asciidoctor-rfc 0.1.0 → 0.2.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/.gitignore +5 -0
- data/.oss-guides.rubocop.yml +1077 -0
- data/.rspec +1 -0
- data/.rubocop.yml +19 -1063
- data/.travis.yml +3 -2
- data/Guardfile +22 -0
- data/README.adoc +1151 -0
- data/Rakefile +1 -1
- data/asciidoctor-rfc.gemspec +20 -3
- data/bin/asciidoctor-rfc2 +15 -0
- data/bin/asciidoctor-rfc3 +15 -0
- data/bin/rspec +0 -1
- data/lib/asciidoctor-rfc.rb +4 -0
- data/lib/asciidoctor/rfc/common/base.rb +218 -0
- data/lib/asciidoctor/rfc/common/front.rb +120 -0
- data/lib/asciidoctor/rfc/v2/base.rb +341 -0
- data/lib/asciidoctor/rfc/v2/blocks.rb +192 -0
- data/lib/asciidoctor/rfc/v2/converter.rb +64 -0
- data/lib/asciidoctor/rfc/v2/front.rb +69 -0
- data/lib/asciidoctor/rfc/v2/inline_anchor.rb +102 -0
- data/lib/asciidoctor/rfc/v2/lists.rb +134 -0
- data/lib/asciidoctor/rfc/v2/table.rb +112 -0
- data/lib/asciidoctor/rfc/v2/validate.rb +738 -0
- data/lib/asciidoctor/rfc/v2/validate2.rng +716 -0
- data/lib/asciidoctor/rfc/v3/base.rb +358 -0
- data/lib/asciidoctor/rfc/v3/blocks.rb +203 -0
- data/lib/asciidoctor/rfc/v3/converter.rb +64 -0
- data/lib/asciidoctor/rfc/v3/front.rb +115 -0
- data/lib/asciidoctor/rfc/v3/inline_anchor.rb +90 -0
- data/lib/asciidoctor/rfc/v3/lists.rb +190 -0
- data/lib/asciidoctor/rfc/v3/svg.rng +9081 -0
- data/lib/asciidoctor/rfc/v3/table.rb +65 -0
- data/lib/asciidoctor/rfc/v3/validate.rb +2168 -0
- data/lib/asciidoctor/rfc/v3/validate.rng +2143 -0
- data/lib/asciidoctor/rfc/version.rb +2 -2
- data/spec/asciidoctor/rfc/v2/appendix_spec.rb +124 -0
- data/spec/asciidoctor/rfc/v2/area_spec.rb +60 -0
- data/spec/asciidoctor/rfc/v2/author_spec.rb +444 -0
- data/spec/asciidoctor/rfc/v2/comments_spec.rb +316 -0
- data/spec/asciidoctor/rfc/v2/crossref_spec.rb +205 -0
- data/spec/asciidoctor/rfc/v2/date_spec.rb +166 -0
- data/spec/asciidoctor/rfc/v2/dlist_spec.rb +108 -0
- data/spec/asciidoctor/rfc/v2/document_spec.rb +161 -0
- data/spec/asciidoctor/rfc/v2/example_spec.rb +50 -0
- data/spec/asciidoctor/rfc/v2/front_spec.rb +75 -0
- data/spec/asciidoctor/rfc/v2/image_spec.rb +81 -0
- data/spec/asciidoctor/rfc/v2/indexterm_spec.rb +66 -0
- data/spec/asciidoctor/rfc/v2/inline_formatting_spec.rb +177 -0
- data/spec/asciidoctor/rfc/v2/keyword_spec.rb +63 -0
- data/spec/asciidoctor/rfc/v2/listing_spec.rb +59 -0
- data/spec/asciidoctor/rfc/v2/literal_spec.rb +53 -0
- data/spec/asciidoctor/rfc/v2/olist_spec.rb +147 -0
- data/spec/asciidoctor/rfc/v2/paragraph_spec.rb +68 -0
- data/spec/asciidoctor/rfc/v2/preamble_spec.rb +140 -0
- data/spec/asciidoctor/rfc/v2/quote_spec.rb +24 -0
- data/spec/asciidoctor/rfc/v2/references_spec.rb +96 -0
- data/spec/asciidoctor/rfc/v2/section_spec.rb +260 -0
- data/spec/asciidoctor/rfc/v2/sidebar_spec.rb +32 -0
- data/spec/asciidoctor/rfc/v2/table_spec.rb +293 -0
- data/spec/asciidoctor/rfc/v2/ulist_spec.rb +96 -0
- data/spec/asciidoctor/rfc/v2/workgroup_spec.rb +60 -0
- data/spec/asciidoctor/rfc/v3/appendix_spec.rb +130 -0
- data/spec/asciidoctor/rfc/v3/area_spec.rb +63 -0
