Order Number: AA-Q06TF-TE
Compaq Computer Corporation
April 2002This manual describes concepts and planning tasks to prepare you to use the Compaq TCP/IP Services for OpenVMS product. Revision Information: This is a revised manual. Operating Systems: OpenVMS Alpha Versions 7.2-2, 7.3 OpenVMS VAX Versions 7.2, 7.3 Software Version: Compaq TCP/IP Services for OpenVMS Version 5.3
Houston, Texas April 2002 COMPAQ, the Compaq logo, Alpha, OpenVMS, Tru64, VAX, VMS, and the Compaq logo are trademarks of Compaq Information Technologies Group, L.P., in the U.S. and/or other countries. Microsoft, MS-DOS, Visual C++, Windows, and Windows NT are trademarks of Microsoft Corporation in the U.S. and/or other countries. Intel, Intel Inside, and Pentium are trademarks of Intel Corporation in the U.S. and/or other countries Motif, OSF/1, and UNIX are trademarks of The Open Group in the U.S. and/or other countries. Java and all Java-based marks are trademarks or registered trademarks of Sun Microsystems, Inc., in the U.S. and other countries. All other product names mentioned herein may be trademarks of their respective companies. Confidential computer software. Valid license from Compaq required for possession, use or copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendor's standard commercial license. Compaq shall not be liable for technical or editorial errors or omissions contained herein. The information is provided “as is” without warranty of any kind and is subject to change without notice. The warranties for Compaq products are set forth in the express limited warranty statements accompanying such products. Nothing herein should be construed as constituting an additional warranty. Table of Contents
An open communications standard defined by the worldwide networking community, TCP/IP consists of numerous application, routing, transport, and network management protocols. These protocols enable any connected host to communicate with any other connected host, without needing to know details about the other host or the intervening network topology. Computers and networks from different manufacturers running different operating systems can interoperate seamlessly. The Compaq TCP/IP Services for OpenVMS product is Compaq’s implementation of the TCP/IP networking protocol suite and internet services for OpenVMS Alpha and OpenVMS VAX systems. This manual introduces the TCP/IP Services product and provides conceptual and planning information to help you configure and manage the product. This manual is for anyone who needs an overview of the TCP/IP Services product. See the Compaq TCP/IP Services for OpenVMS User’s Guide for information on using TCP/IP Services applications and the Compaq TCP/IP Services for OpenVMS Management guide for details on configuring and managing the TCP/IP Services product. This manual contains the following chapters: Chapter 1 provides an overview of the TCP/IP Services product. Chapter 2 describes the network implementation differences between UNIX and OpenVMS. Chapter 3 describes the many decisions you need to make about OpenVMS configuration options before configuring TCP/IP Services. Chapter 4 describes OpenVMS operating system features that support the TCP/IP environment. Chapter 5 describes key concepts of network server features: NTP, routing, BOOTP and DHCP, FTP, and SNMP. Chapter 6 describes mail services: Post Office Protocol (POP), SMTP, and IMAP. Chapter 7 discusses ways to connect to the network, such as TELNET, PPP and SLIP, DECnet-over-TCP/IP, NFS, and XDM. Chapter 8 describes the TCP/IP Services implementation of the Berkeley Internet Name Domain (BIND) service. Chapter 9 provides guidelines, scenarios, and checklists for deploying IPv6 on a single system in a network. The Glossary defines terms and acronyms related to TCP/IP Services. The following table lists the documents available with this version of Compaq TCP/IP Services for OpenVMS:
For additional information about TCP/IP Services for OpenVMS, access the Compaq OpenVMS World Wide Web site at the following URL: This manual describes concepts that are specific to the Compaq TCP/IP Services for OpenVMS implementation of TCP/IP. If you are looking for a comprehensive overview of the TCP/IP protocol suite, you might find the following useful:
Compaq welcomes your comments on this manual. Please send comments to either of the following addresses:
Visit the following World Wide Web address for information about how to order additional documentation: The following conventions are used in this manual:
The Compaq TCP/IP Services for OpenVMS product is the OpenVMS implementation of the industry-standard TCP/IP suite of communications protocols. With TCP/IP Services, users, administrators, and programmers can perform tasks from anywhere in the network, such as:
Users can perform internetworking tasks seamlessly without worrying about the hardware details of each individual network. The TCP/IP Services provides interoperability and resource sharing between OpenVMS systems, UNIX systems, and other systems that support the TCP/IP protocol suite and Sun Microsystems Network File System (NFS). Internet hosts share data and resources by using standard TCP/IP protocols over a number of network hardware configurations including Ethernet, Fiber Distributed Data Interface (FDDI), Token Ring, and asynchronous transfer mode (ATM). This chapter discusses the following topics. More details about these topics are provided elsewhere in this manual and in other Compaq TCP/IP Services for OpenVMS and OpenVMS documentation set manuals. TCP/IP Services provides support for several protocols at every level of the TCP/IP model's protocol layers. Figure 1–1 shows the various layers and protocols of the TCP/IP model. A description of each layer and protocol follows the figure. At the base of the TCP/IP layers, the Data Link layer formats data and provides services that directly access the physical network. This layer also receives data that is routed from the Internet layer and transmits the data to its destination, converting logical IP addressesto physical addresses of the network adapter or network interface cards (NICs) using the Address Resolution Protocol (ARP). Some commonly used network architectures designed for the physical network are Ethernet and its variants, Token Ring, FDDI, and ATM. A single host computer can have multiple NICs. This configuration is termed a multihomed host. Depending on your network setup, the Data Link layer's configuration may vary. For more information, see Chapter 3. The Internet layer moves data around the internet. The Internet Protocol uses addressing to deliver and route packets across networks independently of the network cabling. At this level, the protocols are: The protocol also encapsulates datagram headers, sends ICMP error and control messages, and maps ARP address conversions.Routing protocols at this layer are: For more information about these protocols, see Chapter 5. The Transport layer enables a flow of data between two hosts. The protocols at this layer are either connection oriented, in which the protocol establishes and maintains the connection between communicating hosts to prevent errors, or connectionless, in which a one-way datagram is sent to a destination host. The TCP/IP Services supports both transport protocols:
The top layer of the TCP/IP protocol suite, the Application layer handles the details of the particular application, protocol, or user command; it is not concerned with the movement of data across the network. TCP/IP Services supports the following TCP/IP applications, protocols, and user services: Remote Computing ServicesRemote computing applications enable networked users to run software on remote systems. TCP/IP Services include the following remote computing application components:
File Transfer ServicesTCP/IP Services includes the following components that let users transfer data files between local and remote hosts: File Transfer Protocol (FTP) transfers files between hosts. Trivial File Transfer Protocol (TFTP) downloads and transfers files. Compaq TCP/IP Services supports downloading of system image and other information to client hosts. Resource ServicesLine printer/line printer daemon (LPR/LPD) provides printing services to local and remote hosts. TELNET print symbiont (TELNETSYM) provides remote printing services that enable OpenVMS printing features not available with the LPR/LPD print service. Network File System (NFS) is a protocol that allows computers to access remote files as if they were local files, regardless of operating system, hardware type, or architectural differences between the local and remote systems. This is accomplished in a client/server environment where specific implementations on NFS exist on both the client and server machines. PC-NFS is a daemon that enables access to the NFS server from a PC by providing authentication services to PC-NFS clients. Electronic Mail ServicesCommunication functions such a electronic mail are vital both within an organizational internet and across the Internet worldwide. The electronic mail components of TCP/IP Services are: Simple Mail Transfer Protocol (SMTP) is the TCP/IP standard protocol for transferring electronic mail messages from one system to another. IMAP is the Internet Message Access Protocol. IMAP enables clients to access email messages and folders from an IMAP server and synchronize them locally. This enables a client to organize email messages and folders without continuous access to the server. Post Office Protocol (POP) is a mail repository used primarily by PCs. Beyond the industry-standard TCP/IP application services, TCP/IP Services provides support for the following Compaq products: The Compaq TCP/IP Services for OpenVMS software includes the PWIP driver and the PWIPACP network ancillary control process (ACP). The PWIP driver enables communication between OpenVMS systems running both PATHWORKS server and TCP/IP Services software, and personal computers running PATHWORKS client software. It also enables the DECnet-over-TCP/IP feature, which is included with the DECnet-Plus for OpenVMS Version 6.0 and later software. For more information, see Chapter 7. Network applications specific to the Compaq TCP/IP Services can use the following application programming interfaces (APIs): Sockets have become a popular programming interface. The Berkeley Sockets Interface is a programming interface that provides applications with access to network communication protocols. A socket is a generalized UNIX communication endpoint on which the TCP/IP protocols have been implemented. Using the socket programming interface makes it easy to implement network applications. OpenVMS provides support for the socket interface through the C programming language and the Compaq C Run-Time Library. The benefits of using the socket interface on the OpenVMS platform include: For more details, refer to the Compaq TCP/IP Services for OpenVMS Sockets API and System Services Programming manual. The standard I/O programming interface on OpenVMS uses the QIO (queue input/output) system services. QIO services provide a rich set of functions for controlling devices, and connections and for performing input (read) and output (write) operations. The benefits of using the OpenVMS QIO interface include:
For more details, refer to the Compaq TCP/IP Services for OpenVMS Sockets API and System Services Programming manual. SRI QIO CompatibilityTCP/IP Services provides support for customer applications using the INETDRIVER QIO interface developed at Stanford Research Institute (SRI) in 1980-81. An SRI QIO emulator that translates non-TCP/IP Services QIO interfaces into TCP/IP Services QIO programming interfaces can be configured by using the TCPIP$CONFIG procedure. The RPC programming interface is an industry-standard, portable API that is an efficient alternative to using sockets for application development. Programmers do not need an in-depth knowledge of networking protocols to use RPC. One strong point of the RPC interface is its ability to distribute functions across the network. This is done in an architecture-independent manner, thereby avoiding problems with floating-point formats and byte-address ordering that often occur when interacting between architectures. This API includes: For more details, refer to the Compaq TCP/IP Service ONC RPC Programming manual. The Extensible Simple Network Management Protocol (eSNMP) API provides routines for developing applications that remotely manage and collect data from network devices such as routers, bridges, and hosts. These network devices run software that carries out management commands that either get information from devices or set operating parameters for devices. Other network applications send commands to network devices to perform configuration management, monitor network traffic, or troubleshoot network problems. The SNMP API provides routines for the following functions: The SNMP API routines are almost identical in function and interface with the routines in the Compaq Tru64 UNIX API. For more details, refer to the Compaq TCP/IP Services for OpenVMS SNMP Programming and Reference manual. Although TCP/IP is monitored by a number of organizations, no single entity owns this protocol; its specifications are publicly available and are constantly growing as communications requirements evolve. The process by which the specifications evolve is through a mechanism called Requests for Comments (RFCs). When someone has an idea for a new or improved capability for TCP/IP, he or she writes a proposal, posts it on the Internet as an Internet draft, and requests comments from the networking community. After a review and revision cycle, working code is developed and an RFC becomes a standard protocol. RFCs are available on the Internet from the Internet Network Information Center (InterNIC). The following web site provides links to several RFC international repositories, lists all RFCs, and explains how you can obtain copies: Note that, although RFCs recommend implementation guidelines, the actual implementation of an RFC can and must differ from the RFC in minor ways. When product documentation refers to specific RFCs, be aware that the RFC only sets the standard for development. Product developers must design their software for the specific environment and requirements of their customers. An important step in planning a network host implementation is to gain an understanding of the computing environments in which the network services will run. Compaq Tru64 UNIX implementations of TCP/IP Services are often ported to OpenVMS. As a result, they often appear to be identical. However, there are many significant differences. This chapter describes key implementation differences between UNIX and OpenVMS networks. The following topics are discussed: Things to ConsiderIn planning your TCP/IP Services environment, consider the following: The issues of working in a heterogeneous computing environment that includes OpenVMS and Tru64 UNIX operating systems are complex. Consider these concepts when evaluating or implementing an interoperability strategy:
The client/server model of computing means that users running applications on their PCs and workstations are networked with larger departmental systems. The departmental systems provide a variety of services to the clients, such as access to common database, print, and backup/archive services. To best serve this model of computing, the systems must be open. Open environments support interoperability and application portability and enable developers and users to easily use different platforms. The OpenVMS operating system is an open system with an extensive list of functions. An open system allows the OpenVMS operating system, whether powered by Alpha or VAX, to interoperate efficiently with Compaq Tru64 UNIX and with other vendors' operating systems, particularly with Windows NT and other UNIX operating systems. Implementing open systems means using the right middleware between the operating system and the hardware platform and applications. Consistent middleware affords interoperability and portability when and where it is needed. An open systems strategy involves a consistent middleware approach that is based on standards and is embodied in layered software and in individual operating systems, such as OpenVMS and UNIX. Compaq DCE is an example of middleware, with standard interfaces supported on both OpenVMS and UNIX. Compaq DCE, or Distributed Computing Environment, is an architecture of standard programming interfaces, conventions, and server functions that transparently distributes applications across heterogeneous networks. As shown in Figure 2-1, OpenVMS and UNIX interoperate efficiently, especially in areas that are common to both platforms: windowing interface, standard POSIX and DCE programming interfaces, compilers, networking products, and applications. The Network File System, or (NFS) provides a standard for the exchange of data between machines running different operating systems. NFS enables users to access directories and files on remote computers transparently, as if they were on the local system. NFS accomplishes this because it is implemented on the both the remote and the local computer. NFS protocol achieves portability between different machines, operating systems, network architectures, and transport protocols through the use of Remote Procedure Call (RPC) and External Data Representation (XDR). For more information about RPCs and XDR, refer to the Compaq TCP/IP Services for OpenVMS ONC RPC Programming manual. Using NFS is simple. Configuring and implementing NFS, however, are more complex. For NFS concepts and considerations, as well as detailed configuration and implementation information, refer to the Compaq TCP/IP Services for OpenVMS Management guide. TCP/IP Services accommodates the numerous key differences between UNIX and OpenVMS to make user interaction between the two operating systems appear transparent. This enables all systems on a heterogeneous network to store and share files and applications regardless of file specification and structure differences. This section discusses: Unlike OpenVMS, the UNIX hierarchy appears as one tree (starting from the root directory, or “/”) that can be located on more than one device. Table 2-1 describes the differences between the OpenVMS and Tru64 UNIX directory hierarchies. Table 2.1. Directory Hierarchy Differences
Figure 2-2 illustrates the differences between a UNIX file structure and an OpenVMS file structure. There are basic differences between OpenVMS and UNIX file specifications. Table 2–2 summarizes the differences. Table 2.2. File Specification Differences
OpenVMS file specification formatOn a standard Files-11 On-Disk Structure Level 2 (ODS-2) volume, an OpenVMS file specification has the following format: device:[directory.subdirectory]filename.type;version UNIX file specification formatOn a UNIX system, the file specification has the following format: /directory/subdirectory/filename OpenVMS and UNIX both have two types of file specifications or pathnames: absolute and relative. Table 2–3 describes the differences between the two platforms. Table 2.3. Absolute and Relative File Specification Differences
There are fundamental differences between file names specified in OpenVMS and in UNIX. Table 2–4 describes those differences. Table 2.4. File Specification Differences
Case sensitivity differs between the two operating systems. Table 2–5 describes the difference. Table 2.5. Case-Sensitivity Differences
Table 2–6 describes the file type differences between OpenVMS and UNIX. Table 2.6. File Type Differences
Table 2–7 describes file version number differences between OpenVMS and UNIX. Table 2.7. Version Number Differences
A link is a directory entry that refers to a file or another directory. Table 2–8 describes the differences between OpenVMS and UNIX file linking. Table 2.8. Link Files Differences
Table 2–9 describes the differences between the OpenVMS and UNIX file structures. Table 2.9. File Structure Differences
The OpenVMS and UNIX operating systems use different mechanisms for file ownership. Table 2–10 describes those differences. Table 2.10. File Ownership Differences The OpenVMS and UNIX operating systems use similar file protection schemes, as shown in Table 2–11. Table 2.11. Comparison of File Protection
The TCP/IP Services allows you to create a logical UNIX style file system on an OpenVMS host. Remote UNIX hosts that have NFS software can then access this file system. When a remote UNIX system accesses files, these files conform to UNIX file system rules, not to the OpenVMS rules. This ensures that existing UNIX applications work without change. The logical UNIX file system resides on a Files-11 formatted disk and is represented as a set of Files-11 files called a container file system. For information about creating a UNIX file system on an OpenVMS host, refer to the Compaq TCP/IP Services for OpenVMS Management guide. The UNIX file names and attributes are catalogued in the container file, one of the files in the container file system. The container file also has a representation of the UNIX directory hierarchy and a pointer to the data file for each file name. In addition to its UNIX name, each file in the container file system has a valid Files-11 file name assigned by the system. An OpenVMS directory exists for each UNIX directory stored in the container file. All files catalogued in a UNIX directory are also catalogued in the corresponding OpenVMS directory. However, the UNIX directory hierarchy is not duplicated in the OpenVMS directory hierarchy. Each UNIX file is represented as an OpenVMS data file. Therefore, OpenVMS utilities, such as BACKUP, can use standard methods to access these files. The first step in managing your TCP/IP Services system is to decide which file system to use. NFS on OpenVMS enables you to set up and export three different kinds of file systems:
Table 2.12. NFS Server Features Available to Non-OpenVMS Clients
The dual cataloguing of files to both OpenVMS file systems limits the set of DCL commands. OpenVMS utilities, such as BACKUP, can use standard methods to access the files. However, except for backing up and restoring files, you should not use DCL commands to manipulate files in a container file system. Decision PointYour file system choice depends on your environment and the user needs on the NFS client host. Consider using an OpenVMS file system if: For More InformationFor more information about the following topics, refer to the Compaq TCP/IP Services for OpenVMS Management manual: For a list of commonly used Tru64 UNIX commands and their equivalents on OpenVMS, refer to the Compaq TCP/IP Services for OpenVMS Tuning and Troubleshooting manual. For more details about interoperability between UNIX and OpenVMS, refer to the OpenVMS and Compaq UNIX Interoperability and Migration Guide. This guide discusses products and services, available both from Compaq and from other vendors, that might provide solutions to interoperability problems. For more information about RPCs and XDR, refer to the Compaq TCP/IP Services for OpenVMS ONC RPC Programming manual. For additional ACL information, refer to the OpenVMS documentation set. There are several server and network configurations to consider before installing TCP/IP Services for OpenVMS. This chapter describes the following concepts that will enable you to make informed decisions about these configuration options: NoteVAX development has limited continued support. VAX users should consider migrating to Alpha, if possible. Things to ConsiderIn planning your TCP/IP Services for OpenVMS configurations, consider the following: You need to consider several issues when you plan to add one or more OpenVMS Alpha systems to your OpenVMS VAX computing environment. For full details about the similarities and differences between OpenVMS Alpha and OpenVMS VAX, refer to the OpenVMS Compatibility Between VAX and Alpha guide, which is available on line at: http://www.openvms.compaq.com/doc The user environment on OpenVMS Alpha is virtually the same as that on OpenVMS VAX. Table 3–1 describes the similarities and differences. Table 3.1. OpenVMS VAX and OpenVMS Alpha Similarities and Differences
Most OpenVMS VAX system management utilities, command formats, and tasks are identical on OpenVMS Alpha, with the following exceptions: For more information about implementation differences between OpenVMS VAX and OpenVMS Alpha, refer to the OpenVMS System Manager’s Manual. The same types of programming development tools that OpenVMS VAX programmers use are available on OpenVMS Alpha systems, such as the Linker utility, the Librarian utility, the OpenVMS Debugger (also known as the symbolic debugger),the Delta/XDelta Debugger, and run-time libraries. However, some TCP/IP Services components are available only on OpenVMS Alpha, including: These components are introduced later in this manual.For details about the similarities and differences between the programming environment on VAX and Alpha, refer to A Comparison of System Management on OpenVMS AXP and OpenVMS VAX, which provides guidelines for developing applications that run on both OpenVMS VAX and OpenVMS Alpha, as well as additional guidelines for systems that run in a mixed-architecture OpenVMS Cluster. Compaq TCP/IP Services for OpenVMS supports OpenVMS Cluster systems and the use of cluster aliases. The network sees the cluster as one system with one name, the cluster alias. A remote host can use the cluster alias to address the cluster as one host, or it can use the host name of a cluster member to address a cluster member individually. In a DECnet network, it is convenient to be able to treat nodes within a homogeneous OpenVMS Cluster as though they were a single node. You can do this by establishing an alias node identifier for the cluster. You can specify the alias node identifier as either a unique node address or a corresponding node name. Any member node can elect to use this special node identifier as an alias while retaining its own unique node identification. For more information on the use of the optional cluster alias node identifier, refer to the DECnet for OpenVMS Networking Manual. NoteDECnet–Plus software is not required in an OpenVMS Cluster configuration. However, DECnet–Plus is necessary if internode process-to-process communication using DECnet mailboxes is needed. For more information about DECnet-Plus in an OpenVMS Cluster configuration, refer to the Guidelines for OpenVMS Cluster Configurations manual. For load balancing, an OpenVMS Cluster can consist entirely of OpenVMS Alpha nodes or of a combination of OpenVMS VAX and OpenVMS Alpha nodes. You can have numerous OpenVMS Cluster configurations. For complete information about supported devices and configurations, refer to Guidelines for OpenVMS Cluster Configurations and the OpenVMS Cluster Software Software Product Description (SPD). For complete information about setting up and using an OpenVMS Cluster environment, refer to the OpenVMS Cluster Systems manual. Failover capability is the hallmark of a cluster environment. If one computer , or node, in the cluster fails, the others can assume its functionality and continue. This is called automatic failover. Each node (as a member of the host configuration in the cluster) retains a separate IP address. This is beneficial for troubleshooting the individual node because you can ping the specific node to see whether it is running. All of the TCP/IP services support automatic failover and can run on multiple nodes in an OpenVMS Cluster. For example, if more than one node in the cluster is running the NFS server, the cluster can appear to the NFS client as a single host. For more information about configuring a specific service for cluster failover, refer to the particular service in the Compaq TCP/IP Services for OpenVMS Management guide. Load balancing using the TCP/IP Services is defined by the load broker. The load broker is a configurable, calculated, load-balancing mechanism for distributing the work load among DNS (Domain Name System, which maintains and distributes information about Internet hosts) cluster members. For more information about DNS, see Chapter 5. Unlike round-robin scheduling (the default method used by most DNS name servers, in which each individual node in the cluster is polled in a continual, specific order), the load broker takes into account the load on all DNS cluster participants. The load broker polls DNS cluster members and updates the metric server accordingly. When the load broker starts, it reads its configuration file and starts polling DNS cluster members. The load broker exchanges messages with DNS cluster members that run the metric server, which calculates the current load on a DNS cluster host by using a specific equation. The metric server calculates the current rating and reports it when polled by the load broker. Periodically, the load broker sorts the list of addresses based on metric rating reports, drops the systems that do not respond after being polled three times, and compares a subset of the list with the name server information. To do the comparison, the load broker sends a host lookup request to the specified name server. If the lists are the same, the load broker does not make changes. If the lists are different, the load broker updates the name server data by sending a dynamic update request to the specified name server. The name server uses round-robin scheduling to further balance the load across the members of a DNS cluster. Thus, every consecutive request for translating the DNS cluster name results in a returned list, is rotated by one. For specific information about configuring the load broker, starting and stopping the metric server, and troubleshooting, refer to the Compaq TCP/IP Services for OpenVMS Management guide. Although host computers can have several network interface cards (NICs) installed, you can configure the host through a single, primary interface. This section introduces the following concepts: Individual host computers can have multiple network interface cards per computer. Such a computer is called multihomed. These physical interfaces can be connected to different types of networks, such as Ethernet, FDDI, Token Ring, asynchronous transfer mode (ATM), Gigabit Ethernet, and serial communications lines. Each physical interface is associated with one device driver (network interface). A single network interface can have more than one IP address. NoteIf a host has multiple interfaces under DHCP (Dynamic Host Configuration Protocol) control and receives a different host name from a DHCP server on each of the DHCP-controlled interfaces, the DHCP client uses the host name it receives on the primary interface to configure the host name for the client. For more information about DHCP, see Chapter 5. Although you can have multiple physical interfaces on a single computer, some of the parameters that are configurable by DHCP are interface specific. Examples of interface-specific parameters are the IP address and subnet mask. However, most DHCP configurable parameters are systemwide configurable parameters. Examples of systemwide parameters are the host name and DNS domain name. The TCP/IP Services DHCP client supports controlled configuration of systemwide configurable items by designation of a primary interface. The primary interface is the interface on which the DHCP client uses systemwide parameters received from the DHCP server to configure the system. Systemwide parameters received on an interface that is not designated as primary are not configured on your system by the server. Although only one interface on a system is designated as the primary DHCP interface, the system is not required to have any interface designated as primary. If a system has multiple interfaces and only one is under DHCP control, you can configure the systemwide parameters manually. DHCP client uses the following rules to resolve conflicts:
