pipes, 69, 70, 81

PISO,1467

pixel aspect ratio, 217

pixel ratio, 217

pixels, 174, 175, 180, 188, 191-194, 197,201,

203,207,213,214,217,221,224,987,988,

991,992,1175,1317

PKP, 733, 1467

plaintext, 223, 224, 733, 736, 740, 741, 748,754,

759,765,766,774,824

plastic cable, 339

Platform for Internet Content Selection, 784

playing cards, 1172

PLL, 162, 198,385,386, 1457, 1467

PMD, 418, 428,1468

pointer, 57, 65, 269, 270, 386, 523, 527, 528,

540,548,806,819,910,1131,1137,1475

point-to-point protocol, 411, 498, 603, 670,

671,672,702,1448,1457,1465,1468,1578-

1582, 1585-1589

polarization, 817

poll/final bit, 467

polygons, 1195

polynomial, 227, 228, 239-243, 436, 456, 469

port number, 121,279,280,287,402,537,538-

540,544,602,607,614,634,639,698,705,

820

portmap, 97,121,1566

ports and sockets, 538

POSIX,885

post office protocol (POP), 811

postal service, 311, 731, 793

Postscript, 815, 1586

power supplies, 464

PPI,271

PPSDN,1468

preamble, 357, 358,360,362,363,385,421,422

precedence, 537, 1144, 1145

pre-emptive, 48, 49, 56, 65, 67, 86, 889

multitasking, 36, 42, 56, 889

presentation, 1, 310, 313-316, 320, 536, 537,

731,817,823,912,1319

layer,313,314,320,731,912

primary rate access, 462

primary scheduler, 71

print servers, 875

printable, 745, 747, 767, 808

priority, 6, 7, 50, 62, 63, 65, 67, 68, 71, 73, 74,

87,370,374,390,410,411,435,446,452,

457,498,517,518,1144,1441,1448,1481,

1551

priority scheduling, 67

private key, 732, 734, 736, 747, 754, 759-762,

765,766-768,772,774,777,778,783,1157

survey of private-key cryptosystems, 747

probability, 181,229- 234,237,674,737,740,

741,756,1448,1453

process

scheduling, 48, 49

status, 72

processor Farms, 99

producer-consumer problem, 85, 1011, 1029

programmable interrupt controller, 52

protecting information, 312

proxy, 1,697-700, 783, 786,828,831,836,861,

1445

PS,54,564,815,879,931,1468

PSK, 163, 164, 1456, 1457, 1463, 1468

PSTN, 170,473,1413,1468, 1585, 1588

psycho-acoustic, 199

PTC, 271

public telephone, 170,296,307,461,473,496,

512,818

pulse shaping, 375

QAM, 164,1468

QCIF,1468

QIC, 1468

QoS,374,431,439,445,446,518, 1442, 1468

quadratic equation, 1148

quadrature modulation, 204

quality of service, 374, 431, 518

quantization, 178, 179, 188, 190, 197,213,1458

process, 197, 1458

error, 178, 179

level, 179

levels, 179

process, 178, 197

queues,31,35,39,63,67,68,81,445,554,658,

920,927,938,1480

QUIET, 419, 420

RADAR,149

radiation, 25, 168, 169,338, 1449

radio, 958, 996, 997, 1208

radio button, 996, 1200, 1208, 1208

RAID, 878, 879,1468

level 0, 879

levelS, 878, 879

RAM, 10,59,386,658, 1407, 1463, 1468, 1470

random number generators, 733

random numbers, 1171

range, 984, 1168

RARP,325, 379,380,381, 1458

raster line, 208

RC circuit, 1152

RC4/RC5,748

RD,261,267,269,273-277,302,382,856,1468

realplayer, 1331

real-time, 21, 68,152,195,355,370,374,427,

431,432,442,446,461,462,517,518,785,

794,1319, 1331,1450,1469

data,370,431,432,461,462

scheduling, 68

receiver not ready, 361, 467

receiver ready, 361, 467

redness, 191

redundancy, 175, 179, 192,234,239,244,357,

358,410,417,456,469,737,1462,1466,

1471

redundant data, 190

Reed-Solomon, 250

reflections, 26, 338, 342

