Поиск по:itpm.msu.su -
Поискать по всем серверам
На этой странице приведены все страницы сервера itpm.msu.su ,которые мы индексируем. Показаны документы 841 - 860 из 982.
Упорядочить по:
URL
|
дате изменения
841. The Socket Library
Next: Networking Up: TCP/IP Networks Previous: More on Ports . ... The programming interface most common in the world is the Berkeley Socket Library . Its name derives from a popular analogy that views ports as sockets, and connecting to a port as plugging in. ... The socket library is however somewhat more general, in that it provides not only a class of TCP/IP-based sockets (the AF_INET sockets), but also a class that handles connections local to the machine (the AF_UNIX class). ...
[
Сохраненная копия
]
Ссылки http://itpm.msu.su/LDP/nag/node16.html -- 2.9 Кб -- 18.04.1999
Похожие документы
Похожие документы
842. System Name
Next: Telephone Number Up: How to Tell UUCP Previous: How to Tell UUCP . The system command names the remote system. You must specify the correct name of the remote system, not an alias you invented, because uucico will check it against what the remote system says it is called when you log on. ... If you want to use several sets of configurations for the same system (such as different telephone numbers uucico should try in turn), you can specify alternates . ... Thu Mar 7 23:22:06 EST 1996 ...
[
Сохраненная копия
]
Ссылки http://itpm.msu.su/LDP/nag/node160.html -- 2.3 Кб -- 18.04.1999
Похожие документы
Похожие документы
843. Using the Traditional NIS Code
Next: The Network File System Up: The Network Information System Previous: Using NIS with Shadow . ... Also, the way traditional NIS decides if and how to merge NIS information with that from the local files deviates from that used by NYS. For instance, to use the NIS password maps, you have to include the following line somewhere in your /etc/passwd map: . ... To use the hosts.* maps distributed by NIS, change the order line in the host.conf file. ...
[
Сохраненная копия
]
Ссылки http://itpm.msu.su/LDP/nag/node139.html -- 4.0 Кб -- 18.04.1999
Похожие документы
Похожие документы
844. The User Datagram Protocol
Next: More on Ports Up: TCP/IP Networks Previous: The Transmission Control Protocol . Of course, TCP isn't the only user protocol in TCP/IP networking. Although suitable for applications like rlogin, the overhead involved is prohibitive for applications like NFS. Instead, it uses a sibling protocol of TCP called UDP, or User Datagram Protocol . ... Instead, a request is made to galois, who sends the file in a couple of UDP packets, which is much faster. ...
[
Сохраненная копия
]
Ссылки http://itpm.msu.su/LDP/nag/node14.html -- 2.8 Кб -- 18.04.1999
Похожие документы
Похожие документы
845. The Network File System
... It allows to access files on remote hosts in exactly the same way as a user would access any local files. This is made possible by a mixture of kernel functionality on the client side (that uses the remote file system) and an NFS server on the server side (that provides the file data). ... The NFS implementation of is a little different in that the client code is tightly integrated in the virtual file system (VFS) layer of the kernel and doesn't require additional control through biod. ...
[
Сохраненная копия
]
Ссылки http://itpm.msu.su/LDP/nag/node140.html -- 6.9 Кб -- 18.04.1999
Похожие документы
Похожие документы
846. Preparing NFS
Next: Mounting an NFS Volume Up: The Network File System Previous: The Network File System . Before you can use NFS, be it as server or client, you must make sure your kernel has NFS support compiled in. Newer kernels have a simple interface on the proc filesystem for this, the /proc/filesystems file, which you can display using cat: $ cat /proc/filesystems minix ext2 msdos nodev proc nodev nfs If nfs is missing from this list, then you have to compile your own kernel with NFS enabled. ...
[
Сохраненная копия
]
Ссылки http://itpm.msu.su/LDP/nag/node141.html -- 3.3 Кб -- 18.04.1999
Похожие документы
Похожие документы
847. Mounting an NFS Volume
... NFS volumes are mounted very much the way usual file systems are mounted. You invoke mount using the following syntax: # mount -t nfs nfs volume local dir options nfs_volume is given as remote_host:remote_dir. ... A sample entry in /etc/fstab might be # volume mount point type options news:/usr/spool/news /usr/spool/news nfs timeo=14,intr This volume may then be mounted using # mount news:/usr/spool/news In the absence of a fstab entry, NFS mount invocations look a lot uglier. ...