For details about configuring multiple interfaces, refer to the Compaq TCP/IP Services for OpenVMS Management guide. To use extended routing, you can define pseudointerfaces. A pseudointerface is a data structure that extends subnet routing using a network interface. Each network interface has one name and at most nine pseudointerface names. Each network interface and pseudointerface has its own IP address, network mask, and broadcast mask. Like an interface, the name of an internet pseudointerface consists of three alphabetic characters, followed by the pseudointerface unit number in the range of 0 through 255. The first two characters are the same as the two characters in the internet interface name (interface type and interface class). The third character identifies the controller letter that corresponds to the OpenVMS hardware controller. For more information about interface names, refer to the Compaq TCP/IP Services for OpenVMS Management guide. A serial connection is made between two systems using modems and telephone lines or other serial lines. TCP/IP Services supports serial connections using PPP (Point-to-Point Protocol) and SLIP (Serial Line Internet Protocol). SLIP includes CSLIP (compressed SLIP). You can use any standard OpenVMS terminal device as a PPP or a SLIP line. However, PPP is available for OpenVMS Alpha systems only. One of the largest applications for IP over serial lines is dialup access. With this type of configuration, your OpenVMS host answers calls and establishes a connection initiated by a user on a client host. The client host can be another OpenVMS system, a UNIX system, or a PC. Alternatively, users on your host can originate the dialup connection to a remote host or terminal server that is running the same protocol. Dedicated serial lines running PPP or SLIP can also be used to connect separate LANs into a single WAN. In such a configuration, the host at each end of the serial connection is always the same; no other hosts are allowed to connect to either serial device. If your OpenVMS system is part of a large network, you will probably use both PPP and SLIP for your serial connections. As an Internet standard, PPP is often preferred because it ensures interoperability between systems from a wide variety of vendors. PPP provides a way for your OpenVMS Alpha system to establish a dynamic IP network connection over a serial line without additional router or server hardware. SLIP has been in use for a longer period of time than PPP and is available for most terminal servers and in most PC implementations of TCP/IP. Because SLIP and PPP do not communicate with each other, hosts must use the same protocol in order to communicate. For example, if your terminal server supports only SLIP, remote hosts that connect through this server must also use SLIP. For more information about configuring serial lines, refer to the Compaq TCP/IP Services for OpenVMS Management guide. For More InformationFor more information about the following topics, refer to the Compaq TCP/IP Services for OpenVMS Management guide. For detailed descriptions of OpenVMS Alpha and VAX similarities and differences, refer to A Comparison of System Management on OpenVMS AXP and OpenVMS VAX. For complete information about supported devices and configurations, refer to the Guidelines for OpenVMS Cluster Configurations and the OpenVMS Cluster Software Software Product Description (SPD). For complete information about setting up and using an OpenVMS Cluster environment, refer to the OpenVMS Cluster Systems manual. The OpenVMS operating system contains a number of features that are of specific benefit to the TCP/IP environment. This chapter discusses the following topics related to these features: Things to ConsiderIn planning your TCP/IP Services for OpenVMS, consider the following: The TCP/IP Services Management Control Program is a comprehensive, easy-to-use network management tool that includes more than 100 OpenVMS commands. TCP/IP Services provides this management command interface to configure and modify parameters of components, configure customer-developed services, enable and disable running components, and monitor the running software To start the management control program, enter the following command: $ TCPIPTCPIP> At the TCPIP> prompt, you can enter commands such as the following: You can also use UNIX management commands to manage some components of TCP/IP Services. To use UNIX management commands at the DCL prompt, run the following command procedure: $ @SYS$MANAGER:TCPIP$DEFINE_COMMANDS Then enter UNIX commands as you would on a Tru64 UNIX system. TCP/IP management commands are described fully in the Compaq TCP/IP Services for OpenVMS Management Command Reference manual, and in the TCP/IP Services online help. TCPIP> HELP To exit the management control program, enter the following command: TCPIP> EXIT To obtain information about TCP/IP Services, enter the following command at the DCL prompt: $ HELP TCPIP_SERVICES Logical names allow you to customize component behavior. Logical names can point to directories, database files, and log files. To define a logical name, enter the following DCL command: $ DEFINE logical-name For more information about these logical names, refer to the Compaq TCP/IP Services for OpenVMS Management guide. The TCPIP$CONFIG database predefines logical names for various databases. During the menu-driven installation procedure, the software configures either the components you select or all of the TCP/IP Services software components. These defaults are designed to get your system up and running as an internet host with minimal effort. TCPIP$CONFIG creates the database files. After the initial configuration of a component, you can use logical names to modify the settings of the component-specific parameters. Many logical names are defined as “existence logical names”; that is, they can be either on or off. Any value associated with them is ignored. Others require a value of text string as a definition. Every logical name has a default setting. For more information about how TCP/IP Services components uses logical names, see relevant chapters in this manual and refer to the Compaq TCP/IP Services for OpenVMS Management guide. TCP/IP Services for OpenVMS provides network-specific enhancements to the OpenVMS System Dump Analysis (SDA) tool. For more information about SDA enhancements, refer to DCL online help. If your system fails, you can run the SDA tool on system reboot to analyze the system crash dump. You can do this by adding command lines to the SYSTARTUP_VMS.COM procedure. If you are unable to analyze a process dump with the debugger, use the System Dump Analyzer (SDA) utility. Refer to the ANALYZE/CRASH command in online help for more information. For example: $ ANALYZE/CRASH billsystem.dmp OpenVMS (TM) Alpha system dump analyzer...analyzing a compressed process dump... Dump taken on 24-JUL-2002 12:03:40.95SDA> For details, refer to the OpenVMS VAX System Dump Analyzer Utility Manual and the OpenVMS Alpha System Dump Analyzer Utility Manual. You can keep log files of events, changes, and other configuration data in two ways. System messages are saved to either one of these utilities. Both are described in this section. Any terminal that is connected to the operating system can be established as an operator’s terminal if OPCOM (operator communication manager) is running. When an operator who is logged in to an account with OPER privilege enters the REPLY/ENABLE command at the designated terminal, that terminal can be used to respond to user requests and to monitor device status. Operator messages are displayed on the system console terminal unless the terminal is explicitly disabled as an operator’s terminal. To set up a terminal to receive OPCOM messages, enter the following command: $ REPLY/ENABLE Event logging can help you manage the TCP/IP Services software. By default, user-defined services do not log events, but event logging is enabled by default for all supplied services. You can configure the product to log events to the operator’s console or to a log file, or to both. Every component has a default log file. For more information about log files, refer to the Compaq TCP/IP Services for OpenVMS Management guide. To set up event logging, enter the following command: TCPIP> SET SERVICE service-name /LOG_OPTIONS=ALL For a list of all the logging options, refer to the SET SERVICE command description in the Compaq TCP/IP Services for OpenVMS Management Command Reference manual. Some product components provide additional event logging capabilities. For more information, see the relevant chapters in this manual. OpenVMS implements On-Disk Structure Level 5 (ODS-5). This structure provides the basis for creating and storing files with extended file names. The format was introduced for compatibility with other file systems, such as Windows. You can choose whether or not to convert a volume to ODS-5 on your OpenVMS Alpha systems. The ODS-5 volume structure provides the following features: These features are described in detail in the OpenVMS product documentation. ODS-5 provides enhanced file-sharing capabilities for TCP/IP Services as well as for Advanced Server for OpenVMS (or PATHWORKS for OpenVMS), DCOM, and Java™ applications. Once ODS-5 volumes are enabled, some of the new capabilities can impact certain applications or layered products as well as some areas of system management. The following sections summarize how the enabling of ODS-5 volumes can impact system management, users, and applications. RMS access to deep directories and extended file names is available only on ODS-5 volumes mounted on OpenVMS Alpha Version 7.2 systems and higher. Compaq recommends that ODS-5 volumes be enabled only on homogeneous OpenVMS Alpha clusters. If ODS-5 is enabled in a mixed-version or mixed-architecture OpenVMS Cluster, the system manager must follow special procedures and must be aware of the following specific restriction: users must access ODS-5 files and deep directories from OpenVMS Alpha systems only because these capabilities are not supported on earlier versions of the operating system. Users on OpenVMS Alpha systems can take advantage of all Extended File Specifications capabilities on ODS-5 volumes that are mounted on those systems. A user on a mixed-version or mixed-architecture OpenVMS Cluster is subject to some limitations in ODS-5 functionality. For detailed information about mixed-version or mixed-architecture support, refer to the OpenVMS product documentation. You can select ODS-5 functionality on a volume-by-volume basis. If ODS-5 volumes are not enabled on your system, all existing applications will continue to function as before. If ODS-5 volumes are enabled, be aware of the following changes:
On ODS-5 volumes, existing applications and layered products that are coded to documented interfaces, as well as most DCL command procedures, should continue to work without modification. However, applications that are coded to undocumented interfaces or that include any of the following might need to be modified to function as expected on an ODS-5 volume:
Resource sharing lets users access network printers as if they were directly connected to the user’s local systems. With resource sharing, users can access these resources directly after making the initial connection. This is different from file transfer programs in which files must be transferred completely from the remote system before they can be used. The printer-sharing components of TCP/IP Services include:
The Compaq TCP/IP Services for OpenVMS software provides network printing through LPR/LPD. The LPR/LPD service has both a client component (LPR) and a server component (LPD). LPD provides remote printing services for many client hosts, including OpenVMS, UNIX, and Windows NT client hosts. Each print queue is either local or remote. Local print queues handle inbound jobs; remote print queues handle outbound jobs for remote printers. The print setup utility (TCPIP$LPRSETUP) does the following: To print, users at an OpenVMS client enter the DCL command PRINT. Users working on UNIX clients typically enter the lpr command. To use the Compaq TCP/IP Services for OpenVMS network printer services, you need the following: Both the client component (LPR) and the server component (LPD) are partially included in an OpenVMS queue symbiont. The client is activated when you use one of the following commands The LPD server is activated when a remote user submits a print job to a printer that is configured on the OpenVMS server. The LPD server consists of the following two components:
The same LPD symbiont image is used for both client and server. It acts as the client on queues that are set up for remote printers, and it acts as the server on the local LPD queue. The LPD uses the printcap database to process print requests. The printcap database, located in SYS$SPECIFIC:[TCPIP$LPD]TCPIP$PRINTCAP.DAT, is an ASCII text file that defines the print queues. The printcap entries are similar in syntax to the entries in a UNIX /etc/printcap file. Use the printer setup program LPRSETUP to configure or modify printers. The setup program creates spool directories and log files based on the information you supply. For more information and example setup listings, refer to the Compaq TCP/IP Services for OpenVMS Management guide. For more information about the following network printing services, refer to the Compaq TCP/IP Services for OpenVMS User’s Guide: The TELNET print symbiont (TELNETSYM) provides remote printing services that enables OpenVMS printing features not available with the LPR/LPD print service. With TELNETSYM, the local OpenVMS system drives a remote printer as if it were directly connected. This is achieved by attaching a printer to a remote TCP/IP terminal server. The TELNET print symbiont has the following functions: NoteTELNET does not work with terminal servers that use only the local area transport (LAT) protocol. The terminal server must support TCP/IP. The system that originates the print jobs handles the standard print control functions, such as header-page generation, pagination, queuing, and handling of multiple forms. TELNETSYM extends the OpenVMS print symbiont by redirecting its output to a network channel. Each TELNETSYM process can control up to 16 print queues. You can control the maximum number of print queues by defining the TCPIP$TELNETSYM_STREAMS logical. For detailed information about configuring and managing TELNETSYM, refer to the Compaq TCP/IP Services for OpenVMS Management guide. A serial connection for a remote printer is made between a system and a serial line printer. Compaq TCP/IP Services for OpenVMS supports serial connections using the PPP (Point-to-Point Protocol) and SLIP (Serial Line IP), or CSLIP protocols. You can use any standard OpenVMS terminal device as a PPP or a SLIP line. If the remote system is configured as a gateway to a network, local users can also reach other systems on that network through the serial connection. For more information about serial line configurations, see Chapter 3. Because everyone on a network uses print services, make sure that network print operations are set up efficiently and cost effectively. The choices that you need to make might include the following: Determine which printers you want to make available to your server community. Some considerations regarding printers include:
A computer can act simultaneously as a print server and a file server. The decision to combine print and file servers might depend on security concerns. Although printers should always be available to their users, you might want to locate a file server in a secure place. Regardless of the size of your network, you most likely will install printers on a few select computers. The only special hardware requirement for print servers is that, if you are using parallel or serial printers, the print servers must have the correct output ports. Unlike parallel and serial devices, printers with built-in network adapter cards do not have to be adjacent to the print server. Network-interface printers are attached to the network through a built-in adapter card. The location of this type of printer has no effect on printing performance, provided that users and printers are not on opposite sides of a network bridge. A Compaq Advanced Server print server can control a virtually unlimited number of network-interface printers. The Compaq Advanced Server makes printers available to network users through print shares. In addition, you can use a generic queue when several like printers are available to the user. A generic queue can point to several execution queues and is used to distribute printer work load among several like printers by routing a print job to the first available printer through that printer's execution queue. (If you manage the shared printers from Windows NT, the Advanced Server allows you to set up a printer pool, which is similar in function to an OpenVMS generic queue.) You can use the Advanced Server ADMINISTER command line interface to add printers (as print queues) and print shares to the Advanced Server and to manage them. Alternatively, beginning with Version 7.3 of the Advanced Server for OpenVMS, you can configure the server to allow management of shared printers from Windows NT using the Windows NT print services. The default is to use the Advanced Server ADMINISTER command line interface. Each print share points to a single print queue with the same name as the share. Permissions that you assign to the share are applied automatically to the associated print queue. As with any other shared resource, a share can be accessed over the network by users who have the appropriate permissions. Four types of permissions apply to print shares: Print (the default), None (no access), Manage Documents, and Full (full control). For more information about sharing network printers, refer to the Compaq Advanced Server for OpenVMS Concepts and Planning Guide. The PC-NFS server provides authentication and print services for PCs running NFS. Users on a PC client can associate the name of the PC printer with an OpenVMS print queue and can print files to the associated queue. However, Compaq recommends that PC clients use other mechanisms for accessing OpenVMS print queues. To access the NFS server, PC users must have an entry in the proxy database and must have corresponding OpenVMS accounts on the server. For more information about configuring PC-NFS, refer to the Compaq TCP/IP Services for OpenVMS Management guide. For More InformationFor detailed information about configuring and managing TELNETSYM, LPD, and PC-NFS, refer to the Compaq TCP/IP Services for OpenVMS Management guide. For more information about network printing services, refer to the Compaq TCP/IP Services for OpenVMS User’s Guide. For more information about the management control commands and for a list of all the logging options within the SET SERVICE command, refer to the Compaq TCP/IP Services for OpenVMS Management Command Reference manual or to online help. For complete information about ODS-5 features, refer to the OpenVMS documentation set. For more information about sharing network printers, refer to the Compaq Advanced Server for OpenVMS Concepts and Planning Guide. For more information about preinstallation tasks and the step-by-step installation, refer to the Compaq TCP/IP Services for OpenVMS Installation and Configuration guide. This chapter describes key concepts for the following network server features: Things to ConsiderIn planning your TCP/IP Services for OpenVMS, consider the following: The Network Time Protocol (NTP) synchronizes time and coordinates time distribution throughout a TCP/IP network. TCP/IP Services NTP software is an implementation of the NTP Version 4 specification and maintains compatibility with NTP Versions 1, 2, and 3. Time synchronization is important in client/server computing. For example, systems that share common databases require coordinated transaction processing and timestamping of instrumental data. Synchronized timekeeping means that hosts with accurate system timestamps send time quotes to each other. Hosts running NTP can be either a time server or a time client, although they often are both a server and a client. NTP does not attempt to synchronize clocks to each other. Rather, each server attempts to synchronize to Coordinated Universal Time (UTC) using the best available source and the best available transmission paths to that source. NTP expects that the time being distributed from the root of the synchronization subnet is derived from some external source of UTC (for example, a radio clock). If your network is isolated and you cannot access other NTP servers on the internet, you can designate one of your nodes as the reference clock to which all other hosts will synchronize. Running an NTP server is optional. If you do set up an NTP server, you must decide whether it will be the authoritative server or whether you will get time from another server. In the NTP environment, time is distributed through a hierarchy of NTP time servers. Each server adopts a stratum that indicates how far away it is operating from an external source of UTC. NTP times are an offset of UTC. Stratum 1 servers have access to an external time source, usually a radio clock. A stratum 2 server is one that is currently obtaining time from a stratum 1 server; a stratum 3 server gets its time from a stratum 2 server, and so on. To avoid long-lived synchronization loops, the number of strata is limited to 15. Stratum 2 (and higher) hosts might be company or campus servers that obtain time from some number of primary servers and provide time to many local clients. In general: Internet time servers are usually stratum 1 servers. Other hosts connected to an internet time server have stratum numbers of 2 or higher and may act as time servers for other hosts on the network. Clients usually choose one of the lowest accessible stratum servers from which to synchronize. The OpenVMS system clock is maintained as a software timer with a resolution of 100 nanoseconds, updated at 10-millisecond intervals. A clock update is triggered when a register, loaded with a predefined value, has decremented to zero. Upon reaching zero, an interrupt is triggered that reloads the register, and repeats the process. The smaller the value loaded into this register, the more quickly it reaches zero and triggers an update. In such an instance, the clock runs more quickly. A larger value means more time between updates; therefore, the clock runs more slowly. The amount of time between clock updates is known as a clock tick. Once NTP has selected a suitable synchronization source, NTP compares the source’s time with that of the local clock. If NTP determines that the local clock is running ahead of or behind the synchronization source, NTP uses a general drift mechanism to slow down or speed up the clock as needed. NTP accomplishes this by issuing a series of new clock ticks. For example, if NTP detects that the local clock is drifting ahead by +0.1884338 second, it issues a series of new ticks to reduce the difference between the synchronization source and the local clock. If the local system time is not reasonably correct, NTP does not set the local clock. For example, if the new time is more than 1000 seconds off in either direction, NTP does not set the clock. In this case, NTP logs the error and shuts down. NTP maintains a record of the resets it makes along with informational messages in the NTP log file, TCPIP$NTP_RUN.LOG. For more details about event logging and for help interpreting an NTP log file, refer to the Compaq TCP/IP Services for OpenVMS Management guide. Fore information regarding operating system and daylight saving time issues, refer to the OpenVMS documentation set. As the system manager of the local host, you determine which network hosts to use for synchronization and for populating an NTP configuration file with a list of the participating hosts. You can configure NTP hosts in one or more of the following modes:
