You are on page 1of 271

Ap1 Modem Codes

A1.1 AT commands
The AT commands are preceded by the attention code AT. They are:

A Go on-line in answer mode


Instructs the modem to go off-hook immediately and then make a connection
with a remote modem
Bn Select protocol to 300 bpa to 1200 bps
BO Sdects CCITT operation at 300 bps or 1200 bps
Bl Selecrs BELL operation at 300 bps or 1200 bps
D Go on-line in originate mode
Instructs the modem to go off-hook and automatically dials the number con-
tained in the dial string which follows the D command
En Command ec:ho
EO Disable command echo E1 Enables command echo (default)
Fn Selec:t line modulation
FO Sdect auto-detect mode
F1 Sdect V.21 or Bell103
F4 Sdect V.22 or Bell212A 1200 bps
F5 Select V.22bis line modulation.
F6 Sdect V.32bis or V.32 4800 bps line modulation
F7 Sdect V.32bis or V.32 7200 bps line modulation
F8 Sdect V.32bis or V.32 9600 bps line modulation
F9 Sdect V.32bis 12000 line modulation
FlO Select V.32bis 14400 line modulation
Hn Hang-up
HO Go on-hook (hang-up connection)
H 1 Goes off-hook
In Reqaeat product c:ode or R.OM c:beckaam
10 Reports the product code
11/12 Reports the hardware ROM checksum
13 Reports the product revision code
14 Reports response programmed by an OEM
15 Reports the country code number
Ln Control speaker volume
LO Low volume L1 Low volume
L2 Medium volume (default) L3 High volume
Mn Monitor speaker on/of£
MO/M Speaker is always off M1Speaker is off while receiving carrier (default)
M2Speaker is always on M3Speaker is on when dialing but is off at any other
time
Nn Automode enable
NO Automode detection is disabled N1 Automode detection is
enabled
On Return to the on-line state
00 Enters on-line data mode with a retrain
01 Enters on-line data mode without a retrain
P Set pulse dial u default
Q. Result code display
QO Send result codes to the computer
Ql No return codes
Sn Reading and writing to S registers
Sn? Reads the Sn register
Sn=val Writes the value of val to the Sn register
T Set tone dial u default
Vn Selec:t word or digit result code
VO Display result codes in a numeric form
Vl Display result code in a long form (default)
Wa Error correction message control
WO When connected report computer connection speed
Wl When connected report computer connection speed, error
correcting prorocol and line speed
W2 When connected report modem connection speed
Xn Selec:t result c:ode
XO Partial connect message, dial-tone monitor off, busy tone monitor off
Xl Full connect message, dial-tone monitor off, busy tone monitor off
X2 Full connect message, dial-tone monitor on, busy tone monitor off
X3 Full connect message, dial-tone monitor off, busy tone monitor on
X4 Full connect message, dial-tone monitor on, busy tone monitor on
Yn Enables or disables long space disconnection
YO Disables long space disconnect (default)
Yl Enables long space disconnect
Zn Reset
ZO Resets modem and load stored profile 0
Zl Resets modem and load stored profile 1
&:Cn Select DCD options
&CO Sets DCD permanently on
&Cl Use state of carrier ro set DCD (default)
&:Do DTR option
This is used with the &Qn setting to determine the operation of the DTR signal
&DO &Dl &02 &03
&QO a c d
&Ql b c d e
&Q2 d d d d
&Q3 d d d d
&Q4 b c d e
&QS a c d e
&Q6 a c d e
where
a- modem ignore DTR signal
b - modem disconnects and sends OK result code
c- modem goes into command mode and sends OK result code

1724 Handbook of Data Communications and Networks


d- modem disconnects and sends OK result code.
&F Restore factory configuration
&Gn Set guard tone
&GO Disables guard tone (default)
&G 1 Disables guard tone
&G2 Selects 1800 Hz guard tone
8cKn DTE/modem ftow c:ontrol
&KO Disables DTE/DCE flow control
&K3 Enables RTS/CTS handshaking flow control {default)
&K4 Enables XON/XOFF flow control
&KS Enables transparent XON/XOFF flow control
&K6 Enables RTS/CTS and XON/XOFF flow control
&L Line selection
&LO Selects dial-up line operation {default)
&Ll Selects leased line operation
&Mn Communications mode
8tPn Select pulse dialing make/break ratio
&PO Sets a 39/61 make-break ratio at 10 pps (default)
&P1 Sets a 33/67 make-break ratio at 10 pps (default)
&P2 Sets a 39/61 make-break ratio at 20 pps (default)
&P3 Sets a 33/67 make-break ratio at 20 pps (default)
&Q.n Async:hronoas/syndaronoas mode selection
&QOSet direct asynchronous operation
&Q1Set synchronous operation with asynchronous off-line
&Q2Set synchronous connect mode with asynchronous off-line
&Q3Set synchronous connect mode
&QSModem negotiation for error-corrected link
&Q6 Set asynchronous operation in normal mode
8cRn RTS/CTS option
&RO In synchronous mode, CTS changes with RTS {the delay is defined by
the S26 register)
&Rl In synchronous mode,
CTS is always ON
tin DSR option
&SO DSR is always ON (default)
&Sl DSR is active after the answer tone has been detected
&Tn Testing and diap.ostics
&TO Terminates any current test
&T1 Local analogue loopback test
&T2 Local digitalloopback test
&V View configuration profiles
&Wn Store the current c:oa6pration in non-volstile RAM
&WO Writes current settings to profile 0 in nonvolatile RAM
&WI Writes current settings to profile 1 in nonvolatile RAM
8tXn Clock source selection
&XO Selects internal timing, where the modem uses its own clock for
transmitted data
&X1 Selects external timing, where the modem gets its timing from the DTE
(computer)

Modem Codes 1725


&X2 Selects slave receive timing, where the modem gets its timing from the
received signal
&Yn Select default profile
&YO Use profile 0 on power-up (default)
&YI Use profile I on power-up
8cZn Store tdephone numbers
&ZO Store telephone number I &ZI Store telephone number 2
&Z2 Store telephone number 3 &Z3 Store telephone number 4
\An Maximum MNP block size
\AO 64 characters \AI 128 characters
\A2 I92 characters \A3256 characters
\Bn Transmit break
\BI Break length IOO ms \B2 Break length 200 ms
\B3 Break length 300 ms (Default) and so on.
\Gn Modem/modem flow control
\GO Disable (Default) \G I Enable
\]n Enable/disable DTE auto rate adjustment
\]0 Disable \]I Enable
\Kn Break control
\KO Enter on-line command mode with no break signal
\KI Clear data buffers and send a break to the remote modem
\K3 Send a break to the remote modem immediately
\K5 Send a break to the remote modem with transmitted data
\Ln MNP block transfer control
\LO Use stream mode for MNP connection (default)
\Ll Use interactive MNP block mode.

A1.2 Result codes


After the modem has received an AT command it responds with a return code. A com-
plete set of return codes are given in Table Ap I.I.

1726 Handbook of Data Communications and Networks


Table Ap1.1 Modem return codes

Message Digit Description


OK 0 Command cxe urcd without errors
CO NECT I A connection has been made
Rl 2 An incoming call has been detected
NO CARRJER 3 o carrier detected
ERROR 4 Invalid command
CONNE T 1200 5 onnecred to a 1200 bps modem
N DIAL-TONE 6 Dial-tone not detected
BUY 7 Remote line is busy
NOAN WER 8 o answer from remote line
CONNECT600 9 Connected to a 600bps modem
CONNECT 2400 10 Connected to a 2400bps modem
CONNECT 4800 II Connected to a 4800bps modem
CONNECT 9600 13 Connected to a 9600bps modem
CONNECT 14400 15 onnected ro a 14 400bps modem
ONNECT 19200 16 onnected to a 19200bps modem
ONNECT 28400 17 onnccted ro a 28400bps modem
ONNECT 38400 18 onnected to a 38400bps modem
CONNECT 115200 19 onnected to a 115200 bps modem
FAX 33 onnected to a FAX modem in FAX mode
DATA 35 onnected to a data modem in FAX mode
RIER 300 40 onnecred ro V.21 or Bell 103 modem
CARRJER 1200/75 44 nne red ro V.23 backward channel carrier modem
CARRIER 7511200 45 onnected to V.23 forwards channel carrier modem
CARRIER 1200 46 onnected to V.22 or Bell 212 modem
CARRJ ER 2400 47 onnected to V.22 modem
CARRJER 4800 48 Connected to V.32bis 4800 bps modem
CONNECT 7200 49 Connected to V.32bis 7200 bps modem
CONNECT 9600 50 Connected to V.32bis 9600 bps modem
ONNECT 12000 51 Connected to V.32bis 12000 bp modem
ONNECT 14400 52 Connected to V.32bis 14400 bps modem
ONNECT 19200 61 onnecred to a 19 200 bp modem
ONNECT 28800 65 Connected to a 28 800 bps modem
OMP IO : CLA S 5 66 Connecrcd to modem with MNP lass 5 compression
COM PRES ION: V.42bis 67 on nected to a V.42bis modem with comprcs ion
COMPRESSIO : NONE 69 onnection to a modem with no data compression
PROTO OL: NONE 70
PROTO OL: LAPM 77
PROTOCOL: ALT 80

A1.3 S-registers
The modem contains various status registers called the S-registers which store modem
settings. Table Ap 1.2 lists these registers.
Sl4 Bitmapped options
0
Bit 1 EO El
Bit 2 Q.O Q1
Bit3 vo Vl
Bit4 Reserved
Bit 5 T (tone dial) P (pulse dial)
Bit 6 Reserved

Modem Codes 1727


Bit 7 Answer mode Originate mode
S16 Modem test mode register
0
Bit 0 Local analogue loopback Local analogue loopback
terminated test in progress
Bit 2 Local digitalloopback Local digitalloopback
terminated test in progress
Bit3 Remote modem analogue Remote modem analogue
loopback test terminated loopback test in progress
Bit 4 Remote modem digital Remote modem digital
loopback test terminated loopback test in progress
Bit 5 Remote modem digital Remote modem digital
self-test terminated self-test in progress
Bit 6 Remote modem analogue Remote modem analogue
self-test terminated self-test in progress
Bit 7 Unused
521 Bitmapped options
0 1
Bit 0 &JO &J1
Bit 1
Bit 2 &RO &Rl
Bit 5 &CO &Cl
Bit 6 &SO &S1
Bit 7 YO Y1
Bit 4, 3 = 00 &DO
Bit 4, 3 = 01 &D 1
Bit4,3= 10 &D2
Bit 4, 3 = 11 &D3
S22 Speaker/results bitmapped options
Bit 1, 0 = 00 LO
Bit 1, 0 = 01 L1
Bit 1, 0 = 10 L2
Bit 1, 0 = 11 L3
Bit 3, 2 = 00 MO
Bit 3, 2 = 01 Ml
Bit 3, 2 = 10 M2
Bit 3, 2 = 11 M3
Bit 6, 5, 4 = 000 XO
Bit 6, 5, 4 = 001 Reserved
Bit 6, 5, 4 = 010 Reserved
Bit 6, 5, 4 = 011 Reserved
Bit 6, 5, 4 = 100 X1
Bit 6, 5, 4 =101 X2
Bit6,5,4=110 X3
Bit 6, 5, 4 = 111 X4
Bit 7 Reserved
523 Bitmapped options
0 1

1728 Handbook of Data Communications and Networks


Bit 0 &T5 &T4
Bit 3, 2, 1 = 000 300 bps communications rate
Bit 3, 2, 1 = 00 1 600 bps communications rate
Bit 3, 2, 1 = 010 1200 bps communications rate
Bit 3, 2, 1 = 0 11 2400 bps commanicatioas rate
Bit 3, 2, 1 = 100 4800 bps communications rate
Bit 3, 2, 1 = 101 9600 bps communications rate
Bit 3, 2, 1 = 110 19 200 bps communications rate
Bit 3, 2, 1 = 111 Reserved
Bit 5, 4 = 00 Even parity
Bit 5, 4 = 01 Notasccl
Bit 5, 4 = 10 Odd parity
Bit 5, 4 = 11 No parity
Bit 7, 6 = 00 GO
Bit7,6=01 G1
Bit 7, 6 = 10 G2
Bit 7, 6 = 11 G3
S23 Bitmapped optioas
Bit 3, 1, 0 = 000 &MOor &QO
Bit 3, 1, 0 = 001 &M1 or &Q1
Bit 3, 1, 0 = 010 &M2 or &Q2
Bit3, 1, 0 = 011 &M3 or &Q3
Bit 3, 1, 0 = 100 &Q3
Bit 3, 1, 0 = 101 &Q4
Bit3, 1, 0 = 110 &Q.S
Bit3, 1, 0 = 111 &Q6
0 1
Bit 2 8d.O &Ll
Bit6 BO Bl
Bit 5, 4 = 00 XO
Bit 5, 4 = 01 X1
Bit 5, 4 = 10 X2
S28 Bitmapped optioas
Bit 4, 3 = 00 &PO
Bit4, 3 = 01 &P1
Bit4, 3 = 10 &P2
Bit 4, 3 = 11 &P3
S31 Bitmapped optioas
0 1
Bit 1 NO N1
Bit 3, 2 = 00 WO
Bit 3, 2 = 01 W1
Bit 3, 2 = 10 W2
S36 LAPM failure c:ontrol
Bit 2, 1, 0 = 000 Modem disconnect
Bit 2, 1, 0 = 001 Modem stays on line and a direct mode connection
Bit 2, 1, 0 = 010 Reserved
Bit 2, 1, 0 = 0 11 Modem stays on line and normal mode connection is estab-

Modem Codes 1729


lished
Bit 2, 1, 0 = 100 An MNP connection is made, if it fails then the modem dis-
connects
Bit 2, 1, 0 = 101 An MNP connection is made, if it fails then the modem makes
a direct connection
Bit 2, 1, 0 = 110 Reserved
Bit 2, 1, 0 = 111 An MNP connection is made, if it fails then the modem makes
a normal
mode connection
S37 Desired line connection speed
Bit 3, 2, 1, 0 = 0000 Auto mode c:onnec:tion (FO)
Bit 3, 2, 1, 0 = 0001 Modem connects at 300 bps (Fl)
Bit 3, 2, 1, 0 = 0010 Modem connects at 300 bps (Fl)
Bit 3, 2, 1, 0 = 0011 Modem connects at 300 bps (Fl)
Bit 3, 2, 1, 0 = 0100 Reserved
Bit 3, 2, 1, 0 = 0101 Modem connects at 1200 bps (F4)
Bit 3, 2, 1, 0 = 0110 Modem connects at 2400 bps (F5)
Bit 3, 2, 1, 0 = 0111 Modem connects at V.23 (F3)
Bit 3, 2, 1, 0 = 1000 Modem connects at 4800 bps (F6)
Bit 3, 2, 1, 0 = 1001 Modem connects at 9600 bps (F8)
Bit 3, 2, 1, 0 = 1010 Modem connects at 12000 bps (F9)
Bit 3, 2, 1, 0 = 1011 Modem connects at 144000 bps (FlO)
Bit 3, 2, 1, 0 = 1100 Modem connects at 7200 bps (F7)
S39 Flow control
Bit 2, 1, 0 = 000 No flow control
Bit 2, 1, 0 = 011 RTS/CTS (&K3)
Bit 2, 1, 0 = 100 XON/XOFF {&K4)
Bit 2, 1, 0 = 101 Transparent XON (&K5)
Bit 2, 1, o = 110 RTS/CTS and XON/XOFF (&K6)
S39 General bitmapped options
Bit 5, 4, 3 = 000 \KO
Bit 5, 4, 3 = 001 \Kl
Bit 5, 4, 3 = 010 \K2
Bit 5, 4, 3 = 011 \K3
Bit 5, 4, 3 = 100 \K4
Bit 5, 4, 3 = 101 \KS
Bit 7, 6 = 00 MNP 64 character block size (\AO)
Bit 7, 6 = 01 MNP 128 character block size (\AI)
Bit 7, 6 = 10 MNP 192 character block size (\A2)
Bit 7, 6 = 11 MNP 256 character block size (\A3)

1730 Handbook of Data Communications and Networks


Table Ap1.2 Modem registers
Function Rang~ {t.ypicnl rkfou!t]
0 Rings to Auto-answer 0- 255 rings [0 rings]
1 Ring counrer 0-255 rings [0 rings]
2 Escape character 143]
3 Carriage return character [13]
S6 Wait time for dial-tone 2- 255 s [2sJ
7 Wait time for carrier 1- 255 [50s)
8 Pause rime for automatic dialing 0- 255 [2sJ
9 Carrier detect response time 1- 255 in 0.1 s un its [6]
SlO Carrier loss disconnection rime 1- 255 in 0.1 s units [14]
11 DTMF rone duration 50- 255 in 0.001 s units [95]
12 Escape code guard rime 0- 255 in 0.02 s units [50]
13 Reserved
14 General bitmapped options [8Ah (1000 1010b)]
15 Re erved
16 Test mode birmapped options (&T) [OJ
17 Rc erved
18 Test rimer 0- 255 s [OJ
19 20 Reserved
21 V.24/ eneral birmapped option [04h (0000 OIOOb)]
22 peak/results birmapped oprions [75h (0111 010 1b)]
23 General birmapped option [37 h (0011 0111b)]
24 Jeep acrivicy timer 0-255 s [0]
S25 Delay ro DSR off 0-255 s [5J
S26 RTS-CT delay 0-255 in 0.01 s [l]
S27 General bitmapped options [49h (0100 1001b)J
28 General birmapped options [OOhJ
29 Flash dial mod ifier time 0-255 in 10 m [0]
30 Disconnect inacrivicy rimer 0-255 in 10 s [OJ
31 General bitmapped options [02h (0000 OOIOb) J
32 XO character [Cmri- Q, llh (0001 OOOlb)]
33 XOFF character [ mri- S, 13h (0001 0011b))
3 35 Reserved
S36 LAMP fai lure control [7]
37 Line connection speed [0]
38 Delay before forced hang-up 0- 255 s [20)
39 Flow control [3 )
40 General biunapped options [69h (OLIO 1001b))
41 General bitmapped options [3]
42 45 Reserved
46 Data compression control [8Ah (1000 1010b)J
548 V.42 negotiation control [07h (0000 0111b)]
80 oft-switch functions [O]
82 LAPM break conrrol [40h (0 I 00 OOOOb)]
86 al l failure reason code 0- 255
91 P transmit attenuation level 0-15 dBm [10]
92 Fax transmit anenuation level 0- 15dBm [10]
S95 Result code message control [0]
99 Leased line transmit level 0- 15 dBm [10]

Modem Codes 1731


Ap2 ASCII Reference

Ap2.1 Standard ASCII


ANSI defined a standard alphabet known as ASCII. This has since been adopted by the CCITT
as a standard, known as IA5 (International Alphabet No. 5). The following tables define this
alphabet in binary, as a decimal value, as a hexadecimal value and as a character.

Bina Dedmal Hex Character Bina Dedmal Hex Character


00000000 0 00 NUL 00010000 16 10 DLE
00000001 1 01 SOH 00010001 17 11 DC1
00000010 2 02 STX 00010010 18 12 DC2
00000011 3 03 ETX 00010011 19 13 DC3
00000100 4 04 EOT 00010100 20 14 DC4
00000101 5 05 ENQ 00010101 21 15 NAK
00000110 6 06 ACK 00010110 22 16 SYN
00000111 7 07 BEL 00010111 23 17 ETB
00001000 8 08 BS 00011000 24 18 CAN
00001001 9 09 HT 00011001 25 19 EM
00001010 10 OA LF 00011010 26 1A SUB
00001011 11 OB VT 00011011 27 1B ESC
00001100 12 oc FF 00011100 28 1C FS
00001101 13 OD CR 00011101 29 1D GS
00001110 14 OE so 00011110 30 1E RS
00001111 15 OF SI 00011111 31 1F us

Bina Dedmal Hex Character Bina Dedmal Hex Character


00100000 32 20 SPACE 00110000 48 30 0
00100001 33 21 00110001 49 31 1
00100010 34 22 00110010 50 32 2
00100011 35 23 # 00110011 51 33 3
00100100 36 24 $ 00110100 52 34 4
00100101 37 25 %- 00110101 53 35 5
00100110 38 26 & 00110110 54 36 6
00100111 39 27 I 00110111 55 37 7
00101000 40 28 ( 00111000 56 38 8
00101001 41 29 ) 00111001 57 39 9
00101010 42 2A * 00111010 58 3A
00101011 43 2B + 00111011 59 3B
00101100 44 2C 00111100 60 3C <
00101101 45 2D 00111101 61 3D
00101110 46 2E 00111110 62 3E >
00101111 47 2F I 00111111 63 3F ?
Bina Decimal Hex Character Bina Decimal Hex Character
01000000 64 40 @ 01010000 80 50 p
01000001 65 41 A 01010001 81 51 Q
01000010 66 42 B 01010010 82 52 R
01000011 67 43 c 01010011 83 53 s
01000100 68 44 D 01010100 84 54 T
01000101 69 45 E 01010101 85 55 u
01000110 70 46 F 01010110 86 56 v
01000111 71 47 G 01010111 87 57 w
01001000 72 48 H 01011000 88 58 X
01001001 73 49 I 01011001 89 59 y
01001010 74 4A J 01011010 90 SA z
01001011 75 4B K 01011011 91 SB [
01001100 76 4C L 01011100 92 sc \
01001101 77 4D M 01011101 93 5D
01001110 78 4E N 01011110 94 5E
01001111 79 4F 0 01011111 95 SF

Bina Decimal Hex Character Bina Decimal Hex Character


01100000 96 60 01110000 112 70 p
01100001 97 61 a 01110001 113 71 q
01100010 98 62 b 01110010 114 72 r
01100011 99 63 c 01110011 115 73 s
01100100 100 64 d 01110100 116 74 t
01100101 101 65 e 01110101 117 75 u
01100110 102 66 f 01110110 118 76 v
01100111 103 67 g 01110111 119 77 w
01101000 104 68 h 01111000 120 78 X

01101001 105 69 i 01111001 121 79 y


01101010 106 6A 01111010 122 ?A z
01101011 107 6B k 01111011 123 7B
01101100 108 6C l 01111100 124 7C
01101101 109 6D m 01111101 125 7D
01101110 110 6E n 01111110 126 7E
01101111 111 6F 0 01111111 127 7F DEL

1734 Handbook of Data Communications and Networks


Ap2.2 Extended ASCII code
The standard ASCII character has 7 bits and the basic set ranges from 0 to 127. This code is
rather limited as it does not contain symbols such as Greek letters, lines, and so on. For this pur-
pose the extended ASCII code has been defined. This fits into character numbers 128 to 255.
The following four tables define a typical extended ASCII character set.

Bina Dtcima/ Htx Characur Bina Dtcima/ Htx Characttr


10000000 128 80 ~ 10010000 144 90 E
10000001 129 81 u 10010001 145 91 <I!

10000010 130 82 e 10010010 146 92 fi.


10000011 131 83 §. 10010011 147 93 a
10000100 132 84 a 10010100 148 94 6
10000101 133 85 a 10010101 149 95 0
10000110 134 86 A 10010110 150 96 (l

10000111 135 87 <;: 10010111 151 97 il


10001000 136 88 e 10011000 152 98 y
10001001 137 89 e 10011001 153 99 0
10001010 138 SA e 10011010 154 9A u
10001011 139 SB i 10011011 155 9B ¢

10001100 140 sc i 10011100 156 9C E


10001101 141 SD i 10011101 157 90 y
10001110 14 2 BE A 10011110 158 9E &
10001111 143 SF A 10011111 159 9F f

Bina Dtcima/ Htx Character Bina Dtcima/ Htx Characttr


10100000 160 AO a 10110000 176 BO @
10100001 161 A1 i 10110001 177 B1 I
10100010 162 A2 6 10110010 178 B2 I
10100011 163 A3 u 10110011 179 B3 I
10100100 164 A4 fi 10110100 180 B4 1
10100101 165 AS N 10110101 181 BS ~
10100110 166 A6 10110110 182 B6 11
10100111 167 A7 10110111 183 B7 11
10101000 168 A8 l 10111000 184 B8 ~
10101001 169 A9 10111001 185 B9 11
10101010 170 AA 10111010 186 BA II
10101011 171 AB ~ 10111011 187 BB il
10101100 172 AC l( 10111100 188 BC ,!J

10101101 173 AD 10111101 189 BD Jl


10101110 174 AE « 10111110 190 BE J
10101111 175 AF :0 10111111 191 BF

ASCII reference 1735


Bina Decimal Hex Character Bina Decimal Hex Character
11000000 192 co 11010000 208 DO
11000001 193 C1 l. 11010001 209 D1 'f
11000010 194 C2 T 11010010 210 D2 lr
D3 IL
11000011 195 C3 ~ 11010011 211
11000100 196 C4 11010100 212 D4 b
11000101
11000110
197
198
C5
C6
+r 11010101
11010110
213
214
D5
D6
f
lr
11000111 199 C7 I~ 11010111 215 D7 t
11001000
11001001
200
201
CB
C9
1!, 11011000
11011001
216
217
DB
D9
+
If
11001010 202 CA .!!. 11011010 218 DA r
11001011 203 CB 'if 11011011 219 DB I
11001100
11001101
204
205
cc
CD
I~ 11011100
11011101
220
221
DC
DD

I
11001110 206 CE JL
1r 11011110 222 DE I
11001111 207 CF d: 11011111 223 DF I

Bina Decimal Hex Character Bina Decimal Hex Character


11100000 224 EO ex 11110000 240 FO s
11100001 225 E1 !S 11110001 241 F1 ±
11100010 226 E2 r 11110010 242 F2 ~
11100011 227 E3 n 11110011 243 F3 $
11100100 228 E4 ~ 11110100 244 F4 (
11100101 229 E5 a 11110101 245 F5 J
11100110 230 E6 ]..1 11110110 246 F6 +
11100111 231 E7 11110111 247 F7
11101000 232 ES <I> 11111000 248 FS
11101001 233 E9 e 11111001 249 F9
11101010 234 EA Q 11111010 250 FA
11101011 235 EB !) 11111011 251 FB ...J
11101100 236 EC !p 11111100 252 FC
11101101 237 ED II> 11111101 253 FD
11101110
11101111
238
239
EE
EF
E
A
11111110
11111111
254
255
FE
FF

1736 Handbook of Data Communications and Networks


Ap 3 Assigned number values
This section contains information extracted from RFC1700 [Reynolds and Postel] on assigned
number values.

Ap3.1 IP Special addresses


The main forms of IP addresses are:

IF-address { <Network-number>, <Host-number> }

and

IF-address <Network-number>, <Subnet-number>, <Host-number> }

Special addresses are:

{0, 0}. Host on this network. This address can only be used as a source
address
{0, <Host-number>} Host on this network
{ -1, -1}. Limited broadcast. This address can only be used as a destina-
tion address, and should not be forwarded outside the current
sub net.
{<Network-number>, -1} Directed broadcast to specified network. This address can only
be used as a destination address.
{<Network-number>, <Subnet-number>, -1}
Directed broadcast to specified subnet. This address can
only be used as a destination address.
{<Network-number>, -1, -1} Directed broadcast to all subnets of specified subnetted net-
work. This address can only be used as a destination address.
{127, <any>} Internal host loopback address. This address should never ap-
pear outside a host.

where -1 represents an address of all 1's.

IPVersions
Decimal Keyword Version
0 Reserved
1-3 Unassigned
4 IP Internet Protocol
5 ST ST Datagram Mode
6 SIP Simple Internet Protocol
7 TP/IX TP/IX: The Next Internet
8 PIP The P Internet Protocol
9 TUBA TUBA
10-14 Unassigned
15 Reserved
IP protocol numbers
Decimal Keyword Protocol
0 Reserved
1 ICMP Internet Control Message
2 IGMP Internet Group Management
3 GGP Gateway-to-Gateway
4 IP IP in IP (encasulation)
5 ST Stream
6 TCP Transmission Control
7 UCL UCL
8 EGP Exterior Gateway Protocol
9 IGP any private interior gateway
10 BBN-RCC-MON BBN RCC Monitoring
11 NVP-II Network Voice Protocol
12 PUP PUP
13 ARGUS ARGUS
14 EM CON EM CON
15 XNET Cross Net Debugger
16 CHAOS Chaos
17 UDP User Datagram
18 MUX Multiplexing
19 DCN-MEAS DCN Measurement Subsystems
20 HMP Host Monitoring
21 PRM Packet Radio Measurement
22 XNS-IDP XEROX NS IDP
23 TRUNK-1 Trunk-1
24 TRUNK-2 Trunk-2
25 LEAF-1 Leaf-1
26 LEAF-2 Leaf-2
27 RDP Reliable Data Protocol
28 IRTP Internet Reliable Transaction
29 ISO-TP4 ISO Transport Protocol Class 4
30 NETBLT Bulk Data Transfer Protocol
31 MFE-NSP MFE Network Services Protocol
32 MERIT-INP MERIT Internodal Protocol
33 SEP Sequential Exchange Protocol
34 3PC Third Party Connect Protocol
35 IDPR Inter-Domain Policy Routing Protocol
36 XTP XTP
37 DDP Datagram Delivery Protocol
38 IDPR-CMTP IDPR Control Message Transport Proto
39 TP++ TP++ Transport Protocol
40 IL IL Transport Protocol
41 SIP Simple Internet Protocol
42 SDRP Source Demand Routing Protocol
43 SIP-SR SIP Source Route
44 SIP-FRAG SIP Fragment
45 IDRP Inter-Domain Routing Protocol
46 RSVP Reservation Protocol
47 GRE General Routing Encapsulation
48 MHRP Mobile Host Routing Protocol
49 BNA BNA
so SIPP-ESP SIPP Encap Security Payload
51 SIPP-AH SIPP Authentication Header
52 I-NLSP Integrated Net Layer Security TUBA
53 SWIPE IP with Encryption
54 NHRP NBMA Next Hop Resolution Protocol
61 any host internal protocol
62 CFTP CFTP
63 any local network
64 SAT-EXPAK SATNET and Backroom EXPAK
65 KRYPTOLAN Kryptolan
66 RVD MIT Remote Virtual Disk Protocol

1738 Handbook of the Data Communications and Networks


67 IPPC Internet Pluribus Packet Core
68 any distributed file system
69 SAT-MON SATNET Monitoring
70 VISA VISA Protocol
71 IPCV Internet Packet Core Utility
72 CPNX Computer Protocol Network Executive
73 CPHB Computer Protocol Heart Beat
74 WSN Wang Span Network
75 PVP Packet Video Protocol
76 BR-SAT-MON Backroom SATNET Monitoring
77 SUN-ND SUN ND PROTOCOL-Temporary
78 WB-MON WIDEBAND Monitoring
79 WB-EXPAK WIDEBAND EXPAK
80 ISO-IP ISO Internet Protocol
81 VMTP VMTP
82 SECURE-VMTP SECURE-VMTP
83 VINES VINES
84 TTP TTP
85 NSFNET-IGP NSFNET-IGP
86 DGP Dissimilar Gateway Protocol
87 TCF TCF
88 IGRP IGRP
89 OSPFIGP OSPFIGP
90 Sprite-RPC Sprite RPC Protocol
91 LARP Locus Address Resolution Protocol
92 MTP Multicast Transport Protocol
93 AX.25 AX.25 Frames
94 IPIP IP-within-IP Encapsulation Protocol
95 MICP Mobile Internetworking Control Pro.
96 SCC-SP Semaphore Communications Sec. Pro.
97 ETHERIP Ethernet-within-IP Encapsulation
98 ENCAP Encapsulation Header
99 any private encryption scheme
100 GMTP GMTP

Ports
0 Reserved
1 tcpmux TCP Port Service Multiplexer
2 compressnet Management Utility
3 compressnet Compression Process
5 rje Remote Job Entry
7 echo Echo
11 discard Discard
13 systat Active Users
15 daytime Daytime
17 qotd Quote of the Day
18 msp Message Send Protocol
19 chargen Character Generator
20 ftp-data File Transfer [Default Data]
21 ftp File Transfer [Control]
23 telnet Telnet
25 smtp Simple Mail Transfer
27 nsw-fe NSW User System FE
29 msg-icp MSG ICP
31 msg-auth MSG Authentication
33 dsp Display Support Protocol
37 time Time
38 rap Route Access Protocol
39 rlp Resource Location Protocol
41 graphics Graphics
42 nameserver Host Name Server
43 nicname Who Is
44 mpm-flags MPM FLAGS Protocol

Assigned Number Values 1739


45 mpm Message Processing Module
46 mpm-snd MPM [default send]
47 ni-ftp NI FTP
48 auditd Digital Audit Daemon
49 login Login Host Protocol
50 re-mail-ck Remote Mail Checking Protocol
51 la-maint IMP Logical Address Maintenance
52 xns-time XNS Time Protocol
53 domain Domain Name Server
54 xns-ch XNS Clearinghouse
55 isi-gl ISI Graphics Language
56 xns-auth XNS Authentication
58 xns-mail XNS Mail
61 ni-mail NI MAIL
62 a cas ACA Services
64 covia Communications Integrator (CI)
65 tacacs-ds TACACS-Database Service
66 sql*net Oracle SQL*NET
67 bootps Bootstrap Protocol Server
68 bootpc Bootstrap Protocol Client
69 tftp Trivial File Transfer
70 gopher Gopher
71 netrjs-1 Remote Job Service
72 netrjs-2 Remote Job Service
73 netrjs-3 Remote Job Service
74 netrjs-4 Remote Job Service
76 deos Distributed External Object St
78 vettcp vettcp
79 finger Finger
80 www-http World Wide Web HTTP
81 hosts2-ns HOSTS2 Name Server
82 xfer XFER Utility
83 mit-ml-dev MIT ML Device
84 ctf Common Trace Facility
85 mit-ml-dev MIT ML Device
86 mfcobol Micro Focus Cobol
88 kerberos Kerberos
89 su-mit-tg SU/MIT Telnet Gateway
90 dnsix DNSIX Securit Attribute Token
91 mit-dov MIT Dover Spooler
92 npp Network Printing Protocol
93 dcp Device Control Protocol
94 objcall Tivoli Object Dispatcher
95 supdup SUPDUP
96 ixie DIXIE Protocol Specification
97 swift-rvf Swift Remote Vitural File Prot
98 tacnews TAC News
99 metagram Metagram Relay
101 hostname NIC Host Name Server
102 iso-tsap ISO-TSAP
103 gppitnp Genesis Point-to-Point Trans N
104 acr-nema ACR-NEMA Digital Imag. & Comm.
105 csnet-ns Mailbox Name Nameserver
106 3com-tsmux 3COM-TSMUX
107 rtelnet Remote Telnet Service
108 snag as SNA Gateway Access Server
109 pop2 Post Office Protocol - Version 2
110 pop3 Post Office Protocol - Version 3
111 sunrpc SUN Remote Procedure Call
112 mcidas MciDAS Data Transmission Proto
113 auth Authentication Service
114 audionews Audio News Multicast
115 sftp Simple File Transfer Protocol
116 ansanotify ANSA REX Notify

1740 Handbook of the Data Communications and Networks


117 uucp-path UUCP Path Service
118 sqlserv SQL Services
119 nntp Network News Transfer Protocol
120 cfdptkt CFDPTKT
121 erpc Encore Expedited Remote Pro.Ca
122 smakynet SMAKYNET
123 ntp Network Time Protocol
124 ansa trader ANSA REX Trader
125 locus-map Locus PC-Interface Net Map Ser
126 unitary Unisys Unitary Login
127 locus-con Locus PC-Interface Conn Server
128 gss-xlicen GSS X License Verification
129 pwdgen Password Generator Protocol
130 cisco-fna cisco FNATIVE
131 cisco-tna cisco TNATIVE
132 cisco-sys cisco SYSMAINT
133 statsrv Statistics Service
134 ingres-net INGRES-NET Service
135 loc-srv Location Service
136 profile PROFILE Naming System
137 netbios-ns NETBIOS Name Service
138 netbios-dgm NETBIOS Datagram Service
139 netbios-ssn NETBIOS Session Service
140 emf is-data EMFIS Data Service
141 emfis-cntl EMFIS Control Service
142 bl-idm Britton-Lee IDM
143 imap2 Interim Mail Access Protocol
144 news News
145 uaac UAAC Protocol
146 iso-tpO ISO-IPO
147 iso-ip ISO-IP
148 cronus CRONUS-SUPPORT
149 aed-512 AED 512 Emulation Service
150 sql-net SQL-NET
151 hems HEMS
152 bftp Background File Transfer Program
153 sgmp SGMP
154 netsc-prod NETSC
155 netsc-dev NETSC
156 sqlsrv SQL Service
157 knet-cmp KNET/VM Command/Message Protocol
158 pcmail-srv PCMail Server
159 nss-routing NBS-Routing
160 sgmp-traps SGMP-TRAPS
161 snmp SNMP
162 snmptrap SNMPTRAP
163 cmip-man CMIP Manager
164 cmip-agent CMIP Agent
165 xns-courier Xerox
166 s-net Sirius Systems
167 namp NAMP
168 rsvd RSVD
169 send SEND
170 print-srv Network PostScript
171 multiplex Network Innovations Multiplex
172 cl/1 Network Innovations CL/1
173 xyplex-mux Xyplex
174 mailq MAILQ
175 vmnet VMNET
176 genrad-mux GENRAD-MUX
177 xdmcp X Display Manager Control Protocol
178 next step NextStep Window Server
179 bgp Border Gateway Protocol
180 ris Intergraph

Assigned Number Values 1741


181 unify Unify
182 audit Unisys Audit SITP
183 ocbinder OCBinder
184 ocserver OCServer
185 remote-kis Remote-KIS
186 kis KIS Protocol
187 aci Application Communication Inte
188 mumps Plus Five's MUMPS
189 qft Queued File Transport
190 gacp Gateway Access Control Protoco
191 prospero Prospera Directory Service
192 osu-nms OSU Network Monitoring System
193 srmp Spider Remote Monitoring Proto
194 ire Internet Relay Chat Protocol
195 dn6-nlm-aud DNSIX Network Level Module Aud
196 dn6-smm-red DNSIX Session Mgt Module Audit
197 dls Directory Location Service
198 dls-mon Directory Location Service Man
199 smux SMUX
200 src IBM System Resource Controller
201 at-rtmp AppleTalk Routing Maintenance
202 at-nbp AppleTalk Name Binding
203 at-3 AppleTalk Unused
204 at-echo AppleTalk Echo
205 at-5 AppleTalk Unused
206 at-zis AppleTalk Zone Information
207 at-7 AppleTalk Unused
208 at-8 AppleTalk Unused
209 tam Trivial Authenticated Mail Pro
210 z39.50 ANSI Z39.50
211 914c/g Texas Instruments 914C/G Termi
212 anet ATEXSSTR
213 ipx IPX
214 vmpwscs VM PWSCS
215 softpc Insignia Solutions
216 atls Access Technology License Serv
217 dbase dBASE Unix
218 mpp Netix Message Posting Protocol
219 uarps Unisys ARPs
220 imap3 Interactive Mail Access Protocol
221 fln-spx Berkeley rlogind with SPX auth
222 rsh-spx Berkeley rshd with SPX auth
223 cdc Certificate Distribution Center
243 sur-meas Survey Measurement
245 link LINK
246 dsp3270 Display Systems Protocol
344 pdap Prospera Data Access Protocol
345 wserv Perf Analysis Workbench
346 zserv Zebra server
347 fatserv Fatmen Server
348 csi-sgwp Cabletron Management Protocol
371 clearcase Clearcase
372 ulistserv Unix Listserv
373 legent-1 Legent Corporation
374 legent-2 Legent Corporation
375 hassle Hassle
376 nip Amiga Envoy Network Inquiry Pr
377 tnETOS NEC Corporation
378 dsETOS NEC Corporation
379 is99c TIA/EIA/IS-99 modern client
380 is99s TIA/EIA/IS-99 modem server
381 hp-collector hp performance data collector
382 hp-managed-nodehp performance data managed no
383 hp-alarm-mgr hp performance data alarm mana

1742 Handbook of the Data Communications and Networks


384 arns A Remote Network Server System
385 ibm-app IBM Application
386 asa ASA Message Router Object Def.
387 aurp Appletalk Update-Based Routing
388 unidata-ldm Unidata LDM Version 4
389 ldap Lightweight Directory Access P
390 uis UIS
391 synotics-relay SynOptics SNMP Relay Port
392 synotics-brokerSynOptics Port Broker Port
393 dis Data Interpretation System
394 ernbl-ndt EMBL Nucleic Data Transfer
395 netcp NETscout Control Protocol
396 netware-ip Novell Netware over IP
397 mptn Multi Protocol Trans. Net.
398 kryptolan Kryptolan
400 work-sol Workstation Solutions
401 ups Uninterruptible Power Supply
402 genie Genie Protocol
403 de cap decap
404 need need
405 ncld ncld
406 imsp Interactive Mail Support Proto
407 tirnbuktu Tirnbuktu
408 prm-sm Prospera Resource Manager Sys.
409 prm-nm Prospera Resource Manager Node
410 decladebug DECLadebug Remote Debug Protoc
411 rmt Remote MT Protocol
412 synoptics-trap Trap Convention Port
413 smsp SMSP
414 infoseek InfoSeek
415 bnet BNet
416 silverplatter Silverplatter
417 onmux Onmux
418 hyper-g Hyper-G
419 ariel1 Ariel
420 smpte SMPTE
421 ariel2 Ariel
422 ariel3 Ariel
423 ope-job-start IBM Operations Planning and Co
424 ope-job-track IBM Operations Planning and Co
425 icad-el ICAD
426 smartsdp smartsdp
427 svrloc Server Location
428 ocs_cmu OCS CMU
429 ocs amu OCS AMU
430 utmpsd UTMPSD
431 utmpcd UTMPCD
432 iasd IASD
433 nnsp NNSP
434 mobileip-agent MobileiP-Agent
435 mobilip-rnn MobiliP-MN
436 dna-cml DNA-CML
437 comscm com scm
438 dsfgw dsfgw
439 dasp dasp
440 sgcp sgcp
441 decvrns-sysmgt decvrns-sysmgt
442 eve hostd eve hostd
443 https https MCom
444 snpp Simple Network Paging Protocol
445 microsoft-ds Microsoft-DS
446 ddm-rdb DDM-RDB
447 ddm-dfm DDM-RFM
448 ddm-byte DDM-BYTE

Assigned Number Values 1743


449 as-servermap AS Server Mapper
450 tserver TServer
512 exec remote process execution;
513 login remote login
514 cmd like exec, but automatic
515 printer spooler
517 talk like tenex link, but across
518 ntalk
519 uti me unixtime
520 efs extended file name server
525 timed timeserver
526 tempo newdate
530 courier rpc
531 conference chat
532 netnews readnews
533 net wall for emergency broadcasts
539 apertus-ldp Apertus Technologies Load Dete
540 uucp uucpd
541 uucp-rlogin uucp-rlogin Stuart Lynne
543 klogin
544 kshell krcmd
550 new-rwho new-who
555 dsf
556 remotefs rfs server
560 rrnonitor rmonitord
561 monitor
562 chshell chcmd
564 9pfs plan 9 file service
565 whoami whoami
570 meter demon
571 meter udemon
600 ipcserver Sun IPC server
607 nqs nqs
606 urm Cray Unified Resource Manager
608 sift-uft Sender-Initiated/Unsolicited F
609 npmp-trap npmp-trap
610 npmp-local npmp-local
611 npmp-gui npmp-gui
634 ginad ginad
666 mdqs
666 doom doom Id Software
704 elcsd errlog copy/server daemon
709 entrustmanager EntrustManager
729 netviewdm1 IBM NetView DM/6000 Server/Cli
730 netviewdm2 IBM NetView DM/6000 send
731 netviewdm3 IBM NetView DM/6000 receive/tc
741 netgw netGW
742 netrcs Network based Rev. Cont. Sys.
744 flexlm Flexible License Manager
747 fujitsu-dev Fujitsu Device Control
748 ris-cm Russell Info Sci Calendar Mana
749 kerberos-adm kerberos administration
750 rfile
751 pump
752 qrh
753 rrh
754 tell send
758 nlogin
759 con
760 ns
761 rxe
762 quotad
763 cycleserv
764 omserv

1744 Handbook of the Data Communications and Networks


765 webster
767 phonebook phone
769 vid
770 cadlock
771 rtip
772 cycleserv2
773 submit
774 rpasswd
775 entomb
776 wpages
780 wpgs
786 concert Concert
800 mdbs daemon
801 device
996 xtreelic Central Point Software
997 maitrd
998 busboy
999 garcon
1000 cad lock

Multicast
224.0.0.0 Base Address (Reserved)
224.0.0.1 All Systems on this Subnet
224.0.0.2 All Routers on this Subnet
224.0.0.3 Unassigned
224.0.0.4 DVMRP Routers
224.0.0.5 OSPFIGP OSPFIGP All Routers
224.0.0.6 OSPFIGP OSPFIGP Designated Routers
224.0.0.7 ST Routers
224.0.0.8 ST Hosts
224.0.0.9 RIP2 Routers
224.0.0.10 IGRP Routers
224.0.0.11 Mobile-Agents
224.0.0.12-224.0.0.255 Unassigned
224.0.1.0 VMTP Managers Group
224.0.1.1 NTP Network Time Protocol
224.0.1.2 SGI-Dogfight
224.0.1.3 Rwhod
224.0.1.4 VNP
224.0.1.5 Artificial Horizons - Aviator
224.0.1.6 NSS - Name Service Server
224.0.1.7 AUDIONEWS - Audio News Multicast
224.0 .1. 8 SUN NIS+ Information Service
224.0.1.9 MTP Multicast Transport Protocol
224.0.1.10 IETF-1-LOW-AUDIO
224.0.1.11 IETF-1-AUDIO
224.0.1.12 IETF-1-VIDEO
224.0.1.13 IETF-2-LOW-AUDIO
224.0.1.14 IETF-2-AUDIO
224.0.1.15 IETF-2-VIDEO
224.0.1.16 MUSIC-SERVICE
224.0.1.17 SEANET-TELEMETRY
224.0.1.18 SEANET-IMAGE
224.0.1.19 MLOADD
224.0.1.20 any private experiment
224.0.1.21 DVMRP on MOSPF
224.0.1.22 SVRLOC
224.0.1.23 XINGTV
224.0.1.24 microsoft-ds
224.0.1.25 nbc-pro
224.0.1.26 nbc-pfn
224.0.1.27-224.0.1.255 Unassigned
224.0.2.1 "rwho" Group (BSD) (unofficial)

Assigned Number Values 1745


224.0.2.2 SUN RPC PMAPPROC_CALLIT
224.0.3.000-224.0.3.255 RFE Generic Service
224.0.4.000-224.0.4.255 RFE Individual Conferences
224.0.5.000-224.0.5.127 CDPD Groups
224.0.5.128-224.0.5.255 Unassigned
224.0.6.000-224.0.6.127 Cornell ISIS Project
224.0.6.128-224.0.6.255 Unassigned
224.1.0.0-224.1.255.255 ST Multicast Groups
224.2.0.0-224.2.255.255 Multimedia Conference Calls
224.252.0.0-224.255.255.255 DIS transient groups
232.0.0.0-232.255.255.255 VMTP transient groups

IP type of service
TOS Value Description
0000 Default
0001 Minimize Monetary Cost
0010 Maximize Reliability
0100 Maximize Throughput
1000 Minimize Delay
1111 Maximize Security

Type of Service recommended values:

Protocol TOS Value


TELNET (1) 1000 (minimize delay)
FTP
Control 1000 (minimize delay)
Data (2) 0100 (maximize throughput)
TFTP 1000 (minimize delay)
SMTP (3)
Command phase 1000 (minimize delay)
DATA phase 0100 (maximize throughput)
Domain Name Service
UDP Query 1000 (minimize delay)
TCP Query 0000
Zone Transfer 0100 (maximize throughput)
NNTP 0001 (minimize monetary cost)
ICMP
Errors 0000
Requests 0000 (4)
Responses <Same as request> (4)
Any IGP 0010 (maximize reliability)
EGP 0000
SNMP 0010 (maximize reliability)
BOOTP 0000

ICMP type numbers


Type Name
0 Echo Reply
1 Unassigned
2 Unassigned
3 Destination Unreachable
4 Source Quench
5 Redirect
6 Alternate Host Address
7 Unassigned
8 Echo
9 Router Advertisement
10 Router Selection
11 Time Exceeded
12 Parameter Problem

1746 Handbook of the Data Communications and Networks


13 Timestamp
14 Timestamp Reply
15 Information Request
16 Information Reply
17 Address Mask Request
18 Address Mask Reply
19 Reserved (for Security)
20-29 Reserved (for Robustness Experiment)
30 Traceroute
31 Datagram Conversion Error
32 Mobile Host Redirect
33 IPv6 Where-Are-You
34 IPv6 l-Am-Here
35 Mobile Registration Request
36 Mobile Registration Reply
37-255 Reserved

Type Name
0 Echo Reply
Codes
0 No Code
3 Destination Unreachable
Codes
0 Net Unreachable
1 Host Unreachable
2 Protocol Unreachable
3 Port Unreachable
4 Fragmentation Needed and Don't Fragment was Set
5 Source Route Failed
6 Destination Network Unknown
7 Destination Host Unknown
8 Source Host Isolated
9 Communication with Destination Network is
Administratively Prohibited
10 Communication with Destination Host is
Administratively Prohibited
11 Destination Network Unreachable for Type of Service
12 Destination Host Unreachable for Type of Service
4 Source Quench
Codes
0 No Code
5 Redirect
Codes
0 Redirect Datagram for the Network (or subnet)
1 Redirect Datagram for the Host
2 Redirect Datagram for the Type of Service and Network
3 Redirect Datagram for the Type of Service and Host
6 Alternate Host Address
Codes
0 Alternate Address for Host
7 Unassigned
8 Echo
Codes
0 No Code
9 Router Advertisement
Codes
0 No Code
10 Router Selection
Codes
0 No Code
11 Time Exceeded
Codes
0 Time to Live exceeded in Transit
1 Fragment Reassembly Time Exceeded

Assigned Number Values 1747


12 Parameter Problem
Codes
0 Pointer indicates the error
1 Missing a Required Option
2 Bad Length
13 Timestamp
Codes
0 No Code
14 Timestamp Reply
Codes
0 No Code
15 Information Request
Codes
0 No Code
16 Information Reply
Codes
0 No Code
17 Address Mask Request
Codes
0 No Code
18 Address Mask Reply
Codes
0 No Code
30 Traceroute
31 Datagram Conversion Error
32 Mobile Host Redirect
33 IPv6 Where-Are-You
34 IPv6 l-Am-Here
35 Mobile Registration Request
36 Mobile Registration Reply

TCP options
T;Q2e Length DescriEtion
0 End of Option List
1 No-Operation
2 4 Maximum Segment Lifetime
3 3 WSOPT - Window Scale
4 2 SACK Permitted
5 N SACK
6 6 Echo (obsoleted by option 8)
7 6 Echo Reply (obsoleted by option by 8)
8 10 TSOPT - Time Stamp Option
9 2 Partial Order Connection Permited
10 5 Partial Order Service Profile
11 cc
12 CC.NEW
13 CC.ECHO
14 3 TCP Alternate Checksum Request
15 N TCP Alternate Checksum Data
16 Skeeter
17 Bubba
18 3 Trailer Checksum Option

Domain Names
For the Internet (IN) class the following are defined:

TYPE Value Descri12tion


A 1 Host address
NS 2 Authoritative name server
MD 3 Mail destination (Obsolete -
use MX)
MF 4 Mail forwarder (Obsolete - use MX)

1748 Handbook of the Data Communications and Networks


CNAME 5 Canonical name for an alias
SOA 6 Start of a zone of authority
MB 7 Mailbox domain name
MG 8 Mail group member
MR 9 Mail rename domain name
NULL 10 Null RR
WKS 11 Well-known service description
PTR 12 Domain name pointer
HINFO 13 Host information
MINFO 14 Mailbox or mail list information
MX 15 Mail exchange
TXT 16 Text strings
RP 17 For Responsible Person
AFSDB 18 For AFS Data Base location

Mail encoder header types


Keyword Description
ED IFACT EDIFACT format
EDI-X12 EDI X12 format
EVFU FORTRAN format
FS File system format
Hex Hex binary format
LZJU90 LZJU90 format
LZW LZW format
Message Encapsulated Message
PEM Privacy Enhanced Mail
PGP Pretty Good Privacy
Postscript Postscript format
Shar Shell Archive format
Signature Signature
Tar Tar format
Text Text
uuencode uuencode format
URL external URL-reference

BOOTP and DHCP parameters


Tag Name Data Length Meaning
0 Pad 0 None
1 Subnet Mask 4 Subnet Mask Value
2 Time Offset 4 Time Offset in Seconds from UTC
3 Gateways N N/4 Gateway addresses
4 Time Server N N/4 Timeserver addresses
5 Name Server N N/4 IEN-116 Server addresses
6 Domain Server N N/4 DNS Server addresses
7 Log Server N N/4 Logging Server addresses
8 Quotes Server N N/4 Quotes Server addresses
9 LPR Server N N/4 Printer Server addresses
10 Impress Server N N/4 Impress Server addresses
11 RLP Server N N/4 RLP Server addresses
12 Hostname N Hostname string
13 Boot File Size 2 Size of boot file in 512 byte chunks
14 Merit Dump File Client to dump and name the file to dump it to
15 Domain Name N The DNS domain name of the client
16 Swap Server N Swap Server addeess
17 Root Path N Path name for root disk
18 Extension File N Path name for more BOOTP info
19 Forward On/Off 1 Enable/Disable IP Forwarding
20 SrcRte On/Off 1 Enable/Disable Source Routing
21 Policy Filter N Routing Policy Filters
22 Max DG Assembly 2 Max Datagram Reassembly Size
23 Default IP TTL 1 Default IP Time to Live
24 MTU Timeout 4 Path MTU Aging Timeout

Assigned Number Values 1749


25 MTU Plateau N Path MTU Plateau Table
26 MTU Interface 2 Interface MTU Size
27 MTU Subnet 1 All Subnets are Local
28 Broadcast Address 4 Broadcast Address
29 Mask Discovery 1 Perform Mask Discovery
30 Mask Supplier 1 Provide Mask to Others
31 Router Discovery 1 Perform Router Discovery
32 Router Request 4 Router Solicitation Address
33 Static Route N Static Routing Table
34 Trailers 1 Trailer Encapsulation
35 ARP Timeout 4 ARP Cache Timeout
36 Ethernet 1 Ethernet Encapsulation
37 Default TCP TTL 1 Default TCP Time to Live
38 Keepalive Time 4 TCP Keepalive Interval
39 Keepalive Data 1 TCP Keepalive Garbage
40 NIS Domain N NIS Domain Name
41 NIS Servers N NIS Server Addresses
42 NTP Servers N NTP Server Addresses
43 Vendor Specific N Vendor Specific Information
44 NETBIOS Name Srv N NETBIOS Name Servers
45 NETBIOS Dist Srv N NETBIOS Datagram Distribution
46 NETBIOS Note Type 1 NETBIOS Note Type
47 NETBIOS Scope N NETBIOS Scope
48 X Window Font N X Window Font Server
49 X Window Manmager N X Window Display Manager
50 Address Request 4 Requested IP Address
51 Address Time 4 IP Address Lease Time
52 Overload 1 Overloaf "sname 11 or 11 file"
53 DHCP Msg Type 1 DHCP Message Type
54 DHCP Server Id 4 DHCP Server Identification
55 Parameter List N Parameter Request List
56 DHCP Message N DHCP Error Message
57 DHCP Max Msg Size 2 DHCP Maximum Message Size
58 Renewal Time 4 DHCP Renewal (T1) Time
59 Rebinding Time 4 DHCP Rebinding (T2) Time
60 Class Id N Class Identifier
61 Client Id N Client Identifier
62 Netware/IP Domain N Netware/IP Domain Name
63 Netware/IP Option N Netware/IP sub Options
128-154 Reserved
255 End 0 None

Directory system names


Keyword Attribute (X.520 keys)
CN CommonName
L LocalityName
ST StateOrProvinceName
0 OrganizationName
ou OrganizationalUnitName
c CountryName

Content types and subtypes


Type Subtype
text plain
rich text
tab-separated-val
multipart mixed
alternative
digest
parallel
appledouble
header-set

1750 Handbook of the Data Communications and Networks


message rfc822
partial
external-body
news
application octet-stream
postscript
ada
atomicmail
andrew-inset
slate
wita
dec-dx
dca-rft
activemessage
rtf
applefile
mac-binhex40
news-message-id
news-transmission
wordperfectS.l
pdf
zip
macwriteii
msword
remote-printing
image jpeg
gif
ief
tiff
audio basic
video mpeg
quicktime

Character Sets
US-ASCII IS0-8859-1 IS0-8859-2 IS0-8859-3
IS0-8859-4 IS0-8859-5 IS0-8859-6 IS0-8859-7
IS0-8859-8 IS0-8859-9

Access Types
FTP ANON-FTP TFTP AFS
LOCAL-FILE MAIL-SERVER

Conversion Values
?BIT 8BIT BASE64 BINARY
QUOTED-PRINTABLE

MIME I X.400 mapping table


MIME content-type X.400 Body Part
text/plain
charset=us-ascii ia5-text
charset=iso-8859-x Extended Body Part - GeneralText
text/richtext no mapping defined
application/ada Extended Body Part - ODA
application/octet-stream bilaterally-defined
application/postscript Extended Body Part - mime-postscript-body
image/g3fax g3-facsimile
image/jpeg Extended Body Part - mime-jpeg-body
image/gif Extended Body Part - mime-gif-body
audio/basic no mapping defined
video/mpeg no mapping defined

Assigned Number Values 1751


X.400 to MIME Table
X.400 Basic Body Part MIME content-type
ia5-text text/plain;charset~us-ascii
voice No Mapping Defined
g3-facsimile image/g3fax
g4-classl no mapping defined
teletex no mapping defined
videotex no mapping defined
encrypted no mapping defined
bilaterally-defined application/octet-stream
nationally-defined no mapping defined
externally-defined See Extended Body Parts

X.400 Extended body part conversion


X.400 Extended Body Part MIME content-type
General Text text/plain;charset~iso-8859-x
ODA application/oda
mime-postscript-body application/postscript
mime-jpeg-body image/jpeg
mime-gif-body image/gif

lnverseARP
Number 0Eeration Code (OE)
1 REQUEST
2 REPLY
3 request Reverse
4 reply Reverse
5 DRARP-Request
6 DRARP-Reply
7 DRARP-Error
8 InARP-Request
9 InARP-Reply
10 ARP-NAK

Number Hardware Type (hrd)


1 Ethernet (lOMb)
2 Experimental Ethernet (3Mb)
3 Amateur Radio AX.25
4 Proteon ProNET Token Ring
5 Chaos
6 IEEE 802 Networks
7 ARCNET
8 Hyperchannel
9 Lanstar
10 Autonet Short Address
11 Local Talk
12 Local NET
13 Ultra link
14 SMDS
15 Frame Relay
16 Asynchronous Transmission Mode
17 HDLC
18 Fibre Channel
19 Asynchronous Transmission Mode
20 Serial Line
21 Asynchronous Transmission Mode

1752 Handbook of the Data Communications and Networks


IEEE 802 numbers of interest
Link Service Access Point
IEEE Internet
binar;:t binar;:t decimal DescriJ2tion
00000000 00000000 0 Null LSAP
01000000 00000010 2 Indiv LLC Sublayer Mgt
11000000 00000011 3 Group LLC Sublayer Mgt
00100000 00000100 4 SNA Path Control
01100000 00000110 6 Reserved (DOD IP)
01110000 00001110 14 PROWAY-LAN
01110010 01001110 78 EIA-RS 511
01111010 01011110 94 ISI IP
01110001 10001110 142 PROWAY-LAN
01010101 10101010 170 SNAP
01111111 11111110 254 ISO CLNS IS 8473
11111111 11111111 255 Global DSAP

lANA Ethernet address block


The Internet Assigning Numbers Authority (lANA) owns the staning Ethernet address of:

0000 0000 0000 0000 0111 1010 (which is 00-00-5E)

This address can be used with the multicast bit (which is the first bit to the address) to create an
Internet Multicast. It has the form:

1000 0000 0000 0000 0111 1010 xxxx xxxO xxxx xxxx xxxx xxxx

Multicast Bit 0 Internet Multicast


1 = Assigned by IANA for
other uses

This gives an address range from 01-00-5E-OO-OO-OO to 01-00-5E-7F-FF-FF.

Ap3.2 Ethernet vendor address


An Ethernet address is 48 bits. The first 24 bits identifies the manufacturer and the next 24 bits
identifies the serial number. The manufacturer codes include:

oooooc Cisco
OOOOOE Fujitsu
OOOOOF NeXT
000010 Sytek
00001D Cabletron
000020 DIAB
000022 Visual Technology
00002A TRW
000032 GEC Computers Ltd
00005A s & Koch
00005E IANA
000065 Network General
000068 MIPS
000077 MIPS
00007A Ardent

Assigned Number Values 1753


000089 Cayman Systems
000093 Prot eon
00009F Ameristar Technology
OOOOA2 Wellfleet
OOOOA3 NAT
OOOOA6 Network General
OOOOA7 NCD
OOOOA9 Network Systems
OOOOAA Xerox
OOOOB3 CIMLinc
OOOOB7 Dove
OOOOBC Allen-Bradley
ooooco Western Digital
OOOOC5 Farallon phone net card
OOOOC6 HP INO
OOOOC8 Altos
OOOOC9 Emu lex
OOOOD7 Dartmouth College
OOOODD Gould
OOOODE Unigraph
OOOOE2 Acer Counterpoint
OOOOEF Alantec
OOOOFD High Level Hardvare
000102 BBN
001700 Kabel
008064 Wyse Technology
00802D Xylogics, Inc.
00808C Frontier Software Development
0080C2 IEEE 802.1 Committee
0080D3 Shiva
OOAAOO Intel
OODDOO Ungermann-Bass
OODD01 Ungermann-Bass
020701 Racal InterLan
020406 BBN
026086 Satelcom MegaPac
02608C 3Com
02CF1F CMC
080002 3Com
080003 ACC
080005 Symbolics
080008 BBN
080009 Hewlett-Packard
08000A Nestar Systems
08000B Unisys
080011 Tektronix, Inc.
080014 Excel an
080017 NSC
08001A Data General
08001B Data General
08001E Apollo
080020 Sun
080022 NBI
080025 CDC
080026 Norsk Data (Nord)
080027 PCS Computer Systems
080028 TI
08002B DEC
08002E Metaphor
08002F Prime Computer
080036 Intergraph
080037 Fujitsu-Xerox
080038 Bull
080039 Spider Systems

1754 Handbook of the Data Communications and Networks


OB0041 DCA
OB0046 Sony
OB0047 Sequent
OB0049 Univation
OB004C Encore
OB004E BICC
OBOOS6 Stanford University
OBOOSA IBM
OB0067 Comdesign
OB006B Ridge
OB0069 Silicon Graphics
OB006E Concurrent
OB007S DDE
OB007C Vitalink
OBOOBO XIOS
OBOOB6 Imagen/QMS
OBOOB7 Xyplex
OBOOB9 Kinetics
OBOOBB Pyramid
OBOOBD XyVision
OB0090 Retix Inc
B00010 AT&T

Ethernet multicast addresses


An Ethernet multicast address has a multicast bit, a 23-bit vendor identifier part and a 24-bit
vendor assigned part.

Ethernet Type
Address Field Usage
01-00-SE-00-00-00- OBOO Internet Multicast
01-00-SE-7F-FF-FF
01-00-SE-B0-00-00- ???? Internet reserved by IANA
01-00-SE-FF-FF-FF
01-BO-C2-00-00-00 -B02- Spanning tree (for bridges)
09-00-02-04-00-01? BOBO? Vitalink printer
09-00-02-04-00-02? BOBO? Vitalink management
09-00-09-00-00-01 BOOS HP Probe
09-00-09-00-00-01 -B02- HP Probe
09-00-09-00-00-04 BOOS? HP DTC
09-00-1E-00-00-00 B019? Apollo DOMAIN
09-00-2B-00-00-00 6009? DEC MUMPS?
09-00-2B-00-00-01 B039? DEC DSM/DTP?
09-00-2B-00-00-02 B03B? DEC VAXELN?
09-00-2B-00-00-03 B03B DEC Lanbridge Traffic Monitor (LTM)
09-00-2B-00-00-04 ???? DEC MAP End System Hello
09-00-2B-00-00-0S ???? DEC MAP Intermediate System Hello
09-00-2B-00-00-06 B03D? DEC CSMA/CD Encryption?
09-00-2B-00-00-07 B040? DEC NetBios Emulator?
09-00-2B-00-00-0F 6004 DEC Local Area Transport (LAT)
09-00-2B-00-00-1x ???? DEC Experimental
09-00-2B-01-00-00 B03B DEC LanBridge Copy packets
09-00-2B-01-00-01 B03B DEC LanBridge Hello packets
09-00-4E-00-00-02? B137? Novell IPX
09-00-S6-00-00-00- ???? Stanford reserved
09-00-S6-FE-FF-FF
09-00-S6-FF-00-00- BOSC Stanford V Kernel, version 6.0
09-00-S6-FF-FF-FF
09-00-77-00-00-01 ???? Retix spanning tree bridges
09-00-7C-02-00-0S BOBO? Vitalink diagnostics
OD-1E-1S-BA-DD-06 ???? HP
AB-00-00-01-00-00 6001 DEC Maintenance Operation Protocol
AB-00-00-02-00-00 6002 DEC Maintenance Operation Protocol

Assigned Number Values 1755


AB-00-00-03-00-00 6003 DECNET Phase IV end node Hello
AB-00-00-04-00-00 6003 DECNET Phase IV Router Hello packets
AB-00-00-05-00-00 ???? Reserved DEC through
AB-00-03-FF-FF-FF
AB-00-03-00-00-00 6004 DEC Local Area Transport (LAT) - old
AB-00-04-00-xx-xx ???? Reserved DEC customer private use
AB-00-04-01-xx-yy 6007 DEC Local Area VAX Cluster groups
Sys. Communication Architecture (SCA)
CF-00-00-00-00-00 9000 Ethernet Configuration Test protocol
(Loopback)

Ethernet broadcast address


FF-FF-FF-FF-FF-FF 0600 XNS packets, Hello or gateway search?
FF-FF-FF-FF-FF-FF 0800 IP (e.g. RWHOD via UDP) as needed
FF-FF-FF-FF-FF-FF 0804 CHAOS
FF-FF-FF-FF-FF-FF 0806 ARP (for IP and CHAOS) as needed
FF-FF-FF-FF-FF-FF OBAD Banyan
FF-FF-FF-FF-FF-FF 1600 VALID packets, Hello or gateway search?
FF-FF-FF-FF-FF-FF 8035 Reverse ARP
FF-FF-FF-FF-FF-FF 807C Merit Internodal (INP)
FF-FF-FF-FF-FF-FF 809B EtherTalk

1756 Handbook of the Data Communications and Networks


Ap4 HTM L Reference

Ap4.1 Introduction
Characters which are not markup text are mapped directly to strings of data characters. An
ampersand followed by a character reference or a number value can be used to define a
character. Table Ap2.1 defines these characters (the equivalent ampersand character refer-
ence is given in brackets). For example:

Fred&#l74&ampBert&iquest

will be displayed as:

An ampersand is only recognized as markup when it is followed by a letter or a'#' and a


digit:

Fred & Bert

will be displayed as:

Fred & Bert

In the HTML document character set only three control characters are allowed: Horizontal
Tab, Carriage Return, and Line Feed (code positions 9, 13, and 10).

Table Ap4.1 Character mappings

&#00-&#08 Unused &#09 Horizontal tab


&#10 Line feed &#11,&#12 Unused
&#13 Carriage Return &#14-&#31 Unused
&#32 Space &#33 Exclamation mark
&#34 Quotation mark (&quot) &#35 Number sign
&#36 Dollar sign &#37 Percent sign
&#38 Ampersand (&amp) &#39 Apostrophe
&#40 Left parenthesis &#41 Right parenthesis
&#42 Asterisk &#43 Plus sign
&#44 Comma &#45 Hyphen
&#46 Period (full stop) &#47 Solidus
&#48-&#57 Digits0-9 &#58 Colon
&#59 Semi-colon &#60 Less than (&lt)
&#61 Equals sign &#62 Greater than (&gt)
&#63 Question mark &#64 Commercial at
&#65-&#90 LettersA-Z &#91 Left square bracket
&#92 Reverse solidus (\) &#93 Right square bracket
&#94 Caret &#95 Underscore
&#96 Acute accent &#97-&#122 Letters a-z
&# 123 Left curly brace &#124 Vertical bar
&#125 Right curly brace &#126 Tilde
&#127-&#159 Unused
&#160 Non-breaking Space (&nbsp)
&#161 Inverted exclamation, i (&iexcl)
&#162 Cent sign ¢ (&cent)
&#163 Pound sterling£ (&pound)
&#164 General currency sign, c (&curren)
&#165 Yen sign,¥ (&yen)
&#166 Broken vertical bar, I (&brvbar)
&#167 Section sign,§ (&sect)
&#168 Umlaut, ·· (&uml)
&#169 Copyright, © (&copy)
&#170 Feminine ordinal, • (&ordf)
&#171 Left angle quote, « (&laquo)
&#172 Not sign, ..., (&not)
&#173 Soft hyphen, - (&shy)
&#174 Registered trademark,® (&reg)
&#175 Macron accent, - (&macr)
&#176 Degree sign, o (&deg)
&#177 Plus or minus, ± (&pl usmn)
&#178 Superscript two, 2 (&sup2)
&#179 Superscript three, • (&sup3)
&#180 Acute accent, - (&acute)
&#181 Micro sign, ll (&micro)
&#182 Paragraph sign, ~ (&para)
&#183 Middle dot, · (&middot)
&#184 Cedilla, • (&cedil)
&#185 Superscript one, 1 (&supl)
&#186 Masculine ordinal, o (&ordm)
&#187 Right angle quote, » (&raquo)
&#188 Fraction one-fourth,~ (&fracl4)
&#189 Fraction one-half,* (&fracl2)
&#190 Fraction three-fourths, l' (&frac34)
&#191 Inverted question mark, c. (&iquest)
&#192 Capital A, grave accent, A(&Agrave)
&#193 Capital A, acute accent, A (&Aacute)
&#194 Capital A, circumflex accent, A (&Acirc)
&#195 Capital A, tilde, A (&Atilde)
&#196 CapitalA, dieresis, A (&Auml)
&#197 Capital A, ring, A (&Aring)
&#198 CapitalAE dipthong, lE (&AElig)
&#199 Capital C, cedilla, <;: (&Ccedi 1)
&#200 Capital E, grave accent, E (&Egrave)
&#201 Capital E, acute accent, E (&Eacute)
&#202 Capital E, circumflex accent, E (&Ecirc)
&#203 Capital E, dieresis, E (&Euml)

1758 Handbook of Data Communications and Networks


&#204 Capital I, grave accent, i (&!grave)
&#205 Capital I, acute accent, f (&!acute)
&#206 Capital I, circumflex accent, I (&!eire)
&#207 Capital I, dieresis, i (&Iuml)
&#208 Capital Eth, Icelandic, D (&ETH)
&#209 Capital N, tilde, N (&Ntilde)
&#210 Capital 0, grave accent, o (&Ograve)
&#211 Capital 0, acute accent, 6 (&Oacute)
&#212 Capital 0, circumflex accent, 6 (&Ocirc)
&#213 Capital 0, tilde, 6 (&Otilde)
&#214 Capital 0, dieresis, 6 (&Ouml)
&#215 Multiply sign, x (&times)
&#216 Capital 0, slash, 0 (&Oslash)
&#217 Capital U, grave accent, 0 (&Ugrave)
&#218 Capital U, acute accent, u (&Uacute)
&#219 Capital U, circumflex accent, u (&Ucirc)
&#220 Capital U, dieresis or umlaut mark, u (&Uuml)
&#221 Capital Y, acute accent, Y(&Yacute)
&#222 Capital THORN, Icelandic, :t> (&THORN)
&#223 Small sharps, German, JS (&szlig)
&#224 Small a, grave accent, a (&agrave)
&#225 Small a, acute accent, a (&aacute)
&#226 Small a, circumflex accent, a (&acirc)
&#227 Small a, tilde, a (&atilde)
&#228 Small a, dieresis or umlaut mark, a (&auml)
&#229 Small a, ring, a (&aring)
&#230 Small ae dipthong, a:! (&aelig)
&#231 Small c, cedilla,<;: (&ccedil)
&#232 Small e, grave accent, e (&egrave)
&#233 Small e, acute accent, e (&eacute)
&#234 Small e, circumflex accent, e (&ecirc)
&#235 Small e, dieresis or umlaut mark, e (&euml)
&#236 Small i, grave accent, i:. (&igrave)
&#237 Small i, acute accent, i (&iacute)
&#238 Small i, circumflex accent, i (&icirc)
&#239 Small i, dieresis or umlaut mark, i (&iuml)
&#240 Small eth, Icelandic, o (&eth)
&#241 Small n, tilde, fi (&ntilde)
&#242 Small o, grave accent, o (&ograve)
&#243 Small o, acute accent, 6 (&oacute)
&#244 Small o, circumflex accent, 6 (&ocirc)
&#245 Small o, tilde, 5 (&otilde)
&#246 Small o, dieresis or umlaut mark, 6 (&ouml)
&#247 Division sign, + (&divide)
&#248 Small o, slash, 0 (&oslash)
&#249 Small u, grave accent, u (&ugrave)
&#250 Small u, acute accent, u (&uacute)
&#251 Small u, circumflex accent, u (&ucirc)

HTML reference 1759


&#252 Small u, dieresis or umlaut mark, u (&uuml)
&#253 Small y, acute accent, y (&yacute)
&#254 Small thorn, Icelandic, p (&thorn),
&#255 Small y, dieresis or umlaut mark, y (&yuml)

The following gives a script which generates the range of the characters:

<script>
var i;
for (i=l;i<256;i++)
document.write("&#" + i);
</script>

and a sample run is:

:::::::: c::::::::::::::::: I"=S '0*-.- 0 012ll56"89.<=>?


~ABCDEFG HIJKD'C\OPQRSTI..\'\\""\l.'"Z[) _·abcdefgbijklmnopqrstu\"\\-:t)'l{ }-:e: ./... +;-•oo
.CE:.Z: C""".-'T~s,cz:fY 1c£.:::9 § e,•,.-t-=
=" ·11r .• ,.,,;.v,v.~.4A.i..AAAJE<;lliE:rliiDx6666o · OL-Li.l...i1> Baaaam~eeeeiilioaooooo-o\niiru)py

Ap4.1.1 Tags

Tags are used to delimit elements such as headings, paragraphs, lists, character highlighting
and links. Normally an HTML element consists of a start-tag, which gives the element name
and attributes, followed by the content and then the end tag. A start-tags is defined between
a'<' and'>', and end tags between a '<I' and'>'. For example to display text as bold:

<B>Header Level 1</B>

Some of the HTML only require a single start tag, these include:

</BR> Line break. </P> Paragraph.


