digital disk recorder A60
A Carllnn C;"mflany
A60
Ethernet
Manual
PRELIMINARY
A60 Ethernet Manual
Rev 1.2 7-DEC-87
Copyright (C) 1987
Abekas Video Systems, Inc.
This manual describes the installation and use of
the A60 as an Ethernet node supporting file
transfer and remote login using some of the TCP/IP
family of protocols. It also includes an
application note describing some of the mechanisms
behind the file transfers.
Abekas Video Systems, Inc.
101 Galveston Drive
Redwood City, CA 94063
(415) 369-5111
uucp Email: ••. !pyramid!abekas!a60mail
CONTENTS
1.
2.
Introduction to Ethernet and TCP/IP.
1.1
Ethernet ••.•
1.2
TCP/IP .•••••.
1.3
Telnet and FTP.
1.4
Unix 'r' Commands.
1.5
The Abekas A60 ..•.
2
2
TCP/IP Application Notes ••••.
2.1
Typical File Transfer ••
2.2
Layered Model •••.
2.3
Physical layer.
Transceivers ••..
Different Ethernet Standards.
SQE •••.•...•••..•••
Data Link Layer ••••..
2.4
Ethernet Addresses.
Network Layer ••..••••
2.5
IP ••••••••..••.•••..
Internet Addresses •.
ICMP.
GGP.
6
6
7
8
8
9
3
4
5
5
. ... . . . . . .
ARP ••
RARP ••••••••
2.6
Transport Layer ..
TCP •••••••••.
UDP ••••••••••
2.7
Upper Levels .•
Telnet ••
FTP ••••
TFTP ••
rep ••
........ . ....
10
11
11
11
11
12
13
13
13
14
14
14
16
16
17
17
18
18
3.
Installing an A60 on a Unix Network •.
/ etc/hosts .•.....•..•.•..••....
Setting the A60 Internet Address.
Setting the A60 Hostname ..
/etc/ethers ....•....•
20
20
22
22
22
4.
Implementation Notes.
Ethernet Address .•.
Address Resolution .•.
IP ••.•••.•......•.
24
24
24
25
i
10.
11.
Appendix ••••••••••.•••••••••••
10.1 Complete TCP/IP Packet ••••••••
10.2 FTP Implementation.
Defaults ••••••••
Opening Message .•..
Commands and Responses ••
10.3 File Names •••••••.••••••••••..
10.4 rlogin Implementation ••
10.5 rsh Implementation.
10.6 rcp Implementation.
62
62
62
63
Bibliography ••••••..•.•••
64
iii
59
59
60
60
60
60
A60 Ethernet Manual
1.
1.1
2
Introduction to Ethernet and TCP/IP
Ethernet
Ethernet is a Local Area Network (LAN) Standard originally
developed at Xerox Palo Alto Research Center.
Ethernet interconnects a group of computers (referred to as hosts
or nodes) with a single 50-ohm coaxial cable with terminations .at
both ends. Data is passed serially at 10MHz in the form of
packets, that is in chunks anywhere from 46 up to 1500 bytes or
characters. Each packet carries addressing information to show
its' source and destination.
Unlike the Public switched telephone system or a video routing
matrix the single cable is shared by all the devices on the
network so there are a set of rules to determine when a node can
access the cable. The technique used is referred to as Carrier
Sense Multiple Access with Collision Detection (CSMA-CD).
Before transmitting a node listens to confirm that nobody else is
transmitting, then, as it transmits it continues to monitor the
cable in case another node started transmitting at the same·time.
If two devices transmit simultaneously it is referred to as a
collision and both devices have to stop immediately and wait a
random amount of time before attempting to transmit again.
Different manufacturers have adopted the low-level Ethernet
hardware and packet specifications and built their own networks on
top of it. Xerox XNS, IBM-SNA, HP-NS and DEC-DECnet are all
networking systems that allow users to share resources and files
and can run over Ethernet.
In the area of Personal Computers 3com Corporation and Novell are
supplying File server systems based on Ethernet.