refracted, 342

Index 1631

refraction, 342, 343

refractive index, 342, 343,

refresh rate, 208

Reject, 361, 455, 458, 467, 478, 479, 481,1468

relationship, 1140, 1146

reliability, 6

remote login, 311, 312,1476

remote procedure call, 79, 90,110, lll, 598,

894

repeater, 322-336, 348, 374,390,398, 414,

1448, 1455, 1457, 1458

repetitive sequence, 187

repetitive sequence suppression, 187

repetitive sequences, 180, 189, 1451, 1459

requests, 325, 833

reservation bits, 411

resistance, 26, 27,148,159,237,338,384,963,

964,1135,1138,1139

resolution, 180, 188,214,217,224,320,433,

860,861,881,893,1450,1458,1459,1461,

1467

resource locking, 86

restricted Sites, 786

restricted token, 418

resusability, 1322

return type, 96, 1156, 1159, 1160, 1182

return value, 1177

revision, 1580

RFC,529,684, 738, 748, 796, 797,802-809,821,

826,843,856,1468,1575,1576,1578,1579,

1581, 1583

RFI, 338, 339

RG-50, 364, 365

RG-6,365

RGB, 189-204,218,984, 1317, 1468, 1506

RI, 73,285,413,1468

rich text format, 1469

ring fails, 417

ring in, 328, 413, 421, 1468

ring network, 328-333, 370, 375, 409, 413-415,

424,500,1441,1459,1468

ring out, 413, 1469

ring topology, 417

RIP, 319, 324, 540, 555, 559, 560, 653, 674,675,

678-681,684,685,687,692,893,921,923,

924,939,1453,1468

packet format, 560, 684, 685, 924

RJ-45, 28, 323, 349, 350, 352, 355, 364, 365, 370,

1632 Handbook of the Internet

384,413,414,464,656,1458

RLE,187-190,202,224,1468

RNR, 361, 455, 458, 467, 479, 481,1468

RO,413,665, 757,813,1469

root, 898, 906, 1170

routed protocols, 674, 653

routers, 1, 170,307,316,319,322,324-327,

335,336,350,376-378,400,402,404,513,

515,518,521,559,560,596,653,656,660,

663,668,673-676,678-681,682,683-689,

702,704,818,923,924,939,1443,1444,

1446-1449,1453,1455,1458,1459

ARP,377

commands, 659

configuration and setup, 657

filtering, 703

IP addresses, 515

status commands, 660

routing, 169,319,374,434,518,559,603,669,

672,674,676,678,680,681,684,687,892,

893,923,939,1450,1453,1455,1458

BGP, 324, 1461

distance-vector, 678, 679

dynamic, 675, 1450

EGP, 115,324,524,687,893, 1463

fundamentals, 674

hybrid, 683

IGRP, 674, 678, 687,1453

link -state, 682

loops, 680

NLSP, 939,1467

OSPF, 319,324, 325,674, 678, 682, 684-687,

1467

OSPF, 319, 324, 325, 674, 678, 682,684-687,

1467, 1577, 1582, 1583, 1586, 1589

problems, 680

protocol, 319, 324, 438, 439, 518, 653, 672,

674-676,678-680,684,685,687,690,

692,892,1446,1448,1453,1467

RIP, 319, 324, 540, 555, 559, 560, 653, 674,

675,678-681,684,685,687,692,893,

921,923,924,939,1453,1468,1581,

1588, 1589

RPC,69, 79,90-96,110, Ill, 113, 114, 117,120,

121,598,894,1469

authentication, 93

programming, 94

protocol, 92

RR,65,361,455,458,467,479,481, 1469, 1580

RS-232,153,244,259-265,267-269,273,280,

287,295-297,475,656,876,1446,1458,

1460

bit stream timings, 263

communications, 260, 263, 268, 269, 296

DTE-DCE connections, 269

frame format, 261, 421, 464

programming, 269

programs, 273

setup, 265

RS-232 communications, 296

RS-422, 259, 1458

RS-449, 259,1458

RS-485, 1458

RSA, 732-734, 747-762, 764-767,771,778, 781,

794, 1469, 1585, 1587

example, 762

key generation, 767

program, 761

RSVP, 374,1469

RTF, 1469