</LI> List Item. </DT> Definition term.
</DD> Definition Description.

Element content is a sequence of data character strings and nested elements. Some ele-
ments, such as anchors, cannot be nested.
Ap4.1.2 Names

Names consist of a letter followed by letters, digits, periods or hyphens (normally limited to
72 characters). Entity names are case sensitive, but element and attribute names are not.

1760 Handbook of Data Communications and Networks


For example:

'<FONT>', '<Font>', and '<font>'

are equivalent, but

'&1 t' is different from '&LT'.

Start-tags always begin directly after the opening delimiter('<').


Ap4.1.3 AHrlbutes
In a start-tag, white space and attributes are allowed between the element name and the
closing delimiter. Attributes typically consist of an attribute name, an equal sign, and a
value, which can be:

• A string literal, delimited by single quotes or double quotes and not containing any oc-
currences of the delimiting character.
• A name token (a sequence ofletters, digits, periods, or hyphens). Name tokens are not
case sensitive.
Ap4.1.4 Comments
Comments are defined with a'<!' and ends with a'>'. Each comment starts with'--' and
includes all text up to and including the next occurrence of'--'. When defining a comment,
white space is allowed after each comment, but not before the first comment. The entire
comment declaration is ignored.

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">


<HEAD>
<TITLE>Comment Document</TITLE>
<!-- Comment field 1 -->
<!-- Comment field 2 -->
<!>
</HEAD> <BODY>

Ap4.1.5 HTML Public Text Identifiers


Documents that conform to the HTML 2.0 specification can include the following line at the
start of the document:

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">

Ap4.2 Document structure and block structuring


An HTML document is a tree of elements, including a head and body, headings, paragraphs,
lists, and so on. These include:

<HTML> Document element. Consists of a head and a body. The head contains the
title and optional elements, and the body is the main text consisting of
paragraphs, lists and other elements.
<HEAD> Head element. An unordered collection of information about the docu-

HTML reference 1761


ment.
<TITLE> Title. Identifies the contents of the document in a global context.
<BASE> Base address. Provides a base address for interpreting relative URLs when
the document is read out of context.
<IS INDEX> Keyword index. Indicates that the user agent should allow the user to
search an index by giving keywords.
<LINK> Link. Represents a hyperlink (see Hyperlinks) and has the same attributes
as the <A> element.
<META> Associated meta-information. A container for identifying specialized
document meta-information.
<BODY> Body element. Contains the text flow of the document, including head-
ings, paragraphs, lists, etc.
<Hl> ... <H6> Headings. The six heading elements, <Hl> to <H6> identify section head-
ings. Typical renderings are:
HI Bold, very-large centered font. One or two blank lines above and
below.
HZ Bold, large flush -left font. One or two blank lines above and below.
H3 Italic, large font, slightly indented from the left margin. One or two
blank lines above and below.
H4 Bold, normal font, indented more than H3. One blank line above
and below.
HS Italic, normal font, indented as H4. One blank line above.
H6 Bold, indented same as normal text, more than HS. One blank line
above.
<P> Paragraph. Indicates a paragraph. Typically, paragraphs are surrounded
by a vertical space of one line or half a line. The first line in a paragraph is
indented in some cases.
<PRE> Preformatted text. Represents a character cell block of text and can be
used to define monospaced font. It may be used with the optional WIDTH
attribute, which specifies the maximum number of characters for a line.
<ADDRESS> Address. Contains information such as address, signature and authorship.
It is often used at the beginning or end of the body of a document.
<BLOCKQUOTE>
Block quote. Contains text quoted from another source. A typical render-
ing is a slight extra left and right indent, and/or italic font, and typically
provides space above and below the quote.
<UL>, <LI> Unordered List. <UL> represents a list of items and is typically rendered as
a bulleted list. The content of a <UL> element is a sequence of <LI> ele-
ments.
<OL> Ordered List. <0L> represents an ordered list of items which are sorted by
sequence or order of importance and is typically rendered as a numbered
list. The content of a <OL> element is a sequence of <LI> elements.
<DIR> Directory List. <DIR> is similar to the <UL> element and represents a list
of short items. The content of a <DIR> element is a sequence of <LI> ele-
ments.
<MENU> Menu List. <MENU> is a list of items with typically one line per item. It is
typically a more compact than an unordered list. The content of a
<MENU> element is a sequence of <LI> elements.
<DL>, <DT>, <DD>
Definition list. Lists terms and corresponding definitions. Definition lists
are typically formatted with the term flush-left and the definition, format-
ted paragraph style, indented after the term. The content of a <DL>
element is a sequence of <DT> elements and/or <DD> elements, usually
in pairs.
<CITE> Citation. <CITE> is used to indicate the title of a book or other citation. It is

1762 Handbook of Data Communications and Networks


typically rendered as italics.
<CODE> Code. <CODE> indicates an example of code and is typically rendered in a
mono-spaced font. It is intended for short words or phrases of code.
<EM> Emphasis. <EM> indicates an emphasized phrase and is typically rendered
as italics.
<KBD> Typed text. <KBD> indicates text typed by a user and is typically rendered
in a mono-spaced font.
<SAMP> literal characters. <SAMP> indicates a sequence of literal characters and is
typically rendered in a mono-spaced font.
<STRONG> Strong emphasis. <STRONG> indicates strong emphasis and is typically
rendered in bold.
Placeholder variable. <VAR> indicates a placeholder variable and is typi-
cally rendered as italic.
<B> Bold. <B> indicates bold text.
<I> Italic. <I> indicates italic text.
<Tf> Teletype. <Tf> indicates teletype (monospaced) text.
<.A> Anchor. The <.A> element indicates a hyperlink. Attributes of the <.A> ele-
ment are:
HREF URI of the head anchor of a hyperlink.
NAME Name of the anchor.
TITLE AdviSOry title of the destination resource.
REL The REL attribute gives the relationship(s) described by the hy-
perlink.
REV Same as the REL attribute, but the semantics of the relationship
are in the reverse direction.
URN Specifies a preferred, more persistent identifier for the head an-
chor of the hyperlink.
METHODS
Specifies methods to be used in accessing the destination, as a
whitespace-separated list of names.
<BR> Line Break. <BR> specifies a line break between words.
<HR> Horizontal Rule. <HR> is a divider between sections of text and is typically
a full width horizontal rule.
<IMG> Image. <IMG> refers to an image or icon. Attributes are:
AllGN alignment of the image with respect to the text baseline:
• 'TOP' specifies that the top of the image aligns with the tallest item on
the line containing the image.
• 'MIDDLE' specifies that the center of the image aligns with the base-
line of the line containing the image.
• 'BOTIOM' specifies that the bottom of the image aligns with the base-
line of the line containing the image.
ALT Text to use in place of the referenced image resource.
ISMAP Indicates an image map.
SRC Specifies the URI of the image resource.

Ap4.3 Elements
!DOCTYPE A ACRONYM ADDRESS APPLET AREA
B BASE BASEFONT BOO BGSOUND BIG
BLOCKQUOTE BODY BR BUTTON CAPTION CENTER
CITE CODE COL COLGROUP COMMENT custom
DD DEL DFN DIR DIV DL
DT EM EMBED FIELDSET FONT FORM

HTML reference 1763


FRAME FRAMESET HEAD Hn HR HTML
HTML Comment IFRAME IMG INPUT
INPUT type=button INPUT type=checkbox
INPUT type=file INPUT type=hidden
INPUT type=image INPUT type=password
INPUT type=radio INPUT type=reset
INPUT type=submit INPUT type=text
INS ISINDEX KBD
lABEL LEGEND LI LINK LISTING MAP
MARQUEE MENU META NOBR NOFRAMES NOSCRIPT
OBJECT OL OPTION p PARAM PLAINTEXT
PRE Q RT RUBY S SAMP
SCRIPT SELECT SMALL SPAN STRIKE STRONG
STYLE SUB SUP TABLE TBODY TD
TEXTAREA TFOOT TH THEAD TITLE TR
TT u UL VAR WBR XML
XMP

Ap4.4 ISO Lati n-1 Character Set


The following defines the ISO Latin-I character set, which corresponds to the first 256 char-
acters of Unicode.

Character Decimal Named entity Description


code
&#00; Unused
&#01; Unused
&#02; Unused
&#03; Unused
&#04; Unused
&#05; Unused
&#06; Unused
&#07; Unused
&#08; Unused
&#09; Horizontal tab
&#10; Line feed
&#ll; Unused
&#12; Unused
&#13; Carriage Return
&#14; Unused
&#15; Unused
&#16; Unused
&#17; Unused
&#18; Unused
&#19; Unused
&#20; Unused
&#21; Unused
&#22; Unused

1764 Handbook of Data Communications and Networks


&#23; Unused
&#24; Unused
&#25; Unused
&#26; Unused
&#27; Unused
&#28; Unused
&#29; Unused
&#30; Unused
&#31; Unused
&#32; Space
&#33; Exclamation mark
&#34; &quot; Quotation mark
# &#35; Number sign
$ &#36; Dollar sign
% &#37; Percent sign
& &#38; &amp; Ampersand
&#39; Apostrophe
&#40; Left parenthesis
&#41; Right parenthesis
&#42; Asterisk
+ &#43; Plus sign
&#44; Comma
&#45; Hyphen
&#46; Period (fullstop)
&#47; Solidus (slash)
0 &#48; Digit 0
&#49; Digit l
2 &#50; Digit 2
3 &#51; Digit3
4 &#52; Digit 4
5 &#53; Digit 5
6 &#54; Digit 6
7 &#55; Digit 7
8 &#56; Digit 8
9 &#57; Digit 9
&#58; Colon
&#59; Semicolon
< &#60; &It; Less than
&#61; Equals sign
> &#62; &gt; Greater than
&#63; Question mark
@ &#64; Commercial at
A &#65; Capital A
B &#66; Capital B
c &#67; Capital C
D &#68; Capital D
E &#69; Capital E
F &#70; Capital F

HTML reference 1765


G &#71; Capital G
H &#72; Capital H
I &#73; Capital I
J &#74; Capital J
K &#75; Capital K
L &#76; Capital L
M &#77; Capital M
N &#78; CapitalN
0 &#79; Capital 0
p &#80; Capital P
Q &#81; Capital Q
R &#82; Capital R
s &#83; CapitalS
T &#84; Capital T
u &#85; Capital U
v &#86; Capital V
w &#87; CapitalW
X &#88; Capital X
y &#89; Capital Y
z &#90; Capital Z
[ &#91; Left square bracket
&#92; Reverse solidus (backslash)
&#93; Right square bracket
1\ &#94; Caret
&#95; Horizontal bar (underscore)
&#96; Acute accent
a &#97; Small a
b &#98; Small b
c &#99; Smallc
d &#100; Smalld
e &#101; Small e
f &#102; Small f
g &#103; Smallg
h &#104; Smallh
&#105; Small i
j &#106; Smallj
k &#107; Smallk
&#108; Small!
m &#109; Smallm
n &#llO; Smalln
0 &#ll1; Small o
p &#ll2; Small p
q &#ll3; Small q
r &#ll4; Smallr
&#ll5; Smalls
&#ll6; Small t
u &#ll7; Small u
v &#ll8; Small v

1766 Handbook of Data Communications and Networks


w &#119; Smallw
X &#120; Smallx
y &#121; Smally
z &#122; Smallz
&#123; Left curly brace
&#124; Vertical bar
&#125; Right curly brace
&#126; Tilde
&#127; Unused
&#160; &nbsp; Nonbreaking space
&#161; &iexcl; Inverted exclamation
¢ &#162; &cent; Cent sign
£ &#163; &pound; Pound sterling
II &#164; &curren; General currency sign
¥ &#165; &yen; Yen sign
&#166; &brvbar; or &brkbar; Broken vertical bar
§ &#167; &sect; Section sign
&#168; &uml; or &die; Direresis I Umlaut
© &#169; &copy; Copyright
&#170; &ordf; Feminine ordinal
<< &#171; &laquo; Left angle quote, guillemot left
&#172; &not Not sign
&#173; &shy; Soft hyphen
® &#174; &reg; Registered trademark
&#175; &macr; or &hibar; Macron accent
&#176; &deg; Degree sign
± &#177; &plusmn; Plus or minus
&#178; &sup2; Superscript two
&#179; &sup3; Superscript three
&#180; &acute; Acute accent
l1 &#181; &micro; Micro sign
•r &#182; &para; Paragraph sign
&#183; &middot; Middle dot
&#184; &cedil; Cedilla
&#185; &sup1; Superscript one
&#186; &ordm; Masculine ordinal
)) &#187; &raquo; Right angle quote, guillemot right
lJo &#188; &frac14; Fraction one-fourth
'h &#189; &frac12; Fraction one-half
% &#190; &frac34; Fraction three-fourths
i &#191; &iquest; Inverted question mark
A &#192; &Agrave; Capital A, grave accent
A &#193; &Aacute; Capital A, acute accent
A &#194; &Acirc; Capital A, circumflex
A &#195; &Atilde; Capital A, tilde
A &#196; &Auml; Capital A, direresis I umlaut
A &#197; &Aring; Capital A, ring
}E &#198; &AElig; Capital AE ligature

HTML reference 1767


c;: &#199; &Ccedil; Capital C, cedilla
E &#200; &Egrave; Capital E, grave accent
E &#201; &Eacute; Capital E, acute accent
~ &#202; &Ecirc; Capital E, circumflex
E &#203; &Euml; Capital E, direresis I umlaut
l &#204; &Igrave; Capital I, grave accent
f &#205; &Iacute; Capital I, acute accent
I &#206; &Icirc; Capital I, circumflex
r &#207; &Iuml; Capital I, direresis I umlaut
D &#208; &ETH; Capital Eth, Icelandic
N &#209; &Ntilde; Capital N, tilde
0 &#210; &Ograve; Capital 0, grave accent
6 &#211; &Oacute; Capital 0, acute accent
0 &#212; &Ocirc; Capital 0, circumflex
0 &#213; &Otilde; Capital 0, tilde
0 &#214; &Ouml; Capital 0, direresis I umlaut
X &#215; &times; Multiply sign
0 &#216; &Oslash; Capital 0, slash
u &#217; &Ugrave; Capital U, grave accent
u &#218; &Uacute; Capital U, acute accent
0 &#219; &Ucirc; Capital U, circumflex
0 &#220; &Uuml; Capital U, direresis I umlaut
y &#221; &Yacute; Capital Y, acute accent
I> &#222; &THORN; Capital Thorn, Icelandic
B &#223; &szlig; Small sharp s, German sz
a &#224; &agrave; Small a, grave accent
a &#225; &aacute; Small a, acute accent
ii &#226; &acirc; Small a, circumflex
a &#227; &atilde; Small a, tilde
a &#228; &auml; Small a, direresis I umlaut
ii &#229; &aring; Small a, ring
re &#230; &aelig; Small ae ligature
<; &#231; &ccedil; Small c, cedilla
e &#232; &egrave; Small e, grave accent
e &#233; &eacute; Small e, acute accent
e &#234; &ecirc; Small e, circumflex
e &#235; &euml; Small e, direresis I umlaut
&#236; &igrave; Small i, grave accent
&#237; &iacute; Small i, acute accent
&#238; &icirc; Small i, circumflex
&#239; &iuml; Small i, direresis I umlaut
5 &#240; &eth; Small eth, Icelandic
ii &#241; &ntilde; Small n, tilde
b &#242; &ograve; Small o, grave accent
6 &#243; &oacute; Small o, acute accent
0 &#244; &ocirc; Small o, circumflex
0 &#245; &otilde; Small o, tilde
ii &#246; &ouml; Small o, direresis I umlaut

1768 Handbook of Data Communications and Networks


+ &/1247; &divide; Division ign
0 &11248; &osla h; Small o, slash
u &/1249; &ugrave; mallu, grave a cent
u &11250; &uacllle; mallu, a ute accent
0 &/1251; &uci rc; mall u, circumn x
&11252; &uuml; mall u, direresis /umlaut
&11253; &yacute; mall y, acute accent
&/1254; &thorn; mall thorn. Icelandic
&11255; &yuml; Smal l y, direre i I umlaut

Ap4.5 Additional Named Entities for HTML


The following gives additional names for entities.

Character Named entity Numeric character reference Description


Greek
A &Alpha; &#913; Greek capital letter alpha, U0391
B &Beta; &#914; Greek capital letter beta, U0392
r &Gamma; &#915; Greek capital letter gamma, U0393 ISOgrk3
D. &Delta; &#916; Greek capital letter delta, U0394 ISOgrk3
E &Epsilon; &#917; Greek capital letter epsilon, U0395
z &Zeta; &11918; Greek capital letter zeta, U0396
H &Eta; &#919; Greek capital letter eta, U0397
e &Theta; &#920; Greek capital letter theta, U0398 ISOgrk3
&Iota; &#921; Greek capital letter iota, U0399
K &Kappa; &#922; Greek capital letter kappa, U039A
1\ &Lambda; &#923; Greek capital letter lambda, U039B ISOgrk3
M &Mu; &#924; Greek capital letter mu, U039C
N &Nu; &#925; Greek capital letter nu, U039D
- &Xi; &#926; Greek capital letter xi, U039E IS0grk3
0 &Omicron; &#927; Greek capital letter omicron, U039F
n &Pi; &#928; Greek capital letter pi, U03AO ISOgrk3
p &Rho; &#929; Greek capital letter rho, U03Al
:r &Sigma; &#931; Greek capital letter sigma, U03A3 IS0grk3
T &Tau; &#932; Greek capital letter tau, U03A4
y &Upsilon; &#933; Greek capital letter upsilon, U03A5 ISOgrk3
41 &Phi; &#934; Greek capital letter phi, U03A6 ISOgrk3
X &Chi; &#935; Greek capital letter chi, U03A7
'I' &Psi; &#936; Greek capital letter psi, U03A8 ISOgrk3
n &Omega; &#937; Greek capital letter omega, U03A9 ISOgrk3
()( &alpha; &#945; Greek small letter alpha, U03Bl ISOgrk3
~ &beta; &#946; Greek small letter beta, U03B2 ISOgrk3
y &gamma; &#947; Greek small letter gamma, U03B3 ISOgrk3
& &delta; &#948; Greek small letter delta, U03B4 ISOgrk3
E &epsilon; &#949; Greek small letter epsilon, U03B5 ISOgrk3
7;; &zeta; &#950; Greek small letter zeta, U03B6 ISOgrk3
11 &eta; &#951 ; Greek small letter eta, U03B7 ISOgrk3

HTML reference 1769


e &theta; &#952; Greek small letter theta, U03B8 ISOgrk3
&iota; &#953; Greek small letter iota, U03B9 ISOgrk3
K &kappa; &#954; Greek small letter kappa, U03BA ISOgrk3
X &lambda; &#955; Greek small letter lambda, U03HB IS0grk3
1.1 &mu; &#956; Greek small letter mu, U03BC IS0grk3
v &nu; &#957; Greek small letter nu, U03BD ISOgrk3
1; &xi; &#958; Greek small letter xi, U03BE ISOgrk3
0 &omicron; &#959; Greek small letter omicron, U03BF NEW
TT &pi; &#960; Greek small letter pi, U03CO ISOgrk3
p &rho; &#961; Greek small letter rho, U03C1 ISOgrk3
c; &sigmaf; &#962; Greek small letter final sigma, U03C2 ISOgrk3
a &sigma; &#963; Greek small letter sigma, U03C3 ISOgrk3
T &tau; &#964; Greek small letter tau, U03C4 ISOgrk3
u &upsilon; &#965; Greek small letter upsilon, U03C5 ISOgrk3
<I> &phi; &#966; Greek small letter phi, U03C6 ISOgrk3
X &chi; &#967; Greek small letter chi, U03C7 ISOgrk3
\j.l &psi; &#968; Greek small letter psi, U03C8 ISOgrk3
w &omega; &#969; Greek small letter omega, U03C9 ISOgrk3
~ &thetasym; &#977; Greek small letter theta symbol, U03D 1 NEW
y &upsih; &#978; Greek upsilon with hook symbol, U03D2 NEW
tiJ &piv; &#982; Greek pi symbol, U03D6 ISOgrk3
General Punctuation
&bull; &#8226; bullet, =black small circle, U2022 ISOpub
&hellip; &#8230; horizontal ellipsis, =three dot leader, U2026 ISOpub
&prime; &#8242; prime, =minutes, =feet, U2032 ISOtech
&Prime; &#8243; double prime, =seconds, =inches, U2033 ISOtech
&aline; &#8254; overline, =spacing overscore, U203E NEW
I &frasl; &#8260; fraction slash, U2044 NEW
Letterlike Symbols
8' &weierp; &#8472; script capital P, =power set, =Weierstrass p, U2118 ISOamso
:J &image; &#8465; blackletter capital I, =imaginary part, U2111 ISOamso
'R &real; &#8476; blackletter capital R, =real part symbol, U211C ISOamso
TM
&trade; &#8482; trade mark sign, U2122 ISOnum
N &alefsym; &#8501; alef symbol, =first transfinite cardinal, U2135 NEW
Arrows
&larr; &#8592; leftward arrow, U2190 ISOnum
&uarr; &#8593; upward arrow, U2191 ISOnum
&rarr; &#8594; rightward arrow, U2192 ISOnum
&darr; &#8595; downward arrow, U2193 ISOnum
&harr; &#8596; left right arrow, U2194 ISOamsa
.J &crarr; &#8629; downward arrow with comer leftward, =carriage return, U21B5
NEW
<:= &lArr; &#8656; leftward double arrow, U21DO ISOtech
1t &uArr; &#8657; upward double arrow, U21Dl ISOamsa
=> &rArr; &#8658; rightward double arrow, U21D2 ISOtech
~ &dArr; &#8659; downward double arrow, U21D3 ISOamsa

= &hArr; &#8660; left right double arrow, U21D4 ISOamsa

1770 Handbook of Data Communications and Networks


Mathematical Operators
'V &forall; &#8704; for all, U2200 ISOtech
0 &part; &#8706; partial differential, U2202 ISOtech
3 &exist; &#8707; there exists, U2203 ISOtech
0 &empty; &#8709; empty set, =null set, =diameter, U2205 ISOamso
'11 &nabla; &#8711; nabla, =backward difference, U2207 ISOtech
E &isin; &#8712; element of, U2208 ISOtech
ft &notin; &#8713; not an element of, U2209 ISOtech
3 &ni; &#8715; contains as member, U220B ISOtech
IT &prod; &#8719; n-ary product, =product sign, U220F ISOamsb
&sum; &#8722; n-ary sumation, U2211 ISOamsb
&minus; &#8722; minus sign, U2212 ISOtech

*...;
&lowast;
&radic;
&#8727;
&#8730;
asterisk operator, U2217 ISOtech
square root, =radical sign, U221A ISOtech
ex: &prop; &#8733; proportional to, U221D ISOtech
00 &infin; &#8734; infinity, U221E ISOtech
L &ang; &#8736; angle, U2220 ISOamso
j_ &and; &#8869; logical and, =wedge, U2227 ISOtech
&or; &#8870; logical or, =vee, U2228 ISOtech
n &cap; &#8745; intersection, =cap, U2229 ISOtech
u &cup; &#8746; union, =cup, U222A ISOtech
f &int; &#8747; integral, U222B ISOtech
&there4; &#8756; therefore, U2234 ISOtech
&sim; &#8764; tilde operator, =varies with, =similar to, U223C ISOtech
- &cong; &#8773; approximately equal to, U2245 ISOtech
- &asymp; &#8773; almost equal to, =asymptotic to, U2248 ISOamsr
&ne; &#8800;
* &equiv; &#8801;
not equal to, U2260 ISOtech
- identical to, U2261 ISOtech
5 &le; &#8804; less-than or equal to, U2264 ISOtech
;;,: &ge; &#8805; greater-than or equal to, U2265 ISOtech
c &sub; &#8834; subset of, U2282 ISOtech
:::) &sup; &#8835; superset of, U2283 ISOtech
([_ &nsub; &#8836; not a subset of, U2284 ISOamsn
,::; &sube; &#8838; subset of or equal to, U2286 ISOtech
;:::1 &supe; &#8839; superset of or equal to, U2287 ISOtech
E9 &oplus; &#8853; circled plus, =direct sum, U2295 ISOamsb
® &otimes; &#8855; circled times, =vector product, U2297 ISOamsb
j_ &perp; &#8869; up tack, =orthogonal to, =perpendicular, U22A5 ISOtech
&sdot; &#8901; dot operator, U22C5 ISOamsb
Miscellaneous Technical
&lceil; &#8968; left ceiling, =apl upstile, U2308, ISOamsc
&rceil; &#8969; right ceiling, U2309, ISOamsc
&lfloor; &#8970; left floor, =apl downstile, U230A, ISOamsc
&rtloor; &#8971; right floor, U230B, ISOamsc
&lang; &#9001; left-pointing angle bracket, =bra, U2329 ISOtech
* &rang; &#9002; right-pointing angle bracket, =ket, U232A ISOtech
Geometric Shapes

HTML reference 1771


0 &loz; &#9674; lozenge, U25CA ISOpub
Miscellaneous Symbols

• &spades; &#9824; black spade suit, U2660 ISOpub

• &clubs; &119827; black club suit, =shamrock, U2663 ISOpub

• &hearts; &#9829; black heart suit, =valentine, U2665 ISOpub

• &diams; &#9830; black diamond suit, U2666 ISOpub

Ap4.6 Character Entities for Special Symbols


UsingNE NE NCR Using NCR
CO Controls and Basic Latin
&quot &#34; quotation mark, =apl quote, U0022 ISOnum
& &amp &#38; ampersand, U0026 ISOnum
< &lt &#60; less-than sign, U003C ISOnum
> &gt &#62; greater-than sign, U003E ISOnum
Latin Extended-A
(E &OElig &#338; Latin capital ligature oe, U0152 ISOlat2
re &oelig &#339; Latin small ligature oe, U0153 ISOlat2
s &Scaron &#352; Latin capital letters with caron, U0160 ISOlat2
s &scaron &#353; Latin small letters with caron, U0161 ISOlat2
y &Yuml &#376; Latin capital letter y with diaeresis, U0178 ISOlat2
Spacing Modifier Letters
&eire &#710; modifier letter circumflex accent, U02C6 ISOpub
&tilde &#732; small tilde, U02DC ISOdia
General Punctuation
&ensp &#8194; enspace,U2002ISOpub
&emsp &#8195; em space, U2003 ISOpub
&thinsp &#8201; thin space, U2009 ISOpub
&zwnj &#8204; zero width non-joiner, U200C NEW RFC 2070
&zwj &#8205; zero width joiner, U200D NEW RFC 2070
&lrm &#8206; left-to-right mark, U200E NEW RFC 2070
&rlm &#8207; right-to-left mark, U200F NEWRFC 2070
&ndash &#8211; en dash, U2013 ISOpub
&mdash &#151; em dash, U2014 ISOpub
&lsquo &#8216; left single quotation mark, U2018 ISOnum
&rsquo &#8217; right single quotation mark, U2019 ISOnum
&sbquo &#8218; single low-9 quotation mark, U201A NEW
&ldquo &#8220; left double quotation mark, U201C ISOnum
&rdquo &#8221; right double quotation mark, U201D ISOnum
&bdquo &#8222; double low-9 quotation mark, U201E NEW
t &dagger &#8224; dagger, U2020 ISOpub
:j: &Dagger &#8225; double dagger, U2021 ISOpub
%o &permil &#8240; per mille sign, U2030 ISOtech
&lsaquo &#8249; single left-pointing angle quotation mark, U2039 ISO proposed
&rsaquo &#8250; single right-pointing angle quotation mark, U203A ISO proposed

1772 Handbook of Data Communications and Networks


Ap4.7 Character Set Recognition
The META element can be used to define the character set for a document. The HTTP-
EQUIV attribute is set to "Content-Type" and CONTENT attribute defines the content type.
A character set is defined with the CHARSET= attribute. For example, the following defines
the Windows-1251 character set:

<META HTTP-EQUIV="Content-Type"
CONTENT="text/html; CHARSET=windows-1251">

If the META element is inserted before the BODY element, it affects the whole document.
Example character sets are:

Display Preferred Additional Aliases MLang Supported


Name CharsetiD Code byVer-
Page sions
Arabic ASM0-708 708 4CS,5
ASM0-708
Arabic DOS-720 720 4CS,5
(DOS)
Arabic (ISO) IS0-8859-6 IS0_8859-6:1987, ISO-ir-127, 28596 4CS,5
IS0_8859-6, ECMA-114, arabic,
csiSOLatinArabic
Arabic (Win- Windows- 1256 4CS,5
dows) 1256
Baltic (ISO) IS0-8859-4 csiSOLatin4, ISO-ir-110, IS0_8859- 28594 4,5
4, IS0_8859-4:1988, 14, latin4
Baltic (Win- Wmdows- 1257 4,5
dows) 1257
Central IBM852 cp852 852 4,5
European
(DOS)
Central IS0-8859-2 csiSOLatin2, ISO-ir-101, IS08859-2, 28592 3,4,5
European IS0_8859-2, IS0_8859-2:1987, l2,
(ISO) latin2
Central Windows- x-cp1250 1250 3,4,5
European 1250
(Windows)
Chinese Gb2312 chinese, csGB2312, 936 3,4,5
Simplified csiS058GB23128, GB2312, GBK,
(GB2312) GB_2312-80, ISO-ir-58
Chinese Hz-gb-2312 52936 4,5
Simplified
(HZ)
Chinese Tra- bigS csbig5, x-x-big5 950 3,4,5
ditional
Cyrillic Cp866 IBM866 866 4,5
(DOS)

HTML reference 1773


Cyrillic (ISO) IS0-8859-5 csiSOLatinCyrillic, cyrillic, ISO-ir- 28595 4,5
144, IS0_8859-5, IS0_8859-5:1988
Cyrillic koi8-r csKOI8R, koi 20866 3,4,5
(KOI8-R)
Cyrillic windows- x-cp1251 1251 3,4,5
(Windows) 1251
Greek (ISO) IS0-8859-7 csiSOLatinGreek, ECMA-118, 28597 3,4,5
ELOT_928, greek, greekS, ISO-ir-
126, IS0_8859-7, IS0_8859-7:1987
Greek (Win- Windows- windows-1253 1253 5
dows) 1253
Hebrew DOS-862 862 4CS,5
(DOS)
Hebrew IS0-8859-8 csiSOLatinHebrew, hebrew, ISO-ir- 28598 4CS,5
(ISO) 138, IS0_8859-8, visual, IS0-8859-8
Visual
Hebrew windows- logical, 180_8859-8:1988, ISO-ir-138 1255 3CS, 4CS, 5
(Windows) 1255
Japanese IS0-2022-jp csiS02022JP 50220 4,5
GIS)
Japanese csiS02022JP IS0-2022-jp 50221 4,5
UIS-Allow 1-
byte Kana)
Japanese IS0-2022-jp csiS02022JP 50222 3,4,5
UIS-Allow 1-
byte Kana-
SO/SI)
Japanese euc-jp csEUCPkdFmtJapanese, Ex- 51932 3,4,5
(EUC) tended_UNIX_Code_Packed_
Format_for_japanese, x-euc, x-euc-
jp
Japanese shift_jis csShiftJIS, csWindows31J, ms_Kanji, 932 3,4,5
(Shift-JIS) shift-jis, x-ms-cp932, x-sjis
Korean ks_c_5601- csKSC56011987, euc-kr, korean, 949 3,4,5
1987 ks_c_5601
Korean (ISO) IS0-2022-kr csiS02022KR 50225 3,4,5
Latin 3 (ISO) IS0-8859-3 28593 4,5
Thai (Win- IS0-8859-11 windows-874 874 3,4,5
dows)
Turkish Windows- windows-1254 1254 3,4,5
(Windows) 1254
Turkish IS0-8859-9 csiSOLatin5, IS0_8859-9, IS0_8859- 28599 3,4,5
(ISO) 9:1989, ISO-ir-148, 15, latinS

Ukrainian koi8-u 21866 4,5


(K018-U)
Unicode utf-7 csUnicodellUTF7, unicode-1-1- 65000 4,5
(UTF-7) utf-7, x-unicode-2-0-utf-7

1774 Handbook of Data Communications and Networks


Unicode utf-8 unicode-1-1-utf-8, unicode-2-0-utf- 65001 4,5
(UFf-8) 8, x-unicode-2-0-utf-8
Vietnamese windows- 1258 3,4,5
(Wmdows) 1258
Western Windows- 1252 5
European 1252
(Windows)
Western IS0-8859-1 ANSCX3.4-1968, ANSI_X3.4-1986, 1252 3,4,5
European ascii, cp367, cp819, csASCII,
(ISO) IBM367, IBM819, ISO-ir-100, ISO-ir-
6, IS0646-US, IS08859-1,
IS0_646.irv:1991, IS0_8859-1,
180_8859-1:1987, latin1, us, us-ascii,
x-ansi

HTML reference 1775


Ap 5 PC Processors

AP5.1 Introduction
Intel marketed the first microprocessor, named the 4004. This device caused a revolution in the
electronics industry because previous electronic systems had a fixed functionality. With this
processor the functionality could be programmed by software. Amazingly, by today's standards,
it could only handle four bits of data at a time (a nibble), contained 2000 transistors, had 46
instructions and allowed 4 KB of program code and 1 KB of data. From this humble start the PC
has since evolved using Intel microprocessors (Intel is a contraction of Integrated Electronics).
The second generation oflntel microprocessors began in 1974. These could handle 8 bits (a
byte) of data at a time and were named the 8008, 8080 and the 8085. They were much more
powerful than the previous 4-bit devices and were used in many early microcomputers and in
applications such as electronic instruments and printers. The 8008 has a 14-bit address bus and
can thus address up to 16KB of memory (the 8080 has a 16-bit address bus giving it a 64KB
limit).
The third generation of microprocessors began with the launch of the 16-bit processors. Intel
released the 8086 microprocessor which was mainly an extension to the original 8080 processor
and thus retained a degree of software compatibility. IBM's designers realized the power of the
8086 and used it in the original IBM PC and IBM XT (eXtended Technology). It has a 16-bit
data bus and a 20-bit address bus, and thus has a maximum addressable capacity of 1 MB. The
8086 could handle either 8 or 16 bits of data at a time (although in a messy way).
A stripped-down, 8-bit external data bus, version called the 8088 is also available. This
stripped-down processor allowed designers to produce less complex (and cheaper) computer
systems. An improved architecture version, called the 80286, was launched in 1982, and was
used in the IBM AT (Advanced Technology).
In 1985, Intel introduced its first 32-bit microprocessor, the 80386DX. This device was
compatible with the previous 8088/8086/80286 (80x86) processors and gave excellent perform-
ance, handling 8, 16 or 32 bits at a time. It has a full32-bit data and address buses and can thus
address up to 4GB of physical memory. A stripped-down 16-bit external data bus and 24-bit
address bus version called the 80386SX was released in 1988. This stripped-down processor can
thus only access up to 16MB of physical memory.
In 1989, Intel introduced the 80486DX which is basically an improved 80386DX with a
memory cache and math co-processor integrated onto the chip. It had an improved internal
structure making it around 50% faster with a comparable 80386. The 80486SX was also intro-
duced, which is merely an 80486DX with the link to the math co-processor broken. Clock
doublerltrebler 80486 processors were also released. In these the processor runs at a higher speed
than the system dock. Typically, systems with dock doubler processors are around 75% faster
than the comparable non-doubled processors. Typical dock doubler processors are DX2-66 and
DX2-50 which run from 33 MHz and 25 MHz clocks, respectively. Intel have also produced a
range of 80486 microprocessors which run at three or four times the system clock speed and are
referred to as DX4 processors. These include the Intel DX4-100 (25 MHz clock) and Intel DX4-
75 (25 MHz clock).
The Pentium (or P-5) is a 64-bit 'superscalar' processor. It can execute more than one in-
struction at a time and has a full 64-bit (8-byte) data bus and a 32-bit address bus. In terms of
performance, it operates almost twice as fast as the equivalent 80486. It also has improved float-
ing-point operations (roughly three times faster) and is fully compatible with previous 80x86
processors.
The Pentium II (or P-6) is an enhancement of the P-5 and has a bus that supports up to four
processors on the same bus without extra supporting logic, with clock multiplying speeds of over
300 MHz. It also has major savings of electrical power and the minimization of electromagnetic
interference (EMI). A great enhancement of the P-6 bus is that it detects and corrects all single-
bit data bus errors and also detects multiple-bit errors on the data bus.

AP5.2 8088 microprocessor


The great revolution in processing power arrived with the 16-bit 8086 processor. This has a 20-
bit address bus and a 16-bit address bus, while the 8088 has an 8-bit external data bus. Figure
Ap5.1 shows the pin connections of the 8088 and also the main connections to the processor.
Many of the 40 pins of the 8086 have dual functions. For example, the lines ADO-AD7 act ei-
ther as the lower 8 bits of the address bus (AO-A7) or as the lower 8 bits of the data bus (DO-
D7). The lines A16/S3-A19/S6 also have a dual function, S3-S6 are normally not used by the
PC and thus they are used as the 4 upper bits of the address bus. The latching of the address is
achieved when the ALE (address latch enable) goes from a high to a low.
The bus controller (8288) generates the required control signals from the 8088 status lines
SO- Sl. For example, if SO is high, Sl is low and S2 is low then the MEMR line goes low. The
main control signals are:

• lOR (1/0 read) which means that the processor is reading from the contents of the address
which is on the 1/0 bus.
• lOW (1/0 write) which means that the processor is writing the contents of the data bus to
the address which is on the 1/0 bus.
• MEMR (memory read) which means that the processor is reading from the contents of the
address which is on the address bus.
• MEMW (memory write) which means that the processor is writing the contents of the data
bus to the address which is on the address bus.
• INTA (interrupt acknowledgement) which is used by the processor to acknowledge an inter-
rupt (so, S1 and S2 all go low). When a peripheral wants the attention of the processor it
sends an interrupt request to the 8259 which, if it is allowed, sets INTR high.

The processor either communicates directly with memory (with MEMW and MEMR) or com-
municates with peripherals through isolated 1/0 ports (with !OR and lOW).

1778 Handbook of Data Communications and Networks


(,Nn
v"
A I< All
All Alft.~}

All A17'S4
All All"'
AIO 1\llil).i)
A. \_\()
A!
A01
MN
RO "'
AOO

....
RQ {olO
NUt
Am RQ-'-Lll

AOJ "'"
"
AIU \I
AI> I <o IRQII
AOO 1)\Al IRQ I
N\11 Q\1 IRQZ
INTK 11,1
u• IUAIH

"'0 IU~II
IR(J7

Figure Ap5.1 8088 connections

AP5.2.1 Registers
Each of the Pe-based Intel microprocessors is compatible with the original 8086 processor and
is normally backwardly compatible. Thus, for example, a Pentium can run 8086, 80386 and
80486 code. Microprocessors use registers to perform their operations. These registers are basi-
cally special memory locations within the processor that have special names. The 8086/88 has 14
registers which are grouped into four categories, as illustrated in Figure Ap5.2.

General-purpose registers
There are four general-purpose registers that are AX, BX, ex and DX. Each can be used to ma-
nipulate a whole 16-bit word or with two separate 8-bit bytes. These bytes are called the lower
and upper order bytes. Each of these registers can be used as two 8-bit registers, for example, AL
represents an 8-bit register that is the lower half of AX and AH represents the upper half of AX.
The AX register is the most general purpose of the four registers and is normally used for all
types of operations. Each of the other registers has one or more implied extra functions. These
are:

• AX is the accumulator. It is used for all input/output operations and some arithmetic opera-
tions. For example, multiply, divide and translate instructions assume the use of AX.
• BX is the base register. It can be used as an address register.
• ex is the count register. It is used by instructions which require to count. Typically is it is
used for controlling the number of times a loop is repeated and in bit-shift operations.
• DX is the data register. It is used for some input/output and also when multiplying and di-
viding.

PC Processors 1779
AX (Aeeumator)

BX (BaS<! regiSter)

CX (Count regtster)

OX (Data regiSter)

SP (Sillck poonter)

BP (Base pomter)

SP (Source poonter)

Dl (Desttnahon 1nclex)

CS (Code segment)

OS (Data segment)

SS (Stack segment)
Flags

Figure Ap5.2 8086/88 registers

Addressing registers
The addressing registers are used in memory addressing operations, such as holding the source
address of the memory and the destination address. These address registers are named BP, SP, SI
and Dl, which are:

• SI is the source index and is used with extended addressing commands.


• DI is the destination index and is used in some addressing modes.
• BP is the base pointer.
• SP is the stack pointer.

Status registers
Status registers are used to test for various conditions in an operations, such as 'is the result nega-
tive', 'is the result zero', and so on. The two status registers have 16 bits and are called the
instruction pointer (IP) and the flag register (F):

• IP is the instruction pointer and contains the address of the next instruction of the program.
• Flag register holds a collection of 16 different conditions. Table Ap5.1 outlines the most
used flags.

Segments registers
There are four areas of memory called segments, each of which are 16 bits and can thus address
up to 64 KB (from ooooh to FFFFh). These segments are:

• Code segment (cs register). This defines the memory location where the program code (or
instructions) is stored.
• Data segment (ds register). This defines where data from the program will be stored (ds
stands for data segment register).
• Stack segment (ss register). This defined where the stack is stored.

1780 Handbook of Data Communications and Networks


• Extra segment (es).

All addresses are with reference to the segment registers.


The 8086 has a segmented memory, the segment registers are used to manipulate memory
within these segments. Each segment provides 64 KB of memory, this area of memory is known
as the current segment. Segmented memory will be discussed in more detail in Section ].3.
Table Ap5.1 Processor flags.

Bit FlAg Name Description

c onrains rhe carry from rhe most significanr bit (!eli:-hand


bit) following a shili:, rotate or arithmetic opera don.

A 4 ct on 1/2 carry

7 et on negative result Comains rhe sign of an arithmetic operation {0 for positive,


I for negative}.

z 6 et on zero Contain results oflast arirhmctic or compare result {0 for


result nonzero, 1 for zero).

0 II Set on overflow Indicates that an overflow has occurred in the most signifi -
cant b it from an arithmetic operation.

p 2 Set on even parity

D 10 Direction

9 Interrupt enable Indi cates whether the inrerrupt has been disabled.

T 8 Trap

Memory addressing
There are several methods of accessing memory locations, these are:

• Implied addressing which uses an instruction in which it is known which registers are used.
• Immediate (or literal} addressing uses a simple constant number to define the address loca-
tion.
• Register addressing which uses the address registers for the addressing (such as AX, BX, and
so on}.
• Memory addressing which is used to read or write to a specified memory location.

AP5.3 Memory segmentation


The 80386, 80486 and Pentium processors run in one of two modes, either virtual or real. In
virtual mode they act as a pseudo-8086 16-bit processor, known as the protected mode. In real-
mode they can use the full capabilities of their address and data bus. This mode normally de-
pends on the addressing capabilities of the operating system. All DOS-based programs use the
virtual mode.
The 8086 has a 20-bit address bus so that when the PC is running 8086-compatible code it

PC Processors 1781
can only address up to 1 MB of physical memory. It also has a segmented memory architecture
and can only directly address 64 KB of data at a time. A chunk of memory is known as a seg-
ment and hence the phrase 'segmented memory architecture'.
Memory addresses are normally defined by their hexadecimal address. A 4-bit address bus
can address 16 locations from oooob to llllb. This can be represented in hexadecimal as oh to
Fh. An 8-bit bus can address up to 256 locations from o Oh to FFh. Section J.1 0 outlines the ad-
dressing capabilities for a given address bus size.
Two important addressing capabilities for the PC relate to a 16- and a 20-bit address bus. A
16-bit address bus addresses up to 64 KB of memory from ooooh to FFFFh and a 20-bit address
bus addresses up to 1MB from oooooh to FFFFFh. The 80386/80486/ Pentium processors have
a 32-bit address bus and can address from ooooooooh to FFFFFFFFh.
A segmented memory address location is identified with a segment and an offset address.
The standard notation is segment: offset . A segment address is a 4-digit hexadecimal address
which points to the start of a 64 KB chunk of data. The offset is also a 4-digit hexadecimal
address which defines the address offset from the segment base pointer. This is illustrated in Fig-
ureAp5.3.
The segment: offset address is defined as the logical address, the actual physical address is
calculated by shifting the segment address 4 bits to the left and adding the offset. The example
given next shows that the actual address of 2FB4: 0532 is 2FD72h.

Segment (2F84) : 0010 1111 1000 0100 0000


Offset (0532): 0000 0101 0011 0010
Actual address: 0010 1111 1101 0111 0010

Address location
segment: of f set 64KB of
data
0 ~ Seg ment

Figure Ap5.3 Memory addressing.

AP5.4 80386/80486

AP5.4.1 Introduction
The PC had grown from the 8086 processor, which could run 8-bit or 16-bit software. This
processor was fine with text-based applications, but struggled with graphical programs, especially
with GUis (Graphical User Interfaces). The original version of Microsoft Windows (Windows
Version 1.0 and Version 2.0) ran on these limited processes. The great leap in computing power
came with the development of the Intel 80386 processor and with Microsoft Windows 3.0. A
key to the success of the 80386 was that it was fully compatible with the previous
8088/8086/80286 processors. This allowed it run all existing DOS-based program and new 32-
bit applications. The DX version has full 32-bit data and address bus and can thus address up to

1782 Handbook of Data Communications and Networks


4GB of physical memory. An SX version with a stripped-down 16-bit external data bus and
24-bit address bus version can access only up to 16MB of physical memory (at its time of release
this was a large amount of memory). Most of the time, with Microsoft Windows 3.0, the proces-
sor was using only 16 bits, and thus not using the full power of the processor.
The 80486DX basically consists of an improved 80386 with a memory cache and a math co-
processor integrated onto the chip. An SX version had the link to the math co-processor broken.
At the time, a limiting factor was the speed of the system clock (which was limited to around
25 MHz or 33 MHz). Thus clock doubler, treblers or quadrupers allow the processor to multiply
the system clock frequency to a high speed. Thus, internal operations of the processor are carried
out at much higher speeds, but accesses outside the processor must slow down the system clock.
As most of the operations within the computer involve operations within the processor then the
overall speed of the computer is improved (roughly by about 75% for a clock doubler).

AP5.4.2 80486 pin out


To allow for easy upgrades and to save space the 80486 and Pentium processors are available in a
pin-grid array (PGA) form. A 168-pin PGA 80486 processor is illustrated in Figure Ap5.4. It
can be seen that the 486 processor has a 32-bit address bus (AO-A31) and a 32-bit data bus
(DO-D31). The pin definitions are given in Table Ap5 .2.

0 19 011 09 G 0 OPI GNDGNOVcc: GNOGNOGNOOO DO A31 A28 A27


tGN ·IGNNE BLT • Bi:ASr
1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
flH-flUSH AHD - AHOlD
022 02\ 0 18 013 Vee 06 VCCOJ 05 Va: 06 Va: 01 A29 GNOA25 A.26
2 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
GNOCLK 011 010 01.5 012 OP2 016 01 4 07 ().1 CPO A30 A17 V«. A23
AM · AlOM EAD · EAoS
0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
023 GNOVoc A19 GNO
HOL - HOlF ats . Bsi"e
4 0 0 0 0 0 0
KEN - KEN BOF · DOfF
OP3 GNOVcc A21 At8 AI"
5 0 0 0 0 0 0
w/R . WJR
BAD · BRDY
02.4 02.5 027 A24 V«. CNO
6 0 0 0 0 0 0
[)IC . O/C PCH - PCHK
GNOVcc: D2e K12 A15 Al2
0 0 0 0 0 0
BRQ - BREO ADS - ADS
029 001 02!1 A20 Voc GND
8 0 0 0
GNOVOC. 030
486DX 0 0
AIG Vee GNO
0
HlO - HlOA
9 0 0 0
PGA 0 0 0
All Vet:. GND INT ·INTR
10
11
0 0
GNDVcr.
0 0
0

0
...
0

0
0 0
Voc. GNO
0 0
RES · RESET

ROY - ROY
AS A11 GNO
12 0 0 0 0 0 0
A7 A8 AIO
aeo . oeo
13 0 0 0 0 0 0
BEl - iiE1
A2 vee. GNO
14 0 0 0 0 0 0
tGN NMI FLH AM H0L KEN A6
BRD BE2 BEO PWT OIC LCK HLO BRO A3
BE2 · W
15 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
BE3 - BE3
INT RES SS8 GN O ROY Vee VQc: 8E 1 Vee: Vee Vee WI Vet:. PI.K 81.T M
16 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
AHOEAO ~US BOF GNOBE3 GNDGNOPCOGNDGNDGNOWIR GNDPCH ADS
Mn . MilO
17 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
PLK- PlOCK

A 8 c 0 E F G H J K L M N p 0 R s

Figure Ap5.4 i486DX processor.

Table Ap5.3 defines the how the control signals are interpreted. For the STOP/special bus
cycle, the byte enable signals ( BEO- BE3 ) further define the cycle. These are:

• Write back cycle BEO =1, BEl= 1, BE2 =1, BE3 =0.
• Halt cycle BEO =1, BEl= 1, BE2 =0, BE3 = 1.
• Flush cycle BEO =1, BEl =0, BE2 =1, BE3 = 1.
• Shutdown cycle BEO =0, BEl= 1, BE2 =1, BE3 = 1.

PC Processors 1783
Table Ap5.2 80486 signal lines

ignals Descri tion


- - - - -flO
A2- A31 1/0 The 30 mosr significanr birs of rhe address bus.

A 20M When active low, rhe processor internally masks rhe address bit A20
before every memory access.

AD Indicates rhat the processor has valid control signals and valid address
signals.

AHOLD When active a differenr bus controller can have access ro the address
bus. This is rypically used in a multi-processor system.

BEO - BEJ 0 The byre enable lines indicate which of rhe byres of rhe 32-bit data
bus are active.

BLA T Indicates that the current bursr cycle will end after rhe next BRDY
ignal.

B FF The backoff signal informs the proces or to deactivate rhe bus on rhe
nexr clock cycle.

BRDY The burst ready signal is used by an add ressed sy rem char has senr data
on the data bus or read data from the bus.

BREQ 0 Ind icates that the processor has inrernally requested the bus.

BSI6, BS8 The B 16 signal indicatesrhat a 16-bit data bus is used, rhe B 8
ignal indicates chat an 8-bit dara bus is used. If both are high rhen a
32-bir dara bus is used.

DPO-DP3 I/0 The data parity bits gives a parity heck for each byte of the 32-bit data
bus. The parity birs are always even parity.

EADS Indicate that an external bus conrroller has put a valid address on the
add ress bu .

FERR Indicates char rhe processor has detected an error in rhe internal float-
ing-point unit.

FLUS ! I When active rhe processor writes rhe complete contents of the cache ro
memory.

HOLD, HLDA II The bus hold (HOLD) and acknowledge (HLDA) are used for bus
arbitration and allow other bus controllers ro take control of the busses.

IG E When active the pro cs or ignore any numeric errors.

1784 Handbook of Data Communications and Networks


INTR External devices to interrupt the processor use the interrupt request line.

KEN This signal stops caching of a specific address.

LOCK 0 If active the processor will not pass control to an external bus controller,
when it receives a HOLD signal.

M/ 10, DIC, W/ R 0 See Table Ap5.3.

NMI The non-maskable interrupt signal causes an interrupt 2.

PCHK 0 If it is set active then a data parity error has occurred.

PLOCK 0 The active pseudo lock signal identifies that the current data transfer
requires more than one bus cycle.

PWT,PCD 0 The page write-through (PWD and page cache disable (PCD) are used
with cache control.

ROY When active the addressed system has sent data on the data bus or read
data from the bus.

RESET If the reset signal is high for more than 15 clock cycles then the proces-
sor will reset itself.

The 486 integrates a processor, cache and a math co-processor onto a single IC. Figure Ap5.5
shows the main 80386/80486 processor connections. The Pentium processor connections are
similar but it has a 64-bit data bus. There are three main interface connections: the memory/10
interface, interrupt interface and DMA interface.

Table Ap5.3 Control signals

Mi lO DIC W/ R Description
0 0 0 lmerrupt acknowledge equence
0 0 I TOP/ pecial bus cycle
0 I 0 Reading from an !I port
0 l l Writing to an l/0 port
0 0 Reading an in truction from memory
0 I Reserved
0 Reading data from memory
Writing dam m memory

PC Processors 1785
~
c [ IIOLD
HLDA

8
803861 ~~
80486

[
0.8 INTR
g~
E~ ~Q
NMI
~~ Rf::SET
\V/- R
Dl-
M/- 10

Figure Ap5.5 Some of the 80386/80486 signal connections

The write/read ( W iR) line determines whether data is written to ( W ) or read from ( R)
memory. PCs can interface directly with memory or can interface to isolated memory. The sig-
nal line M I 10 differentiates between the two types. If it is high then the processor accesses direct
memory; else if it is low then it accesses isolated memory.
The 80386DX and 80486 have an external 32-bit data bus (D0-D,) and a 32-bit address
bus ranging from A, to A, 1• The two lower address lines, A, and A1, are decoded to produce the
byte enable signals BEO, BE l , BE2 and BE3 . The BEO line activates when A1A, is 00, BEl acti-
vates when A 1A, is 01, BE2 activates when A 1A, and BE3 actives when A 1A, is 11. Figure Ap5.6
illustrates this addressing.
The byte enable lines are also used to access either 8, 16, 24 or 32 bits of data at a time.
When addressing a single byte, only the BEO line is active (D 0-D 7), if 16 bits of data are to be
accessed then BEO and BEl are active (D0-D 1) , if 32 bits are to be accessed then BEO, BEl,
BE2 and BE3 are active (D0-D,).
The D I C line differentiates between data and control signals. When it is high then data is
read from or written to memory, else if it is low then a control operation is indicated, such as a
shutdown command.

Figure Ap5.6 Memory addressing

1786 Handbook of Data Communications and Networks


The interrupt lines are interrupt request ( lN1R ), non-maskable interrupt request ( NMI ) and
system reset (RESET), all of which are active high signals. The INfR line is activated when an
external device, such as a hard disk or a serial port, wishes to communicate with the processor.
This interrupt is maskable and the processor can ignore the interrupt if it wants. NMI is a non-
maskable interrupt and is always acted on. When it becomes active the processor calls the non-
maskable interrupt service routine. The RESET signal causes a hardware reset and is normally
made active when the processor is powered-up.

AP5.4.3 80386/80486 registers


The 80386 and 80486 are 32-bit processors and can thus operate on 32-bits at a time. They
have expanded 32-bit registers, which can also be used as either 16-bit or 8-bit registers (mainly
to keep compatibility with other processors and software). The general purpose registers, such as
AX, BX, CX:, DX, SI, DI and BP are expanded from the 8086 processor and are named EAX,
EBX, ECX:, EDX, ESI, EDI and EBP, respectively, as illustrated in Figure Ap5.7. The CS, SS
and DS registers are still16 bits, but the flag register has been expanded to 32 bits and is named
EFLAG.

16 bits 16 bits

EAX AH AL

EBX BH BL
ECX CH CL
EDX DH DL
ESI SI

EDI DI

EBP BP

32 bits

Figure Ap5.7 80386/80486 registers

AP5.4.4 Memory cache


DRAM is based on the charging and discharge of tiny capacitors. It is thus a relatively slow type
of memory compared with SRAM. For example, typical access time for DRAM is 80 ns and a
typical motherboard clock speed is 50 MHz. This gives a clock period of 20 ns. Thus, the proces-
sor would require five wait states before the data becomes available. A cache memory can be used
to overcome this problem. This is a bank of fast memory (SRAM) that uses a cache controller to
load data from main memory (typically DRAM) into it. The cache controller guesses the data
the processor requires and loads this into the cache memory. Figure Ap5.8 shows that if the con-
troller guesses correctly then it is a cache hit, else if it is wrong it is a cache miss. A miss causes
the processor to access the memory in the normal way (that is, there may be wait states as the
DRAM memory need time to get the data). Typical cache memory sizes are 16KB, 32KB and
64 KB for 80486 processors and 256 KB and 512 KB for Pentium processors. This should be
compared with the size of the RAM on a typical PC which is typically at least 32MB.
The 80486 and Pentium have built-in cache controllers and, at least, 64 KB (or 256 KB for
the Pentium) of local SRAM cache memory. This is a first-level cache and the total cache size

PC Processors 1787
can be increase with an off-chip (or near-chip) memory (second-level cache).

If cache miss then data is loaded from


DRAM memOfY into cache and to the
microprocessor (cache controller will
try and guess right next time)