Small scale Office LAN's are mostly based on cheapernet which uses
thin RG58 50 Ohm cable and BNC connectors, i~ this case the
coaxial cable is 'T'eed directly onto the Ethernet Interface in
the computer. Higher level applications use better quality thick
yellow cable and external transceivers that can attach to the
cable with a spike-like tap.
PRELIMINARY
Ethernet
A60 Ethernet Manual
1.2
3
TCP/IP
The TCP/IP protocol family is emerging as a useful common standard
for network interconnection.
The strength of TCP/IP has been that it is not tied to any
particular manufacturer, it is the result of extensive research
since the 70's by the Advanced Research Projects Agency (ARPA)
community. with backing from the DOD the emphasis for these
protocols has been to interconnect different types of computers
running different operating systems.
TCP/IP is now available as an add on to most computer systems
either in the form of and interface board with built in software
such as the Excelan Ethernet Controllers or as an extra software
package running along side a native Ethernet implementation.
(The
Biblography for this manual lists some of the companies offering
TCP/IP packages)
One reason for the spread of TCP/IP amongst the Computer Graphics
Community has been its inclusion in the Berkeley Versions of the
UNIX operating system (referred to as 4.2 BSD UNIX as opposed to
[he AT&T Unix V), most graphics engines and the Workstations that
control them use Unix as it is a popular operating system for
software development.
TCP and IP are acronyms for 'Transmission Control Protocol' and
'Inter-network Protocol' just two of the layers in the suite of
communications protocols that are required to allow transfer of
data from one computer to another.
IP is the layer immediately on top of Ethernet that adds Network
addressing information to the packet. These Internet addresses
allow IP packets to be transferred to other networks not just
Ethernet, it is similar to the way that Containerized freight can
be carried equally well by road rail or sea.
TCP provides an error free bidirectional communications channel
above which other utilities such as a remote login or file
transfer can be built.
TCP works by giving each packet a sequence number so that a
message or file can be reassembled even if the packets arrive in
the wrong order.
PRELIMINARY
TCP/IP
A60 Ethernet Manual
4
TCP also has an acknowledgement mechanism whereby the receiver
replys with the latest complete sequence number it has assembled,
so that should a packet get lost or delayed in the network the
sender will retransmit the missing packet if it hasn't been
acknowledged within a reasonable timeout period.
The third TCP mechanism is the window which limits the amount of
unacknowledged data the sender can send out, so that it can't get
too far ahead if the receiver is missing a packet from back at the
start of the message.
For the majority of File transfers or TCP connections there is no
data lost, all the packets arrive in the correct order, the power
of the TCP/IP protocols lies in the fact that they are not
restricted to running on a single local area network.
The ARPA Internet for example combines over a 100 different
networks and and includes satellite links across to research
facilities in Europe.
When packets are passing across several networks through
'gateways' which provide an interface from one type of network to
~nother there is more chance of a packet getting lost. There is no
~uarantee that all that packets will take the same route to the
destination, this is possible since each packet carries separate
addressing information. It is up to the gateways to decide what
the most efficient route is and if during the life of the
connection one of the intervening gateways or networks goes down
the TCP/IP protocol is robust enough to be able to replace any
unacknowledged lost data by retransmission. That is assuming an
alternative route can be found.
1.3
Telnet and FTP
On top of the guaranteed delivery TCP connections the A60 supports
file transfer and remote control. Remote control is achieved by
allowing the remote user to 'login' as if the A60 were another
computer and type commands interactively. There are two ways of
doing each, firstly the official ARPA file transfer and remote
login utilities called FTP (File Transfer Protocol) and Telnet
which are specifically intended to work between different Computer
architectures and Operating Systems.
pRELIMINARY
Telnet and FTP
A60 Ethernet Manual
1.4
5
Unix 'r' Commands
The other alternative is the native Unix utilities 'rcp' (Remote
CoPy) 'rlogin' (Remote Login) and 'rsh' (remote shell) these will
be popular with Unix users since they offer a less verbose user
interface - file transfers are achieved by cryptic one line
commands rather than FTP which normally produces a secondary
prompt and requires at least three commands to transfer one file.