- data/spec/asciidoctor/rfc/v3/author_spec.rb +540 -0
- data/spec/asciidoctor/rfc/v3/comments_spec.rb +308 -0
- data/spec/asciidoctor/rfc/v3/crossref_spec.rb +269 -0
- data/spec/asciidoctor/rfc/v3/date_spec.rb +149 -0
- data/spec/asciidoctor/rfc/v3/dlist_spec.rb +121 -0
- data/spec/asciidoctor/rfc/v3/document_spec.rb +109 -0
- data/spec/asciidoctor/rfc/v3/example_spec.rb +34 -0
- data/spec/asciidoctor/rfc/v3/front_spec.rb +43 -0
- data/spec/asciidoctor/rfc/v3/image_spec.rb +81 -0
- data/spec/asciidoctor/rfc/v3/indexterm_spec.rb +69 -0
- data/spec/asciidoctor/rfc/v3/inline_formatting_spec.rb +319 -0
- data/spec/asciidoctor/rfc/v3/keyword_spec.rb +33 -0
- data/spec/asciidoctor/rfc/v3/link_spec.rb +34 -0
- data/spec/asciidoctor/rfc/v3/listing_spec.rb +59 -0
- data/spec/asciidoctor/rfc/v3/literal_spec.rb +51 -0
- data/spec/asciidoctor/rfc/v3/olist_spec.rb +168 -0
- data/spec/asciidoctor/rfc/v3/paragraph_spec.rb +73 -0
- data/spec/asciidoctor/rfc/v3/preamble_spec.rb +112 -0
- data/spec/asciidoctor/rfc/v3/quote_spec.rb +91 -0
- data/spec/asciidoctor/rfc/v3/references_spec.rb +147 -0
- data/spec/asciidoctor/rfc/v3/section_spec.rb +198 -0
- data/spec/asciidoctor/rfc/v3/series_info_spec.rb +151 -0
- data/spec/asciidoctor/rfc/v3/sidebar_spec.rb +30 -0
- data/spec/asciidoctor/rfc/v3/table_spec.rb +275 -0
- data/spec/asciidoctor/rfc/v3/ulist_spec.rb +74 -0
- data/spec/asciidoctor/rfc/v3/workgroup_spec.rb +33 -0
- data/spec/examples/davies-template-bare-06.adoc +361 -0
- data/spec/examples/davies-template-bare-06.xml.orig +426 -0
- data/spec/examples/example-v2.adoc +181 -0
- data/spec/examples/example-v2.xml +675 -0
- data/spec/examples/example-v3.adoc +185 -0
- data/spec/examples/example-v3.xml +1009 -0
- data/spec/examples/mib-doc-template-xml-06.adoc +596 -0
- data/spec/examples/mib-doc-template-xml-06.xml.orig +654 -0
- data/spec/examples/rfc1149.md +76 -0
- data/spec/examples/rfc1149.md.2.xml +94 -0
- data/spec/examples/rfc1149.md.3.xml +93 -0
- data/spec/examples/rfc1149.md.adoc +65 -0
- data/spec/examples/rfc2100.md +149 -0
- data/spec/examples/rfc2100.md.2.xml +169 -0
- data/spec/examples/rfc2100.md.3.xml +163 -0
- data/spec/examples/rfc2100.md.adoc +136 -0
- data/spec/examples/rfc3514.md +203 -0
- data/spec/examples/rfc3514.md.2.xml +238 -0
- data/spec/examples/rfc3514.md.3.xml +258 -0
- data/spec/examples/rfc3514.md.adoc +324 -0
- data/spec/examples/rfc5841.md +342 -0
- data/spec/examples/rfc5841.md.2.xml +393 -0
- data/spec/examples/rfc5841.md.3.xml +449 -0
- data/spec/examples/rfc5841.md.adoc +414 -0
- data/spec/examples/rfc6350.adoc +3499 -0
- data/spec/examples/rfc6350.bib +763 -0
- data/spec/examples/rfc748.md +79 -0
- data/spec/examples/rfc748.md.2.xml +116 -0
- data/spec/examples/rfc748.md.3.xml +109 -0
- data/spec/examples/rfc748.md.adoc +80 -0
- data/spec/examples/rfc7511.md +257 -0
- data/spec/examples/rfc7511.md.2.xml +300 -0
- data/spec/examples/rfc7511.md.3.xml +347 -0
- data/spec/examples/rfc7511.md.adoc +417 -0
- data/spec/spec_helper.rb +115 -5
- metadata +274 -9
- data/.hound.yml +0 -3
- data/README.md +0 -84
- data/lib/asciidoctor/rfc.rb +0 -7