Cache DRAM
Microprocessor
controller memory

~~~~M.... "'""""
l~~
'-----lf-ca-ch-'oh:l

microprocessor loads into cache memory


from cache memory

Cache
memory
(SRAM)

Figure Ap5.8 Cache operation

Cache architecture
The main cache architectures are:

• Look-through cache. In a look-through cache the system memory is isolated from the proc-
essor address and control busses. In this case the processor directly sends a memory request to
the cache controller which then determines whether it should forward it to its own memory
or the system memory. Figure Ap5.9 illustrates this type of cache. It can be seen that the
cache controls whether the processor address contents are latched through to the DRAM
memory and it also controls whether the contents of the DRAM's memory is loaded onto
the processor data bus (through the data transceiver). The operation is described as bus cycle
forwarding.
• Look-aside cache. A look-aside cache is where the cache and system memory connect to a
common bus. System memory and the cache controller see the beginning of the processor
bus cycle at the same time. If the cache controller detects a cache hit then it must inform the
system memory before it tries to find the data. If a cache miss is found then the memory ac-
cess is allowed to continue.
• Write-through cache. With a write-through cache all memory address accesses are seen by
the system memory when the processor performs a bus cycle.
• Write-back cache. With a write-back cache the cache controller controls all system writes. It
thus does not write the system memory unless it has to.

Second-level caches
An Ll-cache (first-level cache) provides a relatively small on-chip cache, where an L2-cache (sec-
ond-level cache) provides an external, on-board, cache, which provides a cache memory of
between 128 and 512 KB. The processor looks in its own Ll-cache for a cache hit; if none is
found then it searches in the on-board L2-cache. A cache hit in the Ll-cache will obviously be
faster than the off-chip cache.

1788 Handbook of Data Communications and Networks


Latch
Processor
System
address
address
bus address
control signal
bus

Cache controller

DRAM
Processor data memory
SRAM control
control signals signal

SRAM
I
cache memory
System
data
bus
Processor
data
bus Data
L..---------....,---I.,~Transceiver .._

Figure Ap5.9 Look-through cache

AP5.5 Pentium/Pentium Pro

AP5.5.1 Introduction
Intel have gradually developed their range of processors from the original 16-bit 8086 processor
to the 32-bit processors, such as the Pentium II. Table Ap5.4 contrasts the Intel processor range.
It can also be seen from the table that the Pentium II processor is nearly more than a thousand
times more powerful than an 8086 processor. The original 8086 had just 29 000 transistors and
operated at a clock speed of 8 MHz. It had an external 20-bit bus and could thus only access up
to 1 MB of physical memory. Compare this with the Pentium II which can operate at over
300 MHz, contains over 6 000 000 transistors and can access up to 64GB of physical memory.

Table Ap5.4 Processor comparison

PC Processors 1789
Processor Clock Register siu Exumn/ MIIX. Cache Power
{whm data bus e:xumnl (M!Ps)
reknsed} memory
8086 8MHz 16 16 1MB 0.8
286 12.5 MHz 16 16 16MB 2.7
386DX 20MHz 32 32 4GB 6.0
486DX 25MHz 32 32 4GB 8 K.B L-1 20
Penrium 60MHz 32 64 4GB L6KB L-1 100
Penrium Pro 200MHz 32 64 64GB L6KB L-1 440
256 KL-2
Penrium II 200MHz 32 64 64GB L6K.B - 1 700
512 KB L-2

AP5.6 Intel processor development


The 80386 processor was a great leap in processing power over the 8086 and 80286, but it re-
quired an on-board math co-processor to enhance its mathematical operations and it could also
only execute one instruction at a time. The 80486 brought many enhancements, such as:

• The addition of parallel execution with the expansion of the Instruction decode and execu-
tion units into five pipelined stages. Each of these stages operate in parallel, with the others,
on up to five instructions in different stages of execution. This allows up to five instructions
to be completed at a time.
• The addition of an 8 KB on-chip cache to greatly reduce the data and code access times.
• The addition of an integrated floating-point unit.
• Support for more complex and powerful systems, such as off-board L-2 cache support and
multiprocessor operation.

With the increase in notebook and palmtop computers, the 80486 was also enhanced to support
many energy and system management capabilities. These processors were named the 80486SL
processors. The new enhancements included:

• System Management Mode. This mode is triggered by the processor's own interrupt pin and
allows complex system management features to be added to a system transparently to the op-
erating system and application programs.
• Stop Clock and Auto Halt Powerdown. These allow the processor to either shut itself down
(and preserve its current state) or run at a reduced clock rate.

The Intel Pentium processor added many enhancements to the previous processors, including:

• The addition of a second execution pipeline. These two pipelines, named u and v, can exe-
cute two instructions per clock cycle. This is known as superscalar operation.
• Increased on-chip L-1 cache, 8 KB for code and another 8 KB for data. It uses the MESI
protocol to support write-back mode, as well as the write-through mode (which is used by
the 80486 processor) .
• Branch prediction with an on-chip branch table that improves looping characteristics.
• Enhancement to the virtual-8086 mode to allow for 4MB as well as 4 KB pages.

1790 Handbook of Data Communications and Networks


• 128-bit and 256-bit data paths are possible (although the main registers are still32 bits).
• Burstable 64-bit external data bus.
• Addition of Advanced Programmable Interrupt Controller (APIC) to support multiple Pen-
tium processors.
• New dual processing mode to support dual processor systems.

The Pentium processor has been extremely successful and has helped support enhanced multi-
tasking operating systems such as Windows NT and Windows 95/98. The Intel Pentium Pro
enhanced the Pentium processor with the following:

• Addition of a 3-way superscalar architecture, as opposed to a 2-way for the Pentium. This
allows three instructions to be executed for every clock cycle.
• Uses enhanced prediction of parallel code (called dynamic execution micro-architecture) for
the superscalar operation. This includes methods such as micro-data flow analysis, out-of-
order execution, enhanced branch prediction and speculative execution. The three instruc-
tion decode units work in parallel to decode object code into smaller operations called micro-
ops. These micro-ops then go into an instruction pool, and, when there are no interdepend-
encies they can be executed out-of-order by the five parallel execution units (two integer
units, two for floating-point operations and one for memory). A retirement unit retires com-
pleted micro-ops in their original program order and takes account of any branches. This
recovers the original program flow.
• Addition of register renaming. Multiple instructions not dependent on each other, using the
same registers, allow the source and destination registers to be temporarily renamed. The
original register names are used when instructions are retired and program flow is main-
tained.
• Addition of a closely coupled, on-package, 256 KB L-2 cache that has a dedicated 64-bit full
clock speed bus. The L-2 cache also supports up to four concurrent accesses through a 64-bit
external data bus. Each of these accesses is transaction-oriented where each access is handled
as a separate request and response. This allows for numerous requests while awaiting a re-
sponse.
• Expanded 36-bit address bus to give a physical address size of 64GB.

The Pentium II processor is a further enhancement to the processor range. Apart from increasing
the clock speed it has several enhancements over the Pentium Pro, including:

• Integration of MMX technology. MMX instructions support high-speed multimedia opera-


tions and include the addition of eight new registers (MMO to MM7), four MMX data types
and an MMX instruction set.
• Single edge contact (SEC) cartridge packaging. This gives improved handling performance
and socketability. It uses surface mount component and has a thermal plate (which accepts a
standard heat sink), a cover and a substrate with an edge finger connection.
• Integrated on-chip L-1 cache 16 KB for code and another 16 KB for data.
• Increased size, on-package, 512 KB L-2 cache.
• Enhanced low-power states, such as AutoHALT, Stop-Grant, Sleep and Deep Sleep.

AP5.7 Terms
Before introducing the Pentium Pro (P-6) various terms have to be defined. These are:

PC Processors 1791
Transaction Used to define a bus cycle. It consists of a set of phases, which re-
late to a single bus request.

Bus agent Devices that reside on the processor bus, that is, the processor, PCI
bridge and memory controller.

Priority agent The device handling reset, configuration, initialization, error detec-
tion and handling; generally the processor-to-PC! bridge.

Requesting agent The device driving the transaction, that is, busmaster.

Addressed agent The slave device addressed by the transaction, that is, target agent.

Responding agent The device that provides the transaction response on RS2 - RSO
signals.

Snooping agent A caching device that snoops on the transactions to maintain cache
coherency.

Implicit write-back When a hit to a modified line is detected during the snoop phase,
an implicit write-back occurs. This is the mechanism used to write-
back the cache line.

AP5.8 Pentium II and Pentium Pro


A major objective of electronic systems design is the saving of electrical power and the minimiza-
tion of electromagnetic interference (EMI). Thus gunning transceiver logic (GTL) has been used
to reduce both power consumption and EMI as it has a low voltage swing. GTL requires a 1 V
reference signal and signals which use GTL logic are terminated to 1.5 V. If a signal is 0.2 V
above the reference voltage, that is, 1.2 V, then it is considered high. If a signal is 0.2 V below
the reference voltage, that is, 0.8 V, then it is considered low.
The Pentium Pro and II support up to four processors on the same bus without extra sup-
porting logic. Integrated into the bus structure are cache coherency signals, advanced
programmable interrupt control signals and bus arbitration.
A great enhancement of the Pentium Pro bus is data error detection and correction. The
Pentium Pro bus detects and corrects all single-bit data bus errors and also detects multiple-bit
errors on the data bus. Address and control bus signals also have basic parity protection.
The Pentium Pro bus has a modified line write-back performed without backing off the cur-
rent bus owner, where the processor must perform a write-back to memory when it detects a hit
to a modified line. The following mechanism eliminates the need to back-off the current bus-
master. If a memory write is being performed by the current bus owner then two writes will be
seen on the bus, that is, the original one followed by the write-back. The memory controller
latches, and merges the data from the two cycles, and performs one write to DRAM. If the cur-
rent bus owner is performing a memory read then it accepts the data when it is being written to
memory.
Other enhanced features are:

1792 Handbook of Data Communications and Networks


• Deferred reply transactions stop the processor from having to wait for slow devices; transac-
tions that require a long time can be completed later, that is, deferred.
• Deeply pipelined bus transactions where the bus supports up to eight outstanding pipelined
transactions.

AP5.9 System overview


Figure Ap5.10 outlines the main components of a Pentium. A major upgrade is the support for
up to four processors. The memory control and data path control logic provides the memory
control signals, that is, memory address, RAS and CAS signals. The data path logic moves the
data between the processor bus and the memory data bus. The memory interface component
interfaces the memory data bus with the DRAM memory. Both interleaved and non-interleaved
methods are generally supported. The memory consists of dual-in-line memory modules, that is,
DIMMs. A DIMM module supports 64 data bits, and 8 pariry or ECC bits.
The PCI bridge provides the interface between the processor bus and the PCI bus. The stan-
dard bridge provides an interface between the PCI bus and the EISA I ISA bus. EISA I ISA
Support Component provides the EISA I ISA bus support functions, for example, timers, inter-
rupt control, flash ROM, keyboard interface, LNSA translation and XD bus control.

Processor
Memory
data path
and
memory
control
Memory 1/F
component r----.
Memory

Processor
1--
I-- PCI bridge

Processor
I-- f_

'
PCI bus

Processor I-- Standard


bridge I-- component
EISA/ISA EISA/I SA bus

Figure Ap5.1 0 P-6 architecture

PC Processors 1793
AP5.10 Memory address reference

Address bus size Addressable Address bus size Addressable memory


memo2 (bztes} ('ll.tes}
2 15 32K
2 4 16 64K
3 8 17 128K
4 16 18 256K
5 32 19 512K
6 64 20 IMt
7 128 21 2M
8 256 22 4M
9 512 23 8M
10 lK* 24 16M
11 2K 25 32M
12 4K 26 64M
13 8K 32 4G:j:
14 16K 64 16GG

* 1K represents 1024 t 1M represents I 048 576 (I 024 K)


:j: 1G represents I 073 741 824 (1 024 M)

1794 Handbook of Data Communications and Networks


Ap6 RLE Program

AP6.1 RLE program


Program Ap6.1 is a very simple program which scans a file IN. DAT and, using RLE, stores to a
file OUT . DAT. The special character sequence is:

ZZl'XX"

where zz is the flag sequence, cis the repetitive character and xx the number of times the charac-
ter occurs. The zz flag sequence is chosen because, in a text file, it is unlikely to occur within the
file. File listing Ap6.1 shows a sample IN. DAT and File listing Ap6.2 shows the RLE encoded file
(OUT.DAT).

~ Program Ap6.1
/* ENCODE.C */
#include <Stdio.h>
int main(void)
{
FILE *in,*out;
char previous,current;
int count;

if ( (in=fopen("in.dat", "r")) ==NULL)


{
printf ("Cannot open <in.dat>");
return(l);

if ( (out=fopen( "out .dat", "w")) ==NULL)


{
printf ("Cannot open <Out.dat>");
return(l);
}
do
count=l;
previous=current;
current=fgetc(in);
do {
previous=current;
current=fgetc(in);
if (previous!=current) ungetc(current,in);
else count++;
while (previous==current);
if (count>l) printf (out, "ZZ%c%02d" ,previous,count);
else fprintf(out,"%c",previous);
while (!feof(in));
fclose(in); fclose(out);
return(O);
Q File list Ap6.1
The bbbbbbboy stood onnnnn the burning
deck and still did.
1.000000000
3.000000010
5.000000000
Q File list Ap6.2
TheZZ 05ZZb07oy stZZo02d oZZnOS the burning
deckZZ 09and stiZZ102 did.
1. ZZ009
3. ZZ00710
S.ZZ009

Program Ap6.2 gives a simple C program which unencodes the RLE file produced by the previ-
ous program.

~ Program Ap6.2
/* UNENCODE.C */
#include <stdio.h>

int main(void)
{
FILE *in, *out;
char ch;
int count,i;

if ( (in=fopen( "out. dat", "r")) ==NULL)


{
printf ("Cannot open <OUt.dat>");
return (1);
}
if ( (out=fopen ( "in1. dat", "w") ) ==NULL)
{
printf("Cannot open <inl.dat>");
return(1);
}
do
{
ch=fgetc (in);

if (ch=='Z')
{
ch=fgetc (in);
if (ch=='Z')
{
fscanf(in,"%c%02d",&ch,&count);
for (i=O;i<count;i++)
fprintf (out, "%c", ch) ;

else ungetc(ch,in);

else fprintf(out,"%c",ch);

while (!feof(in));
fclose (in);
fclose(out);
return(O);

The zz flag sequence is inefficient as it uses two characters to store the flag; a better flag could be

1796 Handbook of Data Communications and Networks


an 8-bit character that cannot occur, such as 11111111b or ffh. Program Ap6.3 shows an ex-
ample of this and Program Ap6.4 shows the decoder.

I@ Program Ap6.3
#include <Stdio.h>
#define FLAG Oxff /* 1111 1111b */

int main(void)

FILE *in,*out;
char previous,current;
int count;

if (count>1) fprintf(out,"%c%c%02d",FLAG,previous,count);
else fprintf(out,''%c'',previous);
while (!feof(in));
fclose(in); fclose(out); return(O);

I@ Program Ap6.4
/* UNENCODE.C */
#include <stdio.h>
#define FLAG Oxff /* 1111 1111b */

int main(void)
{
FILE *in,*out;
char ch;
int count,i;

do
{
ch=fgetc (in);
i f (ch==FLAG)
ch=fgetc(in);
fscanf (in, "%c%02d", &ch, &count);
for (i=O;i<count;i++) fprintf(out,"%c",ch);

else fprintf(out,"%c",ch);

while (! feof (in)) ;


fclose (in) ;
fclose(out);
return(O);

In a binary file any bit sequence can occur. To overcome this, a flag sequence, such as 10101010
can be used to identifY the flag. If this sequence occurs within the data, it will be coded with two
flags two consecutive flags in the data are coded with three flags and so on.

For example: oooooooo 10101010 10101010 00011100 01001100

would be encoded as: 00000000 10101010 10101010 10101010 00011100 01001100

thus, when the three flags are detected, one of them is deleted.

RLE Program 1797


Ap7 SNR for PCM

Ap7.1 SNR

gr=-~-2
If a waveform has a maximum signal amplitude ofV, then the relative signal power will be:

Signal power= ~s = (
If n-bit PCM coding is used then there will be 2" different levels, as illustrated in Figure A7.1.

2•-1------------------------------
2•-2------------------------------
2•-3------------------------------
2•-4------------------------------

P(e)

Full range
(2V)

-q/2 +q/2

3 ·~bability
2 Quantization / ~~rror
distance (q)

0
Quantization
levels

Figure A7.1 Quantization

Thus, if the input signal ranges between + V and - V, the error in the quantization signal will
range from:

+!l to _!!_
2 2

where q is the quantization distance and is given by:

2V
q=-
2n
Figure A7 .I shows that the probability of error will be constant from between -q/2 to +q/2. The
area over the interval the P(e) should equal unity, hence they-axis value for P(e) will be Ilq.
Thus the noise power will be:

Jqdv
+= +q/2 y2
Noisepower= JJ!Flv)dv=2
0

+q/2
=~ IJ!dv=~ 3
[v"l]+q/2
o = 32q
(t1J
23
=i_
12

The signal-to-noise ratio will thus be:

SNR(dB)=10log10 (Si~alpower)=10log
Nmsepower
10 [ ~~2/2 ]=10log 10 ( 6~2 J
'I 'I
12

=10log10[(2 ~ ]=10log10 (f(zni)


(2n)
= 10 log10 (1.5)+ 20 log10 (zn )= 10 log 10 (1.5)+ 20 log10 (2n)
= 1.76 + 20nlog10 (2)
=6.02n+l.76

1800 Handbook of Data Communications and Networks


Ap 8 Java Reference

Ap8.1 Package java.applet

Class java.applet
The Applet class is a superclass of any applet. It provides a standard interface between applets
and their environment. The following are defined:

II Constructors
public Applet ()

II Methods
public void destroy()
public AppletContext getAppletContext()
public String getAppletinfo()
public AudioClip getAudioClip(URL url)
public AudioClip getAudioClip(URL url, String name)
public URL getCodeBase()
public URL getDocumentBase()
public Image getimage(URL url)
public Image getimage(URL url, String name)
public String getLocale() II Java 1.1
public String getParameter(String name)
public String [] [] getParameterinfo ()
public void init()
public boolean isActive()
public void play(URL url)
public void play(URL url, String name)
public void resize(Dimension d)
public void resize(int width, int height)
public final void setStub(AppletStub stub)
public void showStatus(String msg)
public void start()
public void stop()

Interface java.applet.AppletContext
The Appletcontext interface corresponds to the applet's environment. The following are de-
fined:

II Methods
public abstract Applet getApplet(String name)
public abstract Enumeration getApplets()
public abstract AudioClip getAudioClip(URL url)
public abstract Image getimage(URL url)
public abstract void showDocument(URL url)
public abstract void showDocument(URL url, String target)
public abstract void showStatus(String status)

Interface java.applet.AppletStub
The Appletstub interface acts as the interface between the applet and the browser environment
or applet viewer environment. The following are defined:
II Methods
public abstract void appletResize(int width, int height)
public abstract AppletContext getAppletContext()
public abstract URL getCodeBase()
public abstract URL getDocumentBase()
public abstract String getParameter(String name)
public abstract boolean isActive()

Interface java.applet.AudioCiip
The AudioClip interface is a simple abstraction for playing a sound clip. Multiple AudioClip
items can be playing at the same time, and the resulting sound is mixed together to produce a
composite. The following are defined:

II Methods
public abstract void loop()
public abstract void play()
public abstract void stop()

Ap8.2 Package java.awt

Class java.awt.ActiveEvent
An interface for events that know how to dispatch themselves. Its method is:

public void display()

Class java.awt.Borderlayout
The BorderLayout class contains members named "North", "South", "East", "West", and
"Center". These are laid out with a given size and constraints. The "North" and "South" com-
ponents can be stretched horizontally and the "East" and 'West" components can be stretched
vertically. The "Center" component can be stretched horiwntally and vertically. The following
are defined:

II Constructors
public BorderLayout()
public BorderLayout(int hgap, int vgap)
II Constants
public static final String CENTER; //Java 1.1
public static final String EAST; II Java 1.1
public static final String NORTH; II Java 1.1
public static final String SOUTH; II Java 1.1
public static final String WEST; II Java 1.1
II Methods
public void addLayoutComponent(Component camp, Object obj) II Java 1.1
public void addLayoutComponent(String name, Component camp)// Java 1.0
public int getHgap() II Java 1.1
public float getLayoutAlignmentX(Container parent) II Java 1.1
public float getLayoutAlignmentY(Container parent) II Java 1.1
public int getVgap() II Java 1.1
public void invalidateLayout(Container target) II Java 1.1
public void layoutContainer(Container target)
public Dimension maximumLayoutSize(Container target) II Java 1.1
public Dimension minimumLayoutSize(Container target)
public Dimension preferredLayoutSize(Container target)

1802 Handbook of Data Communications and Networks


public void removeLayoutComponent(Component comp)
public int setHgap() II Java 1.1
public int setVgap() II Java 1.1
public String toString()

Class java.awt.Button
The Button class creates labeled buttons, which can have an associated action when pushed.
Three typical actions are: normal, when it has the input focus (the darkening of the outline lets
the user know that this is an active object) and when the user clicks the mouse over the button.
The following are defined:

II Constructors
public Button ()
public Button(String label)

II Methods
public synchronized void addActionListener(ActionListern llll Java 1.1
public void addNotify()
public String getActionCommand() II Java 1.1
public String getLabe1()
protected String paramString()
public synchronized void removeActionListener(ActionListener 1)
II Java 1.1
public setActionCommand(String command) II Java 1.1
public void setLabe1(String label)

Class java.awt.Checkbox
The Checkbox class contains a checkbox which has an on/off state. The following are defined:

II Constructors
public Checkbox()
public Checkbox(String label)
public Checkbox(String label, boolean state) II Java 1.1
public Checkbox(String label, boolean state, Checkbox group) II Java 1.1
public Checkbox(String label, CheckboxGroup group, boolean state)

II Methods
public synchronized void additemListener(ItemListener 1) II Java 1.1
public void addNotify()
public CheckboxGroup getCheckboxGroup()
public String getLabe1()
public boolean getState()
public Object[] getSelectedObject() II Java 1.1
protected String paramString()
public synchronized void removeitemListener(ItemListener 1) II Java 1.1
public void setCheckboxGroup(CheckboxGroup g)
public void setLabel(String label)
public void setState(boolean state)

Class java.awt.CheckboxGroup
The CheckGroup class groups a number of checkbox buttons. Only one of the checkboxes can
be true (on} at a time. When one button is made true (on} the others will become false (off). The
following are defined:

II Constructors
public CheckboxGroup()

Java Reference 1803


II Methods
public Checkbox getCurrent() II Java 1.0
public Checkbox getSelectedCUrrent() II Java 1.1
public void setCUrrent(Checkbox box) II Java 1.0
public void setSelectedCheckbox(Checkbox box) II Java 1.1
public String toString()

Class java.awt.CheckboxMenultem
The CheckboxMenurtem class allows for a checkbox rhat can be included in a menu. The follow-
ing are defined:

II Constructors
public CheckboxMenuitem() II Java 1.1
public CheckboxMenuitem(String label)
public CheckboxMenuitem(String label, boolean state) II Java 1.1

II Methods
public synchronized void additemListener(ItemListener 1) II Java 1.1
public void addNotify()
public boolean getState()
public synchronized Object[] getSelectObjects() II Java 1.1
public String paramString()
public synchronized void removeitemListener(ItemListener llll Java 1.1
public void setState(boolean t)

Class java.awt.Choice
The Choice class allows for a pop-up menu. The following are defined:

II Constructors
public Choice ()

II Methods
public synchronized add(String item) II Java 1.1
public void additem(String item)
public synchronized void additemListener(ItemListener 1) II Java 1.1
public void addNotify()
public int countitems() II Java 1.0
public String getitem(int index)
public String getitemCount() II Java 1.1
public int getSe1ectedindex()
public String getSelecteditem()
protected String paramString()
public synchronized Object[] getSelectedObjects() II Java 1.1
public synchronized void insert(String item, int index) II Java 1.1
public synchronized void remove(String item) II Java 1.1
public synchronized void remove(int position) II Java 1.1
public synchronized void removeAll() II Java 1.1
public synchronized void removeitemListener(ItemListener llll Java 1.1
public void select(int pos)
public void select(String str)

Class java.awt.Color
This Color class supports rhe RGB color format. A color is represented by a 24-bit value of
which rhe red, green and blue components are represented by an 8-bit value (O to 255). The
minimum intensity is 0, and the maximum is 255. The following are defined:

1804 Handbook of Data Communications and Networks


II Constants
public final static Color black, blue, cyan, darkGray, gray, green;
public final static Color lightGray, magenta, orange, pink, red;
public final static Color white, yellow;

II Constructors
public Color(float r, float g, float b)
public Color(int rgb)
public Color(int r, int g, int b)

II Methods
public Color brighter()
public Color darker()
public static Color decode (Strimg nm) II Java 1.1
public boolean equals(Object obj)
public int getBlue()
public static Color getColor(String nm)
public static Color getColor(String nm, Color v)
public static Color getColor(String nm, int v)
public int getGreen()
public static Color getHSBColor(float h, float s, float b)
public int getRed()
public int getRGB()
public int hashCode()
public static int HSBtoRGB(float hue, float saturation, float brightness)
public static float[] RGBtoHSB(int r, int g, int b, float hsbvals[])
public String toString()

Class java.awt.Component
The component class is the abstract superclass for many of the Abstract Window Toolkit classes.
The following are defined:
II Constants
public static final float BOTTOM_ALIGNMENT, CENTER_ALIGNMENT;
public static final float LEFT_ALIGNMENT, RIGHT_ALIGNMENT;
public static final float TOP_ALIGNMENT;

II Methods
public boolean action(Event evt, Object what) II Java 1.0
public synchronized void add(PopupMenu popup) II Java 1.1
public synchronized void addComponentListener(ComponentListener 1)
II Java 1.1
public synchronized void addFocusListener(FocusListener 1) II Java 1.1
public synchronized void addKeyListener(KeyListener 1) II Java 1.1
public synchronized void addMouseListener(MouseListener 1) II Java 1.1
public synchronized void addMouseMotionListener(MouseMotionListener 1)
I I Java 1.1
public void addNotify()
public Rectangle bounds() II Java 1.0
public int checkimage(Image image, ImageObserver observer)
public int checkimage(Image image, int width, int height,
ImageObserver observer)
public boolean contains(int x, int y) II Java 1.1
public boolean contains(Point p) II Java 1.1
public Image createimage(ImageProducer producer)
public Image createimage(int width, int height)
public void deliverEvent(Event evt) II Java 1.0
public void disable() II Java 1.0
public final void displayEvent(AWTEvent e) II Java 1.1
public void doLayout() II Java 1.1

Java Reference 1805


public void enable() II Java 1.0
public void enable(boolean cond) II Java 1.0
public float getAlignmentX() II Java 1.1
public float gatAlignmentY() II Java 1.1
public Color getBackground()
public Rectangle gatBounds() II Java 1.1
public ColorModel gatColorModel()
public Component gatComponantAt(int x, int y) II Java 1.1
public Component getComponentAt(Point p) II Java 1.1
public Cursor getCUrsor() II Java 1.1
public Font getFont()
public FontMetrics getFontMetrics(Font font)
public Color getForaground()
public Graphics getGraphics()
public Locale getLocala() II Java 1.1
public Point getLocation() II Java 1.1
public Point getLocationOnScreen() II Java 1.1
public Dimension gatMaximumSize() II Java 1.1
public Dimension getMinimumSize() II Java 1.1
public Container getParent()
public ComponentPeer getPear() I I Java 1.0
public Dimension getPreferredSiza() II Java 1.1
public Dimension getSize() II Java 1.1
public Toolkit getToolkit()
public final Object getTreaLock() II Java 1.1
public boolean gotFocus(Event evt, Object what) II Java 1.0
public boolean handleEvant(Event evt) II Java 1.0
public void hide() II Java 1.0
public boolean imageUpdate(Image img, int flags, int x, int y, int w, int h)
public boolean insida(int x, int y) II Java 1.0
public void invalidate()
public boolean isEnabled()
public boolean isFocusTransversable() II Java 1.1
public boolean isShowing()
public boolean isValid()
public boolean isVisible()
public boolean keyDown(Event evt, int key) II Java 1.0
public boolean keyUp(Event evt, int key) II Java 1.0
public void layout() II Java 1.0
public void list()
public void list(PrintStream out)
public void list(PrintStream out, int indent)
public void list(PrintStream out) II Java 1.1
public Component locate(int x, int y) II Java 1.0
public Point location() II Java 1.0
public boolean lostFocus(Event evt, Object what) II Java 1.0
public Dimension minimumSize() II Java 1.0
public boolean mouseDown(Event evt, int x, int y) II Java 1.0
public boolean mouseDrag(Event evt, int x, int y) II Java 1.0
public boolean mouseEnter(Event evt, int x, int y) II Java 1.0
public boolean mouseExit(Event evt, int x, int y) II Java 1.0
public boolean mousaMove(Event evt, int x, int y) II Java 1.0
public boolean mouseUp(Event evt, int x, int y) II Java 1.0
public void move(int x, int y) II Java 1.0
public void nextFocus() II Java 1.0
public void paint(Graphics g)
public void paintAll(Graphics g)
protected String paramString()
public boolean postEvent(Event evt) II Java 1.0
public Dimension preferredSize() II Java 1.0
public boolean prepareimage(Image image, ImageObserver observer)
public prapareimaga(Image image, int width, int height, ImageObserver observer)
public void print(Graphics g)
public void printAll(Graphics g)

1806 Handbook of Data Communications and Networks


public synchronized void remove(MenuComponent popup) II Java 1.1
public synchronized void removeComponentListener(ComponentListener 1)
I I Java 1.1
public synchronized void removeFocusListener(FocusListener 1) II Java 1.1
public synchronized void removeKeyListener(KeyListener 1) II Java 1.1
public synchronized void removeMouseListener(MouseListener 1) II Java 1.1
public synchronized void removeMouseMotionListener(MouseMotionListener 1)
II Java 1.1
public void removeNotify()
public void repaint ()
public void repaint(int x, int y, int width, int height)
public void repaint(long tm)
public void repaint(long tm, int x, int y, int width, int height)
public void requestFocus()
public void reshape(int x, int y, int width, int height) II Java 1.0
public void resize(Dimension d) II Java 1.0
public void resize(int width, int height) II Java 1.0
public void setBackground(Color c)
public void setBounds(int x, int y, int width, int height) II Java 1.1
public void setBounds(Rectangle r) II Java 1.1
public synchronized void setCursor(Cursor cursor) II Java 1.1
public void setEnabled(boolean b) II Java 1.1
public void setFont(Font f)
public void setForeground(Color c)
public void setLocale(Locale 1) I I Java 1.1
public void setLocation(int x, int y) II Java 1.1
public void setLocation(Point p) II Java 1.1
public void setName(String name) II Java 1.1
public void setSize(int width, int height) II Java 1.1
public void setSize(Dimension d) II Java 1.1
public void setVisible(boolean b) II Java 1.1
public void show() II Java 1.0
public void show(boolean cond) II Java 1.0
public Dimension size() II Java 1.0
public String toString()
public void transferFocus() II Java 1.1
public void update(Graphics g)
public void validate()

Class java.awt.Container
The container class is the abstract superclass representing all components that can hold other
components. The following are defined:

II Methods
public Component add(Component camp)
public Component add(Component camp, int pas)
public Component add(String name, Component camp)
public void add(Component camp, Object constraints) II Java 1.1
public void add(Component camp, Object constraints, int index) II Java 1.1
public void addContainerListener(ContainerListener 1) II Java 1.1
public void addNotify()
public int countComponents() I I Java 1.0
public void deliverEvent(Event evt) II Java 1.0
public void doLayout() II Java 1.1
public void getAlignmentX() II Java 1.1
public void getAlignmentY() II Java 1.1
public Component getComponent(int n)
public Component getComponentAt(int x, int y) II Java 1.1
public Component getComponentAt(Point p) II Java 1.1
public int getComponentCount() II Java 1.1
public Component[] getComponents()

Java Reference 1807


public getinsets() II Java 1.1
public LayoutManager getLayout()
public Dimension getMaximumSize() II Java 1.1
public Dimension getMinimumSize() II Java 1.1
public Dimension getPreferredSize() II Java 1.1
public Insets insets() II Java 1.0
public void invalidate() II Java 1.1
pubic boolean isAncestorOf(Component c) II Java 1.1
public void layout() II Java 1.0
public void list(PrintStream out, int indent)
public void 1ist(PrintWriter out, int indent) II Java 1.1
public Component 1ocate(int x, int y) II Java 1.0
public Dimension minimumSize() II Java 1.0
public void paintComponents(Graphics g)
protected String paramString()
public Dimension preferredSize() II Java 1.0
public void print(Graphics g) II Java 1.1
public void printComponents(Graphics g)
public void remove(int index) II Java 1.1
public void remove(Component camp)
public void removeA11()
public void removeContainerListener(ContainerListener 1) II Java 1.1
public void removeNotify()
public void setLayout(LayoutManager mgr)
public void validate()

Class java.awt.Cursor
The cursor class represents a mouse cursor. The following are defined:

II Constructors
public Cursor(int type) II Java 1.1

II Constants
public static final int DEFAULT_CURSOR; II Java 1.1
public static final int CROSSHAIR_CURSOR, HAND_CURSOR; II Java 1.1
public static final int MOVE_CURSOR; II Java 1.1
public static final int TEXT_CURSOR, WAIT_CURSOR; II Java 1.1
public static final int N_RESIZE_CURSOR, S_RESIZE_CURSOR; II Java 1.1
public static final int E_RESIZE_CURSOR, W_RESIZE_CURSOR; II Java 1.1
public static final int NE_RESIZE_CURSOR, NW_RESIZE_CURSOR; II Java 1.1
public static final int SE_RESIZE_CURSOR, SW_RESIZE_CURSOR; II Java 1.1

I I Methods
public static Cursor getDefau1tCursor () I I Java 1.1
public static Cursor getPredefinedCursor() II Java 1.1

Class java.awt.Dialog
The Dialog class suppons a dialog window, in which a user can enter data. Dialog windows are
invisible until the show method is used. The following are defined:

II Constructors
public Dia1og(Frame parent) II Java 1.1
public Dialog(Frame parent, boolean modal)
public Dia1og(Frame parent, String title) I I Java 1.1
public Dialog(Frame parent, String title, boolean modal)

II Methods
public void addNotify()

1808 Handbook of Data Communications and Networks


public String getTitle()
public boolean isModal()
public boolean isResizable()
public void setModal(boolean b) II Java 1.1
protected String paramString()
public void setResizable(boolean resizable)
public void setTitle(String title)
public void show () I I Java 1. 1

Class java.awt.Dimension
The Dimension class contains the width and height of a component in an object. The following
ate defined:

II Fields
public int height;
public int width;

II Constructors
public Dimension()
public Dimension(Dimension d)
public Dimension(int width, int height)

II Methods
public boolean equals(Object obj) II Java 1.1
public Dimension getSize{) II Java 1.1
public void setSize(Dimension d) II Java 1.1
public void setSize(int width, int height) II Java 1.1
public String toString()

Class java.awt.Event
The Event class encapsulates user events from the GUI. The following ate defined:

II Fields
public Object arg;
public int clickCount;
public Event evt;
public int id;
public int key;
public int modifiers;
public Object target;
public long when;
public int x;
public int y;

II possible values for the id field


public final static int ACTION_EVENT, GOT_FOCOS;
public final static int KEY_ACTION, KEY_ACTION_RELEASE;
public final static int KEY_PRESS, KEY_RELEASE;
public final static int LIST_DESELECT, LIST_SELECT;
public final static int LOAD_FILE, LOST_FOCUS;
public final static int MOUSE_DOWN, MOUSE_DRAG;
public final static int MOUSE_ENTER, MOUSE_EXIT;
public final static int MOUSE_MOVE, MOUSE_UP;
public final static int SAVE_FILE, SCROLL ABSOLUTE;
public final static int SCROLL_BEGIN, SCROLL_END; II Java 1.1
public final static int SCROLL_LINE_DOWN, SCROLL_LINE_UP;
public final static int SCROLL_PAGE_DOWN, SCROLL_PAGE_UP;
public final static int WINDOW_DEICONIFY, WINDOW_DESTROY;
public final static int WINDOW_EXPOSE, WINDOW_ICONIFY;

Java Reference 1809


public final static int WINDOW_MOVED;

II possible values for the key field when the


II action is KEY_ACTION or KEY_ACTION_RELEASE
public final static int DOWN, END;
public final static int Fl, F2, F3, F4, FS, F6, F7, FS, F9, FlO, Fll, Fl2
public final static int HOME, LEFT, PGDN, PGUP, RIGHT, UP;
public final static int INSERT, DELETE; II Java 1.1
public final static int BACK SPACE, ENTER; II Java 1.1
public final static int TAB,-ESCAPE; II Java 1.1
public final static int CAPS_LOCK, NUM_LOCK; II Java 1.1
public final static int SCROLL_LOCK, PAUSE; II Java 1.1
public final static int PRINT_SCREEN; II Java 1.1

II possible masks for the modifiers field


public final static int ALT MASK;
public final static int CTRL_MASK;
public final static int META_MASK;
public final static int SHIFT_MASK;

II Constructors
public Event(Object target, int id, Object arg)
public Event(Object target, long when, int id,
int x, int y, int key, int modifiers)
public Event(Object target, long when, int id,
int x, int y, int key, int modifiers, Object arg)

II Methods
public boolean controlDown()
public boolean metaDown()
protected String paramString()
public boolean shiftDown()
public String toString()
public void translate(int dX, int dY)

Class java.awt.FileDialog
The FileDialog class displays a dialog window. The following are defined:

II Fields
public final static int LOAD, SAVE;

II Constructors
public FileDialog(Frame parent) II Java 1.1
public FileDialog(Frame parent, String title)
public FileDialog(Frame parent, String title, int mode)
II Methods
public void addNotify()
public String getDirectory()
public String getFile()
public FilenameFilter getFilenameFilter()
public int getMode()
protected String paramString()
public void setDirectory(String dir)
public void setFile(String file)
public void setFilenameFilter(FilenameFi lter filter)

Class java.awt.Fiowlayout
The FlowLayout class arranges components from left to right. The following are defined:

1810 Handbook of Data Communications and Networks


II Fields
public final static int CENTER, LEFT, RIGHT;

II Constructors
public FlowLayout()
public FlowLayout(int align)
public FlowLayout(int align, int hgap, int vgap)

II Methods
public void addLayoutComponent(String name, Component comp)
public int getAlignment() II Java 1.1
public int getHgap() II Java 1.1
public int getVgap() II Java 1.1
public void layoutContainer(Container target)
public Dimension minimumLayoutSize(Container target)
public Dimension preferredLayoutSize(Container target)
public void removeLayoutComponent(Component comp)
public void setAlignment(int align) II Java 1.1
public void setHgap(int hgap) II Java 1.1
public void setVgap(int vgap) II Java 1.1
public String toString()

Class java.awt.Font
The Font class represents fonts. The following are defined:

II Fields
protected String name;
protected int size;
protected int style;

II style has the following bit masks


public final static int BOLD, ITALIC, PLAIN;

II Constructors
public Font(String name, int style, int size)

II Methods
public static Font decode(String str) II Java 1.1
public boolean equals(Object obj)
public String getFamily()
public static Font getFont(String nm)
public static Font getFont(String nm, Font font)
public String getName()
public int getSize(}
public int getStyle()
public FontPeer getPeer() II Java 1.1
public int hashCode()
public boolean isBold(}
public boolean isitalic()
public boolean isPlain()
public String toString()

Class java.awt.FontMetrics
The FontMetrics class provides information about the rendering of a particular font. The fol-
lowing are defined:

II Fields
protected Font font;

Java Reference 1811


II Constructors
protected FontMetrics(Font font}

II Methods
public int bytesWidth(byte data[], int off, int len}
public int charsWidth(char data[], int off, int len}
public int charWidth(char ch}
public int charWidth(int ch}
public int getAscent(}
public int getDescent(}
public Font getFont(}
public int getHeight(}
public int getLeading(}
public int getMaxAdvance(}
public int getMaxAscent(}
public int getMaxDescent(} II Java 1.0
public int[J getWidths(}
public int stringWidth(String str}
public String toString(}

Class java.awt.Frame
The Frame class contains information on the top-level window. The following are defined:

II possible cursor types for the setCursor method


public final static int CROSSHAIR_CURSOR, DEFAULT_CURSOR;
public final static int E_RESIZE_CURSOR, HAND_CURSOR;
public final static int MOVE_CURSOR, N_RESIZE_CURSOR;
public final static int NE_RESIZE_CURSOR, NW_RESIZE_CURSOR;
public final static int S_RESIZE_CURSOR, SE_RESIZE_CURSOR;
public final static int SW_RESIZE_CURSOR, TEXT_CURSOR;
public final static int W_RESIZE_CURSOR, WAIT_CURSOR;
II Constructors
public Frame(}
public Frame(String title}
II Methods
public void addNotify(}
public void dispose(}
public int getCursorType(} II Java 1.0
public Image geticonimage(}
public MenuBar getMenuBar(}
public String getTitle(}
public boolean isResizable(}
protected String paramString(}
public void remove(Menucomponent m}
public void seteursor(int cursorType} II Java 1.0
public void seticonimage(Image image}
public void setMenuBar(MenuBar mb}
public void setResizable(boolean resizable}
public void setTitle(String title}

Class java.awt.Graphics
The Graphics class is an abstract class for all graphics contexts. This allows an application to
draw onto components or onto off-screen images. The following are defined:

II Constructors
protected Graphics(}

II Methods
public abstract void clearRect(int x, int y, int width, int height}

1812 Handbook of Data Communications and Networks


public abstract void clipRect(int x, int y, int width, int height)
public abstract void copyArea(int x, int y, int width, int height,
int dx, int dy)
public abstract Graphics create()
public Graphics create(int x, int y, int width, int height)
public abstract void dispose()
public void drawlDRect(int x, int y, int width, int height, boolean raised)
public abstract void drawArc(int x, int y, int width, int height,
int startAngle, int arcAngle)
public void drawBytes(byte data[], int offset, int length, int x, int y)
public void drawChars(char data(], int offset, int length, int x, int y)
public abstract booleandrawimage(Image img, int x, int y, Color bgcolor,
ImageObserver observer)
public abstract boolean drawimage(Image img, int x, int y,
ImageObserver observer)
public abstract boolean drawimage(Image img, int x, int y, int width,
int height, Color bgcolor, ImageObserver observer)
public abstract boolean drawimage(Image img, int x, int y, int width,
int height, ImageObserver observer)
public abstract boolean drawimage(Image img, int x, int y, int width,
int height, Color bgcolor, ImageObserver observer) II Java 1.1
public abstract void drawLine(int x1, int y1, int x2, int y2)
public abstract void drawova1(int x, int y,int width, int height)
public abstract void drawPo1ygon(int xPoints(], int yPoints(], int nPoints)
public void drawPolygon(Polygon p)
public abstract void drawPo1y1ine(int xPoints(], int yPoints(], int nPoints)

II Java 1.1
public void drawRect(int x, int y, int width, int height)
public abstract void drawRoundRect(int x, int y, int width,
int height, int arcWidth, int arcHeight)
public abstract void drawString(String str, int x, int y)
public void fill3DRect(int x, int y, int width, int height, boolean raised)
public abstract void fillArc(int x, int y, int width, int height,
int startAngle int arcAngle)
public abstract void fillOval(int x, int y, int width, int height)
public abstract void fillPolygon(int xPoints(], int yPoints(], int nPoints)
public void fillPolygon(Polygon p)
public abstract void fillRect(int x, int y, int width, int height)
public abstract void fillRoundRect(int x, int y, int width, int height,
int arcWidth, int arcHeight)
public void finalize()
public abstract Shape getClip() II Java 1.1
public abstract Rectangle getC1ipBounds() II Java 1.1
public abstract Rectangle getClipRect() II Java 1.0
public abstract Color getColor()
public abstract Font getFont()
public FontMetrics getFontMetrics()
public abstract FontMetrics getFontMetrics(Font f)
public abstract void setClip(int x, int y, int width, int height) II Java 1.1
public abstract void setClip(Shape clip) II Java 1.1
public abstract void setColor(Color c)
public abstract void setFont(Font font)
public abstract void setPaintMode()
public abstract void setXORMode(Color c1)
public String toString()
public abstract void translate(int x, int y)

Class java.awt.lmage
The Image abstract class is the superclass of all classes that represents graphical images.

II Constants

Java Reference 1813


public static final int SCALE_AREA_AVERAGING, SCALE_DEFAULT;
public static final int SCALE_FAST, SCALE_REPLICATE;
public static final int SCALE_SMOOTH;

II Fields
public final static Object UndefinedProperty;

I I Constructors
public Image ()

II Methods
public abstract void flush()
public abstract Graphics getGraphics()
public abstract int getHeight(ImageObserver observer)
public abstract Object getProperty(String name, ImageObserver observer)
public Image getScaledinstance(int width, int height, int hints) II Java 1.1
public abstract ImageProducer getSource()
public abstract int getWidth(ImageObserver observer)

Class java.awt.lnsets
The Insets object represents borders of a container and specifies the space that should be left
around the edges of a container. The following are defined:

II Fields
public int bottom, left;
public int right, top;
I I Constructors
public Insets(int top, int left, int bottom, int right)

II Methods
public Object clone()
public boolean equals(Object obj) II Java 1.1
public String toString()

Class java.awt.Label
The label class is a component for placing text in a container. The following are defined:
II Fields
public final static int CENTER, LEFT, RIGHT;

II Constructors
public Label ()
public Label(String label)
public Label(String label, int alignment)

II Methods
public void addNotify()
public int getAlignment()
public String getText()
protected String paramString()
public void setAlignment(int alignment)
public void setText(String label)

Closs java.awt.List
The List object can be used to produce a scrolling list of text items. It can be set up so that the
user can either pick one or many items. The following are defined:

II Constructors

1814 Handbook of Data Communications and Networks


public List ()
public List(int rows) II Java 1.1
public List(int rows, boolean multipleSelections)

II Methods
public void add(String item) II Java 1.1
public void addActionListener(ActionListener 1) II Java 1.1
public void additem(String item)
public void additem(String item, int index)
public synchronized void additemListener(ItemListener 1) II Java 1.1
public void addNotify()
public boolean allowsMultipleSelections() II Java 1.0
public void clear() II Java 1.0
public int countitems() I I Java 1. 0
public void delitem(int position)
public void delitems(int start, int end) II Java 1.0
public void deselect(int index)
public String getitem(int index)
public int getitemCount() II Java 1.1
public synchronized String[] getitems() II Java 1.1
public Dimension getMinimumSize(int rows) II Java 1.1
public Dimension getMinimumSize() II Java 1.1
public Dimension getPreferredSize(int rows) II Java 1.1
public Dimension getPreferredSize() II Java 1.1
public int getRows()
public int getSelectedindex()
public int[] getSelectedindexes()
public String getSelecteditem()
public String[] getSelecteditems()
public Object[] getSelectedObjects() II Java 1.1
public int getVisibleindex()
public boolean isindexSelected(int index) II Java 1.1
public MultipleMode() I I Java 1.1
public boolean isSelected(int index) II Java 1.0
public void makeVisible(int index)
public Dimension minimumSize() II Java 1.0
public Dimension minimumSize(int rows) II Java 1.0
protected String paramString()
public Dimension preferredSize() II Java 1.0
public Dimension preferredSize(int rows) II Java 1.0
public synchronized void remove(String item) II Java 1.1
public synchronized void remove(int position) II Java 1.1
public synchronized void removeActionListener(ActionListener 1) II Java 1.1
public synchronized void removeAll() II Java 1.1
public synchronized void removeitemListener(ItemListener 1) II Java 1.1
public void removeNotify()
public void replaceitem(String newValue, int index)
public void select(int index)
public synchronized void setMultipleMode(boolean b) II Java 1.1
public void setMultipleSelections(boolean v)

Class java.awt.MediaTracker
The MediaTracker class contains a number of media objects, such as images and audio. The
following are defined:

II Fields
public final static int ABORTED, COMPLETE;
public final static int ERRORED, LOADING;

II Constructors
public MediaTracker(Component comp)

Java Reference 1815


II Methods
public void addrmage{Image image, int id)
public void addimage{Image image, int id, int w, int h)
public boolean checkAll{)
public boolean checkAll{boolean load)
public boolean checkiD{int id)
public boolean checkiD{int id, boolean load)
public Object[] getErrorsAny{)
public Object[] getErrorsiD{int id)
public boolean isErrorAny{)
public boolean isErroriD{int id)
public synchronized removeimage{Image image) II Java 1.1
public synchronized removeimage{Image image, int id) II Java 1.1
public synchronized removeimage{Image image, int id, int width, int height)
II Java 1.1
public int statusAll{boolean load)
public int statusiD{int id, boolean load)
public void waitForAll{)
public boolean waitForAll{long ms)
public void waitForiD{int id)
public boolean waitForiD{int id, long ms)

Class java.awt.Menu
The Menu object contains a pull-down component for a menu bar. The following are defined:

II Constructors
public Menu {) I I Java 1 . 1
public Menu{String label)
public Menu{String label, boolean tearOff)

II Methods
public Menuitem add{Menuitem mi)
public void add{String label)
public void addNotify{)
public void addSeparator()
public int countitems{)
public Menuitem getitem{int index)
public int getitemCount{) II Java 1.1
public synchronized void Insert{Menuitem menuitem, int index) II Java 1.1
public void InsertSepatator{int index) I I Java 1.1
public boolean isTearOff()
public void remove(int index)
public void remove(MenuComponent item)
public synchronized void removeAll{) II Java 1.1
public void removeNotify{)

Class java.awt.MenuBar
The MenuBar object contains a menu bar which is bound to a frame. The following are defined:

II Constructors
public MenuBar{)

II Methods
public Menu add{Menu m)
public void addNotify{)
public int countMenus()
public void deleteShortCut(MenuShortCut s) II Java 1.1
public Menu getHelpMenu{)

1816 Handbook of Data Communications and Networks


public Menu getMenu(int i)
public int getMenuCount () I I Java 1. 1
public Menuitem getShortcutMenuitem(MenuShortcut s) II Java 1.1
public void remove(int index)
public void remove(MenuComponent m)
public void removeNotify()
public void setHelpMenu(Menu m)
public synchronized Enumeration shortcuts() II Java 1.1

Class java.awt.MenuComponent
The Menucomponent abstract class is the superclass of all menu-related components. The follow-
ing are defined:

II Constructors
public MenuComponent()

II Methods
public final void dispatchEvent(AWTEvent e) II Java 1.1
public Font getFont()
public String getName() II Java 1.1
public MenuContainer getParent()
public MenuComponentPeer getPeer() II Java 1.0
protected String paramString()
public boolean postEvent(Event evt)
public void removeNotify()
public void setFont(Font f)
public void setName(String name) II Java 1.1
public String toString()

Class java.awt.Menultem
The Menurtem class contains all menu items. The following are defined:

II Constructors
public Menuitem() II Java 1.1
public Menuitem(String label)
public Menuitem(String label, MenuShortcut s) II Java 1.1

II Methods
public void addActionListener(ActionListener 1) II Java 1.1
public void addNotify ()
public void deleteShortcut() II Java 1.1
public void disable() II Java 1.0
public void enable() II Java 1.0
public void enable(boolean cond) II Java 1.0
public String getLabel()
public MenuShortcut getShortcut() II Java 1.1
public boolean isEnabled()
public String paramString()
public synchronized void removeActionListener(ActionListener l)
II Java 1.1
public void setActionCommand(String command) II Java 1.1
public synchronized void setEnabled(boolean b) II Java 1.1
public void setLabel(String label)
public void setShortcut(MenuShortcut s) II Java 1.1

Class java.awt.MenuShortcut
The MenuShortcut class has been added with Java 1.1. It represents a keystroke used to select a

Java Reference 1817


Menuitem. The following are defined:

II Constructors
public MenuShortcut(int key) II Java 1.1
public MenuShortcut(int key, boolean useShiftModifier) II Java 1.1

II Methods
public boolean equals(MenuShortcut s) II Java 1.1
public int getKey () II Java 1. 1
public String toString() II Java 1.1
public boolean usesShiftModifier() II Java 1.1

Class java.awt.Panel
The Panel class provides space into which an application can attach a component. The follow-
ing are defined:

II Constructors
public Panel ()
public Panel(LayoutManger layout) II Java 1.1

II Methods
public void addNotify()

Class java.awt.Point
The Point class represents an (x, y) co-ordinate. The following are defined:

II Fields
public int x;
public int y;

II Constructors
public Point () II Java 1 .1
public Point(Point p) II Java 1.1
public Point(int x, int y)

II Methods
public boolean equals(Object obj)
public Point getLocation() II Java 1.1
public int hashCode()
public void move(int x, int y)
public void setLocation(Point p) II Java 1.1
public void setLocation(int x, int y) II Java 1.1
public String toString()
public void translate(int dx, int dy)

Class java.awt.Polygon
The Polygon class consists of an array of (x, y), which define the sides of a polygon. The follow-
ing are defined:

II Fields
public int npoints, xpoints[] ,ypoints[];

II Constructors
public Polygon ()
public Polygon(int xpoints[], int ypoints[J, int npoints)

1818 Handbook of Data Communications and Networks


II Methods
public void addPoint(int x, int y)
public boolean contains(Point p) II Java 1.1
public boolean contains(int x, int y) II Java 1.1
public Rectangle getBoundingBox() II Java 1.0
public Rectangle getBounds() II Java 1.1
public boolean inside(int x, int y) II Java 1.0

Class java.awt.PopupMenu
The PopupMenu class has been added with Java 1.1. It represetns a pop-up menu rather than a
pull-down menu. The following are defined:

II Constructors
public PopupMenu () I I Java 1.1
public PopupMenu(String label) II Java 1.1

II Methods
public synchronized void addNotify() II Java 1.1
public void show(Component origin, int x, int y) II Java 1.1

Class java.awt.Rectangle
The Rectangle class defines an area defined by its top-left (x, y) co-ordinate, its width and its
height. The following are defined:
II Fields
public int height, width, x, y;

II Constructors
public Rectangle()
public Rectangle(Rectangle r) II Java 1.1
public Rectangle(Dimension d)
public Rectangle(int width, int height)
public Rectangle(int x, int y, int width, int height)
public Rectangle(Point p)
public Rectangle(Point p, Dimension d)
II Methods
public void add(int newx, int newy)
public void add(Point pt)
public void add(Rectangle r)
public boolean contains(Point p) II Java 1.1
public boolean contains(int x, int y) II Java 1.1
public boolean equals(Object obj)
public Rectangle getBounds() II Java 1.1
public Point getLocation() II Java 1.1
public Dimension getSize() II Java 1.1
public void grow(int h, int v)
public int hashCode()
public boolean inside(int x, int y) II Java 1.0
public Rectangle intersection(Rectangle r)
public boolean intersects(Rectangle r)
public boolean isBmpty()
public void move(int x, int y) II Java 1.0
public void reshape(int x, int y, int width, int height) II Java 1.0
public void resize(int width, int height) II Java 1.0
public void setBounds(Rectangle r) II Java 1.1
public void setBounds(int x, int y, int width, int height) II Java 1.1
public void setLocation(Point p) II Java 1.1
public void setLocation(int x, int y) II Java 1.1
public void setSize(Dimension d) II Java 1.1

Java Reference 1819


public void setSize(int x, int y) II Java 1.1
public String toString()
public void translate(int dx, int dy)
public Rectangle union(Rectangle r)

Closs java.awt.Scrollbar
The scrollbar class is a convenient means of allowing a user to select from a range of values.
The following are defined:

II Fields
public final static int HORIZONTAL, VERTICAL;

II Constructors
public Scrollbar()
public Scrollbar(int orientation)
public Scrollbar(int orientation, int value, int visible, int minimum,
int maximum)

II Methods
public synchronized void addAdjustmenuListener(AdjustmentListener 1)
II Java 1.1
public void addNotify()
public int getBlockincrement() II Java 1.1
public int getLineincrement() II Java 1.0
public int getMaximum()
public int getMinimum()
public int getOrientation()
public int getPageincrement() II Java 1. 0
public int getUnitincrement() II Java 1.1
public int getValue()
public int getVisible() II Java 1.0
protected String paramString()
public void setLineincrement(int 1) II Java 1.0
public synchronized void setMaximum(int max) II Java 1.1
public synchronized void setMinimum(int min) II Java 1.1
public synchronized void setOrientation(int orien) II Java 1.1
public void setPageincrement(int 1) II Java 1.0
public void setValue(int value)
public void setValues(int value, int visible, int minimum, int maximum)
public void setVisibleAmount(int am) II Java 1.1

Closs java.awt.TextArea
The TextArea class allows for a multi-line area for displaying text. The following are defined:

II Constructors
public TextArea()
public TextArea(int rows, int eels)
public TextArea(String text)
public TextArea(String text, int rows, int eels)
public TextArea(String text, int rows, int eels, int scrollbars)
II Java 1.1
II Constants
public static final int SCROLLBARS_BOTH; II Java 1.1
public static final int SCROLLBARS_HORIZONTAL_ONLY; II Java 1.1
public static final int SCROLLBARS_NONE; II Java 1.1
public static final int SCROLLBARS_VERTICAL_ONLY; II Java 1.1

II Methods
public void addNotify()

1820 Handbook of Data Communications and Networks


public synchronized void append{String str) II Java 1.1
public void appendText{String str) II Java 1.0
public int getColumns{)
public Dimension getMinimumSize{int rows, int eels) II Java 1.1
public Dimension getMinimumSize{) II Java 1.1
public Dimension getPreferredSize{int rows, int eels) II Java 1.1
public Dimension getPreferredSize{) II Java 1.1
public int getRows {)
public int getScrollbarVisibility{) II Java 1.1
public void insertText{String str, int pes) II Java 1.1
public Dimension minimumSize{) II Java 1.0
public Dimension minimumSize{int rows, int eels) II Java 1.0
protected String paramString {)
public Dimension preferredSize{) II Java 1.0
public Dimension preferredSize{int rows, int eels) II Java 1.0
public void replaceText{String str, int start, int end) II Java 1.0
public void setColumns{int eels) II Java 1.1
public void setRows{int rows) II Java 1.1

Class java.awt.TextComponent
The Textcomponent class is the superclass of any component that allows the editing of some
text. The following are defined:

II Methods
public void addTextListener{TextListener 1) II Java 1.1
public int getCaretPosition{) II Java 1.1
public String getSelectedText{)
public int getSelectionEnd{)
public int getSelectionStart{)
public String getText{)
public boolean isEditable{)
protected String paramString{)
public void ramoveNotify{)
public void removeTextListener{TextListener 1) II Java 1.1
public void select{int selStart, int selEnd)
public void selectAll{)
public void setCaretPosition{int position) II Java 1.1
public void setEditable{boolean t)
public synchronized setSelectionEnd{int selectionEnd) II Java 1.1
public synchronized setSelectionStart{int selectionStart) II Java 1.1
public void setText{String t)

Class java.awt.TextField
The Text Field class is a component that presents the user with a single editable line of text.
The following are defined:

II Constructors
public TextField{)
public TextField{int eels)
public TextField{String text)
public TextField{String text, int eels)

II Methods
public synchronized void addActionListener{ActionListener 1) II Java 1.1
public void addNotify{)
public boolean echoCharisSet{)
public int getColumns{)
public char getEchoChar{)
public Dimension getMinimumSize{int eels) II Java 1.1

Java Reference 1821


public Dimension getMinimumSize() II Java 1.1
public Dimension getPreferredSize(int cols) II Java 1.1
public Dimension getPreferredSize() II Java 1.1
public Dimension minimumSize () II Java 1.0
public Dimension minimumSize(int cols) II Java 1.0
protected String paramString ()
public Dimension preferredSize () II Java 1.0
public Dimension preferredSize(int cols) II Java 1.0
public void setColumns(int cols) II Java 1.1
public void setEchoChar(char c) II Java 1.1
public void setEchoCharacter(char c) II Java 1.0

Class java.awt.Toolkit
The Toolkit class is the abstract superclass of all actual implementations of the Abstract Win-
dow Toolkit. The following are defined:

II Constructors
public Toolkit()

II Methods
public abstract int beep() II Java 1.1
public abstract int checkimage(Image image, int width,
int height, ImageObserver observer)
public abstract Image createimage(ImageProducer producer)
public Image createimage(byte[] imagedatea) II Java 1.1
public Image createimage(byte[] imagedata, int imageoffset,
int imagelength) II Java 1.1
public abstract ColorModel getColorModel()
public static Toolkit getDefaultToolkit()
public abstract String[] getFontList()
public abstract FontMetrics getFontMetrics(Font font)
public abstract Image getimage(String filename)
public abstract Image getimage(URL url)
public int getMenuShortcutKeyMask() II Java 1.1
public abstract PrintJob getPrintJob(Frame frame, String jobtitle,
Properties props) II Java 1.1
public abstract int getScreenResolution()
public abstract Dimension getScreenSize()
public abstract Clipboard getSystemClipbaord() II Java 1.1
public abstract EventQueue getSystemEventQueue() II Java 1.1
public abstract boolean prepareimage(Image image, int width,
int height, ImageObserver observer)
public abstract void sync()

Class java.awt.Window
The Window class is the top-level window; it has no borders and no menu bar. The following are
defined:

II Constructors
public Window(Frame parent)
II Methods
public void addNotify()
public synchronized void addWindowListener(WindowListener 1) I I Java 1.1
public void dispose()
public Component getFocusOwner() II Java 1.1
public Locale getLocale() I I Java 1.1
public Toolkit getToolkit()
public final String getWarningString()
public boolean isShowing() II Java 1.1

1822 Handbook of Data Communications and Networks


public void pack()
public postEvent(Event e) II Java 1.1
public synchronized void removeWindowListener(WindowListener 1)
public void show()
public void toBack ()
public void toFront ()

Ap8.3 Package java.awt.datatransfer

Closs java.awt.datatransfer.Ciipboard
The Clipboard class has been added with Java 1.1. It represents a clipboard onto which data
can be transferred using cut-and-paste techniques. The following are defined:

II Constructors
public Clipboard(String name) II Java 1.1

II Methods
public synchronized Transferable getContents(Object requestor)
II Java 1.1
public String getName() II Java 1.1
public synchronized void setContents(Transferable contents,
Clipboard owner) II Java 1.1

Ap8.4 Package java.awt.event

Closs java.awt.event.ActionEvent
The ActionEvent class has been added with Java 1.1. It occurs when a event happens for a But-
ton, List, Menuitem or TextField. The following are defined:

II Constructors
public ActionEvent(Object src, String cmd) II Java 1.1

II Methods
public String getActionCommand() II Java 1.1
public int getModifiers() II Java 1.1
public int paramString() II Java 1.1

Interface java.awt.event.Actionlistener
The ActionListener interface has been added with Java 1.1. It defines the method which is
called by an ActionEvent. The following is defined:

public void actionPerformed(ActionEvent e) II Java 1.1

Closs java.awt.event.AdjustmentEvent
The AdjustmentEvent class has been added with Java l.l.lt occurs when a event happens for a
Scrollbar. The following are defined:

II Constructors

Java Reference 1823


public AdjustmentEvent(Object src, int id, int type, int value} // Java 1.1

II Methods
public Adjustable getAdjustable(} II Java 1.1
public int getAdjustmentType(} II Java 1.1
public int getValue(} II Java 1.1
public String paramString(} II Java 1.1

Class java.awt.event.Adjustmentlistener
The AdjustmentListener interface has been added with Java 1.1. It defines the method which
is called by an AdjustmentEvent. The following is defined:

public void adjustmentValueChanged(AdjustmentEvent e)// Java 1.1

Class java.awt.event.ComponentEvent
The ComponentEvent class has been added with Java 1.1. It occurs when a event happens for a
Component. The following are defined:

II Constructors
public ComponentEvent(Object src, int id, int type, int value}

II Methods
public Component getComponent(} II Java 1.1
public String paramString(} I I Java 1.1

Class java.awt.event.Componentlistener
The ComponentListener interface has been added with Java 1.1. It defines the method which is
called by a ComponentEvent. The following are defined:

public void componentHidden(ComponentEvent e) // Java 1.1


public void componentMoved(ComponentEvent e) //Java 1.1
public void componentResized(ComponentEvent e) //Java 1.1
public void componentShown(ComponentEvent e) II Java 1.1

Class java.awt.event.ContainerEvent
The ComponentEvent class has been added with Java 1.1. It occurs when a event happens for a
Container. The following are defined:

II Constructors
public ContainerEvent(Component src, int id, Compoent child}

II Methods
public Component getChild(} I I Java 1.1
public Component getContainer(} II Java 1.1
public String paramString(} I I Java 1.1

Class java.awt.event.Containerlistener
The ContainerListener interface has been added with Java 1.1. It defines the method which is
called by a ContainerEvent. The following are defined:

public void componentAdded(ComponentEvent e) II Java 1.1

1824 Handbook of Data Communications and Networks


public void componentRemoved(ComponentEvent e) II Java 1.1

Closs java.awt.event.ltem Event


The ItemEvent class has been added with Java 1.1. It occurs when a event happens for a con-
tainer. The following are defined:

II Constructors
public ItemEvent(ItemSelectable src, int id, Object item, int stateChanged)

II Java 1.1

I I Methods
public Object get Item () II Java 1. 1
public ItemSelectable getitemSelectable() II Java 1.1
public int getStateChange () II Java 1. 1
public String paramString () II Java 1 .1

Closs java.awt.event.ltemlistener
The ItemListener interface has been added with Java 1.1. It defines the method which is called
by an ItemEvent. The following is defined:

public void itemStateChanged(ItemEvent e) II Java 1.1

Closs java.awt.event.KeyEvent
The KeyEvent class has been added with Java 1.1. It occurs when a event happens for a
keypress. The following are defined:

II Constructors
public KeyEvent(Component src, int id, long when, int modifiers,
int keyCode, char keyChar) II Java 1.1
II Constants
public static final int KEY_LAST, KEY_PRESSED, KEY_RELEASED, KEY_TYPED;
II Undefined Key and Character (Java 1.1)
public static final int VK_ONDEPINED, CHAR_UNDEPINED;
II Alphanumeric keys (Java 1.1)
public static final int VK_A, VK_B, VK_C, VK_D, VK_E, VK_P, VK_G, VK_H;
public static final int VK_I, VK_J, VK_K, VK_L, VK_M, VK_N, VK_O, VK_P;
public static final int VK_Q, VK_R, VK_S, VK_T, VK_U, VK_V, VK_W, VK_X;
public static final int VK Y, VK_Z;
public static final int VK_SPACE;
public static final int VK_O, VK_l, VK_2, VK_3, VK_4, VK_S, VK_6, VK_7;
public static final int VK_S, VK_9;
public static final int VK_NUMPADO, VK_NUMPADl, VK_NUMPAD2, VK_NUMPAD3;
public static final int VK NUMPAD4, VK_NUMPADS, VK_NUMPAD6, VK_NUMPAD7;
public static final int VK=NUMPADS, VK_NUMPAD9;
II Control keys (Java 1.1)
public static final int VK_BACK_SPACE, VK_ENTER, VK_ESCAPE, VK_TAB;
II Modifier keys (Java 1.1)
public static final int VK_ALT, VK_CAPS_LOCK, VK_CONTROL, VK META, VK_SHIPT;
II Function keys (Java 1.1)
public static final int VK_FO, VK_Fl, VK_F2, VK_F3, VK_F4, VK_FS, VK_F6;
public static final int VK_F7, VK_F8, VK_F9;
public static final int VK_PRINTSCREEN, VK_SCROLL_LOCK, VK_PAOSE;
public static final int VK_PAGE_DOWN, VK_PAGE_UP;
public static final int VK_DOWN, VK_UP, VK_RIGHT, VK_LEFT;

Java Reference 1825


public static final int VK_END, VK_HOME, VK_ACCEPT, VK_NUM_LOCK, VK_CANCEL;
public static final int VK_CLEAR, VK_CONVERT, VK_FINAL, VK_HELP;
public static final int VK_KANA, VK KANJI, VK MODECHANGE, VK NONCONVERT;
II Punctuation keys (Java 1.1)
public static final int VK_ADD, VK_BACK_QUOTE, VK_BACK_SLASH;
public static final int VK_CLOSE_BRACKET, VK_COMMA, VK_DECIMAL;
public static final int VK_DIVIDE, VK_EQUALS, VK_MULTIPLY;
public static final int VK_OPEN_BRACKET, VK_PERIOD, VK_QUOTE;
public static final int VK_SEMICOLON, VK_SEPARATER, VK_SLASH;
public static final int VK_SUBTRACT;

II Methods
public void getKeyChar() II Java 1.1
public int getKeyCode () II Java 1.1
public boolean isActionKey() II Java 1.1
public String paramString() II Java 1.1
public void setKeyChar(char keyChar) II Java 1.1
public void setKeyCode(int keyCode) II Java 1.1
public void setModifiers(int modifiers) II Java 1.1

Class java.awt.event.Keylistener
The KeyLi s tener interface has been added with Java 1.1. It defines the method which is called
by a KeyEvent. The following is defined:

public void keyPressed(KeyEvent e) II Java 1.1


public void keyReleased(KeyEvent e) II Java 1.1
public void keyTyped(KeyEvent e) II Java 1.1

Class java.awt.event.MouseEvent
The MouseEvent class has been added with Java 1.1. It occurs when a event happens for a
MouseEvent. The following are defined:

II Constructors
public MouseEvent(Component src, int id, long when, int modifiers, int x,
int y, intclickCount, boolean popupTrigger) II Java 1.1

II Constants
public static final int MOUSE_CLICKED, MOUSE_DRAGGED;
public static final int MOUSE_ENTERED, MOUSE_EXITED;
public static final int MOUSE_FIRST, MOUSE_LAST;
public static final int MOUSE_MOVED, MOUSE_PRESSED;
public static final int MOUSE_RELEASED;

II Methods
public int getClickCount() /1 Java 1.1
public Point getPoint() II Java 1.1
public int getX() II Java 1.1
public int getY() II Java 1.1
public boolean isPopupTrigger () II Java 1. 1
public String paramString() II Java 1.1
public synchronized void translatePoint(int x, int ylll Java 1.1

Class java.awt.event.Mouselistener
The MouseListener interface has been added with Java 1.1. It defines the method which is
called by a mouse dick event. The following are defined:

1826 Handbook of Data Communications and Networks


public void mouseClicked(MouseEvent e) II Java 1.1
public void mouaeBntered(MouseEvent e) II Java 1.1
public void mouaeBxited(MouseEvent e) II Java 1.1
public void mousePreaaed(MouseEvent e) II Java 1.1
public void mouaeReleaaed(MouseEvent e) II Java 1.1

Class java.awt.event.MouseMouselistener
The MouseMouseListener interface has been added with Java 1.1. It defines the method which
is called by a mouse drag or move event. The following are defined:

public void mouaeDragged(MouseEvent e) II Java 1.1


public void mouseMOved(MouseEvent e) II Java 1.1

Class java.awt.eventText Event


The TextEvent class has been added with Java 1.1. It occurs when a event happens for an event
within TextField, TextArea or other Text Component. The following are defined:

II Constructors
public TextBvent(Object src, int id) II Java 1.1

II Constants
public static final int TBXT_FIRST, TBXT_LAST;
public static final int TBXT_VALUE_CHANGBD;

II Methods
public String paramString() II Java 1.1

Class java.awt.event.Textlistener
The TextListener interface has been added with Java 1.1. It defines the method which is called
by a TextEvent. The following is defined:

public void textVa1ueChanged(TextEvent e) II Java 1.1

Class java.awt.eventWindowEvent
The WindowEvent class has been added with Java 1.1. It occurs when an event happens within a
Window object. The following are defined:

II Constructors
public WindowBvent(Window src, int id) II Java 1.1

II Constants
public static final int WINDOW_ACTIVATBD, WINDOW_CLOSBD;
public static final int WINDOW_CLOSING, WINDOW_DBACTIVATBD;
public static final int WINDOW_DBICONI:PIBD, WINDOW_PIRST;
public static final int WINDOW_ICONIPIBD, WINDOW_LAST;
public static final int WINDOW_OPBNBD;

II Methods
public Window getWindow () I I Java 1 . 1
public String paramString() II Java 1.1

Java Reference 1827


Class java.awt.event. Windowlistener
The WindowListener interface has been added with Java 1.1. It defines the method which is
called by an WindowEvent. The following are defined:

public void windowActivated(WindowEvent e) II Java 1.1


public void windowClosed(WindowEvent e) II Java 1.1
public void windowDeactivated(WindowEvent e) II Java 1.1
public void windowDeiconified(WindowEvent e) II Java 1.1
public void windowiconified(WindowEvent e) II Java 1.1
public void windowOpened(WindowEvent e) II Java 1.1

Ap8.5 Package java.awt.image


This package has been added with Java 1.1 and supports image processing classes.

Ap8.6 Packagejava.io

Class java.io.BufferedOutputStream
The BufferedOutputStream implements a buffered output stream. These streams allow the
program to write to an input device without having to worry about the interfacing method. The
following are defined:

II Fields
protected byte buf[];
protected int count;

II Constructors
public BufferedoutputStream(OutputStream out)
public BufferedoutputStream(OutputStream out, int size)

II Methods
public void flush()
public void write(byte b[], int off, int len)
public void write(int b)

Class java. io. Buffered Reader


The BufferReader class has been added with Java 1.1. It represents a buffered character input
stream. The following are defined:

II Constructors
public BufferedReader(Reader in, int sz) II Java 1.1
public BufferedReader(Reader in) I I Java 1.1

II Methods
public void close() throws IOException; II Java 1.1
public void mark(int readAheadLimit) throws IOException; II Java 1.1
public boolean markSupported() throws IOException; II Java 1.1
public int read() throws IOException; II Java 1.1
public int read(char [] cbuf, int off, int len) throws IOException; II Java 1.1
public String readLine() throws IOException; II Java 1.1
public boolean ready() throws IOException; II Java 1.1
public void reset() throws IOException; II Java 1.1

1828 Handbook of Data Communications and Networks


public long skip(long n) throws IOException; II Java 1.1

Class java.io. BufferedWriter


The Bufferwriter class has been added with Java 1.1. It represents a buffered character output
stream. The following are defined:

II Constrsuctors
public BufferedWriter(Writer out, int sz) II Java 1.1
public BufferedWriter(Writer in) II Java 1.1

II Methods
public void close() throws IOException; II Java 1.1
public void flush() throws IOException; II Java 1.1
public void newLine() throws IOException; II Java 1.1
public void write(int c) throws IOException; II Java 1.1
public void write(char [] cbuf, int off, int len) throws IOException;
I I Java 1.1

Class java.io.ByteArraylnputStream
The ByteArrayinputStream class supports input from a byte array. The following are defined:

II Fields
protected byte buf[];
protected int count;
protected int mark; II Java 1.1
protected int pos;

II Constructors
public ByteArrayinputStream(byte buf[])
public ByteArrayinputStream(byte buf[], int offset, int length)

II Methods
public int available()
public void mark(int markpos) II Java 1.1
public boolean markSupported() II Java 1.1
public int read()
public int read(byte b[], int off, int len)
public void reset()
public long skip(long n)

Closs java.io.ByteArrayOutputStream
The ByteArrayOutputStream class allows supports output to a byte array. The following are
defined:

II Fields
protected byte buf[];
protected int count;

II Constructors
public ByteArrayOutputStream()
public ByteArrayOutputStream(int size)

II Methods
public void reset()
public int size()
public byte[] toByteArray()

Java Reference 1829


public String toString{)
public String toString{int hibyte) II Java 1.0
public String toString{String enc) II Java 1.1
public void write{byte b[], int off, int len)
public void write{int b)
public void writeTo{OutputStream out)

Interface java.io.Datalnput
The Datainput interface gives support for streams to read in a machine-independent way. The
following are defined:

II Methods
public abstract boolean readBoolean{)
public abstract byte readByte{)
public abstract char readChar{)
public abstract double readDouble{)
public abstract float readFloat{)
public abstract void readFu1ly{byte b[])
public abstract void readFully{byte b[], int off, int len)
public abstract int readint{)
public abstract String readLine{)
public abstract long readLong{)
public abstract short readShort{)
public abstract int readUnsignedByte{)
public abstract int readUnsignedShort{)
public abstract String readUTF{)
public abstract int skipBytes{int n)

Class java.io.DatalnputStream
The Datainputstream class allows an application to read data in a machine-independent way. It
uses standard Unicode strings which conforms to the UTF-81 specification. The following are
defined:
II Constructors
public DatainputStream{InputStream in)

II Methods
public final int read{byte b[])
public final int read{byte b[], int off, int len)
public final boolean readBoolean{)
public final byte readByte {)
public final char readChar { )
public final double readDouble{)
public final float readFloat{)
public final void readFully{byte b[])
public final void readFully{byte b [], int off, int len)
public final int readint {)
public final String readLine{) II Java 1.0
public final long readLong {)
public final short readShort{)
public final int readUnsignedByte{)
public final int readUnsignedShort{)
public final String readUTF{)
public final static String readUTF{Datainput in)
public final int skipBytes{int n)

1830 Handbook of Data Communications and Networks


Interface java.io.DataOutput
The Dataoutput interface gives support for streams to write in a machine-independent way.
The following are defined:

II Methods
public abstract void write(byte b[])
public abstract void write(byte b[], int off, int len)
public abstract void write(int b)
public abstract void writeBoolean(boolean v)
public abstract void writeByte(int v)
public abstract void writeBytes(String s)
public abstract void writeChar(int v)
public abstract void writeChars(String s)
public abstract void writeDouble(double v)
public abstract void writeFloat(float v)
public abstract void writeint(int v)
public abstract void writeLong(long v)
public abstract void writeShort(int v)
public abstract void writeUTF(String str)

Closs java.io.DataOutputStream
The DataOutputStream class allows an application to write data in a machine-independent way.
It uses standard Unicode strings which conforms to the UTF-81 specification. The following are
defined:

II Fields
protected int written;
II Constructors
public DataOutputStream(OutputStream out)

II Methods
public void flush()
public final int size()
public void write(byte b[], int off, int len)
public void write(int b)
public final void writeBoolean(boolean v)
public final void writeByte(int v)
public final void writeBytes(String s)
public final void writeChar(int v)
public final void writeChars(String s)
public final void writeDouble(double v)
public final void writeFloat(float v)
public final void writeint(int v)
public final void writeLong(long v)
public final void writeShort(int v)
public final void writeUTF(String str)

Closs java.io.EOFException
Exception that identifies that the end-of-file has been reached unexpectedly during input. The
following are defined:

II Constructors
public BOFBxception()
public BOFBxception(String s)

Java Reference 1831


Class java.io.File
The File class implements the file manipulation operations in an operating system independent
way. The following are defined:

II Fields
public final static String pathSeparator;
public final static char pathSeparatorChar;
public final static String separator;
public final static char separatorChar;

II Constructors
public File(File dir, String name)
public File(String path)
public File(String path, String name)

II Methods
public boolean canRead()
public boolean canWrite()
public boolean delete()
public boolean equals(Object obj)
public boolean exists()
public String getAbsolutePath()
public String getCanonicalPath() II Java 1.1
public String getName()
public String getParent()
public String getPath()
public int hashCode()
public boolean isAbsolute()
public boolean isDirectory()
public boolean isFile()
public long lastModified()
public long length()
public String[) list()
public String[) list(FilenameFilter filter)
public boolean mkdir()
public boolean mkdirs()
public boolean renameTo(File dest)
public String toString()

Class java.io.FileDescriptor
The FileDescriptor class provides a way to cope with opening files or sockets. The following
are defined:

II Fields
public final static FileDescriptor err, in, out;

II Constructors
public FileDescriptor()

II Methods
public void sync() II Java 1.1
public boolean valid()

Class java.io.FilelnputStream
The FileinputStream class provides supports for an input file. The following are defined:

II Constructors

1832 Handbook of Data Communications and Networks


public FileinputStream(File file)
public FileinputStream(FileDescriptor fdObj)
public FileinputStream(String name)

II Methods
public int available()
public void close()
protected void finalize()
public final FileDescriptor getFD()
public int read()
public int read(byte b[])
public int read(byte b[], int off, int len)
public long skip(long n)

Interface java.io.FilenameFilter
The FilenameFile interface is used to filter filenames. The following is defined:

II Methods
public abstract boolean accept(File dir, String name)

Closs java.io.FileNotFoundException
Exception that identifies that a file could not be found. The following are defined:
II Constructors
public FileNotFoundException()
public FileNotFoundException(String s)

Closs java.io.FileOutputStream
The FileOutputStream class provides suppons for an output file. The following are defined:

II Constructors
public FileOutputStream(File file)
public FileOutputStream(String name, boolean append) II Java 1.1
public FileOutputStream(FileDescriptor fdObj)
public FileOutputStream(String name)

II Methods
public void close()
protected void finalize()
public final FileDescriptor getFD()
public void write(byte b[])
public void write(byte b[], int off, int len)
public void write(int b)

Closs java.io.FilterlnputStream
The FilterinputStream class is the superdass of all classes that filter input streams. The fol-
lowing are defined:

II Fields
protected InputStream in;

II Constructors
protected FilterinputStream(InputStream in)

II Methods

Java Reference 1833


public int available()
public void close()
public void mark(int readlimit)
public boolean markSupported()
public int read()
public int read(byte b[])
public int read(byte b[], int off, int len)
public void reset()
public long skip(long n)

Closs java.io.FilterOutputStream
The FilterOutputstream class is the superclass of all classes that filter output streams. The
following are defined:

II Fields
protected OutputStream out;

II Constructors
public FilterOutputStream(OutputStream out)

II Methods
public void close()
public void flush()
public void write(byte b[])
public void write(byte b[], int off, int len)
public void write(int b)

Closs java.io.lnputStream
The InputStream class is the superclass of all classes representing an input stream of bytes. The
following are defined:

II Constructors
public InputStream()

II Methods
public int available()
public void close()
public void mark(int readlimit)
public boolean markSupported()
public abstract int read()
public int read(byte b[])
public int read(byte b[], int off, int len)
public void reset()
public long skip(long n)

Closs java. io.l nterrupted IOException


Exception that identifies that an I/0 operation has been interrupted. The following are defined:

II Fields
public int bytesTransferred;

II Constructors
public InterruptediOException()
public InterruptediOException(String s)

1834 Handbook of Data Communications and Networks


Class java.io.IOException