1.5
The Abekas A60
The A60 can be viewed as a Video Server - permitting all the
rendering engines and computers in a graphics lab to share the
ability to tryout animation sequences and layoff rendered images
without the preroll and lineup problems associated with single
frame VTRs. It is a powerful sharable resource that treats all the
frames or fields on a disk as separate files that can be copied to
or from the A60.
The remote control provided across Ethernet is intended to
human readable in that the commands for playing or setting
segments are executed by merely typing
"PLAY" or
"DEFSEG 0.20 1.30" so a user sitting at a workstation can
preview frames or animations without the need for a remote
panels beside every workstation.
be
up
easily
control
As an Ethernet device the A60 appears to be just another node that
files can be transferred to in the same way they would be moved
from one computer system to another, there is no need for a
separate VTR controller or special software.
Installation on Ethernet is just a question of the plugging the
A60 into a Transceiver which is a small box that provides the
interface to the Ethernet Coax. The System Manager then specifies
an Internet address for the machine which has to be entered on the
A60 control panel. The other computers on the network can then use
this Internet address to access the A60.
PRELIMINARY
The Abekas A60
A60 Ethernet Manual
2.
6
TCP/IP Application Notes
This section gives a brief outline of the functions of each of the
protocols used in the A60 and the way they interact.
2.1
Typical File Transfer
Take for example the opening of an FTP connection on a Unix
system. To invoke the FTP program the user types :
unix% ftp a60
Which causes a control connection to be opened to the host
specified. The hostname is the name used to refer to the A60 on
the users' machine. Somewhere there will be a file (/etc/hosts on
unix) which gives the mapping between the name (or some other
optional alias) and the Internet Address that has been assigned
for the A60.
A typical entry in /etc/hosts has the following form :
192.5.200.9 a60
The FTP program will first find the Internet address of the remote
host by referring to the /etc/hosts file. Then it has to find an
Ethernet address that corresponds to this Internet address. This
Ethernet address is the address of a device on the local ethernet,
either the A60 itself or a Gateway through which the A60 can be
reached.
In some cases the host computer may have retained this information
from a previous transaction but for the first transfer to an
unknown remote host the local host has to resolve the Internet Ethernet address mapping. To do this it uses the Address
Resolution Protocol (ARP).
ARP involves sending a broadcast packet to all the hosts on the
network.
only the host with the required Internet address or a Gateway that
can reach it will reply with a ARP reply packet supplying the
requested Ethernet address.
)RELIMINARY
Typical File Transfer
A60 Ethernet Manual
7
Once the local host knows how to reach the A60 over Ethernet it
can open up a TCP connection to the FTP port on the A60.
The A60 which has been waiting for a connection to be made to the
FTP port responds with an opening message and the FTP program
passes the Users name to the A60.
Since the A60 does not do any username checking the user then
specifies the filename to transfer A data connection is opened
from the A60 end to the port chosen by the FTP program on the
users' machine and the data is transferred. The data connection
is closed once the data has been transferred, the control
connection is closed when the user issues the 'quit' command.
2.2
Layered Model
The ISO standards authority has proposed an Open Systems
Interconnection model consisting of seven layers. The reason for
dividing the Protocols into layers is so that different protocols
at the same level can be used interchangeably to provide the same
function for the layers above.
Application
f
~-1
Presentation
.\
Session
I
Transport
t
1
i
Network
Data Link
Physical
OSI diagram
RELIMINARY
Layered Model
A60 Ethernet Manual
8
The TCP/IP family of protocols can be applied to several low level
networks architectures, in this case the two lower levels - that
is the Physical layer which defines the connectors and voltages,
and the Data link layer which defines the way data is passed
between two pieces of equipment on the same local network are both
defined by the IEEE 802.3 standard (which in turn is based on the
Xerox Ethernet V2). Another comparable Network standards is X.25
which is used for public packet switched services.
Family Tree
2.3
Physical layer
Ethernet was developed at Xerox PARC and is based on the concept
of a baseband Carrier Sense Multiple Access with Collision
Detection.
