DataMuseum.dk

Presents historical artifacts from the history of:

DKUUG/EUUG Conference tapes

This is an automatic "excavation" of a thematic subset of
artifacts from Datamuseum.dk's BitArchive.

See our Wiki for more about DKUUG/EUUG Conference tapes

Excavated with: AutoArchaeologist - Free & Open Source Software.


top - metrics - download
Index: T v

⟦0593c721e⟧ TextFile

    Length: 21713 (0x54d1)
    Types: TextFile
    Names: »volume5.toc«

Derivation

└─⟦2d1937cfd⟧ Bits:30007241 EUUGD22: P.P 5.0
    └─⟦35176feda⟧ »EurOpenD22/isode/isode-6.tar.Z« 
        └─⟦de7628f85⟧ 
            └─⟦this⟧ »isode-6.0/doc/manual/volume5.toc« 

TextFile

\contentsline {part}{\uppercase {i}\phspace {1em}Introduction}{1}
\contentsline {chapter}{\numberline {1}Overview}{3}
\contentsline {section}{\numberline {1.1}Fanatics Need Not Read Further}{4}
\contentsline {section}{\numberline {1.2}The Name of the Game}{5}
\contentsline {section}{\numberline {1.3}Operating Environments}{5}
\contentsline {section}{\numberline {1.4}Organization of the Release}{7}
\contentsline {section}{\numberline {1.5}A Note on this Implementation}{9}
\contentsline {section}{\numberline {1.6}Changes Since the Last Release}{10}
\contentsline {chapter}{\numberline {2}Overview of QUIPU}{12}
\contentsline {section}{\numberline {2.1}Summary}{12}
\contentsline {section}{\numberline {2.2}Pronouncing QUIPU}{13}
\contentsline {section}{\numberline {2.3}Why QUIPU}{13}
\contentsline {section}{\numberline {2.4}Objectives}{13}
\contentsline {subsection}{\numberline {2.4.1}General Aims}{13}
\contentsline {subsection}{\numberline {2.4.2}Technical Goals}{14}
\contentsline {section}{\numberline {2.5}Roadmap}{15}
\contentsline {section}{\numberline {2.6}QUIPU Support Address}{15}
\contentsline {section}{\numberline {2.7}Acknowledgements}{16}
\contentsline {part}{\uppercase {ii}\phspace {1em}User's Guide}{17}
\contentsline {chapter}{\numberline {3}The OSI Directory}{19}
\contentsline {section}{\numberline {3.1}The Model}{19}
\contentsline {section}{\numberline {3.2}Information Representation}{21}
\contentsline {subsection}{\numberline {3.2.1}Object Identifiers}{21}
\contentsline {subsection}{\numberline {3.2.2}Attributes}{21}
\contentsline {subsection}{\numberline {3.2.3}Names}{23}
\contentsline {section}{\numberline {3.3}Directory User Agent}{24}
\contentsline {section}{\numberline {3.4}Directory System Agent}{25}
\contentsline {chapter}{\numberline {4}DISH}{26}
\contentsline {section}{\numberline {4.1}Commands}{27}
\contentsline {subsection}{\numberline {4.1.1}Moveto}{27}
\contentsline {subsection}{\numberline {4.1.2}Showentry}{28}
\contentsline {subsubsection}{read flags}{28}
\contentsline {subsection}{\numberline {4.1.3}List}{29}
\contentsline {subsection}{\numberline {4.1.4}Search}{30}
\contentsline {subsubsection}{More on Matching}{31}
\contentsline {subsection}{\numberline {4.1.5}Add Entry}{32}
\contentsline {subsection}{\numberline {4.1.6}Editentry}{32}
\contentsline {subsection}{\numberline {4.1.7}Delete Entry}{33}
\contentsline {subsection}{\numberline {4.1.8}Modify Entry}{33}
\contentsline {subsection}{\numberline {4.1.9}ModifyRDN}{33}