- data/spec/asciidoctor-rfc/.keep +0 -0
@@ -0,0 +1,76 @@
|
|
1
|
+
%%%
|
2
|
+
|
3
|
+
Title = "A Standard for the Transmission of IP Datagrams on Avian Carriers"
|
4
|
+
abbrev = "IP Datagrams on Avian Carriers"
|
5
|
+
category = "info"
|
6
|
+
docName = "rfc-1149"
|
7
|
+
ipr= "trust200902"
|
8
|
+
area = "Internet"
|
9
|
+
workgroup = "Network Working Group"
|
10
|
+
keyword = [""]
|
11
|
+
|
12
|
+
date = 1990-04-01T00:00:00Z
|
13
|
+
|
14
|
+
[[author]]
|
15
|
+
initials="D."
|
16
|
+
surname="Waitzman"
|
17
|
+
fullname="David Waitzman"
|
18
|
+
organization = "BBN STC"
|
19
|
+
[author.address]
|
20
|
+
email = "dwaitzman@BBN.COM"
|
21
|
+
phone = "(617) 873-4323"
|
22
|
+
[author.address.postal]
|
23
|
+
street = "10 Moulton Street"
|
24
|
+
city = "Cambridge"
|
25
|
+
code = "MA 02238"
|
26
|
+
|
27
|
+
%%%
|
28
|
+
|
29
|
+
{mainmatter}
|
30
|
+
|
31
|
+
# Overview and Rational
|
32
|
+
|
33
|
+
Avian carriers can provide high delay, low throughput, and low
|
34
|
+
altitude service. The connection topology is limited to a single
|
35
|
+
point-to-point path for each carrier, used with standard carriers,
|
36
|
+
but many carriers can be used without significant interference with
|
37
|
+
each other, outside of early spring. This is because of the 3D ether
|
38
|
+
space available to the carriers, in contrast to the 1D ether used by
|
39
|
+
IEEE802.3. The carriers have an intrinsic collision avoidance
|
40
|
+
system, which increases availability. Unlike some network
|
41
|
+
technologies, such as packet radio, communication is not limited to
|
42
|
+
line-of-sight distance. Connection oriented service is available in
|
43
|
+
some cities, usually based upon a central hub topology.
|
44
|
+
|
45
|
+
# Frame Format
|
46
|
+
|
47
|
+
The IP datagram is printed, on a small scroll of paper, in
|
48
|
+
hexadecimal, with each octet separated by whitestuff and blackstuff.
|
49
|
+
The scroll of paper is wrapped around one leg of the avian carrier.
|
50
|
+
A band of duct tape is used to secure the datagram's edges. The
|
51
|
+
bandwidth is limited to the leg length. The MTU is variable, and
|
52
|
+
paradoxically, generally increases with increased carrier age. A
|
53
|
+
typical MTU is 256 milligrams. Some datagram padding may be needed.
|
54
|
+
|
55
|
+
Upon receipt, the duct tape is removed and the paper copy of the
|
56
|
+
datagram is optically scanned into a electronically transmittable
|
57
|
+
form.
|
58
|
+
|
59
|
+
# Discussion
|
60
|
+
|
61
|
+
Multiple types of service can be provided with a prioritized pecking
|
62
|
+
order. An additional property is built-in worm detection and
|
63
|
+
eradication. Because IP only guarantees best effort delivery, loss
|
64
|
+
of a carrier can be tolerated. With time, the carriers are self-
|
65
|
+
regenerating. While broadcasting is not specified, storms can cause
|
66
|
+
data loss. There is persistent delivery retry, until the carrier
|
67
|
+
drops. Audit trails are automatically generated, and can often be
|
68
|
+
found on logs and cable trays.