[
Сохраненная копия
]
Ссылки http://itpm.msu.su/LDP/nag/node142.html -- 7.0 Кб -- 18.04.1999
Похожие документы
Похожие документы
848. The NFS Daemons
... Usually, you include the following two lines in your rc.inet2 script: if [ -x /usr/sbin/rpc.mountd ]; then /usr/sbin/rpc.mountd; echo -n " mountd" fi if [ -x /usr/sbin/rpc.nfsd ]; then /usr/sbin/rpc.nfsd; echo -n " nfsd" fi The ownership information of files a NFS daemon provides to its clients usually contains only numerical user and group id's. If both client and server associate the same user and group names with these numerical id's, they are said to share the same uid/gid space. ...
[
Сохраненная копия
]
Ссылки http://itpm.msu.su/LDP/nag/node143.html -- 3.5 Кб -- 18.04.1999
Похожие документы
Похожие документы
849. The exports File
... While the above options applied to the client's NFS configuration, there is a different set of options on the server side that configure its per-client behavior. These options must be set in the /etc/exports file. By default, mountd will not allow anyone to mount directories from the local host, which is a rather sensible attitude. To permit one or more hosts to NFS-mount a directory, it must exported , that is, must be specified in the exports file. ... This option is on by default. ro . ...
[
Сохраненная копия
]
Ссылки http://itpm.msu.su/LDP/nag/node144.html -- 6.6 Кб -- 18.04.1999
Похожие документы
Похожие документы
850. The Automounter
... Sometimes, it is wasteful to mount all NFS volumes users might possibly want to access; either because of the sheer number of volumes to be mounted, or because of the time this would take at startup. ... One of the clever things about an automounter is that it is able to mount a certain volume from alternative places. For instance, you may keep copies of your X-programs and support files on two or three hosts, and have all other hosts mount them via NFS. ... The current version is amd-5.3. ...
[
Сохраненная копия
]
Ссылки http://itpm.msu.su/LDP/nag/node145.html -- 3.0 Кб -- 18.04.1999
Похожие документы
Похожие документы
851. Managing Taylor UUCP
... More Information on UUCP . ... Layout of UUCP Transfers and Remote Execution . ... uucico Command Line Options . UUCP Configuration Files . A Gentle Introduction to Taylor UUCP . ... Taylor Configuration Files . General Configuration Options-- the config File . How to Tell UUCP about other Systems-- the sys File . ... Restricting Call Times . What Devices there are-- the port File . How to Dial a Number-- the dial File . ... Command Execution . File Transfers . ...
[
Сохраненная копия
]
Ссылки http://itpm.msu.su/LDP/nag/node146.html -- 4.7 Кб -- 18.04.1999
Похожие документы
Похожие документы
852. History
Next: More Information on UUCP Up: Managing Taylor UUCP Previous: Managing Taylor UUCP . ... Currently, there are two major species which differ mainly in their support of hardware and their configuration. ... The second species was developed in 1983, and is commonly referred to as BNU (Basic Networking Utilities), HoneyDanBer UUCP, or HDB for short. ... Apart from traditional configuration files, Taylor UUCP may also be compiled to understand the new-style-- a.k.a. ``Taylor''-- configuration files. ...
[
Сохраненная копия
]
Ссылки http://itpm.msu.su/LDP/nag/node147.html -- 6.2 Кб -- 18.04.1999
Похожие документы
Похожие документы
853. More Information on UUCP
Next: Introduction Up: History Previous: History . ... This is a set of texinfo files that describe the setup using the Taylor configuration scheme. ... Version-2 configuration files, there is a very good book, ``Managing UUCP and Usenet'' ([ ]). ... Another good source for information about UUCP on Linux is Vince Skahan's UUCP-HOWTO, which is posted regularly to comp.os.linux.announce. There's also a newsgroup for the discussion of UUCP, called comp.mail.uucp. ... Thu Mar 7 23:22:06 EST 1996 ...