Exception that identifies that an I/0 exception has occurred. The following ate defined:

II Constructors
public IOException()
public IOException(String s)

Class java.io.LineNumberlnputStream
The LineNumberinputStream class provides suppon for the current line number in an input
stream. Each line is delimited by either a carriage return character ('\r'), new-line character ('\n')
or both together. The following are defined:

II Constructors
public LineNumberinputStream(InputStream in)

II Methods
public int available()
public int getLineNumber()
public void mark(int readlimit)
public int read()
public int read(byte b[], int off, int len)
public void reset()
public void setLineNumber(int lineNumber)
public long skip(long n)

Class java.io.OutputStream
The InputStream class is the superclass of all classes representing an output stream of bytes. The
following ate defined:

II Constructors
public OutputStream()

II Methods
public void close()
public void flush()
public void write(byte b[])
public void write(byte b[], int off, int len)
public abstract void write(int b)

Class java.io.PipedlnputStream
The PipedinputStream class provides suppon for pipelined input communications. The fol-
lowing ate defined:

II Constructors
public PipedinputStream()
public PipedinputStream(PipedOutputStream src)

II Methods
public void close()
public void connect(PipedOutputStream src)
public int read()
public int read(byte b[], int off, int len)

Java Reference 1835


Class java.io.PipedOutputStream
The PipedOutputStream class provides support for pipelined output communications. The
following are defined:

II Constructors
public PipedOutputStream()
public PipedOutputStream(PipedinputStream snk)

II Methods
public void close()
public void connect(PipedinputStream snk)
public void write(byte b[], int off, int len)
public void write(int b)

Class java.io.PrintStream
The PrintStream class provides support for output print streams. The following are defined:

II Constructors
public PrintStream(OutputStream out) II Java 1.0
public PrintStream(OutputStream out, boolean autoflush) II Java 1.0

II Methods
public boolean checkError()
public void close()
public void flush()
public void print(boolean b)
public void print (char c)
public void print (char s [])
public void print (double d)
public void print (float f)
public void print(int i)
public void print (long 1)
public void print(Object obj)
public void print(String s)
public void println()
public void println(boolean b)
public void println(char c)
public void println(char s[])
public void println(double d)
public void println(float f)
public void println(int i)
public void println(long 1)
public void println(Object obj)
public void println(String s)
public void write(byte b[], int off, int len)
public void write (int b)

Class java.io.PushbacklnputStream
The PushbackinputStream class provides support to put bytes back into an input stream. The
following are defined:

II Fields
protected int pushBack;

II Constructors
public PushbackinputStream(InputStream in)

1836 Handbook of Data Communications and Networks


II Methods
public int available()
public boolean markSupported()
public int read()
public int read(byte bytes[), int offset, int length)
public void unread(int ch)

Class java.io.RandomAccessFile
The RandomAccessFile class support reading and writing from a random access file. The fol-
lowing are defined:
II Constructors
public RandomAccessFile(File file, String mode)
public RandomAccessFile(String name, String mode)

II Methods
public void close()
public final FileDescriptor getFD()
public long getFilePointer()
public long length()
public int read()
public int read(byte b[))
public int read(byte b[), int off, int len)
public final boolean readBoolean()
public final byte readByte()
public final char readChar()
public final double readDouble()
public final float readFloat()
public final void readFully(byte b[))
public final void readFully(byte b[), int off, int len)
public final int readint()
public final String readLine()
public final long readLong()
public final short readShort()
public final int readUnsignedByte()
public final int readUnsignedShort()
public final String readUTF()
public void seek(long pos)
public int skipBytes(int n)
public void write(byte b[))
public void write(byte b[), int off, int len)
public void write(int b)
public final void writeBoolean(boolean v)
public final void writeByte(int v)
public final void writeBytes(String s)
public final void writeChar(int v)
public final void writeChars(String s)
public final void writeDouble(double v)
public final void writeFloat(float v)
public final void writeint(int v)
public final void writeLong(long v)
public final void writeShort(int v)
public final void writeUTF(String str)

Class java.io.SequencelnputStream
The SequenceinputStream supports the combination of several input streams into a single in-
put stream. The following are defined:

II Constructors
public SequenceinputStream(Enumeration e)

Java Reference 1837


public SequenceinputStream(InputStream s1, InputStream s2)

II Methods
public void avia1able() II Java 1.1
public void close()
public int read()
public int read(byte buf[], int pos, int len)

Closs java.io.StreamTokenizer
The StreamTokenizer class splits an input stream into tokens. These tokens can be defined by
number, quotes strings or comment styles. The following are defined:

II Fields
public double nval;
public String sval;
public int ttype;

II possible values for the ttype field


public final static int TT_EOF, TT_EOL, TT_NUMBER, TT_WORD;

II Constructors
public StreamTokenizer(InputStream I)

II Methods
public void commentChar(int ch)
public void eolisSignificant(boolean flag)
public int lineno()
public void lowerCaseMode(boolean fl)
public int nextToken()
public void ordinaryChar(int ch)
public void ordinaryChars(int low, int hi)
public void parseNUmbers()
public void pushBack()
public void quoteChar(int ch)
public void resetSyntax()
public void whitespaceChars(int low, int hi)
public void slashStarComments(boolean flag)
public String toString()
public void whitespaceChars(int low, int hi)
public void wordChars(int low, int hi)

Closs java.io.StringBufferlnputStream
The StringBufferinputStream class supports stream input buffers. The following are defined:

II Fields
protected String buffer;
protected int count, pos;

II Constructors
public StringBufferinputStream(String s)

II Methods
public int available()
public int read()
public int read(byte b[], int off, int len)
public void reset()
public long skip(long n)

1838 Handbook of Data Communications and Networks


Class java.io.UTFDataFormatException
Exception that identifies that a malformed UTF-8 string has been read in a data input stream.
The following are defined:

II Constructors
public UTFDataFormatException()
public UTFDataFormatException(String s)

Ap8.7 Package java.lang

Class java.lang.ArithmeticException
Exception that is thrown when an exceptional arithmetic condition has occurred, such as a divi-
sion-by-zero or a square root of a negative number. The following are defined:

II Constructors
public ArithmeticException()
public ArithmeticException(String s)

Class java.lang.Arrayl ndexOutOfBou ndsException


Exception that is thrown when an illegal index term in an array has been accessed. The following
are defined:

II Constructors
public ArrayindexOutOfBoundsException()
public ArrayindexOutOfBoundsException(int index)
public ArrayindexOutOfBoundsException(String s)

Class java.lang.ArrayStoreException
Exception that is thrown when the wrong type of object is stored in an array of objects. The
following are defined:

II Constructors
public ArrayStoreException()
public ArrayStoreException(String s)

Class java.lang.Boolean
The Boolean class implements the primitive type boolean of an object. Other methods are in-
cluded for a converting a boolean to a String and vice versa. The following are defined:

public final static Boolean FALSE, TRUE;


public final static Boolean TYPE; II Java 1.1

II Constructors
public Boolean(boolean value)
public Boolean(String s)

II Methods
public boolean booleanValue()

Java Reference 1839


public boolean equals(Object obj}
public static boolean getBoolean(String name}
public int hashCode(}
public String toString(}
public static String toString(boolean b)
public static Boolean valueOf(String s}
public static Boolean valueOf(boolean b)

Class java .Ia ng. Character


The Character class implements the primitive type character of an object. Other methods are
defined for determining the type of a character, and converting characters from uppercase to
lowercase and vice versa. The following are defined:

II Constants
public final static int MAX_RADIX, MAX_VALUE;
public final static int MIN RADIX, MIN VALUE;
public final static int TYPE; I I Java l.1
II Character type constants
public final static byte COMBINING_SPACE_MARK; II Java 1.1
public final static byte CONNECTOR PUNCUATION, CONTROL; // Java 1.1
public final static byte CURRENCY SYMBOL, DASH PUNCTUATION;// Java 1.1
public final static byte DIGIT NUMBER, ENCLOSING MARK; //Java 1.1
public final static byte END PUNCTUATION, FORMAT7 //Java 1.1
public final static byte LETTER NUMBER, LINE SEPERATOR; //Java 1.1
public final static byte LOWERCASE_LETTER, MATH_SYMBOL; //Java 1.1
public final static byte MODIFIER LETTER, MODIFIER SYMBOL; // Java 1.1
public final static byte NON SPACING MARK, OTHER LETTER;// Java 1.1
public final static byte OTHER NUMBER, OTHER PUNCTUATION; //Java 1.1
public final static byte OTHER-SYMBOL, PARAGRAPH SEPARATOR;// Java 1.1
public final static byte PRIVATE USE, SPACE SEPARATOR; //Java 1.1
public final static byte START PUNCTUATION,-SORROGATE; // Java 1.1
public final static byte TITLECASE LETTER, UNASSIGNED; // Java 1.1
public final static byte UPPERCASE=LETTER; // Java 1.1

II Constructors
public Character(char value}

II Methods
public char charValue(}
public static int digit(char ch, int radix}
public boolean equals(Object obj}
public static char forDigit(int digit, int radix}
public static char getNUmericValue(char ch} // Java 1.1
public static char getType(char ch} // Java 1.1
public static boolean isDefined(char ch}
public static boolean isDigit(char ch}
public static boolean isiSOControl(char ch} //Java 1.1
public static boolean isidentifierignoreable(char ch} // Java 1.1
public static boolean isJavaindentierPart(char ch} // Java 1.1
public static boolean isJavaindentierStart(char ch} // Java 1.1
public static boolean isJavaLetter(char ch} // Java 1.0
public static boolean isJavaLetterOrDigit(char ch} //Java 1.0
public static boolean isLettsr(char ch}
public static boolean isLetterOrDigit(char ch}
public static boolean isLowerCase(char ch}
public static boolean isSpace(char ch} // Java 1.0
public static boolean isSpaceChar(char ch} // Java 1.0
public static boolean isTitleCase(char ch}
public static boolean isUnicodeidentifierPart(char ch} //Java 1.1
public static boolean isUnicodeidentifierStart(char ch} // Java 1.1
public static boolean isUpperCase(char ch}

1840 Handbook of Data Communications and Networks


public static boolean isWhitespace(char ch) II Java 1.1
public static char toLowerCase(char ch)
public String toString()
public static char toTitleCase(char ch)
public static char toUpperCase(char ch)

Class java.lang.C/ass
The Class class implements the class Class and interfaces in a running Java application. The
following are defined:
II Methods
public static Class forName(String className)
public ClassLoader getC1assLoader()
public Class[) getinterfaces()
public String getName()
public Class getSuperclass()
public boolean isinterface()
public Object newinstance()
public String toString()

Class java.lang.C/asscastException
Exception that is thrown when an object is casted to a subclass which it is not an instance. The
following are defined:

II Constructors
public C1assCastException()
public ClassCastException(String s)

Class java.lang.Compiler
The Compiler class supports Java-to-native-code compilers and related services. The following
are defined:
II Methods
public static Object command(Object any)
public static boolean compileClass(Class clazz)
public static boolean compileClasses(String string)
public static void disable()
public static void enable()

Class java.lang.Double
The Double class implements the primitive type double of an object. Other methods are in-
cluded for a converting a double to a String and vice versa. The following are defined:
II Fields
public final static double MAX_VALUE, MIN_VALUE;
public final static double NaN, NEGATIVE INFINITY, POSITIVE_INFINITY;
public final static double TYPE; I I Java l.1

II Constructors
public Double(double value)
public Double(String s)

II Methods
public static long doubleToLongBits(double value)

Java Reference 1841


public double doubleValue{)
public boolean equals{Object obj)
public float floatValue{)
public int hashCode{)
public int intValue{)
public boolean isinfinite{)
public static boolean isinfinite{double v)
public boolean isNaN{)
public static boolean isNaN{double v)
public static double longBitsToDouble{long bits)
public long longValue{)
public String toString{)
public static String toString{double d)
public static Double valueOf{String s)

Closs java.lang.Error
Exception that is thrown when there are serious problems that a reasonable application should
not try to catch. The following are defined:

II Constructors
public Error{)
public Error{String s)

Closs java.lang.Exception
Exception that is thrown that indicates conditions that a reasonable application might want to
catch.

II Constructors
public Exception{)
public Exception{String s)

Closs java.lang.Fioat
The Float class implements the primitive type float of an object. Other methods are included
for a converting a float to a String and vice versa. The following are defined:
II Fields
public final static float MAX_VALUE MIN_VALUE;
public final static float NaN, NEGATIVE INFINITY, POSITIVE_INPINITY;
public final static float TYPE; II Java-1.1

II Constructors
public Float{double value)
public Float{float value)
public Float{String s)

II Methods
public double doubleValue{)
public boolean equals{Object obj)
public static int floatTointBits{float value)
public float floatValue{)
public int hashCode{)
public static float intBitsToPloat{int bits)
public int intValue{)
public boolean isinfinite{)
public static boolean isinfinite{float v)
public boolean isNaN{)

1842 Handbook of Data Communications and Networks


public static boolean isNaN(float v)
public long longValue()
public String toString()
public static String toString(float f)
public static Float valueOf(String s)

Class java.lang.lllegaiAccessError
Exception that is thrown when an application attempts to access or modify a field, or to call a
method that it does not have access to. The following are defined:

II Constructors
public IllegalAccessError()
public IllegalAccessError(String s)

Class java.lang.lllegaiArgumentException
Exception that is thrown when a method has been passed an illegal or inappropriate argument.
The following are defined:

II Constructors
public IllegalArgumentException()
public IllegalArgumentException(String s)

Class java.la ng.lllega ITh readStateException


Exception that is thrown to indicate that a thread is not in an appropriate state for the requested
operation. The following are defined:

II Constructors
public IllegalThreadStateException()
public IllegalThreadStateException(String s)

Class java.lang.lndexOutOfBoundsException
Exception that is thrown to indicate that an index term is out of range. The following are de-
fined:

II Constructors
public IndexOutOfBoundsException()
public IndexOutOfBoundsException(String s)

Class java.lang.lnteger
The Integer class implements the primitive type integer of an object. Other methods are in-
cluded for a converting a integer to a String and vice versa. The following are defined:
II Fields
public final static int MAX VALUE, MIN VALUE;
public final static int TYPE; I I Java l.l

II Constructors
public Integer(int value)
public Integer(String s)

Java Reference 1843


II Methods
public Integer decode(String nm) II Java 1.1
public double doubleValue()
public boolean equals(Object obj)
public float floatValue()
public static Integer getinteger(String nm)
public static Integer getinteger(String nm, int val)
public static Integer getinteger(String nm, Integer val)
public int hashCode()
public int intValue()
public long longValue()
public static int parseint(String s)
public static int parseint(String s, int radix)
public static String toBinaryString(int i)
public static String toHexString(int i)
public static String toOctalString(int i)
public String toString()
public static String toString(int i)
public static String toString(int i, int radix)
public static Integer valueOf(String s)
public static Integer valueOf(String s, int radix)

Class java.lang.lnternaiError
Exception that is thrown when an unexpected internal error has occurs. The following are de-
fined:

II Constructors
public InternalError()
public InternalError(String s)

Class java.la ng.l nterru pted Exception


Exception that is thrown when a thread is waiting, sleeping, or otherwise paused for a long time
and another thread interrupts it using the interrupt method in class Thread. The following are
defined:

II Constructors
public InterruptedException()
public InterruptedException(String s)

Class java.lang.Long
The Long class implements the primitive type long of an object. Other methods are included for
a converting a long to a String and vice versa. The following are defined:

II Fields
public final static long MAX VALUE, MIN VALUE;
public final static long TYPE; II Java1.1
II Constructors
public Long(long value)
public Long(String s)

II Methods
public double doubleValue()
public boolean equals(Object obj)
public float floatValue()
public static Long getLong(String nm)

1844 Handbook of Data Communications and Networks


public static Long getLong(String nm, long val)
public static Long getLong(String nm, Long val)
public int hashCode()
public int intValue()
public long longValue()
public static long parseLong(String s)
public static long parseLong(String s, int radix)
public static String toBinaryString(long i)
public static String toHexString(long i)
public static String toOctalString(long i)
public String toString()
public static String toString(long i)
public static String toString(long i, int radix)
public static Long valueOf(String s)
public static Long valueOf(String s, int radix)

Class java.lang.Math
The Math class contains methods to perform basic mathematical operations. The following are
defined:

II Fields
public final static double E;
public final static double PI;

II Methods
public static double abs(double a)
public static float abs (float a)
public static int abs(int a)
public static long abs(long a)
public static double acos(double a)
public static double asin(double a)
public static double atan(double a)
public static double atan2(double a, double b)
public static double ceil(double a)
public static double cos(double a)
public static double exp(double a)
public static double floor(double a)
public static double IEEEremainder(double fl, double f2)
public static double log(double a)
public static double max(double a, double b)
public static float max(float a, float b)
public static int max(int a, int b)
public static long max(long a, long b)
public static double min(double a, double b)
public static float min(float a, float b)
public static int min(int a, int b)
public static long min(long a, long b)
public static double pow(double a, double b)
public static double random ()
public static double rint(double a)
public static long round(double a)
public static int round(float a)
public static double sin(double a)
public static double sqrt(double a)
public static double tan(double a)

Class java.lang.NegativeArraySizeException
Exception that is thrown when an array is created with a negative size.

Java Reference 1845


II Constructors
public NegativeArraySizeException()
public NegativeArraySizeException(String s)

Closs java.lang.NuiJPointerException
Exception that is thrown when an application attempts to use a null pointer. The following are
defined:

II Constructors
public NullPointerException()
public NullPointerException(String s)

Closs java.lang.Number
The Number class contains the superclass of classes for float, double, integer and long. It can be
used to convert values into int, long, float or double. The following are defined:

II Methods
public abstract double doubleValue()
public abstract float floatValue()
public abstract int intValue()
public abstract long longValue()

Closs java.lang.NumberFormatException
Exception rhat is thrown when an application attempts to convert a string to one of the numeric
types, but that the string does not have rhe appropriate format.

II Constructors
public NumberFormatException()
public NumberFormatException(String s)

Closs java.lang.Objed
The Object class contains the root of the class hierarchy. The following are defined:

II Constructors
public Object()

II Methods
protected Object clone()
public boolean equals(Object obj)
protected void finalize()
public final Class getClass()
public int hashCode()
public final void notify()
public final void notifyAll()
public String toString()
public final void wait()
public final void wait(long timeout)
public final void wait(long timeout, int nanos)

Closs java.lang.OutOfMemoryError
Exception that is thrown when an application runs out of memory. The following are defined:

1846 Handbook of Data Communications and Networks


II Constructors
public OutOfMemoryBrror()
public OutOfMemoryBrror(String s)

Closs java.lang.Process
The Process class contains methods which are used to control the process. The following are
defined:

II Constructors
public Process ()
II Methods
public abstract void destroy()
public abstract int exitValue()
public abstract InputStream getBrrorStream()
public abstract InputStream getinputStream()
public abstract OutputStream getOutputStream()
public abstract int waitFor()

Closs java.lang.Runtime
The Runtime class allows the application to interface with the environment in which it is run-
ning. The following are defined:
II Methods
public Process exec(String command)
public Process exec(String command, String envp[])
public Process exec(String cmdarray[])
public Process exec(String cmdarray[], String envp[])
public void exit(int status)
public long freeMemory()
public void gc()
public InputStream getLocalizedinputStream(InputStream in) // Java 1.0
public OutputStream getLocalizedOutputStream(OutputStream out)// Java 1.0
public static Runtime getRuntime()
public void load(String filename)
public void loadLibrary(String libname)
public void runFinalization()
public long totalMemory()
public void traceinstructions(boolean on)
public void traceMethodCalls(boolean on)

Closs java.lang.SecurityManager
The securi tyManager class is an abstract class that allows applications to determine if it is safe
to execute a given operation. The following are defined:

II Fields
protected boolean inCheck;

II Constructors
protected SecurityManager()

II Methods
public void chackAccept(String host, int port)
public void chackAccass(Thread g)
public void checkAccess(ThreadGroup g)
public void checkConnect(String host, int port)

Java Reference 1847


public void checkConnect(String host, int port, Object context)
public void checkCreateClassLoader()
public void checkDelete(String file)
public void checkExec(String cmd)
public void checkExit(int status)
public void checkLink(String lib)
public void checkListen(int port)
public void checkPackageAccess(String pkg)
public void checkPackageDefinition(String pkg)
public void checkPropertiesAccess()
public void checkPropertyAccess(String key)
public void checkRead(FileDescriptor fd)
public void checkRead(String file)
public void checkRead(String file, Object context)
public void checkSetFactory()
public boolean checkTopLevelWindow(Object window)
public void checkWrite(FileDescriptor fd)
public void checkWrite(String file)
protected int classDepth(String name)
protected int classLoaderDepth()
protected ClassLoader currentClassLoader()
protected Class[] getClassContext()
public boolean getinCheck()
public Object getSecurityContext()
protected boolean inClass(String name)
protected boolean inClassLoader()

Class java.lang.StackOverflowError
Exception that is thrown when a stack overflow occurs. The following are defined:

II Constructors
public StackOverflowError()
public StackOverflowError(String s)

Class java.lang.String
The String class represents character strings. As in C, a string is delimted by inverted commas.
It contains string manipulation methods, such as concat (string concatenation), equals (if
string is equal to), toLowcase (to convert a string to lowercase), and so on. The following are
defined:

II Constructors
public String()
public String(byte ascii[], int hibyte) II Java 1.0
public String(byte ascii[], int hibyte, int offset, int count)// Java 1.0
public String(char value[])
public String(char value[], int offset, int count)
public String(String value)
public String(StringBuffer buffer)
public String(byte ascii[], int offset, int length, String enc) II Java 1.1
II Methods
public char charAt(int index)
public int compareTo(String anotherString)
public String concat(String str)
public static String copyValueOf(char data[])
public static String copyValueOf(char data[], int offset, unt count)
public boolean endsWith(String suffix)
public boolean equals(Object anObject)

1848 Handbook of Data Communications and Networks


public boolean equalsignoreCase(String anotherString)
public void getBytes(int srcBegin, int srcEnd, byte dst[], int dstBegin)
public void getChars(int srcBegin, int srcEnd, char dst[], int dstBegin)
public int hashCode()
public int indexOf(int ch)
public int indexOf(int ch, int fromindex)
public int indexOf(String str)
public int indexOf(String str, int fromindex)
public String intern()
public int lastindexOf(int ch)
public int lastindexOf(int ch, int fromindex)
public int lastindexOf(String str)
public int lastindexOf(String str, int fromindex)
public int length()
public boolean regionMatches(boolean ignoreCase, int toffset,
String other, int ooffset, int len)
public boolean regionMatches(int toffset, String other, int offset, int len)
public String replace(char oldChar, char newChar)
public boolean startsWith(String prefix)
public boolean startsWith(String prefix, int toffset)
public String substring(int beginindex)
public String substring(int beginindex, int endindex)
public char[] toCharArray()
public String toLowerCase()
public String toLowerCase(Locale locale) II Java 1.1

public String toString()


public String toUpperCase()
public String toUpperCase(Locale locale) I I Java 1.1
public String trim()
public static String valueOf(boolean b)
public static String valueOf (char c)
public static String valueOf(char data[])
public static String valueOf(char data[], int offset, int count)
public static String valueOf(double d)
public static String valueOf(float f)
public static String valueOf (int i)
public static String valueOf (long 1)
public static String valueOf(Object obj)

Class java.lang.StringBuffer
The StringBuffer class implements a string buffer. The following are defined:

II Constructors
public StringBuffer()
public StringBuffer(int length)
public StringBuffer(String str)
II Methods
public StringBuffer append(boolean b)
public StringBuffer append(char c)
public StringBuffer append(char str[])
public StringBuffer append(char str[], int offset, int len)
public StringBuffer append(double d)
public StringBuffer append(float f)
public StringBuffer append(int i)
public StringBuffer append(long 1)
public StringBuffer append(Object obj)
public StringBuffer append(String str)
public int capacity()
public char charAt(int index)
public void ensureCapacity(int minimumCapacity)
public void getChars(int srcBegin, int srcEnd, char dst[], int dstBegin)

Java Reference 1849


public StringBuffer insert(int offset, boolean b)
public StringBuffer insert(int offset, char c)
public StringBuffer insert(int offset, char str(])
public StringBuffer insert(int offset, double d)
public StringBuffer insert(int offset, float f)
public StringBuffer insert(int offset, int i)
public StringBuffer insert(int offset, long 1)
public StringBuffer insert(int offset, Object obj)
public StringBuffer insert(int offset, String str)
public int length ()
public StringBuffer reverse()
public void setCharAt(int index, char ch)
public void setLength(int newLength)
public String toString()

Closs java.la ng.Stri ngl ndexOutOfBou ndsException


Exception that is thrown when a string is indexed with a negative value or a value which is
greater than or equal to the size of the string. The following are defined:

II Constructors
public StringindexOutOfBoundsException()
public StringindexOutOfBoundsException(int index)
public StringindexOutOfBoundsException(String s)

Closs java.lang.System
The System class implements a number of system methods. The following are defined:
II Fields
public static PrintStream err, in, out;
II Methods
public static void arraycopy(Object src, int src_position,
Object dst, int dst_position, int length)
public static long currentTUneMillis()
public static void exit(int status)
public static void gc()
public static Properties getProperties()
public static String getProperty(String key)
public static String getProperty(String key, String def)
public static SecurityManager getSecurityManager()
public static void load(String filename)
public static void loadLibrary(String libname)
public static void runFinalization()
public static void setProperties(Properties props)
public static void setSecurityManager(SecurityManager s)

Closs java.lang.Thread
The Thread class implements one or more threads. The following are defined:

II Fields
public final static int MAX_PRIORITY, MIN_PRIORITY, NORM_PRIORITY;

II Constructors
public Thread()
public Thread(Runnable target)
public Thread(Runnable target, String name)
public Thread(String name)
public Thread(ThreadGroup group, Runnable target)

1850 Handbook of Data Communications and Networks


public Thread(ThreadGroup group,Runnable target, String name)
public Thread(ThreadGroup group, String name)

II Methods
public static int activeCount()
public void checkAccess()
public int countStackFrames()
public static Thread currentThread()
public void destroy()
public static void dumpStack()
public static int enumerate(Thread tarray[])
public final String getName()
public final int getPriority()
public final ThreadGroup getThreadGroup()
public void interrupt()
public static boolean interrupted()
public final boolean isAlive()
public final boolean isDaemon()
public boolean isinterrupted()
public final void join()
public final void join(long millis)
public final void join(long millis, int nanos)
public final void resume()
public void run ()
public final void setDaemon(boolean on)
public final void setName(String name)
public final void setPriority(int newPriority)
public static void sleep(long millis)
public static void sleep(long millis, int nanos)
public void start()
public final void stop()
public final void stop(Throwable obj)
public final void suspend()
public String toString()
public static void yield()

Class java.lang.ThreadGroup
The ThreadGroup class implements a set of threads. The following are defined:

II Constructors
public ThreadGroup(String name)
public ThreadGroup(ThreadGroup parent, String name)

II Methods
public int activeCount()
public int activeGroupCount()
public final void checkAccess()
public final void destroy()
public int enumerate(Thread list[])
public int enumerate(Thread list[], boolean recurse)
public int enumerate(ThreadGroup list[])
public int enumerate(ThreadGroup list[], boolean recurse)
public final int getMaxPriority()
public final String getName()
public final ThreadGroup getParent()
public final boolean isDaemon()
public void list()
public final boolean parentOf(ThreadGroup g)
public final void resume()
public final void setDaemon(boolean daemon)
public final void setMaxPriority(int pri)
public final void stop()

Java Reference 1851


public final void suspend()
public String toString()
public void uncaughtException(Thread t, Throwable e)

Closs java.lang.Throwable
The Throwable class is the superclass of all errors and exceptions in the Java language. The fol-
lowing are defined:

II Constructors
public Throwable()
public Throwable(String message)

II Methods
public Throwable fillinStackTrace()
public String getMessage()
public void printStackTrace()
public void printStackTrace(PrintStream s)
public String toString()

Closs java.lang.UnknownError
Exception that is thrown when an unknown error occurs. The following are defined:

II Constructors
public UnknownError()
public UnknownError(String s)

Ap8.8 Package java. net

Closs java.net.Authenicator
Authenticates a connection, and is used when a proxy or an HTTP server prompts for authenti-
cation.

protected final String getRequestingHost()


protected final InetAddress getRequestingSite()
protected final int getRequestingPort()
protected final String getRequestingProtocol()
protected final String getRequestingPrompt()
protected final String getRequestingScheme()
protected PasswordAuthentication getPasswordAuthentication()
public static PasswordAuthentication requestPasswordAuthentication(
InetAddress addr,
int port,
String protocol,
String prompt,
String scheme)
public static PasswordAuthentication requestPasswordAuthentication(
String host,
InetAddress addr,
int port,
String protocol,
String prompt,
String scheme)public DatagramPacket(byte buf[],
int offset, int length, SocketAddress addr)
public synchronized static void setDefault(Authenticator a)

1852 Handbook of Data Communications and Networks


Closs java.net.ContentHandler
Class which is a superdass of all the classes which read an object from a URL connection. The
following are defined:
abstract public Object getContent(URLConnection urlc)
public Object getContent(URLConnection urlc, Class[] classes)

Closs java.net.HttpURLConnection
The constructor is:
protected HttpURLConnection (URL u)

and the methods:


public abstract void disconnect()
public InputStream getErrorStream()
public static boolean getFollowRedirects()
public long getHeaderFieldDate(String name, long Default)
public boolean getinstanceFollowRedirects()
public String getRequestMethod()
public int getResponseCode()
public String getResponseMessage()
public static void setFollowRedirects(boolean set)
public void setinstanceFollowRedirects(boolean followRedirects)
public void setRequestMethod(String method)
public abstract boolean usingProxy()

The response codes for HTTP 1.1 are:


public static final int HTTP_OK = 200;
public static final int HTTP_CREATED = 201;
public static final int HTTP_ACCEPTED = 202;
public static final int HTTP_NOT_AUTHORITATIVE 203;
public static final int HTTP_NO_CONTENT = 204;
public static final int HTTP RESET = 205;
public static final int HTTP PARTIAL = 206;
public static final int HTTP_MULT_CHOICE = 300;
public static final int HTTP_MOVED_PERM = 301;
public static final int HTTP_MOVED_TEMP = 302;
public static final int HTTP SEE_OTHER = 303;
public static final int HTTP_NOT_MODIFIED = 304;
public static final int HTTP_USE_PROXY = 305;
public static final int HTTP_BAD_REQUEST = 400;
public static final int HTTP UNAUTHORIZED = 401;
public static final int HTTP PAYMENT_REQUIRED = 402;
public static final int HTTP_FORBIDDEN = 403;
public static final int HTTP_NOT_FOUND = 404;
public static final int HTTP_BAD_METHOD = 405;
public static final int HTTP_NOT_ACCEPTABLE = 406;
public static final int HTTP_PROXY_AUTH = 407;
public static final int HTTP_CLIENT TIMEOUT = 408;
public static final int HTTP_CONFLICT = 409;
public static final int HTTP_GONE = 410;
public static final int HTTP_LENGTH_REQUIRED = 411;
public static final int HTTP PRECON FAILED = 412;

public static final int HTTP_ENTITY_TOO_LARGE = 413;


public static final int HTTP_REQ_TOO_LONG = 414;
public static final int HTTP_UNSUPPORTED_TYPE = 415;
public static final int HTTP_SERVER_ERROR = 500;

Java Reference 1853


public static final int HTTP_INTERNAL_ERROR = 500;
public static final int HTTP_NOT_IMPLEMENTED = 501;
public static final int HTTP_BAD_GATEWAY = 502;
public static final int HTTP_UNAVAILABLE = 503;
public static final int HTTP_GATEWAY_TIMEOUT = 504;
public static final int HTTP_VERSION = 505;

The methods implemented are: "GET", "POST", "HEAD", "OPTIONS", "PUT", "DELETE",
"TRACE".

Closs java.net.DatagramPacket
The DatagramPacket class implements datagram packets. The following are defined:

II Constructors
public DatagramPacket(byte ibuf[], int offset, int ilength)
public DatagramPacket(byte[] ibuf, int ilength)
public DatagramPacket(byte[] ibuf, int ilength, inetAddress iadd, int iport)
public DatagramPacket(byte buf[], int offset, int length, SocketAddress addr)
public DatagramPacket(byte buf[], int length, SocketAddress addr)

where:

ibuf is the packet data.


offset is the packet data offset.
ilength is the packet data length.
addr is the destination address.
port is the destination port number.
II Methods
public synchronized InetAddress getAddress()
public synchronized byte[] getData()
public synchronized int getLength()
public synchronized int getPort()
public synchronized void setAddress(InetAddress iaddr) II Java 1.1
public synchronized void setDate(byte[] ibuf) II Java 1.1
public synchronized void setLength(int ilength) II Java 1.1
public synchronized void setPort(int iport) II Java 1.1

Closs java.net.DatagramSocket
The DatagramSocket class represents sockets for sending and receiving daragrams. The follow-
ing are defined:

II Constructors
public DatagramSocket()
public DatagramSocket(int port)

II Methods
public synchronized void bind(SocketAddress addr)
public void close()
public void connect(InetAddress address, int port)
public void connect(SocketAddress addr)
protected DatagramSocket(DatagramSocketimpl impl)
public DatagramSocket(SocketAddress bindaddr)
public DatagramSocket(int port, InetAddress laddr)
public void disconnect()
public synchronized boolean getBroadcast()

1854 Handbook of Data Communications and Networks


public DatagramChannel getChannel()
DatagramSocketimpl getimpl()
public int getPort()
public SocketAddress getRemoteSocketAddress()
public SocketAddress getLocalSocketAddress()
public InetAddress getLocalAddress()
public int getLocalPort()
public InetAddress getinetAddress()
public synchronized int getSoTimeout()
public synchronized int getSendBufferSize()
public synchronized int getReceiveBufferSize()
public synchronized boolean getReuseAddress()
public synchronized int getTrafficClass()
public boolean isBound()
public boolean isClosed()
public boolean isConnected()
public synchronized void receive(DatagramPacket p)
public void send(DatagramPacket p)
public synchronized void setBroadcast(boolean on)
public static synchronized void
setDatagramSocketimplFactory(DatagramSocketimplFactory fac)
public synchronized void setReceiveBufferSize(int size)
public synchronized void setReuseAddress(boolean on)
public synchronized void setSendBufferSize(int size)
public synchronized void setSoTimeout(int timeout)
public synchronized void setTrafficClass(int tc)

forTC:
IPTOS LOWCOST II Ox02
IPTOS_RELIABILITY II Ox04
IPTOS THROUGHPUT II Ox OS
IPTOS LOWDELAY II Ox10

Class java.net.lnet4Address
This extends InetAddress, where the following are defined (http://www.ietf.org/rfc/
rfc2365.txt):

public synchronized InetAddress anyLocalAddress() 110.0.0.0


public boolean equals(Object obj)
public byte[] getAddress()
public String getHostAddress()
public native String getLocalHostName()
public native String getHostByAddr(byte[] addr)
public int hashCode()
public native byte[][] lookupAllHostAddr(String hostname)
public synchronized InetAddress loopbackAddress() 11127.0.0.1
public synchronized InetAddress localHost()
public boolean isAnyLocalAddress()
public boolean isLinkLocalAddress()
public boolean isMCGlobal()
public boolean isMCLinkLocal() II 169.254.0.0116
public boolean isMCNodeLocal()
public boolean isMCOrgLocal() II 239.192 - 239.195
public boolean isMCSiteLocal() II see below
public boolean isMulticastAddress()
public boolean isSiteLocalAddress()
static String numericToTextFormat(byte[] src)
static byte[] textToNumericFormat(String src)

Multicast addresses are checked with to see if the following is true:

Java Reference 1855


(address & OxfOOOOOOO) == OxeOOOOOOO

Site addresses are (RFC 1918):

10.0.0.0/8
172.16.0.0/12
192.168.0.0/16

Global scope:

224.0.1.0 to 238.255.255.255

Class java.net.lnet6Address
This extends InetAddress, where the following are defined (http://www.ietf.org/rfc/
rfc2373.txt):

public boolean equals(Object obj)


public byte[] getAddress()
public String getHostAddress()
public int hashCode ()
public boolean isAnyLocalAddress()
public boolean isiPv4CompatibleAddress() II true if 0-11 is O's
public boolean isLinkLocalAddress()
public boolean isLinkLocalAddress()
public boolean isLoopbackAddress()
public boolean isMCGlobal ()
public boolean isMCLinkLocal ()
public boolean isMCNodeLocal ()
public boolean isMCOrgLocal ()
public boolean isMCSi teLocal ()
public boolean isMulticastAddress()

Loop back address is checked with:

byte test = OxOO;


for (int i = 0; i < 15; i++) {
test I= ipaddress[i];
}
return (test== OxOO) && (ipaddress[15] == Ox01)

Multicast addresses are checked for alll's in the first byte (FF:xx:xx:xx:xx:xx:xx:xx) to see if the
following is true:

ipaddress[O] & Oxff) == Oxff

A local address to see if the bits are all O's:

byte test = OxOO;


for (int i = 0; i < 16; i++)
test I= ipaddress[i];

return (test == OxOO)

1856 Handbook of Data Communications and Networks


For global scope (MCGlobal):

ipaddress[O] & Oxff) == Oxff && (ipaddress[1] & OxOf) == OxOe

Utility routine to check if the multicast address has node scope (MCNodeLocal).
ipaddress[O] & Oxff) == Oxff && (ipaddress[1] & OxOf) == Ox01

Utility routine to check if the multicast address has link scope(MCLinkLocal)

ipaddress[O] & Oxff) == Oxff && (ipaddress[1] & OxOf) == Ox02

Utility routine to check if the multicast address has site scope (MCSiteLocal)

ipaddress[O] & Oxff) == Oxff && (ipaddress[1] & OxOf) == Ox05

Utility routine to check if the multicast address has organization scope (MCgLocal)
ipaddress[O] & Oxff) == Oxff && (ipaddress[1] & OxOf) == OxOB

Another format which is sometimes used in a mixed environment of IPv4 and IPv6 nodes is:

xx:xx:xx:xx:xx:xx:d.d.d.d

where xx: xx: xx: xx: xx: xx defines the 6 upper bytes of the IPv6 address, and d. d. d. d repre-
sents the lower 32 bits of the IPv4 for address.

Class java.net.l netAdd ress


The InetAddress class represents Internet addresses. The following are defined:

II Methods
public boolean equals(Object obj)
public InetAddress[] getAllByName(String host)
public InetAddress getByName(String host)
public static InetAddress getByAddress(String host, byte[] addr)
public static InetAddress getByAddress(byte[] addr)
public InetAddress getLocalHost(String host)
public synchronized static InetAddress getLocalHost()
public byte[] getAddress()
public String getCanonicalHostName()
public String getHostAddress()
public String getHostName()
String getHostName(boolean check)
public int hashCode()
public boolean isMulticastAddress() II Java 1.1
public boolean isAnyLocalAddress()
public boolean isLoopbackAddress()
public boolean isLinkLocalAddress()
public boolean isSiteLocalAddress()
public boolean isMCGlobal()
public boolean isMCNodeLocal()
public boolean isMCLinkLocal()
public boolean isMCSiteLocal()
public boolean isMCOrgLocal()
public String toString()

Java Reference 1857


Closs java.net.lnetSocketAddress
A class which implements an IP socket address. The methods are:

public final boolean equals(Object obj)


public final int hashCode()
public final int getPort()
public final InetAddress getAddress()
public final String getHostName()
public InetSocketAddress(int port)
public InetSocketAddress(InetAddress addr, int port)
public InetSocketAddress(String hostname, int port)
public final boolean isUnresolved()
public String toString()

Closs java.net.jarURLConnection
Implements a URL connection to a JAR Gava ARchive) Hie. The methods are:

public Attributes getAttributes()


public java.security.cert.Certificate[] getCertificates()
public String getEntryName()
public abstract JarFile getJarFile()
public Manifest getManifest()
public JarEntry getJarEntry()
public URL getJarFileURL()
public Attributes getMainAttributes()

The format to access JAR Hies is:

jar: <uri>! {entry}

For example:

jar:http:ltestsite.comljarltest.jar!ltestltest.class

Closs java.net.MulticastSocket
Implements a multicast socket. The following are defined:

II Constructor
public MulticastSocket()
public MulticastSocket(int port)
public MulticastSocket(SocketAddress bindaddr)
II Methods
public boolean getLoopbackMode()
public InetAddress getinterface()
public Networkinterface getNetworkinterface()
public int getTimeToLive()
public byte getTTL()
public void joinGroup(InetAddress mcastaddr)
public void joinGroup(SocketAddress mcastaddr, Networkinterface netif)
public void leaveGroup(InetAddress mcastaddr)
public void leaveGroup(SocketAddress mcastaddr, Networkinterface netif)
public void setinterface(InetAddress inf)

public void setNetworkinterface(Networkinterface netif)


public void send(DatagramPacket p, byte ttl)
public void setLoopbackMode(boolean disable)

1858 Handbook of Data Communications and Networks


public void setTimeToLive(int ttl)
public void setTTL(byte ttl)

Multicast groups are defined by class D IP addresses (224.0.0.0 to 239.255.255.255) with a


standard UDP port number. An example of joining a group is:

InetAddress group = InetAddress .getByName ( "239 .10 .11.12")


MulticastSocket s1 =new MulticastSocket(1234)
s1.joinGroup(group)

and then to send a message:

String mymsg = "Hello";


DatagramPacket hellopk =new DatagramPacket(mymsg.getBytes(),
mymsg.length(), group, 1234)
s1.send(hellopk)

... to get responses:

byte[] buff =new byte[1000];


DatagramPacket inbuff = new DatagramPacket(buff, buff.length)
s1.receive(inbuff)

... and to leave the group:

s1.leaveGroup(group)

Class java.net.NetPermission
Implements additional persmissions, and extends the basic permissions (java. security. Ba-
sicPermission). The following are defined:

II Constructor
public NetPermission(String name)
public NetPermission(String name, String actions)

where name is the symbolic name of the NetPermission, such as:

"setDefaultAuthenticator"

A wildcard match is defined by an asterisk at the end of the name.

Class java.net.Networklnterface
This class represents a network interface with a name, and a list of IP addresses assigned to the
interface. The following are defined:

public boolean equals(Object obj)


public int hashCode()
public String getName()
public Enumeration getinetAddresses()
public String getDisp1ayName()
native static Networkinterface getByindex(int index)
public native static Networkinterface getByinetAddress(InetAddress addr)
public static Enumeration getNetworkinterfaces()

Java Reference 1859


public String toString()

Closs java.net.PasswordAuthentication
Datagram implementation. The methods are:

II constructor
public PasswordAuthentication(String userName, char[] password)
II methods
public String getUserName()
public char[] getPassword()

An example is:
import java.net.PasswordAuthentication;

public class pass


{
public static void main (String args(])
{
String username="fred";
char[] password= {'b','e','r','t'};

PasswordAuthentication pass=new PasswordAuthentication(username,password)

System. out. println ( "Username is " + pass. getUserName () )

String str =new String(pass.getPassword())

System.out.println("Password is " + str )

Closs java.net.PiainDatagramSocketlmpl
Datagram implementation. The methods are:

protected synchronized native void bind(int lport, InetAddress laddr)


protected synchronized void create()
protected void connect(InetAddress address, int port)
protected void close()
protected void disconnect()
protected void finalize()
public Object getOption(int optiD)
protected native int getTimeToLive()
protected native byte getTTL()
protected synchronized native void receive(DatagramPacket p)
protected native void send(DatagramPacket p)
public void setOption(int optiD, Object o)
protected native void setTimeToLive(int ttl)
protected native void setTTL(byte ttl)

where optiD can be:

SO_TIMEOUT
IP_TOS
SO_REUSEADDR
SO_BROADCAST
SO_BINDADDR

1860 Handbook of Data Communications and Networks


SO_RCVBUF
SO_SNDBUF
IP_MULTICAST_IF
IP_MULTICAST_IF2
IP_MULTICAST_LOOP

The multicast methods are:

protected void join(InetAddress inetaddr)


protected void leave(InetAddress inetaddr)
protected void joinGroup(SocketAddress mcastaddr, Networkinterface netif)
private native void join(InetAddress inetaddr, Networkinterface netif)
protected void leaveGroup(SocketAddress mcastaddr, Networkinterface netif)
private native void leave(InetAddress inetaddr, Networkinterface netif)

Closs java.net.PiainSocketlmpl
This is the default socket class and does not contain any security checks. The methods are:

protected synchronized void accept(Socketimpl s)


public final FileDescriptor acquireFD()
protected synchronized int available()
protected synchronized void bind(InetAddress address, int lport)
protected void close()
protected void connect(String host, int port)
protected void connect(InetAddress address, int port)
protected void connect(SocketAddress address, int timeout)
protected void finalize()
protected synchronized InputStream getinputStream()
public int getTimeout()
public Object getOption(int opt)
protected synchronized void listen(int count)
protected synchronized OutputStream getOutputStream()
protected void sendUrgentData (int data)
protected void shutdowninput()
protected void shutdownOutput()
void setinputStream(SocketinputStream in)
public void setOption(int opt, Object val)
protected boolean supportsUrgentData ()

where opt can be:


SO LINGER
SO_TIMEOUT
IP TOS
SO_BINDADDR
TCP_NODELAY
SO_SNDBUF
SO_RCVBUF
SO_KEEPALIVE
SO_OOBINLINE
SO_REUSEADDR

Closs java.net.ServerSocket
The ServerSocket class represents servers which listen for a connection from clients. The fol-
lowing are defined:

II Constructors
public ServerSocket(int port)

Java Reference 1861


public ServerSocket(int port, int backlog)
public ServerSocket(int port, int backlog, InetAddress bindAddr)
II Methods
public Socket accept()
public void bind(SocketAddress endpoint)
public void bind(SocketAddress endpoint, int backlog)
public void close()
public InetAddress getinetAddress()
public SocketAddress getLocalSocketAddress()
public int getLocalPort()
public synchronized int getSoTimeout() II Java 1.1
public ServerSocketChannel getChannel()
public synchronized int getSoTimeout()
public boolean getReuseAddress()
public synchronized int getReceiveBufferSize()
public boolean isBound()
public boolean isClosed()
public synchronized void setSoTimeout(int timeout)
public void setReuseAddress(boolean on)
public synchronized void setReceiveBufferSize (int size)
public String toString()

Class java.net.Socket
The Socket class represents socket connections over a network. The following are defined:

II Constructors
public Socket ()
public Socket(String host, int port)
public Socket(InetAddress addr, int port)
public Socket(InetAddress addr, int port, boolean stream) II Java 1.0
public Socket(String host, int port, InetAddress addr, int localport)
II Java 1.1
public Socket(InetAddress addr, int port, InetAddress localAddress,
int localport) II Java 1.1
II Methods
public void bind(SocketAddress bindpoint)
public synchronized void close()
public void connect(SocketAddress endpoint)
public void connect(SocketAddress endpoint, int timeout)
public SocketChannel getChannel()
public InetAddress getinetAddress()
public InputStream getinputStream()
public boolean getKeepAlive()
public InetAddress getLocalAddress() II Java 1.1
public int getLocalPort()
public SocketAddress getLocalSocketAddress()
public boolean getOOBinline()
public OutputStream getOutputStream()
public int getPort()
public synchronized int getReceiveBufferSize()
public SocketAddress getRemoteSocketAddress()
public synchronized int getSendBufferSize()
public int getSoLinger() II Java 1.1
public synchronized int getSoTimeout()
public boolean getTcpNoDelay() II Java 1.1
public int getTrafficClass()
public boolean getReuseAddress()
public boolean isBound()
public boolean isClosed()
public boolean isConnected()
public boolean isinputShutdown()

1862 Handbook of Data Communications and Networks


public boolean isOutputShutdown()
public void setKeepAlive(boolean on)
public void setOOBinline(boolean on)
public void setSoLinger(boolean on, int val) II Java 1.1
public synchronized void setReceiveBufferSize(int size)
public synchronized void setSendBufferSize(int size)
public synchronized void setSoTimed(int timeout) II Java 1.1
public void sendUrgentData (int data)
public void setTcpNoDelay(boolean on) II Java 1.1
public void setReuseAddress(boolean on)
public void shutdowninput()
public void shutdownOutput()
public void setTrafficClass(int tc)
public String toString()

Class java.net.Socketlmpl
The Socketimpl class represents socket connections over a network. The following are defined:

II Methods
public abstract void accept(Socketimpl s)
public abstract int available()
public abstract void bind(InetAddress host, int port)
public abstract void close()
public abstract void connect(String host, int port)
public abstract void connect(InetAddress addr, int port)
public abstract void create(boolean stream)
public FileDescriptor getFileDescriptor()
public InetAddress getinetAddress()
public abstract InetAddress getinputStream()

Class java.net.SocketPermission
The SocketPermission class implements socket permissions. The following are defined:

II Constructor
public SocketPermission(String host, String action)
II Methods
public void add(Permission permission)
public Enumeration elements()
public int hashCode()
public boolean implies(Permission p)
public String getActions()

The action are:


CONNECTILISTENIACCEPTIRESOLVE

The format is host:portrange, where:

host = (hostname I IPv4address I iPv6reference) [:portrange]


portrange = portnumber I -portnumber I portnumber-[portnumber]

Examples of the format include:


p1 new SocketPermission ( "* . net" , "resolve") ;
pl new Socket Permission("*. testsystem.com", "connect");
pl new SocketPermission("10.11.12.0", "connect");
p1 new SocketPermission("10.11.12.0:1024-65535", "connect");
p1 new SocketPermission("localhost:1024-", "accept,connect,listen");

Java Reference 1863


p1 new SocketPermission("localhost:1024-65535", "listen");
p1 new SocketPermission ( "mywww. co. uk", "connect") ;
p1 new SocketPermission("testsystem.com:80", "connect");
p1 new SocketPermission ( "testsystem. com: 9999", "connect, accept") ;

Class java. net. SocksConsts


The SocksConsts class defines constants used with sockets. The following are defined:

static final int PROTO VERS4 4;


static final int PROTO_VERS 5;
static final int DEFAULT PORT 1080;

static final int NO_AUTH 0.


static final int GSSAPI 1;
static final int USER_PASSW 2;
static final int NO METHODS -1;

static final int CONNECT 1;


static final int BIND 2;
static final int UDP_ASSOC 3;

static final int IPV4 1;


static final int DOMAIN NAME 3;
static final int IPV6 4;

static final int REQUEST_OK 0;


static final int GENERAL_FAILURE 1;
static final int NOT ALLOWED 2;
static final int NET_UNREACHABLE 3;
static final int HOST UNREACHABLE 4;
static final int CONN_REFUSED 5;
static final int TTL EXPIRED 6;
static final int CMD_NOT_SUPPORTED 7;
static final int ADDR_TYPE_NOT_SUP 8;

Class java.net.URI
The URI class represents Uniform Resource Indicators (http://www.iet£org/rfc/rfc2732.txt). The
following are defined:

II Constructors
public URI(String str)
public URI(String scheme, String userinfo, String host, int port,
String path, String query, String fragment)
public URI(String scheme, String authority,
String path, String query, String fragment)
public URI(String scheme, String host, String path, String fragment)
public URI(String scheme, String ssp, String fragment)
II methods
public static URI create(String str)
public int compareTo(Object ob)
public boolean equa1s(Object ob)
public String getAuthority()
public String getFragment()
public String getHost()
public String getQuery()
public String getRawPath()
public String getRawSchemeSpecificPart()
public String getRawUserinfo()
public String getSchemeSpecificPart()

1864 Handbook of Data Communications and Networks


public String getSchame()
public String getUserinfo()
public int hashCode()
public boolean isOpaque()
public URI parseServerAuthority()
public URI normalize()
public URI resolve(String str)
public String toString()
public String toASCIIString()
public URL toURL()
II Exception: URISyntaxException

A URI has nine elements:

scheme
scheme-specific-part
authority
user-info
host
port
path
query
fragment

Class java.net.URL
The URL class represents Uniform Resource Locators. The following are defined:

II Constructors
public URL(String protocol, String host, int port, String file)
public URL(String protocol, String host, String file)
public URL(String spec)
public URL(URL context, String spec)

II Methods
public boolean equals(Object obj)
public final Object getContent()
public String getFile()
public String getHost()
public int getPort()
public String getProtocol()
public String getRef()
public int hashcode()
public URLConnection openConnection()
public final InputStream openStream()
public boolean sameFile(URL other)
public String toExternalForm()
public String toString()
II Exception: MalformedURLException

Class java.net.URlencoder
The URLencoder class represents URL encoder methods. The following are defined:

public static String encode(String s)


public static String encode(String s, String enc)

Java Reference 1865


Ap8.9 Package java.utils

Closs java.utils.BitSet
The BitSet class implements boolean operations. The following are defined:

II Constructors
public BitSet ()
public BitSet(int nbits)

II Methods
public void and(BitSet set)
public void clear(int bit)
public Object clone()
public boolean equals(Object obj)
public boolean get(int bit)
public int hashCode()
public void or(BitSet set)
public void set(int bit)
public int size()
public String toString()
public void xor(BitSet set)

Closs java.utils.calender
The calender class has been added with Java 1.1. It supports dates and times.

Closs java.utils.Date
The Date class supports dates and times. The following are defined:

II Constructors
public Date()
public Date(int year, int month, int date) II Java 1.0
public Date ( int year, int month, int date, int hrs, int min) II Java 1.0
public Date (int year, int month, int date, int hrs, int min, int sec)
II Java 1.0
public Date(long date) II Java 1.0
public Date(String s) II Java 1.0
II Methods
public boolean after(Date when)
public boolean before(Date when)
public boolean equals(Object obj)
public int getDate() II Java 1.0
public int getDay() II Java 1.0
public int getHours() II Java 1.0
public int getMinutes () I I Java 1.0
public int getMonth() II Java 1.0
public int getSeconds() II Java 1.0
public long get Time ()
public int getTimezoneOffset() II Java 1.0
public int getYear () II Java 1.0
public int hashCode ()
public static long parse(String s)
public void setDate(int date) II Java 1.0
public void setHours(int hours) II Java 1.0
public void setMinutes(int minutes) II Java 1.0
public void setMonth(int month) II Java 1.0
public void setSeconds(int seconds) II Java 1.0

1866 Handbook of Data Communications and Networks


public void setTime(long time)
public void setYear(int year) II Java 1.0
public String toGMTString() II Java 1.0
public String toLocaleString() I I Java 1. 0
public String toString()
public static long UTC(int year, int month, int date, int hrs, int min,
int sec) II Java 1.0

Closs java.utils.Dictionary
The Dictionary class is the abstract parent of any class which maps keys to values. The follow-
ing are defmed:

II Constructors
public Dictionary()

II Methods
public abstract Enumeration elements()
public abstract Object get(Object key)
public abstract boolean isEmpty()
public abstract Enumeration keys()
public abstract Object put(Object key, Object value)
public abstract Object remove(Object key)
public abstract int size()

Closs java.utils.EmptyStackException
The EmptyStackException is thrown when the stack is empty. The following is defined:

II Constructors
public EmptyStackException()

Closs java.utils.Hashtable
This Hashtable class supports a hashtable which maps keys to values. The following are de-
fined:

II Constructors
public Hashtable()
public Hashtable(int initialCapacity)
public Hashtable(int initialCapacity, float loadFactor)
II Methods
public void clear()
public Object clone()
public boolean contains(Object value)
public boolean containsKey(Object key)
public Enumeration elements()
public Object get(Object key)
public boolean isEmpty()
public Enumeration keys()
public Object put(Object key, Object value)
protected void rehash()
public Object remove(Object key)
public int size()
public String toString()

Java Reference 1867


Class java.utils.NoSuchEiementException
The NoSuchElementException is thrown when there are no more elements in the enumeration.
The following are defined:

II Constructors
public NoSuchElementException()
public NoSuchElementException(String s)

Class java.utils.Observable
The Observable class represents an observable object. The following are defined:

II Constructors
public Observable()
II Methods
public void addObserver(Observer o)
protected void clearChanged()
public int countObservers()
public void deleteObserver(Observer o)
public void deleteObservers()
public boolean hasChanged()
public void notifyObservers()
public void notifyObservers(Object arg)
protected void setChanged()

Class java.utils.Properties
The Properties class represents a persistent set of properties. The following are defined:

II Fields
protected Properties defaults;

II Constructors
public Properties()
public Properties(Properties defaults)

II Methods
public String getProperty(String key)
public String getProperty(String key, String defaultValue)
public void list(PrintStream out)
public void load(InputStream in)
public Enumeration propertyNames()
public void save(OutputStream out, String header)

Class java.utils.Random
The Random class implements pseudo-random generator functions. The following are defined:
II Constructors
public Random ()
public Random(long seed)

II Methods
public double nextDouble()
public float nextFloat()
public double nextGaussian()
public int nextint()
public long nextLong()
public void setSeed(long seed)

1868 Handbook of Data Communications and Networks


Class java.utils.Stack
The Stack class implements a last-in-first-out (LIFO) stack.

II Constructors
public Stack ()

II Methods
public boolean empty()
public Object peek{)
public Object pop()
public Object push(Object item)
public int search(Object o)

Class java.utils.StringTokenizer
The stringTokenizer class allows strings to be split into tokens. The following are defined:

II Constructors
public StringTokenizer(String str)
public StringTokenizer(String str, String delim)
public StringTokenizer(String str, String delim, boolean returnTokens)

II Methods
public int countTokens{)
public boolean hasMoreElements()
public boolean hasMoreTokens()
public Object nextElement()
public String nextToken()
public String nextToken(String delim)

Class java.utils.Vector
The Vector class implements a growable array of objects. The following are defined:

II Fields
protected int capacityincrement;
protected int elementCount;
protected Object elementData[];

II Constructors
public Vector ()
public Vector(int initialCapacity)
public Vector(int initialCapacity, int capacity!ncrement)

II Methods
public final void addElement(Object obj)
public final int capacity()
public Object clone()
public final boolean contains(Object elem)
public final void copyinto(Object anArray[J)
public final Object elementAt(int index)
public final Enumeration elements()
public final void ensureCapacity(int minCapacity)
public final Object firstElement()
public final int indexOf(Object elem)
public final int indexOf(Object elem, int index)
public final void insertElementAt(Object obj, int index)
public final boolean isEmpty()
public final Object lastElement()
public final int lastindexOf(Object elem)

Java Reference 1869


public final int lastindexOf(Object elem, int index)
public final void removeAllElements()
public final boolean removeElement(Object obj)
public final void removeElementAt(int index)
public final void setElementAt(Object obj, int index)
public final void setSize(int newSize)
public final int size()
public final String toString()
public final void trimToSize()

1870 Handbook of Data Communications and Networks


Ap9 RFC's
The main standards organizations for the Internet are:

Internet Architecture Board (lAB) www.iab.org

Internet Engineering Task Force (IETF) www.ietf.org

Internet Research Task Force (IRTF) www.irtt.org

Internet Assigned Numbers Authority (lANA) www.iana.org

RFCs can be downloaded from http://www.rfc-editor.org

The following gives an outline of some of the RFCs:

RFC768 User Datagram Protocol


RFC775 Directory-Oriented FTP Commands
RFC781 Specification of the Internet Protocol Timestamp Option
RFC783 TFTP Protocol
RFC786 User Datagram Protocol (UDP)
RFC791 Internet Protocol (IP)
RFC792 Internet Control Message Protocol (ICMP)
RFC793 Transmission Control Protocol (TCP)
RFC799 Internet Name Domains
RFC813 Window and Acknowledgment in TCP
RFC815 IP Datagram Reassembly Algorithms
RFC821 Simple Mail-Transfer Protocol (SMTP)
RFC822 Standard for the Format of ARPA Internet Text Messages
RFC823 DARPA Internet Gateway
RFC827 Exterior Gateway Protocol (EGP)
RFC877 Standard for the Transmission ofiP Datagrams over Public Data Networks
RFC879 TCP Maximum Segment Size and Related Topics
RFC886 Proposed Standard for Message Header Munging
RFC893 Trailer Encapsulations
RFC894 Standard for the Transmission ofiP Datagrams over Ethernet Networks
RFC895 Standard for the Transmission ofiP Datagrams over Experimental Ethernet Net-
works
RFC896 Congestion Control in TCP/IP lnternetworks
RFC903 Reverse Address Resolution Protocol
RFC904 Exterior Gateway Protocol Formal Specifications
RFC906 Bootstrap Loading Using TFTP
RFC919 Broadcast Internet Datagram
RFC920 Domain Requirements
RFC932 Subnetwork Addressing Schema
RFC949 FfP Unique-Named Store Command
RFC950 Internet Standard Subnetting Procedure
RFC951 Bootstrap Protocol
RFC959 File Transfer Protocol
RFC974 Mail Routing and the Domain System
RFC980 Protocol Document Order Information
RFCI009 Requirements for Internet Gateways
RFCIOll Official Internet Protocol
RFCI013 X Windows System Protocol
RFCIOI4 XDR: External Data Representation Standard
RFCI027 Using ARP to Implement Transparent Subnet Gateways
RFCI032 Domain Administrators Guide
RFCI033 Domain Administrators Operation Guide
RFC1034 Domain Names - Concepts and Facilities
RFCI035 Domain Names- Implementation and Specifications
RFCI04I T elnet 3270 Regime Option
RFC1042 Standard for the Transmission ofiP Datagrams over IEEE 802 Networks
RFCI043 T elnet Data Entry Terminal Option
RFC1044 Internet Protocol on Network System's HYPERchannel
RFC1053 Telnet X 3 PAD Option
RFC1055 Nonstandard for Transmission ofiP Datagrams over Serial Lines
RFC1056 PCMAIL: A Distributed Mail System for Personal Computers
RFCI058 Routing Information Protocol
RFCI068 Background File Transfer Program (BFTP)
RFC1072 TCP Extensions of Long-Delay Paths
RFCI073 T elnet Window Size Option
RFCI074 NSFNET Backbone SPF-based Interior Gateway Protocol
RFCI079 Telnet Terminal Speed Option
RFCI080 T elnet Remote Flow Control Option
RFCI084 BOOTP Vendor Information Extensions
RFC1088 Standard for the Transmission ofiP Datagrams over NetBIOS Network
RFCI089 SNMP over Ethernet
RFCI091 Telnet Terminal-Type Option
RFCI094 NFS: Network File System Protocol Specification
RFCllOI DNS Encoding of Network Names and Other Types
RFCII02 Policy Routing in Internet Protocols
RFCII04 Models of Policy-Based Routing
RFC1112 Host Extension for IP Multicasting
RFCII22 Requirement for Internet Hosts - Communication Layers
RFC1123 Requirement for Internet Hosts - Application and Support
RFCII24 Policy Issues in Interconnecting Networks
RFCII25 Policy Requirements for Inter-Administrative Domain Routing
RFC1127 Perspective on the Host Requirements RFC
RFCII29 Internet Time Protocol
RFC1143 Q Method oflmplementing Telnet Option Negotiation
RFCII47 FYI on a Network Management Tool Catalog
RFCI149 Standard for the Transmission ofiP Datagrams over Avian Carriers
RFC1155 Structure and Identification of Management Information for TCP/IP-Based
lnternets
RFC1156 Management Information Base for Network Management ofTCP/IP-Based
lnternets
RFC1157 Simple Network Management Protocol (SNMP)
RFCII63 Border Gateway Protocol (BGP)
RFCII64 Application of the Border Gateway Protocol in the Internet
RFCII66 Internet Numbers
RFCII71 Point-to-Point Protocol for the Transmission of Multi-Protocol Datagrams

1872 Handbook of Data Communications and Networks


RFC1172 Point-to-Point Protocol Initial Configuration Options
RFC1173 Responsibilities of Host and Network Managers
RFC1175 FYI on Where to Start: A Bibliography of lnternetworking Information
RFC1178 Choosing a Name For Your Computer
RFC1179 Line Printer Daemon Protocol
RFC1184 T elnet Linemode Option
RFC1187 Bulk Table Retrieval with the SNMP
RFC1188 Proposed Standard for the Transmission ofTP Datagrams over FOOl Networks
RFC1195 Use ofOSI IS-IS for Routing in TCP/IP and Dual Environments
RFC1196 Finger User Information Protocol
RFC1198 FYI on the X Windows System
RFC1201 Transmitting IP Traffic over ARCNET Networks
RFC1205 520 Telnet Interface
RFC1208 Glossary of Networking Terms
RFC1209 Transmission ofiP Datagrams over the SMDS Service
RFC1212 Concise MIB Definitions
RFC1213 MIB for Network Management ofTCP/IP-Based Internets
RFC1214 OSI Internet Management: Management Information Base
RFC1215 Convention for Defining Traps for Use with the SNMP
RFC1219 On the Assignment of Subnet Numbers
RFC1220 Point-to-Point Protocol Extensions for Bridges
RFC1224 Techniques for Managing Asynchronous Generated Alerts
RFC1227 SNMP MUX Protocol and MIB
RFC1228 SNMP-DPI: Simple Network Management Protocol Distributed Program Interface
RFC1229 Extensions to the Generic-interface MIB
RFC1230 IEEE 802 4 Token Bus MIB
RFC1231 IEEE 802 5 Token Ring MIB
RFC1232 Definitions of Managed Objects for the DS1 Interface Type
RFC1233 Definitions of Managed Objects for the DS3 Interface Type
RFC1236 IP to X 121 Address Mapping for DON IP
RFC1238 CLNS MIB for Use with Connectionless Network Protocol
RFC1239 Reassignment of Experiment MIBs to Standard MIBs
RFC1243 Appletalk Management Information Base
RFC1245 OSPF Protocol Analysis
RFC1246 Experience with the OSPF Protocol
RFC1247 OSPF Version2
RFC1253 OSPF Version2: Management Information Base
RFC1254 Gateway Congestion Control Survey
RFC1267 A Border Gateway Protocol (BGP-3)
RFC1271 Remote Network Monitoring Management Information Base
RFC1321 The MD5 Message-Digest Algorithm
RFC1340 Assigned Numbers
RFC1341 MIME Mechanism for Specifying and Describing the Format oflnternet Message
Bodies
RFC1360 lAB Official Protocol Standards
RFC1522 MIME (Multipurpose Internet Mail Extensions) Part Two : Message Header
Extensions for Non-ASCII Text
RFC1521 MIME (Multipurpose Internet Mail Extensions) Part One : Mechanisms for Speci-
fying and Describing the Format oflnternet Mail Message Bodies)
RFC1583 OSPF Version2
RFC1630 Universal Resource Identifiers in 'WWW
RFC1738 Uniform Resource Identifiers (URL)

RFC's 1873
RFCI752 The Recommendation for the IP Next-Generation Protocol
RFCI771 A Border Gateway Protocol4 (BGP-4)
RFCI808 Relative Uniform Resource Identifiers
RFC1809 Using the Flow Label in IPv6
RFCI825 Security Architecture for the Internet Protocol
RFCI826 IP Authentication Header
RFC1827 IP Encapsulating Security Payload (ESP)
RFC1828 IP Authentication Using Keyed MD5
RFC1829 The ESP DES-CBC Transform
RFCI883 Internet Protocol, Version 6 Specification
RFCI884 IP Version 6 Addressing Architecture
RFC1885 Internet Control Message Protocol (ICMPv6) for the Internet Protocol Version-6
(IPv6) Specification
RFCI886 DNS Extensions to Support IP Version 6
RFC1887 An Architecture for IPv6 U nicast Address Allocation
RFC1901 Introduction to Community-Based SNMPv2
RFC1902 Structure of Management Information for SNMPv2
RFCI903 Textual Conventions for SNMPv2
RFC1904 Conformance Statements for SNMPv2
RFC1905 Protocol Operations for SNMPv2
RFC1906 Transpon Mappings for SNMPv2
RFC1907 Management Information Base for SNMPv2
RFC1908 Coexistence Between Version 1 and Version2 of the Internet-Standard Network
Management Framework
RFC1909 An Administrative Infrastructure for SNMPv2
RFC1910 User-based Security Model for SNMPv2
RFC1911 Voice Profile for Internet Mail
RFCI912 Common DNS Operational and Configuration Errors
RFC1913 Architecture of the Who is++ Index Service
RFCI914 How to Interact with a Whois++ Mesh
RFC1915 Variance for The PPP Connection Control Protocol and The PPP Encryption Con-
trol Protocol
RFC1916 Enterprise Renumbering: Experience and Information Solicitation
RFC1917 An Appeal to the Internet Community to Return Unused IP Networks (Prefixes) to
the lANA
RFC1918 Address Allocation for Private Internets
RFC1919 Classical versus Transparent IP Proxies
RFC1920 INTERNET OFFICIAL PROTOCOL STANDARDS
RFCI922 Chinese Character Encoding for Internet Messages
RFCI923 RIPv I Applicability Statement for Historic Status
RFCI924 A Compact Representation of IPv6 Addresses
RFCI925 The Twelve Networking Truths
RFCI926 An Experimental Encapsulation ofiP Datagrams on Top of ATM
RFCI927 Suggested Additional MIME Types for Associating Documents
RFC1928 SOCKS Protocol Version 5
RFCI929 Username/Password Authentication for SOCKS V5
RFCI930 Guidelines for creation, selection, and registration of an Autonomous System (AS)
RFCI931 Dynamic RARP Extensions for Automatic Network Address Acquisition
RFCI932 IP over ATM: A Framework Document
RFCI933 Transition Mechanisms for IPv6 Hosts and Routers
RFC1934 Ascend's Multilink Protocol Plus (MP+)
RFCI935 What is the Internet, Anyway?

1874 Handbook of Data Communications and Networks


RFC1936 Implementing the Internet Checksum in Hardware
RFC1937 "Local/Remote" Fotwarding Decision in Switched Data Link Subnetworks
RFC1938 A One-Time Password System
RFC1939 Post Office Protocol- Version 3
RFC1940 Source Demand Routing: Packet Format and Forwarding Specification {Version 1)
RFC1941 Frequently Asked Questions for Schools
RFC1942 HTML Tables
RFC1943 Building an X 500 Directory Service in the US
RFC1944 Benchmarking Methodology for Network Interconnect Devices
RFC1945 Hypenext Transfer Protocol-- HTTP/1 0
RFC1946 Native ATM Suppon for ST2+
RFC1947 Greek Character Encoding for Electronic Mail Messages
RFC1948 Defending Against Sequence Number Attacks
RFC1949 Scalable Multicast Key Distribution
RFC1950 ZLIB Compressed Data Format Specification version 3 3
RFC1951 DEFLATE Compressed Data Format Specification version 1 3
RFC1952 GZIP file format specification version 4 3
RFC1953 Ipsilon Flow Management Protocol Specification for 1Pv4 Version 1 0
RFC1954 Transmission of Flow Labelled 1Pv4 on ATM Data Links Ipsilon Version 1 0
RFC1955 New Scheme for Internet Routing and Addressing (EN CAPS) for IPNG
RFC1956 Registration in the MIL Domain
RFC1957 Some Observations on Implementations of the Post Office Protocol (POP3)
RFC1958 Architectural Principles of the Internet
RFC1959 An LDAP URL Format
RFC1960 A String Representation ofLDAP Search Filters
RFC1961 GSS-API Authentication Method for SOCKS Version 5
RFC1962 The PPP Compression Control Protocol (CCP)
RFC1963 PPP Serial Data Transpon Protocol (SDTP)
RFC1964 The Kerberos Version 5 GSS-API Mechanism
RFC1965 Autonomous System Confederations for BGP
RFC1966 BGP Route Reflection An alternative to full mesh IBGP
RFC1967 PPP LZS-DCP Compression Protocol (LZS-DCP)
RFC1968 The PPP Encryption Control Protocol (ECP)
RFC1969 The PPP DES Encryption Protocol (DESE)
RFC1970 Neighbor Discovery for IP Version 6 (1Pv6)
RFC1971 1Pv6 Stateless Address Autoconfiguration
RFC1972 A Method for the Transmission of1Pv6 Packets over Ethernet Networks
RFC1973 PPP in Frame Relay
RFC1974 PPP Stac LZS Compression Protocol
RFC1975 PPP Magnalink Variable Resource Compression
RFC1976 PPP for Data Compression in Data Circuit-Terminating Equipment (DCE)
RFC1977 PPP BSD Compression Protocol
RFC1978 PPP Predictor Compression Protocol
RFC1979 PPP Deflate Protocol
RFC1980 A Proposed Extension to HTML: Client-Side Image Maps
RFC1981 Path MTU Discovery for IP version 6
RFC1982 Serial Number Arithmetic
RFC1983 Internet Users' Glossary
RFC1984 lAB and IESG Statement on Cryptographic Technology and the Internet
RFC1985 SMTP Service Extension for Remote Message Queue Staning
RFC1986 Experiments with a Simple File Transfer Protocol for Radio Links using Enhanced
Trivial File Transfer Protocol (ETFTP)

RFC's 1875
RFCI987 Ipsilon's General Switch Management Protocol Specification Version I I
RFCI988 Conditional Grant of Rights to Specific Hewlett-Packard Patents In Conjunction
With the Internet Engineering Task Force's Internet-Standard Network Manage-
ment Framework
RFCI989 PPP Link Quality Monitoring
RFCI990 The PPP Multilink Protocol
RFCI99I PGP Message Exchange Formats
RFCI992 The Nimrod Routing Architecture
RFCI993 PPP Gandalf FZA Compression Protocol
RFCI994 PPP Challenge Handshake Authentication Protocol (CHAP)
RFCI995 Incremental Zone Transfer in DNS
RFCI996 A Mechanism for Prompt Notification of Zone Changes
RFCI997 BGP Communities Attribute
RFCI998 An Application of the BGP Community Attribute in Multi-home Routing
RFCI999 Request for Comments Summary RFC Numbers I900-I999
RFC2000 INTERNET OFFICIAL PROTOCOL STANDARDS
RFC200I TCP Slow Start, Congestion Avoidance, Fast Retransmit, and Fast
RFC2002 IP Mobility Support
RFC2003 IP Encapsulation within IP
RFC2004 Minimal Encapsulation within IP
RFC2005 Applicability Statement for IP Mobility Support
RFC2006 The Definitions of Managed Objects for IP Mobility Support using SMiv2
RFC2007 Catalogue of Network Training Materials
RFC2008 Implications ofVarious Address Allocation Policies for Internet Routing
RFC2009 GPS-Based Addressing and Routing
RFC20IO Operational Criteria for Root Name Servers
RFC2011 SNMPv2 Management Information Base for the Internet Protocol using SMiv2
RFC20I2 SNMPv2 Management Information Base for the Transmission Control Protocol
usingSMiv2
RFC2013 SNMPv2 Management Information Base for the User Datagram Protocol using
SMiv2
RFC20I4 IRTF Research Group Guidelines and Procedures
RFC20I5 MIME Security with Pretty Good Privacy (PGP)
RFC20I6 Uniform Resource Agents (URAs)
RFC20I7 Definition of the URL MIME External-Body Access-Type
RFC20I8 TCP Selective Acknowledgement Options
RFC20I9 Transmission ofiPv6 Packets Over FDDI
RFC2020 IEEE 802 I2 Interface MIB
RFC202I Remote Network Monitoring Management Information Base Version2 using
SMiv2
RFC2022 Support for Multicast over UNI 3 0/3 I based ATM Networks
RFC2023 IP Version 6 over PPP
RFC2024 Definitions of Managed Objects for Data Link Switching using SMiv2
RFC2025 The Simple Public-Key GSS-API Mechanism (SPKM)
RFC2026 The Internet Standards Process -- Revision 3
RFC2027 lAB and IESG Selection, Confirmation, and Recall Process: Operation of the
Nominating and Recall Committees
RFC2028 The Organizations Involved in the IETF Standards Process
RFC2029 RTP Payload Format of Sun's CellB Video Encoding
RFC2030 Simple Network Time Protocol (SNTP)
RFC203I IETF-ISOC relationship
RFC2032 RTP Payload Format for H 26I Video Streams

1876 Handbook of Data Communications and Networks


RFC2033 Local Mail Transfer Protocol
RFC2034 SMTP Service Extension for Returning Enhanced Error Codes
RFC2035 RTP Payload Format for }PEG-compressed Video
RFC2036 Observations on the use of Components of the Class A Address Space within the
Internet
RFC2037 Entity MIB using SMiv2
RFC2038 RTP Payload Format for MPEG1/MPEG2 Video
RFC2039 Applicability of Standards Track MIBs to Management ofWorld Wide Web Serv-
ers
RFC2040 The RCS, RCS-CBC, RCS-CBC-Pad, and RCS-CTS Algorithms
RFC2041 Mobile Network Tracing
RFC2042 Registering New BGP Attribute Types
RFC2043 The PPP SNA Control Protocol (SNACP)
RFC2044 UTF-8, a transformation format of Unicode and ISO 10646
RFC2045 Multipurpose Internet Mail Extensions (MIME) Part One: Format oflnternet Mes-
sage Bodies
RFC2046 Multipurpose Internet Mail Extensions (MIME) Part Two: Media Types
RFC2047 MIME {Multipurpose Internet Mail Extensions) Part Three: Message Header Ex-
tensions for Non-ASCII Text
RFC2048 Multipurpose Internet Mail Extension (MIME) Part Four: Registration Procedures
RFC2049 Multipurpose Internet Mail Extensions {MIME) Part Five: Conformance Criteria
and Examples
RFC2050 INTERNET REGISTRY IP ALLOCATION GUIDELINES
RFC2051 Definitions of Managed Objects for APPC using SMiv2
RFC2052 A DNS RR for specifying the location of services (DNS SRV)
RFC2053 The AM (Armenia) Domain
RFC2054 WebNFS Client Specification
RFC2055 WebNFS Server Specification
RFC2056 Uniform Resource Locators for Z39 50
RFC2057 Source Directed Access Control on the Internet
RFC2058 Remote Authentication Dial In User Service (RADIUS)
RFC2059 RADIUS Accounting
RFC2060 INTERNET MESSAGE ACCESS PROTOCOL- VERSION 4rev1
RFC2061 IMAP4 COMPATIBILITY WITH IMAP2BIS
RFC2062 Internet Message Access Protocol - Obsolete Syntax
RFC2063 Traffic Flow Measurement: Architecture
RFC2064 Traffic Flow Measurement: Meter MIB
RFC2065 Domain Name System Security Extensions
RFC2066 TELNET CHARSET Option
RFC2067 IP over HIPPI
RFC2068 Hypertext Transfer Protocol-- HTTP/1 1
RFC2069 An Extension to HTTP: Digest Access Authentication
RFC2070 Internationalization of the Hypertext Markup Language
RFC2071 Network Renumbering Overview: Why would I want it and what is it anyway?
RFC2072 Router Renumbering Guide
RFC2073 An 1Pv6 Provider-Based Unicast Address Format
RFC2074 Remote Network Monitoring MIB Protocol Identifiers
RFC2075 IP Echo Host Service
RFC2076 Common Internet Message Headers
RFC2077 The Model Primary Content Type for Multipurpose Internet Mail Extensions
RFC2078 Generic Security Service Application Program Interface, Version2
RFC2079 Definition of an X 500 Attribute Type and an Object Class to Hold Uniform Re-

RFC's 1877
source Identifiers (URis)
RFC2080 RIPng for 1Pv6
RFC2081 RIPng Protocol Applicability Statement
RFC2082 RIP-2 MD5 Authentication
RFC2083 PNG (Portable Network Graphics) Specification
RFC2084 Considerations for Web Transaction Security
RFC2085 HMAC-MD5 IP Authentication with Replay Prevention
RFC2086 IMAP4 ACL extension
RFC2087 IMAP4 QUOTA extension
RFC2088 IMAP4 non-synchronizing literals
RFC2089 V2ToV1 Mapping SNMPv2 onto SNMPvl within a bi-lingual SNMP agent
RFC2090 TFTP Multicast Option
RFC2091 Triggered Extensions to RIP to Support Demand Circuits
RFC2092 Protocol Analysis for Triggered RIP
RFC2093 Group Key Management Protocol (GKMP) Specification
RFC2094 Group Key Management Protocol (GKMP) Architecture
RFC2095 IMAP/POP AUTHorize Extension for Simple Challenge/Response
RFC2096 IP Fotwarding Table MIB
RFC2097 The PPP NetBIOS Frames Control Protocol (NBFCP)
RFC2098 Toshiba's Router Architecture Extensions for ATM: Overview
RFC2099 Request for Comments Summary RFC Numbers2000-2099
RFC2100 The Naming of Hosts
RFC2101 1Pv4 Address Behavior Today
RFC2102 Multicast Support for Nimrod : Requirements and Solution Approaches
RFC2103 Mobility Support for Nimrod : Challenges and Solution Approaches
RFC2104 HMAC: Keyed-Hashing for Message Authentication
RFC2105 Cisco Systems' Tag Switching Architecture Overview
RFC2106 Data Link Switching Remote Access Protocol
RFC2107 Ascend Tunnel Management Protocol- ATMP
RFC2108 Definitions of Managed Objects for IEEE 802 3 Repeater Devices using SMiv2
RFC2109 HTTP State Management Mechanism
RFC2110 MIME E-mail Encapsulation of Aggregate Documents, such as HTML (MHTML)
RFC2111 Content-ID and Message-ID Uniform Resource Locators
RFC2112 The MIME Multipart/Related Content-type
RFC2113 IP Router Alert Option
RFC2114 Data Link Switching Client Access Protocol
RFC2115 Management Information Base for Frame Relay DTEs Using SMiv2
RFC2116 X 500 Implementations Catalog-96
RFC2117 Protocol Independent Multicast-Sparse Mode (PIM-SM): Protocol
RFC2118 Microsoft Point-To-Point Compression (MPPC) Protocol
RFC2119 Key words for use in RFCs to Indicate Requirement Level
RFC2120 Managing the X 500 Root Naming Context
RFC2121 Issues affecting MARS Cluster Size
RFC2122 VEMMI URL Specification
RFC2123 Traffic Flow Measurement: Experiences with NeTraMet
RFC2124 Cabletron's Light-weight Flow Admission Protocol Specification
RFC2125 The PPP Bandwidth Allocation Protocol (BAP) I The PPP Bandwidth Allocation
Control Protocol (BACP)
RFC2126 ISO Transport Service on top ofTCP (ITOD
RFC2127 ISDN Management Information Base using SMiv2
RFC2128 Dial Control Management Information Base using SMiv2
RFC2129 Toshiba's Flow Attribute Notification Protocol (FANP)

1878 Handbook of Data Communications and Networks


RFC2130 The Report of the lAB Character Set Workshop held29 February - 1 March, 1996
RFC2131 Dynamic Host Configuration Protocol
RFC2132 DHCP Options and BOOTP Vendor Extensions
RFC2133 Basic Socket Interface Extensions for Ipv6
RFC2134 Articles oflncorporation oflnternet Society
RFC2135 Internet Society By-Laws ISOC Board of Trustees
RFC2136 Dynamic Updates in the Domain Name System (DNS UPDATE)
RFC2137 Secure Domain Name System Dynamic Update
RFC2138 Remote Authentication Dial In User Service (RADIUS)
RFC2139 RADIUS Accounting
RFC2140 TCP Control Block Interdependence
RFC2141 URN Syntax
RFC2142 Mailbox Names for Common Services, Roles and Functions
RFC2143 Encapsulating IP with the Small Computer System Interface
RFC2145 Use and Interpretation of HTTP Version Numbers
RFC2146 US Government Internet Domain Names Federal Networking
RFC2147 TCP and UDP over IPv6 Jumbograms
RFC2148 Deployment of the Internet White Pages Service
RFC2149 Multicast Server Architectures for MARS-basedATM multicasting
RFC2150 Humanities and Arts: Sharing Center Stage on the Internet
RFC2151 A Primer On Internet and TCP/IP Tools and Utilities
RFC2152 UTF-7 A Mail-Safe Transformation Format of Unicode
RFC2153 PPP Vendor Extensions
RFC2154 OSPF with Digital Signatures
RFC2155 Definitions of Managed Objects for APPN using SMiv2
RFC2165 Service Location Protocol
RFC2166 APPN Implementer's Workshop Closed Pages Document DLSw v2 0 Enhance-