|
69
|
+
|
70
|
+
# Security Considerations
|
71
|
+
|
72
|
+
Security is not generally a problem in normal operation, but special
|
73
|
+
measures must be taken (such as data encryption) when avian carriers
|
74
|
+
are used in a tactical environment.
|
75
|
+
|
76
|
+
{backmatter}
|
@@ -0,0 +1,94 @@
|
|
1
|
+
<?xml version="1.0" encoding="UTF-8"?>
|
2
|
+
<!DOCTYPE rfc SYSTEM 'rfc2629.dtd' []>
|
3
|
+
<rfc ipr="trust200902" category="info" docName="rfc-1149">
|
4
|
+
<?rfc toc="yes"?>
|
5
|
+
<?rfc symrefs="yes"?>
|
6
|
+
<?rfc sortrefs="yes"?>
|
7
|
+
<?rfc compact="yes"?>
|
8
|
+
<?rfc subcompact="no"?>
|
9
|
+
<?rfc private=""?>
|
10
|
+
<?rfc topblock="yes"?>
|
11
|
+
<?rfc comments="no"?>
|
12
|
+
<front>
|
13
|
+
<title abbrev="IP Datagrams on Avian Carriers">A Standard for the Transmission of IP Datagrams on Avian Carriers</title>
|
14
|
+
|
15
|
+
<author initials="D." surname="Waitzman" fullname="David Waitzman">
|
16
|
+
<organization>BBN STC</organization>
|
17
|
+
<address>
|
18
|
+
<postal>
|
19
|
+
<street>10 Moulton Street</street>
|
20
|
+
<city>Cambridge</city>
|
21
|
+
<code>MA 02238</code>
|
22
|
+
<country></country>
|
23
|
+
<region></region>
|
24
|
+
</postal>
|
25
|
+
<phone>(617) 873-4323</phone>
|
26
|
+
<email>dwaitzman@BBN.COM</email>
|
27
|
+
<uri></uri>
|
28
|
+
</address>
|
29
|
+
</author>
|
30
|
+
<date year="1990" month="April" day="1"/>
|
31
|
+
|
32
|
+
<area>Internet</area>
|
33
|
+
<workgroup>Network Working Group</workgroup>
|
34
|
+
<keyword></keyword>
|
35
|
+
|
36
|
+
|
37
|
+
</front>
|
38
|
+
|
39
|
+
<middle>
|
40
|
+
|
41
|
+
<section anchor="overview-and-rational" title="Overview and Rational">
|
42
|
+
<t>Avian carriers can provide high delay, low throughput, and low
|
43
|
+
altitude service. The connection topology is limited to a single
|
44
|
+
point-to-point path for each carrier, used with standard carriers,
|
45
|
+
but many carriers can be used without significant interference with
|
46
|
+
each other, outside of early spring. This is because of the 3D ether
|
47
|
+
space available to the carriers, in contrast to the 1D ether used by
|
48
|
+
IEEE802.3. The carriers have an intrinsic collision avoidance
|
49
|
+
system, which increases availability. Unlike some network
|
50
|
+
technologies, such as packet radio, communication is not limited to
|
51
|
+
line-of-sight distance. Connection oriented service is available in
|
52
|
+
some cities, usually based upon a central hub topology.
|
53
|
+
</t>
|
54
|
+
</section>
|
55
|
+
|
56
|
+
<section anchor="frame-format" title="Frame Format">
|
57
|
+
<t>The IP datagram is printed, on a small scroll of paper, in
|
58
|
+
hexadecimal, with each octet separated by whitestuff and blackstuff.
|
59
|
+
The scroll of paper is wrapped around one leg of the avian carrier.
|
60
|
+
A band of duct tape is used to secure the datagram's edges. The
|
61
|
+
bandwidth is limited to the leg length. The MTU is variable, and
|
62
|
+
paradoxically, generally increases with increased carrier age. A
|
63
|
+
typical MTU is 256 milligrams. Some datagram padding may be needed.