For information about additional modes, refer to the TCP/IP Services release notes. Your system might be using the Distributed Time Synchronization Service (DTSS). DTSS is provided as an option with DECnet-Plus and the Distributed Computing Environment (DCE). If you are using DTSS, you must use the procedures supplied with DTSS to set time zone information. If you are running Version 7.3 or later, you can disable DTSS in favor of running NTP. Define the logical name NET$DISABLE_DTSS to keep DECnet-Plus DECdts from starting. Routing is the act of forwarding datagrams based on information stored in a routing table. Routing allows traffic from your local network to reach its destination elsewhere on the internet. Hosts and gateways on a network use routing protocols to exchange and store routing information. If the hosts on your network need to communicate with computers on other networks, a route through a gateway must be defined. All hosts and gateways on a network store information about routes in routing tables. With TCP/IP Services, routing tables are maintained on the disk and in dynamic memory. The TCP/IP Services product provides two types of routing. You can define routes manually (static routing), or you can enable routing protocols that exchange information and build routing tables based on the exchanged information (dynamic routing). Because static routing requires manual configuration, it is most useful when the number of gateways is limited and when routes do not change frequently. For information about manually configuring routing, refer to the Compaq TCP/IP Services for OpenVMS Management guide. Complex environments require a more flexible approach to routing than a static routing table provides. Routing protocols distribute information that reflect changing network conditions and update the routing table accordingly. Routing protocols can switch to a backup route when a primary route becomes unavailable, and can determine the best route to a given destination. Dynamic routing tables use information that is received by means of routing protocol updates; when routes change, the routing protocol provides information about the changes. Routing daemons implement a routing policy, that is, a set of rules that specify which routes go into the routing table. A routing daemon writes routing messages to a routing socket, which causes the kernel to add a new route or delete , or modify, an existing route. The kernel also generates routing messages that can be read by any routing socket when events occur that might be of interest to the process (for example, the interface has gone down or a redirect has been received). TCP/IP Services implements two routing daemons: the Routing Daemon (ROUTED) and the Gateway Routing Daemon (GATED). The following sections provide more information about these daemons. Routing Daemon (ROUTED)The ROUTED daemon (pronounced “route-dee”) supports the Routing Information Protocol (RIP). When ROUTED starts, it issues routing update requests and then listens for responses. A system that is configured to supply RIP information responds to the request with an update packet. The update packet contains destination addresses and routing metrics associated with each destination. After receiving a RIP update, the ROUTED uses the information to update its routing table. For details about how to configure dynamic routing with ROUTED, refer to the Compaq TCP/IP Services for OpenVMS Management guide. NoteROUTED supports Routing Information Protocol (RIP) V1 only. ROUTED is considered older technology, and many system administrators are replacing it with GATED. Gateway Routing Daemon (GATED)The GATED daemon (pronounced “gate-dee”) supports interior and exterior gateway protocols. It obtains information from several routing protocols and selects the best routes based on that information. You can configure GATED to use one or more of the protocols described in Table 5–1. Table 5.1. GATED Protocols and RFCs
NoteThe list in Table 5–1 is continually updated. For the latest details, refer to the Compaq TCP/IP Services for OpenVMS Software Product Description (SPD 46.46.xx). The routing protocols described in Table 5–1 are configured in the GATED configuration file, TCPIP$GATED.CONF. This file contains statements that control tracing options, select routing protocols, manage routing information, and manage independent system routing. Under GATED, load balancing provides for identical routes based on the reference count and use count (you can observe this through netstat -r). GATED chooses from among identical routes the one with the lowest reference count. If there is more than one lowest reference count, it uses the lowest use count. Although ROUTED allows multiple default routes, it does not monitor interface states. Conversely, GATED monitors interface status changes; however, it does not allow multiple default routes. For information about configuring dynamic routing with GATED, refer to the Compaq TCP/IP Services for OpenVMS Management guide. Dynamic Host Configuration Protocol (DHCP), a superset of the Bootstrap Protocol (BOOTP), provides a centralized approach to the configuration and maintenance of IP address space. DHCP allows system managers to configure various clients on a network from a single location. DHCP allocates temporary or permanent IP addresses from an address pool to client hosts on the network. DHCP can also configure client parameters (such as default gateway parameter), domain name server (DNS) parameters, and subnet masks for each host running a DHCP client. With DHCP, system managers can centralize TCP/IP network configurations and management tasks involved with network connections. DHCP makes network administration easier by allowing:
NoteAn OpenVMS system running TCP/IP Services can be configured as either a DHCP server or a client, but not as both. Moreover, do not attempt to configure both BOOTP and DHCP; if you do, the configuration generates a warning message. In addition, the TCP/IP Services implementation of DHCP includes support for DHCP server failover in an OpenVMS Cluster environment. For more information about the OpenVMS Cluster environment, refer to Chapter 3. As a superset of BOOTP functionality, DHCP offers robust configuration services, including IP addresses, subnet masks, and default gateways. DHCP is built on the client/server model in the following respects: DHCP consists of two components: The server and client communicate to accomplish the following steps:
During the lifetime of the lease, the client repeatedly asks the server to renew. If the client does not renew it, the lease expires. Once the lease expires, the IP address can be recycled and given to another client. When the client reboots, it can be given the old address, if available, or it can be assigned a new address. For more information about how DHCP operates, refer to RFC 2131 and RFC 1534. With TCP/IP Services, DHCP uses dynamic and static IP address-mapping methods. Table 5–2 describes the allocation methods that service DHCP and BOOTP-only client requests. Table 5.2. DHCP IP Address Allocation Methods
The typical network uses a combination of static and dynamic DHCP addressing. As the local system manager or network administrator, you must decide which IP addressing methods are appropriate for your specific policies and environment. For detailed information about configuring the different types of addressing for clients on your network, refer to the Compaq TCP/IP Services for OpenVMS Management guide. From the client’s perspective, DHCP is an extension of the BOOTP functionality. DHCP allows existing BOOTP clients to operate with DHCP servers without having to change the client’s initialization software. Based on the format of BOOTP messages, the DHCP message format does the following: Messages that include a DHCP message-type option are assumed to have been sent by a DHCP client. Messages without the DHCP message-type option are assumed to have been sent by a BOOTP client. DHCP improves the BOOTP-only functionality in the following ways: With BOOTP, a client is identified by its unique media access control (MAC) address, which is associated with the network adapter card. DHCP uses a client identifier (ID) to uniquely identify the client and to associate it with a lease. The client creates the client ID from one of the following types of addresses: If the client does not include a client ID in the request, the server uses the client’s MAC address. TCP/IP Services includes the following components enable users to transfer data files between local and remote hosts: FTP is a TCP/IP standard, high-level protocol used to transfer files bidirectionally. FTP enables users to access files interactively, list directories on a remote host, delete and rename files on the remote host, and transfer files between hosts. FTP also provides authentication control, which requires users or clients to correctly enter a login name and password to the server before requesting file transfers. The server can refuse access if login and password combinations are invalid. FTP allows users who do not have a login name or a password to access certain files on a system using an anonymous login name. This functionality is called Anonymous FTP and might include one or more of the following restrictions:
For more information about setting up FTP, refer to the Compaq TCP/IP Services for OpenVMS Management guide. TFTP provides a simple, unsophisticated file transfer service. It is intended for applications that do not need complex interactions between a client and server. TFTP can be hardcoded in read-only memory to execute a network bootstrap program. Once it begins execution, TFTP allows the bootstrap program to use the same underlying protocols that the operating system uses. This makes it possible for one host to boot from a server on another physical network. TCP/IP Services supports downloading of system images and other types of information for client hosts with TFTP. TFTP transfers files from a TFTP server to diskless clients or other remote systems. The client initiates the file transfer. If the client sends a read request to the TFTP server, the server attempts to locate this file. TFTP has the following characteristics: For information about how to set up TFTP, refer to the Compaq TCP/IP Services for OpenVMS Installation and Configuration manual. The TCP/IP Services software includes client and server implementations of the Berkeley Remote (R) command applications. These applications provide users with the following capabilities: In addition to password authentication, the R commands use a system based on trusted hosts and users. Trusted users on trusted hosts are allowed to access the local system without providing a password. Trusted hosts are also called equivalent hosts because the software assumes that users who have access to a remote host should be given equivalent access to the local host. The system assumes that user accounts with the same name on both hosts are ‘‘owned’’ by the same user. For example, the user logged in as BETHANY on a trusted system is granted the same access as a user logged in as BETHANY on the local system. This authentication system requires databases that define the trusted hosts and the trusted users. On UNIX systems, these databases are: On OpenVMS hosts, the proxy database TCPIP$PROXY.DAT defines trusted hosts and trusted users for the entire system. Each of these topics is covered in detail in the Compaq TCP/IP Services for OpenVMS Management guide. Unlike FTP, the RCP protocol provides no method of transferring file type information between the sender and the recipient. It transfers only length, a modified and created timestamp, protection mode, and the byte stream of file data. As a result, RCP is unable to determine the file type of a file it receives. To revert the file type to a usable format in transfers between OpenVMS systems, if the original file is fixed length or undefined, you can change the attributes on the Stream_LF copy to correspond to the format of the original file. To do so, enter the DCL command SET FILE in the following format: SET FILE/ATTR=(file-attribute[,...]) For example, the following command transfers an OpenVMS executable image file (with a fixed record length of 512-bytes, and makes the file executable again. $ SET FILE/ATTR=(rfm:fix, lrl:512) rcp-copied-file.exe You can also use a logical name to change the behavior set by the options. Although RCP uses secure authentication for security, it has file size limitations that FTP does not have. FTP has no security; passwords are sent in ASCII. RCP sends only the length of the file (in ASCII format). OpenVMS interprets this length as a signed 32-bit integer. Therefore, files transferred using RCP must no more than (2 GB -1) bytes (0x7FFFFFF=2147483647 bytes or roughly 1 byte less than 4194304 RMS 512 byte blocks). The Simple Network Management Protocol (SNMP) is network management technology that facilitates the management of a TCP/IP network or internet in a vendor-independent manner. SNMP enables a network administrator to manage the various network components using a set of well-known procedures understood by all components, regardless of the original manufacturers. Configuring SNMP on your OpenVMS system allows a remote SNMP management client to obtain information about your host and to set system and network parameters. Systems using SNMP fall into two categories: The management console is the system that issues a query; the agents run on the system being queried. Queries are sent and received in the form of protocol data units (PDUs) inside SNMP messages, which are carried in user data protocol (UDP) datagrams. You can configure your host so that an SNMP client can obtain information about your host and perform updates on your host’s management information base (MIB) data items. For example, you can configure your host to: Table 5–3 describes the SNMP components and the sample code supplied for custom subagent development.
If the proxy setup between the SNMP server and the NFS server is not correct, the host resources MIB subagent cannot access data that has been mounted. To ensure access to mounted data, set up a proxy to an anonymous user (for example, to TCPIP$NOBODY) on the NFS server system. For more information about adding proxy entries, refer to the Compaq TCP/IP Services for OpenVMS Management guide. For More InformationFor detailed information about the following topics, refer to the Compaq TCP/IP Services for OpenVMS Management guide: For more information about NTP OpenVMS issues, visit the OpenVMS FAQ web site at: http://www.openvms.compaq.com/wizard/ Search on keyword NTP. For information about NTP time settings, refer to the OpenVMS System Manager's Manual. Mail Services are an extremely important part of TCP/IP Services. Everyone who uses the network — from administrators, to programmers, to users accesses — this service on a regular basis. This chapter describes Post Office Protocol (POP), SMTP, and IMAP. Things to ConsiderIn planning your TCP/IP Services for OpenVMS mail services, consider the following:
The Compaq TCP/IP Services for OpenVMS Post Office Protocol (POP) server and the SMTP server work together to provide a reliable mail service. POP is a mail repository used primarily by PCs to ensure that mail is accepted even when the PC is turned off. With POP, the PC user need not be concerned with configuring the system as an SMTP server. The user logs on to the client system’s mail application, and the POP server forwards any new mail messages from the OpenVMS NEWMAIL folder to the PC. The POP server is an OpenVMS implementation of the Post Office Protocol, Version 3 (RFC 1725) and is based on the Indiana University POP server (IUPOP3). The POP server is assigned port 110, and all POP client connections are made to this port. The POP server is installed with SYSPRV and BYPASS privileges and runs in the TCPIP$POP account, which receives the correct quotas from the TCPIP$CONFIG procedure. The POP server is invoked by the auxiliary server. TCP/IP Services implements the UNIX internet daemon inetd function, through the security and event logging of the auxiliary server process. The auxiliary server simplifies application writing and manages overhead by reducing simultaneous server processes on the system. In addition, the auxiliary server does the following: The POP server uses security features provided in the protocol and in the OpenVMS operating system, as well as additional security measures. These methods provide a secure process that minimizes the possibility of inappropriate access to a user’s mail file on the served system. You can modify the POP server default characteristics, and you can implement new characteristics by defining logical names described in the Compaq TCP/IP Services for OpenVMS Management guide. To access mail messages from the POP server, you configure a user name and password or the POP shared secret-password string, into your client mail application. Your client system opens the TCP connection and attempts to access the server by entering applicable POP commands such as USER (user name) and PASS (password), or APOP (shared secret password). In addition, POP supports the UID command, which some POP clients use, in which the UID (user identification) that POP creates for each mail message is a concatenation of the user name and the date of arrival. By default, the POP server reads mail from the user’s OpenVMS NEWMAIL folder. If you do not instruct the POP server to delete the mail, the server either moves the mail to the MAIL folder (if the logical name TCPIP$POP_USE_MAIL_FOLDER is defined) or keeps it in the NEWMAIL folder (if the logical name TCPIP$POP_LEAVE_IN_NEWMAIL is defined). These logical names are described in the Compaq TCP/IP Services for OpenVMS Management guide. POP contains minimal support for mail messages that contain foreign formats. Such messages are usually binary and therefore are not transferred to the POP client. Instead, the POP server transfers the message headers, along with a brief message instructing the user to log in and extract the foreign message into a file. Foreign messages are moved into your OpenVMS MAIL folder; the POP server then never deletes. Table 6–1 describes the methods the POP server process uses to authorize user access. Table 6.1. POP User Authorization Methods Mail message headers sent by the POP server must conform to the standard specified for SMTP in RFC 822. Because many of the messages received on an OpenVMS system are not in SMTP format (for example, DECnet mail or mail from another message transport system), the POP server builds a new set of headers for each message based on the OpenVMS message headers. Table 6–2 describes POP headers on forwarded mail messages. Table 6.2. Forwarded POP Mail Messages Header
How POP Rebuilds the OpenVMS Mail From: FieldThe most important message header is the From: header because it can be used as a destination address if a reply is requested from the POP client. Therefore, the POP server rebuilds the OpenVMS Mail From: field in compliance with RFC 822 before sending the header to the POP client. Table 6–3 describes the types of addresses that can appear in the OpenVMS Mail From: field. |
Table 6.3. OpenVMS Address Types
Address Type | Address Format |
---|---|
SMTP | SMTP%legal-address, where legal-address is an address that is compliant with RFC 822 and is commonly in the user@domain format. |
DECnet | node::username |
User name | username |
DECnet address within quotation marks | node::"user@host" |
Cluster-forwarding SMTP address | node::SMTP%";user@domain" |
A host name is local if one of the following is true:
Some POP client systems are confused by the use of personal names when you attempt to reply to a mail message or when the name contains commas or other special characters. If you define the TCPIP$POP_PERSONAL_NAME logical name described in the Compaq TCP/IP Services for OpenVMS Management guide, make sure you test the configuration carefully with your POP client systems.
If the logical name TCPIP$POP_IGNORE_MAIL11_HEADERS is defined and the address is an SMTP address, the rebuilt From: field is not displayed to the user. In this case, the POP server sends the actual headers from the body of the mail as the mail headers.
To be reliable, electronic mail systems must be able to cope with situations in which the recipient is temporarily unavailable; for example, if the recipient’s host is down or off line. Mail must also be able to handle situations in which some of the recipients on a distribution list are available and some are not.
Simple Mail Transfer Protocol (SMTP) is the TCP/IP standard protocol for transferring electronic mail messages from one system to another. SMTP specifies how systems interact and the format of the mail messages they exchange. The Compaq TCP/IP Services SMTP implementation uses the OpenVMS Mail utility. The OpenVMS Mail utility automatically recognizes an SMTP host address. For example:
MAIL> SEND
To: jones@widgets.com
In most implementations, SMTP servers listen at port 25 for client requests. In the TCP/IP Services implementation of SMTP, the SMTP receiver is invoked by the auxiliary server when an inbound TCP/IP connect arrives at port 25 (if the SMTP service is enabled). The auxiliary server runs the command procedure specified in the SMTP service database entry that runs the receiver. The receiver image is SYS$SYSTEM:TCPIP$SMTP_RECEIVER.EXE. The receiver process runs in the TCPIP$SMTP account.
The SMTP symbiont processes all mail on the host. It receives jobs one at a time from the generic SMTP queue and delivers them either locally by means of OpenVMS Mail or remotely by means of SMTP.
After receiving a client request, the SMTP server responds, indicating its status (available or not available). If the server is available, it starts an exchange of control messages with the client to relay mail. (Like FTP, SMTP does not define a message format. SMTP commands are sent as ASCII text, and the SMTP server at the remote host parses the incoming message to extract the command.)
The following steps occur:
The auxiliary server listens for requests, starts the SMTP receiver, and accepts the TCP connection.
The client identifies itself by sending its fully qualified domain name.
The server replies with its own fully qualified domain name.
The client sends the full e-mail address of the sender enclosed in angle brackets; if the server is able to accept the mail, it returns a readiness code.
The client sends the full mail address (also enclosed in angle brackets) of the message’s intended recipient.
The client sends the body of the message. A minimum of five control message commands are required to conduct steps 1 through 5.
Table 6.4. SMTP Client Commands
Command | Description |
---|---|
HELLO | Identifies the originating host to the server host. Use the /DOMAIN qualifier to provide the name of the originating host. |
MAIL FROM:<reverse-path> | Identifies the address at which undeliverable mail should be returned. Usually is the originating host. |
RCPT TO:<forward-path> | Address of the intended receiver. If sending mail to multiple recipients, use one RCPT TO command for each recipient. |
DATA | Signals the end of the RCPT TO commands and tells the recipient to prepare to receive the message. |
QUIT | Signals the end of the RCPT TO commands and tells the recipient to prepare to receive the message. |
The configuration procedure TCPIP$CONFIG sets up the SMTP queues for you. For more information about configuring SMTP, refer to the Compaq TCP/IP Services for OpenVMS Management guide.
IMAP is the Internet Message Access Protocol. The IMAP Server allows users to access their OpenVMS Mail mailboxes by clients communicating with the IMAP4 protocol as defined in RFC 2060. The supported clients used to access e-mail are PC clients running Microsoft Outlook or Netscape Communicator.
By default, the IMAP Server is assigned port number 143. All IMAP clients connect to this port.
The following sections review the IMAP process and describe how the TCP/IP Services software implements IMAP. If you are not familiar with IMAP, refer to RFC 2060 or introductory IMAP documentation for more information.
The IMAP Server is installed with SYSPRV, BYPASS, DETACH, SYSLCK, SYSNAM, NETMBX, and TMPMBX privileges. It runs in the TCPIP$IMAP account, which receives the correct quotas from the TCPIP$CONFIG procedure. The IMAP Server is invoked by the auxiliary server.
The IMAP Server uses security features provided in the protocol and in the OpenVMS operating system, as well as additional security measures. These methods provide a secure process that minimizes the possibility of inappropriate access to a user's mail file on the served system.
You can modify the IMAP Server default characteristics and implement new characteristics by defining the configuration options described in the TCP/IP Services release notes.
OpenVMS Mail folders are presented to the IMAP client as IMAP mailboxes. All mailboxes are presented to the client in lowercase characters, beginning with an initial capital letter, and with capital letters following each space, at sign (@), opening parenthesis ( "(" ), underscore (_), and hyphen (-).
The OpenVMS NEWMAIL folder requires special treatment . Because the IMAP protocol requires a top-level mailbox called Inbox, the NEWMAIL folder is mapped to Inbox. When the user opens the mailbox called Mail (which maps to file MAIL.MAI), the NEWMAIL folder is not listed so that the user is not confused by seeing the same folder listed twice.
OpenVMS Mail folder names are usually in all uppercase characters but can contain lowercase characters. Any lowercase characters are mapped to an underscore (_ ) followed by the character's uppercase equivalent. Underscores are mapped to double underscores (_ _), and dollar signs are mapped to double dollar signs ($$).
Table 6–5 shows the effects of folder-name mapping.
Table 6.5. OpenVMS Mail Folder-Name Mapping
OpenVMS Mail Folder Name | IMAP Mailbox Name |
---|---|
HELLO | Hello |
Hello | H_e_l_l_o |
HELLO-ALL | Hello-All |
HELLO_ALL | Hello_ _All |
HELLO$ALL | Hello$$All |
The IMAP Server determines the correct format for common file types. It does this by checking the beginning of the file for a recognizable file header that matches a set contained in the configuration file TCPIP$IMAP_HOME:TCPIP$IMAP_MAGIC.TXT (analogous to the magic files found on UNIX systems). If a matching file header is found, the server can let the client know the MIME type and subtype of the file.
Mail message headers sent by the IMAP Server must conform to the standard specified in RFC 822. Because many of the messages received on an OpenVMS system are not in the RFC 822, or Internet, format (for example, DECnet mail or mail from another message transport system), the IMAP Server builds a new set of headers for each message that is not RFC 822 format and that is based on the OpenVMS message headers.
Table 6–6 describes the headers on mail messages that are forwarded by the IMAP Server.
Table 6.6. IMAP Server Forwarded Message Headers
IMAP Message Header | Obtained From |
---|---|
Date: | Arrival date of message. Changed to Internet format, which shows the day of the week, the date, the time, and the time zone offset from Greenwich Mean Time (GMT). An example of the format is Wed, 30 May 01 16:19:53 +0100. |
From: | OpenVMS message From: field. Rebuilt to ensure RFC 822 compatibility. |
To: | OpenVMS Mail To: field. Rebuilt to ensure RFC 822 compatibility. |
CC: | OpenVMS Mail CC: field. Rebuilt to ensure RFC 822 compatibility. |
Subject: | OpenVMS Mail Subj: field. Accented characters are RFC 2047 encoded, but the change is not visible to users because IMAP clients reverse the encoding. |
X-VMS-From: | OpenVMS Mail From: field. Not rebuilt. |
X-IMAP4-Server: | Server host name and IMAP version information. Sent only if configuration option Send-ID-Headers is set to True. |
X-IMAP4-ID: | Message UID. Sent only if configuration option Send-ID-Headers is set to True. |
The IMAP Server sends these message headers to the IMAP Client unless both of the following conditions are true:
It is important for the IMAP Server to rebuild the From: header, because this header can be used as a destination address if a reply is requested from the IMAP client. The same is true for To: and CC: headers if the user requests that a reply be sent to other listed recipients. Therefore, the IMAP Server rebuilds these fields in compliance with RFC 822 before sending the header to the IMAP Client.
Table 6–7 describes the different types of addresses that can appear in the OpenVMS Mail address fields.
Table 6.7. Various Address Types
Address Type | Address Format |
---|---|
SMTP | SMTP%"legal-address", where legal-address is an address that is compliant with RFC 822 and is commonly in the format user@domain. |
DECnet | node::username |
User name | username |
DECnet | address node::"user@host" |
Cluster forwarding | node::SMTP%"user@domain" SMTP_address |
A host name is local if one of the following conditions is true:
Some IMAP client systems are confused by the use of personal names when you attempt to reply to a mail message or when the name contains commas or other special characters. If you define the configuration option Personal-Name described in the Compaq TCP/IP Services for OpenVMS Management guide, make sure you test the configuration carefully with your IMAP Client systems before going live to ensure that message replies work successfully.