ments
RFC2167 Referral Whois (RWhois) Protocol V1 5
RFC2168 Resolution of Uniform Resource Identifiers using the Domain Name System
RFC2169 A Trivial Convention for using HTTP in URN Resolution
RFC2170 Application REQuested IP over ATM (AREQUIPA)
RFC2171 MAPOS- Multiple Access Protocol over SONET/SDH Version 1
RFC2172 MAPOS Version 1 Assigned Numbers
RFC2173 A MAPOS version 1 Extension -Node Switch Protocol
RFC2174 A MAPOS version 1 Extension - Switch-Switch Protocol
RFC2175 MAPOS 16- Multiple Access Protocol over SONET/SDH with 16 Bit Addressing
RFC2176 IPv4 over MAP OS Version 1
RFC2177 IMAP4 IDLE command
RFC2178 OSPF Version2
RFC2179 Network Security For Trade Shows
RFC2180 IMAP4 Multi-Accessed Mailbox Practice
RFC2181 Clarifications to the DNS Specification
RFC2182 Selection and Operation of Secondary DNS Servers
RFC2183 Communicating Presentation Information in Internet Messages: The Content-
Disposition Header Field
RFC2184 MIME Parameter Value and Encoded Word Extensions: Character Sets, Languages,
and Continuations
RFC2185 Routing Aspects ofiPv6 Transition
RFC2186 Internet Cache Protocol (ICP), version2
RFC2187 Application oflnternet Cache Protocol (ICP), version2
RFC2188 AT&T/Neda's Efficient Short Remote Operations (ESRO) Protocol Specification

RFC's 1879
Version 1 2
RFC2189 Core Based Trees (CBT version2) Multicast Routing
RFC2190 RTP Payload Format for H 263 Video Streams
RFC2191 VENUS- Very Extensive Non-Unicast Service
RFC2192 IMAP URL Scheme
RFC2193 IMAP4 Mailbox Referrals
RFC2194 Review of Roaming Implementations
RFC2195 IMAP/POP AUTHorize Extension for Simple Challenge/Response
RFC2196 Site Security Handbook
RFC2197 SMTP Service Extension for Command Pipelining
RFC2198 RTP Payload for Redundant Audio Data
RFC2200 INTERNET OFFICIAL PROTOCOL STANDARDS
RFC2201 Core Based Trees (CBT) Multicast Routing Architecture
RFC2202 Test Cases for HMAC-MD5 and HMAC-SHA-1
RFC2203 RPCSEC_GSS Protocol Specification
RFC2204 ODETTE File Transfer Protocol
RFC2205 Resource ReSerVation Protocol (RSVP) --Version 1 Functional Specification
RFC2206 RSVP Management Information Base using SMiv2
RFC2207 RSVP Extensions for IPSEC Data Flows
RFC2208 Resource ReSerVation Protocol (RSVP)-- Version 1 Applicability Statement Some
Guidelines on Deployment
RFC2209 Resource ReSerVation Protocol (RSVP)-- Version 1 Message Processing Rules
RFC2210 The Use of RSVP with IETF Integrated Services
RFC2211 Specification of the Controlled-Load Network Element Service
RFC2212 Specification of Guaranteed Quality of Service
RFC2213 Integrated Services Management Information Base using SMiv2
RFC2214 Integrated Services Management Information Base Guaranteed Service Extensions
using SMiv2
RFC2215 General Characterization Parameters for Integrated Service Network Elements
RFC2216 Network Element Service Specification Template
RFC2217 T elnet Com Port Control Option
RFC2218 A Common Schema for the Internet White Pages Service
RFC2219 Use ofDNS Aliases for Network Services
RFC2220 The Application/MARC Content-type
RFC2221 IMAP4 Login Referrals
RFC2222 Simple Authentication and Security Layer (SASL)
RFC2223 Instructions to RFC Authors
RFC2224 NFS URL Scheme
RFC2226 IP Broadcast over ATM Networks
RFC2227 Simple Hit-Metering and Usage-Limiting for HTTP
RFC2228 FTP Security Extensions
RFC2229 A Dictionary Server Protocol
RFC2230 Key Exchange Delegation Record for the DNS
RFC2231 MIME Parameter Value and Encoded Word Extensions: Character Sets, Languages,
and Continuations
RFC2232 Definitions of Managed Objects for DLUR using SMiv2
RFC2233 The Interfaces Group MIB using SMiv2
RFC2234 Augmented BNF for Syntax Specifications: ABNF
RFC2235 Hobbes' Internet Timeline
RFC2236 Internet Group Management Protocol, Version2
RFC2237 Japanese Character Encoding for Internet Messages
RFC2238 Definitions of Managed Objects for HPR using SMiv2

1880 Handbook of Data Communications and Networks


RFC2239 Definitions of Managed Objects for IEEE 802 3 Medium Attachment Units
(MADs) using SMiv2
RFC2240 A Legal Basis for Domain Name Allocation
RFC2241 DHCP Options for Novell Directory Services
RFC2242 NetWare/IP Domain Name and Information
RFC2243 OTP Extended Responses
RFC2244 ACAP -- Application Configuration Access Protocol
RFC2245 Anonymous SASL Mechanism
RFC2247 Using Domains in LDAP/X 500 Distinguished Names
RFC2248 Network Services Monitoring MIB
RFC2249 Mail Monitoring MIB
RFC2250 RTP Payload Format for MPEG 11MPEG2 Video
RFC2251 Lightweight Directory Access Protocol (v3)
RFC2252 Lightweight Directory Access Protocol (v3): Attribute Syntax Definitions
RFC2253 Lightweight Directory Access Protocol (v3): UTF-8 String Representation of Dis-
tinguished Names
RFC2254 The String Representation ofLDAP Search Filters
RFC2255 The LDAP URL Format
RFC2256 A Summary of the X 500(96) User Schema for use with LDAPv3
RFC2257 Agent Extensibiliry (AgentX) Protocol Version 1
RFC2258 Internet Nomenclator Project
RFC2259 Simple Nomenclator Query Protocol (SNQP)
RFC2260 Scalable Support for Multi-homed Multi-provider Connectivity
RFC2261 An Architecture for Describing SNMP Management Frameworks
RFC2262 Message Processing and Dispatching for the Simple Network Management Protocol
(SNMP)
RFC2263 SNMPv3 Applications
RFC2264 User-based Security Model (USM) for version 3 of the Simple Network Manage-
ment Protocol (SNMPv3)
RFC2265 View-based Access Control Model (VACM) for the Simple Network Management
Protocol (SNMP)
RFC2266 Definitions of Managed Objects for IEEE 802 12 Repeater Devices
RFC2267 Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP
Source Address Spoofing
RFC2268 A Description of the RC2(r) Encryption Algorithm
RFC2269 Using the MARS model in non-ATM NBMA networks
RFC2270 Using a Dedicated AS for Sites Homed to a Single Provider
RFC2271 An Architecture for Describing SNMP Management Frameworks
RFC2272 Message Processing and Dispatching for the Simple Network Management Protocol
(SNMP)
RFC2273 SNMPv3 Applications
RFC2274 User-based Security Model (USM) for version 3 of the Simple Network Manage-
ment Protocol (SNMPv3)
RFC2275 View-based Access Control Model (VACM) for the Simple Network Management
Protocol (SNMP)
RFC2276 Architectural Principles of Uniform Resource Name Resolution
RFC2277 IETF Policy on Character Sets and Languages
RFC2278 lANA Charset Registration Procedures
RFC2279 UTF-8, a transformation format ofiSO 10646
RFC2280 Routing Policy Specification Language (RPSL)
RFC2281 Cisco Hot Standby Router Protocol (HSRP)
RFC2282 lAB and IESG Selection, Confirmation, and Recall Process: Operation of the

RFC's 1881
Nominating and Recall Committees
RFC2283 Multiprotocol Extensions for BGP-4
RFC2284 PPP Extensible Authentication Protocol (EAP)
RFC2285 Benchmarking Terminology for LAN Switching Devices
RFC2286 Test Cases for HMAC-RIPEMD160 and HMAC-RIPEMD128
RFC2287 Definitions of System-Level Managed Objects for Applications
RFC2288 Using Existing Bibliographic Identifiers as Uniform Resource Names
RFC2289 A One-Time Password System
RFC2290 Mobile-IPv4 Configuration Option for PPP IPCP
RFC2291 Requirements for a Distributed Authoring and Versioning Protocol for the World
Wide Web
RFC2292 Advanced Sockets API for IPv6
RFC2293 Representing Tables and Subtrees in the X 500 Directory
RFC2294 Representing the 0/RAddress hierarchy in the X 500 Directory Information Tree
RFC2295 Transparent Content Negotiation in HTTP
RFC2296 HTTP Remote Variant Selection Algorithm -- RVSN1
RFC2297 Ipsilon's General Switch Management Protocol Specification Version2 0
RFC2298 An Extensible Message Format for Message Disposition Notifications
RFC2300 INTERNET OFFICIAL PROTOCOL STANDARDS
RFC2301 File Format for Internet Fax
RFC2302 Tag Image File Format (TIFF)- image/tiff MIME Sub-type Registration
RFC2303 Minimal PSTN address format in Internet Mail
RFC2304 Minimal FAX address format in Internet Mail
RFC2305 A Simple Mode of Facsimile Using Internet Mail
RFC2306 Tag Image File Format (TIFF)- F Profile for Facsimile
RFC2307 An Approach for Using LDAP as a Network Information Service
RFC2308 Negative Caching ofDNS Queries (DNS NCACHE)
RFC2309 Recommendations on Queue Management and Congestion Avoidance in the Inter-
net
RFC2310 The Safe Response Header Field
RFC2311 S/MIME Version2 Message Specification
RFC2312 S/MIME Version2 Certificate Handling
RFC2313 PKCS #1: RSA Encryption Version 1 5
RFC2314 PKCS #10: Certification Request Syntax Version 1 5
RFC2315 PKCS #7: Cryptographic Message Syntax Version 1 5
RFC2316 Report of the lAB Securiry Architecture Workshop
RFC2317 Classless IN-ADDRARPA delegation
RFC2318 The text!css Media Type
RFC2319 Ukrainian Character Set KOI8-U
RFC2320 Definitions of Managed Objects for Classical IP andARP Over ATM Using
SMiv2 (IPOA-MIB)
RFC2321 RITA-- The Reliable Internetwork Troubleshooting Agent
RFC2322 Management of IP numbers by peg-dhcp
RFC2323 IETF Identification and Securiry Guidelines
RFC2324 Hyper Text Coffee Pot Control Protocol (HTCPCP/1 0)
RFC2325 Definitions of Managed Objects for Drip-Type Heated Beverage Hardware Devices
usingSMiv2
RFC2326 Real Time Streaming Protocol (RTSP)
RFC2327 SDP: Session Description Protocol
RFC2328 OSPF Version2
RFC2329 OSPF Standardization Report
RFC2330 Framework for IP Performance Metrics

1882 Handbook of Data Communications and Networks


RFC2331 ATM Signalling Support for IP over ATM- UNI Signalling 4 0 Update
RFC2332 NBMA Next Hop Resolution Protocol (NHRP)
RFC2333 NHRP Protocol Applicability Statement
RFC2334 Server Cache Synchronization Protocol (SCSP)
RFC2335 A Distributed NHRP Service Using SCSP
RFC2336 Classical IP to NHRP Transition
RFC2337 Intra-LIS IP multicast among routers over ATM using Sparse Mode PIM
RFC2338 Virtual Router Redundancy Protocol
RFC2339 An agreement between the Internet Society, the IETF and Sun Microsystems, Inc
in the matter ofNFS V 4 protocols
RFC2340 Nortel's Virtual Network Switching (VNS) Overview
RFC2341 Cisco Layer Two Forwarding (Protocol) 'L2F'
RFC2342 IMAP4 Namespace
RFC2343 RTP Payload Format for Bundled MPEG
RFC2344 Reverse Tunneling for Mobile IP
RFC2345 Domain Names and Company Name Retrieval
RFC2346 Making Postscript and PDF International
RFC2347 TFTP Option Extension
RFC2348 TFTP Blocksize Option
RFC2349 TFTP Timeout Interval and Transfer Size Options
RFC2350 Expectations for Computer Security Incident Response
RFC2351 Mapping of Airline Reservation, Ticketing, and Messaging Traffic over IP
RFC2352 A Convention For Using Legal Names as Domain Names
RFC2353 APPN/HPR in IP Networks APPN Implementers' Workshop Closed Pages Docu-
ment
RFC2354 Options for Repair of Streaming Media
RFC2355 TN3270 Enhancements
RFC2356 Sun's SKIP Firewall Traversal for Mobile IP
RFC2357 IETF Criteria For Evaluating Reliable Multicast Transport and Application Proto-
cols
RFC2358 Definitions of Managed Objects for the Ethernet-like Interface Types
RFC2359 IMAP4 UIDPLUS extension
RFC2360 Guide for Internet Standards Writers
RFC2361 WAVE and AVI Codec Registries
RFC2362 Protocol Independent Multicast-Sparse Mode (PIM-SM): Protocol Specification
RFC2363 PPP Over FUNI
RFC2364 PPP over AAL5
RFC2365 Administratively Scoped IP Multicast
RFC2366 Definitions of Managed Objects for Multicast over UNI 3 0/3 1 based ATM Net-
works
RFC2367 PF_KEY Key Management API, Version2
RFC2368 The mailto URL scheme
RFC2369 The Use ofURLs as Meta-Syntax for Core Mail List Commands and their Trans-
port through Message Header Fields
RFC2370 The OSPF Opaque LSA Option
RFC2371 Transaction Internet Protocol Version 3 0
RFC2372 Transaction Internet Protocol - Requirements and Supplemental Information
RFC2373 IP Version 6 Addressing Architecture
RFC2374 An 1Pv6 Aggregatable Global Unicast Address Format
RFC2375 1Pv6 Multicast Address Assignments
RFC2376 XML Media Types
RFC2377 Naming Plan for Internet Directory-Enabled Applications

RFC's 1883
RFC2378 The CCSO Nameserver (Ph) Architecture
RFC2379 RSVP over ATM Implementation Guidelines
RFC2380 RSVP over ATM Implementation Requirements
RFC2381 Interoperation of Controlled-Load Service and Guaranteed Service with ATM
RFC2382 A Framework for Integrated Services and RSVP over ATM
RFC2383 ST2+ over ATM Protocol Specification- UNI 3 1 Version
RFC2384 POP URL Scheme
RFC2385 Protection of BGP Sessions via the TCP MD5 Signature Option
RFC2386 A Framework for QoS-based Routing in the Internet
RFC2387 The MIME Multipart/Related Content-type
RFC2388 Returning Values from Forms: multipart/form-data
RFC2389 Feature negotiation mechanism for the File Transfer Protocol
RFC2390 Inverse Address Resolution Protocol
RFC2391 Load Sharing using IP Network Address Translation (LSNAT)
RFC2392 Content-ID and Message-ID Uniform Resource Locators
RFC2396 Uniform Resource Identifiers (URI): Generic Syntax
RFC2397 The 'data' URL scheme
RFC2398 Some Testing Tools for TCP Implementors
RFC2400 INTERNET OFFICIAL PROTOCOL STANDARDS
RFC2401 Security Architecture for the Internet Protocol
RFC2402 IP Authentication Header
RFC2410 The NULL Encryption Algorithm and Its Use With IPsec
RFC2411 IP Security Document Roadmap
RFC2413 Dublin Core Metadata for Resource Discovery
RFC2414 Increasing TCP's Initial Window
RFC2415 Simulation Studies of Increased Initial TCP Window Size
RFC2416 When TCP Starts Up With Four Packets Into Only Three Buffers
RFC2417 Definitions of Managed Objects for Multicast over UNI 3 0/3 1 based ATM Net-
works
RFC2418 IETF Working Group Guidelines and Procedures
RFC2419 The PPP DES Encryption Protocol, Version2 (DESE-bis)
RFC2420 The PPP Triple-DES Encryption Protocol (3DESE)
RFC2421 Voice Profile for Internet Mail - version2
RFC2422 Toll Quality Voice- 32 kbit/s ADPCM MIME Sub-type Registration
RFC2423 VPIM Voice Message MIME Sub-type Registration
RFC2424 Content Duration MIME Header Definition
RFC2425 A MIME Content-Type for Directory Information
RFC2426 vCard MIME Directory Profile
RFC2427 Multiprotocol Interconnect over Frame Relay
RFC2428 FTP Extensions for IPv6 and NATs
RFC2429 RTP Payload Format for the 1998 Version ofiTU-T Rec H 263 Video (H 263+)
RFC2430 A Provider Architecture for Differentiated Services and Traffic Engineering
(PASTE)
RFC2431 RTP Payload Format for BT 656 Video Encoding
RFC2432 Terminology for IP Multicast Benchmarking
RFC2433 Microsoft PPP CHAP Extensions
RFC2434 Guidelines for Writing an lANA Considerations Section in RFCs
RFC2435 RTP Payload Format for ]PEG-compressed Video
RFC2436 Collaboration between ISOC/IETF and ITU-T
RFC2437 PKCS #1: RSA Cryptography Specifications Version2 0
RFC2438 Advancement ofMIB specifications on the IETF Standards Track
RFC2439 BGP Route Flap Damping

1884 Handbook of Data Communications and Networks


RFC2440 OpenPGP Message Format
RFC2442 The Batch SMTP Media Type
RFC2443 A Distributed MARS Service Using SCSP
RFC2444 The One-Time-Password SASL Mechanism
RFC2445 Internet Calendaring and Scheduling Core Object Specification (iCalendar)
RFC2446 iCalendar Transport-Independent Interoperability Protocol (iTIP) Scheduling
Events, BusyTime, T o-dos and Journal Entries
RFC2449 POP3 Extension Mechanism
RFC2453 RIP Version2 Carrying Additional Information
RFC2455 Definitions of Managed Objects for APPN
RFC2456 Definitions of Managed Objects for APPN TRAPS
RFC2457 Definitions of Managed Objects for Extended Border Node
RFC2458 Toward the PSTN/Internet Inter-Networking --Pre-PINT Implementations
ooo the rest of the RFC index is contained on the disk.

Quick Guide
802o12-MIB RFC2020
80203-MIB RFC2108
802.5-MIB RFC1748
ABNF RFC2234
ACAP RFC2244
AGENTX RFC2257
APPN-MIB RFC2155
ARCH-SNMP RFC2271
ARP RFC26
ATM-ENCAP RFC83/1695/1755
BGP RFC177111745/1772/1657/1997/1269/1403
BOOTP RFC95112132
CLDAP RFC1798
CON-MD5 RFC1864
CONTENT RFC1049
DAA RFC2069
DASS RFC1507
DAYfiME RFC867
DC-MIB RFC2128
DECNET-MIB RFC1559
DHCP RFC213111534/2132/2241
DISCARD RFC863
DNS RFC2181/1886/1995/2163/974/2308/1996/1612/2065/161112136
DOMAIN RFC1034/1035
DSN RFC1894
ECHO RFC862
ENTITY-MIB RFC2037
ESP RFC1827
ETHER-MIB RFC1643
FDDI-MIB RFC1285/1512
FFIF RFC2301
FINGER RFC1288
FRAME-MIB RFC2115
FTP RFC959/2389/1415/2228
GQOS RFC2212

RFC's 1885
GSSAP RFC2078/1509/1964/ 1961
HOST-MIB RFC1514
HTML RFC1866/2070
HTTP-1.1 RFC2068/21 09
IARP RFC2390
ICMP RFC79211256/1885
IDENT RFC1413/1414
IGMP RFC2236/1112
IMAP RFC2086/ 1731/2177/2088/222112193/2342/2087
2359/2195/2192/2060
IP-ARC RFC1
IP-ARPA RFC22
IP-ATM RFC25
IP-FDDI RFC90
IP-FR RFC2427
IP-IEEE RFC42
IP-IPX RFC32
IP-NETBIOS RFC88
IPNG RFC1752
IP-SLIP RFC55
IP-SMDS RFC1209
IPV6 RFC1883/1826/197111972/2019/2147/1970/2023
IP RFC7/5611552/1234
ISDN-MIB RFC2127
IS-IS RFC1195
KERBEROS RFC1510
LDAP RFC2252/2253/1960/1959/2255/2251
MAIL RFC822/2249/2142
MHTML RFC2110
MIB RFC121211213/2011/2012/2013/1239
MIME RFC2045/2422/2049/1767/1847/2231/2046/2077
2047/2015/2387/1892/1848/2426/2421/2423
MOBILEIP RFC2005/2006/2002/2344
MODEM-MIB RFC1696
NETBIOS RFC100111002
NETFAX RFC1314
NETWAREIP RFC2242
NHRP RFC2332/2333/2335
NICNAME RFC954
NNTP RFC977
NTP RFC111911305
ONE-PASS RFC2289
OSI-NSAP RFC1629
OSI-UDP RFC1240
OSPF RFC2328/1793/2370/1850/1584/1587
PEM RFC1423/1422/1421/1424
POP3 RFC193911734/2384
ppp RFC1661/1662/147411473/1471/1472/ 2364/
1378/1638/1962/1994/1762/2284/1968/1973
2363/1332/1618/1570/1989/1990/2097/1377
2043/1619/1663/1598
QUOTE RFC865

1886 Handbook of Data Communications and Networks


RADIUS RFC2138
RARP RFC3
RIP RFC1723/1722/2082/1724/1582
RIPNG RFC2080/2091
RMON-MIB RFC2021/2074/1757
RPC RFC183112203
RPSL RFC2280
RREQ RFC1812
RSVP RFC2205/2208/2207/221 0/2206/2209
RTP RFC1889/1890/2029/2032/2035/2250/2198
RTSP RFC2326/2222
SDP RFC2327
SIP-MIB RFC1694
SLM-APP RFC2287
SLP RFC2165
SMFAX-IM RFC2305
SMI RFC115511902
SMTP RFC821/1870/1869/21971165211891/203411985
SNA RFC1982/2051/1666
SNMP RFC1157/1351/1419/1420/1381/1418/1353
135211441/1907/227311382/2274
SOCKSV5 RFC1928
SONET-MIB RFC1595
STR-LDAP RFC2254
TABLE-MIB RFC2096
TCP RFC793/2018/1323/2001
TELNET RFC854/855
TFTP RFC1350/2347/2348/2349
TIFF RFC2302
TIME RFC868
TIP RFC2371
TMUX RFC1692
TOS RFC1349
TP-TCP RFC1006
TRANS-IPV6 RFC1933
TRANS-MIB RFC1906
TXT-DIR RFC2425
UDP RFC768
UPS-MIB RFC1628
URI RFC2079/2396
URL RFC1738/1808/20 17/2368/ 2056
USERS RFC866
UTF-8 RFC2279
VRRP RFC2338
WHO IS++ RFC1835/1913/1914
X.500 RFC1777/1778/1567
X25-MIB RFC1461
XDR RFC1832

RFC's 1887
Ap9.1 Standards
Ap9.1.1 Standard Protocols Ordered by STD

Mnemonic Title RFC# STD#

Internet Official Protocol Standards 3003 1*


[Reserved for Assigned Numbers. See FRC 1700 and 2
RFC 3232]
Requirements for Internet Hosts - Communication 1122 3
Layers
Requirements for Internet Hosts - Application 1123 3
and Support
[Reserved for Router Requirements. See RFC1812 4
IP Internet Protocol 791 5
ICMP Internet Control Message Protocol 792 5
Broadcasting Internet Datagrams 919 5
Broadcasting Internet datagrams in the presence 922 5
of subnets
-------- Internet Standard Subnetting Procedure 950 5
IGMP Host extensions for IP multicasting 1112 5
UDP User Datagram Protocol 768 6
TCP Transmission Control Protocol 793 7
TELNET Telnet Protocol Specification 854 8
TELNET Telnet Option Specifications 855 8
FTP File Transfer Protocol 959 9
SMTP Simple Mail Transfer Protocol 821 10
SMTP-SIZE SMTP Service Extension for Message Size Declaration 1870 10
MAIL Standard for the format of ARPA Internet text 822 11
messages
[Reserved for Network Time Protocol (NTP) . See RFC 12
1305]
DOMAIN Domain names - concepts and facilities 1034 13
DOMAIN Domain names - implementation and specification 1035 13
[Was Mail Routing and the Domain System. 14
Now Historic.]
SNMP Simple Network Management Protocol (SNMP) 1157 15
SMI Structure and identification of management 1155 16
information for TCP/IP-based internets
Concise-MI Concise MIB definitions 1212 16
MIB-II Management Information Base for Network Management 1213 17
of TCP/IP-based internets:MIB-II
[Was Exterior Gateway Protocol (RFC 904) 18
Now Historic.]
NETBIOS Protocol standard for a NetBIOS service on 1001 19
a TCP/UDP transport: Concepts and methods
NETBIOS Protocol standard for a NetBIOS service on 1002 19
a TCP/UDP transport: Detailed specifications

ECHO Echo Protocol 862 20


DISCARD Discard Protocol 863 21
CHARGEN Character Generator Protocol 864 22
QUOTE Quote of the Day Protocol 865 23
USERS Active users 866 24
DAYTIME Daytime Protocol 867 25
TIME Time Protocol 868 26
TOPT-BIN Telnet Binary Transmission 856 27
TOPT-ECHO Telnet Echo Option 857 28
TOPT-SUPP Telnet Suppress Go Ahead Option 858 29
TOPT-STAT Telnet Status Option 859 30
TOPT-TIM Telnet Timing Mark Option 860 31
TOPT-EXTOP Telnet Extended Options: List Option 861 32

1888 Handbook of Data Communications and Networks


TFTP The TFTP Protocol (Revision 2) 1350 33
[Was Routing Information Protocol (RIP) . Replaced 34
by STD 56.]
TP-TCP ISO transport services on top of the TCP: 1006 35
Version 3
IP-FDDI Transmission of IP and ARP over FDDI Networks 1390 36
ARP Ethernet Address Resolution Protocol: Or converting 826 37
network protocol addresses to 48.bit Ethernet
address for transmission on Ethernet hardware
RARP Reverse Address Resolution Protocol 903 38
IP-ARPA [Was BBN Report 1822 (IMP/Host Interface). 39
Now Historic.]
IP-WB Host Access Protocol specification 907 40
IP-E Standard for the transmission of IP datagrams 894 41
over Ethernet networks
!P-EE Standard for the transmission of IP datagrams 895 42
over experimental Ethernet networks
IP-IEEE Standard for the transmission of IP datagrams 1042 43
over IEEE 802 networks
IP-DC DCN local-network protocols 891 44
IP-HC Internet Protocol on Network System's HYPERchannel: 1044 45
Protocol specification
IP-ARC Transmitting IP traffic over ARCNET networks 1201 46
IP-SLIP Nonstandard for transmission of IP datagrams 1055 47
over serial lines: SLIP
IP-NETBIOS Standard for the transmission of IP datagrams 1088 48
over NetBIOS networks
IP-IPX Standard for the transmission of 802.2 packets 1132 49
over IPX networks
ETHER-MIB Definitions of Managed Objects for the Ethernet- 1643 50
like Interface Types
PPP The Point-to-Point Protocol (PPP) 1661 51
PPP-HDLC PPP in HDLC-like Framing 1662 51
IP-SMDS Transmission of IP datagrams over the SMDS Service 1209 52
POP3 Post Office Protocol - Version 3 1939 53

OSPF2 OSPF Version 2 2328 54


IP-FR Multiprotocol Interconnect over Frame Relay 2427 55
RIP2 RIP Version 2 2453 56
RIP2-APP RIP Version 2 Protocol Applicability Statement 1722 57
SMiv2 Structure of Management Information Version 2578 58
2 (SMiv2)
CONV-MIB Textual Conventions for SMiv2 2579 58
CONF-MIB Conformance Statements for SMiv2 2580 58
RMON-MIB Remote Network Monitoring Management Information 2819 59
Base
SMTP-Pipe SMTP Service Extension for Command Pipelining 2920 60
ONE-PASS A One-Time Password System 2289 61

[Note: an asterisk at the end of a line indicates a change from the


previous edition of this document.]

Ap9.1.2 Standard Protocols Ordered by RFC


Mnemonic Title STD# RFC#

Internet Official Protocol Standards 1* 3003*


SMTP-Pipe SMTP Service Extension for Command Pipelining 60 2920
RMON-MIB Remote Network Monitoring Management Information 59 2819
Base
CONF-MIB Conformance Statements for SMiv2 58 2580
CONV-MIB Textual Conventions for SMiv2 58 2579
SMiv2 Structure of Management Information Version 58 2578
2 (SMiv2)

RFC's 1889
RIP2 RIP Version 2 56 2453
IP-FR Multiprotocol Interconnect over Frame Relay 55 2427
OSPF2 OSPF Version 2 54 2328
ONE-PASS A One-Time Password System 61 2289
POP3 Post Office Protocol - Version 3 53 1939
SMTP-SIZE SMTP Service Extension for Message Size Declaration 10 1870
RIP2-APP RIP Version 2 Protocol Applicability Statement 57 1722
PPP-HDLC PPP in HDLC-like Framing 51 1662
ppp The Point-to-Point Protocol {PPP) 51 1661
ETHER-MIB Definitions of Managed Objects for the Ethernet- so 1643
like Interface Types
IP-FDDI Transmission of IP and ARP over FDDI Networks 36 1390
TFTP The TFTP Protocol {Revision 2) 33 1350
MIB-II Management Information Base for Network Management 17 1213
of TCP/IP-based internets:MIB-II
Concise-MI Concise MIB definitions 16 1212
IP-SMDS Transmission of IP datagrams over the SMDS Service 52 1209
IP-ARC Transmitting IP traffic over ARCNET networks 46 1201
SNMP Simple Network Management Protocol {SNMP) 15 1157
SMI Structure and identification of management 16 1155
information for TCP/IP-based internets
IP-IPX Standard for the transmission of 802.2 packets 49 1132
over IPX networks
Requirements for Internet Hosts - Application 3 1123
and Support
Requirements for Internet Hosts - Communication 3 1122
Layers
IGMP Host extensions for IP multicasting 5 1112
IP-NETBIOS Standard for the transmission of IP datagrams 48 1088
over NetBIOS networks
IP-SLIP Nonstandard for transmission of IP datagrams 47 1055
over serial lines: SLIP
IP-HC Internet Protocol on Network System's HYPERchannel: 45 1044
Protocol specification
IP-IEEE Standard for the transmission of IP datagrams 43 1042
over IEEE 802 networks
DOMAIN Domain names - implementation and specification 13 1035
DOMAIN Domain names - concepts and facilities 13 1034
TP-TCP ISO transport services on top of the TCP: 35 1006
Version 3
NETBIOS Protocol standard for a NetBIOS service on 19 1002
a TCP/UDP transport: Detailed specifications
NETBIOS Protocol standard for a NetBIOS service on 19 1001
a TCP/UDP transport: Concepts and methods
FTP File Transfer Protocol 9 959
-------- Internet Standard Subnetting Procedure 5 950
--------- Broadcasting Internet datagrams in the presence 5 922
of subnets
--------- Broadcasting Internet Datagrams 5 919
IP-WB Host Access Protocol specification 40 907
RARP Reverse Address Resolution Protocol 38 903
IP-EE Standard for the transmission of IP datagrams 42 895
over experimental Ethernet networks
IP-E Standard for the transmission of IP datagrams 41 894
over Ethernet networks
IP-DC DCN local-network protocols 44 891
TIME Time Protocol 26 868
DAYTIME Daytime Protocol 25 867
USERS Active users 24 866
QUOTE Quote of the Day Protocol 23 865
CHARGEN Character Generator Protocol 22 864
DISCARD Discard Protocol 21 863
ECHO Echo Protocol 20 862
TOPT-EXTOP Telnet Extended Options: List Option 32 861

1890 Handbook of Data Communications and Networks


TOPT-TIM Telnet Timing Mark Option 31 860
TOPT-STAT Telnet Status Option 30 859
TOPT-SUPP Telnet Suppress Go Ahead Option 29 858
TOPT-ECHO Telnet Echo Option 28 857
TOPT-BIN Telnet Binary Transmission 27 856
TELNET Telnet Option Specifications 8 855
TELNET Telnet Protocol Specification 8 854
ARP Ethernet Address Resolution Protocol: Or converting 37 826
network protocol addresses to 48.bit Ethernet
address for transmission on Ethernet hardware
MAIL Standard for the format of ARPA Internet text 11 822
messages
SMTP Simple Mail Transfer Protocol 10 821
TCP Transmission Control Protocol 7 793
ICMP Internet Control Message Protocol 5 792
IP Internet Protocol 5 791
UDP User Datagram Protocol 6 768

Ap9.1.3 Draft Standard Protocols


Mnemonic Title RFC#

Content Language Headers 3282*


(Extensible Markup Language) XML-Signature 3275*
Syntax and Processing
MINFAX-IM Minimal FAX address format in Internet Mail 3192*
MIN-PSTN Minimal GSTN address format in Internet Mail 3191*
RADIUS Remote Authentication Dial In User Service (RADIUS) 2865
INTERGRMIB The Interfaces Group MIB 2863
-------- Host Resources MIB 2790
SNMP Definitions of Managed Objects for Extensible 2742*
SNMP Agents
Agent Extensibility (AgentX) Protocol Version 1 2741*
HTTP Authentication: Basic and Digest Access 2617
Authentication
HTTP Hypertext Transfer Protocol -- HTTP/1.1 2616
VACM-SNMP View-based Access Control Model (VACM) for 2575
the Simple Network Management Protocol (SNMP)
USM-SNMPV3 User-based Security Model (USM) for version 2574
3 of the Simple Network Management Protocol (SNMPv3)
SNMP-APP SNMP Applications 2573
MPD-SNMP Message Processing and Dispatching for the 2572
Simple Network Management Protocol (SNMP)
ARCH-SNMP An Architecture for Describing SNMP Management 2571
Frameworks
ICMPv6 Internet Control Message Protocol (ICMPv6) 2463
for the Internet Protocol Version 6 (IPv6)
Specification
IPV6-AUTO IPv6 Stateless Address Autoconfiguration 2462
IPV6-ND Neighbor Discovery for IP Version 6 (IPv6) 2461
IPV6 Internet Protocol, Version 6 (IPv6) Specification 2460
URI-GEN Uniform Resource Identifiers (URI): Generic Syntax 2396
IARP Inverse Address Resolution Protocol 2390
TN3270E TN3270 Enhancements 2355
TFTP-Opt TFTP Timeout Interval and Transfer Size Options 2349
TFTP-Blk TFTP Blocksize Option 2348
TFTP-Ext TFTP Option Extension 2347
UTF-8 UTF-8, a transformation format of ISO 10646 2279
DHCP-BOOTP DHCP Options and BOOTP Vendor Extensions 2132
DHCP Dynamic Host Configuration Protocol 2131
FRAME-MIB Management Information Base for Frame Relay 2115
DTEs Using SMiv2
IP-HIPPI IP over HIPPI 2067
MIME-CONF Multipurpose Internet Mail Extensions (MIME) 2049

RFC's 1891
Part Five: Conformance Criteria and Examples
MIME-MSG MIME (Multipurpose Internet Mail Extensions) 2047
Part Three: Message Header Extensions for
Non-ASCII Text
MIME-MEDIA Mu1tipurpose Internet Mail Extensions (MIME) 2046
Part Two: Media Types
MIME Multipurpose Internet Mail Extensions (MIME) 2045
Part One: Format of Internet Message Bodies
PPP-CHAP PPP Challenge Handshake Authentication Protocol (CHAP) 1994
PPP-MP The PPP Multilink Protocol (MP) 1990
PPP-LINK PPP Link Quality Monitoring 1989
SNMPv2-MIB Management Information Base for Version 2 1907
of the Simple Network Management Protocol (SNMPv2)
TRANS-MIB Transport Mappings for Version 2 of the Simple 1906
Network Management Protocol (SNMPv2)
OPS-MIB Protocol Operations for Version 2 of the Simple 1905
Network Management Protocol (SNMPv2)
CON-MD5 The Content-MD5 Header Field 1864
OSPF-MIB OSPF Version 2 Management Information Base 1850
XDR XDR: External Data Representation Standard 1832
-------- The String Representation of Standard Attribute 1778
Syntaxes
-------- Lightweight Directory Access Protocol 1777
BGP-4-APP Application of the Border Gateway Protocol 1772
in the Internet
BGP-4 A Border Gateway Protocol 4 (BGP-4) 1771
PPP-DNCP The PPP DECnet Phase IV Control Protocol (DNCP) 1762
802.5-MIB IEEE 802.5 MIB using SMiv2 1748
RIP2-MIB RIP Version 2 MIB Extension 1724
SIP-MIB Definitions of Managed Objects for SMDS Interfaces 1694
using SMiv2
-------- Definitions of Managed Objects for Parallel- 1660
printer-like Hardware Devices using SMiv2
-------- Definitions of Managed Objects for RS-232- 1659
like Hardware Devices using SMiv2
-------- Definitions of Managed Objects for Character 1658
Stream Devices using SMiv2
BGP-4-MIB Definitions of Managed Objects for the Fourth 1657
Version of the Border Gateway Protocol (BGP-
4) using SMiv2
-------- SMTP Service Extension for 8bit-MIMEtransport 1652
OSI-NSAP Guidelines for OSI NSAP Allocation in the Internet 1629
ISO-TS-ECH An Echo Function for CLNP (ISO 8473) 1575
DECNET-MIB DECnet Phase IV MIB Extensions 1559
-------- Clarifications and Extensions for the Bootstrap 1542
Protocol
DHCP-BOOTP Interoperation Between DHCP and BOOTP 1534
BRIDGE-MIB Definitions of Managed Objects for Bridges 1493

IP-X.25 Multiprotocol Interconnect on X.25 and ISDN 1356


in the Packet Mode
NTPV3 Network Time Protocol (Version 3) Specification, 1305
Implementation
FINGER The Finger User Information Protocol 1288
IP-MTU Path MTU discovery 1191
-------- Proposed Standard for the Transmission of 1188
IP Datagrams over FDDI Networks
TOPT-LINE Telnet Linemode Option 1184
NICNAME NICNAME/WHOIS 954
BOOTP Bootstrap Protocol 951

Ap9.1.4 Proposed Standard Protocols


Mnemonic Title RFC#

1892 Handbook of Data Communications and Networks


Session Description Protocol (SDP) Simple Capability 3407*
Declaration
NAPTR Dynamic Delegation Discovery System (DDDS) Part 3404*
Four: The Uniform Resource Identifiers (URI)
NAPTR Dynamic Delegation Discovery System (DDDS) Part 3403*
Three: The Domain Name System (DNS) Database
NAPTR Dynamic Delegation Discovery System (DDDS) Part 3402*
Two: The Algorithm
RMON-MIB Remote Network Monitoring MIB Protocol Identifier 3395*
Reference Extensions
Real-time Transport Protocol (RTP) Payload for 3389*
Comfort Noise (CN)
IPP-E-T Internet Printing Protocol (IPP): The •collection' 3382*
attribute syntax
IPP-E-T Internet Printing Protocol (IPP): Job Progress 3381*
Attributes
IPP-E-T Internet Printing Protocol (IPP): Job and Printer 3380*
Set Operations
Delegated Path Validation and Delegated Path Discovery 3379*
Protocol Requirements
Lightweight Directory Access Protocol (v3): Technical 3377*
Specification
IGMP Internet Group Management Protocol, Version 3 3376*
Layer Two Tunneling Protocol "L2TP" Management 3371*
Information Base
Cryptographic Message Syntax (CMS) Algorithms 3370*
Cryptographic Message Syntax (CMS) 3369*
The •go• URI Scheme for the Common Name Resolution 3368*
Protocol
Common Name Resolution Protocol (CNRP) 3367*
Real-time Facsimile (T.3B) - image/t38 MIME Sub- 3362*
type Registration
Dynamic Host Configuration Protocol (DHCP-for-IPv4) 3361*
Option for Session Initiation Protocol (SIP) Servers
Layer Two Tunnelling Protocol (L2TP) Over ATM 3355*
Adaptation Layer 5 (AAL5)
Small Computer Systems Interface protocol over 3347*
the Internet (iSCSI) Requirements and Design
Considerations
MOBILEIPSU IP Mobility Support for IPv4 3344*
-------- The Application Exchange (APEX) Option Party Pack, 3342*
Part Deux!
The Application Exchange (APEX) Access Service 3341*
The Application Exchange Core 3340*

Date and Time on the Internet: Timestamps 3339*


MIME-based Secure Peer-to-Peer Business Data 3335*
Interchange over the Internet
Signaling System 7 (SS7) Message Transfer Part 3332*
3 (MTP3) - User Adaptation Layer (M3UA)
Signaling System 7 (SS7) Message Transfer Part 3331*
2 (MTP2) - User Adaptation Layer
Integration of Resource Management and Session 3312*
Initiation Protocol (SIP)
The Session Initiation Protocol (SIP) UPDATE Method 3311*
Stream Control Transmission Protocol (SCTP) Checksum 3309*
Change
Allocation Guidelines for IPv6 Multicast Addresses 3307*
Unicast-Prefix-based IPv6 Multicast Addresses 3306*
TIFF Tag Image File Format (TIFF) - image/tiff MIME 3302*
Sub-type Registration
Layer Two Tunnelling Protocol (L2TP) : ATM access 3301*
network extensions

RFC's 1893
Content Negotiation for Messaging Services based 3297*
on Email
Named Subordinate References in Lightweight Directory 3296*
Access Protocol {LDAP} Directories
Definitions of Managed Objects for the General 3295*
Switch Management Protocol (GSMP}
General Switch Management Protocol (GSMP} Packet 3293*
Encapsulations for Asynchronous Transfer Mode
(ATM}, Ethernet and Transmission Control Protocol
(TCP}
General Switch Management Protocol (GSMP} V3 3292*
Textual Conventions for Internet Network Addresses 3291*
Management Information Base for the Differentiated 3289*
Services Architecture
Using the Simple Object Access Protocol (SOAP} 3288*
in Blocks Extensible Exchange Protocol (BEEP}
Remote Monitoring MIB Extensions for Differentiated 3287*
Services
The VCDIFF Generic Differencing and Compression 3284*
Data Format
An Internet Attribute Certificate Profile for 3281*
Authorization
Internet X.509 Public Key Infrastructure Certificate 3280*
and Certificate Revocation List (CRL} Profile
Algorithms and Identifiers for the Internet X.509 3279*
Public Key Infrastructure Certificate and
Certificate Revocation List (CRL} Profile
Definitions of Managed Objects for High Bit-Rate 3276*
DSL - 2nd generation (HDSL2} and Single-Pair
High-Speed Digital Subscriber Line (SHDSL} Lines
Processing
Compressed Data Content Type for Cryptographic 3274*
Message Syntax (CMS}
Remote Network Monitoring Management Information 3273*
Base for High Capacity Networks
Multi-Protocol Label Switching (MPLS} Support of 3270*
Differentiated Services
Advanced Encryption Standard (AES} Ciphersuites 3268*
for Transport Layer Security (TLS}
Real-Time Transport Protocol (RTP} Payload Format 3267*
and File Storage Format for the Adaptive Multi-
Rate (AMR} and Adaptive Multi-Rate Wideband
(AMR-WB} Audio Codecs
Support for IPv6 in Session Description Protocol 3266*
(SDP}
SIP Session Initiation Protocol (SIP}-Specific Event 3265*
Notification
SIP An Offer/Answer Model with Session Description 3264*
Protocol (SDP}
SIP Session Initiation Protocol (SIP} : Locating SIP 3263*
Servers
SIP Reliability of Provisional Responses in Session 3262*
Initiation Protocol (SIP}
SIP SIP: Session Initiation Protocol 3261*
The DOCSIS (Data-Over-Cable Service Interface 3256*
Specifications} Device Class DHCP (Dynamic Host
Configuration Protocol} Relay Agent Information
Sub-option
Extending Point-to-Point Protocol (PPP} over 3255*
Synchronous Optical NETwork/Synchronous Digital
Hierarchy (SONET/SDH} with virtual concatenation,
high order and low order payloads
Versioning Extensions to WebDAV (Web Distributed 3253*
Authoring and Versioning}

1894 Handbook of Data Communications and Networks


FFIF Tag Image File Format Fax eXtended (TIFF-FX) - 3250*
image/tiff-fx MIME Sub-type Registration
An Expedited Forwarding PHB (Per-Hop Behavior) 3246*
RObust Header Compression (ROHC) : A Link-Layer 3242*
Assisted Profile for IP/UDP/RTP
Robust Header Compression (ROHC) over PPP 3241*
Definitions of Managed Objects for Scheduling 3231*
Management Operations
Instance Digests in HTTP 3230*
Delta encoding in HTTP 3229*
DNSSEC and IPv6 A6 aware server/resolver message 3226*
size requirements
Indicating Resolver Support of DNSSEC 3225*
SLP Vendor Extensions for Service Location Protocol, 3224*
Version 2
Telephony Routing over IP (TRIP) 3219*
LSP Modification Using CR-LDP 3214*
Constraint-Based LSP Setup using LDP 3212*
RSVP-TE: Extensions to RSVP for LSP Tunnels 3209*
SMTP Service Extension for Secure SMTP over Transport 3207*
Layer Security
The SYS and AUTH POP Response Codes 3206*
MIME media types for !SUP and QSIG Objects 3204*
Definitions of Managed Objects for Frame Relay 3202*
Service Level Definitions
Definitions of Managed Objects for Circuit to 3201*
Interface Translation
Reliable Delivery for syslog 3195*
Securing L2TP using IPsec 3193*
RTP Payload Format for 12-bit DAT Audio and 20- 3190*
and 24-bit Linear Sampled Audio
RTP Payload Format for DV (IEC 61834) Video 3189*
Reuse of CMS Content Encryption Keys 3185
Identity Representation for RSVP 3182*
Signaled Preemption Priority Policy Element 3181*
Aggregation of RSVP for IPv4 and IPv6 Reservations 3175
IPCOMP IP Payload Compression Protocol (IPComp) 3173
The Addition of Explicit Congestion Notification 3168
(ECN) to IP
Definitions of Managed Objects for the Delegation 3165
of Management Scripts
RADIUS and IPv6 3162
TSA Internet X.509 Public Key Infrastructure Time-Stamp 3161
Protocol (TSP)
PIB Structure of Policy Provisioning Information (SPPI) 3159
MIME-PGP MIME Security with OpenPGP 3156
PPP Multiplexing 3153
Transmission of IPv6 Packets over IEEE 1394 Networks 3146
L2TP Disconnect Cause Information 3145
Remote Monitoring MIB Extensions for Interface 3144
Parameters Monitoring
Per Hop Behavior Identification Codes 3140
The Congestion Manager 3124
Extensions to IPv6 Neighbor Discovery for Inverse 3122
Discovery Specification
A More Loss-Tolerant RTP Payload Format for MP3 Audio 3119
Authentication for DHCP Messages 3118
Mobile IP Vendor/Organization-Specific Extensions 3115

Service Location Protocol Modifications for IPv6 3111


RSA/SHA-1 SIGs and RSA KEYs in the Domain Name 3110
System (DNS)
Conventions for the use of the Session Description 3108
Protocol (SDP) for ATM Bearer Connections

RFC's 1895
SDP Carrying Label Information in BGP-4 3107
RSVP RSVP Cryptographic Authentication Updated Message 3097
Type Value
RObust Header Compression (ROHC) : Framework and 3095
four profiles
DNS Security Extension Clarification on Zone Status 3090
COPS-PR COPS Usage for Policy Provisioning (COPS-PR) 3084
Mapping the BEEP Core onto TCP 3081
BEEP The Blocks Extensible Exchange Protocol Core 3080
A Link-Layer Tunneling Mechanism for Unidirectional 3077
Links
DHC Load Balancing Algorithm 3074
L2TP-FR Layer Two Tunneling Protocol (L2TP) over Frame Relay 3070
An Anycast Prefix for 6to4 Relay Routers 3068
BGP-ASC Autonomous System Confederations for BGP 3065
LDAP Password Modify Extended Operation 3062
CIM Policy Core Information Model -- Version 1 3060
Specification
SLPv2 Attribute List Extension for the Service Location 3059
Protocol
ISDN Q.921-User Adaptation Layer 3057
Connection of IPv6 Domains via IPv4 Clouds 3056
Management Information Base for the PINT Services 3055
Architecture
TN3270E Service Location and Session Balancing 3049
RTP Payload Format for ITU-T Recommendation G.722.1 3047
DHCP Relay Agent Information Option 3046
Enhancing TCP's Loss Recovery Using Limited Transmit 3042
Privacy Extensions for Stateless Address 3041
Autoconfiguration in IPv6
Internet X.509 Public Key Infrastructure Qualified 3039
Certificates Profile
VCID Notification over ATM link for LDP 3038
LDP Specification 3036
MPLS using LDP and ATM VC Switching 3035
Use of Label Switching on Frame Relay Networks 3034
Specification
The Assignment of the Information Field and Protocol 3033
Identifier in the Q.2941 Generic Identifier
and Q.2957 User-to-user Signaling for the
Internet Protocol
MPLS Label Stack Encoding 3032
MPLS Multiprotocol Label Switching Architecture 3031
SMTP Service Extensions for Transmission of Large 3030
and Binary MIME Messages
Sieve: A Mail Filtering Language 3028
Reverse Tunneling for Mobile IP, revised 3024
XML Media Types 3023
Using 31-Bit Prefixes on IPv4 Point-to-Point Links 3021
Definitions of Managed Objects for Monitoring and 3020
Controlling the UNI/NNI Multilink Frame Relay
Function
IP Version 6 Management Information Base for The 3019
Multicast Listener Discovery Protocol
XML DTD for Roaming Access Phone Book 3017
RTP Payload Format for MPEG-4 Audio/Visual Streams 3016
MEGA CO Megaco Protocol Version 1.0 3015
Notification Log MIB 3014
Mobile IPv4 Challenge/Response Extensions 3012
The IPv4 Subnet Selection Option for DHCP 3011
NFSv4 NFS version 4 Protocol 3010
Registration of parityfec MIME types 3009
DNSSEC Domain Name System Security (DNSSEC) Signing Authority 3008
Secure Domain Name System (DNS) Dynamic Update 3007

1896 Handbook of Data Communications and Networks


Integrated Services in the Presence of Compressible 3006
Flows
The User Class Option for DHCP 3004
The audio/mpeg Media Type 3003
Specification of the Null Service Type 2997
Format of the RSVP DCLASS Object 2996
Computing TCP's Retransmission Timer 2988
Registration of Charset and Languages Media Features 2987
Tags
Use of the CAST-128 Encryption Algorithm in CMS 2984
Distributed Management Expression MIB 2982
Event MIB 2981
The SIP INFO Method 2976
IMAP4 ID extension 2971
HTTP State Management Mechanism 2965
RSVP Refresh OVerhead Reduction Extensions 2961
Stream Control Transmission Protocol 2960
Real-Time Transport Protocol Management Information 2959
Base
Definitions of Managed Objects for Monitoring and 2955
Controlling the Frame Relay/ATM PVC Service
Interworking Function
FR-MIB Definitions of Managed Objects for Frame Relay Service 2954
Telnet Encryption: CAST-128 64 bit Cipher Feedback 2950
Telnet Encryption: CAST-128 64 bit Output Feedback 2949
Telnet Encryption: DES3 64 bit Output Feedback 2948
Telnet Encryption: DES3 64 bit Cipher Feedback 2947
Telnet Data Encryption Option 2946
The SRP Authentication and Key Exchange System 2945
Telnet Authentication: SRP 2944
TELNET Authentication Using DSA 2943
Telnet Authentication: Kerberos Version 5 2942
TOPT-AUTH Telnet Authentication Option 2941
Definitions of Managed Objects for Common Open 2940
Policy Service (COPS) Protocol Clients
Identifying Composite Media Features 2938
The Name Service Search Option for DHCP 2937
IOTP-HTTP Internet Open Trading Protocol (IOTP) HTTP Supplement 2935
Internet Group Management Protocol MIB 2933
IPv4 Multicast Routing MIB 2932
DNS Request and Transaction Signatures ( SIG(O)s 2931
TKEY-RR Secret Key Establishment for DNS (TKEY RR) 2930
Definitions of Managed Objects for Remote Ping, 2925
Traceroute, and Lookup Operations
List-Id: A Structured Field and Namespace for the 2919
Identification of Mailing Lists
Route Refresh Capability for BGP-4 2918
E.164 number and DNS 2916
MIME Content Types in Media Feature Expressions 2913
Indicating Media Features for MIME Content 2912
IPP-M-S Internet Printing Protocol/1.1: Model and Semantics 2911
IPP-E-T Internet Printing Protocol/1.1: Encoding and Transport 2910
MADCAP Multicast Scope Nesting State Option 2907
RMON-MIB Remote Network Monitoring MIB Protocol Identifier 2895
Reference
Router Renumbering for IPv6 2894
TRANS-IPV6 Transition Mechanisms for IPv6 Hosts and Routers 2893
LDAP Control Extension for Server Side Sorting 2891
of Search Results
Key and Sequence Number Extensions to GRE 2890
SACK An Extension to the Selective Acknowledgement (SACK) 2883
Option for TCP
Content Feature Schema for Internet Fax (V2) 2879
PPP-BCP PPP Bridging Control Protocol (BCP) 2878

RFC's 1897
Diffie-Hellman Proof-of-Possession Algorithms 2875
TCP Processing of the IPv4 Precedence Field 2873
Application and Sub Application Identity Policy 2872
Element for Use with RSVP
The Inverted Stack Table Extension to the Interfaces 2864
Group MIB
RTP Payload Format for Real-Time Pointers 2862
MEXT-BGP4 Multiprotocol Extensions for BGP-4 2858
The Use of HMAC-RIPEMD-160-96 within ESP and AH 2857
Textual Conventions for Additional High Capacity 2856
Data Types
DHCP for IEEE 1394 2855
Generic Security Service API Version 2 : Java Bindings 2853
Deliver By SMTP Service Extension 2852
LDIF The LDAP Data Interchange Format (LDIF) - Technical 2849
Specification
The PINT Service Protocol: Extensions to SIP and 2848
SDP for IP Access to Telephone Call Services
LIP KEY LIPKEY - A Low Infrastructure Public Key Mechanism 2847
Using SPKM
GSTN Address Element Extensions in E-mail Services 2846
TSIG Secret Key Transaction Authentication for DNS (TSIG) 2845
Capabilities Advertisement with BGP-4 2842
Definitions of Managed Objects for the Fabric Element 2837
in Fibre Channel Standard
GSN IP and ARP over HIPPI-6400 (GSN) 2835
ARP and IP Broadcast over HIPPI-800 2834
RTP Payload for DTMF Digits, Telephony Tones and 2833
Telephony Signals
Using Digest Authentication as a SASL Mechanism 2831
LDAP Lightweight Directory Access Protocol (v3): Extension 2830
for Transport Layer Security
Authentication Methods for LDAP 2829
MAIL Internet Message Format 2822*
SMTP Simple Mail Transfer Protocol 2821*
Integrated Service Mappings on IEEE 802 Networks 2815
SBM (Subnet Bandwidth Manager) : A Protocol for 2814
RSVP-based Admission Control over IEEE 802-
style networks
URLs for Telephone Calls 2806
Certificate Management Messages over CMS 2797
BGP Route Reflection - An Alternative to Full Mesh 2796
IBGP
Mobile IP Network Access Identifier Extension for IPv4 2794
RTP Payload for Text Conversation 2793
Mail Monitoring MIB 2789
Network Services Monitoring MIB 2788
Definitions of Managed Objects for the Virtual 2787
Router Redundancy Protocol
GRE Generic Routing Encapsulation (GRE) 2784
DNS-SRV A DNS RR for specifying the location of services 2782
(DNS SRV)
MZAP Multicast-Scope Zone Announcement Protocol (MZAP) 2776
RPSL Routing Policy System Replication 2769
NAT-PT Network Address Translation - Protocol Translation 2766
(NAT-PT)
SIIT Stateless IP/ICMP Translation Algorithm (SIIT) 2765
RSVP Extensions for Policy Control 2750
COPS usage for RSVP 2749

COPS The COPS (Common Open Policy Service) Protocol 2748


RSVP Cryptographic Authentication 2747
RSVP Operation Over IP Tunnels 2746
RSVP Diagnostic Messages 2745

1898 Handbook of Data Communications and Networks


Generic Security Service API Version 2 : C-bindings 2744
Generic Security Service Application Program Interface 2743
Version 2, Update 1
OSPF for IPv6 2740
Calendar Attributes for vCard and LDAP 2739
Corrections to "A Syntax for Describing Media Feature 2738
Sets"
Entity MIB (Version 2) 2737
NHRP Support for Virtual Private Networks 2735
IPv4 over IEEE 1394 2734
An RTP Payload Format for Generic Forward Error 2733
Correction
Format for Literal IPv6 Addresses in URL's 2732
MADCAP Multicast Address Dynamic Client Allocation Protocol 2730
(MADCAP)
The Transmission of IP Over the Vertical Blanking 2728
Interval of a Television Signal
PGP Authentication for RIPE Database Updates 2726
Routing Policy System Security 2725
Traffic Flow Measurement: Meter MIB 2720
TLS Addition of Kerberos Cipher Suites to Transport 2712
Layer Security (TLS)
IPv6 Router Alert Option 2711
MLD-IPv6 Multicast Listener Discovery (MLD) for IPv6 2710
Integrated Services Mappings for Low Speed Networks 2688
PPP in a Real-time Oriented HDLC-like Framing 2687
The Multi-Class Extension to Multi-Link PPP 2686
VPNI Virtual Private Networks Identifier 2685
Multiprotocol Encapsulation over ATM Adaptation 2684
Layer 5
A Round-trip Delay Metric for !PPM 2681
A One-way Packet Loss Metric for !PPM 2680
A One-way Delay Metric for !PPM 2679
!PPM-MET !PPM Metrics for Measuring Connectivity 2678
NHRP-MIB Definitions of Managed Objects for the NBMA Next 2677
Hop Resolution Protocol (NHRP)
IPv6 Jumbograms 2675
Definitions of Managed Objects for Bridges with 2674
Traffic Classes, Multicast Filtering and Virtual
LAN Extensions
Non-Terminal DNS Name Redirection 2672
EDNSO Extension Mechanisms for DNS (EDNSO) 2671
Radio Frequency (RF) Interface Management Information 2670
Base for MCNS/DOCSIS compliant RF interfaces
DOCSIS Cable Device MIB Cable Device Management 2669
Information Base for DOCSIS compliant Cable
Modems and Cable Modem Termination Systems
MAU-MIB Definitions of Managed Objects for IEEE 802.3 Medium 2668
Attachment Units (MAUs)
IP Tunnel MIB 2667
Definitions of Managed Objects for the Ethernet- 2665
like Interface Types
Definitions of Managed Objects for the ADSL Lines 2662
L2TP Layer Two Tunneling Protocol "L2TP" 2661
RTP Payload Format for PureVoice(tm) Audio 2658
CIP Transport Protocols 2653
MIME Object Definitions for the Common Indexing 2652
Protocol (CIP)
CIP The Architecture of the Common Indexing Protocol (CIP) 2651
The Text/Plain Format Parameter 2646
ODMR-SMTP ON-DEMAND MAIL RELAY (ODMR) SMTP with Dynamic IP 2645
Addresses
Internationalization of the File Transfer Protocol 2640
Enhanced Security Services for S/MIME 2634

RFC's 1899
S/MIME Version 3 Message Specification 2633
S/MIME Version 3 Certificate Handling 2632
Diffie-Hellman Key Agreement Method 2631
IP and ARP over Fibre Channel 2625
NFS Version 2 and Version 3 Security Issues and 2623
the NFS Protocol's Use of RPCSEC_GSS and Kerberos
V5
RPSL Routing Policy Specification Language (RPSL) 2622
RADIUS Authentication Server MIB 2619
RADIUS Authentication Client MIB 2618
PPP over SONET/SDH 2615
Remote Network Monitoring MIB Extensions for Switched 2613
Networks Version 1.0
DHCP Options for Service Location Protocol 2610
Service Templates and Service: Schemes 2609
Directory Server Monitoring MIB 2605
ILMI-Based Server Discovery for NHRP 2603
ILMI-Based Server Discovery for MARS 2602
ILMI-Based Server Discovery for ATMARP 2601
An Expedited Forwarding PHB 2598
Assured Forwarding PHB Group 2597
Use of Language Codes in LDAP 2596
Using TLS with IMAP, POP3 and ACAP 2595
Definitions of Managed Objects for WWW Services 2594
Transmission of IPv6 Packets over Frame Relay Networks 2590
Specification
LDAPv3 Lightweight Directory Access Protocol (v3): Extensions 2589
for Dynamic Directory Services

Internet X.509 Public Key Infrastructure LDAPv2 Schema 2587


Internet X.509 Public Key Infrastructure Operational 2585
Protocols: FTP and HTTP
Definitions of Managed Objects for APPN/HPR in 2584
IP Networks
TCP-CC TCP Congestion Control 2581
SNMP Coexistence between Version 1, Version 2, and Version 2576
3 of the Internet-standard Network Management
Framework
APP-MIB Application Management MIB 2564
DHCP Option to Disable Stateless Auto-Configuration 2563
in IPv4 Clients
TN2370E-RT Definitions of Protocol and Managed Objects for 2562
TN3270E Response Time Collection Using SMiv2
(TN3270E-RT-MIB)
Base Definitions of Managed Objects for TN3270E 2561
Using SMiv2
PKIX X.509 Internet Public Key Infrastructure Online 2560
Certificate Status Protocol - OCSP
Internet X.509 Public Key Infrastructure Operational 2559
Protocols - LDAPv2
Definitions of Managed Objects for the SONET/SDH 2558
Interface Type
MHTML MIME Encapsulation of Aggregate Documents, such 2557
as HTML (MHTML)
SMTP Service Extension for Authentication 2554
Use of BGP-4 Multiprotocol Extensions for IPv6 2545
Inter-Domain Routing
DHK-DNS Storage of Diffie-Hellman Keys in the Domain Name 2539
System (DNS)
SC-DNS Storing Certificates in the Domain Name System (DNS) 2538
DSA KEYs and SIGs in the Domain Name System (DNS) 2536
DNS-SECEXT Domain Name System Security Extensions 2535
Media Features for Display, Print, and Fax 2534
A Syntax for Describing Media Feature Sets 2533

1900 Handbook of Data Communications and Networks


Extended Facsimile Using Internet Mail 2532
Indicating Supported Media Features Using Extensions 2530
to DSN and MDN
Transmission of IPv6 over IPv4 Domains without 2529
Explicit Tunnels
Reserved IPv6 Subnet Anycast Addresses 2526
WEBDAV HTTP Extensions for Distributed Authoring -- WEBDAV 2518
ATM-MIBMAN Definitions of Managed Objects for ATM Management 2515
ATM-TC-OID Definitions of Textual Conventions and 2514
OBJECT-IDENTITIES for ATM Management
Managed Objects for Controlling the Collection 2513
and Storage of Accounting Information for
Connection-Oriented Networks
Accounting Information for ATM Networks 2512
X.509-CRMF Internet X.509 Certificate Request Message Format 2511
PKICMP Internet X.509 Public Key Infrastructure Certificate 2510
Management Protocols
IPCOM-PPP IP Header Compression over PPP 2509
Compressing IP/UDP/RTP Headers for Low-Speed Serial 2508
Links
IP Header Compression 2507
Transmission of IPv6 Packets over ARCnet Networks 2497
DS3-E3-MIB Definitions of Managed Object for the DS3/E3 Interface 2496
Type
Definitions of Managed Objects for the DS1, E1, 2495
DS2 and E2 Interface Types
Definitions of Managed Objects for the DSO and 2494
DSO Bundle Interface Type
Textual Conventions for MIB Modules Using Performance 2493
History Based on 15 Minute Intervals
IPv6ATMNET IPv6 over ATM Networks 2492
IPv6-NBMA IPv6 over Non-Broadcast Multiple Access {NBMA) 2491
networks
NAI The Network Access Identifier 2486
DHCP Option for The Open Group's User Authentication 2485
Protocol
PPP LCP Internationalization Configuration Option 2484
Gateways and MIME Security Multiparts 2480
The Simple and Protected GSS-API Negotiation Mechanism 2478
Message Submission 2476
Definition of the Differentiated Services Field 2474
{DS Field) in the IPv4 and IPv6 Headers
Generic Packet Tunneling in IPv6 Specification 2473
IPv6-PPP IP Version 6 over PPP 2472
Transmission of IPv6 Packets over Token Ring Networks 2470
Transmission of IPv6 Packets over FDDI Networks 2467
ICMPv6-MIB Management Information Base for IP Version 6: ICMPv6 2466
Group
Management Information Base for IP Version 6: Textual 2465
Conventions and General Group
Transmission of IPv6 Packets over Ethernet Networks 2464
EBN-MIB Definitions of Managed Objects for Extended Border 2457
Node
Definitions of Managed Objects for APPN TRAPS 2456
APPN-MIB Definitions of Managed Objects for APPN 2455
IP Version 6 Management Information Base for the 2454
User Datagram Protocol
IP Version 6 Management Information Base for the 2452
Transmission Control Protocol
The ESP CBC-Mode Cipher Algorithms 2451
POP3-EXT POP3 Extension Mechanism 2449
IMIP iCalendar Message-Based Interoperability Protocol 2447
{iMIP)
!TIP iCalendar Transport-Independent Interoperability 2446

RFC's 1901
Protocol (iTIP) Scheduling Events, BusyTime,
To-dos and Journal Entries
I CALENDAR Internet Calendaring and Scheduling Core Object 2445
Specification (iCalendar)
OTP-SASL The One-Time-Password SASL Mechanism 2444
OpenPGP Message Format 2440
BGP Route Flap Damping 2439
RTP Payload Format for JPEG-compressed Video 2435
RTP Payload Format for BT.656 Video Encoding 2431
RTP Payload Format for the 1998 Version of ITU- 2429
T Rec. H.263 Video (H.263+)
FTP Extensions for IPv6 and NATs 2428
MIME-VCARD vcard MIME Directory Profile 2426
TXT-DIR A MIME Content-Type for Directory Information 2425
CONT-DUR Content Duration MIME Header Definition 2424
MIME-VPIM VPIM Voice Message MIME Sub-type Registration 2423
MIME-ADPCM Toll Quality Voice - 32 kbit/s ADPCM MIME Sub-type 2422
Registration
MIME-VP2 Voice Profile for Internet Mail - version 2 2421
3DESE The PPP Triple-DES Encryption Protocol (3DESE) 2420
DESE-bis The PPP DES Encryption Protocol, Version 2 (DESE-bis) 2419
Definitions of Managed Objects for Multicast over 2417
UNI 3.0/3.1 based ATM Networks
The NULL Encryption Algorithm and Its Use With IPsec 2410
IKE The Internet Key Exchange (IKE) 2409
ISAKMP Internet Security Association and Key Management 2408
Protocol (ISAKMP)
ISAKMPSEC The Internet IP Security Domain of Interpretation 2407
for ISAKMP
ESP IP Encapsulating Security Payload (ESP) 2406
ESPDES-CBC The ESP DES-CBC Cipher Algorithm With Explicit IV 2405
-------- The Use of HMAC-SHA-1-96 within ESP and AH 2404
The Use of HMAC-MD5-96 within ESP and AH 2403
IP-AUTH IP Authentication Header 2402
IPSEC Security Architecture for the Internet Protocol 2401
DATA-URL The "data" URL scheme 2397
CIDMID-URL Content-ID and Message-ID Uniform Resource Locators 2392
Feature negotiation mechanism for the File Transfer 2389
Protocol
-------- Returning Values from Forms: multipart/form-data 2388
MIME-RELAT The MIME Multipart/Related Content-type 2387
-------- Protection of BGP Sessions via the TCP MD5 Signature 2385
Option
POP-URL POP URL Scheme 2384
-------- Interoperation of Controlled-Load Service and 2381
Guaranteed Service with ATM
-------- RSVP over ATM Implementation Requirements 2380
-------- An IPv6 Aggregatable Global Unicast Address Format 2374
-------- IP Version 6 Addressing Architecture 2373
TIPV3 Transaction Internet Protocol Version 3.0 2371
OSPF-LSA The OSPF Opaque LSA Option 2370
-------- The Use of URLs as Meta-Syntax for Core Mail List 2369
Commands and their Transport through Message
Header Fields
URLMAILTO The mailto URL scheme 2368
PPP-AAL PPP Over AAL5 2364
PPP-FUNI PPP Over FUNI 2363
IMAP4UIDPL IMAP4 UIDPLUS extension 2359
IMAP4NAME IMAP4 Namespace 2342
VRRP Virtual Router Redundancy Protocol 2338
NHRP-SCSP A Distributed NHRP Service Using SCSP 2335
SCSP Server Cache Synchronization Protocol (SCSP) 2334
-------- NHRP Protocol Applicability Statement 2333
NHRP NBMA Next Hop Resolution Protocol (NHRP) 2332

1902 Handbook of Data Communications and Networks


UNI-SIG ATM Signalling Support for IP over ATM - UN! 2331
Signalling 4.0 Update
SDP SDP: Session Description Protocol 2327
RTSP Real Time Streaming Protocol (RTSP) 2326
IPOA-MIB Definitions of Managed Objects for Classical IP 2320
and ARP Over ATM Using SMiv2 (IPOA-MIB)
DNS-NCACHE Negative Caching of DNS Queries (DNS NCACHE) 2308
SMFAX-IM A Simple Mode of Facsimile Using Internet Mail 2305
FFIF File Format for Internet Fax 2301
EMF-MDN An Extensible Message Format for Message Disposition 2298
Notifications
OR-ADD Representing the 0/R Address hierarchy in the X.500 2294
Directory Information Tree
SUB TABLE Representing Tables and Subtrees in the X.500 2293
Directory
Mobile-IPv4 Configuration Option for PPP !PCP 2290
SLM-APP Definitions of System-Level Managed Objects for 2287
Applications
PPP-EAP PPP Extensible Authentication Protocol (EAP) 2284
Definitions of Managed Objects for IEEE 802.12 2266
Repeater Devices
A Summary of the X.500(96) User Schema for use 2256
with LDAPv3
LDAP-URL The LDAP URL Format 2255
STR-LDAP The String Representation of LDAP Search Filters 2254
LDAP3-UTF8 Lightweight Directory Access Protocol (v3): UTF- 2253
8 String Representation of Distinguished Names
LDAP3-ATD Lightweight Directory Access Protocol (v3): Attribute 2252
Syntax Definitions
LDAPV3 Lightweight Directory Access Protocol (v3) 2251
RTP-MPEG RTP Payload Format for MPEG1/MPEG2 Video 2250
Using Domains in LDAP/X.500 Distinguished Names 2247
The TLS Protocol Version 1.0 2246
SASL-ANON Anonymous SASL Mechanism 2245
ACAP ACAP -- Application Configuration Access Protocol 2244
OTP-ER OTP Extended Responses 2243
NETWAREIP NetWare/IP Domain Name and Information 2242
DHCP-NDS DHCP Options for Novell Directory Services 2241
HPR-MIB Definitions of Managed Objects for HPR using SMiv2 2238
ABNF Augmented BNF for Syntax Specifications: ABNF 2234
DLUR-MIB Definitions of Managed Objects for DLUR using SMiv2 2232
MIME-EXT MIME Parameter Value and Encoded Word Extensions: 2231
Character Sets, Languages, and Continuations
FTPSECEXT FTP Security Extensions 2228
Simple Hit-Metering and Usage-Limiting for HTTP 2227
IP Broadcast over ATM Networks 2226
IP-ATM Classical IP and ARP over ATM 2225
SASL Simple Authentication and Security Layer (SASL) 2222
IMAP4LOGIN IMAP4 Login Referrals 2221
A Common Schema for the Internet White Pages Service 2218
General Characterization Parameters for Integrated 2215
Service Network Elements
Integrated Services Management Information Base 2214
Guaranteed Service Extensions using SMiv2
Integrated Services Management Information Base 2213
using SMiv2
GQOS Specification of Guaranteed Quality of Service 2212
Specification of the Controlled-Load Network Element 2211
Service
RSVP-IS The Use of RSVP with IETF Integrated Services 2210
RSVP-IPSEC RSVP Extensions for IPSEC Data Flows 2207
RSVP-MIB RSVP Management Information Base using SMiv2 2206
RSVP Resource ReSerVation Protocol (RSVP) -- Version 2205
1 Functional Specification

RFC's 1903
RPCSEC-GSS RPCSEC_GSS Protocol Specification 2203
RTP-RAD RTP Payload for Redundant Audio Data 2198
IMAPPOPAU IMAP/POP AUTHorize Extension for Simple 2195
Challenge/Response
IMAP4MAIL IMAP4 Mailbox Referrals 2193
IMAP-URL IMAP URL Scheme 2192
--------- RTP Payload Format for H.263 Video Streams 2190
--------- Communicating Presentation Information in Internet 2183
Messages: The Content-Disposition Header Field
DNS-CLAR Clarifications to the DNS Specification 2181
IMAP4-IDLE IMAP4 IDLE command 2177
SLP Service Location Protocol 2165
Use of an X.500/LDAP directory to support MIXER 2164
address mapping
DNS-MCGAM Using the Internet DNS to Distribute MIXER Conformant 2163
Global Address Mapping (MCGAM)
Carrying PostScript in X.400 and MIME 2160
A MIME Body Part for FAX 2159
X.400 Image Body Parts 2158
Mapping between X.400 and RFC 822/MIME Message Bodies 2157
MIXER MIXER (Mime Internet X.400 Enhanced Relay): Mapping 2156
between X.400 and RFC 822/MIME
MAIL-SERV Mailbox Names for Common Services, Roles and Functions 2142
URN-SYNTAX URN Syntax 2141
DNS-UPDATE Dynamic Updates in the Domain Name System (DNS UPDATE) 2136
DC-MIB Dial Control Management Information Base using SMiv2 2128
ISDN-MIB ISDN Management Information Base using SMiv2 2127
ITOT ISO Transport Service on top of TCP (ITOT) 2126
BAP-BACP The PPP Bandwidth Allocation Protocol (BAP) I The 2125
PPP Bandwidth Allocation Control Protocol (BACP)
VEMMI-URL VEMMI URL Specification 2122
ROUT-ALERT IP Router Alert Option 2113
802.3-MIB Definitions of Managed Objects for IEEE 802.3 Repeater 2108
Devices using SMiv2
PPP-NBFCP The PPP NetBIOS Frames Control Protocol (NBFCP) 2097
TABLE-MIB IP Forwarding Table MIB 2096
RIP-TRIG Triggered Extensions to RIP to Support Demand Circuits 2091
IMAP4-LIT IMAP4 non-synchronizing literals 2088
IMAP4-QUO IMAP4 QUOTA extension 2087
IMAP4-ACL IMAP4 ACL extension 2086
HMAC-MD5 HMAC-MD5 IP Authentication with Replay Prevention 2085
RIP2-MD5 RIP-2 MD5 Authentication 2082
RIPNG-IPV6 RIPng for IPv6 2080
URI-ATT Definition of an X.500 Attribute Type and an Object 2079
Class to Hold Uniform Resource Identifiers (URis)
MIME-MODEL The Model Primary Content Type for Multipurpose 2077
Internet Mail Extensions
IMAPV4 Internet Message Access Protocol - Version 4rev1 2060
URLZ39.50 Uniform Resource Locators for Z39.50 2056
SNANAU-APP Definitions of Managed Objects for APPC using SMiv2 2051
PPP-SNACP The PPP SNA Control Protocol (SNACP) 2043
SMTP-ENH SMTP Service Extension for Returning Enhanced Error 2034
Codes
RTP-H.261 RTP Payload Format for H.261 Video Streams 2032
RTP-CELLB RTP Payload Format of Sun's CellB Video Encoding 2029
SPKM The Simple Public-Key GSS-API Mechanism (SPKM) 2025
DLSW-MIB Definitions of Managed Objects for Data Link Switching 2024
using SMiv2
MULTI-UNI Support for Multicast over UNI 3.0/3.1 based ATM 2022
Networks
RMON-MIB Remote Network Monitoring Management Information 2021
Base Version 2 using SMiv2
802.12-MIB IEEE 802.12 Interface MIB 2020
TCP-ACK TCP Selective Acknowledgement Options 2018

1904 Handbook of Data Communications and Networks


URL-ACC Definition of the URL MIME External-Body Access-Type 2017
MIME-PGP MIME Security with Pretty Good Privacy (PGP) 2015
MIB-UDP SNMPv2 Management Information Base for the User 2013
Datagram Protocol using SMiv2
MIB-TCP SNMPv2 Management Information Base for the 2012
Transmission Control Protocol using SMiv2
MIB-IP SNMPv2 Management Information Base for the Internet 2011
Protocol using SMiv2
MOBILEIPMI The Definitions of Managed Objects for IP Mobility 2006
Support using SMiv2
-------- Applicability Statement for IP Mobility Support 2005
MINI-IP Minimal Encapsulation within IP 2004
IPENCAPIP IP Encapsulation within IP 2003
BGP-COMM BGP Communities Attribute 1997
DNS-NOTIFY A Mechanism for Prompt Notification of Zone Changes 1996
(DNS NOTIFY)
DNS-IZT Incremental Zone Transfer in DNS 1995
SMTP-ETRN SMTP Service Extension for Remote Message Queue 1985
Starting
SNA Serial Number Arithmetic 1982
MTU-IPV6 Path MTU Discovery for IP version 6 1981
PPP-FRAME PPP in Frame Relay 1973
PPP-ECP The PPP Encryption Control Protocol (ECP) 1968
GSSAPI-KER The Kerberos Version 5 GSS-API Mechanism 1964
PPP-CCP The PPP Compression Control Protocol (CCP) 1962
GSSAPI-SOC GSS-API Authentication Method for SOCKS Version 5 1961
AUTH-SOCKS Username/Password Authentication for SOCKS V5 1929
SOCKSV5 SOCKS Protocol Version 5 1928
WHOIS++M How to Interact with a Whois++ Mesh 1914
WHOIS++A Architecture of the Whois++ Index Service 1913
DSN An Extensible Message Format for Delivery Status 1894
Notifications
EMS-CODE Enhanced Mail System Status Codes 1893
MIME-RPT The Multipart/Report Content Type for the Reporting 1892
of Mail System Administrative Messages
SMTP-DSN SMTP Service Extension for Delivery Status 1891
Notifications
RTP-AV RTP Profile for Audio and Video Conferences with 1890
Minimal Control
RTP RTP: A Transport Protocol for Real-Time Applications 1889
DNS-IPV6 DNS Extensions to support IP version 6 1886
MIME-Sec MIME Object Security Services 1848
MIME-Encyp Security Multiparts for MIME: Multipart/Signed 1847
and Multipart/Encrypted
WHOIS++ Architecture of the WHOIS++ service 1835
Binding Protocols for ONC RPC Version 2 1833
RPC RPC: Remote Procedure Call Protocol Specification 1831
Version 2
The ESP DES-CBC Transform 1829
IP Authentication using Keyed MD5 1828
Requirements for IP Version 4 Routers 1812
URL Relative Uniform Resource Locators 1808
CLDAP Connection-less Lightweight X.500 Directory Access 1798
Protocol
OSPF-DC Extending OSPF to Support Demand Circuits 1793
OSI-Dir Using the OSI Directory to Achieve User Friendly 1781
Naming
MIME-ED! MIME Encapsulation of ED! Objects 1767
XNSCP The PPP XNS IDP Control Protocol (XNSCP) 1764
BVCP The PPP Banyan Vines Control Protocol (BVCP) 1763
Print-MIB Printer MIB 1759
ATM ATM Signaling Support for IP over ATM 1755
IPNG The Recommendation for the IP Next Generation Protocol 1752
802.5-SSR IEEE 802.5 Station Source Routing MIB using SMiv2 1749

RFC's 1905
SDLCSMiv2 Definitions of Managed Objects for SNA Data Link 1747
Control {SDLC) using SMiv2
AT-MIB AppleTalk Management Information Base II 1742
MacMIME MIME Encapsulation of Macintosh Files - MacMIME 1740
URL Uniform Resource Locators {URL) 1738
POP3-AUTH POP3 AUTHentication command 1734
IMAP4-AUTH IMAP4 Authentication Mechanisms 1731
RDBMS-MIB Relational Database Management System {RDBMS) 1697
Management Information Base {MIB) using SMiv2
MODEM-MIB Modem Management Information Base {MIB) using SMiv2 1696
TMUX Transport Multiplexing Protocol {TMux) 1692
SNANAU-MIB Definitions of Managed Objects for SNA NAUs using 1666
SMiv2
PPP-TRANS PPP Reliable Transmission 1663
Postmaster Convention for X.400 Operations 1648
UPS-MIB UPS Management Information Base 1628
PPP-ISDN PPP over ISDN 1618
PPP-X25 PPP in X.25 1598
OSPF-NSSA The OSPF NSSA Option 1587
OSPF-Multi Multicast Extensions to OSPF 1584
RIP-DC Extensions to RIP to Support Demand Circuits 1582
TOPT-ENVIR Telnet Environment Option 1572
PPP-LCP PPP LCP Extensions 1570
CIPX Compressing IPX Headers Over WAN Media {CIPX) 1553
IPXCP The PPP Internetworking Packet Exchange Control 1552
Protocol {IPXCP)
SRB-MIB Definitions of Managed Objects for Source Routing 1525
Bridges
CIDR-STRA Classless Inter-Domain Routing (CIDR) : an Address 1519
Assignment and Aggregation Strategy
CIDR-ARCH An Architecture for IP Address Allocation with CIDR 1518
CIDR Applicability Statement for the Implementation 1517
of Classless Inter-Domain Routing (CIDR)
Definitions of Managed Objects for IEEE 802.3 Medium 1515
Attachment Units (MAUs)
Token Ring Extensions to the Remote Network Monitoring 1513
MIB
FDDI-MIB FDDI Management Information Base 1512
KERBEROS The Kerberos Network Authentication Service (V5) 1510
X.400 Use of Extended Character Sets 1502
HARPOON Rules for downgrading messages from X.400/88 to 1496
X.400/84 when MIME content-types are present
in the messages
Equiv Equivalences between 1988 X.400 and RFC 822 Message 1494
Bodies
IDPR Inter-Domain Policy Routing Protocol Specification: 1479
Version 1
IDPR-ARCH An Architecture for Inter-Domain Policy Routing 1478
PPP/Bridge The Definitions of Managed Objects for the Bridge 1474
Network Control Protocol of the Point-to-Point
Protocol
PPP/IPMIB The Definitions of Managed Objects for the IP Network 1473
Control Protocol of the Point-to-Point Protocol
PPP/SECMIB The Definitions of Managed Objects for the Security 1472
Protocols of the Point-to-Point Protocol
PPP/LCPMIB The Definitions of Managed Objects for the Link 1471
Control Protocol of the Point-to-Point Protocol
IP-TR-MC IP Multicast over Token-Ring Local Area Networks 1469
X25-MIB SNMP MIB extension for Multiprotocol Interconnect 1461
over X.25
SNMPv2 Introduction to version 2 of the Internet-standard 1441
Network Management Framework
PEM-KEY Privacy Enhancement for Internet Electronic Mail: 1424
Part IV

1906 Handbook of Data Communications and Networks


PEM-ALG Privacy Enhancement for Internet Electronic Mail: 1423
Part III
PEM-CKM Privacy Enhancement for Internet Electronic Mail: 1422
Part II
PEM-ENC Privacy Enhancement for Internet Electronic Mail: 1421
Part I
SNMP-IPX SNMP over IPX 1420
SNMP-AT SNMP over AppleTalk 1419
SNMP-OSI SNMP over OSI 1418
FTP FTP-FTAM Gateway Specification 1415
IDENT-MIB Identification MIB 1414
I DENT Identification Protocol 1413
Default Route Advertisement In BGP2 and BGP3 Version 1397
of The Border Gateway Protocol
SNMP-X.25 SNMP MIB Extension for the X.25 Packet Layer 1382
SNMP-LAPB SNMP MIB Extension for X.25 LAPB 1381
PPP-ATCP The PPP AppleTalk Control Protocol (ATCP} 1378
PPP-OSINLC The PPP OSI Network Layer Control Protocol (OSINLCP} 1377
TOPT-RFC Telnet Remote Flow Control Option 1372
Applicability Statement for OSPF 1370
PPP-IPCP The PPP Internet Protocol Control Protocol (!PCP} 1332
X.400 1988 to 1984 downgrading 1328
TCP-EXT TCP Extensions for High Performance 1323
NETFAX A File Format for the Exchange of Images in the 1314
Internet
FDDI-MIB FDDI Management Information Base 1285
Encoding Network Addresses to Support Operation 1277
over Non-OSI Lower Layers
Replication and Distributed Operations extensions 1276
to provide an Internet Directory using X.500
The COSINE and Internet X.500 Schema 1274
BGP-MIB Definitions of Managed Objects for the Border Gateway 1269
Protocol: Version 3
ICMP-ROUT ICMP Router Discovery Messages 1256
STD-MIBs Reassignment of experimental MIBs to standard MIBs 1239
IPX-IP Tunneling IPX traffic through IP networks 1234
IS-IS Use of OSI IS-IS for routing in TCP/IP and dual 1195
environments
IP-CMPRS Compressing TCP/IP headers for low-speed serial links 1144
TOPT-XDL Telnet X display location option 1096
TOPT-TERM Telnet terminal-type option 1091
TOPT-TS Telnet terminal speed option 1079
TOPT-NAWS Telnet window size option 1073
TOPT-X.3 Telnet X.3 PAD option 1053
TOPT-DATA Telnet Data Entry Terminal option: DODIIS 1043
implementation
TOPT-3270 Telnet 3270 regime option 1041
NNTP Network News Transfer Protocol 977
TOPT-TLN Telnet terminal location number option 946
TOPT-OM Output marking Telnet option 933
TOPT-TACAC TACACS user identification Telnet option 927
TOPT-EOR Telnet end of record option 885
TOPT-SNDL Telnet send-location option 779
TOPT-SUPO Telnet SUPDUP-Output option 749
TOPT-SUP Telnet SUPDUP option 736
TOPT-BYTE Revised Telnet byte macro option 735

TOPT-LOGO Telnet logout option 727


TOPT-REM Remote Controlled Transmission and Echoing Telnet 726
option
TOPT-EXT Telnet extended ASCII option 698

[Note: an asterisk at the end of a line indicates a change from the


previous edition of this document.]

RFC's 1907
Ap9.1.5 Best Current Practice by BCP
Mnemonic Title RFC# BCP#

Best Current Practices 1818 1


Addendum to RFC 1602 -- Variance Procedure 1871 2
Variance for The PPP Compression Control Protocol 1915 3
and The PPP Encryption Control Protocol
An Appeal to the Internet Community to Return 1917 4
Unused IP Networks (Prefixes) to the IANA
Address Allocation for Private Internets 1918 5
Guidelines for creation, selection, and 1930 6
registration of an Autonomous System (AS)
Implications of Various Address Allocation 2008 7
Policies for Internet Routing
IRTF Research Group Guidelines and Procedures 2014 8
The Internet Standards Process -- Revision 3 2026 9
IAB and IESG Selection, Confirmation, and Recall 2727 10
Process: Operation of the Nominating and Recall
Committees
The Organizations Involved in the IETF Standards 2028 11
Process
Internet Registry IP Allocation Guidelines 2050 12
Multipurpose Internet Mail Extensions (MIME) Part 2048 13
Four: Registration Procedures
Key words for use in RFCs to Indicate Requirement 2119 14
Levels
Deployment of the Internet White Pages Service 2148 15
Selection and Operation of Secondary DNS Servers 2182 16
Use of DNS Aliases for Network Services 2219 17
IETF Policy on Character Sets and Languages 2277 18
IANA Charset Registration Procedures 2978 19
Classless IN-ADDR.ARPA delegation 2317 20
Expectations for Computer Security Incident 2350 21
Response
Guide for Internet Standards Writers 2360 22
Administratively Scoped IP Multicast 2365 23
RSVP over ATM Implementation Guidelines 2379 24
IETF Working Group Guidelines and Procedures 2418 25
Guidelines for Writing an IANA Considerations 2434 26
Section in RFCs
Advancement of MIB specifications on the IETF 2438 27
Standards Track
Enhancing TCP Over Satellite Channels using 2488 28
Standard Mechanisms
Procedure for Defining New DHCP Options 2489 29
Anti-Spam Recommendations for SMTP MTAs 2505 30
Media Feature Tag Registration Procedure 2506 31

Reserved Top Level DNS Names 2606 32


URN Namespace Definition Mechanisms 2611 33
Changing the Default for Directed Broadcasts in 2644 34
Routers
Registration Procedures for URL Scheme Names 2717 35
Guidelines for Writers of RTP Payload Format 2736 36
Specifications
IANA Allocation Guidelines For Values In the 2780 37
Internet Protocol and Related Headers
Network Ingress Filtering: Defeating Denial of 2 82 7 3 8
Service Attacks which employ IP Source Address
Spoofing
Charter of the Internet Architecture Board (IAB) 2850 39
Root Name Server Operational Requirements 2870 40
Congestion Control Principles 2914 41

1908 Handbook of Data Communications and Networks


Domain Name System (DNS) !ANA Considerations 2929 42
Procedures and !ANA Guidelines for Definition of 2939 43
New DHCP Options and Message Types
Use of HTTP State Management 2964 44
IETF Discussion List Charter 3005 45
Recommended Internet Service Provider Security 3013 46
Services and Procedures
Tags for the Identification of Languages 3066 47
End-to-end Performance Implications of Slow Links 3150 48
Delegation of IP6.ARPA 3152 49
End-to-end Performance Implications of Links with 3155 so
Errors
IANA Guidelines for IPv4 Multicast Address 3171 51
Assignments
Management Guidelines & Operational Requirements 3172 52
for the Address and Routing Parameter Area Domain
("arpa")
GLOP Addressing in 233/8 3180 53
IETF Guidelines for Conduct 3184 54
Guidelines for Evidence Collection and Archiving 3227 55
On the use of HTTP as a Substrate 3205 56
IANA Considerations for IPv4 Internet Group 3228 57
Management Protocol (IGMP)
Defining the IETF 3233 58
A Transient Prefix for Identifying Profiles under 3349 59
Development
Inappropriate TCP Resets Considered Harmful 3360 60
Strong Security Requirements for Internet 3365 61
Engineering Task Force Standard Protocols
Advice to link designers on link Automatic Repeat 3366 62
reQuest (ARQ)
Session Initiation Protocol (SIP) for Telephones 3372 63
(SIP-T) : Context and Architectures

Internet Assigned Numbers Authority (IANA) 3383 64


Considerations for the Lightweight Directory
Access Protocol (LDAP)
Dynamic Delegation Discovery System (DDDS) Part 3405 65
Five: URI.ARPA Assignment Procedures
Uniform Resource Names (URN) Namespace Definition 3406 66
Mechanisms

[Note: an asterisk at the end of a line indicates a change from the


previous edition of this document.]

Ap9.1.6 Experimental Protocols


Mnemonic Title RFC#

Dual Stack Hosts Using "Bump-in-the-API" (BIA) 3338*


Policy-Based Accounting 3334*
PGM Reliable Transport Protocol Specification 3208*
Domain Security Services using S/MIME 3183
SMX Script MIB Extensibility Protocol Version 1.1 3179
ISO/IEC 9798-3 Authentication SASL Mechanism 3163
Electronic Signature Policies 3125
A DNS RR Type for Lists of Address Prefixes (APL RR) 3123
Finding an RSIP Server with SLP 3105
RSIP Support for End-to-end IPsec 3104
Realm Specific IP: Protocol Specification 3103
Realm Specific IP: Framework 3102
OpenLDAP Root Service An experimental LDAP referral 3088
service
Notification and Subscription for SLP 3082

RFC's 1909
MPLS Loop Prevention Mechanism 3063
Internet X.509 Public Key Infrastructure Data 3029
Validation and Certification Server Protocols
Unified Memory Space Protocol Specification 3018
SAP Session Announcement Protocol 2974
Protocol Independent Multicast MIB for IPv4 2934
MASC The Multicast Address-Set Claim (MASC} Protocol 2909
Generic AAA Architecture 2903
DNS Extensions to Support IPv6 Address Aggregation 2874*
and Renumbering
TCP Congestion Window Validation 2861
TSWTCM A Time Sliding Window Three Colour Marker (TSWTCM} 2859
OSPF over ATM and Proxy-PAR 2844
PPP-SDL PPP over Simple Data Link (SDL} using SONET/SDH 2823
with ATM-like framing
Diffie-Helman USM Key Management Information Base 2786
and Textual Convention
An HTTP Extension Framework 2774
Encryption using KEA and SKIPJACK 2773
Sampling of the Group Membership in RTP 2762
Definitions of Managed Objects for Service Level 2758
Agreements Performance Monitoring
HTCP Hyper Text Caching Protocol (HTCP/0.0} 2756
RTFM: New Attributes for Traffic Flow Measurement 2724
PPP EAP TLS Authentication Protocol 2716
SPKI Certificate Theory 2693
SPKI Requirements 2692
QoS Routing Mechanisms and OSPF Extensions 2676
DNS Binary Labels in the Domain Name System 2673*

The Secure HyperText Transfer Protocol 2660


Security Extensions For HTML 2659
LDAPv2 Client vs. the Index Mesh 2657
Registration Procedures for SOIF Template Types 2656
CIP Index Object Format for SOIF Objects 2655
A Tagged Index Object for use in the Common Indexing 2654
Protocol
An LDAP Control and Schema for Holding Operation 2649
Signatures
The NewReno Modification to TCP's Fast Recovery 2582
Algorithm
Mapping between LPD and IPP Protocols 2569
IPP-RAT Rationale for the Structure of the Model and Protocol 2568
for the Internet Printing Protocol
IPP-DG Design Goals for an Internet Printing Protocol 2567
DNS-INFO Detached Domain Name System (DNS} Information 2540
PHOTURIS-E Photuris: Extended Schemes and Attributes 2523
PHOTURIS-S Photuris: Session-Key Management Protocol 2522
ICMP-SEC ICMP Security Failures Messages 2521
NHRP-MNHCS NHRP with Mobile NHCs 2520
-------- URI Resolution Services Necessary for URN Resolution 2483
-------- IPv6 Testing Address Allocation 2471
MARS-SCSP A Distributed MARS Service Using SCSP 2443
TCP-WIN Increasing TCP's Initial Window 2414
PIM-SM Protocol Independent Multicast-Sparse Mode (PIM- 2362
SM} : Protocol Specification
-------- Domain Names and Company Name Retrieval 2345
RTP-MPEG RTP Payload Format for Bundled MPEG 2343
-------- Intra-LIS IP multicast among routers over ATM 2337
using Sparse Mode PIM
-------- The Safe Response Header Field 2310
LDAP-NIS An Approach for Using LDAP as a Network Information 2307
Service
HTTP-RVSA HTTP Remote Variant Selection Algorithm -- RVSA/1.0 2296

1910 Handbook of Data Communications and Networks


TCN-HTTP Transparent Content Negotiation in HTTP 2295
TOPT-COMPO Telnet Com Port Control Option 2217
-------- Core Based Trees (CBT) Multicast Routing Architecture 2201
-------- Core Based Trees (CBT version 2) Multicast Routing 2189
-- Protocol Specification --
-------- A Trivial Convention for using HTTP in URN Resolution 2169
MAP-MAIL MaXIM-11 - Mapping between X.400 / Internet mail 2162
and Mail-11 mail
MIME-ODA A MIME Body Part for ODA 2161
OSPF-DIG OSPF with Digital Signatures 2154
IP-SCSI Encapsulating IP with the Small Computer System 2143
Interface
X.500-NAME Managing the X.500 Root Naming Context 2120
GKMP-ARCH Group Key Management Protocol (GKMP) Architecture 2094

GKMP-SPEC Group Key Management Protocol (GKMP) Specification 2093


TFTP-MULTI TFTP Multicast Option 2090
IP-Echo IP Echo Host Service 2075
TOPT-CHARS TELNET CHARSET Option 2066
URAS Uniform Resource Agents (URAs) 2016
GPS-AR GPS-Based Addressing and Routing 2009
ETFTP Experiments with a Simple File Transfer Protocol 1986
for Radio Links using Enhanced Trivial File
Transfer Protocol (ETFTP)
BGP-RR BGP Route Reflection An alternative to full mesh IBGP 1966
SMKD Scalable Multicast Key Distribution 1949
SNMPV2SM User-based Security Model for SNMPv2 1910
SNMPV2AI An Administrative Infrastructure for SNMPv2 1909
SNMPV2CB Introduction to Community-based SNMPv2 1901
OSI NSAPs and IPv6 1888
DNS-LOC A Means for Expressing Location Information in 1876
the Domain Name System
SGML-MT SGML Media Types 1874
CONT-MT Message/External-Body Content-ID Access Type 1873
UNARP ARP Extension - UNARP 1868
BGP-IDRP A BGP/IDRP Route Server alternative to a full 1863
mesh routing
ESP3DES The ESP Triple DES Transform 1851
SMTP 521 Reply Code 1846
SMTP Service Extension for Checkpoint/Restart 1845
ST2 Internet Stream Protocol Version 2 (ST2) Protocol 1819
Specification - Version ST2+
Communicating Presentation Information in Internet 1806
Messages: The Content-Disposition Header
Schema Publishing in X.500 Directory 1804
MHS use of the X.500 Directory to support MHS Routing 1801
Class A Subnet Experiment 1797
TCP/IPXMIB TCP/IPX Connection Mib Specification 1792
TCP And UDP Over IPX Networks With Fixed Path MTU 1791
ICMP-DM ICMP Domain Name Messages 1788
CLNP-MULT Host Group Extensions for CLNP Multicasting 1768
OSPF-OVFL OSPF Database Overflow 1765
RWP Remote Write Protocol - Version 1.0 1756
NARP NBMA Address Resolution Protocol (NARP) 1735
DNS-ENCODE DNS Encoding of Geographical Location 1712
TCP-POS An Extension to TCP : Partial Order Service 1693
T/TCP T/TCP -- TCP Extensions for Transactions Functional 1644
Specification
MIME-UNI Using Unicode with MIME 1641
FOOBAR FTP Operation Over Big Address Records (FOOBAR) 1639
X500-CHART Charting Networks in the X.500 Directory 1609
X500-DIR Representing IP Information in the X.500 Directory 1608

SNMP-DPI Simple Network Management Protocol Distributed 1592

RFC's 1911
Protocol Interface Version 2.0
CLNP-TUBA Use of ISO CLNP in TUBA Environments 1561
REM-PRINT Principles of Operation for the TPC.INT Subdomain: 1528
Remote Printing -- Technical Procedures
DASS DASS - Distributed Authentication Security Service 1507
EHF-MAIL Encoding Header Field for Internet Messages 1505
RAP RAP: Internet Route Access Protocol 1476
TP-IX TP/IX: The Next Internet 1475
Routing Coordination for X.400 MHS Services Within 1465
a Multi Protocol I Multi Network Environment
Table Format V3 for Static Routing
Using the Domain Name System To Store Arbitrary 1464
String Attributes
IRCP Internet Relay Chat Protocol 1459
SIFT SIFT/UFT: Sender-Initiated/Unsolicited File Transfer 1440
DIR-ARP Directed ARP 1433
TEL-SPX Telnet Authentication: SPX 1412
TEL-KER Telnet Authentication: Kerberos Version 4 1411
TRACE-IP Traceroute Using an IP Option 1393
DNS-IP An Experiment in DNS Based IP Routing 1383
RMCP Remote Mail Checking Protocol 1339
MSP2 Message Send Protocol 2 1312
DSLCP Dynamically Switched Link Control Protocol 1307
X.500 and Domains 1279
IN-ENCAP Scheme for an internet encapsulation protocol: 1241
Version 1
CLNS-MIB CLNS MIB for use with Connectionless Network Protocol 1238
(ISO 8473) and End System to Intermediate
System (ISO 9542)
CFDP Coherent File Distribution Protocol 1235
IP-AX.25 Internet protocol encapsulation of AX.25 frames 1226
ALERTS Techniques for managing asynchronously generated 1224
alerts
MPP Message Posting Protocol (MPP) 1204
SNMP-BULK Bulk Table Retrieval with the SNMP 1187
DNS-RR New DNS RR Definitions 1183
IMAP2 Interactive Mail Access Protocol: Version 2 1176
NTP-OSI Network Time Protocol (NTP) over the OS! Remote 1165
Operations Service
DMF-MAIL Digest message format 1153
RDP Version 2 of the Reliable Data Protocol (RDP) 1151
Standard for the transmission of IP datagrams 1149
on avian carriers
TCP-ACO TCP alternate checksum options 1146
The Q Method of Implementing TELNET Option Negotiation 1143
IP-DVMRP Distance Vector Multicast Routing Protocol 1075
VMTP VMTP: Versatile Message Transaction Protocol 1045
COOKIE-JAR Distributed-protocol authentication scheme 1004
NETBLT NETBLT: A bulk data transfer protocol 998
IRTP Internet Reliable Transaction Protocol functional 938
and interface specification
LOP Loader Debugger Protocol 909
RDP Reliable Data Protocol 908

[Note: an asterisk at the end of a line indicates a change from the


previous edition of this document.]

Copyright (C) The Internet Society (2002). All Rights Reserved.

1912 Handbook of Data Communications and Networks


Ap 10 Ethernet monitoring system
The schematic below shows an Ethernet monitoring system. Its component values are:

R1=1ill R2= 5oo n R3=10MQ R4=39Q R5=1.5kQ


R6 = 10 Q L1 = 1:1, 200 11H C1 = 100 mF C2=0.1!1F C3 = 1.5 pF
XTAL=20MHz

~ S60SOYWN.

~ -" . -.
: ~odl•
II ~I ; ~ :l
0!
tM i~
~ ;~ ~lb HI
~lHI• .1m • .'.f.l," 0 ~=::===··

.. . .... -
71 ~I ~I 21 ~I ~I ;; I! 0
.. ... . Oaas
- vu:>£1
'l
• ~ ~ ~ ~ : : : ~ =
0401033S
elel:i > > l! Hi!
- ~ ... • .. • ~ - • t
illf.~ :i ~1a1e1~ 3 :I :;!

H,
I
g
: I OHI•

i! \ ~, s[il s~ ~! 11
£6S1~L

- .............. ,.. .__){; -~ ., ..


L:!UI ~~I ~ vl vi .. . .."~
"' ' ~
Dl

,...--!!!- • ~
.... ..~
)4~

< ,a
il~ I ~I
I .----
J=sJgJ al ~: "
~ "~
.-----2!- ~ :li!--
10

"'