(CSMA-CD)
Transceivers
The host computer will be coupled onto the Ethernet Coax by a
device called a transceiver. In some instances (particularly in
the case of 'Cheapernet') the transceiver can be part of the
Ethernet interface board in the host computer. The Remote
pRELIMINARY
Transceivers
A60'Ethernet Manual
9
transceivers can be up to 50m away from the computer and typically
come with a plug in module to allow either a spike tap, N-series
or BNC connectors to interface to the cable.
Cheapernet uses thin RG58 50-ohm coax and BNC style connectors
rather than the high grade 10mm thick Yellow coax that permits the
non-intrustive "vampire tap" transceivers to be spiked into it and
removed without having to take the network down.
The thick coax can be used for networks up 100 nodes on 500m of
cable whereas Cheapernet is limited to 30 nodes on 185 m of cable.
Only two repeaters are allowed on a local network because of the
propagation delays through them. The transceivers should be
placed at multiples of 2.5metres on the cable.
The following is an non-exhaustive list of Transceivers currently
available.
Inmac Transceivers:
HP part number 30241A
part number 8043
LAN 802.3 MAU (Medium Attachment Unit)
3com Ethernet/IEEE 802.3 Transceivers:
3C107 Transceiver with AMP piercing tap
3C108 Transceiver with N series connectors
3C109 Tranceiver with BNC connectors
DEC Ethernet bits:
DESTA - Thin ethernet transceiver
DELNI - Ethernet in a box The DELNI has eight 0-15 connectors for
connecting up to eight ethernet devices without using transceivers
or coaxial cable. It also has a ninth connector for connecting to
a regular transceiver (and thus to a larger net), or to another
DELNI (for a hierarchical DELNI network).
Different Ethernet Standards
There are three different Ethernet standards : Ethernet V1, V2 and
the Newer IEEE 802.3 standard.
The are electrical differences between the different standards
mainly concerning the grounding requirements for the transceiver.
For Ethernet V1 and V2 the connector shell, cable shield and pin
PRELIMINARY
Different Ethernet Standards
Eth~rnet
A60
10
Manual
one of the connector are all connected together whereas for IEEE
802.3 the cable shield is separate from pin 1 ground. The
grounding should be achieved at the host end of the transceiver
cable.
outer Shield
1
Collision +
2
Transmit +
3
*Inner Shield
4
Receive +
5
Ground
6
*Vcc
7
Logic
8
9
•
•
•
•
•
•
•
•
•
•
•
Collision -
10
Transmit -
11
Ground
•
12
Receive -
•
13
Power +12v
14
Ground
15
No Connect
•
•
Transceiver (AUI) cable pinout
* Notes
(Pin 4 Electrically Isolated from Outer shield for 802.3)
(Pin 7 appears to be a no connect on most machines)
Male connector at transceiver, Female at main chassis.
SQE
Some transceivers support SQE or Signal Quality Error (sometimes
called heartbeat) in which case they will simUlate a collision in
the gap at the end of every transmission from the host. This
provides a way of assuring that the collision detection circuitry
in the host interface is functioning correctly. Ethernet VI does
not provide for SQE.
IRELIMINARY
SQE
A60 Ethernet Manual
2.4
11
Data Link Layer
The Data Link layer provides for source and destination addresses
and a trailing CRC allows the integrity of the whole packet to be
checked. Ethernet and IEEE specifications differ in a few minor
respects, The IEEE spec states that the field immediately
following the source address is an optional length, however the
Ethernet receiving hardware is capable of determining the packet
length by other means. The original Xerox Ethernet spec defines
this as a type field which is used to resolve the next protocol
above in the hierarchy. The types used for the ARPA family of
protocols are intentionally chosen to be illegal lengths Ceg
,
larger than the maximum permissible) so as to remove any confusion
between the IEEE and Xerox implementation of Ethernet.
Ethernet Addresses
Ethernet addresses are six bytes conventionally written as six hex
numbers separated by colons. Ethernet addresses are intended to be
unique for any piece of equipment that conforms to the IEEE 802.3
standard.
For instance Abekas Equipment will start 00:00:76:XX:XX:XX
Using the Ethernet Broadcast packet mechanism it is possible for
the local host to send a packet to all the devices on the local
network rather than to one specific address. This is address
FF:FF:FF:FF:FF:FF.
