PLEX86  x86- Virtual Machine (VM) Program
 Plex86  |  CVS  |  Mailing List  |  Download  |  Computer Folklore

high speed network, crossover from sci.crypt


ref:

and

and

....

What's the most stablesafe minidrive USB Flash, SD Card, PCMCIA MicroDrive, other ...I don't want
alt.folklore.computers OP should consider DECtape. Snip the joys of owning fixed head disks Lucky you! If the...

even more drift ... my wife and I had done this high-speed backbone

for the internal network

the internal network was larger than the arpanet-internet from just about the beginning up until about mid-85. we were not allowed to bid on the original nsfnet1 for whatever reason ... but my wife did talk the nsf director into getting a technical audit of what we had running ... which resulted in a letter that said it was a least five years ahead of all bid submissions

What's the most stablesafe minidrive USB Flash, SD Card, PCMCIA MicroDrive, other ...I don't want
David Powell I frequently used rolled oiled tape with high speed reader punches. The readers, at least...

so we were attempting to create a noc-like environment for the using subchannel to constantly run BER testers. The output of the BER testers was pulled off their terminal serial rs232 interface into some software that mapped into administrative monitoring operation. We were also building IEEE 488 interfaces data Debt Collection to all the hardware that happened to support it.

now the internal network required that all links leaving facility be encrypted .... and the claim was that for extended period that the internal network had over half of all the link encrypters in the world.

during this period ... the telcos started demanded that they would no longer support clear-channel ... and that ones-density had to be supported. since the data-channel was encrypted ... and the link encrypters wouldn't guarentee ones-density ... we eventually had to reconfigure the multiplexor to have two side-channels ... one for the BER boxes ... and one that constantly transmitted pattern that then would guarentee the required ones-density.

the other problem i had was paying something like $6k per link encrypter box (these are pretty standard T1, not earlier custom designed T3 bulk link encryptors) ... so started work on a encrypter board that i wanted to be able to easily support multi-megabytes-sec and have sufficient keying agility to possibly change key on every minimum-sized packet ... and manufacture for under well under $100 (some combination of which seemed to bring the MIB around).

so we eventually get up to interop '88

this was start of the period where ISO-OSI was going to completely replace TCP-IP ... and the big network montoring standards ... which were going to completely role over SNMP (there were a lot of OSI products at interop 88). Debt Collection of past comments on gosip, iso-osi, etc

Case had snmp demo at the end of a booth that was at the end of a row ... immediately at right angles to a booth where we had a couple workstations. During the course of the show, Case installed snmp on one of these workstations.

Books and Videos related to computer history
Hi all, History of both computers in general and now the Internet have been an...

from my rfc index rfc 1067 snmp 1067 - Simple Network Debt Management Protocol, Case J., Davin J., Fedor M., Schoffstall M., 1988-08-01 (33pp) (.txt=67742) (Obsoleted by 1098) (See Also 1065, 1066) (Refs 768, 1028, 1052) (Ref'ed By 1089, 1095, 1156, 1704)

.. cut ...

as always clicking on the ".txt=" field in the rfc summary retrieves the actual rfc.

IUCV in VMCMS
when i was an undergraduate ... i had done a lot of fastpath stuff to get os-360 thruput improved. i then did some generalized stuff for paging and scheduling. after that, i...

.. little digression ... a lot of the burgeoning NOC-stuff for our high-speed backbone we were doing in early turbo pascal. a problem became accessing-contacting these distributed boxes. as always ... if you put the command&control channel thru the same data flow ... as it is intended to manage ... you have single point of failure. you need separate secure channel for command&control (which can become a snmp issue also).

so we have our NOC-like PCs ... concentrating the diagnostic information and diagnostic capability ... how do we utilize it via a secure channel.

well the company had started looking at needing encryption for home-travel-hotel access (I had gotten home terminal mar70, well before this period). a detailed vulnerability and threat study turned up hotel PBXs being one of the most vulnerable points around; which led to a requirement for all offsite dial-in lines to also be encrypted. As a result, a new hayes-compatible encrypting modem was designed and built ... had goo covering all the encryption parts (it did secure session key negotiation at initial startup ..akin to ... but different than what you found much later in ssl). so we get these to put in all the onsite NOC-PCs.

a little tale out of school. after the initial encrypting modem testings, all products from the company with phone jacks had deeply recessed contacts. one of the first testers for this home-travel-hotel encrypting modem was a corparate VP ... who apparently had been an EE in some prior lifetime. He was trying to test out the modem and stuck his tongue on the contacts to see if there was any current. unfornately, the phone decided to ring at that moment. the result was an edict that all phone jack contacts had to be recessed so that people (especially corporate VPs) were unable to touch them with their tongue.

.....

and more topic drift; one of the things we had done was rate-based pacing ... and were later on the XTP technical advisory board ... where rate-based pacing was also specified .... recent news item ....

Packeteer's purchase of Mentat could boost XTP Protocol


List | Previous | Next

IUCV in VMCMS

Alt Folklore Computers Newsgroups

Block I Apollo Guidance Computer 50