|
64
|
+
</t>
|
65
|
+
<t>Upon receipt, the duct tape is removed and the paper copy of the
|
66
|
+
datagram is optically scanned into a electronically transmittable
|
67
|
+
form.
|
68
|
+
</t>
|
69
|
+
</section>
|
70
|
+
|
71
|
+
<section anchor="discussion" title="Discussion">
|
72
|
+
<t>Multiple types of service can be provided with a prioritized pecking
|
73
|
+
order. An additional property is built-in worm detection and
|
74
|
+
eradication. Because IP only guarantees best effort delivery, loss
|
75
|
+
of a carrier can be tolerated. With time, the carriers are self-
|
76
|
+
regenerating. While broadcasting is not specified, storms can cause
|
77
|
+
data loss. There is persistent delivery retry, until the carrier
|
78
|
+
drops. Audit trails are automatically generated, and can often be
|
79
|
+
found on logs and cable trays.
|
80
|
+
</t>
|
81
|
+
</section>
|
82
|
+
|
83
|
+
<section anchor="security-considerations" title="Security Considerations">
|
84
|
+
<t>Security is not generally a problem in normal operation, but special
|
85
|
+
measures must be taken (such as data encryption) when avian carriers
|
86
|
+
are used in a tactical environment.
|
87
|
+
</t>
|
88
|
+
</section>
|
89
|
+
|
90
|
+
</middle>
|
91
|
+
<back>
|
92
|
+
|
93
|
+
</back>
|
94
|
+
</rfc>
|
@@ -0,0 +1,93 @@
|
|
1
|
+
<?xml version="1.0" encoding="UTF-8"?>
|
2
|
+
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" category="info" docName="rfc-1149">
|
3
|
+
<front>
|
4
|
+
<title abbrev="IP Datagrams on Avian Carriers">A Standard for the Transmission of IP Datagrams on Avian Carriers</title>
|
5
|
+
|
6
|
+
<author initials="D." surname="Waitzman" fullname="David Waitzman">
|
7
|
+
<organization>BBN STC</organization>
|
8
|
+
<address>
|
9
|
+
<postal>
|
10
|
+
<street>10 Moulton Street</street>
|
11
|
+
<city>Cambridge</city>
|
12
|
+
<code>MA 02238</code>
|
13
|
+
<country></country>
|
14
|
+
<region></region>
|
15
|
+
</postal>
|
16
|
+
<phone>(617) 873-4323</phone>
|
17
|
+
<email>dwaitzman@BBN.COM</email>
|
18
|
+
<uri></uri>
|
19
|
+
</address>
|
20
|
+
</author>
|
21
|
+
<date year="1990" month="April" day="1"/>
|
22
|
+
|
23
|
+
<area>Internet</area>
|
24
|
+
<workgroup>Network Working Group</workgroup>
|
25
|
+
<keyword></keyword>
|
26
|
+
|
27
|
+
</front>
|
28
|
+
|
29
|
+
<middle>
|
30
|
+
|
31
|
+
<section anchor="overview-and-rational">
|
32
|
+
<name>Overview and Rational</name>
|
33
|
+
<t>
|
34
|
+
Avian carriers can provide high delay, low throughput, and low
|
35
|
+
altitude service. The connection topology is limited to a single
|
36
|
+
point-to-point path for each carrier, used with standard carriers,
|
37
|
+
but many carriers can be used without significant interference with
|
38
|
+
each other, outside of early spring. This is because of the 3D ether
|
39
|
+
space available to the carriers, in contrast to the 1D ether used by
|
40
|
+
IEEE802.3. The carriers have an intrinsic collision avoidance
|
41
|
+
system, which increases availability. Unlike some network
|
42
|
+
technologies, such as packet radio, communication is not limited to
|
43
|
+
line-of-sight distance. Connection oriented service is available in
|
44
|
+
some cities, usually based upon a central hub topology.
|
45
|
+
</t>
|
46
|
+
</section>
|
47
|
+
|
48
|
+
<section anchor="frame-format">
|
49
|
+
<name>Frame Format</name>
|
50
|
+
<t>
|
51
|
+
The IP datagram is printed, on a small scroll of paper, in
|
52
|
+
hexadecimal, with each octet separated by whitestuff and blackstuff.
|
53
|
+
The scroll of paper is wrapped around one leg of the avian carrier.