RTS, 261,265,268, 269, 278, 283, 1407, 1412,

1413

run-length encoding, 187-190, 1458, 1468

running-config and startup-config, 667

S/PDIF, 1469

SAB~E,457,468, 1469

SAC, 1469

SAFER, 748, 749

sampled data, 461

sampling, 174, 177, 178, 191, 192,211-213,431,

432,471,806,1330,1450,1463

sampling rate, 191,213,432,471,806,1330,

1450

sampling theory, 177

SAP packet format, 563, 925

SAPI,466,470,1469

satellite TV, 199, 340

SB-ADC~P, 1469

S-box,752, 753, 754

scaleability, 367

scanning frequency, 212

scheduler, 62-65, 69, 71, 85, 99

scheduling, 47, 48, 62-65,68-71,97,991481

scheduling Algorithms, 64

scheduling queues, 63

SC~S, 1469

scrambled, 731

SCSI, 153, 1469

SD, 302, 410, 421, 880, 1469

SDH, 441, 447,1468,1469,1582,1583

SECA~,203,205,209,211,212,214,1317, 1469

secondary scheduler, 71

secret key, 705, 732,734,747, 766-768, 771-

774,777-779

secret-key signatures, 774

sectors, 714

secure socket layer (SSL), 779

security, 1,537,548,705,709,733,748,781,

786,794,880,883

hardware, 711

policies, 709

model, 880

permissions, 885

settings, 786

zones, 786

segment, 31,235,314,316,319-323,325,328,

333-335,356,358,359,364,365,367,370,

371,374-378,381,390,397,398,400,402,

443,444,495,500,504,521,531,534,535,

537-541,545,597,854,881,1441,1443,

1455-1459,1467,1469

switch, 398, 399

segments, 316, 320-323, 326, 327, 335, 371,

374-379,398,402,403,496,531,533,534,

535,537-539,542,544,545,939,1445,

1447, 1448, 1456, 1458, 1459

semaphores, 68, 81-85

flag, 68,82

values, 83, 1011

sensor, 159,237

sequence number, 236, 320, 361, 442, 444, 445,

467,476,477-480,522,523,531,533-541,

544-546,558,559,564,706,922,923,925

prediction, 706

sequencing of data, 360

serial, 54, 153, 154,270,273,656,661,663,671,

1459, 1576, 1579

serial communications, 259, 260, 269, 277, 279,

286, 1458

serial copy management, 1469

service quality, 432

session, 1065, 1066, 1119

session hi-jacking, 706

session layer, 1,91, Ill, 3l3, 314, 320, 536

Index 1633

set asynchronous balance mode extended, 468

shared memory, 81

shared secret-key authentication, 771

shared-file approach versus client/server

approach, 794

sharing disk resources (network file servers),

310

sharing information, 309, 310

shielded twisted pair, 409, 414,1447

shielding, 338

shift registers, 228, 234

shortest-job-first,66

S-HTTP, 779, 783

signal frequency content, 157

signal-to-noise ratio, 159, 196,375,1470

simplex, 153, 1459

sine, 163, 1168, 1170

single-tasking, 37

SIPO, 198, 1469

SIPP, 516, 1469

SKIPJACK, 749

slave in, 425

slave out, 425

slices and macro blocks, 193

S1{A,346,364,1462

S~DS,599,672, 1442, 1465, 1469, 1577

S~T,418,420,428, 1469

S~TP,32,538,540,595,632,698,699, 704,

780,794,796-804,809-811,894,1469,

1575,1579,1580,1583,1587,1590

example transmission, 801, 802

~I~E, 797

operation, 797

overview, 798

responses, 801

transfer, 799

SNA, 308, 359-361, 553, 560, 876, 919, 924,

1468, 1469

SN~P,32,518,538,540,550,841,842,844,

845,851,894,1458,1459,1470,1480,1576,

1577,1581,1584,1585,1590

SNR, 159, 1470

socket,81,560,607-611,613,614,629,630-

633,634,700,779,924,1167,1554,1582

connection, 629

creating, 631

number, 533,538, 731

Windows, 877

1634 Handbook of the Internet