For detailed information about the following topics, refer to the Compaq TCP/IP Services for OpenVMS Management guide:
For more information about the TCP/IP management commands, refer to the Compaq TCP/IP Services for OpenVMS Management Commands Reference manual.
For more information about IMAP modifications, commands, and configurations, refer to the TCP/IP Services release notes.
For more information about creating the shared secret string using the APOP authorization method, see the Compaq TCP/IP Services for OpenVMS User's guide.
For more information about the SET MX_RECORDS command, see the Compaq TCP/IP Services for OpenVMS Management Command Reference guide.
Compaq TCP/IP Services provides several ways to connect to the network. This chapter discusses the following connectivity methods:
In planning your TCP/IP Services for OpenVMS configuration, consider the following:
TELNET is a standard protocol that provides remote terminal connection or login service. TELNET enables users at one site to interact with a remote system at another site, as if the user terminals were connected directly to the remote system. The Compaq TCP/IP Services for OpenVMS product implements TELNET to provide:
For more information about managing TELNET, refer to the Compaq TCP/IP Services for OpenVMS Management guide. For more information about using TELNET, refer to the Compaq TCP/IP Services for OpenVMS User’s Guide.
At the Network Interface layer, standard encapsulation of IP packets are defined for the various hardware types. For example, Ethernet uses the Ethernet frame standard to enclose the data being sent with header fields. Serial line connections use either the Serial Line Internet Protocol (SLIP or CSLIP) or the Point-to-Point Protocol (PPP) (Alpha only).
Every network interface must have its own unique IP address. Interfaces cannot share IP addresses.
If you configure PPP interfaces for multiple remote hosts, the remote hosts can obtain their individual IP addresses from your host when they connect. Similarly, you can configure a PPP interface on your system without knowing your own IP address, and you can obtain the IP address when you connect to a remote system.
Before you establish SLIP communication with a remote host, however, you must obtain the IP address for the host’s serial interface and assign IP addresses for each interface you configure on the local host.
When using SLIP, consider placing each serial line in a separate subnetwork. You accomplish this by assigning the same subnet mask for the interfaces at either end of the link.
If you need to use an address in the same subnetwork as your site LAN, use the proxy Address Resolution Protocol (ARP) feature. For more information about ARP, refer to the Compaq TCP/IP Services for OpenVMS Management guide.
SLIP sends a datagram across the serial line as a series of bytes. Table 7–1 shows how SLIP uses the following characters to determine when a series of bytes should be grouped together.
Character | Function | Hexadecimal Value | Decimal Value |
---|---|---|---|
END | Marks the end of the datagram. When the receiving SLIP encounters the END character, SLIP knows that it has a complete datagram. | C0 | 192 |
ESC | Indicates the end of the SLIP control characters. | DB | 219 |
There is neither a standard SLIP specification nor a defined maximum packet size for SLIP. The TCP/IP Services implementation of SLIP accepts 1006-byte datagrams and does not send more than 1006 bytes in a datagram.
Compressed SLIP provides header compression that is beneficial for small packets and for low-speed serial links. Header compression improves packet throughput. You can enable CSLIP by using the /COMPRESS qualifier when you enter the SET INTERFACE command.
PPP uses a frame format that includes a protocol field. The protocol field identifies the protocol (for example, IP, DECnet, or OSI) to be used for communication between the two hosts. The PPP defines the network frame in a 5-byte header and 3-byte trailer. A PPP frame starts and ends with the control byte 7E hexadecimal (126 decimal). The address and control bytes are constant. The 2-byte protocol field indicates the contents of the PPP frame.
The Network File System (NFS) server software lets you set up file systems on your OpenVMS host for export to users on remote NFS client hosts. These files and directories appear to the remote user to be on the remote host even though they physically reside on the local system.
After the NFS server is installed on your computer, you must configure the server to allow network file access.
NFS software was originally developed and used on UNIX machines. For this reason, NFS implementations use UNIX conventions and characteristics. The rules and conventions that apply to UNIX files, file types, file names, file ownership, and user identification also apply to NFS.
Because the TCP/IP Services product runs on OpenVMS, the NFS software must accommodate the differences between UNIX and OpenVMS file systems, for example, by converting file names and mapping file ownership information. You must understand these differences to configure NFS properly on your system, to select the correct file system for the application, and to ensure that your file systems are adequately protected while granting access to users on remote hosts.
NFS is a client/server environment that allows computers to share disk space and allows users to work with their files from multiple computers without copying them to their local system. The NFS server can make any of its file systems available to the network by exporting the files and directories. Users on authorized client hosts access the files by mounting the exported files and directories. The NFS client systems accessing your server might be running UNIX, OpenVMS, or other operating systems.
The NFS client identifies each file system by the name of its mount point on the server. The mount point is the name of the device or directory at the top of the file system hierarchy that you create on the server. An NFS device is always named DNFSn. The NFS client makes file operation requests by contacting your NFS server. The server then performs the requested operation.
The OpenVMS system includes a hierarchy of devices, directories and files stored on a Files–11 On-Disk Structure Level 2 (ODS-2) or Level 5 (ODS-5) formatted disk. OpenVMS and ODS-2 define a set of rules that govern files within the OpenVMS file system. These rules define the way that files are named and catalogued within directories.
If you are not familiar with OpenVMS file systems, refer to the OpenVMS System Manager’s Manual: Essentials to learn how to set up and initialize a Files–11 disk.
You can set up and export two different kinds of file systems: a traditional OpenVMS file system or a UNIX style file system built on top of an OpenVMS file system. This UNIX style file system is called a container file system.
Each file system is a multilevel directory hierarchy: on OpenVMS systems, the top level of the directory structure is the master file directory (MFD). The MFD is always named [000000] and contains all the top-level directories and reserved system files. On UNIX systems or with a container file system, the top-level directory is called the root.
For information about container file systems and about selecting a file system, refer to Chapter 2.
Once a disk on the OpenVMS system is mapped to a pathname, the MFD or any directory below it can be exported. The server uses the following database files to grant access to users on client hosts:
The export database, TCPIP$EXPORT.DAT, is a collection of entries that store information about the file systems you want to make available to users on client hosts.
Each entry specifies a directory on the local system and one or more remote hosts that are allowed to mount that directory. A user on a client host can mount any directory at or below the export point, as long as OpenVMS allows access to the directory. Exporting specific directories to specific hosts provides more control than exporting the root of a file system (or the MFD in an OpenVMS system) to all hosts.
The proxy database, TCPIP$PROXY.DAT, is a collection of entries that register the identities of users on client hosts. To access file systems on your local server, remote users must have valid accounts on your OpenVMS host.
The proxy entries map each user’s remote identity to a corresponding identity associated with each user’s OpenVMS account. When a user on the client host initiates a file access request, the server checks the proxy database before granting or denying the user access to the file.
These database files are created by TCPIP$CONFIG and can be shared by all OpenVMS Cluster nodes running TCP/IP Services. To control access to these database files, set the OpenVMS file protections accordingly. By default, world access is denied.
For more information about how to create these database files on your server, refer to the Compaq TCP/IP Services for OpenVMS Management guide.
Both OpenVMS and UNIX systems use identification codes as a general method of resource protection and access control. Just as OpenVMS employs user names and UICs for identification, UNIX identifies users with a user name and a user identifier (UID) and one or more group identifiers (GIDs). Both UIDs and UICs identify users on a system.
The proxy database contains entries for each user who accesses a file system on your local server. Each entry contains the OpenVMS user name, the UID/GID pair that identifies the user’s account on the client system, and the name of the client host. This file is loaded into dynamic memory when the server starts.
When a user on the OpenVMS client host requests access to a file, the client searches its proxy database for an entry that maps the requester’s identity to a corresponding UID/GID pair. (Proxy lookup is performed only on OpenVMS servers; UNIX clients already know the user by its UID/GID pair.) If the client finds a match, it sends a message to the server that contains the following:
The server searches its proxy database for an entry that corresponds to the requester’s UID/GID pair. If the UID maps to an OpenVMS account, the server grants access to the file system according to the privileges set for that account. In the following example, the proxy entry maps a client user with UID=15/GID=15, to the OpenVMS account named ACCOUNT2. Any files owned by user ACCOUNT2 are deemed also to be owned by user UID=15 and GID=15.
After the OpenVMS identity is resolved, the NFS server uses this acquired identity for all data access, as described in the Compaq TCP/IP Services for OpenVMS Management guide.
TCP/IP Services provides authentication services to PC-NFS clients by means of PC-NFS. As with any NFS client, users must have a valid account on the NFS server host, and user identities must be registered in the proxy database.
Because PC operating systems do not identify users with UID/GID pairs, these pairs must be assigned to users. PC-NFS assigns UID/GID pairs based on information you supply in the proxy database. The following describes this assignment sequence:
The PC client sends a request for its UID/GID pair. This request includes the PC’s host name with an encoded representation of the user name and password.
PC-NFS responds by searching the proxy database and SYSUAF for a matching entry and by checking the password. If a matching entry is located, PC-NFS returns the UID/GID pair to the PC client. The PC stores the UID/GID pair for later NFS requests.
If PC-NFS does not find an entry for the PC client in the proxy database, it maps the PC client to the default user TCPIP$NOBODY account. In this case, the client may abort the mount attempt. If the client does complete the mount, restricted access may be granted based on privileges established for the default user account.
For more discussion about the default user, refer to the Compaq TCP/IP Services for OpenVMS Management guide.
The X Window System, developed at the Massachusetts Institute of Technology, is a network-based graphics window system based on the client/server application model. The X protocol, through which the client and server communicate, runs on UNIX domain sockets, TCP/IP, or DECnet. This means that an X display on one system can display information output from an application running on another system in the network.
An X display is a graphic output device that is known by the X Display Manager (XDM). These devices can include:
The X Display Manager (XDM) is an X client that manages the login process of a user’s X window session. XDM is responsible for displaying a login screen on a display specified by an X server, establishing an X window session, and running scripts that start other X clients. When the user logs out of the X session, XDM is responsible for closing all connections and for resetting the terminal for the next user session.
An earlier version of XDM had limitations that were resolved with the introduction of the XDM Control Protocol (XDMCP). Before XDMCP, XDM used the XSERVERS file to keep track of the X terminals for which it managed the login process. At startup, XDM initialized all X terminals listed in the XSERVERS file. If the X terminal was turned off and then turned on again, XDM had no way of knowing that a new login process should be initiated at the X terminal. To reinitialize the X terminal, the XDM process had to be restarted. XDMCP solves this problem.
With XDMCP, XDM can listen for management requests from X terminals as well as use the XSERVERS file for the X terminals that were not XDMCP compatible. (Most X terminals today are XDMCP compatible.)
The TCP/IP Services implementation of XDM is based on the X11R6.1 release from X Consortium.
TCP/IP Services software includes the PATHWORKS Internet Protocol (PWIP) driver and the PWIP ancillary control process (PWIP_ACP). The PWIP driver allows OpenVMS systems that are running DECnet over TCP/IP, which is included with the DECnet-Plus for OpenVMS Version 6.0 and later software.
In a multiprotocol networking environment, DECnet-Plus enables OSI and DECnet applications to run over an IP network backbone. The OSI over TCP/IP (using RFC 1006) software enables OSI applications such as FTAM, Virtual Terminal, and X.400 to run over TCP/IP. The DECnet over TCP/IP (using RFC 1859) feature allows traditional DECnet applications to run over TCP/IP. Examples of traditional DECnet applications are mail, cterm, and fal.
With RFC 1006 and RFC 1859, OSI and DECnet applications can accept IP names and addresses. These names and addresses are translated by BIND servers. The DECnet and OSI applications include those supplied by Compaq, third-party applications, and user-written applications.
RFC 1006 is a standard of the Internet community. It defines how to implement ISO 8073 Class 0 on top of TCP. Hosts that implement RFC 1006 are expected to listen on TCP port 102.
DECnet over TCP/IP uses RFC 1859, which defines how to implement ISO 8073, Transport Class 2 Non-Use of Explicit Flow Control on Top of TCP (RFC 1006 Extension). Hosts that implement RFC 1859 are required to listen on well-known TCP port 399.
When running DECnet over TCP/IP, you can use an IP host name such as the one in the following example:
$ set host remotehst6.acme.com
For more information about making connections using DECnet over TCP/IP, see the DECnet-Plus for OpenVMS documentation.
For detailed information about the following topics, refer to the Compaq TCP/IP Services for OpenVMS Management guide:
For more information about using TELNET, refer to the Compaq TCP/IP Services for OpenVMS User's Guide.
For more information about access checking, refer to the OpenVMS Guide to System Security.
To learn how to set up and initialize a Files–11 disk, refer to the OpenVMS System Manager’s Manual: Essentials.
TCP/IP Services for OpenVMS software supports the Berkeley Internet Name Domain (BIND) service, which is a popular implementation of the Domain Name System (DNS). BIND has been ported to many platforms, including UNIX, Windows NT, and OpenVMS.
Before you add BIND servers to your network, you should understand the basic BIND service concepts as they apply to the TCP/IP Services for OpenVMS product. They are described in this chapter in the following topics:
BIND Version 9 is supported on Alpha systems only, and future support of BIND Version 8 on VAX systems will be limited. Therefore, if you are using BIND Version 8 on a VAX system, Compaq recommends that you upgrade your BIND server to an Alpha system.
In planning your TCP/IP Services for OpenVMS configuration, consider the following:
DNS has a hierarchical, distributed namespace that makes it easy for people to remember and locate the many hosts located throughout the Internet. Since computers remember and locate the same hosts through a numerical address, computers need a method for converting the host name to a numerical address.
BIND is a lookup service that maps host names to IP addresses and IP addresses to host names in response to queries from other BIND servers and clients in the network. BIND can also provide information on available mail servers and well-known services for a domain.
Based on a client/server model, BIND servers maintain databases of host names, IP addresses, mail records, text records, and other network objects. When client systems require this information, they query the servers.
IP address space allocation is one of the many duties for which ICANN (Internet Corporation for Assigned Names and Numbers), a non-profit corporation, assumes responsibility. ICANN also manages protocol parameter assignment, domain name system management, and root server system management functions, which were previously performed under U.S. Government.
The BIND service contains two parts: the BIND resolver and the BIND server.
BIND server — server software that responds to client queries by providing:
Authoritative or nonauthoritative answers to queries about host names and IP addresses for which the server has an answer.
Information about other authoritative servers that can answer queries about host names/IP addresses for which the server does not have an answer.
Information about how to get closer to the answer if the server does not have either an answer or information about other authoritative servers
Information about mail servers and other network application servers (for example, FTP, TELNET).
The Internet name space is based on a hierarchical tree structure. Each node in the tree is referred to as a domain or a subdomain. A domain is an administrative entity that allows for decentralized management of host names, addresses, and user information. Domains can refer to an administrative point in the name space tree or a specific host. A domain is identified by a domain name and includes the name space at or below the domain name. A subdomain is every domain in the name space below the root domain.
Typically, each domain has a domain administrator responsible for coordinating and managing the domain. The domain administrator registers a second-level or lower domain by interacting with the domain administrator in the next higher-level domain.
The domain administrator’s duties include:
The domain administrator furnishes users with access to names and name-related information both inside and outside the local domain.
The InterNIC assigns names for all top-level domains as well as domains directly below the top-level domains. Individuals are responsible for assigning lower-level domains and host names.
Each domain has a label. For example, the label for the top-level domain for commercial organizations is com. A label is unique within its parent domain.
The concatenation of all the domain labels from the top-level domain to the lowest-level domains is called a fully qualified domain name. The labels are listed from right to left and are separated by dots. For example, the domain name for a subdomain within the com domain would be abc.com; abc is the label for the ABC company’s subdomain, and com is the label for the commercial domain. This structure allows administration and data maintenance to be delegated down the hierarchical tree.
The term domain name is sometimes used to refer to a specific domain label. The name of the root domain of the name space is a dot (.).
There are two types of domain names: the fully qualified name and the relative name.
The fully qualified name represents the complete domain name. This is also known as the absolute or canonical name. For example:
boston.cities.compaq.com
A domain name that is fully qualified is absolute. You should not append further BIND extensions to the name.
The relative name represents the starting name (label) of an absolute domain name. Relative names are incomplete but are completed by the BIND service using knowledge of the local domain. Relative host names, such as boston.cities, are automatically expanded to the fully qualified domain name when given in a typical command.
The format of domain and host labels have the following characteristics::
Although label names can contain up to 63 characters, it is best to choose names that are 12 characters or less because the canonical (fully qualified) domain names are easier to keep track of if they are short. The sum of all the label characters and label lengths cannot exceed 255.
Domain names are not case sensitive. However, the case of entered names is preserved whenever possible.
For example, the fully qualified domain name euro.sales.compaq.com is broken down as follows (from right to left):
For management reasons, a domain can be divided into zones, which are discrete, nonoverlapping subsets of the domain. A zone usually represents an administrative or geographic boundary, and authority for the zone may or may not be delegated to another responsible group or person. Each zone starts at a designated level in the domain name tree and extends down to the leaf domains (individual host names) or to a point in the tree where authority has been delegated to another domain.
A common zone is a second-level domain, such as abc.com. Many second-level domains divide their zones into smaller zones. For example, a university might divide its domain name space into zones based on departments. A company might divide its domain name space into zones based on branch offices or internal divisions. Authority for the zone is generally delegated to the department or branch office. The department or branch office then has the responsibility for maintaining the zone data.
All the data for the zone is stored on the master server in zone files.
When a zone is very large and difficult to manage, authority for a portion of the zone can be delegated to another server; the responsibility for maintaining the zone information is also delegated.
For example, the edu zone contains many educational organizations. Each organization is delegated the authority for managing their portion of the edu zone, thereby creating subzones. For example, both rpi.edu and uml.edu are subzones of the edu zone and each organization has the responsibility for maintaining the zone information and the master and slave servers for their respective zones.
The Internet has a special domain used for locating gateways and supporting internet address-to-host name lookups. The mapping of internet addresses to domain names is called reverse translation. The special domain for reverse translation is the IN-ADDR.ARPA domain.
If a network consists of relatively few hosts, host name to IP address translations can be accomplished by using a centralized hosts database file.
As soon as a network connects to another network, or when the number of hosts grows large, a more robust method for performing host name/IP address translation is required. In particular, when a network is part of the worldwide internet, no single database can keep track of all addressing information. A considerable number of hosts and network domains are added, changed, and deleted every day.
BIND uses different types of name servers to ensure that all queries are resolved quickly and efficiently:
When a client makes a query, a name server can be in one of three possible states:
The following sections discuss the different types of name servers and their primary responsibilities in the distributed environment of BIND and DNS.
Root name servers are the master name servers for the top-level domains of the internet root zone. If the root name server is not the authority for a zone, it knows whom to contact to find out which server is the authority.
If a nonroot server receives a request for a name that is not within its zone, the server starts name resolution at the root zone and accesses the root servers to get the needed information.
The InterNIC determines root servers for the top-level domain, such as A.ROOT_SERVERS.NET, which is a current server name (formerly, ns.internic.net). These servers change from time to time. You can obtain the up-to-date list by:
These servers know about all the top-level DNS domains on the Internet. You must know about these servers when you make queries about hosts outside of your local domain. The host names and internet addresses of these machines change periodically. Therefore, check with the InterNIC to obtain changes, and store them in the hints file of the BIND name servers (usually called ROOT.HINT on a TCP/IP Services system).
There are two types of master servers: a master name server and a slave name server (also called a secondary master name server).
The master server is the primary authority for the zone. The master server has complete information about the zone, and it stores the information in its database files. If network information changes, those changes are captured in the master server’s database files.
A server can be a master server for more than one zone, acting as the master name server for some zones and a slave name server for others.
You can have more than one master server; however, maintaining two sets of database files requires making the same changes to both sets of files. A more efficient solution is to have one master server and one or more slave servers that obtain their zone information from the master server.
A slave name server is an administrative convenience that provides redundancy of information and that shares the load of the master name server. A slave name server receives its authority and zone data from a master name server. Once it is running, a slave name server periodically checks with the master name server for zone changes. If the slave’s serial number is less than the master’s serial number, the slave requests a zone transfer.
The slave name servers poll the master server at predetermined intervals specified in the zone database files. A time lapse between changing the master server’s databases and the slave name servers requesting the update may exist.
Often it is beneficial to limit the traffic to the Internet. The reason might be a slow internet connection or you are being charged by the number of packets.
Funneling DNS Internet queries through one name server can reduce the number of queries going out to the Internet. A name server that performs this function is a forwarder. The forwarder handles all off-site queries and in doing so builds up a cache of information; this reduces the number of queries that the forwarder needs to make to satisfy a query.
Forwarder servers have access to the Internet and are able to obtain information regarding other servers that is not currently found in local caches. Because a forwarder server can receive requests from several slave servers, it can acquire a larger local cache than can a slave server. All hosts in the domain have more information available locally because the forwarder servers have a large cache. This means that the server sends fewer queries from that site to root servers on networks outside the internet.
All servers cache the information they receive for use until the data expires. The length of time a server caches the information is based on a time-to-live (TTL) field attached to the data the server receives.
Caching-only servers have no authority for any zone, and thus do not have complete information for any zone. Their database contains information acquired in the process of finding answers to clients’ queries.
You can run the BIND service on a local network that does not have internet access. In this configuration, the servers resolve local queries only. Any request that depends on Internet access goes unresolved.
Zone transfers are the process by which slave servers obtain their zone data. When a slave server starts up and periodically thereafter, the server checks whether its data is up to date. It does this by polling a master server to see whether the master server’s zone database serial number is greater than the slave’s. If so, the slave performs a zone transfer over the network.
An essential point in this polling environment is that whenever a change is made to a master server’s zone database file, the zone’s serial number must be incremented for the change to propagate to other servers. If the serial number does not change, the slave server does not know it should perform a zone transfer.
In addition to slave servers polling to determine the necessity for a zone transfer, BIND provides a mechanism for a master server to notify slaves of changes to a zone’s database.