2.5
Network Layer
The Network Layer provides a packet delivery system between two
hosts.
IP
The Internet Protocol adds to a packet the information required to
pass it from one host to another across different networks. The
intention is that a gateway that is passing the packet from one
network to another need only examine the IP header to determine
the routing information.
~RELIMINARY
IP
A60 Ethernet Manual
'
12
The Internet Protocol also provides a mechanism for breaking
packets into smaller fragments for passing them over a network
with restricted packet size.
Internet Addresses
Internet address is a four byte number conventionally expressed as
four decimal numbers (0 •• 255) separated by dots.
eg 192.9.200.5
The Internet Address can be subdivided into two parts, the first
is referred to as the Network number and the second as the local
address. All the machines on the same local network should have
the same Network Number but different Local Addresses. If a host
is asked to send a packet to a remote host with a different
Network number it will assume that the remote host is on a
different network and attempt to find a gateway to it.
Network Numbers for Internet sites are assigned by the ARPA
authorities the local addresses are chosen by the local system
administrator. There are many Ethernet networks that are not
actually part of the Internet and only use a default Network
number.
There are three classes of internet address based on the the
Network number. For a class A address the first byte of the
internet address will be less than 128, the local address is then
formed by the lower three bytes allowing for 4096 separate hosts
on the one network.
A class B address will have a first byte in the range 128 to 191
and in this case the lower two bytes form the local address.
Class C addresses the first byte will have a value greater than
191 only the last byte identifies the individual machine or
internet node.
Internet addresses are intended to be more wide ranging than the
native addressing scheme for the the local network, it is possible
to connect to an Internet host across several different types of
network eg Local Area Ethernet, long haul X.25 packet switched
services and Local area Token ring networks.
fRELIMINARY
Internet Addresses
A60 Ethernet Manual
13
ICMP
Internet Control Message Protocol Is almost an integral part of
IP, it is intended to handle error reporting from Gateways to
hosts or hosts to hosts. It gives the originating host more
information about the reason a packet has been rejected or cannot
be delivered.
ICMP also provides an echo system used by 'ping' programs to help
isolate inter-network problems.
A Selection of the ICMP Massages :
Echo Request
Echo reply
Redirect : Use alternative route
Time Exceeded : Packet died of old age
Parameter problem : Something wrong with the IP Header
Destination Unreachable, either:
Network
Host
Protocol
Port
GGP
Gateway to Gateway Protocol Handles communication between Gateways
for control purposes. Allows them to exchange routing information
and keep up to date on the availability of neighboring Gateways.
ARP
The Address Resolution Protocol uses the Ethernet Broadcast
Mechanism to allow a host to resolve Internet to Ethernet address
mappings by asking all the hosts on the local network if any of
them claim to be the required Internet address.
If the hosts support ARP they will decode the packet, it contains
both the Internet and Ethernet Addresses of the local host and the
Internet address of the host it is trying to reach. Only the
requested host or a Gateway that can reach it on another network
reply directly to the requesting machine.
.PRELIMINARY
ARP
A60 Ethernet Manual
14
RARP
The Reverse Address Resolution Protocol allows an Ethernet host to
determine its own Internet Address by broadcasting a request to
the net.
2.6
Transport Layer
The fourth OSI layer is the Transport Layer, which is concered
with creating and maintaining logical connections between
individual processes on different hosts.
TCP
The transport layer adds a source and destination port number to
the packet addresses. This allows the packet traffic to be routed
to several different processes or users within a particular
machine. A TCP connection is characterized by the combination of
local and remote Internet addresses and the local and remote port
numbers. So for instance several people may be logged in on a
machine though the port assigned to the rlogin service. If two of
~he users originate from the same machine they will have to be on
different ports on their local machine. The TCP software can then
uniquely identify which connection a packet belongs to.
Some of the lower port numbers (normally less than 1024) are
reserved for system functions, these are 'well known' port numbers
that are published for other computers wishing to use a particular
service. Opening connections to these ports is normally a
privileged operating system function.