software handshaking, 265, 267

software interrupts, 51

SONET, 441,1468,1470,1582,1583,1590

source

address, 357,377,401,410, 412,422,527,

698,699,1449,1469

destination address, 330, 331, 333, 356, 357,

409,412,731

compression, 187

route bridging, 323

encoding, 190, 1459

SPACE, 239, 738, 743, 744, 833,1134,1136,

1437,1511,1527,1541

spanningtree,323,324,381,672

SPARC, 57, 889

speech,21,23, 147,149, 152, 157, 160,174,176,

177,295,311,370,427,431-433,446,461,

471,785,793,794,817,1330,1444,1450,

1452, 1456, 1457

compression, 471

split horizon, 681

SPX,90,314,355,357,532,536,552,553,555,

556,558,559,565,567,607,668,875-877,

919,921-923,926,938,1470

IPX, 90, 355, 532, 536, 551- 553,565,567,

607,668,875-877,919,926,938

packet format, 559, 923

SQDV, 203

SQL, 1333-1350

square root, 1148, 1170,1240, 1241,1243, 1540

SRA~, 10, 1470

SREJ, 236, 455

SSL, 748, 779, 780, 784, 1470

ST connector, 364

standalone, 307, 398, 952, 1132, 1133, 1216

standard input/ output, 902, 905, 909

star network, 328, 330, 331, 367

start and end delimiter, 410, 421, 466

start bit, 261, 262, 263, 296, 422

start delimiter, 357, 411, 412, 421- 423,1469

startup files and scripts, 933

starvation, 87

stateless protocol, 822, 824

static interference, 345

static methods, 1162

station management, 418

statistical

encoding, 180, 186,1451,1459

multiplexing, 438

stereo audio, 198

ST~,433,434,438,441,447, 1470

stop bit, 261-263, 265, 271, 275-277, 280, 286,

288,295,296,1445

store-and-forward switching, 400

STP, 337,339,366, 381,382,413-415, 1470

streaming, 1330, 1331

stream-oriented, 537

string manipulation, 1549

striping with parity, 878

strowger, 150

STS-1,441

SUB,970

sub-band,1469

sub carrier, 204, 208, 209, 211

subnet,404,484,495,504-506,511,513,517,

521,524,530,656,663,664,667,684,853,

855,856,859,1453-1456,1476

masks, 505, 684

subsampling, 191,212

subscript, 970

Sun ~icrosystems, 92,110,952,1330,1456,

1457, 1586

SuperJANET, 429, 447, 599

supervisory frames, 454-456, 467

suppressing repetitive sequences, 180, 1459

SVGA, 215,1470

switch, 322, 333, 372, 374, 381, 397-402, 404,

405,413,434,437-440,598,600,656,662,

668,669,938,1134,1149,1150,1413,1443-

1446, 1452, 1573

cut-through, 400, 401,1449

store-and-forward, 401,1443

switching hubs, 397

sync pulse, 204, 208, 209, 211

synchronization, 37, 42, 97,166,184,533,555,

691,893,921,926,936,937,1319,1452,

1455, 1469, 1586

synchronization bits, 462, 464

synchronized, 107, 296, 385, 420, 441, 465, 630,

635,927,938,1134,1325,1445,1459,1505-

1509,1516-1525,1528,1553,1554

synchronous,111,295,422,423,428,433,441,

451, 1407, 1454, 1460, 1469, 1470

synchronous modems, 296

syndrome, 247-249

system timer, 54

tab, 1137, 1415, 1511, 1527

task manager, 75

task switching, 69

TCP, 31, 35, 37, 46, 56, 59, 90, 91, 94,115,120,

308,314,315,320,333,355,357,359,360,

432,440,495,496,498-500,516,518,520,

523,524,531,532,535-549,552,553,558,

560,565,567,595,597,598,601-603,605,

607,614,619,620,630,634,668,672,697,

698,704,706,731,780,794,797-800,815,

824,831,842,854,856,860,865,876,877,

889,892,893,919,922,924,926,938,939,

983, 1131, 1446, 1452, 1454, 1457, 1459,

1466,1470,1473-1476,1575-1577,1579,