When a master server determines that a change has been made to a database, it will send a NOTIFY message to all the slave servers for the zone. The slave servers respond with a NOTIFY response to stop any further NOTIFY messages from the master before they query the master server for the start of authority (SOA) record of the zone. When the query is answered, the slave checks the serial number in the SOA record and if the serial number changes, the slave transfers the zone. This interrupt feature combined with polling provides a good balance between slow propagation of data because of long refresh times and periods of inconsistent data between authority servers when zone data is updated.
DNS Dynamic Update, a BIND feature, provides for zone changes in real time, without having to change a database file and then signal the master server to reload the zone data. Most often, these changes come from other network applications, like DHCP servers, which automatically assign an IP address to a host and then want to register the host name and IP address with BIND.
Dynamic Update provides for:
Dynamic updates are remembered over system reboots or restart of the BIND server. Whenever the BIND server starts up, it looks for and reads the file where it logged updates (typically, domain.db_jnl) and merges the updates into its cache of zone data. While running, the BIND server occasionally writes any pending dynamic updates to the zone database file.
BIND reads information from an ASCII file called TCPIP$BIND.CONF. On UNIX systems, the file name is named.conf. This configuration file consists of statements that specify:
Files residing on BIND server systems contain the database of information needed to resolve BIND queries. The following sections describe the four database files used by the server:
For detailed information about how to create and name these files, refer to the Compaq TCP/IP Services for OpenVMS Management manual.
A master server maintains the master zone file. This file contains:
There is one master zone file for each zone for which the server has authority.
For every host with an A record in the master zone file, an IP address must be mapped back to a host name. This is accomplished by using a zone file for a special domain called the IN-ADDR.ARPA domain.
The zone file for this domain contains PTR records that specify the reverse translations (address-to-host name) required for the zone. There is an IN-ADDR.ARPA zone file for each network represented in the master zone file including the loopback interface.
The loopback interface files define the zone of the local loopback interface, known as LOCALHOST. There is a master zone file and a reverse zone file for LOCALHOST. The resource record for this file defines LOCALHOST with a network address of 127.0.0.1. TCP/IP Services for OpenVMS configuration procedure creates these two files and calls them LOCALHOST.DB and 127_0_0.DB.
The BIND resolver is a set of routines that is linked into each network application that needs DNS name resolution services. The resolver formulates one or more queries based on the resolver’s configuration and information supplied by network applications; it sends the queries to a server to obtain an answer.
You can configure the following resolver features:
The Compaq TCP/IP Services for OpenVMS Management guide contains information about how to configure the resolver.
The default domain is the domain in which the client host resides. When resolving a query when just the host name is supplied, the resolver appends the default domain to the host name and then processes the query. This is a convenience for the user. It saves typing a fully qualified domain name.
The search list is also another convenience for the user. The default search list is derived from the default domain and is applied if the user enters a domain name that is not fully qualified.
You can configure the resolver to query any name server, including the local host, and you can specify a maximum of three name servers. The resolver queries each name server in the order listed until it receives an answer or times out.
For detailed information about DNS/BIND, refer to the Compaq TCP/IP Services for OpenVMS Management guide.
Internet Protocol Version 6 (IPv6), as defined in RFC 2460, is the replacement Network layer protocol for the Internet and is designed to replace Internet Protocol Version 4 (IPv4). IPv6 also changes the structure of the Internet architecture. This does not mean that you have to deploy IPv6 all at once across your network; rather, you can make the change in stages because IPv6 and IPv4 were designed to interoperate. This chapter provides guidelines for deployment, deployment scenarios, and checklists for you to consult before you configure a single system or your entire network.
Before implementing IPv6 into your network, consider the following:
The following is a summary of IPv6 features:
The IPv6 address is 128 bits in length (compared with the 32-bit IPv4 address) and uses a new text representation format. In addition, there are three types of IPv6 addresses: unicast, anycast, and multicast. The unicast address consists of an address prefix and a 64-bit interface identifier. For information about IPv6 addresses, refer to the Compaq TCP/IP Services for OpenVMS Guide to IPv6 manual and to RFC 2373.
Neighbor discovery is a mechanism by which IPv6 nodes on the same link discover each other's presence, determine each other's link-local addresses, find routers, and maintain reachability information about paths to active neighbors and remote destinations. For more information, refer to RFC 2461.
Stateless address autoconfiguration
The process by which IPv6 nodes listen for router advertisement packets from routers and learn IPv6 address prefixes. The node creates IPv6 unicast addresses by combining the prefix with a datalink-specific interface identifier that is typically derived from the datalink address of the interface. The OpenVMS operating system performs this process automatically. For more information, refer to RFC 2462.
TCP/IP Services enables an OpenVMS node to operate as a mobile IPv6 correspondent node as defined in the Internet draft “Mobility Support in IPv6” (David B. Johnson and Charles Perkins). For more information about this proposed standard, refer to:
http://www.ietf.org/ietf/1id-abstracts.txt
This site lists Internet-Drafts documents, all of which are works in progress and subject to change at any time.
The Internet Protocol Version 6 (IPv6) was designed to support mobility through features like its extensible header structure, address autoconfiguration, security (IPsec) and tunneling. mobile IPv6 builds upon these features.
In a mobile IPv6 environment, nodes can have the following roles:
Mobile node, which is a host or router that can change its point of attachment from one link to another while still being reachable through its home address.
Correspondent node, which is a peer node with which a mobile node is communicating. The correspondent node (host or router) can be either mobile or stationary.
Home agent, which is a router on a mobile node's home link with which the mobile node registers its current care-of address. (Currently, OpenVMS cannot operate as a home agent).
A mobile node on its home link has a home address. The subnet prefix of this address is the home network’s subnet prefix. The mobile node is always addressable by its home address.
When the mobile node is away from home, on a foreign link, it acquires a care-of address. The subnet prefix of this address is the foreign network’s subnet prefix. A mobile node can have multiple care-of addresses, the care-of address registered with the mobile node’s home agent is called its primary care-of address.
The association of the mobile node’s home address with its care-of address is called a binding. This association has a lifetime. Each node maintains a cache of all bindings.
When the mobile node is on its home link, packets from the correspondent node that are addressed to the mobile node’s home address are delivered through standard IP routing mechanisms.
When the mobile node is on a foreign link, it configures a care-of address and registers it with its home agent by sending the home agent a binding update. Packets sent by a correspondent node to the mobile node’s home address arrive at its home link. The home agent intercepts the packets, encapsulates them, and tunnels them to the mobile node ’s registered care-of address.
After the mobile node receives the tunneled packets, the mobile node assumes that the original sending correspondent node has no binding cache entry for the mobile node care-of address, otherwise the correspondent node sends the packet directly to the mobile node using a routing header.
The mobile node then sends a binding update to the correspondent node. The correspondent node creates a binding between the home address and care-of address.
Packets flow directly between the correspondent node and mobile node. This route optimization eliminates what is commonly known as triangle routing. or congestion at the mobile node’s home agent and home link. It also reduces the impact of any possible failure of the home agent, the home link, or intervening networks leading to or from the home link, since these nodes and links are not involved in the delivery of most packets to the mobile node.
Away from home, the mobile node sends a home address option to inform the receiver of its home address enabling the receiver to correctly identify the connection to which the packet belongs. When the mobile node returns to its home link, the mobile node sends a binding update to the home agent and to the correspondent node to clear the bindings.
For more information about mobile IPv6, refer to the TCP/IP Services release notes.
Tunneling IPv6 packets in IPv4 is a mechanism that allows IPv6 nodes to interoperate with IPv4 hosts and routers. This approach enables the gradual deployment of IPv6 in your network.
OpenVMS systems can have both an IPv4 address and an IPv6 address. An end system with both addresses is considered a v4/v6 host; a router with both addresses is considered a v4/v6 router. A v4/v6 host can use IPv6 to communicate with other v4/v6 hosts on the same communications link. However, when these hosts need to communicate over an IPv4 network, the hosts need to tunnel the IPv6 packets in IPv4 packets in order for the IPv4 routing infrastructure to route the packets to the destination host.
The OpenVMS implementation of tunneling IPv6 packets in IPv4 uses bidirectional configured tunnels to carry IPv6 packets through an IPv4 routing infrastructure; unidirectional tunnels are not supported. This means that a configured tunnel must be created on the nodes at both ends of the tunnel. A bidirectional configured tunnel behaves as a virtual point-to-point link. For the remainder of this chapter, the term configured tunnel refers to a bidirectional configured tunnel. A configured tunnel has a source IPv4 address and a destination IPv4 address.
Table 9–1 describes which configured tunnels are possible.
Table 9.1. Tunnel Configurations
Tunnel Configuration | Description | Described in... |
---|---|---|
Router-to-router tunnel | The v4/v6 routers are connected by an IPv4 infrastructure. For end-to-end communications, this represents only one segment of the total path. | Section 9.3.3 |
Host-to-router tunnel | The v4/v6 host and v4/v6 router are connected by an IPv4 infrastructure. For end-to-end communications, this represents the first segment of the total path. | Section 9.3.1 |
Host-to-host tunnel | The v4/v6 hosts are connected by an IPv4 infrastructure. For end-to-end communications, this represents the total path since the tunnel spans the total path. | |
Router-to-host tunnel | The v4/v6 router and v4/v6 host are connected by an IPv4 infrastructure. For end-to-end communications, this represents the final segment of the total path. | Section 9.3.2 |
For more information about tunnels refer to Compaq TCP/IP Services for OpenVMS Guide to IPv6.
TCP/IP Services Version 5.3 includes support for a new tunnel IPv6 transition mechanism called 6to4, as defined in RFC 3056.
For more information about the 6to4 mechanism, refer to the TCP/IP Services release notes.
The following three scenarios, in order of increasing complexity, serve as models for deploying IPv6 in your network:
The following sections describe each scenario.In this scenario, you deploy IPv6 hosts on a small subnet in your network. These hosts communicate with each other using link-local addresses. If you add an IPv6 router to the subnet and advertise an address prefix, each IPv6 host autoconfigures a global IPv6 address and uses that address to communicate with other IPv6 hosts.
As you become more experienced with using IPv6, for the next phase you can add an IPv6 host or hosts on other subnets in your network. Communications between IPv6 hosts on different subnets occur using configured router-to-host tunnels and host-to-router tunnels. The existing IPv4 routing infrastructure is used to get the packets end to end.
The following figures illustrate an intranet scenario in which a corporation has three departments in a local geographic area. Department A has deployed v4/v6 hosts and a v4/v6 router. Departments B and C have deployed only one v4/v6 host each, with a majority of v4 hosts.
In Figure 9–1, to communicate with host F, native IPv6 traffic is routed from host A to host F via router A.
In Figure 9–2, to communicate with host I, host A sends an IPv6 packet to router A. Router A forwards the IPv6 packet to router B. Router B encapsulates the IPv6 packet and sends the IPv4 packet over a router-to-host tunnel to Host I, which decapsulates the IPv4 packet. The IPv4 infrastructure routes the packet to host I. For hosts, the host-to-router tunnel is more efficient because host A, host B, and host C administrators do not need to create individual host-to-host tunnels for each destination host.
In Figure 9–3, to communicate with host A, host I encapsulates the IPv6 packet and sends the IPv4 packet over a host-to-router tunnel to router B. From there, router B decapsulates the IPv4 packet and routes the IPv6 packet to host A. For hosts, the host-to-router tunnel is more efficient because the host I administrator does not need to create individual host-to-host tunnels for each destination host.
In this scenario, you add a v4/v6 router to your network and use it to communicate with the global Internet. The IPv6 hosts communicate with the v4/v6 router using IPv6. For IPv6 traffic to v4/v6 hosts on the 6bone or the Internet, you configure router-to-host tunnels.
Figure 9–4 illustrates a scenario in which the corporation described in the chapter adds a connection from router A to the Internet. Potential destination nodes are in turn connected to the Internet.
In Figure 9–4, to communicate with host J, host A sends the IPv6 packet to router A. Router A encapsulates the IPv6 packet and sends the IPv4 packet over a router-to-host tunnel to host J, which decapsulates the IPv4 packet.
To communicate with the 6bone, host A sends the IPv6 packet to router A. Router A encapsulates the IPv6 packet and sends the IPv4 packet over a router-to-host tunnel to the 6bone point of entry. The point of entry router decapsulates the IPv4 packet and routes the IPv6 packet to its destination.
In this scenario, you add v4/v6 routers on remote subnets and connect the two of them through the Internet to create a virtual private network (VPN). An example of this might be a global corporation with manufacturing in one country and a design center in another country. The IPv6 hosts communicate with the v4/v6 routers using IPv6. For IPv6 traffic between the v4/v6 routers on each subnet, you configure router-to-router tunnels.
Figure 9–5 illustrates a scenario in which the corporation described in the previous sections wants to connect its corporate network with one of its geographically remote departments to create a VPN.
To communicate with host K, host A sends the IPv6 packet to router A. Router A encapsulates the IPv6 packet and sends the IPv4 packet over a router-to-router tunnel to router E, which decapsulates the IPv4 packet and routes the IPv6 packet to host K. For routers, the router-to-router tunnel is more efficient because the router A administrator does not need to create individual router-to-host tunnels for each destination host.
The OpenVMS operating system provides the basic application programming interfaces (APIs) as defined in RFC 2553. You can use the APIs and the AF_INET6 sockets in your existing applications (or in new applications) to communicate with IPv4 nodes today. Your ported applications will continue to communicate with IPv4 nodes and will be ready to communicate with IPv6 nodes. For more information, refer to the Compaq TCP/IP Services for OpenVMS Sockets API and System Services Programming manual and the Compaq TCP/IP Services for OpenVMS Guide to IPv6 manual.
IPv6 addresses are now being deployed by the regional registries. To obtain an IPv6 address or block of addresses, contact your Internet Service Provider (ISP).
If you are an Internet Service Provider, contact your upstream registry or one of the registries at the following locations:
Because of the need to test various implementation of the IPv6 RFCs, the Internet Engineering Task Force (IETF) has defined a temporary IPv6 address allocation scheme. You can assign the addresses in this scheme to hosts and routers for testing IPv6 on the 6bone. For more information about 6bone address allocation and assignment, refer to the 6bone home page at the following location:
After you contract with your ISP for a block of addresses, your deployment of IPv6 in your network begins the process of renumbering of your network. In IPv4, network renumbering was a difficult and time-consuming process. In IPv6, network renumbering is more dynamic. This enables you to renumber your network for any of the following reasons:
Whatever the reason, when your current ISP contract expires, your right to use the block of IPv6 addresses also expires. Although network renumbering is simplified in IPv6, the following points will help ease the process:
This process depends on the hardware vendor you have chosen. You will need to define what address prefixes the router will advertise and the interfaces over which to advertise them.
The OpenVMS operating system supports AAAA lookups over IPv4 (AF_INET) connections only. The resolver and server have not been ported to IPv6, but IPv6 applications can make getaddrinfo and getnameinfo calls to retrieve the AAAA records.
Before you configure a DNS/BIND server to operate in an IPv6 environment, review the following steps:
If the system is configured as a DNS/BIND server, change the resolver configuration to point to the local node for name lookups.
For more information about configuring Domain Name System, refer to the Compaq TCP/IP Services for OpenVMS Guide to IPv6 manual.
Before you configure IPv6 routers, consider the following points:
Decide whether you need a configured IPv4 tunnel for communications with other IPv6 nodes or networks. You will need the remote node's IPv4 address (the remote end of the tunnel) and your node's IPv4 address (this end of the tunnel).
Decide whether you want to configure static routes. You might want to configure static routes if one of the following conditions is true:
Identify the interface (LAN, SLIP, or configured tunnel) on which you want to run the RIPng protocol or to advertise an address prefix. If you choose the latter, you must decide on the address prefix to advertise.
For more information, refer to the Compaq TCP/IP Services for OpenVMS Guide to IPv6 manual.
Before you configure an IPv6 host, consider the following points:
Decide whether you need a configured IPv4 tunnel for communications with other IPv6 nodes or networks. You will need the remote node's IPv4 address (the remote end of the tunnel) and your node's IPv4 address (this end of the tunnel).
Decide whether you want to configure static routes. You might want to configure static routes if you want a configured tunnel to a router and the router is not advertising itself as a default router on the tunnel link.
For more information, refer to the Compaq TCP/IP Services for OpenVMS Guide to IPv6 manual.
For detailed information about the following topics, refer to the Compaq TCP/IP Services for OpenVMS Guide to IPv6 manual:
For more information about APIs and the AF_INET6 sockets, refer to the Compaq TCP/IP Services for OpenVMS Sockets API and System Services Programming guide.
For more information about advanced IPv6 API, refer to the TCP/IP Services release notes.
This glossary defines terms that pertain to the features and operation of the Compaq TCP/IP Services for OpenVMS product.
A path name that starts with a slash (/); specifies a file that can be found by starting at the root of the file system and traversing the file tree.
A specific date or time of day; specified in the following format: [dd-mmm-yyyy] [:hh:mm:ss:cc] .
The description of a data structure that is independent of host structures or codes.
The language used by ISO protocols for describing abstract syntax. Most notable use in TCP/IP is for Simple Network Management Protocol (SNMP). The rules of ASN.1 are independent of the encoding techniques used to represent them.
A character string with login information that validates connect or login at a remote host.
A list that defines the kinds of access to be granted or denied to users.
A set of privileges that determines what users can do.
See acknowledgment.
A type of message sent to indicate that a block of data arrived at its destination without error. A control bit (acknowledgment flag) in the TCP header indicates that the acknowledgment number field is significant for each segment in a packet.
See access control list.
See ancillary control process.
A port that is bound to a process.
A number or group of numbers that uniquely identifies a network node within its own network or internet. See also IP address and hardware address.
A 32-bit value used to identify which bits in an IP address correspond to the network and subnet portions of the address.
The process of relating an IP address to a hardware address, when both refer to the same device, for example, conversion of an IP address into the corresponding Ethernet, Token Ring, or FDDI hardware address. This may require broadcasting on a local network. See also Address Resolution Protocol.
The TCP/IP protocol that dynamically binds an IP address to a hardware address such as an Ethernet or FDDI address; limited to physical network systems that support broadcast packets that can be heard by all hosts on a single, physical network. See also proxy ARP.
The function that ensures that network systems are correctly identified at all times.
The authority, such as the American National Standards Institute (ANSI), responsible for assigning Network Interface layer addresses within an addressing domain.
A level in a hierarchy of Network Interface layer addresses.
A single connection to an adjacent node; collection of state information representing a node in the local node's routing databases.
A relationship formed between selected neighboring routers for the purpose of exchanging routing information. Not every pair of neighboring routers becomes adjacent.
An address that identifies a local subnet access point and a subnet address of an adjacent system.
The nodes with direct lines between them; can communicate without an intermediate system. For example, all nodes on an Ethernet LAN are adjacent to each other.
A group of hosts, routers, and networks operated and managed by a single organization. Routing within an administrative domain is based on a consistent technical plan. An administrative domain is viewed from the outside, for purposes of routing, as a cohesive entity, of which the internal structure is unimportant. Information passed by other administrative domains is trusted less than information from one's own administrative domain.
A field in the Router Discovery Protocol router advertisement message that indicates how long advertisement addresses are valid. A lifetime of zero indicates that one or more addresses are no longer valid.
A data packet that is discarded because it exceeded the maximum number of hops while being forwarded through the network.
A system that acts on behalf of another system. (1) Client/server model: Part of the system that initiates, prepares, and exchanges information preparation on behalf of a client or server application. (2) Network management: Portion of an entity that responds to management requests and/or preprogrammed trap.
The portion of an agent responsible for the agent's end of SNMP.
The instance of a connection between a client or director and a server or agent.
An address that specifies the information needed by a director to establish communications with the agent's management interface.
The attributes maintained by the agent. The attributes do not cross the internal management interface.
See throughput.
A name, usually easy to remember, that is translated from a different name, usually difficult to remember. Most often used as an optional alternate name for a host. See also host name.
An optional node name used by some or all nodes in an OpenVMS Cluster that allows them to be treated as one node.
The internet address notation that conveys the same information as the common notation, but consists of two parts: network and host.
The organization that coordinates U.S. standards in many areas, including computers and communications.
The standard character set that assigns an octal sequence to each letter, number, and selected control characters.
The process that acts as an interface between user software and an I/O driver. The process provides functions supplementary to those performed in the driver, such as file and directory management.
A convention of the File Transfer Protocol that allows a user who does not have explicit authorization to transfer files to and from a host without the need for an account and password. The user usually logs in with a generic user ID and an e-mail address as password.
See American National Standard Institute.
See Application Programming Interface.
A program that provides functionality for end users of systems.
The top-most layer in the Internet architecture model where the user interacts with an application such as Network File Service (NFS), File Transfer Protocol (FTP), and mail.
A part of a distributed application running on a single host.
A standardized set of routines that makes system functions available to programmers.
The structure of a system, a description of which can be used to recreate the system.
See address resolution protocol.
See American Standard Code for Information Interchange.
The numbers officially assigned as part of the Internet standards.
The method for dynamic allocation of bandwidth using a fixed-size packet (called a cell). Also known as fast packet.
The mode of transmission in which the time intervals between character transmissions differ. Each character is surrounded by start and stop bits to allow the receiving device to recognize the beginning and end of each character (also called start-stop transmission).
See asynchronous transfer mode.
The controllable or observable part of an entity; a variable that network managers and applications programmers can manipulate for optimal performance.
A named collection of attributes grouped together, such as all information relating to errors.
Verification of the identity of a person or process attempting to access a system.
The software that searches the proxy database for valid user and group identification for remote personal computer users and returns them to PC-NFS.
A name server is said to have authority for a zone. That is, the name server has complete information about a part of a domain space for which the name server is considered to be the authority. A name server may be the authority for one or more zones. Authority for a domain space may be delegated to one or more zones.
In response to an nslookup or a resolver query, an answer is an authoritative answer if a server queries the authority for the zone and returns the answer. A server returns a nonauthoritative answer when the server's answer comes from its own cache.
A group of independent computer systems that trust each other regarding routing and reachability information; members believe information provided by other members in preference to information received from systems that are not part of the confederation.
A collection of networks controlled by one administrative authority. The gateways within this system are expected to trust one another and to share and update routing information among themselves by any mutually agreeable protocol. A core gateway must also be designated to share routing information with other autonomous systems by means of an External Gateway Protocol. See also External Gateway Protocol.
A set of routers under a single technical administration, using an interior gateway protocol and common metrics to route packets within the AS, and using an exterior gateway protocol to route packets to other ASs. Since this classic definition was developed, it has become common for a single AS to use several interior gateway protocols and sometimes several sets of metrics within an AS.