Commonly used TCP port numbers
FTP
Telnet
Rsh
Rlogin
21
23
514
513
The TCP packet header also carries Sequence and Acknowledge
numbers. The sequence number represents the position of the first
rRE LIMI NARY
TCP
A60 Ethernet Manual
15
byte of this packet in the transmitted data stream. The
Acknowledge represents the byte after the last fully reassembled
byte of the data stream received. In other words the Receiving TCP
can buffer several packets that may be out of sequence but the
Acknowledge number will only increase once the incoming data is
complete up to that byte number.
Sequence numbers are fixed when the connection is opened, packets
are exchanged with the SYN flag set to indicate the initial
sequence number.
The TCP header also includes a window to indicate to the other end
how much buffer space is currently available. This acts as a
method of flow control since the transmitter should not continue
if more than a windows' worth of data remains unacknowledged.
The transmitting side of TCP is responsible for resending a data
if it is not acknowledged within a timout period.
There is a TCP option that allows the maximum number of data bytes
in a packet to be specified, the default is 512.
TCP connections can be
~ctive case the remote
whereas a passive open
local end and wait for
opened either Actively or Passively. In the
port and host address are fully specified,
will only specify the port number at the
an incoming attempt to connect.
On closing the connection it is necessary for both sides to
exchange and acknowledge packets with the FIN flag set.
pRELIMINARY
TCP
A60 Ethernet Manual
16
1
Typical Data Packet
UDP
The User Datagram Protocol is a simple extension to IP that adds
only a source and destination port number and a checksum.
A Datagram is a standalone packet with neither guaranteed delivery
nor special sequence.
TFTP and Sun Microsystems' RPC and NFS are among the protocols
built on top of UDP.
2.7
Upper Levels
For the TCP/IP protocols the top three as! reference layers tend
to be merged into one program at the highest Application layer.
The OSI model also provides for a Session layer which handles user
validation and mapping host names to network addresses, and a
Presentation Layer which handles machine differences like byte
swapping and terminal standardization.
ik>RELIMINARY
Upper Levels
A60 Ethernet Manual
17
Telnet
Telnet is a remote login program based on the concept of a virtual
Terminal. The virtual Terminal has a set of default conditions
that can be changed by 'negotiation' and mutual agreement between
the local and remote host. For instance echo is by default local
and the local host is expected to buffer lines of text until
is pressed.
The Telnet connection has an escape mechanism where hex FF is the
escape character, FF occurring in the data stream is transmitted
as FF FF. The escape character preceds an option negotiation
which contains a code to indicate WILL, WON'T, DO or DON'T and the
particular option code. Before an option will be implemented on
both sides both sides have to positively agree to do it. The
escape sequence is also used to implement 'out of band' signals
such as Abort Output, Interrupt Process and Erase.
FTP
The File Transfer Protocol uses a Telnet connection for User
authentication and control. The control is achieved using a
pommand and Response Dialog which mayor may not be visible to the
user. Commands are of the form "USER Simon" and "STOR pic.rgb".
FTP responses are preceded by a three digit code which allows a
machine to assess the required action.
Some of the meanings are listed below
1xx is a positive preliminary reply
2xx is a positive completion reply
5xx is a Permanent negative completion reply
xOx is a Syntax error
x2x refers to a connection
x5x refers to the file system
PRELIMINARY
FTP
A60 Ethernet Manual
18
Simple FTP transfer
[ open TCP connection to port 21 on the A60 ]
220 Abekas A60 FTP (a60)
-->
USER simon\r\n
<-230 User OK
-->
PORT 192,9,200,1,30,244\r\n
<-200 PORT spec accepted: host 192.9.200.1 port 7924
-->
STOR 407.rgb\r\n
[ Active open from A60 end port 20 to 192.9.200.1 port 7924 ]
<-150 OK here goes
[ Data Transferred ] far end closes data connection when done
<-226 File Transfer OK
-->
QUIT\r\n
<-221 Closing control connection
<--
TFTP
The Trivial File Transfer Protocol is built on top of UDP and
provides an easy-to-implement file transfer. Data is transferred
in 512 byte blocks each data packet carrying a block number. Each
~lock has to be acknowledged before the next one can be
transmitted. TFTP is used for booting diskless hosts on a local
network and exchanging mail.