1580, 1582, 1587, 1590

connection, 541

connection states, 543

header format, 538, 539

internets, 500

ISN selection, 545

opening and closing a connection, 546

ports and sockets, 538

protocol data unit, 496, 538

sequence numbers, 537, 541, 544

specification, 541

TCB parameters, 544, 545

UDP, 536

user commands, 547

TCP user commands

ABORT, 543, 549

CLOSE,541,543,544,546-548,602,603

OPEN, 541-543, 547, 691, 692, 693, 694

RECEIVE,69,70,382,541-543,546,548

SEND, 69, 70, 541-543, 548, 799

STATUS, 542, 543, 549

TCP/IP, 31, 35, 37, 46, 56, 59, 90, 91, 308, 314,

320,333,355,357,359,360,440,495,496,

498,500,520,531,532,536,549,552,553,

560,565,567,595,597,598,601,602,605,

634,697,698,704,706,780,794,797,815,

824,842,854,856,860,876,877,889,892,

919,924,926,938,939,983,1131,1446,

1452,1454,1457,1459,1473-1577,1582

Class A, 501, 505

Class B, 442, 501, 502, 505

Class C, 442, 501, 505

gateway, 496, 500, 560, 924

implementation, 500

Index 1635

internets, 500

model, 536

ports and sockets, 538

protocols, 892, 1459

services reference, 549

version number, 498

TD,260, 267,269, 273-277,382,969,991-993

TDAC, 1470

TDI, 876, 877

TDM, 166, 167, 169,433,463,1470

TE,464-466,469,470, 757

TEI,466,468,470,1470

TEIs, 466

telephone, 26, 28,147,149,150,152,154,160,

163,170,174,177,201,292,295,296,298-

300,304,305,307,311,349,352,409,433,

437,461,466,471,473,483,495,496,512,

656,771,793,818,935,1206,1207,1208,

1320, 1330, 1408, 1441, 1444, 1447, 1455,

1468,1478

number, 299, 437, 495, 496, 512, 935, 1408,

1478

teletex, 461

television, 147, 199,203,1464,1470

telnet, 1,32, 120,314,320,495,518,531,538,

540,542,549,595,603,632,656,669,671,

698,704,706,708,731,780,815,820,864,

865,866,893,1167,1458,1470,1476,1574,

1576,1577, 1581,1583, 1590

terminal, 300, 911, 1576

text, 31, 286,288,295,616,618,956, 1221,

1224,1419,1421,1575,1577,1580,1585

background color, 224

based, 151,320,731,794,822,833,1317,

1321

blink,970

editor, 745, 821, 907,1133

foreground color, 224

input, 1221

thinnet, 364, 365

thread,44,45,47,49, 71, 713

three-way handshake, 542, 545, 546

throughput, 49, 313, 325, 367, 371, 398, 431,

478,483,499,684,713

TIFF, 188-190,224-226,1459, 1470, 1585,1590

IFD, 225, 226

tilde, 1160, 1416, 1417

time, 1230

1636 Handbook of the Internet

domain, 200

server types, 938

synchronization, 936

time-division multiplexing (TDM), 166

timestamp, 94, 522, 523, 528, 601, 777, 937

timing attack, 759

token ring, 59, 152,240,315,327,330-333,346,

348,355,370,390,401,409-418,424,427,

431,459,495,496,500,513,556,852,876,

922,982,990,997,1441,1442,1447,1451,

1456, 1459, 1577

adding to the ring, 333, 412

cable, 409

data exchange, 332, 410, 1463

deletion from ring, 332, 412

fault management, 333, 413

jitter suppression, 415

maintenance, 332, 412

MAUs, 333,362,409,413-415, 1445, 1456,

1466, 1584

ring initialization, 332, 412

topology, 327-331, 333, 334, 337, 348, 350, 356,

367,381,417,513,514,672,675-678,680,

682- 688,816,979,1447,1448,1450

total internal reflection, 343

TR,302, 969,991-993, 1465, 1470

traceroute, 595,598,599,600,602,671

traffic,32,59, 76, 77,147,169,171,214,309,

311,313,321,323-325,327,328,330,331,

333-335,355,363,365,367,375,376,384,