The use of the term autonomous system stresses that even when multiple internal gateway protocols and metrics are used, the administration of an AS appears to other ASs to have a single coherent interior routing plan and presents a consistent picture of what networks are reachable through it. The AS is represented by a number between 1 and 65534, assigned by the Internet Assigned Numbers Authority.
The process of mounting NFS file systems on an as-needed basis. The NFS file system automatically unmounts after a period of inactivity on the file system. (The default is 5 minutes.) You specify file systems to be automounted in the automounts map file.
The Compaq TCP/IP Services for OpenVMS software that runs as a background process and listens for incoming requests for services. When it receives a request, it runs the appropriate server application; includes inetd, security, and logging options.
The proportion of time a specific piece of equipment, system, or network is usable, compared to the total time it is expected to be.
The primary connectivity mechanism of a hierarchical distributed system. Usually a high-speed high-performance network that links together other networks into an internetwork. All systems with connectivity to an intermediate system on the backbone will connect to each other. This does not prevent systems from setting up private arrangements with each other to bypass the backbone for reasons of cost, performance, or security.
In the UNIX environment, the default mount option is to retry remote mount requests in the foreground. If during a boot process, any server listed in /etc/fstab is not currently available, the local system will not finish booting until the server becomes available. With background mounting, a remote mount request is executed once in a foreground process. If the mount request fails, the request is retried in a background process. This allows the local system to continue the boot procedure without waiting for the server to become available.
(1) Technically: The difference, in Hertz (Hz), between the highest and lowest frequencies of a transmission channel. (2) Typically: The amount of data that can be sent through a communications circuit.
A characteristic of any network technology that uses a single carrier frequency and requires all stations attached to the network to participate in every transmission; only one communication channel is provided at a time. See also broadband.
See Bulletin Board System.
The implementation of a DNS server developed and distributed by the University of California at Berkeley. Host name and address lookup service for the Internet; implemented in a client/server model. The client software, referred to as the resolver, allows client systems to obtain host names and addresses from servers rather than from locally hosted databases.
The derivation of the original UNIX operating system developed by the Computer Systems Research Group of the Department of Electrical Engineering and Computer Science at the University of California at Berkeley. The Compaq UNIX operating system is based on the BSD version of UNIX.
A characteristic of network technologies that will attempt to deliver data but will not try to recover if there is an error such as a line failure. Internet protocols IP and UDP provide best-effort delivery service to application programs.
The Compaq TCP/IP Services for OpenVMS implementation of a network device driver. See also device driver.
See Border Gateway Protocol.
The format for storage or transmission of binary data in which the most significant bit (or byte) comes first. The reverse convention is called little endian.
A set of library routines compiled into a client application like telnet or ftp that formulates a query to ask a name server to look up name and address information.
The software that responds to queries from BIND resolvers for name and address lookups; can be local or distributed. See also cache server, forwarder server, primary server, and secondary server.
Defining a remote file system to be a part of the local OpenVMS file system.
The measure of the rate of data transmission.
A contiguous unit of user information grouped together for transmission, such as the user data within a packet, excluding the protocol overhead.
A database file that BIND servers use to determine their type, the zones for which they have authority, and the location of other BIND database files.
The mnemonic for Bootstrap protocol. The protocol used for booting diskless systems remotely to a network. See also remote boot.
A Compaq TCP/IP Services for OpenVMS database with entries for diskless network clients that depend on a boot server to download their operating system images.
The interautonomous system routing protocol used to exchange network reachability information between autonomous systems. BGP runs over TCP.
One of a class of exterior gateway protocols, described in more detail in the BGP section of UNIX reference page gated.proto(4).
A point in the network where traffic is delayed or blocked. Bottlenecks are the limiting factors in network performance.
An I/O function specifying a port number and IP address for the device socket to bind a port to a process.
See bits per second.
A device that connects two or more physical networks and then stores and forwards complete packets between them. A bridge can usually be made to filter packets (that is, to forward only certain traffic).
A characteristic of any network that multiplexes multiple, independent network carriers onto a single cable; usually using frequency division multiplexing. Broadband technology allows several networks to coexist on one single cable; traffic from one network does not interfere with traffic from another because the "conversations" happen on different frequencies.
A delivery system where a copy of a packet is sent simultaneously to many hosts; can be implemented with hardware (for example, as in Ethernet) or with software (for example, as in Cypress). See also multicast.
The address that designates all hosts on a physical network. The broadcast address contains a hostid of all ones.
A type of multicast addressing in which all nodes receive a message simultaneously.
A circuit on which multiple nodes are connected. A message can be transmitted to multiple receivers, and all nodes are adjacent.
An end node connected to the same broadcast circuit as the local node. See also adjacency.
An intermediate system (router) connected to the same broadcast circuit as the local node. See also adjacency.
A mask used to interpret the IP address as a broadcast address.
An incorrect packet broadcast on a network that causes most hosts to respond all at once, typically with wrong answers that start the process over again.
A bridge/router; a device that forwards messages between networks at both network and data link levels.
See Berkeley Software Distribution.
A message database where people can log in and leave broadcast messages for others grouped (typically) into topic groups.
A device or an area of memory used for temporary storage when transmitting data from one device to another. Compensates for a difference in rate of data flow or in time of occurrence of events. Used on routing nodes to temporarily store data that is to be forwarded from one node to another.
The number of buffers provided at one time by the network software to handle data. Level can be single or multiple. Single buffering tends to be less efficient than multibuffering but uses less memory on the local system. Multibuffering provides better performance, and a network can send or process several buffers of data in quick succession.
(1) A LAN topology in which all nodes connect to a single transmission medium. All nodes are equal, and all nodes hear all transmissions on the medium. Bus topologies are reliable because failure of a node does not affect the ability of other nodes to transmit and receive. (2) A flat, flexible cable consisting of many transmission lines or wires used to interconnect computer system components to provide communication paths for addresses, data, and control information.
A portion of a computer's RAM reserved to act as a temporary memory for items read from a disk. These items become instantly available to the user.
A BIND server that has no authority for any zone; acquires information in the process of resolving clients' queries and stores it in its cache. See also BIND server, forwarder server, primary server, and secondary server.
The main or official name for a host; other names for the same host are aliases. In a BIND configuration, you specify the canonical name in a CNAME record of the named.hosts file.
A BIND configuration logging statement phrase that specifies the different categories for which to log messages. Categories include: config, parser, queries, lame-servers, statistics, panic, update, ncache, xfer-in, xfer-out, db, eventlib, packet, cname, security, os, insist, maintenance, load, response-checks, and default.
A form of network management that manages from a single point in the network.
The data path between two or more stations, including the communications control capability of the associated stations.
A BIND configuration logging statement that specifies output methods, format options, and severity levels associated with a category of messages to be logged.
A computed value based on the contents of a packet. The value is sent with the packet when it is transmitted. The receiving host computes a new value based on the received data. If the originating and receiving values are the same, the receiver has a high degree of confidence that the data was received correctly.
A logical (virtual) link that provides a communications connection between adjacent nodes.
The name of an entity class. For example, node is the global entity class.
A computer system or process that requests a service of another computer service or process.
A model of interaction used in distributed processing products when a client process sends a request and waits for the results from a server process.
The combined hardware interrupt timer and software register that maintain system time. In many systems, the hardware timer sends interrupts to the operating system; at each interrupt, the operating system adds an increment to a software register that contains the time value.
An optional node name and address used by some or all nodes in an OpenVMS Cluster, allowing these nodes to be reachable on the network with the same address.
An environment that allows a system in a cluster to take on the responsibilities of a system that crashed or is otherwise unavailable. For example, you can configure a system to become a DHCP server when the primary DHCP server process crashes or when the system that the primary DHCP server is running on becomes unavailable.
The condition in which two data packets are transmitted over a medium at the same time, making both unintelligible.
The common way of expressing an Internet address. The 32-bit address uses four fields that are separated by periods; each field ranges from 0 to 255.
The physical medium connecting two systems.
A special-purpose standalone system dedicated to managing communications activities for other computer systems.
The process of joining two or more items together, as when input files are appended to a new output file.
The Compaq TCP/IP Services for OpenVMS database with SMTP, SNMP, and TIME specifications.
The condition in which a network or part of a network is overloaded and has insufficient communication resources for the volume of traffic.
A logical communication path between two processes that are using the TCP protocol. The communication path must exist before data can be sent in either direction. A three-way handshake occurs between the requesting and receiving process to establish a port through which the two processes communicate.
The model of interconnection that consists of three phases: establish connection, transfer data, and release connection. TCP is a connection-oriented protocol.
The model of interconnection in which communication takes place without first establishing a connection. UDP, IP, and IPX are connectionless protocols.
The degree to which network nodes are interconnected. Full connectivity means all nodes have links to every other node.
A data file on a Compaq OpenVMS NFS server with a UNIX directory structure and UNIX file attributes for a local, logical UNIX-style file system. Each UNIX regular file is stored as a separate data file. The directory data files in the container file contain the UNIX file names and a pointer to the corresponding OpenVMS Files-11 data file.
A logical UNIX-style file system that resides on a Files-11 formatted disk and is represented as a set of Files-11 files. See also container file.
The condition when two or more stations attempt to use the same channel at the same time.
The scheme of access control used by many networks. Control is distributed among the nodes of the network. Any node wanting to transmit can do so, accessing the network on a first-come, first-served basis. However, it is possible that two nodes are in contention, or start transmitting at the same time, in which case a collision occurs. Each node must then back off and retransmit after waiting a random period of time.
A group of small (256-byte) buffers dynamically allocated from nonpaged pool memory; stores information related to device sockets, internal control structures, IP addresses, Internet routes, and Internet packet headers.
Greenwich Mean Time.
An OSPF (Open Shortest Path First) protocol metric. See metric and OSPF.
The performance and error statistics kept for an entity by network management, such as lines and nodes.
See cyclic redundancy check.
An error detection scheme whereby a number is derived from a set of data before it is transmitted. Once transmitted, the receiving node recalculates the number and compares it to the value originally transmitted. If the numbers are different, some type of transmission error has occurred.
A process that executes in the background waiting for some event to occur.
A group of large (1792-byte) buffers that store data in the system space; transmit and receive operations service user processes by moving data to and from data clusters.
Used for encryption of message text and (with certain choices among a set of alternative algorithms) for computation of message integrity check (MIC) quantities.
A type of encryption scheme approved by the U.S. National Bureau of Standards.
A logical connection between two systems on the same circuit on which data integrity is maintained.
The layer in a network model that handles communication between physical hosts.
See octet.
The data blocks received that arrived too quickly to be processed by the receiver and were, therefore, lost.
A self-contained package of data carrying enough information to be routed from source to destination without reliance on earlier exchanges between source and destination or the transporting network.
The result of fragmenting a datagram. Fragments carry a portion of data from the larger original and a copy of the original datagram header. The header fragmentation fields are adjusted to indicate the fragment's relative position within the original datagram.
The time allowed for reassembly of a fragmented datagram.
The mode of delivery for a datagram which is delivered in such a way that the receiver can determine the boundaries of the datagram as it was entered by the source.
See Distributed Computing Environment.
See DIGITAL Command Language.
The routing process that determines the path, or route, along which a data packet travels to reach its destination; forwards packets on the lowest-cost path even if that one does not have the fewest hops. The path that the data takes through the network is transparent to users.
The process by which the transfer syntax representation of a data value is transformed into the local representation of that value.
A permanent connection between two hosts using an RS232 serial port. SLIP or PPP can be used for TCP/IP communication between the two hosts.
The route used to direct any data addressed to network host addresses for which no explicit route is specified.
A HELLO metric. Valid values are from 0 to 30000, inclusive. The value of 30000 is the maximum metric and means unreachable. See also metric and HELLO.
The access right that grants users the ability to remove data from the domain.
See data encryption key.
See Data Encryption Standard.
In OSPF, a designated router is a multiaccess network that has at least two attached routers. The designated router generates a link state advertisement for the multiaccess network and assists in running the protocol. The designated router is elected by the HELLO protocol.
The IP address that specifies where a datagram is to be sent; contains the network and host identifiers.
Any network or host.
A 2-octet value in the TCP and UDP header field that identifies the destination upper-level protocol for a packet's data.
The software associated with each physical device; serves as the interface between the operating system and the device controller.
The extension of the pseudodevice, used for communications; consists of the Internet pseudodevice and the socket. See also pseudodevice.
See Dynamic Host Configuration Protocol.
The sequence of message exchanges between open systems that represents a single association and the set of underlying connections.
A temporary (as opposed to dedicated) network connection established through a telephone line with a modem.
A host that responds to incoming PPP connection requests. A PPP server.
The command interface of the OpenVMS operating system.
The Compaq software product implemented on OpenVMS as an ancillary control process (ACP) and a network device driver (BG driver) with executive-level components and user applications that use TCP/IP protocols.
An EGP metric. See metric and EGP. Valid values are from 0 to 255 inclusive.
An architecture of standard programming interfaces, conventions, and server functions (for example, naming, distributed file system, remote procedure call) for transparently distributing applications across networks of heterogeneous computers.
A collection of several different data repositories that look like a single database to the user. The Domain Name System (DNS) is a distributed database.
A form of network management in which network managers and management software are dispersed across many systems.
The technology that enables the distribution throughout the network of computing power and storage facilities to user work areas, such as offices, laboratories, or machines on factory floors.
A collection of computer systems, tied together by communications networks for the purpose of sharing resources; end users do not need to be aware of the physical location of the shared resources.
See Domain Name System.
An organizational unit with administrative responsibility for naming networks or hosts. An internet domain name consists of a sequence of names (labels) separated by periods (dots); for example, tundra.mpk.ca.us.
The name used to refer to a fully qualified domain or subdomain. For example, in cat.food.iams.com, food.iams.com, iams.com, and .com are all domain names. Each name specifies a different domain level.
A distributed database system that allows TCP/IP applications to resolve a host name into a correct IP address.
See dotted-decimal notation.
The syntactic representation for a 32-bit integer that consists of four 8-bit numbers written in base 10 with periods (dots) separating them; used to represent IP addresses in the Internet, as in 192.67.67.20. Many Internet application programs accept dotted-decimal notation in place of destination machine names.
Transferring a copy of a system image from a load host to a target. Some systems, such as DEC WANrouter systems and Compaq DECserver terminal servers, automatically request a downline load of their image upon startup and reboot. One of the functions of a TFTP server.
The change in a clock's time rate over a specified period.
A measure, in Hertz per second, of how quickly the skew of a clock is changing. See also skew.
The automatic rerouting of traffic based on a sensing and analysis of current actual network conditions; not including cases of routing decisions taken on predefined information.
A superset of the BOOTP protocol that enables the automatic assignment of IP addresses to clients on networks from a pool of addresses. The IP address assignment and configuration occurs automatically whenever appropriate client systems (workstations and portable computers) attach to a network. The TCP/IP Services for OpenVMS implementation of DHCP is based on the JOIN product by Competitive Automation.
A type of routing where a host or router talks to adjacent routers to learn what networks each router is connected to. Subsequently, the kernel's routing tables are updated when the router learns new information. There are many routing protocols including Interior Gateway Protocols (RIP, OSPF) and Exterior Gateway Protocols (EGP and BGP).
A port number temporarily assigned to a client process for the duration of a session. When the client process terminates, the port number can be assigned to another process. The port number is usually from 1024 to 5000.
See Exterior Gateway Protocol.
The classification in Internet standards for optional protocols.
The service whereby a computer user can exchange messages with other computer users (or groups of users) by means of a communications network; one of the most popular uses of the Internet.
See electronic mail.
A technique used by layered protocols in which a layer adds header information to the protocol data unit (PDU) from the layer below. As an example, in Internet terminology, a packet would contain a header from the physical layer, followed by a header from the Network layer (IP), followed by a header from the Transport layer (TCP), followed by the application protocol data.
A process of encoding information so the meaning of its content is no longer immediately obvious to anyone who obtains a copy of it.
See end system.
A nonrouting system; can receive data packets addressed to it and send data packets to other systems on the same subnet but cannot relay, route, or forward data packets to other systems.
An individual, manageable piece of a network; has attributes that describe it, a name that identifies it, and an interface that supports management operations.
A collection of entities that share the same properties and have the same parent entity; each member of the class has a unique identifier within the class. Entity classes have class names.
An architecturally defined collection of entities. The entities in the group must have a common top entity and must all be of the same class.
A logical hierarchical tree structures of manageable entities in which child entities are below their parent entities. Children can be accessed only through their parents' agent.
An attribute that specifically identifies an entity. See also attribute group.
A label associated with some entities used to identify or locate them for management purposes.
The subgrouping of an entity that determines its relationship to other entities.
A baseband network medium. Commonly used to connect a local area network.
A measurable network-specific or system-specific occurrence for which a logging component maintains a record.
The classification in Internet standards for protocols that are developed as part of an ongoing research project not related to an operational service offering; not intended for operational use.
The Compaq TCP/IP Services for OpenVMS database with directory names that can be mounted from remote NFS clients.
A file in an exported directory or a subdirectory of an exported directory. See also exporting.
A file system that can be accessed by a remote system using the Network File System. The local system imports the remote file system. Both the remote and local system must be configured to grant and receive access to the file system.
Identifying a directory on an NFS server that can be remotely mounted by NFS clients.
A feature of OpenVMS Alpha Version 7.2 that allows the use of Windows-style file specifications. This feature provides greater flexibility for OpenVMS Alpha systems to store, manage and access files that have names similar to those in a Windows 95 or Windows NT environment.
Multiple LANs connected with data link relays or bridges.
The protocol that distributes routing information to the gateways that interconnect networks.
A class of routing protocols used to exchange routing information within an autonomous system.
One of a class of exterior gateway protocols.
See Fiber Distributed Data Interface.
The operation of two commands that allow a system manager to fetch a value from a data item or to store a value into a data item.
The high-speed (100 mb/s) networking standard based on fiber optics, established by the American National Standards Institute (ANSI); uses 1300 nanometer light wavelength. FDDI networks are limited to approximately 200 km in length, with repeaters every 2 km or less.
A uniquely named collection of information with shared managerial and structural properties.
The characteristic of a file, such as its size or creation date. The values of some file attributes may change during the lifetime of a file.
The information that is stored within a file and comprises its contents (as opposed to its attributes).
System-specific information that identifies a file on its storage system.
The host whose principal purpose is to store files and provide network access to them.
System-specific information that identifies a file on its storage system.
A method for recording, cataloging, and accessing files on a volume.
The protocol and software that permit a user on one host to access and transfer files to and from another host over a network. See also Trivial File Transfer Protocol.
The set of rules that govern the organization of the OpenVMS file system, external to the files themselves.
The utility that provides information about users on local and remote systems.
(1) The function of a receiving entity to limit the amount or rate of data that is sent by a transmitting entity. (2) The control of the rate at which hosts or gateways inject packets into a network or Internet, usually to avoid congestion. Flow control mechanisms can be implemented at various levels and allow communicating layers to match their data transfer and receive rates. Simplistic schemes, like ICMP source quench, simply ask the sender to cease transmission until congestion ends. More complex schemes vary the transmission rate continuously.
The name server that processes recursive requests that a slave server cannot resolve locally; has access to the Internet. See also BIND server, cache server, primary server, secondary server, and slave server.
The table that GATED uses internally to store routing information it learns from routing protocols is a routing table; also known as a routing information base, or RIB. The routing table is used to collect and store routes from various protocols.
The table in the kernel that controls the forwarding of packets is a forwarding table, also known as a forwarding information base, or FIB.
See fully qualified domain name.
A piece of a packet that results from a router dividing an IP datagram into smaller pieces for transmission across a network that cannot handle the original datagram size. Fragments use the same format as datagrams; fields in the IP header declare whether a datagram is a fragment and, if so, where the data in the fragment occurred in the original datagram. IP software at the receiving end must reassemble the fragments. See also maximum transmission unit.
The IP process of breaking up packets into smaller packets for transmission; allows a packet originating in a network that allows a large packet size to traverse a network that limits packets to a smaller size. The destination host reassembles the fragments. See also maximum transmission unit.
A Data Link layer packet that contains the header and trailer information required by the physical medium.
See File Transfer Protocol.
A circuit designed for transmission in both directions at the same time. Contrast with half-duplex circuit.
Data transmission in both directions at the same time. Contrast with half-duplex transmission.
The full site name of a system, such as scryber.enet.dec.com rather than just the host name of scryber.
A parameter in a $QIO system service call that defines the specific function of that $QIO.
A routing daemon that can be configured to route one or more of the following protocols: RIP, BGP, EGP, and OSPF.
A communications device or program that passes data between networks having similar functions but dissimilar implementations. The term router is now used in place of the original definition of gateway.
An intermediate destination by which packets are delivered to their ultimate destination.
A host address of another router that is directly reachable through an attached network. As with any host address it may be specified symbolically.
Another term for an access system.
See GATED.
See group identification.
One billion bits.
One billion bytes.
The identification code for a group of UNIX users.
A circuit designed for transmission in either direction, but only one direction at one time. Contrast with full-duplex circuit.
Data transmission in either direction, but only one direction at a time. Contrast with full-duplex transmission.
The exchange of connection information between two communicating entities; takes place to enable the successful completion of a connection. Used, for example, in establishing a TCP connection between client and server applications.
The address that identifies the connection device between the network controller of a host and the network cable. See also address.
A mechanism that allows you to assign more than one name to a file. Both the new name and the file being linked must be in the same file system. See also link.
The portion of a packet that precedes the actual data and contains control information such as source and destination address and error checking.
A technique used by PPP and SLIP protocols to reduce the number of bytes per frame when sending packets over a slow serial link. The use of header compression is negotiated between the client and servers processes to reduce the size of the IP and TCP headers.
A network consisting of different network protocols or different operating system software, such as OpenVMS and UNIX.
Routing based on domains. Interdomain routers are responsible only for getting data to the right domain and intradomain routers take responsibility for routing within the domain.
The number of connections between two hosts, based on the number of different routers needed to traverse the distance between the two hosts.
A term used in routing. Number of hosts separating a source and final destination (including the final destination) on a network.
A computer system that acts as a source or destination of network messages sometimes called node.
The IP address of any system. Usually specified in dotted-decimal notation. There are four values in the range from 0 to 255 inclusive, separated by dots (.). For example, 132.236.199.63 or 10.0.0.51. It can also be specified as an 8-digit hexadecimal string preceded by 0x. For example, 0x0a000043. In addition, if the options noresolv statement is not specified, this can be a symbolic host name. For example, gated.cornell.edu or nic.ddn.mil. The numeric forms are preferred over the symbolic form.