~~~~
!. ~ :: :1 • -
~ II
- - ... .. ... . ... I;.:~..
~l·L

L.d:l~ s1 !!I 81!I 41·

j~t
Ap 11 Quick questions
Question: I would like some discipline in the design of my network. Thus, what are the main design
steps?
It is important to properly design your network, as incorrect planning can cause problems in the
future. The basic steps are:

• Analyze requirements. This involves understanding and specifying the requirements of the
network, especially its major uses. If possible, future plans should be incorporated. One of
the key features is the bandwidth requirements and the size of the network.
• Develop LAN structure. This step involves developing a LAN structure for these require-
ments. Typically in organizational networks this will be based on a star topology using
Ethernet hubs/switches.
• Set up addressing and routing. The final step involves setting up IP addresses and subnets
to add structure.

The most important information that is required is the structure of the organization and how
information flows between the units, as the designed network is likely to reflect this structure.
The information will include:

• Understand the current network (if one exists) especially its strengths and weaknesses.
• Gather information on geographical locations.
• Determine current applications, and future plans for each site and for the organization.
• Develop organizational contacts. These will be the important people who will be involved
in the development of the network. A mixture of technical and business skills always helps.
Technical people tend to be driven by technology ('it should transfer files faster', 'it's easier
to install', and so on), whereas business people tend to be driven by applications ('I just
want access to a good spreadsheet', 'I want to be able to send e-mails to anyone in the com-
pany', and so on). It is also important to get someone involved who has experience oflegal
matters, and/or someone involved in Personnel matters.
• Determine the requirements for external network connections. This is an important deci-
sion as the security of the whole network may depend on the choices made on the external
connections. Many large companies have a single point of connection to the external Inter-
net as this allows organizations to properly manage internal and external connections to the
Internet.
• Determine key objectives of the organization, especially related to mission-critical data and
mission-critical operations. These should have top priority over other parts of the network.
For example, a hospital would declare its ambulance service as a mission-critical unit,
whereas the cuts and bruises unit (if there was one) would not be.
• Determine who is in control of information services. This may be distributed over the or-
ganization or over centralized in an MIS (Management Information Service) unit.

Question: What are the main requirements in designing a network?


• Business requirements.
• Technical requirements. The main issues are media contention, reducing excessive broad-
casts (routing tables, ARP requests, and so on), backbone requirements, support for real-
time traffic and addressing issues.
• Performance requirements. This is likely to involve a network load requirement analysis for
the typical loading on the network, and also for the worst-case traffic loading. This will de-
termine the requirement for client/server architectures. An analysis should also be made for
the impact of new workstations being added to the network. It should also involve an analy-
sis of the requirements for application software, especially in its bandwidth requirements.
Multimedia applications tend to have a large bandwidth requirement, along with central-
ized database applications and file servers.
• New application requirements.
• Availability requirements. This defines the usefulness of the network, such as response time, resource
availability, and so on.

Question: How do I try to limit the number ofcollisions on an Ethernet segment?


Ethernet collisions occur when two nodes try and transmit onto a network segment at the same time.
When the transmitting nodes detect this, they transmit a jamming signal to the rest of the network. All the
other nodes on the network detect this, and wait for one of the two colliding nodes to get access onto the
network segment. These collisions reduce the overall bandwidth of the network segment. An important
concept is the collision domain, which defines the physical distance by which a collision is propagated.
Repeaters and hubs propagate collisions, but switches, bridges and routers do not. Thus if you want to
reduce the amount of collision insert either a switch, a router or a bridge in a network segment.

Question: I've analyzed the traffic on the network, and I've found that a large portion ofthe network
traffic is related to broadcasts. How can I reduce their effict?
Broadcasts are sent out when a node wants help from other nodes. Typically, this happens when
a node requires the MAC address for a known network address. The broadcast domain defines
the physical distance by which a broadcast will be propagated. Hub, bridges and switches all
propagate broadcasts, but routers do not. Thus, if you want to reduce the number of broadcasts
on a network segment, insert a router, and it will intelligently route data packets into and out of
a network segment without too many broadcasts (as the router handles external data routing).

Question: Can I use the OS! model to design my network?


Yes. The OSI model can split the network up into identifiable areas. These are:

• Physical layer. Network media (typically Cat-5 cable or fiber-optic cable), hubs and repeat-
ers. Cables are normally run conforming to the EWTIA-568A standard. This layer should
allow for future expansion.
• Data link layer. Switches and bridges. These devices will define the size of the collision and
broadcast domains.
• Network layer. Routers, addressing. This layer filters data packets between network seg-
ments.

Question: I have a local Ethernet hub which I connect to. How for can I run a cable from the hub to
my computer?
If you use Cat-5 horizontal cable, you can get a maximum distance of 100m (if you were to use
fiber cable you could get up to 400m). A hub can thus cover an area of 200 meters square
(assuming that the hub is located in the center of the area).

1916 Handbook of Data Communications and Networks


Question: Did you mention something about a cat?
Yes. There are five categories ofUTP cables defined in EWTIA-568A. Cat-1 is only suitable for
telephone communications, Cat-2 supports up to 4Mbps, Cat-3 supports up to 10Mbps, Cat-4
supports up to 16Mbps and Cat-5 supports up to 100Mbps.

Question: Which is best, enterprise servers or workgroup servers?


Well it all depends on your organization. Enterprise servers are typically used when all the users within an
organization require access to a single resource, such as with electronic mail. Workgroup servers provide
local access to data and application programs, and isolate traffic around these servers. Workgroup servers
should be physically located where they are most required. Typically, enterprise servers require to be more
centralized in their location, and are more robust than workgroup servers, as the whole organization de-
pends on them. Mirror servers (servers which have exact copies of the main enterprise server) can be used
with an enterprise in order to reduce data traffic to the main server.

Question: Will I do damage if I connect using incorrectly wired cable, also how do I know that I've
connected everything correctly? For example, I have a fiber cable which has two connectors and both
are the same, how do I get the TX to the RX, and vice-versa?
It is unlikely that you will do any damage if you connect your cables round the wrong way, as all
the inputs and outputs are electrically buffered. This allows them to sustain short-circuits, and
incorrect wiring. The key of knowing if your connection is working is to look at the 'keep-alive'
signal, which is typically a green LED on the NIC, hub, switch or router. If it is active, or flash-
ing, you have made a proper connection.
With fiber-optic connections, the transceiver unit will activate two green LEDs when you
have made a correct connection. If they are not active, swap the connections round and recon-
nect.
Question: You have said that Ethernet connections have a cross-over, but when I look at my patch
cable, there isn't a cross-over, and pin 1 wires to pin 1, pin 2 to pin 2, and so on? Where s the cross-
over?
You are totally correct, and so am I. The standard Ethernet connection must have a cross-over to connect
the transmit to the receive, and vice-versa, but most hubs implement the cross-over inside the hub. Thus,
all you need is a straight-through cable. I've listed the standard cross-over connections in Section 12.18
(and Figure 11.24), but most of the time you do not need a cross-over when you're connecting to the front
of a hub or a switch. It is only at the back of the hub that you may need a ctoss-over cable. If in doubt look
at the 'keep-alive' LED. If it is off after you connect, it is likely that you've got the wrong cable (or the
power isn't on, or you've not connected the other end, or the power isn't on the computer, and so on).

Question: IfIP has been such a success, why do we need a new address scheme?
IP has been a victim of its own success. No one could have imagined how popular it would be.
As it has a 32-bit address it can only support up to 4 billion addresses. Unfortunately, not all
these addresses can be used, as network addresses are allocated to organizations for their maxi-
mum requirement. Also, if an organization uses subnets, then it is unlikely that every subnet has
its maximum capacity of hosts.
There are possibly enough IP addresses for all the computers in the world, but the next big
wave is going to come from granting IP addresses to virtually every electronic device, such as
mobile phones, faxes, printers, traffic lights, telephones, and so on. The stage after this is to
grant every object in the world an IP address. This could include cars, trains, people, and even
our pets.

Quick Questions 1917


Question: Apart from increasing the number of IP addresses, why change the format, The Internet
works, doesn't it, so why change it?
Ah. Your perception of the Internet is based on what's available now. Few technologies have
expanded so fast, and without virtually any inputs from the governments of the world. Look at
the worldwide telephone system infrastructure, if it was based on the system that we had thirty
years ago there's no way we could communicate as efficiently as we do. The Internet must do the
same, if it is to keep pace with the increase in users, devices and the amount of information that
can be transferred. At present, you possibly imagine that the Internet is an infrastructure of
computers that have big boxes and sit on your desk, and are congregated around servers, and
ISPs. In ten or twenty years this perception will change, and computers will almost become in-
visible, as will the Internet. To cope with this change we need a different infrastructure. To do
this we need to identify its weaknesses:

• The Internet and its addressing structure was never really designed to be a global infrastruc-
ture and is constraining the access to resources and information.
• Information and databases tend to be static, and flxed to location.
• Difficult to group individual objects into larger objects.
• Difficult to add resources to the Internet (requires an ISP and a valid IP address).
• Search engines are not very good at gathering relevant information. On the WWW, typi-
cally users get pages of irrelevant information, which just happens to have the keyword
which they are searching for.
• Resources are gathered around local servers.
• Resources are tied to locations with an IP address.
• IP addresses are not logically organized. The IP address given does not give any information
about the geographical location of the destination. This then requires complex routing pro-
tocols in which routers pass on information about how to get to remote networks.
Question: Can devices have more than one IP address?
Yes. Many devices have more than one IP address. In fact each port that connects to a network
must have an IP address. A good example of this is with routers, as they connect to two or more
networks. Each of the ports of the router must have an IP address which relates to the network
to which it connects to. For example if a router connects to three networks of:

146.176.151.0
146.176.152.0
146.176.140.0

then one IP address from each of the networks must be assigned to the router. Thus, it could be
assigned the following addresses for its ports:

146.176.151.1
146.176.152.1
146.176.140.1
Question: Can these addresses be used again for one ofthe hosts on the connected networks?
No way. No two ports on the Internet can have the same address.

Question: Okay, sorry I asked. So what addresses cannot be used for the ports, or the hosts?

1918 Handbook of Data Communications and Networks


All zeros in the host field, as this identifies the network, and all 1's in the host field as this
identifies the broadcast address. Thus in the example above, 146.176.151.0 and
146.176.151.255 could not be used (these addresses use a Class B address with a subnet in the
third field).
Question: Sometimes when I connect to the Internet everything seems fine, but I cannot access WWW
sites, and it seems to load pages from a WWW cache?

This is a common problem, and it is likely that you are connected to the Internet, but the Do-
main Name Server is not reachable. This means that you cannot resolve domain names into IP
addresses. The way to check this is to use the IP address in the URL. For example:

http://www.mypage.com/index.html

could be accessed with:

http://199.199.140.1 0/index.html

If you can get access with this, you should investigate your DNS. Remember you can normally
specify several DNS's, thus find out the address of a remote DNS, just in case your local one
goes off-line.
Question: When I connect to an ISP, what is my IP address, and my domain name? Can I have the
same IP address each time, and the same domain name?
When you connect to your ISP you will be granted an IP address from a pool of assigned IP
addresses. There is no guarantee that this will be the same each time you connect. Your domain
name will also change, as it is bound to the IP address. It is possible to be allocated a static IP
address, but you would have to pay some money to your ISP for the privilege. The advantage
of this is that remote computers could connect to you when you connected via your ISP.
You can determine your current IP address if you use the command WINIPCFG (or
IPCONFIG). This is particularly useful if you are playing games over the Internet.
Question: If I move my computer from one network to another, does the IP and MAC address stay
the same, and what do I need to change?
The MAC address will not change as the network card stays with the computer. If the computer
is moved to a different subnet or onto a completely different network, the IP address must
change, or the data will be routed back to the wrong network. Data would leave the relocated
computer, and would arrive at the destination, but any data coming back would be routed to the
previously attached network (and thus get lost). Another thing that is likely to change is the
gateway. Nodes cannot communicate with the hosts outside their network if they do not know
the IP address of the gateway (normally a router), thus if the network changes then the gateway
is likely to be different.
The user may also have to set a new Domain Name Server (although a host can have several
DNS entries). The first one listed in the DNS entries should be the one that is the most reliable
and, possibly, the fastest.
Other changes may be to change the subnet mask (on a Class B network, with a subnet this
is typically 255.255.255.0).
Question: So why do you only have to sped.fJ the IP address ofthe gateway?
Because the host uses an ARP request to determine the MAC address of the gateway.

Quick Questions 1919


Question. Ifa computer has no permanent storage, how does it know its own IP address?
Diskless hosts use the RARP protocol, which broadcasts a message to a RARP server. The RARP
server looks-up the MAC address in the source address field in the data frame and sends back its
IP address in a reply to the host.

Question. How is it possible to simply connect a computer to an Ethernet network, and all the com-
puters on the network are able to communicate with it, and how do they know when a computer has
been disconnected?
Computers use the ARP protocol, which allows nodes to determine the MAC address of com-
puters on the network, from given IP addresses. Once they discover the destination MAC
address, they update their ARP cache. After a given time, the entries in the table are updated
(known as aging the entry).

Question. How does a node broadcast to the network?


There are two types of broadcasts. The first is a flooded broadcast, which has 1's in all parts of
the IP address (255.255.255.255). The other it a directed broadcast, which has all1's in the host
part of a IP address. For example, to broadcast to the 146.176.151.0 network, the broadcast
address is 146.176.151. 255, as all 1's in the host part of the address specifies a broadcast.
Routers fotward directed broadcasts, but not flooded addresses (as these are local). All hosts and
routers must thus know what the subnet mask is.

Question: Okay. I understand that both the MAC address and the IP address need to be specifiedfor
a node to receive data, but how does a node know the MAC address ofthe remote destination?
1. A host looks up its local ARP cache (which is in its own RAM, and not stored to the perma-
nent storage) to see if it knows the MAC address for a known IP address.
2. If it does not find the MAC address, it transmits an ARP request to the whole of the network
(ARP requests do not travel over routers). The host who matches the transmitted IP address
then responds with an ARP reply with its own MAC address in the source address field in
the data frame. This is received by the originator of the request, which updates its local ARP
cache, and then transmits with the required MAC address.

Question: Oh, yes. I think I see it now, but what if the destination is on another network, possibly in
another country, how does it determine the address ofthe destination?
1. The host knows the IP address of the gateway for the network (normally a router). It then
uses the MAC address of the gateway, but with the destination IP address of the host that the
data is destined for. The gateway senses that the data frame is addressed to itself, and for-
wards it to the next gateway, and so on.
2. If the node does not know the MAC address of the gateway it will send out an ARP request
to the network with the IP address of the gateway.

Question: Does it matter which port I connect my workstation to the hub with? Do I have to start
from port 1, then port 2, and so on.
No. Hubs and switches are autosensing and automatically use the port that you connect to. You
should hopefully see an LED become active when you connect to the port. You can also connect
to a cascaded hub/switch to any one of the ports.
Question: I've got a dual10/100 switching hub. Can I communicate at 100Mbps, even though I
only have a 10Mbps networking card?

1920 Handbook of Data Communications and Networks


No. The switching hub will automatically sense the speed of your networking card, and use that rate. The
great advantage of buying a dual speed switch is that you can upgrade your network card over time.

Question: Whats the difference between a data segment and a data packet?
The transport layer uses data segments, whereas the network layer uses data packets. Data seg-
ments allow two or more applications to share the same transport connection. These segments
are then split into data packets which have a given maximum size (typically for IP packets this is
64 KB) and each are tagged with a source and destination network address. Different applica-
tions can send data segments on a first-come, first-served basis.
Question: How does a router know that it is getting routing information, and not an IP data packet?
A routing packet is identified in the protocol field in the IP header. For example the OSPF rout-
ing protocol is defined by an 89 in the IP protocol field of the IP header (TCP is defined as 6,
and UDP as 17). Example protocol numbers are:

1 Internet Control Message (ICMP)


3 Gateway-to-Gateway (GGP)
8 Exterior Gateway Protocol (EGP)
9 Any private interior gateway (IGP)
45 Inter-Domain Routing Protocol (IDRP)
86 Dissimilar Gateway Protocol (DGP)
88 Interior GRP (IGRP)
89 OSPF
Question: Some people talk about gateways, and I've got a gateway option in my settings for my net-
work connection. So whats the difference between a gateway and a router?
A gateway is an old fashioned way of defining the entry and exit point of a network. Most of the
time a gateway is a router. You need to define the IP address of the gateway (the router) before
you can communicate with external networks.
Question: So isn't a gateway a better definition for it?
Well I suppose it is, but it's a router, really. In the past computers were sometimes set up to run a routing
protocol and had two or more network cards. These systems acted as gateways.

Question: Most of the systems I have worked with use the RIP routing protocol If it is so popular,
why should I use anything else?
RIP is a distance-vector routing protocol which uses a metric to determine the best route to a
network. A metric-based system is not really a problem, but RIP uses a very simple method to
define the metric: the hop count. This in no way defines the bandwidth on any of the intercon-
nected networks, or the delay, or really anything, apart from the number of routers that it
encounters. Another major problem is that the maximum hop count is set at 15, thus if a desti-
nation is further than 15 routers away, it cannot be reached.
I could go on all day talking about the problems of RIP, but I will not because it's what
makes a lot of networks work. A major problem, though, is that, unlike link-state protocols, each
router transmits the complete contents of its routing table to all of its neighbors (even if there
have been no changes to its connected networks). This occurs every 30 seconds, and is thus
wasteful of bandwidth.
Routing loops can also occur, but these can be overcome with hold-down timers, which do
not allow any updates to the metric for a network which is known to be down, for a given time
(the hold-down time).

Quick Questions 1921


If you really must have a distance-vector approach, choose IGRP, as it better defines the best
route, as it uses things like bandwidth, delay, and so on, to define the metric. It also only has an
update time period of once every 90 seconds, rather that once every 30 seconds for RIP. Typi-
cally routers can run one of many routing protocols, and you can choose the one that fits your
network.
Question: So which is better distance-vector or link-state?
Well there are advantages and disadvantages with both types. With a distance-vector approach
each router sends their complete routing table to their neighbors, at given time intervals. If the
network interconnections are not varying this can be wasteful of bandwidth. Another problem is
that updates to the network is done on a step-by-step basis {ripple effect), and networks may
take some time to converge (that is, to have a consistent view of the complete network).
Link-state routing protocols have the advantage in that they only transmit updates to the rest
of the interconnected network when they sense a change in the interconnected parameters.
These changes are then broadcast to the rest of the interconnected network. This is thus more
efficient in its use of bandwidth, but suffers from initial flooding when the network is first
switched on. The convergence is faster than distance-vector, as each router should have the same
routing table.
Question: Whats an autonomous system and how does it help with routing?
An autonomous system {AS) simplifies the structure of the Internet, and is a logical grouping of
routers within one or more organizations. InterNIC assigns unique 16-bit AS addresses to or-
ganizations. A typical protocol that uses ASs is IGRP {Interior Gateway Routing Protocol).
Question: So whats the difference between interior and exterior routing protocols?
Exterior routing protocols route between AS's, whereas interior routing protocols route with a single AS.
Typical interior routing protocols are IGRP (distance-vector), Enhanced IGRP (balanced hybrid), RIP
(distance-vector) and OSPF (link state).

Question: You say that high-quality audio uses 16 bits for each sample, but my CD player says that it
uses 1- bit conversion. Is this right?
Yes. It is. It uses one bit at a time, as this is thought to give a smoother response. A major prob-
lem with CD recordings is that they sometimes lack warmth, and are a little sharp (as they are
too perfect). One bit tracking tries to follow the movement of the audio signal. So your CD still
uses 16-bit coding.
Question: I can't understand it. I've just bought a brand-new, state-ofthe-art 56kbps modem, and
all I ever get is a maximum transfer speed of 4.19 KB/s. Where am I going wrong, do I need a new
ISP?
No. Your ISP is providing an excellent service, as 56kbps is split between sending and receiving.
As users who access the Internet from modems typically need to receive more data than they
send, the bandwidth for receiving is greater than the bandwidth for sending. You can thus re-
ceive at a faster rate than you can send. The maximum receiving rate is 33 kbps, which relates to
a maximum transfer rate of 4.125 KB/s {there are 8 bits in a byte). If you need a higher-rate you
should try ISDN which gives a total transfer rate of 128kbps (16KB/s). Otherwise, consider
ADSL (Asymmetric Digital Subscriber Line), which gives up to 9Mbps receiving and 1.1Mbps
sending, over standard telephone lines.
Question: Everyone seems to be talking about MP-3, but whats so good about it?
MP-3 audio is set to revolutionize the way that music is distributed and licensed. A typical audio
track is sampled at 44 100 times per second, for two channels at 16 bits per sample. Thus the
data rate is 1.411Mbps (176400B/s), giving a total of 52920000B {50.47MB) for a five-
minute song. As the storage of a CD is around 650MB, it is possible to get 64 minutes

1922 Handbook of Data Communications and Networks


from the CD.
Obviously it would take too long, with present bandwidths to download a five-minute audio
flle from the Internet in its raw form (over 3 hours with a 56kbps modem). If the audio file was
compressed with MP-3, it can be reduced to one-tenth of its original size, without losing much
of its original content.
So, it is now possible, with MP-3, to get over 10 hours ofhi-fi quality music on a CD. But
the big change is likely to occur with songs being sampled, and downloaded over the Internet.
Users would then pay for the license to play the music, and not for purchasing the CD.
Question: Why, with video and images, do you convert.from RGB into something else?
Video cameras have sensors for Red, Green and Blue (the primary colors for video information).
In TV, before color TV, these colors where convened into luminance (Y). When color TV ar-
rived they had to hide the extra color information and then send it as U and V (Redness and
Blueness). Thus for TV, RGB is convened into YUV. With images, the human eye is very sensi-
tive to changes in brightness in any object, and not so sensitive to color changes. Thus color
changes can be compressed more than the luminance. This is why RGB is convened in YCb c:_.
For example, 4:2:2 uses twice as many samples for luminance than redness and blueness, and
4: 1: 1 uses four times as many samples.
Question: Why when I watch digital TV; or a DVD movie, does the screen sometimes display large
rectangular blocks, or objects which seem to move incorrectly across the screen?
MPEG splits images up into blocks. As part of the compression process, MPEG splits each frame
into a series of blocks. These blocks are then transformed. To increase compression, MPEG
sends the complete picture every so often, and then just sends updates in the differences between
the frames. Thus if your reception is not very good then you may fail to get the complete update
of the picture, and only receive parts for the update. Also MPEG tries to track moving objects,
it will then group the moving object, and transmit how the object moves. Sometimes this has
not been encoded very well, and the object seems to move incorrectly across the screen. Nor-
mally this is because there are not enough updates to the complete frame.
Question: Why does MPEG have to send/store the complete picture every few .frames. Would it not be
possible to send/store one complete frame, and then just send/store the changes .from .frame to .frame?
This would work fine, and would give excellent compression, but the user would not be able to
move quickly through the MPEG ftlm, as the decoder would have to read the initial frame, and
then all the updates to determine how the frames changed. Also if there were corrupt data, it
would propagate through the whole film. Thus there is a compromise between the number of
intermediate ftames between each complete ftame.
Question: All music seems to be becoming digita~ but what's the great advantage when you lose
something in the conversion?
Yes. Something is lost in the conversion (the quantization error), but this stays constant, whereas
the analogue value is likely to change. The benefits of converting to digital audio outweigh the
drawbacks, such as:

• The qualiry of the digital audio system only depends on the conversion process, whereas the
quality of an analogue audio system depends on the component parts of the system.
• Digital components tend to be easier and cheaper to produce than high-specification ana-
logue components.
• Copying digital information is relatively easy and does not lead to a degradation of the sig-
nal.
• Digital storage tends to use less physical space than equivalent analogue forms.

Quick Questions 1923


• It is easier to transmit digital data.
• Information can be added to digital data so that errors can be corrected.
• Improved signal-to-noise ratios and dynamic ranges are possible with a digital audio system.
Question: I've been told that I should not use copper cables to connect networks between two build-
ings. Why?
Networks use digital signals. These digital signals are referenced to a local ground level (which
eventually connects to the earth connection). The ground level can vary between different build-
ings (and can be large enough to give someone an electrical shock). Thus the ground connection
between the two buildings must be broken. If possible for safety, and for reliable digital trans-
mission, you should use a fiber-optic connection.
Also, copper cables can carty electrical surges (such as from lightning strikes), and airborne
electrical noise. Electrical surges can cause great damage, and noise can cause the network per-
formance to degrade (as it can cause bit errors).
If possible use fiber-optic cables for any long run of networking media. They tend to produce
fewer problems, and allow for easy upgrades {as they have a much greater bandwidth than cop-
per-based cables).
Question: I thought that Ethernet was a bus-type network, but you have said that it has a star con-
nection.
Ethernet networks use a bus-type network, but when it connects to a hub the network can be
seen as a physical star topology as the hub can be seen as a central point. If it were to fail, then
the whole network may fail. Inside the hub the Ethernet connection still uses a bus network.
This is also the case for a ring network which uses MAU (Multistation Access Units) which
is like a hub but creates a virtual ring. The MAU can be seen as a physical star, although the
actual network is a ring topology.
Question: What do I need to create a basic network?
All you really need is two computers, two Ethernet NICs, a hub, and some patch cables. The
patch cables connect the computers to the hub, and the hub creates the network. The computers
can then simply make a peer-to-peer connection with each.
UNIX/Linux will allow you to access one computer from another, using TELNET, FTP,
NDS, and so on, but you would have to assign each computer a unique IP address. As long as
you do not connect onto the Internet, you can choose any IP address.
Microsofr Windows uses its own protocol {NetBEUI) to make a peer-to-peer connection
(with file/printer sharing).
Question: Everywhere I read, it says that Ethernet has so many problems, and isn t really a very good
networking technique. So why is it so popular?
Local area networks have evolved over the years. At one time, the big contest was between Token
Ring, and Ethernet. Which was best? Well Token Ring was always better at coping with net-
work traffic than Ethernet, especially when the network traffic was heavy. But, remember these
were the days before hubs. Thus, most network connections were made from computer to com-
puter with coaxial cable. The big problem with Token Ring was when there was a bad
connection or when a computer was disconnected from the network, as this brought the whole
network down. Ethernet {lOBASE) proved much easier to add and delete computers to and
from the network. Thus it triumphed over Token Ring. Soon Ethernet NICs cost much less
than Token Ring cards, and were available from many sources (typically, these days, Token Ring
cards will cost up to over five times as much as Ethernet ones).
Ethernet has coped well with the evolving networks, and the new hubs made it even easier to
connect computers to a network. It faced a big problem, though, when the number of users of a

1924 Handbook of Data Communications and Networks


network increased by a large factor. Its answer to this was 100BASE, which ramped up the bit
rate by a factor of ten. This worked well, but it suffered when handling traffic over wide areas.
Ethernet had a final trump card: 1000BASE, which gives a bit rate of 1 Gbps.
Thus, whatever we throw at Ethernet, it fights back by either ramping up the bit rate (from
10Mbps to lOOMbps to 1 Gbps) or it allows multiple simultaneous network connections
(through Ethernet switches). So, don't dismiss the King, he's going to be around for a while yet.
Question: How do you connect a fiber-optic cable to a connector?
It takes a little bit of skill, but it is just glued onto the end.
Question: And, how do you get an Rj-45 connector onto twisted-pair cable?
You strip about 0.5 inch of the outer jacket and fan-out the wires in the correct order. Next you
push them fully into the RJ-45 connector, and finally use the special crimping tool to clamp the
cable, and make the required contacts. No soldering is involved.
Question: What's so good about routers?
Routers are the key components of the Internet. They communicate with each other and try and
determine the best way to get to a remote network. As every computer which connects to the
Internet must have an IP address, they use these addresses to route data around the Internet.
Without routers we would not have an Internet. Routers are generally the best device to isolate
traffic from one network and another, as they will only forward data packets if the destination is
not on the current network.

Advantages of routers:
• Intelligently route data to find the best path using the network address. A bridge will route
if the MAC address is not on the originating segment, whereas a router will intelligently de-
cide whether to forward, or not.
• They do not forward broadcasts, thus they reduce the effect of broadcast storms.

Disadvantages of routers:
• Slower than bridges, as they must process the data packet at a higher level. The data frame is
then forwarded in a modified form.
• They are network protocol dependent, whereas bridges will forward any high-level protocol
as it is operating on the level 2 (as long as it connects two networks of the same types, such
as Ethernet-to-Ethernet). Routers interpret the network level data using the required proto-
col, such as IP or IPX.
Question: I live in Edinburgh, and my friend lives in London. How long does it take for a digital
pulse to travel from Edinburgh to London?
Well, there are a lot of assumptions to be made. First we'll assume that there are no intermediate
devices in the cable that connects Edinburgh and London, and we'll assume that it is fiber-optic
cable, which propagates light pulses at one-third the speed of light (10 8 m/s). Thus for a distance
of 500 miles (804.65km,) the time will be:

T =Distance= 804.65x10 3 = O.OOS0465


Speed 1x10 8
=8.05ms
Question: What are the main rules that I should use when I imtall network cables?
Well, the initial installation is imponant as well installed cable will reduce the likelihood of
problems in the future. Cabling problems tend to be one of the top causes of network problems.
The rules can be summarized as:

Quick Questions 1925


• Untwisting cables. The maximum amount of untwisted in a Cat-5 cable is ~in; this is to
maximize the cancellation effect.
• Cable bend. The maximum cable bend is 90°.
• Staples should never be used as these pierce the outer jacket of the cable. Attach cable ties to
cables going on the same path, but never secure them too tightly. If possible secure the
cable with cable ties, cable support bars, wire management panels and releasable Velcro
straps.
• Try and minimize outer cable twists and stretching the cable, and never allow the cable to
become kinked, as this changes the characteristic impedance of the cable. The cables within
can untwist when stretched.
• Leave enough cable at each end so that it can be properly terminated. It is less expensive to
add an extra few meters onto the length at either end, than it is to have to re-run the whole
cable. Typically, the cable run will have an extra few meters hidden below in the floor, or
above in the ceiling, in order to compensate for extra lengths.

Question: I use a Dial-up connection from home and an Ethernet connection at work. Is there any
difference in the way that my applications operate?
None at all (when you use TCP/IP communications). TCP/IP provides the interface between
the networking technology and the application program, and has been designed so that the net-
working type is transparent to the application program, so, for example, it doesn't marter to a
WWW browser that you connect to a modem or over a LAN.
Question: I'm a user administrator. What are good practices for user accounts, so that I can secure my
network?
1. GUEST ACCOUNT. A guest account should always have a password, and should only be
used in low-security domains.
2. RENAME ADMIN. If the network connects to the Internet, the administrator account
should be renamed to deter hackers.
3. LIMIT ADMINISTRATOR. Only log on as an administrator when required. This stops
the administrator from accidentally making changes which are incorrect, as the administra-
tor has the right to do anything (every user, no matter how good they are, has deleted
something that they didn't intend to).
4. PASSWORDS FOR ALL. User accounts should always have a password. On medium-
security and high-security domains, the password should expire after a given time, and will
require a completely new password (not just the same one as given previously). Some sys-
tems remember the best few passwords, and bar the user from using any of them.
5. CHANGE WHEN FIRST. New users should change their password after they first log
onto a domain. This forces users to protect their own account.
6. RANDOM NEW PASSWORDS. In medium-security and high-security networks, ini-
tial passwords should be random assigned.
7. BAD LOCK-OUTS. User accounts should be locked-out after a given number of bad log-
ins. In low-security domains this should be a simple time out for a number of minutes, but
on medium-security and high-securiry domains this should set to forever (that is, until the
system administrator has reset the account, possibly after investigating the cause).
8. PASSWORD SIZE. On medium-security and high-security domains, passwords should be
at least a given number of characters, and should typically not include words from a stan-
dard dictionary, and also include a number. Typically passwords are at least six characters
long.
9. GROUPS. The user must be assigned to a well-defined group, as members of their group
tend to have a high-privilege to the user's resources as any other user.

1926 Handbook of Data Communications and Networks


10. DELETE OLD ACCOUNTS. User accounts should have a defined time limit before
they become inactive. Users who leave an organization should be deleted as quickly as pos-
sible.
Question: And what other techniques can I apply to my network?
1. REGUlAR BACKUPS. No network is secure from loss of data, either through hard-
ware/software failure, accidental deletion, and external hackers. The only sure way to
recover the data on a network is to backup the system, and restore it, if required.
2. PROPERLY DEFINE AUDIT POLICY. This should relate to security policies, resource
usage, and so on.
3. PROPERLY DEFINE USERS AND GROUPS. Domains which split into proper groups
are ofren easier to administer and control than domains which have a few loosely defined
groups.
4. SECURE THE SERVER The server is likely to be the most important computer within
the domain, as any downtime can affect the whole domain. The server should thus be se-
cure against attack or accidental damage.
5. MAKE SERVERS ROBUST. Servers should be protected against failure, especially through
mains spikes, and power outages. This typically requires UPS and RAID technology.
6. DEFINE DOMAINS. Each domain has at least one server. The larger the domain becomes
the more difficult it is to administer it, and the slower it becomes. If possible, define the
limits of the domain for effective sharing of information.
7. DEFINE HOW RESOURCES ARE SHARED. It is important that resources are shared
properly, and certain users should be restricted from certain resources.
8. SETUP BACKUP RESOURCES. Key resources should have a backup which will guard
against failure. Typically this will involve a backup server, which contains a mirror of the
data on the main server.
9. MAKE NETWORK ROBUST. The network should be designed so that failures are con-
fined to small areas. Typically, routers and bridges are used to segment the network, and
contain faults.
10. LIMIT EXTERNAL CONNECTIONS. On secure domains the number of external con-
nections should be limited. Many organizations do not allow modems to be used to connect
to a computer, as this could be used by an external user to gain access to the network, with-
out first going through the organizational firewall.
Question: What are best practices for a secure network?
1. BAN EXTERNAL CONNECTIONS. In a highly secure network, all external traffic
should go through a strong firewall. There should be no other external connections on the
network. If possible, telephone lines should be monitored to stop data being transferred
over without going through firewall.
2. BAN FLOPPY DISKS AND DATA STORAGE DEVICES. Employees should not be
able to enter or leave the organization with any data on disk. Some organizations remove
floppy disk drives from their computers to tty and limit the possibility of transferring data.
3. NO USER CAN INSTALL SOFTWARE. Viruses can be easily spread if users are
allowed to install their own software.
4. SECURE ACCESS TO RESOURCES. Typically users must use swipe cards, or some bio-
metric technique to gain access to a
restricted domain.
5. LIMIT INTERNET ACCESS. Only key personnel should be given rights to access the ex-
ternal Internet. If possible the computers which access the Internet should be well
protected against malicious programs.
6. FIREWALLS USED BETWEEN DOMAINS. Internal hackers can be as big a problem as
external hackers. Thus firewalls should be used between domains to limit access.
7. BASE AUTHENTICATION ON MAC ADDRESSES. Network addresses do not offer

Quick Questions 1927


good authentication of a user, as they can be easily spoofed. An improved method is to
check the MAC address of the computer (as no two computers have the same MAC ad-
dress).
8. EVERY FILE AND OBJECT SHOULD HAVE UNIQUELY DEFINED PRMLEGES.
Every file and resource should have uniquely setup for user privileges which can limit access.
9. EMPLOY SECURITY MANAGER. The security manager will be responsible for the de-
sign of the initial security model, and any changes to it.
10. LOG EVERY EVENT. All the important security related events should be monitored
within each domain. If possible they should be recorded over a long period of time. Soft-
ware should be used to try and determine incorrect usage.
Question: How secure is Microsoft Windows?
The US Government defines certain security levels: D, Cl, C2, Bl, B2, B3 and Al, which are
published in the Trusted Computer Security Evaluation Criteria books (each which have different
colored cover to define their function), these include:

• Orange Book. Describes system security.


• Red Book. Interpretation of the Orange book in a network context.
• Blue Book. Application of Orange book to systems not covered in the original book.

Microsoft Windows NT/2000 uses the C2 security level. It has the following features:

• Object control. Users own certain objects and they have control over how they are accessed.
• User names and passwords.
• No object reuse. Once a user or a group has been deleted, the user and group numerical
IDs are not used again. New users or groups are granted a new ID number.
• Security auditing system. This allows the system administrator to trace security aspects,
such as user login, bad logins, program access, file access, and so on.
• Defined keystroke for system access. In Windows NT/2000, the CNTRL-ALT-DEL key-
stroke is used by a user to log into the system.
Question: What does the orange book define?
The Orange Book produced by the US Department of Defense (DOD) defines levels of security
for systems. There are four main divisions, which split into seven main security ratings. Division
D is the lowest security level and Division A is the highest. The ratings are:

• Division D. This rating provides no protection on files or for users. For example, a DOS-
based computer has no real security on files and users, thus it has a Division D rating.
• Division C. This rating splits into two groups: Cl rating and C2 rating. Cl contains a trust
computing base (TCB) which separates users and data. It suffers from the fact that all the
data on the system has the same security level. Thus, users cannot make distinctions be-
tween highly secure data and not-so secure data. A Cl system has user names and
passwords, as well as some form of control of users and objects. C2 has a higher level of se-
curity and provides for some form of accountability and audit. This allows events to be
logged and traced, for example, it might contain a list of user logins, network address logins,
resource accesses, bad logins, and so on.
• Division B. This rating splits into three groups: Bl, B2 and B3. Division B rated systems
have all the security of a C2 rating, but have more security because they have a different
level of security for all system accesses. For example, each computer can have a different se-
curity level, each printer can also have different security levels, and so on. Each object (such

1928 Handbook of Data Communications and Networks


as a computer, printer, and so on) has a label associated with it. It is with this label that the
security is set by. Non-labeled resources cannot be connected to the system. In a B2 rated
system, users are notified of any changes of an object that they are using. The TCB also in-
cludes separate operator and administrator functions. In a B3 rated system the TCB
excludes information which is not related to security. The system should also be designed to
be simple to trace, but also well tested to prevent external hackers. It should also have a full-
time administrator, audit trails and system recovery methods.
• Division A. This is the highest level of security. It is similar to B3, but has formal methods
for the systems security policy. The system should also have a security manager, who should
document the installation of the system, and any changes to the security model.
Question: What are the standard groups defined in Microsoft Windows?
Standard NT accounts

• Administrator. Used for administration of a domain.


• Guest. Designed for limited-time or occasional user. On medium-security and high-security
• domains, this account should be disabled. Guests should be given unique accounts.
• System. Used to run many of the server processes and for assigning file access permission.

Standard NT domain groups

• Domain Admins. Used to assign the administrators group within the domain.
• Domain Users. Used to assign the users accounts in the domain.
• Domain Guests. Used to assign the guest accounts in the domain.

Standard NT local groups

• Administrators. Contains the Administrators account and the Domain Admins domain
group.
• Account Operators, Backup Operators, Print Operators and Server Operators. Less privi-
leged than the Administrators but more than user accounts. Each perform a specific task for
an administrative function.
• Replicators. Used by the Directory Replicator Service, which allows for automatic copying
of files between systems within a domain.
• Users. A group which holds ordinary users.
• Guests. A group which holds guest accounts for the local domain.

Quick Questions 1929


Ap 12 Quick reference
Ap12.1 Miscellaneous
NetBIOS name types
Microsoft networks identify computers by their NetBIOS name. Each is 16 characters long, and
the 16th character represents the purpose of the name. An example list of a WINS database is:

Name Type Status


FRED <00> UNIQUE Registered
BERT <00> UNIQUE Registered
STAFF <lC> GROUP Registered
STAFF <lE> GROUP Registered

The values for the 16th byte are:

00 Workstation 03 Message service


06 RAS server service 1B Domain master browser
1C Domain group name 1D Master browser's name
1E Normal group name (workgroup) 1F NetDDE service
20 Server service 21 RAS client
BE Network Monitor Agent BF Network Monitor Utility

On Microsoft Windows, the names in the WINS database can be shown with the nbs tat com-
mand.

Windows NT TCP/IP setup


Microsoft Windows uses the files LMHOSTS, HOSTS and NETWORKS to map TCP/IP
names and network addresses. These are stored in the <winNT root>\SYSTEM32\DRIVERS\ETC.
LMHOSTS maps IP addresses to a computer name. An example format is:

#IP-address host-name
146.176.1.3 bills_pc
146.176.144.10 fred_pc #DOM:STAFF

where comments have a preceding '#' symbol. To preserve compatibility with previous versions
of Microsoft LAN Manager, special commands have been included after the comment symbol.
These include:

#PRE
#DOM: domain
#INCLUDE fname
#BEGIN_ALTERNATE
#END_ALTERNATE

where
#PRE specifies that the name is preloaded into the memory of the computer and no
further references to the LMHOSTS file will be made.
#DOM :domain specifies the name of the domain that the node belongs to.
#BEGIN_ALTERNATE and #END_ALTERNATE are used to group multiple #include's
#include fname specifies other LMHOST files to include.

The HOSTS file format is IP address followed by the fully qualified name (FQDN) and then any
aliases. Comments have a preceding '#' symbol. For example:

#IP Address FQDN Aliases


146 .176 .1. 3 superjanet janet
146.176.144.10 hp
146.176.145.21 mimas
146.176.144.11 mwave
146.176.144.13 vax
146.176.146.23 oberon
146.176.145.23 oberon

Microsoft Windows TCP/IP commands (quick reference)


Command Description Examples
arp Modifies Address Resolution Protocol tables. arp -s 146.176.151.10
FF-AA-10-3F-A1-3F
-sIP-address [.U4C-address]
; manually modify
-a [IP-address] ; display ARP entry
-dIP-address ; delete entry

finger Queries users on a remote computer. finger -1 fred®miranda


finger ®moon
®hostname ; name of remote computer
-1 ; extend list

ftp Remote file transfer. After connection the ftp inte1.com


following commands can be used:

ascii binary bye cd


dir get hash help
led ls mget mput
open prompt pwd quit
remote help user

host name Displays the TCP/IP hostname of the local node. hostname

ipconfig Displays the TCP/IP settings on the local ipconfig /all


computer.

I a 11 ; show all settings

1pq Sends a query to a TCP/IP host or printer. 1pq -p 1p_1aser


1pq -s mirands -p dot_matrix
- S print_server
-P rinter

1932 Handbook of Data Communications and Networks


lpr Prints to a TCP/IP-based printer. lpr -p lp_laser file.ps

- S print_server
-P printer
nbs tat Displays mapping ofNetBIOS names co IP nbstat -A freds
addresses.

-a NetBIOS-name ; display name table for


; computer
-A IP-address ; display name table for
; computer
-n ; display NetBIOS table
of
; local computer

net stat Displays status ofTCP/IP connections.

-p protocol ; display for given protocol


-r ; show routing tables
-s ; display statistics
-R ; reload HMHOSTS
-s ; display NetBIOS sessions
by
; NetBIOS names
-s ; display NetBIOS sessions
by
; IP addresses

nslookup Queries DNS servers. After connection the follow-


ing commands can be used:

help
finger [username]
port=port
querytype=type
; type can be A (address),
; CNAME (canonical name which is an alias for
; another host), MX (mail exchanger which
; handles mail for a given host), NS (name server
; for the domain), PTR (pointer record which
; maps an IP address to a hostname), SOA (stan
; of authority record) or ANY.

ping Test TCPIIP connectivity.

-a ; resolve IP addresses to host-


names

Quick Reference 1933


-n count ; set number of echo packets
- 1 size ; specifY packet size
-t ; continuously ping
- i ttl ; set time-to-live field
-w timeout ; specifY timeout in ms

rep Remote copy. rep -r \*.txt


miranda.bill/home
[hostnome[. username]]
-a ; ASCII copy
-b ; binary copy
-h ; also hidden files
-r ; recursively copy

rexec Execute remote command. rexec miranda -1 bill "ls -1"

route Manipulates TCP/IP routing table. route gateway 146.151.176.12


-f ; delete all routes
-p ; make a permanent route
add ; add a route
change ; modifY an existing route
delete ; delete a route
gateway ; specifies gateway
mask nettnosk ; define subnet mask
print ; print current table

rsh Executes remote shell. rsh -1 bill "ls -1"

-1 username ; user name


command ; command to execute

telnet Remote login. telnet www.intel.com

tftp Trivial FTP (uses UDP).

tracert Trace route.

-d ; do not resolve IP addresses


-h max_hops ; maximum number of hops
-w timeout ; specify timeout

1934 Handbook of Data Communications and Networks


Windows NT system administration commands (quick reference)
Command Description Examples
at Runs commands at a specified time. Options at 14:00 \\freds
include: "cmd ping miranda > log"

\\computer-name at 00:00 levery:MIWIF


time "cmd lpr log.txt"
/every:date ;suchasdayofthe
week such
; as Mff/Wffh!F/S/Su or day
; of the month

attrib Displays or changes file attributes. Attrib- attrib +h test.txt


utes include:

+r, -r, (read) +a, -a, (archive)


+S, -s, (system) +h, -h, (hidden)
Is (include sub-directories)
backup Backup program.

cacls Command-line Access Control Lists (ACLs). calcs list.txt lg fred:cf


calcs *·* lr bill It
I g username : right ; grant user the follow-
ing
; rights: r (read), c (change),
; f (full control).
I p username ; replace rights, these are as
; above, but n (none) is
added
I r usernamt ; delete all rights
It ; recursive change

chkdsk Checks disk. Options include: chkdsk c: If

If ; automatically fix errors

cmd Run command-line shell.

convert
Convetts drive partition from FAT to convert d: lfs:ntfs
NTFS.

convlog Convetts flles from Microsoft Information convlog -sg -ncsa -o c:\temp
Server, FTP server and Gopher servers, and *.log
produces log files in NSCA or EMWAC
format.

Quick Reference 1935


-t [emwav~ I ncsa]; specifY EMWAC or
;NCSA
-s [fl w Ig] ; specifY FTP (f), WWW
(w) or
; Gopher (g)
- o outdir ; specifY output directory

diskperf Toggles the disk performance counter.

ipxroute IPX routing. ipxsroute servers

servers ; list NetWare servers

j etpack Compacts WINS darabases. net stop wins


jetpack win.mdb tmp.mdb
net start wins

netmon Network monitoring tool.

ntbackup Backup file system.

rasadmin Remote Access Server (RAS) administration.

rasautou Remote Access Server (RAS) debugging.

rasdial Remote Access Server (RAS) dial-up. rasdial miranda /phone:1112222

/phone tel; telephone number

rasphone Edit RAS phonebook.

rdisk Create emergency repair disk.

regedit Edit registry.

restore Restores files after a backup.

start Starts applications from the command line.

winnt 16-bit Window NT installation program.

I r dir ; specifY install directory


Is dir ; insrallation source files

winnt32 32-bit Window NT insrallation program.

1936 Handbook of Data Communications and Networks


Microsoft Windows control services commands (quick reference)
Command Description Example
net accounts Controls account settings

I domain dom ; specifY default domain

net computer Adds or ddetes computers from current do- net computer \\freds /add
main. net computer \\bills /del

\\computer-name
I add; add computer
/del; delete computer

net config Configure server.


server
net config Configure workstation.
workstation

net continue Unpauses a command that was paused


with net pause.

net file Closes an opened file. When used on its


own without arguments it gives the ID of
all opened files. The I close option is
used with the ID number to dose a given
file.

/close ; close file

net group Creates, edits or deletes groups. net group "Staff" /add
net group "Staff" /add fred
/add
; add new group or users to the named
group
; specified group
/delete
; delete group or users to the named
group
; specified group

net help Help messages for net.

net helpmsg Detailed help for a given error message.

net local- Create or deletes local groups or local users.


group
net name Administers list of names for the Messenger
service.

Quick Reference 1937


net pause Pauses a service. net pause lpdsvc
; pause print service
net print Administers print queues.