398,403,404,409,417,418,423,424,427,

431-434,438, 439,441,442,445v447,461,

474,517,518,523-526,529,552,559,560,

672,673,684,685,697-699,702,704,794,

817,818,825,841,851,852,919,923,924,

926,928,936-939,1441,1442,1445,1446,

1449, 1450, 1452, 1454, 1458

congestion, 445, 673

profile, 431

statistics, 420

transceiver, 362-365, 369, 373, 383, 384, 386,

656,1459

transform encoding, 1459

transmission channel, 153, 163, 179,230,801,

1456

transmission line, 384, 596, 1455

transmission protection, 705

transport, 32, 314, 320, 427, 431, 435, 441, 495,

496,536,556,693,768,770,778,820,876,

893,922,1459,1578,1579,1582,1586

functions, 533

layer, 313,314,315,316,320, 321,326,431,

435,495,496,498,531,532,533,534,

536,537,555,668,731,876,893,921,

1441,1456,1459,

semantics and authentication, 91

tree topology, 329

trellis, 165,251-253,255-258

trusted sites, 786

truth table, 1141, 1142, 1153

TTL,499,556,596,598,599,601,922,1470,

1476

TUBA, 516,1470

tunnel, 552, 671, 698, 825, 919

TV system, 26,198,199,207,215,340,1317

twisted-pair, 26-28, 153,259,316,317,322,

328,330,333,336-339,346,348,349,351,

355,356,362- 368,373,409,413,414,464,

656, 1441, 1447, 1451, 1456, 1458, 1470

hubs, 365

twisted-pair hubs, 365

UDP, 90,115,120,516,529,540,541,598,602,

607,614,704,865,893,1467,1470,1476

UI,362,468,1470

ultra-violet, 24, 25, 168, 169

unbalanced, 452

uncompressed, 176, 179, 189,222,295,907,

1442,1456

uncompressed TV, 214

Underwriters Laboratories, 346

UNI, 434, 440, 445,1470

unicast, 518, 856

unicode, 1135-1137, 1531, 1532, 1580, 1582

universal resource locators, 819

UNIX, 1, 17,31,33,35-37,42,56,57,59,67,69,

71,72,81,94,109,95, Ill, 117, 118, 121,

310,311,520,324,355,531,552,553,605,

684,697,707,710,711,798,801,818,819,

875,884,889,892,894,895,898,903,905,

907,911,919,927,952,1330,1447,1569

cal,912

cat, 902,903,905,906,908, 910,911,912

cc, 74, 902, 911

chmod,891,892,900-902

cp,902-904

df,907

diff,908

dU,907

fn,911

file, 901

find,909

grep, 909, 910

head,910

kill,72-74

In, 908

Ipr, 74

Is, 72-74, 889, 890, 892, 896-898, 900, 901-

908

more, 897,902,904,905

mv, 902, 904

nice, 73, 74

passwd, 909, 911

pipes, 906

process control, 71

ps,72-74

redirection, 905

rm, 75, 903

sed,902

stty, 902

tail,910

wC,910

who, 911

unnumbered information, 468

unordered lists, 980, 981

unrestricted token, 418

unshielded twisted-pair cable, 337, 339

uppercase, 827, 1541

UPS, 879,1470

UPS services, 879

URI,826-828,831-836,1421, 1470, 1587, 1590

URL,634,638-9,979,994, 1167, 1192, 1466,

1468,1470,1503,1504,1524,1555,1577,

1579,1580,1582-1584,1586,1587,1590

USB, 53,153,1470

UseNet, 815, 822

UTP, 26-28, 337, 339, 346, 347, 349, 363-366,

373,414,415,1451,1458,1470

UUCPS, 784

UV,1470

V.21, 163, 164,297, 1405, 1409

V.22, 164, 165,297, 1405, 1409

V.22bis, 164, 165,297

V.22bis modems, 165

V.32, 164,165,297,306, 1405, 1409, 1460

Index 1637

V.32 modems, 165

V.32bis, 164, 165,297

V.42, 164,297, 1409, 1413, 1460

V.42bis, 164,297

V.42bis and MNP compression, 164

vampire, 364, 812

variable frequency, 433

variable length code, 181, 193, 1453

VCI, 434, 435, 437-440,476, 479, 483, 484, 1471

header, 435

lable,434, 435, 438, 439, 479, 483, 484