|
54
|
+
A band of duct tape is used to secure the datagram's edges. The
|
55
|
+
bandwidth is limited to the leg length. The MTU is variable, and
|
56
|
+
paradoxically, generally increases with increased carrier age. A
|
57
|
+
typical MTU is 256 milligrams. Some datagram padding may be needed.
|
58
|
+
</t>
|
59
|
+
<t>
|
60
|
+
Upon receipt, the duct tape is removed and the paper copy of the
|
61
|
+
datagram is optically scanned into a electronically transmittable
|
62
|
+
form.
|
63
|
+
</t>
|
64
|
+
</section>
|
65
|
+
|
66
|
+
<section anchor="discussion">
|
67
|
+
<name>Discussion</name>
|
68
|
+
<t>
|
69
|
+
Multiple types of service can be provided with a prioritized pecking
|
70
|
+
order. An additional property is built-in worm detection and
|
71
|
+
eradication. Because IP only guarantees best effort delivery, loss
|
72
|
+
of a carrier can be tolerated. With time, the carriers are self-
|
73
|
+
regenerating. While broadcasting is not specified, storms can cause
|
74
|
+
data loss. There is persistent delivery retry, until the carrier
|
75
|
+
drops. Audit trails are automatically generated, and can often be
|
76
|
+
found on logs and cable trays.
|
77
|
+
</t>
|
78
|
+
</section>
|
79
|
+
|
80
|
+
<section anchor="security-considerations">
|
81
|
+
<name>Security Considerations</name>
|
82
|
+
<t>
|
83
|
+
Security is not generally a problem in normal operation, but special
|
84
|
+
measures must be taken (such as data encryption) when avian carriers
|
85
|
+
are used in a tactical environment.
|
86
|
+
</t>
|
87
|
+
</section>
|
88
|
+
|
89
|
+
</middle>
|
90
|
+
<back>
|
91
|
+
|
92
|
+
</back>
|
93
|
+
</rfc>
|
@@ -0,0 +1,65 @@
|
|
1
|
+
= A Standard for the Transmission of IP Datagrams on Avian Carriers
|
2
|
+
David Waitzman <dwaitzman@BBN.COM>
|
3
|
+
:abbrev: IP Datagrams on Avian Carriers
|
4
|
+
:status: info
|
5
|
+
:name: rfc-1149
|
6
|
+
:ipr: trust200902
|
7
|
+
:area: Internet
|
8
|
+
:workgroup: Network Working Group
|
9
|
+
:date: 1990-04-01T00:00:00Z
|
10
|
+
:forename_initials: D.
|
11
|
+
:organization: BBN STC
|
12
|
+
:phone: (617) 873-4323
|
13
|
+
:street: 10 Moulton Street
|
14
|
+
:city: Cambridge
|
15
|
+
:code: MA 02238
|
16
|
+
:smart-quotes: false
|
17
|
+
|
18
|
+
[[overview-and-rational]]
|
19
|
+
== Overview and Rational
|
20
|
+
|
21
|
+
Avian carriers can provide high delay, low throughput, and low
|
22
|
+
altitude service. The connection topology is limited to a single
|
23
|
+
point-to-point path for each carrier, used with standard carriers,
|
24
|
+
but many carriers can be used without significant interference with
|
25
|
+
each other, outside of early spring. This is because of the 3D ether
|
26
|
+
space available to the carriers, in contrast to the 1D ether used by
|
27
|
+
IEEE802.3. The carriers have an intrinsic collision avoidance
|
28
|
+
system, which increases availability. Unlike some network
|
29
|
+
technologies, such as packet radio, communication is not limited to
|
30
|
+
line-of-sight distance. Connection oriented service is available in
|
31
|
+
some cities, usually based upon a central hub topology.
|
32
|
+
|
33
|
+
[[frame-format]]
|
34
|
+
== Frame Format
|
35
|
+
|
36
|
+
The IP datagram is printed, on a small scroll of paper, in
|
37
|
+
hexadecimal, with each octet separated by whitestuff and blackstuff.
|
38
|
+
The scroll of paper is wrapped around one leg of the avian carrier.
|
39
|
+
A band of duct tape is used to secure the datagram's edges. The
|
40
|
+
bandwidth is limited to the leg length. The MTU is variable, and
|
41
|
+
paradoxically, generally increases with increased carrier age. A
|
42
|
+
typical MTU is 256 milligrams. Some datagram padding may be needed.