\ \computer-name
/delete ; delete job

net send Sends a text message to users or computers. net send bill "Hello"

net session Displays information of a current session.

net share Administers networks sharing.


net start Starts a seiVice. net start snmp
;startSNMP
net statis- Displays seiVice statistics.
tics

net stop Stops a seiVice. net stop lpdsvc


; stop print server
net time Sets or queries time on a remote computer.

net use Administers networked resources.

net user Administers user accounts. net user bill c /add


net user bill_c /active:y
password ; prompts for pass-
word
/active: [y/n] ; active status
/add ; add user
/delete ; delete user
I expires: [.Wte INEVER] ; expire time
/fullname: "name" ;fullname
/homedir: homedirpath ; home direc-
tory
/passwdchg: [y In ] ; password
change
/times: [times I ALL] ; login times

net view Displays networked resources. net view \\freds


net view /domain
\\computer-name
I domain [domain] ; list of domain or
; computers within
the
; specified domain

1938 Handbook of Data Communications and Networks


Ap12.2 Windows NT architecture
Windows NT /2000 uses two modes:

• Kernel mode. This is a privileged mode of operation and allows all code direct access to the
hardware and memory, including memory allocated to user mode processes. Kernel mode
processes also have a higher priority over user mode processes.
• User mode. This is a lower privileged mode than kernel mode. It has no direct access to the
hardware or to memory. It interfaces to the operating system through well-defined API
(Application Program Interface) calls.

Figure Apl2.1 shows an outline of the architecture of NT/2000. It can be seen that only the
kernel mode has access to the hardware. This kernel includes executive services which include
managers (for 1/0, interprocess communications, and so on) and device drivers (which control
the hardware) . Its parts include:

• Microkernel. Controls basic operating system services, such as interrupt handling and
scheduling.
• HAL (Hardware Abstraction Layer). This is a library of hardware-specific programs which
give a standard interface between the hardware and sofrware. This can either be Microsoft-
written or manufacturer-provided. They have the advantage of allowing for transportability
of programs across different hardware platforms.
• Win32 Window Manager. Supports Win32, MS-DOS and Windows 3.x applications.

.; - ~-- -· · ·-· · - - -"'"'- 1Kamel mode

I -· I
I ~~~ _ I
Figure Ap12.1 Windows architecture

Ap12.3 Assigned Internet protocol numbers


Table Appl2.1 outlines the values that are used in the protocol field of the IP header.

Quick Reference 1939


Table Ap12.1 Assigned Internet protocol numbers

Value Protocol Value Protocol


0 Reserved 18 Multiplexing
ICMP 19 DCN
2 IGMP (Internet group management) 20 TAC monitoring
3 Gateway-to-gateway 21-62
4 CMCC gateway monitoring message 63 Any local network
5 ST 64 SATNET and backroom EXPAK
6 TCP 65 MIT subnet support
7 UCL 66-68 Unassigned
8 EGP (exterior gateway protocol) 69 SATNET monitoring
9 Secure 70 Unassigned
10 BBN RCC monitoring 71 Internet Packet core utility
11 NVP 72-75 Unassigned
12 PUP 76 Backroom SATNET monitoring
13 Pluribus 77 Unassigned
14 Telenet 78 WIDEBAND monitoring
15 XNET 79 WIDEBAND EXPAK
16 Chaos 80-254 Unassigned
17 User datagram 255 Reserved

Ap12.4 Options field in an IP header


The options field in an IP header is an optional field which may or may not appear in the
header, and is also variable in length. It is a field which must be implemented by all hosts and
gateways. There are two classes of option:

• An option-type byte.
• An option-type byte, followed by an option-length byte, and then the actual option-data
bytes. The option-length byte counts all the bytes in the options field.

The option-type byte is the first byte and has three fields, as illustrated in Figure £1.20. The
copied flag indicates that this option is (or is not) copied into all fragments on fragmentation.

1940 Handbook of Data Communications and Networks


Option classes
00- Control
01 - Resented

••
10 - Debugging
11 - Reserved

I I I I I
t t t t t t
Number
Copied flag
0- No copied 0- End of Option Ust (followed by 0 bytes)
1-Copied 1 - No operation (followed by 0 bytes)
2- Security (followed by 11 bytes)
3- loose Source Routing (followed by variable bytes)
4- Internet Timestamp (followed by variable bytes)
7 - Record Route (followed by variable bytes)
8- Stream 10 (followed by 4 bytes)
9 - Strict Source Routing (followed by variable bytes)

Figure E1.2 Options-type byte

2.2.1.1End of option list (Type= O)


This option indicates the end of the option list, but does not necessarily need to coincide with
the end of the IP header according to the internet header length. It is used at the end of all op-
tions, but not the end of each option. It may be copied, introduced, or deleted on
fragmentation, or for any other reason.

2.2.1.2No operation (type= 1)


This option may be used between options, and can be used to align the beginning of a subse-
quent option on a 32-bit boundary. It may be copied, introduced, or deleted on fragmentation,
or for any other reason.

2.2.1.3Security (type= 130)


This option allows hosts to send security, compartmentation, handling restrictions, and TCC
(closed user group) parameters. In this option, the Type field is a 2, and the Class field is also a
2. Thus the option-type byte has a value of 130 (0100 0010), and has 11 bytes in total. Its for-
mat is

+--------+--------+--- ... ---+--- 0. 0 ---+--- ... ---+--- ... ---+


llOOOOOlOIOOOOlOlliSSS SSSICCC CCC IHHH HHH I TCC
+--------+--------+--- ... ---+--- ... ---+--- ... ---+--- ... ---+

The fields are

• SSS ... SSS, security (16 bits) -These specify one of 16 levels of security, such as

00000000 00000000 - Unclassified 11110001 00110 101 - Confidential


01111000 10011010-EFTO 10111100 01001101- MMMM
01011110 00100110- PROG 10101111 000100 11 - Restricted
11010111 10001000- Secret 01101011 11000101 -Top Secret
00110101 11100010- Reserved 10011010 11110001- Reserved

Quick Reference 1941


01001101 01111000- Reserved 00100100 10111101 -Reserved
00010011 01011110- Reserved 10001001 10101111 -Reserved
11000100 11010110- Reserved 11100010 01101011 -Reserved

• CCC ... CCC, compartments (16 bits) -When this field contains all zero values then the
transmitted information is not compartmented, other values can be obtained from the De-
fense Intelligence Agency.

• HHH ... HHH, handling restrictions (16 bits)- This field is defined in the Defense Intelli-
gence Agency Manual DIAM 65-19.

• TCC, transmission control code (24 bits) - This field allows the segregation of traffic and to
define controlled communities of interest among subscribers (available from HQ DCA
Code 530). Must be copied on fragmentation.

2.2.1.4Loose source and record route (Type= 131)


Loose source and record route (LSRR) allows for the source of an internet datagram to supply
routing information to be used by the gateways in forwarding the datagram to the destination. It
can also be used to record routing information.
When routing the source host adds the IP addresses of the route to the route data, and each
gateway routes the datagram using the recorded route, and not with its own internal routing
table. This allows datagrams to take alternative routes through the Internet. Its format is

+--------+--------+--------+--------- ... --------+


1100000111 Length I Pointer! Route data
+--------+--------+--------+--------- ... --------+

where
• Length - this is a single byte which contains the number of bytes in the option field.
• Pointer - this is a pointer, which is relative to this option, into the route data which indi-
cates the byte which begins the next source address to be processed. The smallest value is 4.
• Route data - this is constructed with a number of internet addresses, each of 4 bytes in
length. If the pointer is greater than the length, the source route is empty (and the recorded
route full) and the routing is to be based on the destination address field.

When reaching the address in the destination address field, and when the pointer is not greater
than the length in the route data, then the next address in the source route data replaces the ad-
dress in the destination field. The pointer is also incremented by 4, to point to the next address.
It is loose as the gateways are allowed to use any route to get to the next specified address in the
routing table.
It must be copied on fragmentation and occurs, at the most, once in a datagram.

2.2.1.5Strict source and record route (Type= 137)


The SSRR is similar to the LSRR, but the routing must follow, exactly, the addresses in the
routing table. It thus cannot use any intermediate routes to get to these addresses. Its format is

1942 Handbook of Data Communications and Networks


+--------+--------+--------+--------- ... --------+
jlOOOlOOlj Length J Pointerj Route data
+--------+--------+--------+--------- ... --------+
2.2.1.6Record route (type= 7)
The record route option records the route of an internet datagram. It can thus be used by such
utilities as Traceroute. Its format is

+--------+--------+--------+--------- ... --------+


jOOOOOlllj Length J Pointerj Route data
+--------+--------+--------+--------- ... --------+
where
• Length- this is a single byte which contains the number of bytes in the option field.
• Pointer - this is a pointer, which is relative to this option, into the route data which indi-
cates the byte at which the next address should be added to. The smallest value is 4.
• Route data - contains a list of the route which a datagram has taken. Each entry has 4 bytes.
The originating host must reserve enough area for the total number of addresses in the rout-
ing table, as the size of this option does not change as it transverses over the Internet. If there
is a problem adding the address then an ICMP Parameter Problem can be sent back to the
source host.

It is not copied on fragmentation, and goes in the first fragment only. In addition, it occurs, at
the most, once in a datagram.

2.2.1.7lnternet timestamp (type= 68)


The Internet timestamp option records a timestamp for each gateway along the route of a data-
gram. It allows the source host to trace the time that each part of the route takes. Its format is

+--------+--------+--------+--------+
jOlOOOlOOj Length J Pointerjov jFlgj
+--------+--------+--------+--------+
internet address
+--------+--------+--------+--------+
timestamp
+--------+--------+--------+--------+

where

• Length. - is a single byte which contains the number of bytes in the option field (maximum
is 40).
• Pointer- this is a pointer, which is relative to this option, into the route data which indi-
cates the byte at which the next timestamp should be added to. The smallest value is 5.
• Overflow (Ov)- this has four bits and holds the number ofiP modules that cannot register
timestamps due to lack of space.

Quick Reference 1943


• Flag (Fig) - this has four bits and defines the format of the timestamp. Valid values are:

0 - Store only the time stamps as 32-bit words.


1 - Store IP address followed by a time stamp.
3 - In this mode the IP addresses are specified in a table. A gateway only adds its timestamp

if its IP address is in this table.

• Timestamp- this is a 32-bit value for the number of milliseconds since midnight UT (uni-
versal time). If this is not possible then it is any time, as long as the high-order bit of the
timestamp is set to a 1 to indicate that it is non-standard time.

The originating host must reserve enough area for the total number of timestamps, the size of
this option does not change as it transverses over the Internet. If there is a problem adding the
address then an ICMP parameter problem can be sent back to the source host. Initially the con-
tents of the timestamp data area is either zero, or has IP addresses with zero time stamps. The
timestamp area is full when the pointer is greater than the length.
It is not copied on fragmentation, and goes in the first fragment only. In addition, it occurs,
at most once in a datagram.

2.2.1.8Strearn identifier (type =136)


This option allows for a 16-bit SATNET stream identifier to be carried through networks that
do not suppon the stream concept. Its format is

+--------+--------+--------+--------+
I10001000I00000010I Stream ID
+--------+--------+--------+--------+

Ap12.2.2 Ethernet multicast/broadcast addresses


The following is a list of typical Ethernet multicast addresses:

Ethernet address Type .field Usage


01-00-5E-00-00-00 0800 Internet multicast (RFC-1112)
01-80-C2-00-00-00 0802 Spanning tree (for bridges)
09-00-09-00-00-01 8005 HPprobe
09-00-09-00-00-04 8005 HPDTC
09-00-1E-00-00-00 8019 Apollo DOMAIN
09-00-2B-00-00-03 8038 DEC lanbridge traffic monitor (LTM)
09-00-4E-00-00-02 8137 NovelliPX
CF-00-00-00-00-00 9000 Ethernet configuration test protocol

The following is a list of typical Ethernet broadcast addresses:

Ethernet address Type .field Usage


FF-FF-FF-FF-FF-FF 0600 XNS packets, hello or gateway search.
FF-FF-FF-FF-FF-FF 0800 IP (such as RWHOD with UDP)

1944 Handbook of Data Communications and Networks


FF-FF-FF-FF-FF-FF 0804 CHAOS
FF-FF-FF-FF-FF-FF 0806 ARP (for IP and CHAOS) as needed
FF-FF-FF-FF-FF-FF OBAD Banyan
FF-FF-FF-FF-FF-FF 1600 VALID packets, hello or gateway search.
FF-FF-FF-FF-FF-FF 8035 ReverseARP
FF-FF-FF-FF-FF-FF 807C Merit Internodal (INP)
FF-FF-FF-FF-FF-FF 809B EtherTalk

Ap12.3 Class Asu bnet masks


Table E1.2 Subnet masks for a Class A address

Binary subnet address Dotted Maximum Maximum


notation number of number ofhosts on
subnets each subnet
11111111.11000000.00000000.00000000 255.192.0.0 2 4,194,302
11111111.11100000.00000000.00000000 255.224.0.0 6 2,097,150
11111111.11110000.00000000.00000000 255.240.0.0 14 1,048,574
11111111.11111000.00000000.00000000 255.248.0.0 30 524,286
11111111.11111100.00000000.00000000 255.252.0.0 62 262,142
11111111.11111110.00000000.00000000 255.254.0.0 126 131,070
11111111.11111111.00000000.00000000 255.255.0.0 254 65,534
11111111.11111111.10000000.00000000 255.255.128.0 510 32,766
11111111.11111111.11000000.00000000 255.255.192.0 1,022 16,382
11111111.11111111.11100000.00000000 255.255.224.0 2,046 8,190
11111111.11111111.11110000.00000000 255.255.240.0 4,094 4,094
11111111.11111111.11111000.00000000 255.255.248.0 8,190 2,046
11111111.11111111.11111100.00000000 255.255.252.0 16,382 1,022
11111111.11111111.11111110.00000000 255.255.254.0 32,766 510
11111111.11111111. 11111111.00000000 255.255.255.0 65,534 254
11111111.11111111. 11111111.10000000 255.255.255.128 131,070 126
11111111.11111111. 11111111.11000000 255.255.255.192 262,142 62
11111111.11111111. 11111111.11100000 255.255.255.224 524,286 30
11111111.11111111. 11111111.11110000 255.255.255.240 1,048,574 14
11111111.11111111. 11111111.11111000 255.255.255.248 2,097,150 6
11111111.11111111. 11111111.11111100 255.255.255.252 4,194,302 2

Quick Reference 1945


Ap13 Abbreviations
M auto-answer
ML ATM adaptation layer
MN autonomously attached network
ABM asynchronous balanced mode
AbMAN Aberdeen MAN
ABNF augmented BNF
AC access control
ACAP application configuration access protocol
ACK acknowledge
ACL access control list
ADC analogue-to-digital converter
ADPCM adaptive delta pulse code modulation
ADPCM adaptive differential pulse code modulation
AEP Apple Talk Echo Protocol
AES audio engineering society
AFI authority and format identifier
AGENTX agent extensibility protocol
AGP accelerated graphics port
AM amplitude modulation
AMI alternative mark inversion
ANSI American National Standards Institute
APCM adaptive pulse code modulation
API application program interface
ARM asynchronous response mode
ARP address resolution protocol
ARPA Advanced Research Projects Agency
AS Autonomous system
ASCII American standard code for information exchange
ASK amplitude-shift keying
AT attention
ATM asynchronous transfer mode
AUI attachment unit interface
BCC blind carbon copy
BCD binary coded decimal
BGP border gateway protocol
BIOS basic input/ output system
B-ISDN broadband ISDN
BMP bitrnapped
BNC British Naval Connector
BOM beginning of message
BOOTP bootstrap protocol
BPDU bridge protocol data units
bps bits per second
BVCP Banyan Vines control protocol
CAD computer-aided design
CAN concentrated area network
CASE common applications service elements
CATNIP common architecture for the Internet
cc carbon copy
CCITI International Telegraph and Telephone Consultative
CD carrier detect
CD compact disk
CDE common desktop environment
CDFS CD file system
CD-R CD-recordable
CD-ROM compact disk- read-only memory
CF control field
CGI common gateway interface
CGM computer graphics metafile
CHAP challenge handshake authentication protocol
CHAP Challenge Handshake Authentication Protocol
CHARGEN character generator protocol
CIF common interface format
CMC common mail call
CMOS complementary MOS
CN common name
COM continuation of message
CON-MDS content-MDS header field
CPCS convergence protocol communications sublayer
CPI common part indicator
CPSR computer professionals for social responsibility
CPU central processing unit
CRC cyclic redundancy check
CRLF carriage return, line feed
CRT cathode ray tube
CSDN circuit-switched data network
CSMA carrier sense multiple access
CSMA/CA CSMA with collision avoidance
CSMA/CD CSMA with collision detection
CS-MUX circuit-switched multiplexer
CSPDN circuit-switched public data network
CTS clear to send
DA destination address
DAA digest access authentication
DAC digital-to-analogue converter
DAC dual attachment concentrator
DARPA Defense Advanced Research Projects Agency
DAS dual attachment station
DASS distributed authentication security
DAT digital audio tape
DAYTIME daytime protocol
dB decibel
DBF NetBEUI frame

1948 Handbook of Data Communications and Networks


DC direct current
DCC digital compact cassette
DCD data carrier detect
DCE data circuit-terminating equipment
DC-MIB dial control MIB
DCT discrete cosine transform
DD double density
DDE dynamic data exchange
DENI Department of Education for Northem Ireland
DES data encryption standard
DHCP dynamic host configuration program
DIB device-independent bitmaps
DIB directory information base
DISC disconnect
DISCARD discard protocol
DLC data link control
DLL dynamic link library
DM disconnect mode
DMA direct memory access
DNS domain name server
DNS-SEC domain name system security extensions
DOS disk operating system
DPCM differential PCM
DPSK differential phase-shift keying
DQDB distributed queue dual bus
DR dynamic range
DRAM dynamic RAM
DSN delivery status notifications
DSP domain specific part
DSS digital signature standard
DTE data terminal equipment
DTR data terminal ready
EASE embedded advanced sampling environment
EaStMAN Edinburgh/Stirling MAN
EBCDIC extended binary coded decimal interchange code
EBU European Broadcast Union
ECHO echo protocol
ECP extended communications port
EEPROM electrically erasable PROM
EF empty flag
EFF electronic frontier foundation
EFM eight-to-fourteen modulation
EGP exterior gateway protocol
EIA Electrical Industries Association
EISA extended international standard interface
EMF enhanced metafile
ENQ inquiry
EOM end of message

Abbreviations 1949
EOT end of transmission
EPP enhanced parallel port
EPROM erasable PROM
EPS encapsulated postscript
ESP IP encapsulating security payload
ETB end of transmitted block
ETHER-MIB ethernet MIB
ETX end of text
FAT file allocation table
PATMAN Fife and Tayside MAN
FAX facsimile
FC frame control
FCS frame check sequence
FDDI fiber distributed data interface
FDDI-MIB FDDI management information base
FDM frequency division multiplexing
FDX full duplex
FEC forward error correction
FF full flag
FFIF file format for internet fax
FIFO first in, first out
FINGER finger protocol
FM frequency modulation
FRMR frame reject
FS frame status
FSK frequency-shift keying
FTP file transfer protocol
FYI for your information
GFI group format identifier
GGP gateway-gateway protocol
GIF graphics interface format
GQOS guaranteed quality of service
GSSAP generic security service application
GUI graphical user interface
HAL hardware abstraction layer
HD high density
HDB3 high-density bipolar code no. 3
HDLC high-level data link control
HD1V high-definition television
HDX half duplex
HEFCE Higher Education Funding Councils of England
HEFCW Higher Education Funding Councils of Wales
HF high frequency
HMUX hybrid multiplexer
HPFS high performance file system
HTML Hypertext Mark-up Language
HTTP Hypertext Transfer Protocol
Hz Hertz

1950 Handbook of Data Communications and Networks


110 input/ output
lAS international alphabet no. 5
lAB Internet Advisory Board
lAP internet access provider
IARP inverseARP
IBM International Business Machines
ICMP internet control message protocol
ICP internet connectivity provider
IDEA international data encryption algorithm
!DENT identification Protocol
IDI initial domain identifier
IDP initial domain part
IDPR inter-domain policy routing
IEEE Institute of Electrical and Electronic Engineers
IEFF Internet Engineering Task Force
IFS installable file system
IGMP Internet group management protocol
IGMP Internet group multicast protocol
IGP interior gateway protocol
ILD injector laser diode
IMAC isochronous MAC
IMAP Internet message access protocol
lOS input/ output supervisor
IP Internet protocol
IP-ARC IP over ARCNET networks
IP-ARPA IP over ARPANET
IP-ATM IPoverATM
IP-CMPRS IP with compressed headers
IP-DC IP over DC Networks
IP-E IP over ethernet networks
IP-EE IP over experimental ethernet networks
IP-FDDI IP over FDDI networks
IP-FR IP over frame relay
IP-HC IP over hyperchannel
IP-HIPPI IP over HIPPI
IP-IEEE IP over IEEE 802
IP-IPX IP over IPX networks
IP-MTU path MTU discovery
IP-NETBIOS IP over NETBIOS
IPNG IP next generation
IPP internet presence provider
IP-SLIP IP over serial lines
IP-SMDS IP datagrams over SMDS
IP-TR-MC IP Multicast over token-ring LANs
IPV6-FDDI 1Pv6 over FDDI
1Pv6-Jumbo 1Pv6 Jumbograms
IPV6-PPP 1Pv6 over PPP
IP-WB IP over wideband network

Abbreviations 1951
IPX Internet packet exchange
IP-X.25 IPoveriSDN
IPX-IP IPXoveriP
IRQ interrupt request
ISA international standard interface
ISDN integrated services digital network
IS-IS immediate system to intermediate system
ISO International Standards Organization
ISP internet service provider
ITOT ISO transport service on top ofTCP
ITU International Telecommunications Union
JANET joint academic network
JFIF JPEG file interchange format
JISC Joint Information Systems Committee
JPEG Joint Photographic Expert Group
KDC key distribution centre
KERBEROS Kerberos network authentication service
LAN local area network
LAPB link access procedure balanced
LAPD link access procedure
LCN logical channel number
LDAP-URL LDAP URL Format
LD-CELP low-delay code excited linear prediction
LED light emitting diode
LGN logical group number
UP large IPX packets
LLC logical link control
LRC longitudinal redundancy check
LSL link support level
LSP link state protocol
LSRR loose source and record route
LZ Lempel-Ziv
LZW LZ-Welsh
MAC media access control
MAIL-MIB mail monitoring MIB
MAN metropolitan area network
MAP messaging API
MAU multi-station access unit
MD message digest
MDCT modified discrete cosine transform
MDI media dependent interface
MHS message handling service
MIB-11 management information base-II
MIC media interface connector
MIME multi-purpose internet mail extension
MUD multi -link interface driver
MODEM modulation/ demodulator
MOS metal oxide semiconductor

1952 Handbook of Data Communications and Networks


MPEG Motion Picture Experts Group
MPI multi-precision integer
MSL maximum segment lifetime
MTP multicast transport protocol
NAK negative acknowledge
NCP NetWare control protocols
NCSA National Center for Supercomputer Applications
NDIS network device interface standard
NDS Novell Directory Services
NETBEUI NetBIOS extended user interface
NETFAX network file format for the exchange of images
NHRP next hop resolution protocol
NIC network interface card
NICNAME whois protocol
NIS network information system
NLSP netware link-state routing protocol
NNTP network news transfer protocol
NRZI non-return to zero with inversion
NSAP network service access point
NSCA National Center for Supercomputing Applications
NSM-MIB network services monitoring MIB
NSS named service server
NTE network terminal equipment
NTFS NT file system
NTP network time protocol
NTSC National Television Standards Committee
ODI open data-link interface
OH off-hook
ONE-PASS one-time password system
OSI open systems interconnection
OSI-UDP OSITSon UDP
OSPF open shortest path first
QUI originator's unique identifier
PA point of attachment
PAL phase alternation line
PAP password authentication protocol
PC personal computer
PCM pulse code modulation
PCT personal communications technology
PDN public data network
PGP pretty good privacy
PHY physical layer protocol
PING packet Internet gopher
PISO parallel-in-serial-out
PKP public-key partners
PLL phase-locked loop
PLS physical signaling
PMA physical medium attachment

Abbreviations 1953
PMD physical medium dependent
POP3 post office protocol, Version 3
PO P-URL POP URL Scheme
ppp point-to-point protocol
PPP-AAL PPPoverAAL
PPP-CCP PPP compression control protocol
PPP-CHAP PPP challenge handshake authentication
PPP-EAP PPP extensible authentication protocol
PPP-HDLC PPP in HDLC framing
PPP-IPCP PPP control protocol
PPP-ISDN PPP over ISDN
PPP-UNK PPP link quality monitoring
PPP-MP PPP multilink protocol
PPP-NBFCP PPP NetBIOS frames control protocol
PPP-SNACP PPP SNA control protocol
PPP-SONET PPP over SONET/SDH
PPP-X25 PPPinX.25
PPSDN public packet-switched data network
PS postscript
PSDN packet-switched data network
PSE packet switched exchange
PSK phase-shift keying
PSTN public-switched telephone network
QAM quadrature amplitude modulation
QCIF quarter common interface format
QIC quarter inch cartridge
QoS quality of service
QT quicktime
QUOTE quote of the day protocol
RADIUS remote authentication dial-in service
RAID redundant array of inexpensive disks
RAM random-access memory
RD receive data
REJ reject
RFC request for comment
RGB red, green and blue
RI ring in
RIF routing information field
RIP routing information protocol
RIP2-MD5 RIP-2 MDS Authentication
RIP2-MIB RIP Version 2 MIB Extension
RIPNG-IPV6 RIPng for IPv6
RIP-TRIG Trigger RIP
RLE run-length encoding
RMON remote monitoring
RMON-MIB remote network monitoring MIB
RNR receiver not ready
RO ring out

1954 Handbook of Data Communications and Networks


ROM read-only memory
RPC remote procedure call
RPSL routing policy specification language
RR receiver ready
RSA Rivest, Shamir and Adleman
RSVP resource reservation protocol
RTF rich text format
RTMP routing table maintenance protocol
RTP real-time transport protocol
RTSP real-time streaming protocol
S/PDIF Sony/Philips digital interface format
SA source address
SABME set asynchronous balanced mode extended
SAC single attachment concentrator
SAP service advertising protocol
SAP! service access point identifier
SAR segment and reassemble
SARPDU segmentation and reassembly protocol data unit
SAS single attachment station
SASL simple authentication and security layer
SASL-ANON anonymous SASL mechanism
SB-ADCMP sub-band ADPCM
SCMS serial copy management system
SCSI small computer systems interface
SCSP server cache synchronization protocol
SD sending data
SD start delimiter
SDH synchronous digital hierarchy
SDIF Sony digital interface
SDLC synchronous data link control
SDNSDU secure domain name system dynamic update
SDP session description protocol
SECAM sequential couleur a memoire
SEL selector I extension local address
SHEFC Scottish Higher Education Funding Council
SIPO serial-in parallel-out
SIPP simple Internet protocol plus
SLM-APP system-level managed objects for applications
SLP service location protocol
SMDS switched multi-bit data stream
SMI structure of management information
SMP symmetrical multiprocessing
SMT station management
SMTP simple mail transfer protocol
SNA serial number arithmetic
SNA systems network architecture (IBM)
SND send
SNMP simple network management protocol

Abbreviations 1955
SNMP-AT SNMP over AppleTalk
SNMP-IPX SNMP over IPX
SNMP-OSI SNMP over OSI
SNR signal-to-noise ratio
SO NET synchronous optical network
SPKM simple public-keyGSS-API mechanism
SPX sequenced packet exchange
SQ1V studio-quality television
SRAM static RAM
SSL secure socket layer
SSM single sequence message
SSRR strict source and record route
STA spanning-tree architecture
STM synchronous transfer mode
STP shielded twisted-pair
SVGA superVGA
TCB transmission control block
TCC transmission control code
TCP transmission control protocol
TDAC time-division aliasing cancellation
TDM time-division multiplexing
TEl terminal equipment identifier
TELNET telnet protocol
TFTP trivial file transfer protocol
TIFF tag image flle format
TIFF tagged input flle format
TIME time server protocol
TIP transaction internet protocol
TMUX transport multiplexing protocol
TOS type of service
TP-TCP ISO transport service on top of the TCP
TR transmit data
TSR terminate and stay resident
TTL time-to-live
TUBA TCP and UDP with bigger addresses
UDP user datagram protocol
UI unnumbered information
UNI universal network interface
UNI user network interface
UPS uninterruptable power supplies
URI universal resource identifier
URL uniform resource locator
USB universal serial bus
USERS active users protocol
UTF-8 UTF-8 transformation format of ISO 10646
UTP unshielded twisted pair
uv ultra violet
VCI virtual circuit identifier

1956 Handbook of Data Communications and Networks


vco voltage controller oscillator
VCR video cassette recorder
VDD virtual device driver
VGA variable graphics adapter
VIM vendor-independent messaging
VLC-LZW variable-length-code LZW
VLM virtualloadable modules
VMM virtual machine manager
VRC vertical redundancy check
VRRP virtual router redundancy protocol
WAIS wide area information servers
WAN wide area network
WIMPs Wmdows, icons, menus and pointers
WINS Wmdows Internet name service
WINSOCK windows sockets
WORM write-once read many
www World Wide Web
XDR external data representation
XOR exclusive-OR
ZIP Zone Information Protocol

Abbreviations 1957
Ap14 Glossary

100Base-FX IEEE-defined standard for 100 Mbps Ethernet using multimode


fiber-optic cable.
100Base-TX {802.3u) IEEE-defined standard for 100 Mbps Ethernet using two pairs of
Cat-S twisted-pair cable.
100VG-AnyLAN HP-derived network architecture based on the IEEE 802.12 stan-
dard that uses 100 Mbps transmission rates. It uses a centrally
controlled access method referred to as the Demand Priority Proto-
col {DPP), where the end node requests permission to transmit and
the hub determines which node may do so, depending on the pri-
ority of the traffic.
lOBASE-T IEEE-defined standard for 10 Mbps Ethernet using twisted-pair
cables.
802.10 IEEE-defined standard for LAN security. It is sometimes used by
network switches as a VLAN protocol and uses a technique where
frames on any LAN carty a vinual LAN identification. For large
networks this can be modified to provided security over the Inter-
net.
802.12 Demand Priority Protocol
IEEE-defined standard of transmitting 100 Mbps over voice grade
(telephone) twisted-pair cabling. See 100VG-AnyLAN.
802.1d IEEE-defined bridging standard for Spanning Tree protocol that is
used to determine factors on how bridges {or switches) fotward
packets and avoid networking loops. Networks which use redun-
dant loops {for alternative routes) need to implement the IEEE
802.1d standard to stop packets from looping forever.
802.2 A set of IEEE-defined specifications for Logical Link Control
{LLC) layer. It provides some network functions and interfaces the
IEEE 802.5, or IEEE 802.3, standards to the transpon layer.
802.3 IEEE-defined standard for CSMA/CD networks. IEEE 802.3 is
the most popular implementation of Ethernet.
802.3u IEEE-defined standard for 100Mbps Fast Ethernet. It also covers a
technique called auto sensing which allows 100 Mbps devices to
connecting to 10 Mbps devices.
802.4 IEEE-defined token bus specifications.
802.5 IEEE-defined standard for token ring networks.
802.11 IEEE-defined standard for wireless networks.
AAL ATM adaptation layer. A service-dependent sublayer of the data
link layer, which accepts data from different applications and pre-
sents it to the ATM layer as a 48-byte ATM payload segment.
AALs have two sublayers: CS and SAR. There are four types of
AAL, recommended by the ITU-T, these are: AALl, AAL2,
AAL3/4, and AAL5.
AALl ATM adaptation layer 1. Connection-oriented, delay-sensitive ser-
vices requiring constant bit rates, such as uncompressed video and
other isochronous traffic.
AAL2 ATM adaptation layer 2. Connection-oriented services that sup-
port a variable bit rate, such as some isochronous video and voice
traffic.
AAL3/4 ATM adaptation layer 3/4. Connectionless and connection-
oriented links, but is primarily used for the transmission of SMDS
packets over ATM networks.
AAL5 ATM adaptation layer 5. Connection-oriented, VBR services, and
is used predominantly for the transfer of classical IP over ATM and
LANE traffic.
AARP AppleTalk Address Resolution Protocol. An AppleTalk protocol
which maps the data-link address to a network address.
AARP AppleTalk probe packets. Data packets which determine if a node
ID is being used by another node in a AppleTalk network. If the
node determines that the node ID is not being used, the node will
use it. If not, it will send out more AARP packets.
ABM Asynchronous Balanced Mode. An HDLC communication mode
supporting peer-oriented, point-to-point communications between
two nodes, where either station can initiate transmission.
ABR Available bit rate. A QoS class defined by the ATM Forum for
ATM networks. ABR is used for connections that do not require a
timing relationships between source and destination. It also pro-
vides no guarantees in terms of cell loss or delay, providing only
best-effort service.
Access list A list which is kept by Cisco routers which define the control ac-
cess for the router.
Access method The method that network devices use to access the network me-
dium.
Access server A communications device that allows the connection of asynchro-
nous devices, such as serial port terminals, to a LAN. It thus
converts an asynchronous protocol to a synchronous one.
Acknowledgment Notification sent from one network device to another to acknowl-
edge an event.
ACR Allowed cell rate. This is used in ATM and is used for traffic man-
agement.
ACSE Association control service element. This has been defined by the
OSI and is used to establish, maintain, or terminate a connection
between two applications.
Active hub Multiported device that amplifies LAN transmission signals.

1960 Handbook of Data Communications and Networks


Active monitor A device which is responsible for managing a Token Ring. A node
becomes the active monitor if it has the highest MAC address on
the ring, and is responsible for such management tasks, such as en-
suring that tokens are not lost, or that frames do not circulate
indefinitely.
Adapter Device which usually connects a node onto a network, normally
called a network interface adapter (NIC).
Adaptive cut-through switching
A forwarding technique on a switch which determines when the
error count on frames received has exceeded the pre-configured
limits. When this count is exceeded, it modifies its own operating
state so that it no longer performs cut-through switching and goes
into a store-and-forward mode. The cut-through method is ex-
tremely fast but suffers from the inability to check the CRC field.
Thus if incorrect frames are transmitted they could have severe ef-
fects on the network segment. This is overcome with an adaptive
cut-through switch by checking the CRC as the frame moves
through the switch. When errors become too great the switch im-
plements a store-and-forward method.
Adaptive delta modulation PCM
Similar to delta modulation PCM, but uses a number of bits to
code the slope of the signal.
Adaptive Huffinan coding Uses a variable Huffman coding technique which responds to local
changes in probabilities.
ADCCP Advanced Data Communications Control Protocol. An ANSI-
defined standard for a bit-oriented data link control protocol.
Address aging The time that a dynamic address stays in the address routing table
of a bridge or switch.
Addressed call mode A mode that uses control signals and commands to establish and
terminate calls in V.25bis.
Address resolution Resolves the data link layer address from the network layer address.
Address tables These are used by routers, switches and hubs to store either physi-
cal (such as MAC addresses} or higher-level addresses (such as IP
addresses). The tables map node addresses to network addresses or
physical domains. These address tables are dynamic and change
due to nodes moving around the network.
Address A unique label for the location of data or the identity of a commu-
nications device. This address can either be numeric or
alphanumeric.
Administrative distance Rating of the trustwotthiness of a routing information source (typi-
cally between 0 and 255). The higher the value, the lower the
trustwotthiness rating.
Address mask A combination of bits which define the address patt and the host
patt.

Glossary 1961
Address resolution A method which resolves differences in addressing schemes, typi-
cally between data link and network addresses.
Administrative distance Used on Cisco routers to define the trustworthiness of a routing
information source. It varies between 0 and 255, where 255 gives
the lowest trustworthiness rating.
Advertising Method used by routers where routing or service updates are sent
at specified intervals so that other routers on the network can
maintain lists of usable routes.
AEP AppleTalk Echo Protocol. This is used to test the connectivity be-
tween two AppleTalk nodes.
Agent A program which allows users to configure or fault-find nodes on a
network, and also a program that processes queries and returns re-
plies on behalf of an application.
Aging The removal of an address from the address table of a router or
switch that is no longer referenced to forward a packet.
A-law The ITU-T companding standard used in the conversion between
analog and digital signals in PCM systems. Used mainly in Euro-
pean telephone networks.
Alignment error In Ethernet, an error that occurs when the total number of bits of a
received frame is not divisible by eight.
AM Amplitude modulation. Modulation technique which represents
the data as the amplitude of a carrier signal.
ANSI American National Standards Institute. ANSI is a non-profit mak-
ing organization which is made up of expert committees that
publish standards for national industries.
ASCII American Standard Code for Information Interchange. An ANSI-
defined character alphabet which has since been adopted as a stan-
dard international alphabet for the interchange of characters.
AM Amplitude modulation. Information is contained in the amplitude
of a carrier.
ASK Amplitude-Shift Keying. Uses two, or more, amplitudes to
represent binary digits. Typically used to transmit binary over
speech-limited channels.
AppleTalk Series of communications protocols designed by Apple Computer.
Application layer The highest layer of the OSI model.
ARP Address Resolution Protocol. Internet protocol used to map an
IP address to a MAC address.
ARPA Advanced Research Projects Agency. Research and development
organization that is part of DoD. ARPA evolved into DARPA, but
have since changed back to ARPA.
ARPANET Advanced Research Projects Agency Network, which was devel-
oped in the 1970s (funded by ARPA, then DARPA).

1962 Handbook of Data Communications and Networks


ASN.l Abstract Syntax Notation One. OSI language for describing data
types independent of particular computer structures and repre-
sentation techniques.
Aaync:hronous tranJmiuion Transmission where individual characters are sent one-by-one.
Normally each character is delimited by a start and a stop bit. With
asynchronous communications the transmitter and receiver only
have to be roughly synchronized.
Asynchronous Communication which does not depend on a dock.
ATM Asynchronous Transfer Mode. Networking technology which in-
volves sending 53-byte fast packets (ATM cell), as specified by the
ANSI TIS I subcommittee. The first 5 bytes are the header and the
remaining bytes are the information field which can hold 48 bytes
of data. Optionally the data can contain a 4-byte ATM adaptation
layer and 44 bytes of actual data. The ATM adaptation layer field
allows for fragmentation and reassembly of cells into larger packets
at the source and destination respectively. The control field also
contains bits which specify whether this is a flow control cell or an
ordinary data cell, a bit to indicate whether this packet can be de-
leted in a congested network, and so on.
ATMForum Promotes standards-based implementation agreements for ATM
technology.
ATM layer Service-independent sublayer of the data link layer in an ATM
network. The ATM layer receives the 48-byte payload segments
from the AAL and attaches a 5-byte header to each, producing
standard 53-byte ATM cells.
Attenuation Loss of communication signal energy.
AUI Attachment unit interface. In Ethernet, it is the interface between
an MAU and a NIC (network interface card).
Automatic broadcast control
Technique which minimizes broadcast and multicast traffic flood-
ing through a switch. A switch acts as a proxy server and screens
previously resolved ARP. This eliminates broadcasts associated with
them.
Autonegotiation Technique used by an IEEE 802.3u node which determines
whether a device that it is receiving or transmitting data in one of a
number of Ethernet modes (lOOBase-TX, lOOBase-TX Full Du-
plex, 10Base-T, lOBase-T Full Duplex or 100Base-T4). When the
mode is learned, the device then adjusts to the required transmis-
sion speed.
Autonomous system A collection of networks which have a common administration and
share a common routing strategy. Each autonomous system is as-
signed a unique 16-bit number by the lANA
Autosensing Used by a 100Base-TX device to determine if the incoming data is
transmitted at 10 Mbps or 100 Mbps.

Glossary 1963
Back pressure Technique which slows the incoming data rate into the buffer of a
802.3 port preventing it from receiving too much data. Switches
which implement back pressure will transmit a jam signal to stop
data input.
Backbone cabling Cabling interconnects wiring closets, wiring closets, and be-
tween buildings.
Backbone The primary path for networked traffic.
Backoff The retransmission delay enforced when a collision occurs.
BACP Bandwidth allocation control protocol. Protocol which monitors
network traffic and allows or disallows access to users, depending
on their needs. It is awaiting approval by the IETF.
Bandwidth In an analogue system it is defined as the range of frequencies con-
tained in a signal. As an approximation it is the difference between
the highest and lowest frequency in the signal. In a digital trans-
mission system it is normally quoted as bits per second.
Baseband Data transmission using unmodulated signals.
BRI Basic rate interface. Connection between ISDN and the user. It has
three separate channels, one D-channel (which carries control in-
formation) and two B channels (which carry data).
Baud rate The number of signaling elements sent per second with RS-232, or
modem, communications. In RS-232 the baud rate is equal to the
bit-rate. With modems, two or more bits can be encoded as a single
signaling element, such as 2 bits being represented by four different
phase shifts (or one signaling element). The signaling element
could change its amplitude, frequency or phase-shift to increase the
bit-rate. Thus the bit-rate is a better measure of information trans-
fer.
BER Bit error rate. The ratio of received bits that contain errors.
BGP Border Gateway Protocol. Interdomain routing protocol that re-
places EGP.
Big-endian Method of storing or transmitting data in which the most signifi-
cant bit or byte is presented first.
Bit stuffing The insertion of extra bits to prevent the appearance of a defined
sequence. In HDLC the bit sequence 01111110 delimits the start
and end of a frame. Bit stuffing stops this bit sequence from occur-
ring anywhere in the frame by the receiver inserting a 0 whenever
there are five consecutive 1's transmitted. At the receiver if five
consecutive l's are followed by a 0 then the 0 is deleted.
BNC A commonly used connector for coaxial cable.
BOOTP A standard TCP/IP protocol which allows nodes to be dynamically
allocated an IP address from an Ethernet MAC address.
Border gateway Router that communicates with routers in other autonomous sys-
tems.

1964 Handbook of Data Communications and Networks


Bridge A device which physically links two or more networks using the
same communications protocols, such as Ethernet/Ethernet or to-
ken ring/token ring. It allows for the filtering of data between
network segments.
Broadband Data transmission using multiplexed data using an analogue signal
or high-frequency electromagnetic waves.
Broadcast address Special address reserved for sending a message to all stations. Gen-
erally, a broadcast address is a MAC destination address of all ones.
Broadcast domain Network where broadcasts can be reponed to all nodes on the net-
work bounded by routers. Broadcast packets cannot traverse a
router.
Broadcast storm Flood of broadcast packets generated by a broadcast transmission
where high numbers of receivers are targeted for a long period of
time.
Broadcast Data packet that will be sent to all nodes on a network. Broadcasts
are identified by a broadcast address.
BSD Berkeley Standard Distribution. Term used to describe any of a
variety of UNIX-type operating systems.
Buffer A temporary-storage space in memory.
Bus A network topology where all nodes share a common transmission
medium.
Byte A group of eight bits.
Capacity The maximum data rate in Mbps.
Cat-1 cable Used for telephone communications and is not suitable for trans-
mitting data.
Cat-2 cable Used for transmitting data at speeds up to 4 Mbps.
Cat-3 cable An EIA/TIA-568 wiring standard for unshielded or shielded
twisted pair cables. Up to lOMbps.
Cat-4 cable Used in Token Ring networks and can transmit data at speeds up
to 16 Mbps.
Cat-5 cable An EIA/TIA-568 wiring standard for unshielded or shielded
twisted-pair cables for the transmission of over 100 Mbps.
CBR Constant bit rate. QOS class defined by the ATM Forum for ATM
networks and is used for connections that depend on precise dock-
ing to ensure undistoned delivery.
CCITI' Consultative Committee for International Telegraph and Tele-
phone. International organization responsible for the development
of communications standards. Now named ITU-T.
CDP Cisco Discovery Protocol. Used in Cisco routers, bridges and
switches to pass information on the connected networks.
Cell relay Networking technology based on the use of small, fixed-size pack-
ets, or cells.

Glossary 1965
Cell The basic unit for ATM switching and multiplexing. Cells contain
identifiers that specify the data stream to which they belong. Each
cell consists of a 5-byte header and 48 bytes of payload.
CEPT Conference Europeenne des Postes et des Telecommunications.
Association
CHAP Challenge-handshake authentication protocol. Identification
method used by PPP to determine the originator of a connection.
Cheapernet IEEE 802.3 10Base2 standard.
Checksum An error-detection scheme in which bits are grouped to form inte-
ger values which are then summated. Normally, the negative of this
value is then added as a checksum. At the receiver, all the grouped
values and the checksum are summated and, in the absence of er-
rors, the result should be zero.
Circuit switching Switching system in which a dedicated physical circuit path must
exist between sender and receiver for the call duration
Cisco I OS software Cisco Internetwork Operating System software. Provides an oper-
ating system for a Cisco router.
Client Node or program that connects to a server node or program.
CLP Cell loss priority. Field in the ATM cell header that determines the
probability of a cell being dropped if the network becomes con-
gested.
Coaxial cable A transmission medium consisting of one or more central wire
conductors surrounded by an insulating layer and encased in either
a wire mesh or extruded metal sheathing. It supports RF frequen-
cies from 50 to about 500 MHz. It comes in either a 10-mm
diameter (thick coax) or a 5-mm diameter (thin coax).
Collapsed backbone Non-distributed backbone in which all network segments are inter-
connected by way of an internetworking device.
Collision domain The network area within which frames that have collided are
propagated. Repeaters and hubs propagate collisions, but switches,
bridges and routers do not.
Collision Occurs when one or more devices tty to transmit over an Ethernet
network simultaneously.
Connectionless Describes data transfer without the existence of a virtual circuit.
Connection-oriented Describes data transfer that requires the establishment of a virtual
circuit. See also connectionless.
Contention Access method in which network devices compete to get access the
physical medium.
Convergence The speed and ability of a group of internetworking devices run-
ning a specific routing protocol to agree on the topology of an
internetwork after a change in that topology.
CDDI Copper distributed data interface. FDDI over copper.

1966 Handbook of Data Communications and Networks


Cost An arbitrary value used by routers to compare different routes.
Typically it is measured by hop counts, rypical time delays or
bandwidth.
Count to infinity Occurs in routing algorirhrns that are slow to converge, where
routers continuously increment the hop count to particular net-
works. It is typically overcome by setting an arbitrary hop-count
limit.
CRC Cyclic Redundancy Check. An error-detection scheme.
Cross-talk Interference noise caused by conductors radiating electromagnetic
radiation to couple into other conductors.
CSMA/CD Carrier sense multiple access collision detect. Media-access method
in which nodes contend to get access to the common bus. If the
bus is free of traffic {Carrier Sense) any of the nodes can transmit
(Multiple Access). If two nodes gain access at the same time then a
collision occurs (Collision Detection). A collision then occurs, and
the nodes causing the collision then wait for a random period of
time before they retransmit. CSMA/CD access is used by Ethernet
and IEEE 802.3.
Cut sheet Rough diagram indicating where cable runs are located and the
numbers of rooms they lead to.
Cut-through switching Technique where a switching device directs a packet to the destina-
tion port{s) as soon as it receives the destination and source address
scanned from the packet header.
DARPA Defense Advanced Research Projects Agency. US government
agency that funded research for and experimentation with the
Internet.
Data link layer Second layer of the OSI model which is responsible for link, error
and flow control. It normally covers the framing of data packets,
error control and physical addressing. Typical data link layers in-
cludes Ethernet and FDDI.
Data stream All data transmitted through a communications line in a single
read or write operation.
Datagram Logical grouping of information sent as a network layer unit over a
transmission medium without prior establishment of a virtual cir-
cuit. IP datagrams are the primary information units in the
Internet.
DCE Data communications equipment. These are devices and connec-
tions of a communications network that comprise the network end
of the user-to-network interface, such as modems and cables.
Decorative raceway Wall-mounted channel with removable cover used to support hori-
zontal cabling.
Delta modulation PCM Uses a single-bit code to represent the analogue signal. A 1 is
transmission when the current sample increases its level, else a 0 is
transmitted. Delta modulation PCM requires a higher sampling
rate that the Nyquist rate, but the actual bit rate is normally lower.

Glossary 1967
Destination MAC address A 6-byte data unique of the destination MAC address. It is nor-
mally quoted as a 12-digit hexadecimal number (such as
A5:B2: 10:64:01 :44).
Destination network address
A unique Internet Protocol (IP) or Internet Packet Exchange (IPX)
address of the destination node.
Differential encoding Source coding method which is used to code the difference be-
tween two samples. Typically used in real-time signals where there
is limited change between one sample and the next, such as in au-
dio and speech.
Distance vector routing algorithm
Routing algorithms which use the number of hops in a route to
find a shortest-path spanning tree. With distance vector routing
algorithms, each router to send its entire routing table in each
update, but only to its neighbors. They be prone to routing loops,
but are relatively simple as compared with link state routing algo-
rithms.
DNS Domain Naming System. Used on the Internet to translated do-
main names into IP addresses.
Dot address Notation for IP addresses in the form <w.x.y.z> where each num-
ber represents, in decimal, 1 byte of the 4-byte IP address.
DQDB Distributed Queue Dual Bus. Data link layer communication
protocol, specified in the IEEE 802.6 standard, designed for use in
MANs.
DTE Data terminal equipment. Device at the user end of a user-network
interface that is a data source, destination, or both.
Dual homing Topology where devices connect to the network by two independ-
ent access points (points of attachment). One gives the primary
connection, and the other is the standby connection that is acti-
vated in the event of a failure of the primary connection.
Dynamic address resolution
Use of an address resolution protocol to determine and store ad-
dress information on demand.
DHCP Dynamic host control protocol. It manages a pool of IP addresses
for computers without a known IP address. This allows a finite
number of IP addresses to be reused quickly and efficiently by
many clients.
Dynamic routing Routing that adjusts automatically to network topology or traffic
changes.
E1 Wide-area digital transmission scheme that is used in Europe to
carry data at a rate of 2.048 Mbps.
Early token release Used in Token Ring networks that allows stations to release the
token onto the ring immediately after transmitting, instead of wait-
ing for the first frame to return.

1968 Handbook of Data Communications and Networks


EGP Exterior Gateway Protocol. Internet protocol for exchanging rout-
ing information between autonomous systems (RFC904). Replaced
byBGP.
EIA Electronic Industries Association. Specifies electrical transmission
standards.
EWTIA-232 Physical layer interface standard that supports unbalanced circuits
at signal speeds of up to 64 kbps.
EWTIA-449 Physical layer interface for rates up to 2 Mbps.
EWTIA-568 Characteristics and applications for UTP cabling.
EWTIA-606 Standard for the telecommunications infrastructure of commercial
buildings, such as terminations, media, pathways, spaces and
grounding.
Encapsulation Wrapping of data in a particular protocol header.
End system An end-user device on a network.
Entity An individual, manageable network device.
Entropy coding Coding scheme which does not take into account the characteris-
tics of the data and treats all the bits in the same way. It produces
lossless coding. Typical methods used are statistical encoding and
suppressing repetitive sequences.
Equalization Used to compensate for communications channel distortions.
Ethernet address 48-bit number that identifies a node on an Ethernet network.
Ethernet addresses are assigned by the Xerox Corporation.
Ethernet A local area network which uses coaxial, twisted-pair or fiber-optic
cable as a communication medium. It transmits at a rate of
10Mbps and was developed by DEC, Intel and Xerox Corpora-
tion. The IEEE 802.3 network standard is based upon Ethernet.
ETSI European Telecommunication Standards Institute. Created by the
European PTTs and the European Community (EC) for telecom-
munications standards in Europe.
Even parity An error-detection scheme where defmed bit-groupings have an
even number of 1's.
EBCDIC Extended Binary Coded Decimal Interchange Code. An 8-bit code
alphabet developed by IBM allowing 256 different bit parterns for
character definitions.
Exterior gateway protocol Any internetwork protocol that exchanges routing information
between autonomous systems.
Fast Ethernet See IEEE 802.3u standard.
Fat pipe Term used to indicate a high level of bandwidth the defined port.
FDDI Fiber Distributed Data Interface. A standard network technology
that uses a dual counter-rotating token-passing fiber ring. It oper-
ates at 100 Mbps and provides for reliable backbone connections.
File server Computer that allows the sharing of flies over a network.

Glossary 1969
FTP File transfer protocol. A protocol for transmitting flles between
host computers using the TCP/IP protocol.
Firewall Device which filters incoming and outgoing traffic.
Flow control Procedure to regulate the flow of data between two nodes.
Forward adaptive bit allocation
This technique is used in audio compression and makes bit alloca-
tion decisions adaptively, depending on signal content.
Fragment free cut-through switching
A modified cut-through switching technique where a switch or
switch module waits until it has received a large enough packet to
determine if it is error free.
FCS Frame check sequence. Standard error detection scheme.
Frame Normally associated with a packet which has layer 2 information
added to it. Packets are thus contained within frames. Frames and
packets have variable lengths as opposed to cells which have fixed
lengths.
FSK Frequency-shift Keying. Uses two, or more, frequencies to repre-
sent binary digits. Typically used to transmit binary data over
speech-limited channels.
Full duplex Simultaneous, two-way communications.
Gateway A device that connects networks using different communications
protocols, such as between Ethernet and FDDI. It provides proto-
col translation, in contrast to a bridge which connects two
networks that are of the same protocol.
GIF Standard image compression technique which is copyrighted by
CompuServe Incorporated. It uses LZW compression and supports
a palette of 256 24-bit colors (16.7M colors). GIF support local
and global color tables and animated images.
Half-duplex (HDX) Two-way communications, one at a time.
Handshake Messages or signals exchanged between two or more network de-
vices to ensure transmission synchronization.
Handshaking A reliable method for two devices to pass data.
HCC Horizontal cross-connect. Wiring closet where the horizontal ca-
bling connects to a patch panel which is connected by backbone
cabling to the main distribution facility.
HDLC ISO standard for the data link layer.
Hello packet Message transmitted fi:om a root bridge to all other bridges in the
network to constantly verify the Spanning Tree setup.
Heterogeneous network Network consisting of dissimilar devices that run dissimilar proto-
cols.
Hierarchical routing Routing based on a hierarchical addressing system. IP has a hierar-
chical structure as they use network numbers, subnet numbers, and
host numbers.

1970 Handbook of Data Communications and Networks


Holddown A router state where they will not advertise information on a spe-
cific route, nor accept advertisements about the route for a specific
length of time (the hold-down period). This time is used to flush
bad information about a route from all routers in the network, or
when a fault occurs on a route.
Hop count Used by the RIP routing protocol to measure the distance between
a source and a destination.
Hop The number of gateways and routers in a transmission path.
Host number Part of an IP address which identifies the node on a subnetwork.
Host A computer that communicates over a network. A host can both
initiate communications and respond to communications that are
addressed to it.
Hub A hub is a concentration point for data and repeats data from one
node to all other connected nodes. Hubs can be active (where they
repeat signals sent through them) or passive (where they do not re-
peat, but merely split, signals sent through them).
Huffinan coding Uses a variable length code for each of the elements within the
data. It normally analyses the probability of the element in the data
and codes the most probable with fewer bits than the least prob-
able.
Hybrid network Internetwork made up of more than one type of network technol-
ogy.
HTML Hypertext markup language. Standard language that allows the
integration of text and images over a distributed network.
lAB Internet Architecture Board. A group that discusses important mat-
ters relating to the Internet.
lANA Internet Assigned Numbers Authority. Organization which dele-
gates authority for IP address-space allocation and domain-name
assignment to the NIC and other organizations.
ICMP Internet Control Message Protocol. Used to report errors and pro-
vides other information relevant to IP packet processing.
IETF Internet Engineering Task Force. Consists of a number of working
groups which are responsible for developing Internet standards.
IGP Interior Gateway Protocol. Used to exchange routing information
within an autonomous system.
IGRP Interior Gateway Routing Protocol. Developed by Cisco for large
and heterogeneous networks.
ISDN Integrated systems digital network. Communication technology
that contains two data channels (2B) and a control channel (H). It
supports two 64 kbps data channels and sets up a circuit-switched
connection.
ITU-TSS International Telegraph Union Telecommunications Standards
Sector. Organization which has replaced the CCITT.
Internet address An address that conforms to the DARPA-defined Internet proto-

Glossary 1971
col. A unique, four byte number identifies a host or gateway on the
Internet. This consists of a network number followed by a host
number. The host number can be further divided into a subnet
number.
IETF Internet Engineering Task Force. A committee that reviews and
supports Internet protocol proposals.
Internet Connection of nodes on a global network which use a DARPA-
defined Internet address.
internet Two or more connected networks that may, or may not, use the
same communication protocol.
Intranet A company specific network which has additional security
against external users.
InverseARP Inverse Address Resolution Protocol. This is a method of building
dynamic routes in a network, and allows an access server to dis-
cover the network address of a device associated with a virtual
circuit.
IP (Internet Protocol) Part of the TCP/IP which provides for node addressing.
IP address An address which is used to identify a node on the Internet.
IP multicast Addressing technique that allows IP traffic to be propagated from
one source to a group of destinations.
IPX Internet Packet Exchange. Novell NetWare communications pro-
tocol which is similar to the IP protocol. The packets include
network addresses and can be routed from one network to another.
IPXaddress Station address on a Novell NetWare network. It consists of two
fields: a network number field and a node number field. The node
number is the station address of the device and the network num-
ber is assigned to the network when the network is started up. It is
written in the form: NNNNNNNN:XXXXXX-XXXXXX:, where
N's represent the network number and X's represent the station
address. An example of an IPX address is: DCI05333:542CIO-
FFI432.
ISO International Standards Organization.
Isochronous transmission Asynchronous transmission over a synchronous data link. Isochro-
nous signals require a constant bit rate for reliable transport.
ITU-T The Consultative Committee for International Telephone and
Telegraph (now known at the ITU-TSS) is an advisory committee
established by the United Nations. It attempts to establish stan-
dards for inter-country data transmission on a worldwide basis.
Jabber Occurs when the transmission of network signals exceeds the
maximum allowable transmission time (20 ms to 150 ms). The
medium becomes overrun with data packets. This is caused by a
faulty node or wiring connection.
Jitter Movement of the edges of pulse over time, that may introduce
error and loss of synchronization.

1972 Handbook of Data Communications and Networks


JPEG Image compression technique defined by the Joint Photographic
Expert Group OPEG), a subcommittee of the ISO/IEC. It uses a
DCT, quantization, run-length and Huffman coding.
Keep alive interval Time period between each keep alive message.
Latency Defines the amount of time between a device receiving data and it
being forwarded on. Hubs have the lowest latency (less than 10 J.Ls),
switches the next lowest (between 40J.Ls and 60J.Ls), then bridges
(200 J.lS to 300 J.Ls) and routers have the highest latency (around
1000J.Ls).
Learning bridge Bridge which learns the connected nodes to it. It uses this informa-
tion to forward or drop frames.
Leased line A permanent telephone line connection reserved exclusively by the
leased customer. There is no need for any connection and discon-
nection procedures.
Lempel-Ziv coding Coding method which takes into account repetition in phases,
words or parts of words. It uses pointers to refer to previously de-
fined sequences.
LZWcoding Lempel-Ziv Welsh coding. Coding method which takes into ac-
count repetition in phases, words or parts of words. It builds up a
dictionary of previously sent (or stored) sequences.
Line driver A device which converts an electrical signal to a form that is
transmit-table over a transmission line. Typically, it provides the
required power, current and timing characteristics.
Link layer Layer 2 of the OSI model.
Link segment A point-to-point link terminated on either side by a repeater.
Nodes cannot be attached to a link segment.
Link state routing algorithm Routing algorithm where each router broadcasts or multicasts in-
formation regarding the cost of reaching each of its neighbors to all
nodes in the internetwork. These algorithms create a consistent
view of the network but are much more complete that distance vec-
tor routing algorithms).
Little-endian Storage method in which the least byte is stored first.
LLC Logical Link Control. Higher of the two data link layer sublayers
defined by the IEEE, which provides error control, flow control,
framing, and MAC-sublayer addressing (IEEE 802.2).
Lossless compression Where information, once uncompressed, is identical to the original
uncompressed data.
Lossy compression Where information, once uncompressed, cannot be fully recovered.
LSA Link-state advertisement. Used by link-state protocols to advertise
information about neighbors and path costs.
MAC address A 6-byte data unique data-link layer address. It is normally quoted
as a 12-digit hexadecimal number (such as A5:B2:10:64:01:44).
Masking effect Where noise is only heard by a person when there are no other
sounds to mask it.

Glossary 1973
MDI Medium Dependent Interface. The IEEE standard for the twisted-
pair interface to lOBase-T (or lOOBase-TX}.
MAC Media Access Control. Media-specific access-control for Token
Ring and Ethernet.
MIC Media Interface Controller. Media-specific access-control for To-
ken Ring and Ethernet.
MAU Medium Attachment Unit. Method of converting digital data into
a form which can be transmitted over a band-limited channel.
Methods use either ASK, FSK, PSK or a mixture of ASK, FSK and
PSK.
Microsegmentation Division of a network into smaller segments. This helps to increase
aggregate bandwidth to network devices.
Modem Modulator-Demodulator. A device which converts binary digits
into a form which can be transmitted over a speech-limited
transmission channel.
MTU Maximum Transmission Unit. The largest packet that the IP pro-
tocol will send through the selected interface or segment.
Multicast Packets which are sent to all nodes on a subnet of a group within a
network. This differs from a broadcast which forwards packet to all
users on the network.
Multimode fiber Fiber-optic cable that has the ability to carry more than one fre-
quency (mode) of light at a time.
NDIS Network driver interface specification. Software specification for
network adapter drivers. It supports multiple protocols and multi-
ple adapters, and is sed in many operating systems, such as
Windows.
Network layer Third layer of the OSI model, which is responsible for ensuring
that data passed to it from the transport layer is routed and deliv-
ered through the network. It provides end-to-end addressing and
routing. It provides support for a number of protocols, including
IP, IPX, CLNP, X.25, or DDP.
NTI Network termination. Network termination for ISDN.
NFS Network File System. Standard defined by Sun Microsystems for
accessing remote file systems over a network.
NIS Network Information Service. Standard defined by Sun Microsys-
tems for the administration of network-wide databases.
NLM NetWare Loadable Module. Program that can be loaded into the
NetWare NOS.
Node Any point in a network which provides communications services or
where devices interconnect.
N-series connectors Connector used with thick coaxial cable.
Octet Same as a byte, a group of eight bits (typically used in communica-
tions terminology).

1974 Handbook of Data Communications and Networks


Odd parity An error-detection scheme where a defined bit-grouping has an
odd number of 1's.
ODLI Open Data-Link Interface. Software specification for network
adapter drivers used in NetWare and Apple networks. It supporrs
multiple protocols and multiple adapters.
Optical repeater A device that receives, restores, and re-times signals from one opti-
cal-fiber segment to another.
Packet switching Network switching in which data is processed in units of whole
packets rather than attempting to process data by dividing packers
into fixed-length cells.
Packet A sequence of binary digits that is transmitted as a unit in a com-
puter network. A packet usually contains control information and
data. They normally are contained with data link frames.
PAP Password authentication protocol. Protocol which checks a user's
password.
Patch panel An assembly of pin locations and porrs which are typically
mounted on a rack or wall bracket in the wiring closet.
PLL Phase-Locked Loop. Tunes into a small range of frequencies in a
signal and follows any variations in them.
PSK Phase-Shifr Keying. Uses two, or more, phase-shifts to represent
binary digirs. Typically used to transmit binary data over speech-
limited channels.
Physical layer Lowest layer of the OSI model which is responsible for the electri-
cal, mechanical, and handshaking procedures over the interface
that connects a device to a transmission medium
Ping Standard protocol used to determine if TCP/IP nodes are alive.
Initially a node sends an ICMP (Internet Control Message Proto-
col) echo request packet to the remote node with the specified IP
address and waits for echo response packets to return.
POP Point of presence. Physical access point to a long distance carrier
interchange.
ppp Point-to-point protocol. Standard protocol to transfer data over the
Internet asynchronously or synchronously.
Port Physical connection on a bridge or hub that connects to a network,
node or other device.
POST Power-on self test. Hardware diagnostics that runs on a hardware
device when that device is powered up.
Protocol Specification for coding of messages exchanged between two com-
munications processes.
Quantization Involves convening an analogue level into a discrete quantized
level. The number of bits used in the quantization process deter-
mines the number of quantization levels.
Quartet signaling Signaling technique used in 1OOVG-AnyLAN networks that allows
data transmission at 100 Mbps over frame pairs of UTP cabling.

Glossary 1975
Repeater A device that receives, restores, and re-times signals from one seg-
ment of a network and passes them on to another. Both segments
must have the same type of transmission medium and share the
same set of protocols. A repeater cannot translate protocols.
RARP Reverse address resolution protocol. The opposite of ARP which
maps an IP address to a MAC address.
RJ-45 Connector used with US telephones and with twisted-pair cables.
It is also used in ISDN networks, hubs and switches.
RMON An SNMP MIB that specifies the types of information listed in a
number of special MIB groups that are commonly used for traffic
management. Some of the popular groups used are Statistics, His-
tory, Alarms, Hosts, Hosts Top N, Matrix, Filters, Events, and
Packet Capture.
Routing node A node that transmits packets between similar networks. A node
that transmits packets between dissimilar networks is called a gate-
way.
RS-232C EIA-defined standard for serial communications.
RS-422,423 EIA-defined standard which uses higher transmission rates and
cable lengths than RS-232.
RS-449 EIA-defined standard for the interface between a DTE and DCE
for 9- and 37-way 0-type connectors.
RS-485 EIA-defined standard which is similar to RS-422 but uses a bal-
anced connection.
RLE Run-length encoding. Coding technique which represents long
runs of a certain bit sequence with a special character.
SAP Service Access Point. Field defined by the IEEE 802.2 specification
that is part of the address specification.
SAP Service Advertisement Protocol. Used by the IPX protocol to pro-
vide a means of informing network clients, via routers and servers
of available network resources and services.
Segment A segment is any length of LAN cable terminated at both ends. In
a bus network, segments are electrically continuous pieces of the
bus, connected by repeaters. It can also be bounded by bridges and
routers.
SLIP Serial line internet protocol. A standard used for the point-to-point
serial connections running TCP/IP.
Simplex One-way communication.
SNMP Simple Network Management Protocol. Standard protocol for
managing network devices, such as hubs, bridges, and switches.
Source encoding Coding method which takes into account the characteristics of the
information. Typically used in motion video and still image
compression.

1976 Handbook of Data Communications and Networks


Statistical encoding Where the coding analyses the statistical pattern of the data.
Commonly occurring data is coded with a few bits and uncommon
data by a large number of bits.
Suppressing repetitive sequences
Compression technique where long sequences of the same data is
compressed with a shon code.
Switch A very fast, low-latency, multipon bridge that is used to segment
local area networks.
Synchronous Data which is synchronized by a dock.
T1 Digital WAN carrier facility for 1.544 Mbps transmission.
TCP Pan of the TCP/IP protocol which provides an error-free connec-
tion between two cooperating programs.
TCP/IP Internet An Internet is made up of networks of nodes that can communi-
cate with each other using TCP/IP protocols.
Telnet Standard program which allows remote users to log into a station
using the TCP/IP protocol.
TIFF Graphics format that suppons many different types of images in a
number of modes. It is supponed by most packages and, in one
mode, provides for enhanced high-resolution images with 48-bit
color.
Time to live A field in the IP header which defines the number of routers that a
packet is allowed to traverse before being discarded.
Token A token transmits data around a token ring network.
Topology The physical and logical geometry governing placement of nodes
on a network.
Transceiver A device that transmits and receives signals.
Transform encoding Source-encoding scheme where the data is transformed by a
mathematical transform in order to reduce the transmitted (or
stored) data. A typical technique is the discrete cosine transform
(DCT) and the fast Fourier transform (FFT).
Transport layer Founh layer of the OSI model. It allows end-to-end control of
transmitted data and the optimized use of network resources.
UART Universal asynchronous receiver transmitter. Device which con-
verts parallel data into a serial form, which can be transmitted over
a serial line, and vice-versa.
V.24 ITU-T-defined specification, similar to RS-232C.
V.25bis ITU-T specification describing procedures for call set-up and dis-
connection over the DTE-DCE interface in a PSDN.
V.32N.32bis ITU-T standard serial communication for bi-directional data
transmissions at speeds of 4.8 or 9.6 Kbps, or 14.4 Kbps for
V.32bis.
V.34 Improved v.32 specification with higher transmission rates
(28.8 Kbps) and enhanced data compression.

Glossary 1977
V.35 ITU-T standard describing a synchronous, physical layer protocol
used for communications between a network access device and a
packet network.
V.42 ITU-T standard protocol for error correction.
VLC-LZW code Variable-length-code LZW code. Uses a variation of LZW coding
where variable-length codes are used to replace patterns detected in
the original data.
Vertical cabling Backbone cabling.
Virtual circuit Logical circuit which connects two networked devices together.
Workgroup Collection of nodes on a LAN which exchange data with each
other.
X.121 ITU-T standard for an addressing scheme used in X.25 networks.
X.21 ITU-T-defined specification for the interconnection ofDTEs and
DCEs for synchronous communications.
X.21bis ITU-T standard for the physical layer protocol for communication
between DCE and DTE in an X.25 network.
X.25 ITU-T-defined for packet-switched network connections.
X.28 ITU-T recommendation for terminal-to-PAD interface in X.25
networks.
X.29 ITU-T recommendation for control information in the terminal-
to-PAD interface used in X.25 networks.
X.3 ITU-T recommendation for PAD parameters used in X.25 net-
works.
X.400 ITU-T recommendation for electronic mail transfer.
X.500 ITU-T recommendation for distributed maintenance of files and
directories.
X3T9.5 ANSI Task Group definition of FOOl.
X-ON/X-OFF The Transmitter On/ Transmitter Off characters are used to con-
trol the flow of information between two nodes.

1978 Handbook of Data Communications and Networks


Ap15 Intrusion Detection Reference

The associated CD contains a version of Snon (www.snon.org), which is Snon (one of the most widely
used Intrusion Detection Systems. The format of the alen is:

alert protocol sourcenet sourceort- > destinationnet destinationport (rule)

An example of arrack responses is:

# (C) Copyright 2001,2002, Martin Roesch, Brian Caswell, et al.


# All rights reserved.
# $Id: attack-responses.rules,v 1.24 2003/10/20 15:03:04 chrisgreen Exp $
# ----------------
# ATTACK RESPONSES
# ----------------
# These signatures are those when they happen, its usually because a machine
# has been compromised. These should not false that often and almost always
# mean a compromise.

alert tcp $HOME_NET any-> $EXTERNAL_NET any (msg:"ATTACK-RESPONSES directory


listing"; content: "Volume Serial Number"; flow:from_server,established;
classtype:bad-unknown; sid:1292; rev:7;)
alert tcp $HTTP_SERVERS $HTTP_PORTS -> $EXTERNAL_NET any (msg:"ATTACK-
RESPONSES command completed"; content:"Command completed"; nocase;
flow:from_server,established; classtype:bad-unknown; sid:494; rev:6;)
alert tcp $HTTP_SERVERS $HTTP_PORTS -> $EXTERNAL_NET any (msg:"ATTACK-
RESPONSES command error"; content:"Bad command or filename"; nocase;
flow:from_server,established; classtype:bad-unknown; sid:495; rev:6;)
alert tcp $HTTP SERVERS $HTTP PORTS-> $EXTERNAL NET any (msg:"ATTACK-
RESPONSES file-copied ok"; .;Qntent:"1 file(s) c-;pied"; nocase;
flow:from_server,established; classtype:bad-unknown; sid:497; rev:6;)
alert tcp $HTTP SERVERS $HTTP PORTS-> $EXTERNAL NET any (msg:"ATTACK-
RESPONSES Invalid URL"; cont~nt:"Invalid URL"; -;_ocase;
flow:from server,established; refer-
ence:url,~w.microsoft.com/technet/security/bulletin/MS00-063.asp;
classtype:attempted-recon; sid:1200; rev:B;)
alert tcp $HTTP SERVERS $HTTP PORTS-> $EXTERNAL NET any (msg:"ATTACK-
RESPONSES inde~ of /cgi-bin( response"; flow: from server, established; con-
tent:"Index of /cgi-bin/"; nocase; reference:ness;:;:s,10039; classtype:bad-
unknown; sid:1666; rev:5;)
alert tcp $HTTP SERVERS $HTTP PORTS-> $EXTERNAL NET any (msg:"ATTACK-
RESPONSES 403 Forbidden"; flow: from_server, established; content: "HTTP/1.1
403"; depth:l2; classtype:attempted-recon; sid:1201; rev:7;)
alert ip any any -> any any (msg: "ATTACK-RESPONSES id check returned root";
content: "uid=O(root)"; classtype:bad-unknown; sid:498; rev:4;)
alert ip $HOME_NET any-> $EXTERNAL_NET any (msg:"ATTACK-RESPONSES id check
returned userid"; content:"uid=="; byte_test:5,<,65537,0,relative,string;
content:" gid="; distance:O; within:15;
byte_test:5,<,65537,0,relative,string; classtype:bad-unknown; sid:1882;
rev:9;)
alert tcp $HOME_NET 8002 -> $EXTERNAL_NET any (msg:"ATTACK-RESPONSES oracle
one hour install"; flow:from server,established; content:"Oracle Applica-
tions One-Hour Install"; classtype:bad-unknown; sid:1464; rev:3;)
alert tcp $HOME_NET 749 -> $EXTERNAL_NET any (msg: "ATTACK-RESPONSES success-
ful kadmind buffer overflow attempt"; flow:established,from_server;
content:"*GOBBLE*"; depth:B; reference:cve,CAN-2002-1235; refer-
ence:url,www.kb.cert.org/vuls/id/875073; classtype:successful-admin;
sid:1900; rev:3;)
alert tcp $HOME_NET 751 -> $EXTERNAL_NET any (msg:"ATTACK-RESPONSES success-
ful kadmind buffer overflow attempt"; flow:established,from_server;
content:"*GOBBLE*"; depth:8; reference:cve,CAN-2002-1235; refer-
ence:url,www.kb.cert.org/vuls/id/875073; classtype:successful-admin;
sid:1901; rev:3;)
alert tcp $HOME_NET 22 -> $EXTERNAL_NET any (msg:"ATTACK-RESPONSES successful
gobbles ssh exploit (GOBBLE)"; flow:from server,established; con-
tent:"l2a!GOBBLEI2al"; reference:bugtraq-;-5093; classtype:successful-admin;
sid:1810; rev:3;)
alert tcp $HOME NET 22 ->$EXTERNAL NET any (msg:"ATTACK-RESPONSES successful
gobbles ssh exploit (uname) "; flo.i: from_server, established; content: "uname";
reference:bugtraq,5093; classtype:misc-attack; sid:1811; rev:3;)
alert tcp $HOME_NET 512 -> $EXTERNAL_NET any (msg:"ATTACK-RESPONSES rexec
username too long response"; flow:from_server,established; content:"username
too long"; offset:O; depth:17; classtype:unsuccessful-user; sid:2104;
rev:2;)
alert tcp $HOME NET !21:23 -> $EXTERNAL NET any (msg:"ATTACK-RESPONSES Micro-
soft cmd. exe b-;_nner"; flow: from serve~ established; content: "Microsoft
Windows"; content:" (C) Copyright 1985-"; distance:O; content:"Microsoft
Corp."; distance:O; reference:nessus,11633; classtype:successful-admin;
sid:2123; rev:1;)

Other examples of given on the CD.