See host number.
The Compaq TCP/IP Services for OpenVMS database that is created by default; allows users to use host names; contains host names, IP addresses of the hosts, and any alias names for the hosts.
The name given to a network host. See also fully qualified domain name and alias.
The part of an IP address that identifies which host on the network is being addressed.
Also called Transport layer. The second-highest level in the Internet architecture model; provides end-to-end communication services, including mechanisms such as end-to-end reliability and network control. Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) reside in this layer.
See Internet Architecture Board.
The TELNET options that allow TELNET users to connect to hosts that support 3270 terminals.
See Internet Control Message Protocol.
Internet Engineering Task Force. A large international community of network designers, operators, vendors and researchers concerned with the evolution of the Internet architecture and the smooth operation of the Internet. Membership is open to everyone. See the http://www.ietf.org web site for more information.
See Interior Gateway Protocol.
The Internet Message Access Protocol. IMAP enables clients to access email messages and folders from an IMAP server and synchronize them locally. This enables a client to organize email messages and folders without continuous access to the server.
A UNIX internet daemon. A server process listens for client requests for specific services. When inetd receives a request for a service, it starts the appropriate server process.
The first sequence number used for sending or receiving on a connection.
A UNIX file structure used to address a file block. There is a unique inode allocated for each active file with a name made up of a device/i-number pair.
The boundary between two parts of a system across which communication can occur; may be defined through hardware or software.
The host address of an attached network interface. This is the address of a broadcast, nbma, or loopback interface, and the remote address of a point-to-point interface. As with any host address, it can be specified symbolically.
The connection between a router and one of its attached networks. A physical interface can be specified by a single IP address, domain name, or interface name (unless the network is an unnumbered point-to-point network). Multiple levels of reference in the configuration language allow the identification of interfaces by using wildcard, interface type name, or delete word address. Be careful using interface names because future versions might allow more than one address per interface. Dynamic interfaces can be added or deleted and indicated as up or down as well as changes to address, netmask, and metric parameters.
The protocol used to propagate network reachability and routing information within an autonomous system; RIP is among the most popular.
One of a class of routing protocols used to exchange routing information within an autonomous system.
A list of one or more interface names, including wildcard names (names without a number) and names that may specify more than one interface or address, or the token all-for-all interfaces.
An OSI system that performs Internet layer forwarding. A routing system receives data packets from a system on one subnet and passes them on to a system on another subnet; it receives data packets from a source end system, or from the previous intermediate system on the route, and passes them on to the destination end system, or to the next intermediate system on the route.
A shortened form of internetwork; a network of networks; interconnected TCP/IP networks that function as one large virtual network. Differs from the Internet by their lack of connectivity with the global Internet.
The worldwide network of networks and gateways that use the TCP/IP protocol suite and function as one virtual network; provides universal connectivity and three levels of network services: unreliable, connectionless packet delivery; reliable, full-duplex stream delivery; and application level services such as electronic mail that build on the first two. The Internet connects many universities, government research labs, military installations, and private businesses.
A four-layered communications model that consists of the following: Application layer, Transport layer, Internet layer, and Network Interface layer.
The technical body that oversees the development of the Internet suite of protocols (TCP/IP). It has a research task force and an engineering task force, each responsible for investigating a particular area.
A system that consists of a set of gateways, each of which can reach any other gateway in the same system using paths by means of gateways only in that system. The gateways of a system cooperatively maintain a routing database using an interior gateway protocol.
An extension to the Internet Protocol; used by gateways to communicate with the network software in hosts.
An IP header field that indicates the number of 32-bit words making up the Internet header.
The layer in the TCP/IP network model where data is transferred between hosts across networks. Also referred to as Network Interface layer.
See IP address.
A connectionless, best-effort, packet-switching protocol that resides in the Internet layer and has two major functions: internet addressing and fragmentation of messages.
A collection of many different computing systems which communicate with each other. The computing systems can include different hardware architectures, operating systems, and network technologies.
The ability of software and hardware on multiple machines from multiple vendors to communicate meaningfully.
The Internet Network Information Center; organization that provides the Internet community with registration, directory, database, and information services.
A data structure associated with the $QIO system service. The IOSB holds information about how the I/O request completes.
See Internet Protocol.
An address that identifies the connection between the network controller of a node using TCP/IP and the network cable. The 32-bit address is composed of two parts: network number and host number.
The basic unit of information passed across the Internet; contains source and destination addresses, the data, and fields that define the length of the datagram, the header checksum, and flags indicating whether the datagram can be (or has been) fragmented. An IP datagram is to the Internet what a hardware packet is to a physical network. See also datagram.
A configurable kernel option that controls whether a host forwards IP datagrams. Generally, hosts do not forward IP datagrams.
A protocol in which the protocol header follows the data.
A popular implementation of TCP/IP and associated protocols for amateur radio systems.
See kilobits per second.
The software that provides the standard API for application programs. Generally speaking, the kernel embodies the policy and structure of an operating system. In a narrower sense, the kernel provides a programmatic interface to any hardware resources available. In a UNIX system, the kernel is a program that contains the device drivers, the memory management routines, the scheduler, and system calls; always running while the system is operating.
The measure of data transmission rate.
See local area network.
(1) The grouping of related communication functions that provide a well-defined service to a client independently of the protocols and other means used to provide it. (2) A software protocol levels that make up network architectures; each layer performs certain functions for the layers above and below it.
A classification in Internet standards for protocols that are intended for use in limited circumstances; possibly because of their experimental state, specialized nature, limited functionality, or historic state.
The Compaq TCP/IP Services for OpenVMS remote printing services for UNIX and OpenVMS client hosts.
The maximum rate at which data can be reliably transmitted over a line; varies with the capability of the modem or hardware device that performs the transmitting.
A directory entry referring to a file; one file can have several links to it.
The format for storage or transmission of binary data in which the least significant byte comes first. The reverse convention is called big endian.
A TCP/IP Services component that provides configurable, calculated methods for distributing BIND services among systems in a cluster.
The address of a host within a subnet.
The host address of an attached interface. This is the address of a broadcast or loopback interface, and the local address of a point-to-point interface. As with any host address, it can be specified symbolically.
A self-contained group of computers and communications devices (such as modems, routers, servers, and repeaters) that offers a high-speed, reliable communications channel. LANs span a limited distance such as a building or group of buildings, but can be connected to wide area networks (WANs) with gateways. Contrast with wide area network (WAN).
Any data stored locally by a system.
A network directly attached to a host or gateway.
A node at which the user is located.
A subnet directly attached to a host or gateway.
An NFS component that allows an NFS client to lock portions of files that reside on an NFS server.
The ability of nodes to communicate.
A temporary connection between processes on source and destination nodes (or between two processes on the same node).
The upper portion of the Data Link layer that presents a uniform interface to the user of the data link service, usually the Internet layer.
A local node that is associated with a particular address and is treated as if it were a remote node. All traffic to the loop node is sent over the associated address; used for loopback testing.
A program that sends packets to a remote host on the Internet and looks for replies; works by means of the echoing facility provided by the ICMP protocol and is a way to determine if an Internet host is reachable from your host. See also packet internet groper.
See remote line printing or line printer daemon.
A mail gateway that forwards electronic mail between two or more networks while ensuring that the messages it forwards meet certain administrative criteria; specialized form of mail gateway that enforces an administrative policy with regard to what mail it forwards.
The Domain Name System resource record type indicating which host can handle mail for a particular domain or host.
The Compaq TCP/IP Services for OpenVMS implementation of a mail exchanger that allows hosts in a local network to forward mail to systems that might not be directly connected to the local network.
The part of an electronic mail delivery system that allows a message to be delivered to a list of addressees. Users send messages to one address (e.g., hacks@somehost.edu) and the mail exploder handles delivery to the individual mailboxes.
A host that connects two or more electronic mail systems (especially dissimilar mail systems on two different networks) and transfers messages between them.
A series of hosts used to direct electronic mail from one user to another.
A database used by the Simple Network Management Protocol (SNMP) to check network statistics and configurations. An SNMP management station can query a MIB or set it in an SNMP agent (for example, router). Standard, minimal MIBs have been defined (MIB I, MIB II), and vendors often have custom entries. In theory, any SNMP manager can talk to any SNMP agent with a properly defined MIB.
Data that can be accessed by a network management protocol; for, the database maintained by a gateway running SNMP.
The workstation of a network manager running SNMP.
A means of subdividing networks using address modification. A mask is a dotted quad specifying the bits of the destination that are significant. Except when used in a route filter, GATED supports only contiguous masks.
The number of significant bits in the mask.
The root of an OpenVMS file system on a particular physical device.
The name server that is the authority for a specific domain space. See also BIND server.
The largest possible unit of data that can be sent on a given physical medium. See also fragmentation.
See memory buffers.
The portions of memory that act as queues for data arriving at a port before the process is ready to claim that data.
A message block or a series of message blocks that constitute a logical grouping of information; each is delimited by communications control characters.
One of the units used to help a system determine the best route. Metrics may be based on hop count, routing delay, or an arbitrary value set by the administrator depending on the type of routing protocol. Routing metrics may influence the value of assigned internal preferences. See also preference.
See master file directory.
See Management Information Base.
See Management Information Base II.
Multipurpose Internet Mail Extensions; a specification for the transfer of nontext files with regular Internet e-mail.
A protection placed on a file.
A device that translates digital signals (electrical impulses) generated by a computer into analog signals (tones) that can be transmitted over telephone lines, and vice versa.
An NFS process that makes a remote directory available to local users.
A directory on an NFS client that is associated with a remote file system. The directory must exist before NFS can use it as a mount point.
See maximum transmission unit.
Physical networks that support the attachment of multiple (more than two) routers. Each pair of routers on such a network is assumed to be able to communicate directly.
A transmission of network traffic intended for multiple hosts (but not all connected hosts) within a network or internet.
An address that designates a subset of nodes that are all listening for packets destined to this address.
An addressing mode in which a data packet is targeted to a group of nodes that are of the same type, for example, all level 1 routers or all level 2 routers.
A host that has two or more hardware connections to a network; requires multiple IP addresses.
Using a single connection to carry several data streams and the mechanism for assigning these streams to that connection.
A circuit that connects multiple systems.
A network consisting of multiple processors.
See Mail exchange record.
See negative acknowledgment.
The process of mapping a host name to its corresponding address. See also Domain Name System.
The BIND Name Server daemon.
A commonly distributed set of names in which all names are unique.
The response to receipt of a corrupted packet of information. See also acknowledgment.
Another router with which implicit or explicit communication is established by a routing protocol. Neighbors are usually on a shared network, but not always. This term is mostly used in OSPF and EGP. Usually synonymous with peer.
Two routers that have interfaces to a common network. On multiaccess networks, routers are dynamically discovered by OSPF's HELLO protocol.
A group of computer systems that can communicate with each other; can be composed of computers in a single building (local area networks, or LANs), or computers thousands of miles apart (wide area networks or WANs). The Internet is a worldwide collection of computer networks that can intercommunicate.
Any packet-switched network. A network may be specified by its IP address or network name. The host bits in a network specification must be zero. Default may be used to specify the default network (0.0.0.0).
The IP address of a network. Usually specified as a dotted quad, with one to four values in the range of 0 through 255, separated by dots (.); for example, 132.236.199, 132.236, or 10. It can also be specified as a hexadecimal string preceded by 0x with an even number of digits between 2 and 8; for example, 0x??????, 0x???? or 0x0a. Also allowed is the symbolic value default that has the value 0.0.0.0, the default network. If options noresolv statement is not specified, this can also be a symbolic network name. For example, nr-tech-prod, cornellu-net, and arpanet. The numeric forms is preferred over the symbolic form.
A unique identifier of a specific system on a network, usually represented as a number or series of numbers. See also IP address.
The specification of a network's functions and its parts, together with the ways in which the network is organized; specifies the layers of different functions in the network, ranging from data transmission at the lowest levels to user applications at the highest levels.
The order in which bytes of information are sent or received by network applications as opposed to how the bytes are stored in memory by different operating systems and hardware architectures. The standard network byte order is big endian.
A definition of the type of network addressing scheme being used; high-order bits in the network number designate the network class of the IP address.
The Compaq TCP/IP Services for OpenVMS database that allows users to refer to networks by name rather than network number; contains network names, IP addresses for the networks, and any alias names for the networks.
The time it takes to get a unit of data from the source of a transmission to the destination; usually refers to delay from the network and not by system-dependent application processing delays at source and destination nodes.
A HELLO metric. Valid values are from 0 to 30000, inclusive. The value of 30000 is the maximum metric and means unreachable. See metric and HELLO.
The distance (number of hops) between the two nodes in the network with the greatest reachability distance. The reachability distance is the path with the fewest number of hops between two nodes.
A protocol developed by Sun Microsystems that allows a computer system to access files over a network as if they were on its local disks.
A set of services in the Network File System that propagate information out from masters to recipients; used for the maintenance of system files on complex networks.
A device driver that communicates with the IP layer of the TCP/IP protocol suite and the network interface card.
The layer in the TCP/IP architecture model that provides the mechanism for connecting the hosts to the networks.
See MIB-II and Simple Network Management Protocol (SNMP).
A mask used to determine the subnet in the IP address; each bit that is turned on (binary one) in the mask is interpreted as part of the network and subnet address. Synonymous with subnet mask.
A means of subdividing networks using address modification. A mask is a dotted quad specifying the bits of the destination that are significant. Except when used in a route filter, GATED supports only contiguous masks.
The state of complete network overload; the network equivalent of thrashing. See also broadcast storm.
The part of an IP address that designates the network to which the destination host belongs.
The description of how a network performs, as measured against the expectations or requirements of users, customers, designers, or implementors, or as claimed by sales and marketing personnel. The criteria for network performance include parameters such as throughput, response time, and resource utilization.
Information about the state of logical and physical links over which two tasks communicate. A nontransparent task can use this information to take appropriate action under conditions such as third-party disconnections and a partner's exiting before I/O completion.
A nontransparent task that can process multiple inbound connection requests; that is, it has a declared network name or object number.
The protocol that ensures accurate local timekeeping with reference to radio and atomic clocks located on the Internet; capable of synchronizing distributed clocks within milliseconds over long time periods.
See Network File System.
The software that requests remote file services from an NFS server. Client system users access files that physically reside on an NFS server system.
The software that provides remote file services to NFS clients.
A computer system that offers services to NFS clients within an Internet environment; can be a single host, a whole OpenVMS Cluster system, or members of an OpenVMS Cluster system.
See Network Information Service.
A UNIX convention used when file ownership is not known; maps to an account with a UID and GID of -2.
(1) A system on a network; also referred to as a host. (2) One member in an OpenVMS Cluster system.
The required unique numeric identification of a specific node in the network.
The alphanumeric identification associated with the node address for one-to-one mapping.
Nodes without direct lines between them; can communicate only if intermediate systems forward the data along the path between the source and the destination.
A name server's answer is nonauthoritative when the server answer comes from its own cache.
A form of device-dependent I/O that uses system services for network-specific functions; can initiate and complete a logical link connection, exchange messages between two tasks, and terminate the communication process. Application that has direct access to network-specific information and operations, such as optional user data on connects and disconnects and interrupt messages, to monitor the communications process; can receive and process multiple inbound connection requests.
The estimation of the change in a counter value over a specified time period.
The Compaq TCP/IP Services for OpenVMS utility that allows you to interactively query domain name servers (BIND servers) and helps you set up and manage the BIND server software.
See Network Time Protocol.
A message sent over the network that conforms to the Network Time Protocol format. This format includes space for recording the current time. See also poll.
A simple form of modem connection in which only the data interchange circuits, not the modem control circuits, are used.
A TCP/IP Services/NFS method of mounting an NFS file system onto a client mount point that is higher or lower in the directory structure than an active mount.
A single, 8-bit unit of data. A networking term used instead of the term byte because some systems have bytes that are not 8 bits long.
An OpenVMS On-Disk Structure. This is the default disk structure of the OpenVMS operating system.
An OpenVMS On-Disk Structure that is an extension to the existing ODS-2 disk structure. It adds the ability to use extended file names that can be more easily mapped between Windows and OpenVMS. ODS-5 expands the available character set and filename length to be consistent with Windows 95 and Windows NT. ODS-5 also supports deeper directories.
A logical structure given to information stored on a disk or CD-ROM. ODS is a hierarchical organization of files, their data, and the directories needed to gain access to them. The OpenVMS file system implements the On-Disk Structure and provides access control to the files located on the disk.
See operator communication manager.
Messages broadcast by the operator communication manager (OPCOM). These messages are displayed on operator terminals and written to the operator log file. The messages might be general messages that you send, user requests, operator replies, or system events.
The system process that manages operator communication manager (OPCOM) operations.
A network made up of nonproprietary, interoperable systems.
An easy and popular paradigm for implementing the client/server model of distributed computing. In general, the local system (client) sends a request to a remote system (server) to execute a designated procedure, using supplied arguments, and the remote system returns the result to the local system.
A system administration tool for communicating with users and operators on the system.
One of a class of interior gateway protocols, described in more detail in the OSPF section of gated.proto(4).
A nonproprietary, interoperable system with communications software.
A suite of protocols, designed by ISO committees, to be the international standard of computer network architecture.
A configuration of OpenVMS processors in which the network sees the cluster as one system with one name, the cluster alias.
An alias that allows remote hosts to address the cluster members as one host, as well as any cluster member individually.
The OpenVMS files and directories on a mounted OpenVMS volume. These files and directories reside on a Files-11 On-Disk Structure (ODS-2 or ODS-5) disk.
The beginning point of communications on a circuit.
The process of NFS mounting another directory over an existing mount point. The original file system is dismounted from the mount point, and the new file system is mounted.
A unit of data sent across a network.
A program used to test reachability of a destination by sending an ICMP echo request and waiting for a reply. See also loopback.
A condition in which a packet revisits a node. See also aged packet.
The amount of data in a packet.
A communication paradigm in which packets are individually routed between hosts, with no previously established communication path.
The physical lines between source nodes and destination nodes; can comprise a sequence of connected nodes. The path that the data takes through the network is transparent to users.
The sum of the circuit costs along a path between two nodes.
An OSPF (Open Shortest Path First) protocol metric. See metric and OSPF.
The total distance (the number of circuits) between a source node and a destination node, measured in hops. Each line between systems, including routing nodes and end nodes, equals one hop. See also network diameter.
A unique designation that identifies a directory or subdirectory. UNIX path names are composed of a series of fields separated by slashes (/); each field designates a file name that is uniquely contained in the previous field (directory).
The smallest MTU of any data link that packets traverse between two hosts. The path MTU depends upon the route being used at the time. Therefore, the sending path MTU may differ from the receiving path MTU.
A mechanism to determine the path MTU at any one time.
The ability to split the transmission load destined for a single node over several paths of equal path cost. Any destination node receiving data that has been split over several paths must support out-of-order packet caching.
The server software that handles authentication and printing requests from personal computer implementations of NFS.
Another router with which implicit or explicit communication is established by a routing protocol. Peers are often on a shared network. This term is used mostly by Border Gateway Protocol (BGP). Usually synonymous with neighbor.
A unique address of each physical connection of a node to the physical medium.
The Physical layer communications path between two systems.
The Physical layer connectivity that is a result of nodes being attached to each other via active lines and nodes.
See Packet Internet Groper.
A circuit that connects only two nodes. A point-to-point configuration requires a separate physical connection between each pair of nodes. Point-to-point systems communicate directly with other systems. Contrast with multipoint circuit.
A line that connects two systems by using a single circuit.
A method for transmitting datagrams over serial point-to-point lines where a line is established between a remote host (usually over a telephone line) and another host acting as a gateway to a remote host.
The sending of an NTP packet from a host to an NTP time server to request the current time. The server responds by recording the current time in the packet, then sending it back to the originating host. See also NTP packet.
Connecting to another system to check for things such as mail or news.
See Post Office Protocol.
The endpoint of a communication link between two processes.
A UDP or TCP port number. Valid values are from 1 through 65535.
A 16-bit number used to identify applications using TCP or UDP. The number is stored in the Transport layer protocol headers to identify the application.
A service that client programs can use to determine the port number that another service uses. Clients use the Portmapper Service for NFC, PC-NFS, and RPC applications.
To send a message to a mailing list or newsgroup. Distinguished in context from mail.
The TCP/IP-based protocol for client stations to read mail from a server.
See Point-to-Point Protocol.
A host requiring a temporary PPP connection to a dialup provider or a terminal server.
A host that answers modem calls from PPP clients, assigns IP addresses and establishes PPP connections initiated by PPP clients.
A preference is a value from 0 to 255 used to select a route from many routes to the same destination. The route with the best (numerically lowest) preference is selected as the active route. The active route is the one installed in the kernel forwarding table and exported to other protocols. Preference zero is usually reserved for routes to directly attached interfaces. A default preference is assigned to each source from which GATED receives routes.
A contiguous mask covering the most significant bits of an address. The prefix length specifies how many bits are covered.
A BIND name server that maintains the database for a zone; secondary servers copy their information from primary servers. Also called primary master or master server. See also BIND server, cache server, forwarder server, and secondary server.
The Compaq TCP/IP Services for OpenVMS database that maps local queues to printers on remote hosts; specifies local queues for LPD printing from remote hosts. Equivalent to the UNIX /etc/printcap file.
A port in which the remote host has done some level of checking against the application using the port; privileged port numbers range from 1 to 1023.
The context within a system in which a specific computing session occurs; provides the context in which an application executes.
A set of rules that controls the communications between computers. Also, a set of conventions between communicating processes regarding the format and contents of messages to be exchanged.
Protocols can describe low-level details of machine-to-machine interfaces, such as the order in which the bits from a byte are set across a wire, or high-level exchanges between applications programs such as the way in which two programs transfer a file across the Internet.
The unit of data sent across a network. Also called a packet.
The set of data structures and routines that implements a specific protocol and controls the progress of a communication between peer entities.
The part of communications data or processing not directly consumed by the users but necessary to successfully bring about the transfer of user information.
An abstraction that transport protocols use to distinguish among multiple destinations within a given host computer. Internet protocols identify ports using small positive integers. Usually the operating system allows an application program to specify which port it wants to use. Some ports are reserved for standard services such as electronic mail.