rcp
As is the case with most Unix applications the implementation of
'r'copy is elegantly minimal. Most of the handshaking is achieved
by the transmission of a single null byte. Most of the Ire
commands use a single TCP connection although there is provision
for a 'standard error' connection
rcp pic400.rgb a60:312.rgb
-->
-->
<--->
\0
(no standard error)
simon\Osimon\O
(local and remote username)
\0
(user info validated)
rcp -t 312.rgb\0
(the command)
<-- \0
(command OK)
--> C0666 1049760 pic400.rgb
(Access flags, length, name)
?RE LIMI NARY
rcp
A60 Ethernet Manual
19
--> \0
<-- \0
--> [1049760 bytes of data]
--> \0
<-- \0
~RELIMINARY
rep
A60 Ethernet Manual
3.
20
Installing an A60 on a Unix Network
These notes apply in particular to Sun Microsystems Unix, there
may be local variations.
Installation should be simply matter of adding the Internet
address chosen for the A60 to the file /etc/hosts and then
entering this address on the A60 control panel.
For these changes to the host machine you will almost certainly
require superuser privilege. This is probably the point to
contact your local Unix Guru.
/etc/hosts
In the following notes "ourhost" and "yphost" are fictitious
example hostnames.
If there is more than one Sun Workstation connected to the network
the chances are that the network service called the Yellow Pages
will be running. The Yellow Pages allow all the machines on the
network to share the same configuration tables, especially things
like host names, password and account info~ation. This simplifies
the task of maintaining the system wide databases and means they
only need to be updated in one place.
The existence of the Yellow Pages can be determined by typing the command
"ypwhich" , Unix should respond with the name of the yp server.
ourhost% ypwhich
ypwhich : ourhost is not running ypbind
Says that the Yellow Pages are not running.
(ypbind is the name of the program that accesses the YP service)
ourhost% ypwhich
yphost
Says the Yellow Pages are originating form the host called 'yphost'
PRELIMINARY
/etc/hosts
A60 Ethernet Manual
21
When the yellow pages are running network nodes only consult their
own tables at boot time, after this requests for system
configuration such as hostnames are provided by the yellow pages
service.
The new hostname need only be entered on the YP server machine and
it then has to be "pushed' out to all the other clients.
First login on the YP server machine either over the net or by
actually walking over to the YP server.
ourhost% rlogin yphost root
Then edit the /etc/hosts file (note that root normally has a # as
a prompt)
yphost# vi /etc/hosts
Entries in the hosts file have the following format :
Everything to the right of ali' is ignored as a comment. Lines
consist of two or more fields separated by whitespace (tabs or
~paces).
The first field on a line is the internet address of the
host, following normal convention it is expressed as four decimal
numbers separated by dots. The second field on a line is the
hostname. Any subsequent names on the line are aliases for the
same machine (normally local abbreviations or nicknames).
An example entry would be :
192.9.200.5
a60
Now we have to update the dynamic version of the host table :
yphost# cd /etc/yp
yphost# make hosts
the response should be
Updated hosts
Pushed hosts
PRELIMINARY
/etc/hosts
A60 Ethernet Manual
22
setting the A60 Internet Address
The A60's Internet address is set via the Miscellaneous Menu on
the control panel. To select the appropriate menu type 74
Source Exif Data:
File Type : PDF
File Type Extension : pdf
MIME Type : application/pdf
PDF Version : 1.3
Linearized : No
XMP Toolkit : Adobe XMP Core 4.2.1-c041 52.342996, 2008/05/07-21:37:19
Create Date : 2015:09:14 09:46:52-08:00
Modify Date : 2015:09:14 09:05:46-07:00
Metadata Date : 2015:09:14 09:05:46-07:00
Producer : Adobe Acrobat 9.0 Paper Capture Plug-in
Format : application/pdf
Document ID : uuid:8be6b3a6-59fd-5f42-a499-3232d059d974
Instance ID : uuid:626b8a51-1d41-f445-b4d2-09c6eb98c3a4
Page Layout : SinglePage
Page Mode : UseNone
Page Count : 70