|
43
|
+
|
44
|
+
Upon receipt, the duct tape is removed and the paper copy of the
|
45
|
+
datagram is optically scanned into a electronically transmittable
|
46
|
+
form.
|
47
|
+
|
48
|
+
[[discussion]]
|
49
|
+
== Discussion
|
50
|
+
|
51
|
+
Multiple types of service can be provided with a prioritized pecking
|
52
|
+
order. An additional property is built-in worm detection and
|
53
|
+
eradication. Because IP only guarantees best effort delivery, loss
|
54
|
+
of a carrier can be tolerated. With time, the carriers are self-
|
55
|
+
regenerating. While broadcasting is not specified, storms can cause
|
56
|
+
data loss. There is persistent delivery retry, until the carrier
|
57
|
+
drops. Audit trails are automatically generated, and can often be
|
58
|
+
found on logs and cable trays.
|
59
|
+
|
60
|
+
[[security-considerations]]
|
61
|
+
== Security Considerations
|
62
|
+
|
63
|
+
Security is not generally a problem in normal operation, but special
|
64
|
+
measures must be taken (such as data encryption) when avian carriers
|
65
|
+
are used in a tactical environment.
|
@@ -0,0 +1,149 @@
|
|
1
|
+
%%%
|
2
|
+
|
3
|
+
title = "The Naming of Hosts"
|
4
|
+
abbrev = "The Naming of Hosts"
|
5
|
+
category = "info"
|
6
|
+
docname = "rfc-2100"
|
7
|
+
ipr= "trust200902"
|
8
|
+
area = "Internet"
|
9
|
+
workgroup = "Network Working Group"
|
10
|
+
keyword = [""]
|
11
|
+
|
12
|
+
date = 1997-04-01T00:00:00Z
|
13
|
+
|
14
|
+
[pi]
|
15
|
+
toc = "no"
|
16
|
+
symrefs = "no"
|
17
|
+
|
18
|
+
[[author]]
|
19
|
+
initials="J. R."
|
20
|
+
surname="Ashworth"
|
21
|
+
fullname="Jay R. Ashworth"
|
22
|
+
abbrev = "Ashworth & Associates"
|
23
|
+
organization = "Advanced Technology Consulting"
|
24
|
+
[author.address]
|
25
|
+
email = "jra@scfn.thpl.lib.fl.us"
|
26
|
+
phone = "+1 813 790 7592"
|
27
|
+
[author.address.postal]
|
28
|
+
city = "St. Petersburg"
|
29
|
+
code = "FL 33709-4819"
|
30
|
+
|
31
|
+
%%%
|
32
|
+
|
33
|
+
{mainmatter}
|
34
|
+
|
35
|
+
# Introduction
|
36
|
+
|
37
|
+
This RFC is a commentary on the difficulty of deciding upon an
|
38
|
+
acceptably distinctive hostname for one's computer, a problem which
|
39
|
+
grows in direct proportion to the logarithmically increasing size of
|
40
|
+
the Internet.
|
41
|
+
|
42
|
+
Distribution of this memo is unlimited.
|
43
|
+
|
44
|
+
Except to TS Eliot.
|
45
|
+
|
46
|
+
And, for that matter, to David Addison, who hates iambic pentameter.
|
47
|
+
|
48
|
+
# Poetry
|
49
|
+
|
50
|
+
{align="left"}
|
51
|
+
The Naming of Hosts is a difficult matter,
|
52
|
+
It isn't just one of your holiday games;
|
53
|
+
You may think at first I'm as mad as a hatter
|
54
|
+
When I tell you, a host must have THREE DIFFERENT NAMES.
|
55
|
+
<!-- separator -->
|
56
|
+
{align="left"}
|
57
|
+
First of all, there's the name that the users use daily,
|
58
|
+
Such as venus, athena, and cisco, and ames,
|
59
|
+
Such as titan or sirius, hobbes or europa--
|
60
|
+
All of them sensible everyday names.
|
61
|
+
<!-- separator -->
|
62
|
+
{align="left"}
|
63
|
+
There are fancier names if you think they sound sweeter,
|
64
|
+
Some for the web pages, some for the flames:
|
65
|
+
Such as mercury, phoenix, orion, and charon--
|
66
|
+
But all of them sensible everyday names.