The quality in a communications device or system that allows various higher-level protocols to coexist on the same wire. The protocols are transparent to the device or system.
The degree to which users of underlying protocols are aware of the specifics of those protocols.
An ordered list of protocol identifiers.
The set of functions, one at each layer of the protocol stack, that work together to form a set of network services; each layer of the protocol stack uses the services of the module beneath it.
The mechanism whereby one system acts on behalf of another system in responding to protocol requests. uses a proxy mechanism to provide an OpenVMS identity (account) for each UNIX client by adding the name and identification codes of the client to a proxy database.
The technique in which one machine, usually a router, answers Address Resolution Protocol (ARP) requests intended for another machine. By "faking" its identity, the router accepts responsibility for routing packets to the "real" destination. Proxy ARP allows a site to use a single IP address with two physical networks. Normally, creating a subnet is a better solution.
The database that provides OpenVMS identities for remote NFS clients and UNIX-style identities for local NFS client users; provides proxy accounts for remote processes.
A software device used to implement special-purpose transports and not directly associated with hardware.
A method of extending subnet routing using a network interface. Each network interface has one name and at most nine pseudointerface names. Each network interface and pseudointerface has its own IP address, network mask, and broadcast mask.
Intellectual property available to users that does not require payment of a fee.
The OSI equivalent of TOS.
See Reverse Address Resolution Protocol.
See RMT/RCD.
See remote copy program.
The node to which the local node has a usable communications path.
The access right that grants the ability to view data.
The process of piecing together datagram fragments to reproduce the original datagram based on the fragmentation data in the IP header of the datagram.
A routing parameter that can be set to specify the length of time allowed for the reassembly of a message received in fragments. If the reassembly time expires before all fragments are received, the fragments are discarded.
The OpenVMS data management subsystem that defines the rules that govern the internal organization of and the methods of accessing file data.
The ability of a protocol to recover data that is damaged, lost, duplicated, or delivered out of order.
A path name that does not start at the root; default directory is merged with the relative path name to form the absolute path name.
The software that supports the downloading of system images and other types of files to requesting clients.
The program based on the Berkeley UNIX (see BSD) rcmd protocol that permits files to be copied from one computer to another by an extension to the syntax of the UNIX cp (copy) command. (RCP) does not provide the word-length adaptability and flexibility that the FTP protocol does.
The remote printing services for UNIX and OpenVMS client hosts.
A node in the network other than the local node.
A file system that resides on a network host other than the local node.
A programming interface for implementing the client/server model of distributed computing. In general, a request is sent to a remote system to execute a designated procedure, using arguments supplied, and the result returned to the caller. See also ONC RPC.
A program that sends a command, shell, script, or command procedure to a remote host for execution.
A task either executing or originating at a remote host.
A bidirectional device that amplifies or synchronizes signals into standard voltages, currents, and timing; propagates electrical signals from one Ethernet to another without making routing decisions or providing packet filtering; Physical layer intermediate system. See also bridge and router.
A series of documents, begun in 1969, that describes the Internet suite of protocols and related experiments. Very few RFCs describe Internet standards, but all Internet standards are written as RFCs.
A mechanism or process to correlate a network host name into an appropriate network address in support of network applications; a network name resolver. See BIND resolver.
An assigned port that provides services to unknown callers by providing a service contact point; reserved port numbers range from 1 to 255.
A process that enables the recovery of user information lost or corrupted during transfer across an association. Sets the association back to the state it was in at a specified point in the transfer.
A method of error recovery in which stations receiving messages acknowledge the receipt of correct messages and, on receipt of incorrect messages, either do not acknowledge or acknowledge in the negative. The lack of acknowledgment or receipt of a negative acknowledgment indicates to the sending station that it should transmit the failed message again.
The TCP/IP protocol that provides the reverse function of ARP. This protocol maps a physical (hardware) address to an IP address. Often used by diskless nodes when they first initialize to find their Internet address.
An Internet domain that BIND servers use to map IP addresses to domain names.
See Request for Comments.
The TCP/IP standard format for electronic mail message headers; often referred to as "822 messages". The name comes from RFC 822 that contains the specification; previously known as 733 format.
routing database
See Routing Information Protocol.
Remote login: The Berkeley 4.3 BSD service that allows users of one machine to connect to other systems across the Internet and interact as if their terminals are connected the machines directly.
See Record Management Services.
Remote command that allows remote users to access magnetic tapes and CD drives.
The top level directory in a UNIX-style file system; also used to indicate a user (the superuser) who has special privileges. See superuser.
The file protection placed on a container file when it is created.
The element of a path name that identifies the target file system.
An Internet name server that knows about all of the top-level domains on the Internet network; the master servers for the Internet root zone.
The total time during communications that implement a protocol with positive acknowledgments, for a message to be transmitted, arrive at its destination, and its corresponding acknowledgment to be sent and subsequently received by the sender of the original message.
The time it takes for a host to send an NTP packet to another host and get an NTP packet back from that host in reply.
A variable computed during TCP sessions that indicates the total time required to send a TCP segment to a remote host and receive a reply.
The path over the network that information takes to get from one source to its destination.
Data packets not destined for the local node.
The Compaq TCP/IP Services for OpenVMS database that specifies Internet gateways.
See Routing Daemon.
A program that runs under 4.2BSD/4.3BSD UNIX systems (and derived operating systems) to propagate routes among machines on a local area network using the Routing Information Protocol; pronounced "route-dee."
One of a class of interior gateway protocols, described in more detail in the RIP section of gated.proto(4).
A node that can send and forward data to and receive data from other nodes.
A Router Discovery Protocol message sent out by Router Discovery Servers to announce their existence to hosts. The router advertisement contains a list of all router addresses on a given interface and their preferences for use as a default router.
An IETF standard protocol used to inform hosts of the existence of routers. It is used in place of or in addition to statically configured default routes in hosts. The protocol has a server portion that runs on routers, and a client portion that runs on hosts.
A 32-bit number assigned to each router running the OSPF protocol. This number uniquely identifies the router within the autonomous system.
An IP address used as unique identifier assigned to represent a specific router. This is usually the address of an attached interface.
A Router Discovery Protocol message sent out by a host to request router advertisement responses from a router.
A Network layer function, implemented in intermediate systems, that determines the path along which data travels to its destination and the movement of that data. See also decision.
The database that contains routing information, including destination host names, IP addresses for the hosts, gateway host names, and IP addresses for the gateways. There are two route databases: the static route database that is maintained on disk, and the volatile database in memory.
The repository of all of GATED's retained routing information, used to make decisions and as a source for routing information that is propagated.
A set of hosts and routers within a single administrative domain that operates according to the same routing procedures.
The protocol that enables gateways to broadcast their current routing database to hosts and networks that are connected directly to them. software implements the RIP through its dynamic routing Zserver.
One of a class of interior gateway protocols, described in more detail in the RIP section of gated.proto(4).
A protocol sent between routers by which routers exchange information on how to route to various parts of the network. The TCP/IP family of protocols has many of this type of protocol, such as RIP, EGP, BGP, OSPF, and dual IS-IS.
A data structure used by processes to communicate routing information to the kernel. A process can add and delete routes, dump the routing table, and read messages from the kernel. The only type of socket supported in the AF_ROUTE domain is a raw socket.
The repository of all of gated's retained routing information, used to make decisions and as a source for routing information that is propagated.
See remote procedure call and ONC RPC.
Remote shell; a remote utility that enables the user to open a shell session on a remote host.
See run-time library.
See round-trip time.
A collection of OpenVMS procedures available to native mode images at run time; provide support routines for high-level language compilers.
A TCP window scaling option; allows window information to be interpreted as being scaled by 1 to 16 powers of 2, thus increasing the size of the effective window.
A master BIND server that receives authoritative database information from a primary server. Also known as slave server. See also BIND server, cache server, forwarder server, and primary server.
A unit of data exchanged by the TCP modules.
The amount of sequence number space occupied by a segment, including controls that occupy sequence space.
A 32-bit field in the TCP header that contains the sequence number of a sequenced control flag, the first byte of data, or empty segments (The sequence number of the next data octet to be sent).
A device that uses serial transmission; that is, transmits data one bit at a time on a single channel as opposed to parallel transmission, which transmits one or more bits at a time on one or more channels. Typically, terminals and printers are serial devices.
A protocol designed to allow a host to connect to another host over serial lines, such as telephone circuits or RS-232 cables.
A process that offers a service to another process over the network and accepts requests from other processes, known as clients.
(1) A task that an application can carry out. (2) The interface provided by a service element or layer for accessing one or more function.
The boundary at which a layer provides a service to the adjacent higher layer in the network architecture; may vary between implementations.
The means by which a service user and a service provider exchange information.
In network architecture, the service element or layer that provides a set of services to the layer immediately above.
An international standard that describes the functions and service parameters of every service of a service provider.
An application program, service element, or Network layer that uses the services of a service provider.
The Compaq TCP/IP Services for OpenVMS database created by default that contains one entry for each service configured.
An Internet standard protocol for transferring electronic mail messages from one machine to another; specifies how two mail systems interact and the format of control messages they exchange to transfer mail.
The network management protocol of choice for TCP/IP-based internets; allows remote monitoring and management of network devices (particularly routers and servers) from across an Internet.
An interface may be marked as simplex either by the kernel or by the interface configuration. A simplex interface is an interface on a broadcast medium that is not capable of receiving packets it broadcasts.
The GATED daemon takes advantage of interfaces that are capable of receiving their own broadcast packets to monitor whether an interface appears to be functioning properly.
A measure, in Hertz, of the difference between the actual frequency of a clock and what its frequency should be to keep perfect time. See also drift.
A name server that has no access to the Internet and relies on forwarder servers to resolve queries that it cannot resolve locally. As slave servers receive information from forwarder servers, they store that information in their cache. See also cache server, forwarder server, primary server, and secondary server.
To adjust gradually the time of a clock until it tells the correct time. Compare with step.
See Serial Line Internet Protocol
See Structure of Management Information.
See Simple Mail Transfer Protocol.
See Simple Network Management Protocol.
The endpoint of communication to which an IP address and port may be bound. When writing an application, it is a data structure that is part of the Internet pseudodevice created every time an OpenVMS process assigns a communication channel. The other part of the Internet pseudodevice is the device socket.
An application programming interface for implementing TCP/IP protocols. Sometimes called Berkeley Sockets indicating where the API was developed.
The client IP address and port number, and the server IP address and port number that uniquely identify a TCP connection.
The IP header field that contains the IP address of the datagram's point of origin.
A 2-octet value in the TCP or UDP header field that identifies the upper-level application or protocol associated with the data in the segment.
A logical arrangement created by bridges in an extended LAN in which all LANs are connected and there are no loops.
When a router (or group of routers work together) accepts routing information from multiple external networks, but does not pass on information learned from one external network to others. This is an attempt to prevent false routes to a network from being propagated because of gossip or counting to infinity.
The process of mapping one transport connection to several network connections.
A characteristic of a server designed to simplify crash recovery after a server crashes and reboots. The server does not keep track of the status of ongoing client interactions. Servers that do not keep track of client status are called stateless servers.
A routing method by which a system manager manually adds routes to the kernel's routing table. This method is generally used on small networks. On Open VMS systems, you use the SET ROUTE command to add static routes and on UNIX systems, you use the route command.
To change the time of a clock to the correct time with no intermediate adjustments. Compare with slew.
The distance a host running the NTP time daemon is from an external source of Coordinated Universal Time (UTC). A stratum 1 server has direct access to an external source of UTC, such as a radio clock synchronized to a standard time signal broadcast. In general, a stratum n server is n - 1 network hops away from a stratum 1 server. For example, a stratum 4 server is 3 hops away from a stratum 1 server. Also, a stratum n server is at a higher stratum than a stratum n - 1 server. For example, a stratum 3 server is at a higher stratum than a stratum 2 server, and at a lower stratum than a stratum 4 server. See also time daemon.
The type of transport service that allows its client to send data in a continuous stream; guarantees that all data will be delivered to the other end in the same order as sent and without duplicates. Also known as a reliable transport service.
The rules used to define the objects that can be accessed by means of a network management protocol. See also Management Information Base.
An organization of hosts within a network into logical groups. A network can be comprised of several subnets. The portion of a network, which might be a physically independent network, that shares a network address with other portions of the network and is distinguished by a subnet number. A subnet is to a network what a network is to an internet.
A part of the Internet addressing scheme. If a site uses a single IP address for multiple physical networks, there is one subnet address for each physical network. Each such address is composed of the network part of the full address and part of the local part (host).
A bit field in an IP address that denotes the subnet number. The bits making up this field are not necessarily contiguous in the address.
A method of representing the portion of the IP network address that is devoted to subnet address. Each bit that is turned on (binary one) in the mask is interpreted as part of the network and subnet address. Synonymous with network mask. See address mask.
A UNIX user who has been granted special privileges; has an effective UID of 0.
A process that transfers record-oriented data to and from a mass storage device; for example, from disks to printers.
Synonym for daemon.
In the UNIX file system, a symbolic link is a file that contains a pointer to another file or directory. The link (also called a soft link) may be created across a different UNIX file system. Any changes to the file can be seen when you access the file through the file name or through the symbolic link. If you delete the file, the symbolic link will point to a nonexistent file.
Data transmission in which characters are transmitted at a fixed rate. The transmitter and receiver are synchronized, gaining greater efficiency than in asynchronous transmission. Synchronous transmissions send a predetermined group of "sync" characters ahead of a long stream of data. The sync characters enable the communicating devices to synchronize with each other in accordance with a time clock at each end. Contrast with asynchronous transmission.
The rules for formatting or interpreting data.
See terminal access controller.
The intended destination of messages.
See Transmission Control Protocol.
An Internet suite of protocols. See also Transmission Control Protocol and Internet Protocol.
An Internet protocol for remote terminal connection. TELNET allows a user at one site to interact with remote timesharing systems at another site as if the user's terminal were directly connected to the remote host.
A program and hardware that connects terminals to the Internet, usually using dialup modem connections.
A program that allows a computer to emulate a terminal; a workstation thus appears as a terminal to the host.
A device that handles terminal operations for host nodes on a LAN; can be used to connect terminal users to nodes on the same LAN and to users on nodes located off the LAN. Offloads the terminal connection and I/O responsibilities from host nodes, and reduces the number of direct terminal connections to each host, thus saving substantial power, packaging, and cabling expense.
A packet whose destination is the local node.
See Trivial File Transfer Protocol.
(1) A request from an NFS client to the NFS server. (2) A single unit of execution within a program.
A measure of how much data is sent, or can be sent, between two points in a specified unit of time; often used in either of two contexts:
A time value, usually a time interval that can be specified in any one of the following forms:
number A non-negative decimal number of seconds. For example, 27, 60, or 3600. number:number A non-negative decimal number of minutes followed by a seconds value in the range of zero to 59, inclusive. For example, 0:27, 1:00, or 60:00. number:number:number A non-negative decimal number of hours followed by a minutes value in the range of zero to 59, inclusive, followed by a seconds value in the range of zero to 59, inclusive. For example, 0:00:27, 0:01:00, or 1:00:00.
A field in the IP header that indicates how long this packet should be allowed to be forwarded to other routers before being discarded.
The Time To Live (TTL) of an IP packet. Valid values are from 1 to 255 inclusive.
The program running on a host that synchronizes the host's hardware clock to Coordinated Universal Time in accordance with the protocols known as the Network Time Protocol.
A timeout option for the NFS mount command.
TELNET options that allows TELNET users to connect to hosts that support 3270 model terminals.
A type of LAN that has stations wired in a ring, where each station constantly passes a special message (a "token") on to the next; technically referred to as IEEE 802.5.
The architecture of a network. A network topology shows the computers and the links between them within a network.
An IP header field that specifies the importance of a datagram and how to make tradeoffs between delay, throughput, reliability, and cost when the datagram travels across a network. The parameters are mapped into actual service parameters for the particular networks the datagram crosses.
The measurement of data flow, volume, and velocity over a communications link.
Transmitter-receiver; a physical device required in baseband networks that takes the digital signal from a computer or terminal and imposes it on the baseband medium; connects a host interface to a LAN, such as Ethernet.
Network management information carried in an operation; is meaningful only while the operation is being performed.
A network that passes traffic between networks in addition to carrying traffic for its own hosts; must have multiple connections to the internet.
A Transport layer protocol that provides the reliable, full-duplex, stream service on which many application protocols depend. TCP allows a process on one host to send a stream of data to a process on another. It is connection-oriented in the sense that before transmitting data, participants must establish a connection.
The acronym for the suite of application and transport protocols that run over IP, such as FTP, TELNET, and UCP, as well as TCP and IP.
The layer in the TCP/IP architecture model where network traffic is passed between an application on one host and an application on another host.
The Internet protocol for file transfer with minimal capability and minimal overhead. The simple design of the facility is intended for use in application environments that do not require complex interactions among clients and servers. TFTP is a simple service running on top of UDP, using timeout and retransmission to ensure that data arrives. The sending side transmits a 512-byte, fixed-size file, and awaits an acknowledgment for each block before sending the next. The receiver acknowledges each block. See also File Transfer Protocol.
See time to live.
The encapsulation of protocol A within protocol B such that A treats B as though B were a Network Interface layer. Used to get data between administrative domains that use a protocol not supported by the internet connecting those domains.
See user authorization file.
See Management Control Program.
The Compaq TCP/IP Services for OpenVMS network management control software; includes a command-line interface.
See User Datagram Protocol.
See user identification.
An OpenVMS organization of files based on the UNIX operating system. Also known as a container file system.
A program that allows one UNIX system to copy files to or from another UNIX system.
A TFTP server function allowing a TFTP client to transfer data or a program image to the TFTP server's public directories. The opposite function of downline loading.
An OpenVMS file that contains account names and their associated attributes.
An Internet transport protocol. A connectionless, unreliable Transport layer protocol for the exchange of requests and replies between networked hosts. UDP, like TCP, uses IP for message delivery from one host to another; however, unlike TCP, UDP provides for exchange of datagrams without acknowledgments or guaranteed delivery of data. Each UDP message contains the data sent by a user process, a destination port number, and a source port number.
A unique number that identifies a user of a UNIX system. The number along with an associated group identification number (GID) determines file access privileges. UID also tracks accounting statistics and other collected information.
See UNIX-to-UNIX Copy Program.
The network service that allows two processes to communicate as if they were directly connected, regardless of the structure of the underlying subnet.
See wide area network.
A port number assigned for use by a specific network application for connections made with either UDP or TCP. Every implementation of TCP/IP that provides well-known services provides them with the well-known port numbers from 1 to 1023. The Internet Assigned Numbers Authority (IANA) manages the well-known port numbers.
A network, usually constructed with serial lines, which covers large geographic areas.
A method for generalizing parts of a OpenVMS file designation to encompass a set of files by substituting a symbol to represent one or more characters. OpenVMS wildcarding symbols are the percent sign (%) for a single character, and the asterisk (*) for a character string of any length, including zero.
A 2-octet field in a TCP header indicating the number of data octets (relative to the acknowledgment number in the header) that the sender is currently willing to accept.
An access right that grants users the ability to change data.
A subdivision of the Internet hierarchy that starts at a domain and extends down to leaf domains (individual host names) or to domains where other zones begin; usually represents an administrative boundary. Contrast with domain.
A master name server file that describes the domain names for which the server has authority.
The following table shows Compaq TCP/IP Services for OpenVMS acronyms and other acronyms related to open networking:
Acronym | Meaning |
---|---|
ACK | acknowledgment |
ACL | access control list |
ACP | ancillary control process |
ANSI | American National Standards Institute |
API | application programming interface |
ARP | Address Resolution Protocol |
ASCII | American Standard Code for Information Interchange |
ATM | asynchronous transfer mode |
BBS | Bulletin Board System |
BGP | Border Gateway Protocol |
BIND | Berkeley Internet Name Domain |
BOOTP | Bootstrap Protocol |
bps | bits per second |
BSD | Berkeley Software Distribution |
CSLIP | Compressed Serial Line Internet Protocol |
DCE | Distributed Computing Environment |
DCL | DIGITAL Command Language |
DEK | data encryption key |
DES | data encryption standard |
DNS | Domain Name System |
eSNMP | extensible Simple Network Management Protocol |
EGP | External Gateway Protocol |
FDDI | Fiber Distributed Data Interface |
EOF | end of file |
EOL | end of line |
FQDN | fully qualified domain name |
FTP | File Transfer Protocol |
GID | group identification (UNIX) |
IAB | Internet Architecture Board |
ICMP | Internet Control Message Protocol |
IGP | Internal Gateway Protocol |
InterNIC | Internet Network Information Center |
IP | Internet Protocol |
ISDN | Integrated Services Digital Networks |
IVP | installation verification procedure |
Kbps | kilobits per second |
LAN | local area network |
LPD | line printer daemon |
LPR | remote line printing |
MBUF | memory buffer |
MCP | Management Control Program |
MFD | master file directory |
MIB | Management Information Base |
MIB-II | Management Information Base II |
MTU | maximum transmission unit |
MX | Mail exchange |
NAK | negative acknowledgment |
NFS | Network File System |
NIS | Network Information Service |
NOC | Network Operations Center |
NTP | Network Time Protocol |
PDU | protocol data unit |
PING | Packet Internet Groper |
POP | Post Office Protocol |
PPP | Point-to-Point Protocol |
PSDN | Packet Switching Data Network |
PWIP | PATHWORKS Internet Protocol |
RARP | Reverse Address Resolution Protocol |
RCP | remote copy |
REXEC | remote execute |
RFC | Request for Comments |
RLOGIN | remote login |
RIP | Routing Information Protocol |
RMS | Record Management Services |
RPC | remote procedure call |
RSH | remote shell |
RTL | run-time library |
RTT | round-trip time |
SLIP | Serial Line Internet Protocol |
SMI | structure of management information |
SMTP | Simple Mail Transfer Protocol |
SNMP | Simple Network Management Protocol |
TAC | terminal access controller |
TCP | Transmission Control Protocol |
TCP/IP | Transmission Control Protocol/Internet Protocol |
TFTP | Trivial File Transfer Protocol |
TP | Time Protocol |
TTL | time to live |
UAF | user authorization file |
UDP | User Datagram Protocol |
UID | user identification (UNIX) |
UTC | Coordinated Universal Time |
UUCP | UNIX-to-UNIX Copy Program |
WAN | wide area network |
WKS | well-known server |
XDR | external data representation |