[
Сохраненная копия
]
Ссылки http://itpm.msu.su/LDP/nag/node148.html -- 2.5 Кб -- 18.04.1999
Похожие документы
Похожие документы
854. Introduction
. Next: Layout of UUCP Transfers Up: Managing Taylor UUCP Previous: More Information on UUCP . Layout of UUCP Transfers and Remote Execution . The Inner Workings of uucico . uucico Command Line Options . Andrew Anderson . Thu Mar 7 23:22:06 EST 1996
[
Сохраненная копия
]
Ссылки http://itpm.msu.su/LDP/nag/node149.html -- 2.0 Кб -- 18.04.1999
Похожие документы
Похожие документы
855. The tcpd access control facility
... We already briefly discussed the finger and tftp services above. ... For example, to wrap the finger daemon, you have to change the corresponding line in inetd.conf to # wrap finger daemon finger stream tcp nowait root /usr/sbin/tcpd in.fingerd Without adding any access control, this will appear to the client just as a usual finger setup, except that any requests are logged to syslog's auth facility. Access control is implemented by means of two files called /etc/hosts.allow and /etc/hosts.deny. ...
[
Сохраненная копия
]
Ссылки http://itpm.msu.su/LDP/nag/node126.html -- 6.0 Кб -- 18.04.1999
Похожие документы
Похожие документы
856. The services and protocols Files
... Commonly, this is either udp or tcp. ... The services file : # # well-known services echo 7/ tcp # Echo echo 7/ udp # discard 9/ tcp sink null # Discard discard 9/ udp sink null # daytime 13/ tcp # Daytime daytime 13/ udp # chargen 19/ tcp ttytst source # Character Generator chargen 19/ udp ttytst source # ftp-data 20/ tcp # File Transfer Protocol (Data) ftp 21/ tcp # File Transfer Protocol (Contr telnet 23/ tcp # Virtual Terminal ...
[
Сохраненная копия
]
Ссылки http://itpm.msu.su/LDP/nag/node127.html -- 5.8 Кб -- 18.04.1999
Похожие документы
Похожие документы
857. Remote Procedure Call
Next: Configuring the r Commands Up: Various Network Applications Previous: The services and protocols . A very general mechanism for client-server applications is provided by RPC, the Remote Procedure Call package. ... An RPC server consists of a collection of procedures that client may call by sending an RPC request to the server, along with the procedure parameters. ... They chose to have each server provide both a TCP and a UDP port for each program and each version. ...
[
Сохраненная копия
]
Ссылки http://itpm.msu.su/LDP/nag/node128.html -- 5.8 Кб -- 18.04.1999
Похожие документы
Похожие документы
858. Configuring the r Commands
... There are a number of commands for executing commands on remote hosts. ... They all spawn a shell on the remote host and allow the user to execute commands. Of course, the client needs to have an account on the host where the command is to be executed. ... This access is controlled by a file called /etc/hosts.equiv. ... If a host name is followed by a user name, as in the last line of the above sample file, this user is given password-free access to all accounts except the root account. ...
[
Сохраненная копия
]
Ссылки http://itpm.msu.su/LDP/nag/node129.html -- 7.4 Кб -- 18.04.1999
Похожие документы
Похожие документы
859. The Transmission Control Protocol
Next: The User Datagram Protocol Up: TCP/IP Networks Previous: IP over Serial Lines . ... If you log into quark, you want to have a reliable connection between your rlogin process on erdos and the shell process on quark. ... This is performed by yet another protocol, TCP, or Transmission Control Protocol , which builds a reliable service on top of IP. ... TCP identifies the end points of such a connection by the IP-addresses of the two hosts involved, and the number of a so-called port on each host. ...
[
Сохраненная копия
]
Ссылки http://itpm.msu.su/LDP/nag/node13.html -- 4.6 Кб -- 18.04.1999
Похожие документы
Похожие документы
860. The Network Information System
... An important stepping stone to this end is to keep vital data such as user account information synchronized between all hosts. ... This is why Sun developed NIS, the Network Information System . ... NIS is based on RPC, and comprises a server, a client-side library, and several administrative tools. ... The library client code from this release has been in the GNU libc for a long time, while the administrative programs have only recently been ported to by Swen Th?mmler. ... Running a NIS Server . ...
[
Сохраненная копия
]
Ссылки http://itpm.msu.su/LDP/nag/node130.html -- 6.7 Кб -- 18.04.1999
Похожие документы
Похожие документы