|
67
|
+
<!-- separator -->
|
68
|
+
{align="left"}
|
69
|
+
But I tell you, a host needs a name that's particular,
|
70
|
+
A name that's peculiar, and more dignified,
|
71
|
+
Else how can it keep its home page perpendicular,
|
72
|
+
And spread out its data, send pages world wide?
|
73
|
+
<!-- separator -->
|
74
|
+
{align="left"}
|
75
|
+
Of names of this kind, I can give you a quorum,
|
76
|
+
Like lothlorien, pothole, or kobyashi-maru,
|
77
|
+
Such as pearly-gates.vatican, or else diplomatic-
|
78
|
+
Names that never belong to more than one host.
|
79
|
+
<!-- separator -->
|
80
|
+
{align="left"}
|
81
|
+
But above and beyond there's still one name left over,
|
82
|
+
And that is the name that you never will guess;
|
83
|
+
The name that no human research can discover--
|
84
|
+
But THE NAMESERVER KNOWS, and will us'ually confess.
|
85
|
+
<!-- separator -->
|
86
|
+
{align="left"}
|
87
|
+
When you notice a client in rapt meditation,
|
88
|
+
The reason, I tell you, is always the same:
|
89
|
+
The code is engaged in a deep consultation
|
90
|
+
On the address, the address, the address of its name:
|
91
|
+
<!-- separator -->
|
92
|
+
{align="left"}
|
93
|
+
It's ineffable,
|
94
|
+
effable,
|
95
|
+
Effanineffable,
|
96
|
+
Deep and inscrutable,
|
97
|
+
singular
|
98
|
+
Name.
|
99
|
+
|
100
|
+
# Credits
|
101
|
+
|
102
|
+
Thanks to Don Libes, Mark Lottor, and a host of twisted
|
103
|
+
individuals^W^Wcreative sysadmins for providing source material for
|
104
|
+
this memo, to Andrew Lloyd-Webber, Cameron Mackintosh, and a cast of
|
105
|
+
thousands (particularly including Terrance Mann) who drew my
|
106
|
+
attention to the necessity, and of course, to Thomas Stearns Eliot,
|
107
|
+
for making this all necessary.
|
108
|
+
[-@libes] [-@lottor] [-@wong] [-@ts]
|
109
|
+
|
110
|
+
# Security Considerations
|
111
|
+
|
112
|
+
Security issues are not discussed in this memo.
|
113
|
+
|
114
|
+
Particularly the cardiac security of certain famous poets.
|
115
|
+
|
116
|
+
<reference anchor='libes' target=''>
|
117
|
+
<front>
|
118
|
+
<title>Choosing a Name for Your Computer</title>
|
119
|
+
<author initials='D.' surname='Libes' fullname='D. Libes'></author>
|
120
|
+
<date year='1989' month='November'/>
|
121
|
+
</front>
|
122
|
+
<seriesInfo name="Communications of the ACM" value='Vol. 32, No. 11, Pg. 1289' />
|
123
|
+
</reference>
|
124
|
+
|
125
|
+
<reference anchor='lottor' target='namedroppers@internic.net'>
|
126
|
+
<front>
|
127
|
+
<title>Domain Name Survey</title>
|
128
|
+
<author initials='M.' surname='Lottor' fullname='M. Lottor'></author>
|
129
|
+
<date year='1997' month='January'/>
|
130
|
+
</front>
|
131
|
+
</reference>
|
132
|
+
|
133
|
+
<reference anchor='wong' target='http://www.seas.upenn.edu/~mengwong/coolhosts.html'>
|
134
|
+
<front>
|
135
|
+
<title>Cool Hostnames</title>
|
136
|
+
<author initials='M.' surname='Wong' fullname='M. Wong'></author>
|
137
|
+
<date/>
|
138
|
+
</front>
|
139
|
+
</reference>
|
140
|
+
|
141
|
+
<reference anchor='ts' target=''>
|
142
|
+
<front>
|
143
|
+
<title>Old Possum's Book of Practical Cats</title>
|
144
|
+
<author initials='TS' surname='Stearns' fullname='TS. Stearns'></author>
|
145
|
+
<date/>
|
146
|
+
</front>
|
147
|
+
</reference>
|
148
|
+
|
149
|
+
{backmatter}
|