1980 Handbook of Data Communications and Networks


Index

01111110,868,869,872,882-885,1526,1734, address resolution, 1069, 1957


1960 addressable memoty, 16,439,469, 563, 817
1000BASE,780,789-792 addressing modes, 602
100BASE,780-792,799,814 ad-hoc,905,907,910,913
100BASE-FX, 782 ADPC~,859,888, 1884,1943,1951

100BASE-T4, 782, 784, 785, 799 AES, 913, 1943


100BASE-1JC, 780,782,783,786,787,791,814 AFI, 903,904, 1943
100\TG-Any~. 782,783,786,787,806,1404, AGP, 1, 444,445,488, 509, 510, 511, 512, 513,
1526, 1955, 1971 518,522,595,596,597,598,599,600,601,602,
10BASE2,739,780,781 603,604,605,606,1943
10BASE5, 780,781 address mapping, 606
10BASE-FL, 780 connections, 600
10BASE-T,739,780-784,787 graphics aperture, 606
3DES, 1236 master configuration, 600
4B/5B,834,836,837, 1525 memory address ranges, 606
802.11b,905,907,909-911,913 PCI, 488, 518, 596
802.2, 775, 776, 1021, 1026, 1040, 1487, 1955, AIP,489,494,495,502
1972 alphabet shifting, 1226
802.3ab, 790 ~I,879,880, 1943

8B/10B, 789, 790 amplitude modulation, 1943, 1950


8B6T, 785, 1527, 1528 APIC,489,490,518,521, 1791
8-to-14 bit modulation, 1525, 1945 applet, 1099, 1103-1109
AA, 1243, 1263, 1264, 1563, 1564, 1735, 1928, AppleTalk, 63,735, 1038, 1075, 1148, 1156, 1159,
1943 1430, 1442, 1443, 1943, 1952, 1958
AAL application layer, 701, 706, 729, 730, 732, 736, 1004,
AAL1,859, 1956 1063, 1958
functionality, 859 application level gateway, 1188, 1189
service levels, 858 arbitration timing diagram, 456
services, 859 ARC, 1947
type 2, 859 ARP,613, 741,793-797,997,1024,1069,1072,
type 3/4, 859, 860 1146, 1148, 1150, 1151, 1154, 1159, 1407, 1408,
type 5, 861 1461, 1872, 1882, 1885, 1928, 1941, 1943, 1947,
AAL1,859, 1956 1958, 1959, 1968, 1972
ACK, 650, 702, 709, 710, 867, 886, 1004-1006, ASCII, 18,21,592,619,636,678-682,686,1066,
1011, 1013, 1014, 1015, 1733, 1943 1111,1230-1235,1253,1254-1259,1349,1350-
acknowledgement and windowing, 1001 1361, 1469, 1483, 1639, 1733, 1735, 1930, 1943,
acknowledgement number, 1027 1958
Active X, 1274, 1670 BEL, 1733
adaptation layer, 850, 857, 1943, 1959 CR,681, 1350,1352,1353,1363,1733
adaptive huffman, 1957 DC1, 618, 1733
ADC,25,656,667,697, 1519,1943 DC2, 1733
address field, 572, 679, 740, 741, 773, 778, 794, 797, DC3, 1733
839,851,869,882,883,903,967,990,995,1172, DC4, 618, 1733
1938 EC>T,867, 1353,1365,1733,1946
address filtering, 1187 FF,683, 684,685,686,741,792,793,795,798,
803, 827, 838, 997, 1360, 1562, 1563, 1564, auditlog,864, 1193,1449
1565, 1733, 1736, 1928, 1940, 1941, 1946 audit policy, 1449
HT, 1733 authentication, 909,921, 984-986, 1173, 1180,
LF,681, 1351-1353,1363,1733 1191, 1198, 1221, 1235, 1252, 1259-1262, 1265,
NUL, 1733 1267, 1268, 1271, 1272, 1274, 1383, 1385, 1388,
SUB, 1733 1395, 1430, 1670, 1944, 1948-1951, 1962, 1971
VT, 1733 auto Halt Powerdown, 1790
ASK, 1943, 1958, 1970 autonomous systems, 915,917,1180,1174,1181,
ASP,929,930,932, 1629-1652,1661,1662,1664, 1182
1667-1671, 1674 AVI, 1367, 1883
asymmetric switches, 814 backbone, 723, 743, 763, 771, 780, 781, 789, 791,
~chronous,51,443,549,579,580, 718,838,839, 814,820,821,840,841,907,1177,1962,1965,
868,871,873,884,894,921,1725,1943,1951, 1966
1959, 1973 balanced lines, 629
asynchronous transfer, 579 bandwidth, 27,447, 504, 513, 571, 573, 578, 579,
AT,60,439,530, 532,768,783,864,1020,1246, 580,595,596,609-614,691,696,733,735,760,
1723, 1726, 1879. 1943, 1952 761,771,785,788-791,814,815,817,819,847,
AT~. 1,609,610,612,613, 771,788,806,814, 856,862,863,864,887,913,916,921,922,1161,
817,845-864,867,877,891,905,915,935,941, 1163, 1166,1167,1170, 1176, 1960,1963, 1965,
949, 1000, 1043, 1063, 1141, 1161, 1874-1884, 1970
1943, 1947, 1955, 1956, 1959, 1961, 1962 Base-64, 1253
adaptation layer, 850, 857, 1943, 1955, 1956, baud,610,618,627, 1960
1959 Bell,3,60,485, 1457,1723,1727
cells, 850, 852, 857, 1959 BER, 1960
data link, 857 BGP, 740, 1018,1166,1177,1178,1180-1183,
flow control, 862 1430, 1943, 1960, 1965
gateway, 857 specification, 1180
header (GFC), 851, 852, 1365 big endian, 17, 18
header (VPI), 852, 853, 854, 855, 856, 857 biod, 1431, 1432
ISDN and PC~-TD~. 849 BIOS,8,55,58,456,467,504,522,528, 536,537,
OSI model, 857-859 546,573,642,643,662,674,1943
over IP, 1947, 1956 BIOS printer, 642, 643
physical layer, 857, 858 B-ISDN, 877, 878
pipe, 862 BIST, 467
routing, 850 bit shift, 710, 1234
routing cells, 850 bit stuffing, 709, 711, 883, 1960
routing protocols, 856 B~P. 25, 1943
signaling and call set-up, 854 BNC,30, 739,771,780,781,800,1511,1943,1960
signaling packets, 855 BOOTP, 988, 989, 1404, 1017, 1406-1409, 1430,
switches, 851, 855, 862 1461, 1872, 1879. 1885, 1943, 1960
UNI, 850, 852, 854, 855, 857, 862, 1876, 1883, bridge, 450, 453, 454, 456, 467-470, 478, 481, 489,
1884, 1952 499,504,506,509,510,511,512,573,575,578,
VCI header, 851 596,603,604,605,613,723,737-741,743,790,
virtual channel and paths, 852 792,798,806,814,816,833,913,963,964,981,
attachment stations, 841 982, 1028,1064,1065,1066,1159,1492, 1792,
attenuation, 28-31, 629,738, 754, 760, 761, 764, 1793, 1940, 1943, 1955, 1957. 1961, 1962, 1966-
767,843,845,846,1509-1511,1519,1520,1534, 1973
1731, 1959

1982 Handbook of Data Communications and Networks


cable, 27, 611,753,763, 830 Centronics, 641, 642,653, 656, 663,665,667, 675
characteristics, 28, 1509 CGI, 1543, 1616, 1642, 1944
impedance, 781 channel identification, 886
multimode, 611 character alphabet, 1958
single-mode, 611 characteristic impedance, 28-30, 629, 754, 755, 779,
standards, 762 830, 1509, 1510, 1511, 1531, 1532, 1534, 1535,
testing, 7 67 1536, 1537, 1538, 1539, 1540
types,27, 733,737,781,830,1509 checksum,850,852, 1007,1008,1024,1265,1490,
cabling, 697, 730, 733, 752, 753, 755, 762-791, 820, 1875, 1962
830,915, 1955, 1963, 1965, 1966, 1971, 1974 CIF, 1944, 1946
backbone, 763, 1960, 1974 ciphertext, 1249, 1254
coaxial, 28, 615, 732, 752, 754, 755, 763, 779, circuit-switched, 843, 844, 849, 877, 878, 891, 1370,
780, 789, 1960, 1970 1944, 1967
horizontal, 762 cisco discovery protocol, 1156
vertical, 763, 820 cladding, 758,759,760,840, 1517, 1518, 1519
cache,450,468,475,483,487,488,489,492,493, client-server, 23, 31, 33, 34,609, 613, 815,988,
494,499-504,509,522,528,530,600,793,1146, 1063, 1088, 1101, 1114, 1370, 1346, 1376, 1406,
1149, 1153, 1156, 1160, 1375, 1377, 1380, 1383, 1441, 1442, 1457
1385, 1407, 1413, 1427, 1652, 1777, 1783, 1784, clipper chip, 1224, 1237
1785, 1787, 1788, 1790-1792, 1879, 1883, 1951 corucial,27-30,615, 732,746,749,752-755,762,
architecture, 1788 763,772,778-780,789,800,829,1144,1509-
control, 494, 503 1511, 1531, 1535, 1960, 1962, 1965, 1970
control register, 503 codec, 517
L-1/2, 1790, 1791 codes
Level-2, 493, 503 cyclic, 852
look-through, 1788, 1789 ~edback,24,620,801, 862,863
write-back, 1788 collision, 691, 734, 749-751, 772, 774, 775, 778,
write-through, 1788 779,782,783,789,792,800,885,1944,1960,
CAN, 690,691,705-714, 1733, 1944 1963
cancellation, 754, 755 collision detection, 734, 749,772, 1944
capacitance, 28, 1510 COM1,57,58,446,494,498,563,583,618,622,
capacity, 529, 1961 634-638,644
carriage return, 642,679, 1350, 1360, 1835, 1944 COM2,57,58,446,494,498,563, 568,583,635,
Cat-1/2, 762, 1961 644
Cat-3/4, 28-31, 762, 782, 784, 785, 825, 830, 831, combinations, 5, 13, 14, 1198, 1227, 1228, 1229,
1510--1512, 1527, 1528, 1961 1525, 1529
Cat-5, 28-31,762,765,767,782,783,790,791, communications model, 26
806,825,830,831, 1510-1512, 1955, 1961 companding, 1958
CD-DA, 539, 547 compress, 919, 1159, 1386, 1465, 1473, 1475
CD-E, 539, 547 compressed images, 1367
CDFS, 1437, 1646, 1944 compression, 4, 542, 660, 672, 863, 887, 888, 1159,
CD-I, 547 1252, 1253, 1380, 1384, 1386, 1450, 1727, 1950,
CDP, 1156, 1157, 1159, 1961 1966, 1969, 1972, 1973
CD-ROM, 3, 10, 23, 32, 33, 63, 445, 446, 447, 525, computational difficulry, 1222
527,528,529,534,538,539,540,547,549,563, concentrator, 744,745,750,841, 1944, 1951
571,613,641,654,658,665,670,788,1200, connection-oriented, 613, 736, 737, 848, 859, 860,
1647, 1944 1001, 1004, 1026, 1035, 1036, 1443, 1490, 1956,
disk format, 539 1962

Index 1983
content advisor, 1272, 1273 data rate, 439,444,446,447,448,451,452,488,
contention, 57, 749, 771, 786, 787, 789, 814 501,528,571,572,575.577,580,596,630,781,
control field, 559, 701-703, 709, 710, 775-777, 826, 843
827,838,850,852,867,869-871,873,874,882- database, 1607, 1616, 1618, 1622, 1623, 1664, 1670
884, 1383, 1944, 1959 datagram, 965-968, 985, 986, 991, 1005, 1008,
control register, 568, 586, 587, 590, 644, 660, 663 1020, 1038, 1039, 1066, 1102, 1417, 1442, 1487,
control signals, 1785 1952
control token, 747, 748, 825, 826, 827 datastream-oriented, I 004
cookies, 1548, 1549, 1559, 1561, 1607, 1637-1641, dB,28,29,30,31, 761,1509-1512,1520,1944
1651, 1652, 1671 DB25S, 615
co-operative multitasking, 46, 47 DC balancing, 880, 881
CPU, 10, 37, 77, 80,475,499, 500, 513, 573, 596, DCD, 1724, 1945
606,718,919,1506,1548,1549,1672,1944 DCE, 615,616,620,621, 627,892, 893, 1725,
CR, 1350, 1352, 1353 1875, 1945, 1963, 1972, 1973, 1974
CRC, 572, 580, 679, 681, 682, 686, 709, 710, 711, D-channel contention, 885
773,774,789,826,839,860,861,872,885,1155, DCT, 1945, 1969, 1973
1944, 1957, 1963 DD, 497, 547,794,795, 1263, 1264, 1564, 1736,
crossed-pair, 767 1760, 1762, 1945
crosstalk, 23, 28, 30, 31,754,755,760, 767,791, deadlock, 41, 65
792, 1509, 1511, 1512, 1520, 1963 debugger, 1625
cryptographic keys, 1219, 1224 DECNET, 724, 1003
CSDN, 891, 1944 Demand Prioriry Access Method, 786
CSMAJCD, 692, 749, 750, 772, 778, 788, 789, 806, demand-paged, 53
814,906,1944,1955.1963 demodulator, 1948
Ctrl-Alt-Del, 80 DES, 1220, 1222, 1236-1239, 1242, 1247, 1248,
CTS, 616,618,619,620,910, 1725, 1730, 1731, 1875, 1884, 1945
1944 mangler function, 1236, 1240, 1242, 1244
cut sheet, 766, 1963 overview, 1237
cut-through switching, 816, 1963 S-box, 1240-1242
cyclic redundancy check, 536, 580, 773, 774, 826, Triple DES, 1242
872, 885, 1944, 1963 desktop switch, 814, 815
cylinders, 527, 536, 537,758, 1517 device driver, 43-45, 54, 573, 1442, 1935, 1953
DAS, 841, 842, 1944 DHCP, 985,988,989, 1071, 1149, 1405-1412,
data 1447, 1879, 1881, 1885, 1945, 1964
compression, 736, 1727, 1731, 1875, 1973 DIB,52,988, 1396,1410,1945
computer-rype, 541, 847, 848, 864, 877 dictionary, 695, 1198, 1431, 1969
rypes, 694 dielectric, 30,758, 1511, 1517, 1535
data frame, 709-711,730,734-739, 746-748,751, differential encoding, 1964
753,771,772,776,792,794,795,798,816,817, Diffie-Hellman, 1247, 1259, 1261
818,820,825-827,834,837,838,840,843,844, digital audio, 1923, 1924
858,872,910,964,1064 digital cenificates, 1268
data Handshaking, 641 digital modulation
data integriry, 834 ASK, 1943, 1958, 1970
data link, 963, 1875, 1876, 1878 FSK, 1946, 1966, 1970
data link layer, 700,701,706, 729-733,738,741, PSK, 1945, 1950, 1970, 1971
773.776,777,792,820,857,867,882,892,894, digital signatures, 1262
963, 1024, 1156, 1219, 1490, 1955. 1957. 1959, digital TV, 7, 509, 522
1963, 1966, 1969 digital-to-analogue, 25, 1519, 1944

1984 Handbook of Data Communications and Networks


digitization, 23 dynamic range, 1924, 1945
digitized video, 847 EBCDIC, 21, 1945, 1965
DIMM, 499, 1793 EBU, 1945
DIN plug, 583 ECC, 492, 536, 1793
DISC, 871,873,884, 1945 ECP,444,446,502,641,653,660-663,672-675,
disk 1945
automatic defect reallocation, 550 ECP/EPP Mode, 653
CD-ROM, 527 EDO, 496, 499, 502, 509, 510, 511
drive specifications, 527 EEPROM, 8,1150, 1945
duplexing, 1444 EGB, 740, 1172
fixed, 526 EGP, 1177,1180,1182,1461,1945
mirroring, 1444, 1445, 1506 EU\,30,615,627,629,630, 762-765,767,768,
predictive failure analysis, 550 1511,1945,1961,1965,1972
striping with parity, 1444 EU\/TIA-568, 762-767, 1961, 1965
striping, 1444 EIDE,444, 528-530,534,536,537,546
tracks and sectors, 526 EISA,437,443,444,447,449,451,467, 527,612,
distance-vector, 1166, 1167 1793, 1945
distortion, 23, 28, 30, 738, 760, 792 electronic mail, I, 5, 23, 34, 39, 725-727,730, 736,
distributed dock, 834 901, 964, 1063, 1185, 1187, 1189, 1192, 1219,
distributed processing, 42 1235, 1253, 1258, 1345, 1346, 1348, 1353-1355,
DM,696,871,884, 1945 1370, 1373, 1380, 1461, 1462, 1495, 1875, 1974
D~,437,439,441,489,497-501,506, 532,660, API, 1348
672,718, 1785, 1945 client, 1346, 1348
DNS, 736,980,988,1008,1017,1038,1039,1040, messaging protocol, 1348
1068, 1071, 1085, 1091, 1100, 1157, 1158, 1188, overview, 1348
1273, 1405, 1410-1412, 1427, 1430, 1447, 1461, post office, 1346, 1348, 1950
1625, 1626, 1642, 1643, 1872, 1874, 1876, 1877, shared-file approach, 1346
1879, 1880, 1882, 1885, 1929, 1945, 1964 electronic token, 734, 745, 747, 825
domain names, 736,979,981, 1039, 1190, 1273, elliptic curve, 1247
1427, 1429, 1447, 1964 EM optoelectronics spectrum, 757, 1513
domains, 818, 864,907, 1446, 1447, 1448, 1449, EMF, 1945
1957 encoding, 733, 1128, 1129, 1359, 1362, 1380, 1384,
DPCM, 1945 1386, 1390, 1391, 1641
DPSK, 1945 encryption, 1, 522,730,736, 905, 909, 911-913,
DQDB, 850, 1945, 1964 984,1152,1155,1190,1191,1193,1219-1255,
DR, 550, 1945 1259, 1265, 1267, 1268, 1271, 1272, 1380, 1945,
DRAM, 10, 11, 450,487-489,492, 493,496, 499, 1947
502-506,509-511,522,530,532,569,596,605, alphabet shifting (Caesar code), 1226
606, 1787, 1788, 1792, 1793, 1945 applying a bit shift, 1234
access time, 527 applying a key, 1230
refresh, 439, 510 code mappings, 1229
DRAM interface, 496, 502 computational difficulty, 1222
DSR,616,618,620, 1725,1731 Frequency analysis, 1225
DSS, 1221, 1247, 1945 homophonic substitution code, 1228
DTE, 615,616, 618,620, 621, 627, 892, 893, 894, letter probabiliries, 1225
1725, 1726, 1945, 1964, 1972, 1973, 1974 message hash, 1235
DTE-DCE connections (PC to modem), 620 runnels, 1190
DTR, 616, 618, 620, 1724, 1945 Vigenere code, 1227, 1228

Index 1985
end delimiter, 700, 826, 827, 837, 883 Fast Ethernet, 771, 780, 782, 783, 786, 787, 790,
end-of-interrupt, 634,636,638,649-651,653,715, 791,806, 1955, 1965
718 interframe gap, 789
end-to-end flow control, 862 LLC protocol, 776
enhanced parallel port, 444, 446, 502, 641, 653, 654, MDI, 778
658,659,660,662,663,665,670-672,675,1946 migration, 787
byte mode, 653, 657, 658, 665, 669, 670 PLS, 777, 778
nibble mode, 653-657, 665-669 SNAP, 775, 1021, 1487
protocol, 658, 670 SSAP, 775, 776
registers, 659, 671 thick-wire, 780, 781
entropy coding, 1965 thinner, 780, 781
EOT, 1946 transceiver, 779,789, 803, 818
EPROM, 1946 event-driven, 8, 1163, 1172, 1202
error exceptions, 51
control, 776, 852, 894, 967, I 004, 1963, 1969 explorer packets, 739
detection, 492, 539, 691, 701, 709, 730, 773, extended capability port, 444, 446, 502, 641, 653,
774, 816, 817, 827, 867, 872, 882, 885, 891, 660-663,672-675,1875,1945
967, 1024, 1490, 1792, 1966 channel address, 660, 672
probability, 1162 forward data, 662, 674
Esc, 639 mode signals, 661, 673
ESDI, 527, 529 protocol, 660
ETB, 1733, 1946 extended parallel port
ether, 779, 800, I 025, 1026, 1405 mode signals, 659, 671
Ethernet, I, 3, 62, 444, 448, 456, 467, 490, 689, 691, register definitions, 659, 672
699, 731, 732, 734, 735, 739-750, 753, 762, 764, FAT, 542, 543, 1450, 1451
768-783,786-793,796,800-804,806,814,816, fault tolerance, 747, 825, 837, 840, 1443, 1444, 1495
817,818,825,827,833,840,847,856,874,905, Fault tolerance, 836, 1506
907,963,964,968,981,997,1000,1004,1021, FAX, 1727, 1882, 1946
1024,1026,1033,1040,1070,1071,1144,1150, FC,610,838,839, 1563,1736,1946
1151, 1154, 1156, 1157, 134& 1405, 1407, 1408, FCS, 701,774,776,778,826,869,872,885,892,
1431, 1442, 1443, 1487, 1490, 1501, 1526, 1871, 1946, 1966
1872, 1875, 1913, 1940, 1955, 1958-1963, 1965, FDDI, 467, 612,613,731,739,748, 771,788, 791,
1966, 1970 806,817,833-847,864,963,1004,1348,1404,
I 00 Mbps, 456, 782, 1955 1443, 1525, 1873, 1876, 1946, 1947, 1962-1966,
IOOBASE-4T, 785, 1527, 1528 1974
IOOBASE-FX, 782 applications, 840
IOOBASE-T, 780,782-791,799,806,814 attachments, 791, 841
IOOBASE-TX, 780,782,783,786,787,791,814 backbone nerwork, 840, 841
IOOVG-AnyLAN, 780, 782, 783, 786, 787, 806, DAS, 841,842, 1944
1404, 1526, 1955, 1971 data frame format, 837, 838
IOBASE2, 739,780,781,806 frame format, 83 7
IOBASE5, 780, 781 layers, 834
IOBASE-FL, 780 management, 834, 1946
IOBASE-T, 739, 767, 780-784, 787, 788, 814, media, 840
1955 restricted token, 834
IOBASE-T connections, 785 SAC, 841, 1951
AU!, 778, 1943 SAS, 841, 842, 1951
DSAP, 775, 776 timed token, 834

1986 Handbook of Data Communications and Networks


token format, 837, 838 forward error correction, 792, 1946
token-passing, 833, 840, 1965 forward rate, 739
unrestricted token, 834 fourier transform, 1973
FDM, 1946 &agment,965,967,986,991, 1069,1966
FF,803,827,838, 1360 fragmentation, 546, 850, 991, 993-996, 1004, 1005,
fiber channel, 609---{)11, 789, 790 1936, 1937-1940, 1959
fiber-optic, 28, 611, 699, 732, 738, 746, 749, 752, frame check sequence, 701, 773,774, 826, 839, 869,
754, 756, 760-762, 772, 780, 782, 783, 789, 791, 872,882,885,1024,1490,1946,1966
858, 1513, 1519, 1520, 1955, 1965 frame format, 837, 880
Absorption losses, 760, 1518 frame reject, 884
chromatic distortion, 760, 1518 framing bits, 776, 878, 879
Material scattering, 760, 1518 FRMR,871,872,884, 1946
modal dispersion, 760, 1518 FSK, 1946, 1966, 1970
Radiation losses, 760, 1518 FTP, 1,23,34,39,963,985,999, 1005,1006,1008,
single-mode, 841 1010, 1017, 1063, 1066, 1071, 1090, 1094, 1101,
typical characteristics, 1519 1117,1118,1121,1122,1124,1125,1152,1168,
fieldbus, 689, 690, 692-698 1186,1187,1188,1194,1219,1272,1358,1371-
FIFC>,67, 502,663,675,680,803,1946 1374, 1415, 1416, 1418, 1427, 1430, 1439, 1440,
file attributes, 1457, 1458, 1466 1447, 1461, 1617-1623, 1871, 1875, 1880, 1884,
file servers, 726, 753, I 040, 1442, 1495 1885, 1928-1931, 1946, 1966
file system, 7, 32, 40, 42, 45, 63, 539, 540, 542-547, FTPS, 1272
726,1028, 1160,1346,1372,1437,1441,1445, full-duplex, 771,788,789,790, 817,867
1446, 1450, 1451, 1457, 1461, 1472, 1492, 1494, G.711/722/728, 888
1496, 1497, 1644, 1659, 1932, 1944, 1946, 1947, games Port, 583
1949, 1970 gateway, 484, 612, 723, 724, 740, 743, 775, 794,
FAT,4,525,542-546, 1450,1451,1931,1946 795,857,864,919-921,963-997,1020,1023,
l1PFS,525,542-545, 1450,1451,1946 1028, 1066-1068, 1071, 1157, 1162, 1172, 1174,
NTFS, 525, 542, 543, 546, 1446, 1450, 1451, 1175,1178,1180,1186-1190,1348,1349,1383,
1646, 1931, 1949 1388, 1394, 1404, 1405, 1460, 1461, 1487, 1489,
file transfer protocol, I 006, I 063, 1373, 1461 1492, 1930, 1936, 1938-1947, 1960, 1965, 1967,
filtering rate, 739 1968, 1972
FINGER, 1006, 1008, 1885, 1946 gateway protocols, 1461
finite-state machines, 80 GFI, 894, 1946
firewall, 1185-1191 GIF,25, 1358,1367,1946,1966
application level, 1186-1188 Gigabit Ethernet, 771,780,787-791, 864, 916
network-level, 1186, 1187 gopher, 1017, 1065, 1188, 1367, 1430, 1931, 1949
ring-fenced, 1189 group address, 828
firewire, 444,488, 576-581 groupware, 1185
first-come, first-served, 69 GUI, 37-39,61,447, 1185, 1809, 1946
flags and semaphores, 1554 GZ, 1367
floating-point, 17, 18, 20, 21, 1482, 1629, 1630, hacking methods, 1194
1778, 1784, 1790, 1791 fL\L, 54, 1935, 1946
flow control, 571, 597, 598,609,618,628,706, 734, half-duplex, 627, 628, 785, 789, 817, 867, 1966
735,771,776,789,850,857,862,863,867,870- hamming distance, 1523
872,883,885,891-895,898,901,999,1001, handshalcing,441,442,453,455,489, 517,556,
1005, 1026, 1490, 1725, 1726, 1730, 1959, 1963, 617-{)21,641,642,655-{)57,662,666,667,669,
1969 675,715,717,718,720,736,787,910,1353,
form feed, 1360 1725, 1966, 1971

Index 1987
hardware interrupts, 55 110
HD, 488, 547, 1946 addressing, 469
HDLC, 867-870, 872, 874, 892, 894, 1030, 1946, controller, 502, 509, 512, 515, 516, 518, 522,641
1950, 1956, 1960, 1966 port, 532, 662, 675
HDTV, 1946 read, 438,454,455,564,591, 1778
HDX, 1946, 1966 write, 438, 454, 455, 459, 461, 463, 464, 473,
HFS, 540, 1437 564,591,658,671,1778
hold-down timer, 1169,1170 IA5, 1733, 1947
hop count, 1024, 1163, 1166-1169, 1176, 1490, lAP, 1370, 1947
1963, 1967 IC11P,967,986,989,990,992,995,996, 1065,
host layers, 731 1066, 1067, 1075, 1409, 1460, 1871, 1886, 1936,
hot fixing, 543, 546, 1451 1939, 1940, 1947, 1967, 1971
hot plugging, 43 ICP, 1370
HPFS, 542,543,1450,1451 IDE, 441, 444, 445, 450, 467, 487-489, 497, 499,
HTIP, 33, 39, 913, 919, 920, 922, 926-933, 1008, 501,506,510-512,515,518,522,525-537,545,
1017, 1063, 1100, 1117, 1121, 1125, 1126-1129, 546,549,550,575.710
1186, 1187, 1188, 1219, 1267, 1268, 1271, 1272, communication, 532
1367, 1372-1386, 1390, 1391, 1430, 1447, 1545, connections, 445, 528, 530
1607, 1611, 1617, 1622, 1624, 1639, 1641, 1642, interface, 497,499, 501, 518, 528-530, 532
1651, 1652, 1670, 1673-1880, 1882, 1946 !SA interface, 497
GET, 33, 927, 1121, 1122, 1125-1129, 1378- 101,903,904, 1947
1380, 1384-1391, 1642, 1643 IDLE, 835, 836, 1879
HEAD, 1125, 1127, 1129, 1379, 1384, 1385, lOP, 903, 1947
1391 IEC,30,579,690, 715,1511,1969
POST, 927, 933, 1125, 1379, 1380, 1384, 1385, IEEE
1616, 1617, 1619-1626, 1652 -1284,641,654,662,665,674
PlJT, 1122,1125,1379,1380,1384 802.12,783, 786, 1876, 1955
entity header fields, 1384 802.2, 775, 1969, 1972
full requests/responses, 1378 802.2 and Ethernet SNAP, 775
general header fields, 1383 802.3, 749, 762, 771-778, 782, 783, 786-790,
message, 1271, 1378, 1385 1151, 1878, 1881, 1955, 1959, 1962, 1963,
reference, 1384 1965
request example, 1379 802.3 frame format, 773, 774
simple requests/responses, 1378 802.3u, 782, 783, 1959, 1965
HTIPS, 1272, 1642 802.4, 1873
hub,30,57,489,490,499, 509-522,570-573,575, 802.5, 786,825,826,827,839,1873,1955
576,610,612,613,744,745,750,753,764-767, 802.6, 837, 850, 1964
771,772,780-790,806,814,825,905,910,1064, standards, 772
1144, 1150, 1393, 1511, 1526, 1955-1957, 1962, IEEE-1394 packet formats, 580
1967, 1971, 1972 IEEE-488, 444, 715, 716, 718
hub-based, 509 IETF, 1158, 1159, 1173, 1271, 1376, 1761, 1876,
SlOE chipset, 521 1880-1884, 1960, 1967, 1968
820 chipset, 511 ILD, 1515, 1516, 1519, 1947
840 chipset, 518 image compression, 1969
huffman, 1957, 1967, 1969 impedance, 1532
hypertext, 924, 1063, 1367, 1371, 1372, 1374, 1376, 111R,635,636,637,649-652
1558, 1875, 1877. 1946, 1967 increment, 498, 502, 1169, 1562, 1963
inetd, 1404, 1415, 1417, 1439, 1440

1988 Handbook of Data Communications and Networks


injection laser diode, 1515 1428-1443, 1447, 1457, !460, 1461, 1487-1494,
input/output supervisor, 522, 1029, 1145, 1151, 1506, 1507, 1625, 1626, 1642, 1643, 1644, 1664,
1156, 1157, 1947, 1962 1780, 1871-1886, 1927-1930, 1935-1941, 1946-
installable file system, 1947 1948, 1956-1960, 1963-1973
integrity check, 1221 address, 33, 734, 736, 738, 775, 793-799, 848,
interconnected networks, 41, 730, 739, 848, 853, 853, 857, 963-973, 980-996, 999, 1005,
964, 1035, 1141, 1219, 1507 1036-1039, 1063, 1065, 1066, 1068-1072,
Internet 1076, 1082, 1085, 1087, 1088, 1091, 1092,
access provider, 1370 1095, 1100-1105, 1117, 1122, 1125, 1144,
addresses, 968, 969, 995, 1102, 1938 1148, 1150-1154, 1157, 1163, 1172, 1182,
datagram, 966, 968 1186, 1187-1194, 1273, 1404-1413, 1428,
email address, 1349, 1373 1429, 1447, 1461, 1625, 1626, 1642-1644,
engineering task force, 1173, 1271, 1876, 1947, 1664, 1927-1930, 1938, 1940, 1957, 1958,
1967, 1968 1960, 1964, 1967, 1968, 1971, 1972
explorer, 4, 1128, 1272, 1273, 1371, 1375, 1390 address allocation, 987
naming structure, 979, 1502 address format, 969
primary domain names, 979 address range, 971
protocol, 724, 963, 984, 992, 1154, 1461, 1625, address, 853, 857, 963, 967-970, 972, 973, 980,
1871, 1872, 1874, 1876, 1883, 1935, 1936, 981, 984, 986, 988, 999, 1065, 1066, 1068,
1964, 1968 1076, 1100, 1101, 1172, 1187, 1190, 1404,
security, 1267 1405, 1410, 1461
internetwork, 737, 739, 963, 1039, 1161, 1163, class A, 859, 969-973, 1877
1164, 1166, 1170, 1171, 1173, 1174, 1507, 1962, class B, 859, 969-974, 998, 1941
1965, 1969 class C, 859, 969-974, 1144, 1148
interrupt, 12, 55, 57, 58,439,441,474,481,483, creating subnets, 972
498,573,633,636,638,649,650,1149,1781, group addresses, 983
1785 header, 794, 967, 984-993, 999, 1004, 1008,
control port, 636, 1370, 1879, 1947 1935, 1936, 1937, 1973
controller, 498 header,984,986,989,990,999, 1004
handling, 57, 58,481 multicasting, 983
hardware, 54, 56, 636 protocol, 775, 776, 857, 965-968, 1004, 1066,
mask register, 635-637, 649-652 1070, 1346, 1349, 1460, 1960, 1966, 1968,
non-maskable, 490 1970, 1973
request, 55, 56, 57, 439, 441, 1778, 1785, 1787, spoofing, 1191,1194
1948 subnet masks, 973
service routine, 54-57, 592, 636-638, 649, 652, time-to-live, 967, 991, 992, 1024, 1066, 1067,
653 1069, 1412, 1428, 1490, 1929, 1952
software, 46, 55 v4,984,985
vectors, 57 v6, 915, 984, 985, 986, 999, 1874, 1875, 1876,
Interval timer, 498 1883, 1947, 1950
IP,3,33,39,41,45,50,60,63,610,613, 730,731, IPX,41,45,63, 730,734,735,751,773,907,984,
734-738,749,751,773,775,776,793-799,820, 997,1019-1035,1039-1041,1075,1148, 1160,
848,853,857,864,915,918,963-973,980-1000, 1163, 1430, 1441-1443, 1487-1494, 1501, 1506,
1004, 1005, 1008, 1018-1024, 1028, 1033-1040, 1507, 1932, 1940, 1947, 1948, 1952, 1964, 1968,
1063, 1065-1073, 1076, 1082, 1085-1092, 1095, 1970, 1972
1100-1105, 1117, 1122, 1125, 1141, 1144, 1148- IPX.COM, 1442
1160, 1163, 1172, 1182, 1185-1195, 1219, 1268, IPXODI, 1032, 1442
1273, 1346, 1349, 1367, 1376, 1394, 1404-1413, packet format, I 024, 1490

Index 1989
IRQ, 51, 57-59,441,468,490-492,498 515, 521, kernel, 4, 5, 39, 40, 42, 50, 51, 54, 66, 73, 1021,
532,549,456,490-498,515,521,529-532,535, 1487, 1507, 1935
536,588,589-593,618,646,649,1948 key distribution centre, 1261, 1948
ISA,437-450,459,467,487-494,497,498,499, key exchange, 1259, 1261
506,509-512,515,518,521,527,529-531,575, keyboard, 7, 58,447,502,583,588,589,591-593,
592,659,662,671,674,692, 1793, 1948 1470, 1472, 1473, 1478
ISDN, I, 444,723, 849, 877-887, 1000, 1191, data ready, 58
1369, 1370, 1878, 1943, 1948, 1950, 1960, 1967, interface, 588-592
1970, 1972 keystroke, 1473
basic rate, 877, 878, 880, 918 LAN, 28, 30,448, 517,518,689,691,723,725,
B-channels, 878, 881, 885 739, 743, 744, 749, 752, 753, 762-764, 772, 780,
B-ISON, 877, 878, 1943 814,818,830,863,867,905,907,912,1020,
call clearing/establish, 887 1024,1035,1040,1144,1174,1200,1202,1404,
channels, 878 1441-1443, 1487, 1490, 1507, 1509, 1511, 1882,
data link layer, 882 1927, 1947, 1948, 1955, 1956, 1972, 1974
0-channels, 875, 878, 880-882, 885, 1960 LAPD, 875, 882, 885, 1948
dial-up, 1370 laser, 525, 537-539, 611, 726,789, 1516, 1519,
frame format, 880, 881 1613, 1928, 1929, 1947
HO, 878, 1723 LCN, 894, 902, 1948
Hll/12, 878, 879 LCR, 622, 623, 624, 636
network layer, 878, 885 LD-CELP, 888, 1948
network messages, 887 LED,647, 760,1064,1515-1519,1948
physical, 878, 879 lempel-ziv, 1386, 1475, 1948, 1969
supervisory frame, 883 LF, 1351, 1352, 1353
system connections, 513, 621, 622, 664, 880 LGN, 894, 902, 1948
TEl, 882, 883, 884, 886, 1952 line break, 615, 833, 1763
ISN, 1006, 1013 line discipline, 734
ISC>,30, 539,540,579,627,705,707,713,724, line driver, 629, 800
729,844,867,880,904,922,926-932,963,986, link access procedure, 882, 894
1018,1387,1430,1511,1877,1878,1881,1948, link support layer, 1442
1952, 1966, 1968, 1969 link-state, 1166,1170,1171,1174,1969
ISC> 9660, 539, 540 little endian, 17
ISC>/IEC, 30, 579, 1511, 1969 LLC, 773-778,838,840,867,874,1026,1948,
isochronous, 571, 573, 579, 580, 1947, 1956 1955, 1969
ISR,54-57,636,637,638,652 L()CK# timing diagram, 458
ITU, 627,629,630, 847, 888, 1948, 1956, 1958, logical block address, 534, 537, 559
1961, 1967, 1968, 1973, 1974 logical link control, 826, 874, 1948
jamming signal, 749, 772 logical unit number, 559
Java, loopback, 621,749,1154,1725,1728
applet, 1099, 1103-1106, 1109, 1274 lossless compression, 1969
interpreter, 1099 lossy compression, 1969
JavaScript, 4, 921, 1367, 1370, 1543-1631, 1671 LPT!,58,446,494,644,650,652
JFIF, 1358, 1948 LPT2, 58, 644
JISC, 1948 LRC,679,680,68!,682,683,684,685,686, 1948
joliet, 540 LSR,622,623,624,625,634,635,636,639
joypad, 516 LUC, 1247
]PEG, 25, 1358, 1367, 1948, 1969 LZ coding, 1386, 1475, 1948, 1969
keep-alive, 1154 LZS, 1875

1990 Handbook of Data Communications and Networks


LZVV, 1386, 1948, 1953, 1966, 1969, 1974 MIME, 1063, 1102, 1236, 1268, 1346, 1349, 1355-
MAC, 1362, 1378, 1379, 1383, 1873, 1874, 1876-1886,
address, 734-741, 751, 753---776, 792-799, 817, 1948
818, 820, 821, 963, 964, 968, 985, 987, 988, base64, 1361
1023, 1024, 1028, 1040, 1069, 1072, 1148, boundary name, 1357, 1358
1150, 1154, 1219, 1404, 1405, 1408, 1492, content types, 1357
1957, 1958, 1960, 1964, 1969, 1972 content-description, 1356
layer, 773, 777, 778, 800, 825, 827, 834, 843, content-id, 1356
850,964,1032,1442 content-transfer-encoding, 1355, 1360
protocol, 827, 839 content-rype, 1272, 1355-1359, 1384, 1387,
macro, 652 1652, 1878, 1880, 1884
magnetic fields, 25, 525, 754 encoded, 1357, 1359, 1378
magnetic tape, 525, 541 mail fragments, 1359
magneto-optical, 540 transfer encodings, 1360
magneto-optical disks, 540 version, 1356, 1379, 1882
mail fragments, 1359 M!Ps, 1790
~. 723,845,850,864,1943,1945,1946,1948 MLID, 1032, 1033, 1948
Manchester modbus,677,678,679,683,686,687
coding,699, 779,801,802,827 modem,43,445,447,563,571, 726,874,877,
decoder, 800, 801 1190,1442,1960,1963
man-in-the-middle, 1261 auto-answer, 1731
~s, 723,864,1964 connection, 1, 586, 620, 621, 723, 963, 1370,
~. 1348, 1437, 1502, 1948 1724
MAU,749,778,829,830, 1948 dial-up, 1370
MCJ\,437,443,444,447,527 example return codes, 1727
MD5, 1235, 1252, 1253, 1262, 1265, 1362, 1384, registers, 1731
1873, 1874, 1878, 1884, 1944, 1950 S-registers, 1727
algnrithm, 1253, 1262, 1265 V.22bis, 1723
media access control, 749, 772, 773, 777, 826, 1948 V.32, 1723, 1727, 1973
media Interface Connector, 842 V.32bis, 1723, 1727, 1973
media layers, 731 V.42bis, 1727
memory, modulation, 791, 906, 1958
addressing, 1781, 1782, 1786 modulo-2, 710
buffering, 815, 816 motherboard, 449,450,451,487-490,498,499,
managing, 44 509,512,528,529,575,576,598,600,663,753,
paging, 53 1787
segmented, 1781, 1782 430fD<,488,489,499,502
message, 73, 74, 696, 989, 1112, 1115, 1381, 1966 450KX, 506
creation, 1271 450NX, 504, 506
digests, 1262 flash, 507, 508
bash, 1235 fD(, 488
passing, 73, 75 interface, 624, 663
metafile, 1944, 1945 M1J(C,499,502,503
metropolitan area network, 723, 845, 850 1](, 2, 499, 500, 629, 633, 786, 791, 799, 806,
MilS, 1348, 1349, 1948 817, 880, 1955, 1959, 1970
MIC,506,842, 1948,1970 mouse,446,447,498,583,586,591,592
microsegmenration, 819, 1970 MPEG, 72, 538, 1358, 1359, 1360, 1367, 1883,
migration, 11, 63, 488, 519, 784, 786, 791, 1507 1949

Index 1991
MR, 1429 loadable modules, I 021, 1488
multicast, 705, 971,983, 1039, 1160, 1947, 1970 NCP, 1023, 1026, 1028, 1031, 1032, 1489,
multidrop, 610, 628, 692 1490, 1492-1494, 1496, 1506, 1949
multiplexing, 452, 505,611,641,854, 877, 878, NLMs, 1021, 1488
913, 1005, 1946, 1952, 1962 protocols, I 023, 1489
multiprocessing, 43, 60, 1457, 1555 SAP, 775, 1023-1030, 1040, 1489, 1492, 1493,
multi-station access unit, 749, 778, 829, 830, 1948 1504, 1951, 1972
multitasking, 38, 39, 41, 43,45--47, 52, 53, 60, 62, setup, 1032
65, 66, 76,727, 1441, 1457, 1791 SMP, 1507
co-operative, 46, 47 VLM, 1506
pre-emptive, 43, 46, 47, 60, 1457 network,
multi-threading, 43, 47, 53 addresses, 14, 735, 736, 738, 741, 882, 915, 971,
MlD<,497, 505,843,1873,1944 981, 988, 1029, 1103, 1144, 1406, 1412,
NACK, 867 1460, 1461, 1927, 1957, 1968
NAK, 687, 1733, 1949 connection, 517
name resolution, 736 information center, 972, 1174
NCP packet format, I 032, 1494 layer, 729, 730-741, 776, 848, 878, 885, 894,
NCSA, 1367, 1371, 1931, 1949 963, 966, 999-100 I, I 004, I 020, 1023, 1162,
NDIS, I 032, 1442, 1949, 1970 1442, 1443, 1487, 1489, 1957, 1963
NDS, 1020, 1441, 1494-1506, 1548, 1949 layer, 776, 878, 885, 1004, I 020, 1023, 1442,
bindery services, 1022, 1488, 1503, 1504 1443, 1487, 1489
country object, 1496, 1497, 1502 malfunctions, 83 7
ex, 780, 789, 15oo, 1so 1 malfunctions, 83 7
naming syntax, 1499 management, 714, 747, 787, 825, 826, 854, 1021,
object names, 1499 1393, 1394, 1403, 1487, 1495, 1951
structure, 1496, 1498 management, 747, 787, 825, 826, 1021, 1462,
timestamp, 1505 1487
tree, 1496-1499 operating systems, I, 1441, 1457, 1487, 1543,
user class, 1503 1571, 1607, 1629, 1661, 1675, 1693, 1713
VLMs, 1506 topologies, 744
NetBEUI, 45, 771, 907, 1003, 1035, 1442, 1443, topologies, 744
1944 topology, 734, 982
NetBIOS traffic, 697, 747, 753, 779, 794, 814, 819, 825,
name rypes, 1927 862,864,990, 1027-1029,1161, 1172,1377,
netstat, 1012, 1017, 1069, 1070, 1071, 1430, 1929 1393, 1491, 1492, 1495, 1504, 1506, 1507,
NetstatiiPConfig, 1070 1960
NetWare, 2, 33, 38, 39, 41, 45, 63, 549, 730, 734, transport protocol, 1348
735,771,775,776,819, 1003, 1019-1028, 1031, Types and Cables, 743
1032,1033,1197,1349,1441,1442,1487,1488- NETx, 1021, 1031, 1032, 1033, 1487, 1493, 1506
1497, 1501-1507, 1881, 1932, 1949, 1968, 1970, NFS, 985, 1008, 1427, 1431, 1432, 1435, 1437,
1971 1457, 1461, 1495, 1872, 1880, 1883, 1970
4.1, 1023, 1028, 1489, 1492, 1494, 1495, 1503, RPC, 73, 1066, 1462, 1887, 1951
1505-1507 XDR, 18,736, 1480, 1485, 1872, 1887, 1953
architecture, I 021, I 022, 1487, 1488 nfsd, 1431, 1432
bindery services, 1022, 1488, 1503, 1504 nibble, 13
container obects, 1495 NIC, 733-735,753,771,775,783,787,791,800,
directory services, 1023, 1489, 1495 972,1021,1032, 1033,1174,1442, 1487,1949,
leaf objects, 1495 1957, 1959, 1967

1992 Handbook of Data Communications and Networks


NIS, 1427, 1432-1435, 1461, 1949, 1970 packet-sniffing, 1194
domain, 1432, 1433, 1434 packet-switched, 844, 891, 892, 897, 898, 901, 902,
NLSP, 1507 1950, 1974
NMI,490 PAL, 1949
NNTP, 1272, 1949 palette, Ill 0, 1966
NNTPS, 1272 PAM, 605, 791, 792
noise, I, 23, 24, 25, 576,629,754,755,761,767, parallel port, 57, 58, 444, 446, 488--490, 494, 502,
792,800,801,1221,1520,1800,1924,195 2, 516,518,592,64!,644-656,660-667,67 0,672,
1963, 1969 674,675,1946
Novell NetWare, 2, 33, 38, 39, 41, 45, 63,730,734, byte mode, 653, 657, 658, 665, 669, 670
735,771, 819, 1003, 1019, 1020, 1197, 1349, Centronics, 641, 642, 653, 656, 663, 665, 667,
1441, 1442, 1487, 1968 675
NetWare, 2, 33, 38, 39, 4!, 45, 63, 730, 734, compatibility mode, 653-666
735, 771, 819, 1003, 1019, 1020, 1197, 1349, enhanced,446,665
1441,1442,1487,1968 I/0 addressing, 469, 644
NRZ, 707, 709 interrupt-driven, 649
NRZI, 834, 835, 1523, 1524, 1949 nibble mode, 653-657, 665-669
NSAP, 902-904, 1949 parity, 479, 482, 483, 494, 550, 589, 625, 679, 1444
NSCA, 1370, 1931, 1949 even, 467, 482, 483, 520, 622, 623, 624, 1781,
nslookup, 1068,1069,1149, 14!2, 1929 1784
NTE, 1949 odd,592, 1237
NTFS,542, 543,1446,1450,1451 password, 32, 33, 40, 502, 728, 927, 928, 931, 1146,
NTP, 1462, 1949 1147, 1152, 1153, 1155, 1156, 1173, 1190, 1191-
NTSC, 1949 1198, 1255, 1274, 1363, 1372-1374, 1385, 1386,
N-type, 780, 781 1415, 1416, !439, 1440, 1447, 1479, 1494, 1503,
NVRAM, 1146,1150,1155 1566, 1568, 1609, 1617-1624, !665, 1670, 1874,
Nyquist, 1963 1875, 1882, 1934, 1949, 1971
ODI, 1021, 1032, !033, 1034, !442, 1487, 1501, Patch panels, 766
1949 PATH, 730, 1182, 1438, 1641
OH, 1949 PC bus, 437--439,445,446, 451
OLE, 62, !664 PC!, 1,437,438,444--494,497-522,527,530,5 31,
optical disks, 525, 537, 540 573,575,595-605,612,715,907
opto-isolator, 631 AGP, 488, 518, 596
Orange Book, 539, 547, 1928 bridge, 453, 454, 456, 468, 470, 472, 473, 475,
OR-tied, 553 487,489,506,507,573,575,603-605
OSFP, 740, 1172 burst mode, 452, 453, 454, 518
OS!, bus cycles, 453, 475
model, 707, 729, 730, 731, 732, 737, 738, 750, configuration address space, 467
773, 777, 834, 848, 857-859, 892, 894, 963, I/0 write data, 459
964, 966, 1003, 1004, 1032, 1033, 1063, interface, 506,512,521, 596,605
1162, 1219, 1268, 1442, 1958, 1963, 1969- interrupts, 456, 490
1973 !SA bridge, 489, 499
OSPF, 735,740,1162,1166,1170,1172,1173, man. ID, 467, 484
1174, 1177, 1949 multiplexed mode, 452
our, 838, 1949 unit ID, 467, 471
PA,690,837,838, 1809,1825,1879,1949 PC!set, 488,489, 491, 504, 506
packet ftlters, 1187, 1190 PCM,836,847,849, 859,879,880,888,1799,
packet Internet Gopher, I 065 1945, 1949, 1957, 1958, 1963

Index 1993
adaptive delta modulation, 1957 1128,1372,1374, 1390,1439,1440, 1565,1567,
delta modulation, 888, 1963 1625, 1626, 1642, 1643
low-delay CELP, 888 port number, 818, 1005, 1006, 1008, 1012, 1070,
PCMCJA, I, 437, 444, 445, 563-565, 566, 568, 569, 1075, 1082, 1091, 1102, 1107, 1186, 1192, 1372.
775,907 1625
interface controller, 565 portmap, 1432
register, 565 ports and sockets, I 006
type II/III/IV, 445, 563 post office protocol. 1362
PCM-TDM, 847, 849, 879 postscript, 1367, 1883
pcnfsd, 1435 PPSDN, 1950
PDN, 891, 1949 preamble, 700, 773-779, 801, 837, 838, 910
PDU, 741, 859-862, 964 pre-emptive, 52, 53, 60, 66, 69, 71, 1457
peer-to-peer, 23, 31, 32, 33, 63,691,697, 727, 905, multitasking. 46, 47, 60, 1457
1010, 1441, 1446 presentation layer, 729,730, 736, 1219, 1480
PGP, 1221, 1252-1258, 1265-1267, 1876, 1949 primary rate access, 878
authentication, 1265 print servers, 1441
key management options, 1254 priority scheduling, 71
Pl1P,929,930,932, 1607-1627,1631 private-key, 1220, 1222, 1224, 1236, 1242, 1247-
Pl1Y,834,844,857,913, 1949 1250, 1253-1256, 1259, 1260, 1262, 1265, 1266,
ph~iaU,610,699, 706,730,732,734,777,778, 1271
800,834,836,844,912,913,963,1040,1071, probability, 709, 1162, 1225, 1228, 1229, 1244,
1072, 1193, 1442, 1965, 1971 1800, 1962, 1967
addresses, 734 process scheduling. 52, 53
layer, 690, 699, 701, 705-707, 729-733, 738, process status, 77
777, 782, 789, 790, 843, 857, 858, 878, 879, processes, 42, 43, 65, 68, 72, 81
892,894,1442,1949,1974 producer-consumer problem, 1553, 1573
media dependent, 834 programmable interrupt controller, 56, 521,636, 637,
Ph~iaU signaling (PLS), 778 649,652,1791
PIC, 56,636, 1791 PROM, 1945, 1946
ping,963,989, 1026,1063,1065,1066,1069,1158, proxy, I, 919, 1121, 1185, 1186, 1187, 1188, 1271,
1159, 1929, 1931, 1949, 1971 1274, 1380, 1383, 1388, 1413, 1652, 1959
pipelined, 492, 503, 596, 597, 599, 601, 602, 1790 ps (process status), 77
pipes, 73, 74, 1474 PSK, 1945, 1950, 1970, 1971
PISO, 1949 PSTN, 891, 1731, 1882, 1885, 1950
PKP, 1221, 1949 public telephone network, 877, 891, 1370
plaintext, 1221, 1224, 1228, 1236, 1237, 1242, 1247, public-key, 1220-1224, 1236, 1247-1249, 1254,
1253, 1254, 1262, 1376 1256, 1257. 1265, 1949, 1952
PLL,801,802, 1949,1971 pulse distortion, 629
plug-and-play, 45,467,484,488,490, 511, 571 pulse shaping, 791
PMD,834,844, 1950 QAM, 1950
point-to-point protocol. 827, 966, 1071, 1158-1160, QCIF, 1950
1190, 1874-1879, 1882-1884, 1886, 1947, 1950, QIC, 541, 1950
1962, 1971 QoS,613, 790,847,856,862,863,913,986,1950,
polarization, 537, 1369 1956
poll/final bit, 883 quanta time slice, 43
port, 8, 50, 57, 58, 74, 509, 513, 516, 518, 522, 530, quantization, 1799, 1971
532,583,586,589-592,595-601,606,641-675, process, 1971
907, 1024,1029, 1070, 1075, 1076, 1078-1117, RAID, 613, 1444, 1445, 1950

1994 Handbook of Data Communications and Networks


random number generators, 1221 ~R, 777,871,874,884,897,899,1950
RJUtP, 741,796,797,798, 1972 RC>,829, 1153,1246,1365,1950
RC4/RC5, 1237 round robin, 69, 70
RD, 616--624, 799, 1408, 1950 routed protocol, 1141, 1162
real-time scheduling, 72 routers, 1, 42, 723,732,735,738-743,751,752,
receiver not ready, 777, 884 766,792-795,816--820,915,981,983,986,989,
Red Book, 539, 540, 547 1020, 1027-1030, 1035, 1064, 1141, 1144, 1148,
redirect, 76, 1652, 1669 1151, 1156,1161-1178, 1190,1192, 1370,1491,
redundancy, 536, 580,681,709, 773,774, 826, 833, 1492, 1507, 1874, 1957-1963, 1967, 1969, 1972,
872,885,1225,1944,1948,1953 1973
reflection coefficient, 1535, 1537, 1538, 1541 ARP, 794
reflections, 28, 30,754, 758, 1531, 1535, 1539 commands, 1147
refracted, 758, 1514 configuration and setup, 1145
refractive index, 758, 1514, 1515, 1517 filtering, 1191
refresh rate, 504 IP addresses, 983
REJ,777,871,874,884,897,899, 1950 status commands, 1148
remote login, 727, 728, 1930 routing, 735,791, 850, 986, 1027, 1030, 1040, 1071,
remote procedure call, 1066, 1462 1158,1160-1176,1460,1461,1491,1507,1964,
repeater, 509, 519, 738, 750, 751, 764, 790, 806, 1966, 1967, 1969, 1972
814,830,1962,1969,1971,1972 BGP, 740, 1177, 1943
repetitive sequences, 1965, 1973 distance-vector, 1166, 1167
reservation bits, 827 dynamic, 1163, 1964
reserved words, 1543 EGP,740,992, 1177,1461,1936,1945
resistance, 28, 29, 583, 585, 629, 754, 800, 1509, fundamentals, 1162
1510, 1531, 1535, 1539 hybrid, 1171
resolution, 448, 449, 586, 595, 697, 736, 849, 1038, IGRP, 1162,1166,1176,1967
1069, 1412, 1413, 1447, 1461, 1671, 1672, 1943, link-state, 1170
1949, 1964, 1972, 1973 loops, 1168
restricted Sites, 1274 NLSP, 1507, 1949
restricted token, 834 C>SPF, 735,740, 1162, 1166, 1170, 1172, 1173,
revision, 467, 596,605, 695, 1876 1174, 1177, 1873, 1879, 1882, 1883, 1886,
RFC 821, 1348, 1349 1949
RFC 822, 1348, 1354-1361, 1378 problems, 1168
RFI, 754, 755 protocol techniques, 1166
RG-50, 780, 781 RIP, 39, 735, 740, 1008, 1023, 1026-1029,
RG-6, 781 1141, 1162, 1163, 1166--1173, 1176, 1182,
RGB, 499, 1655, 1804, 1950 1431, 1461, 1489-1492, 1507, 1878, 1885,
RI, 77,829,1950 1887, 1950, 1967
RIMM sockets, 514 RPC, 73, 1066, 1462, 1951
ring fails, 833 RR,69, 777,871,874,884,897,898,1877,1951
ring in, 612, 613,744,829, 837, 1950 RS-232,444,446, 588,615-621,627-637,677,
ring network, 467, 614, 744-749, 786, 792, 825, 689,715,893,1144,1442,1960,1972,1973
829-831,834,840,874,963,968,1955,1973 /485 converter, 630
ring out, 612, 613, 829, 1950 communications, 620
RJ-45,30, 739,765,766,767,768,771,780,781, DTE-DCE connections, 620
786,800,829,830,880,1144,1511,1972 frame format, 837, 880
RJ-45 jacks, 765 programs, 621
RLE,660,672, 1795,1796,1950 setup, 618

Index 1995
RS-422, 615,627,629,630, 1972 host, 551,612
RS-422A, 627 10,549,551,554
RS-423, 627, 630 interface, 525, 528, 550
RS-449,615,627, 1972 logical unit number, 559
RS-485,445,627-631,689,690, 707,1972 message codes, 55 7
RSA, 1221, 1222, 1236, 1237, 1247-1255, 1259, message format, 556
1266, 1269, 1276, 1346, 1882, 1884, 1951 message system, 5 56
key generation, 1255 operation, 553
program, 1249 P-cable, 550
RSVP, 790, 791, 1951 tagged command queue, 549, 550
RTF, 1951 50,530,543,700,826,837,838,1446,1951
RTS, 6!6-620, 628,631,910, 1725, 1730, 1731 SOH, 858, 864,917, 918, 1879, 1950, 1951
RTU, 678-682 SECAM, 1951
run-length encoding, 660, 672, 1795, 1796, 1950, second- level cache, 502
1972 secondary scheduler, 75
running-config, 115 5 secret-key, 1193, 1220, 1222, 1235, 1254-!267
S/PDIF, 1951 sectors, 526, 527, 532-539, 544-547, 1201
SABME, 873, 884, 1951 secure socket layer, 1267, 1268
SAC, 1951 security, I, 543, 921, 1005, 1016, 1193, 1197, 1221,
SAFER, 1237 1237, 1269, 1273, 1274, 1346, 1445, 1449
sampling, 447, 448, 457, 587, 713, 847, 848, 887, hardware, 1198
888, 1358, 1945, 1963 permissions, 543, 14 51
SAP packet format, 1029, 1031, 1493 policies, 1197
SAP!, 882, 886, 1951 settings, 1274
satellite TV, 756, 1513 zones, 1273
SB-ADCMP, 1951 segment switch, 814, 815
s-box, 1240, 1241, 1242 segmentation, 857, 859
scalability, 61 0, 784 semaphore, 72
scheduler, 65-73, 75, 1436, 1437 semaphore values, 1553
long-term, 67 sensor, 537, 695, 697
medium-term, 67 sequence number prediction, 1194
primary, 75 serial communications, 437, 446, 615, 627, 633, 644,
secondary, 75 719, 1972
short-term, 67 serial copy management, 1951
scheduling, 40, 51, 52, 53-54, 66-75, 573, 694, 696, service quality, 849
1935 session hi-jacking, 1194
algorithms, 68 session layer, 729, 730, 736, I 004
multilevel queue, 71 shielded twisted pair, 580, 825, 830, 1961
priority, 71 shielding, 754
queues, 67 shortest-job-first, 70
SCMS, 1951 S-HTTP, 1267, 1271
scrambled, 1219 signal-to-noise ratio, 791, 1800, 1952
SCSI, 437, 445, 446, 450, 467, 525-529, 549-562, SIMMs, 492, 496
577,578,609-613,715,1951 simplex, 1972
A-cable, 550 single-tasking, 41, 65
B-cable, 550 SIPO, 1951
commands, 558 SIPP, 984, 1951
Fast/wide, 5 50 skin effect, 30

1996 Handbook of Data Communications and Networks


SKIPJACK, 1237 SSL,920,921, 1237,1267,1268,1272,1952
s~. 761,780, 152o, 1944 ST connector, 780
S~[)S, 1067, 1160, 1873, 1947, 1951, 1956 ST-506, 527, 529
s~.834,836,844, 1951 standalone, 723, 814
S~TP,34,39, 1006,1008,1063,1090,1094,1100, star, 19, 80, 538, 545, 606,644,915, 1373, 1431,
1117, 1186, 1187, 1192, 1268, 1346-1356, 1361, 1432, 1435, 1465, 1476, 1477, 1613, 1615, 1616
1362, 1462, 1871, 1875, 1877, 1880, 1885, 1887, star network, 744,746,747,783,915
1951 start and end delitniter, 826, 837, 883
S~A. 724,775,776,777,1021,1026,1028,1442, start bit, 588, 592, 678, 713, 838
1487, 1492, 1950, 1951 start delitniter, 700,773, 827, 828, 837-839, 1951
s~~P.34,985, 10o6, 1008,1018,1393-1397, startup files and scripts, 1501
1403, 1430, 1462, 1872, 1873, 1878, 1881, 1887, stateless protocol, 1374, 1376
1934, 1951, 1952, 1972 static interference, 761, 1520
S~R. 714, 1799, 1952 station tnanagetnent, 834
socket, 921, 1028, 1073, 1075-1082, 1097-1117, statistical
1188, 1267, 1268, 1492, 1862, 1879 encoding, 1965, 1973
connection, 1097 cnultiplexing, 854
creating, 1099 ST~,612,613,849,850,854,858,864,916,918,

nutnber, 1001, 1005, 1006, 1023, 1219 1952


progracntning, 1073 stop bit, 588, 592, 618, 622-624, 636, 678, 679,
VVindo~. 1073, 1076, 1443 1959
software handshaking, 618, 619 store-and-forward switching, 816
software interrupts, 55 STP,699, 753,755,782,798,829-831,1952
SC>~ET,858,917,918, 1879,1887,1950,1952 streatn-oriented, 1004
sound,51,57,58,439,445,447,490,563, 727, striping with parity, 1444
1236, 1345, 1367, 1370, 1372, 1379, 1802 STS-1, 858
source address, 702,746,749,772,773,794, 817, sub-band, 1951
825, 826, 828, 838, 995, 1186, 1187, 1219, 1780, subnet,820,902,963,972-974,979,981,985,989,
1938, 1951, 1963 992,998,1024,1036,1038,1144, 1151, 1152,
source route, 739 1155, 1172, 1405, 1407, 1408, 1411, 1427, 1930,
source route bridging, 739 1936, 1941, 1966, 1968, 1970
source-encoding, 1973 supervisory fracnes, 870, 871, 872, 883
spanning tree, 739, 740, 798, 1160 suppressing repetitive sequences, 1973
speech,23,25,579, 727,786,843,847-849,863, switch, 10, 546, 552, 564, 612, 613, 625, 648, 649,
877,887,888,1273,1345,1346,1369,1958, 737,749,789,791,798,814,816,817,818,820,
1964, 1966, 1970, 1971 821,829,851,853-856,1067,1068,1144,1150,
split horizon, 1169 1156, 1157, 1439, 1506, 1543, 1551, 1554, 1731,
SPX,41,63,730,771,773, 1000,1003,1019-1027, 1957, 1958, 1959, 1960, 1966
1033, 1035, 1075, 1156, 1441-1443, 1487, 1489- cut-through, 816, 817, 1963
1491, 1494, 1506, 1952 store-and-forward, 817, 1957
packet forcnat, 1027, 1491 synchronization, 41, 46, 438, 703, 713, 878, 880,
SPX/IPX, 771, 1000, 1003, 1019-1021, 1033, 1001, 1023, 1180, 1461, 1489, 1494, 1504, 1505,
1035, 1075, 1156, 1441-1443, 1487, 1494, 1951, 1883, 1966, 1968
1506 synchronous,443,444,492,499,501,506, 532,549,
S~L. 1617-1624, 1666, 1667, 1669 588,595,596,838,839,844,849,858,867,1725,
s~. 10, 11,450,487,489,492,497,501,502, 1951, 1952, 1968, 1974
503,520,522,1787,1788,1952 task ~anager, 80
SREJ, 871 task switching, 73

Index 1997
TCP, 3, 33, 39, 41, 45, 49, 50, 60, 63,609,724, ports and sockets, I 006
730,731,736,749,771-776,848,857,907,963- protocols, 1460, 1973
968,984,986,988,991,992,999-1039.1063, services reference, I 0 I 7
1065-1075, 1082, 1087, 1088, 1092, 1094, 1095, version number, 966
1098, 1102, 1156, 1160, 118~ 1186,1192,1194, TCP/UDP, 1004, 1035, 1429, 1430
1219, 1268, 1346, 1349-1352, 1367, 1376, 1383, TD,616-624,631, 799,1667-1670
1394, !405, !406, 1408, 1412, 1417, 1429-1431, TDAC, 1952
!442, 1443, 1457-1461, 1487, 1490, 1492, 1494, TDI, 451,466,483, 1442, 1443
1506, 1507, 1871-1879, 1884, 1887, 1927-1930, TOM, 847, 849, 879, 1952
1936, 1948, 1952, 1960, 1966-1973 TE,620, 880,881,882,885,886,1246
connection, I 009 TEI,882,883,884,886, 1952
connection states, I 011 telnet, I, 23, 34, 39, 730, 736, 963, 985, 999, 1005-
header format, 1005, 1006, 1007 1010, 1017, 1063, 1090, 1071, 1094, 1100, 1101,
internets, 968 1117,1118,1144, 1152,1157,1159,1160,1186,
ISN selection, I 013 1192-1196,1219,1268,1367,1372,1416-1418,
opening and closing a connection, I 014 1430, 1440, 1461, 1872, 1873, 1880, 1930, 1952,
ports and sockets, I 006 1973
Protocol Data Unit, 964, 1005 thread, 43, 48, 49, 51, 53, 75, 1200
sequence numbers, 1005, 1009, 1012 threading, 47
specification, I 009 threads, 48, 75
TCB parameters, 1012, 1013 three-way handshake, 1010, 1013, 1014
user commands, 1015 throughput, 53,439,444,447,449, 511, 715, 729,
TCP user commands 740,783,784,787,814,847,896,901,966,1025,
ABORT, 1011, 1017 1172, 1200
CLOSE, 1009-1016, 1071, 1122, 1124, 1617, TIFF, 1882, 1887, 1952, 1973
1619, 1621, 1623, 1624 time
OPEN, 1009-1011, 1015, 1089, 1091, 1095, server types, 1505
1180-1183 synchronization, 1504
RECEIVE, 73, 74,799, 1009-1011, 1014, 1016 timer, 51, 57, 58, 66, 532,605,606,923,929, 1636,
SEND, 73, 74, 1009-1011, 1016, 1122, 1351 1655
STATUS,646,647,648,650, 1010,1011,1017 timestamp, 990, 991, 995, 996, 1069, 1265, 1505,
TCP/IP, 3, 33, 39, 41, 45, 49, 50, 60, 63, 609, 724, 1939, 1940
730,736,749,771,773,775.776,857.907,963- timing attack, 1247
968,988,999-1004,1017,1020,1021,1028, token ring, 63, 612, 731, 743, 746-749, 762, 764,
1033, 1035, 1038, 1039, 1063, 1065, 1066, 1069, 771,786,806,817,825-834,840,843,847,874,
I 070, I 073, 1102, 1185, 1186, 1192, 1194, 1268, 963,964,968,981,1024,1404,1442,1490,1873,
1346, 1349, 1367, 1376, 1394, 1405, 1406, 1408, 1955, 1957. 1961, 1964, 1970, 1973
1412, 1429, 1442, 1443, 1457. 1460, 1487, 1492, adding to the ring, 748, 828
1494, 1506, 1507, 1871-1873, 1879, 1927, 1928, cable, 825
1929, 1930, 1960, 1966-1973 deletion from ring, 748, 828
class A, 969, 973 fault management, 749, 828
class B, 859, 969, 970, 973 jitter suppression, 831
class C, 859, 969, 973 maintenance, 748, 828
commands, !063 MAUs, 749, 778, 825, 829-831, 1881, 1948,
gateways and hosts, 964, 968, I 028, 1492 1959. 1970
implementation, 968 ring initialization, 748, 828
internets, 968 topology,447,571,578,579,580,6!2,613,614,
model, 1003, 1004 69!,692,693, 743-750,753.764,766,772,783,

1998 Handbook of Data Communications and Networks


798,833,834,864,915,981,982,1160,1163- URI,927, 1378-1388,1763,1884,1887,1952
1174, 1177,1368,1961,1962,1964 URL, 923, 1102, 1106-1109, 1121-1127, 1372-
total internal reflection, 759, 1517 1376, 1388, 1389, 1544-1547, 1624, 1642, 1652,
TR, !667, 1668-1670, 1947, 1952 1653, 1673, 1801, 1802, 1822, 1864, 1865, 1873,
traceroute, I 063, I 066, I 067, I 068, I 070, 1159 1875, 1876, 1878, 1880, 1881, 1883, 1884, 1887,
traffic 1948, 1950, 1952
congestion, 862, 1161 USB,4,45, 57,445-451,487-492,497,499,506,
profile, 847 512,515,518,522,531,571-578,583,599,907,
profiles, 847 1952
statistics, 836 OHCI, 573
transceiver, 707, 714, 778-781, 786, 789, 800, 803, UHCI, 573, 574, 575
1144, 1788, 1792 UTP,28,29,30, 753,755,762,765,779-782,790,
transform encoding, 1973 830, 831, 1510, 1511, 1952, 1965, 1971
transmission channel, 697, 1353, 1970 V.21/22/32/42, 1723, 1727, 1973, 1974
transmission line, 628, 629, 800, 1064, 1531-1540, variable length code, 1967
1969 VBScript, 931, 1629-1635, 1671
transport layer, 729,730,731,732,735-737,741, VCI,850-857,894, 897,901,902,1952
963,964,966,999-1001,1004,1023,1156,1219, header, 851
1442, 1461, 1489, 1955, 1970 !able, 850, 851, 855, 897, 901, 902
tree topology, 745 VCO, 801, 802, 1953
trusted Sites, 1274 video, 7,23,25,45,437,445,449,467,471,488,
TTL, 967, 1024, 1064, 1066, 1067, 1069, 1428, 499,509,522,525,538,541,547,571,576,577,
1429, 1490, 1929, 1952 579,592,599,609,610,614,741,771,786,843,
tunnel, 1020, 1159, 1186, 1377, 1487 847,848,849,850,859,863,864,913,983,1185,
twisted-pair, 28-30, 572,615, 690-692, 699,705, 1271, 1346, 1358, 1359, 1360, 1367, 1370, 1387,
732,733,738,744,746,749-755,762-772,778- 1509, 1535,.1876, 1877, 1880, 1881, 1884, 1956,
789,825,829,830,880, 1!44, 1509-1511,1526- 1972
1531, 1952, 1955, 1961, 1965, 1970, 1972 violation, 699, 827, 835, 836, 1236
l}(C,488,489,492-495,497,499, 502 virtual channels, 852, 853
UDP, 984,997, 1007-1009, 1038, 1039, 1066, virtual Circuit, 850
1070, 1075,1082,1088,1092, 1094, 1095, 1192, virtual data flow, 730
1417, 1430, 1431, 1461, 1930, 1940, 1949, 1952 virtual device driver, 1953
UI, 778,884,1952 virtualloadable modules, 1506
unbalanced,630,868 virtual machine manager, 52, 53, 1953
uncompressed, 538, 1475, 1956, 1969 virtual path, 847, 851-855, 1653
~!,850,857,862, 1952 virus, 50, 51, I 022
unicast, 986, 1039, 1408 vLAN,818-821
unicode, 1830, 1831, 1877, 1879 VLC, 1953, 1974
~IX,2,3, 18,33,37-46,60-63,71,73,76,542, VLC-LZVV, 1953, 1974
726,728,740,771,988,999,1020,1021,1073, VL-local bus, 437, 447, 448, 450, 527
1172, 1185, 1195, 1197, 1199, 1350, 1353, 1370, VRC, 1953
1371, 1430, 1435, 1441, 1450, 1457, 1460, !462, ~.715,718, 719,721
1463, 1466, 1471, 1472, 1474, 1478, 1479, 1487, VVAIS, 1953
1495, 1625, 1626, 1961 vv~.6I2,6I3, 723,864,891, II44, 1953,1973
unnumbered Information, 884 VVAV, 25, 1367, 1883
unrestricted token, 834 VVin32, 51-54, 1129, 1391, 1935
unshielded twisted-pair cable, 28, 753, 755 window enable register, 567
UPS, 1445, 1952 windowing, 999, 1001, 1003

Index 1999
WINS, 1036, 1071, 1412, 1413, 1447, 1927, 1932, X/Open, 61, 1457
1953 X3T9.5, 841,844, 1974
WinSock, 1015, 1073, 1074, 1082, 1083, 1085, XDbus, 1793
I 086, 1127, 1390, 1443 XDR, 18,736, 1480, 1485, 1953
WINSOCK.DLL, 49, 50, 1443 X-OFF/ON, 619,628, 1974
WINSOCK32.DLL, 1443 XOR,646,682, 1230,1232,1233,1235-1237,
wireless, 26, 905-913 1240, 1241, 1243, 1444, 1953
wiring closets, 763, 766 X-Windows, 3, 39,981, 1457, 1461, 1470, 1872,
workgroups, 62, 1446, 1448, 1495 1873
WorldFIP, 690, 691,699-703 ypinit, 1434
WORM, 525, 538, 1953 ypwhich, 1434
X.21,892, 893,1974 YIN, 499
X.25,867, 874,892,894,897-903,1151,1160, zero bit-stuffing, 882, 883
1174, 1948, 1950, 1970, 1974 ZIP, 1367, 1384, 1953
X.400, 1348, 1349, 1974

2000 Handbook of Data Communications and Networks

You might also like