Chinaunix首页 | 论坛 | 博客
  • 博客访问: 110123
  • 博文数量: 57
  • 博客积分: 1200
  • 博客等级: 中尉
  • 技术积分: 555
  • 用 户 组: 普通用户
  • 注册时间: 2011-04-26 21:13
文章分类

全部博文(57)

文章存档

2012年(14)

2011年(43)

分类: 网络与安全

2012-01-07 14:08:49

1.Probe Mechanisms
   Think of the name database as a "perfectly" distributed object, with each participating station responsible for just the segment of the database  containing it's own names.When query, use a single broadcast packet-a "probe"--which asks all stations at once to peruse their own database segment for the name.

Drawbacks: 
1) annoyance of broadcast
2) lack of any centralized authority
3) what about probe get lost in transmission?   need repetition and timeout periods. However, "Three times ought to be enough" is about as scientific as it gets.

2. Roll Call Mechanisms
  broadcasts are't required--requestor could  just probe other stations one at a time. Especially in nonbroadcast networks.

Drawbacks:
1.required that a  list of stations be maintained, imposing a burden administrator would rather discard.
 
3.Centralized Database
  use a "centralized" NBNS . The database is entrusted to the server. In practice, the name database is contained in both the central server and the individual stations, with the server calling the shots.

RFC1001:
Three types of end-nodes are part of this standard: - Broadcast ("B") nodes - Point-to-point ("P") nodes - Mixed mode ("M") nodes
It is recommended that the administration of a NetBIOS scope avoid using both M and  B nodes within the same scope.A NetBIOS scope should contain only B nodes or only P and nodes.


Name Format:
Each 4-bit, half-octet of the NetBIOS name is treated as an 8-bit, right-adjusted, zero-filled binary number. This number is added to value of the ASCII character 'A' (hexidecimal 41). The resulting 8- bit number is stored in the appropriate byte. 

The following diagram The NetBIOS scope identifier is a valid domain name (without a leading dot). An ASCII dot (2E hexidecimal) and the scope identifier are appended to the encoded form of the NetBIOS name, the result forming a valid domain name. Note that the first octet of a compressed name must contain one of the following bit patterns. (An "x" indicates a bit whose value may be either 0 or 1.): 00100000 - Netbios name, length must be 32 (decimal) 11xxxxxx - Label string pointer 10xxxxxx - Reserved 01xxxxxx - Reserved


B nodes and M nodes may be intermixed only on a local broadcast area. B and M nodes should not be intermixed in an internet environment.
Name Registration: Each node maintains state information for each name it has registered. This information includes: - Whether the name is a group or unique name - Whether the name is "in conflict" - Whether the name is in the process of being deleted B nodes perform name registration by broadcasting claim requests, soliciting a defense from any node already holding the name. P nodes perform name registration through the agency of the NBNS. M nodes register names through an initial broadcast, like B nodes, then, in the absence of an objection, by following the same procedures as a P node. In other words, the broadcast action may terminate the attempt, but is not sufficient to confirm the registration.

Different end-node types perform name resolution using different techniques, but using the same packet formats: - B nodes solicit name information by broadcasting a request. - P nodes ask the NBNS. - M nodes broadcast a request. If that does not provide the desired information, an inquiry is sent to the NBNS.
阅读(1662) | 评论(0) | 转发(0) |
给主人留下些什么吧!~~