VCO, 385,1471

VCR, 203, 214, 1471

VCR quality, 214

VCR-type, 214

VDD,1471

vector information, 194

velocity, 341, 342

velocity of propagation, 342

version, 24, 36, 46, 55, 57, 58, 93, 95, 116, 191,

200,215,216,225,228,444,498,516,517,

549,598,601,661-667,670,672,684,685,

687,691,698,748,767,803,806,827,832,

833,842,843,889,969,1131,1167,1175,

1199, 1579, 1583, 1584

vertical redundancy checking, 244

VGA, 1470, 1471

video, 7,21,23,147,151,174-177,179,180,

187,192,193,195,196,198,199,203-205,

207,208,210-214,295,325,355,370,427,

431-433,442,446,447,515,697,783,794,

806-808,815,818,835,952,969,985,999,

1131,1317,1319-1321,1325,1331,1442,

1459,1471,1580,1583,1584,1587,1588

compression, 176, 195, 199,446

conferencing, 515, 1319, 1320

sequence, 196

videotex, 461

VIM, 796, 1471

violation, 411, 419, 420, 748

virtual

channels, 170, 436

circuit, 169,434

data flow, 314

device driver, 1471

loadable modules, 938

Machine Manager, 48, 49, 1471

path, 152,431,434-437,439

1638 Handbook of the Internet

viruses

macro, 714

Visual Basic, 277, 278, 614, 618, 714, 955-959

visual editor, 73

vLAN,402-405

VLC,222,1460,1471

VLC-LZVV, 1460, 1471

VMS, 36, 58, 3lO

volatile, 51, 345, 658, 663,1134,1407

volume mapping, 934

VRC,244,250,1471

WAIS,1471

WAN, 170,307,473,656,1459, 1471

WAP,1301-1315

WAV,23, 177,815, 1199, 1330, 1586

waveform, 162, 174, 178,206,208,209,383,

386, 1330

wavelength and color, 341

Web, 31, 513, 595, 786,815,816,818,823,952,

1331, 1471, 1580, 1581

white run length coding, 202

white-space, 180

WIMPs, 33, 1317, 1471

Win32, 49, 50,1481

~ndo~ng,531,534,535

Windows 3.x, 34, 42, 49, 50, 58, 300, 553, 875,

919, 1481

Windows 95,51,300,818,875,884,885

Windows NT /2000,31,42,50,56,59,75,520,

553,564,567,601,706,710,854,875,876,

877-881,884,885,919,927,1473,1477,

1481, 1498

architecture, 1481

system administration commands (quick

reference), 1477

task Manager, 75

TCP/IP setup, 1473

Windows sockets, 877

WINS, 603, 860, 861, 881,1471,1473,1478

WinSock, 547,605,606, 614-618, 877

WINSOCK.DLL, 46, 877

WINSOCK32.DLL, 877

~ring closets, 347, 350

workgroups, 58, 880, 881, 882, 927

workstation, 17,56,59, 121, 195,311,323,337,

347,348,380,563,881,889,925,1479

WORM, 1471

VVVVVV,1,5,6,31,295,512,549,595,597,633,

x

634,638,641,697,699,702,766,768,770,

779,781,783-786,812,815,817-819,823-

829,831,834,836,837,883,952,969,970,

979,981-989,1131,1317,1319,1320,1325,

1471, 1478, 1577

advantages and disadvantages, 817

browser design, 823

browsers, 818

terminals, 513

Windows, 1576, 1577

xterm, 902

X.21, 474, 475, 1460

X.25,451,458,474,476,479,481,483-485,663,

672,686,1456,1460,1466,1468

XAOO, 796, 797, 1460

X/Open, 57, 889

X3T9.5, 425, 428, 1460

)o)R, 17,95, 110,320,912,917, 1471

format, 110,912

Xerox, 56-58, 115,333,355, 1451

~L,976, 1263-1268, 1393

X-OFF, 267, 1460

X-ON, 267,1460

XOR, 227, 228, 234, 238-240, 245, 250, 258, 262,

742-744,747,748,752,755,878,1142,

1144,1471

X-Windows, 889, 893

Y:Cr:Cb, 191,213

Yellow Pages, 95,113

ypcat,119

ypinit, 119, 1568

ypmake, 119, 120

ypwhich, 119, 1568

YlJV,191-193,212

zero bit -stuffing, 465, 466

zigzag, 197

ZIP, 295, 815,832,999, 1166, 1471

Index 1639