\contentsline {subsection}{\numberline {4.1.10}Showname}{33}
\contentsline {subsection}{\numberline {4.1.11}Compare}{34}
\contentsline {subsection}{\numberline {4.1.12}Squid}{34}
\contentsline {subsection}{\numberline {4.1.13}Bind}{34}
\contentsline {subsection}{\numberline {4.1.14}Unbind}{35}
\contentsline {section}{\numberline {4.2}Sequences}{35}
\contentsline {section}{\numberline {4.3}Service Controls}{36}
\contentsline {section}{\numberline {4.4}Tailoring}{37}
\contentsline {subsection}{\numberline {4.4.1}.quipurc}{38}
\contentsline {section}{\numberline {4.5}Remote Management of the DSA}{39}
\contentsline {section}{\numberline {4.6}Caching in the DUA}{40}
\contentsline {section}{\numberline {4.7}Running DISH from the Shell}{40}
\contentsline {subsection}{\numberline {4.7.1}Dishinit}{41}
\contentsline {subsection}{\numberline {4.7.2}Example Scripts}{41}
\contentsline {subsection}{\numberline {4.7.3}Files}{42}
\contentsline {chapter}{\numberline {5}SID}{43}
\contentsline {section}{\numberline {5.1}Quickstart}{43}
\contentsline {section}{\numberline {5.2}Example Usage}{46}
\contentsline {section}{\numberline {5.3}Use of Nicknames}{47}
\contentsline {section}{\numberline {5.4}SID Commands}{47}
\contentsline {section}{\numberline {5.5}Standard DISH commands}{48}
\contentsline {section}{\numberline {5.6}QUIPU Profile}{49}
\contentsline {chapter}{\numberline {6}FRED}{51}
\contentsline {section}{\numberline {6.1}Giving Commands to Fred}{51}
\contentsline {section}{\numberline {6.2}Let your Fingers do the Walking}{51}
\contentsline {subsection}{\numberline {6.2.1}The Alias Command}{52}
\contentsline {subsection}{\numberline {6.2.2}Back to Searching}{52}
\contentsline {subsection}{\numberline {6.2.3}The Area Command}{54}
\contentsline {subsection}{\numberline {6.2.4}Getting Help}{55}
\contentsline {subsection}{\numberline {6.2.5}Quitting}{55}
\contentsline {section}{\numberline {6.3}Advanced Usage}{56}
\contentsline {chapter}{\numberline {7}WIDGET}{57}
\contentsline {section}{\numberline {7.1}Types of Widget}{57}
\contentsline {subsection}{\numberline {7.1.1}Label Widgets}{58}
\contentsline {subsection}{\numberline {7.1.2}Command Widgets}{58}
\contentsline {subsection}{\numberline {7.1.3}Dialog Widgets}{58}
\contentsline {subsection}{\numberline {7.1.4}Toggle Widgets}{58}
\contentsline {section}{\numberline {7.2}Using WIDGET}{58}
\contentsline {subsection}{\numberline {7.2.1}Binding}{59}
\contentsline {subsection}{\numberline {7.2.2}Main Options}{59}
\contentsline {subsection}{\numberline {7.2.3}Read}{59}
\contentsline {subsection}{\numberline {7.2.4}List}{59}
\contentsline {subsection}{\numberline {7.2.5}Search}{59}
\contentsline {subsection}{\numberline {7.2.6}Modify}{60}
\contentsline {subsection}{\numberline {7.2.7}Quitting}{60}
\contentsline {chapter}{\numberline {8}SUNINT}{61}
\contentsline {section}{\numberline {8.1}Using SUNINT}{61}
\contentsline {subsection}{\numberline {8.1.1}Menus}{61}
\contentsline {subsection}{\numberline {8.1.2}Moving around the DIT}{62}
\contentsline {subsection}{\numberline {8.1.3}Reading the Attributes}{62}
\contentsline {subsection}{\numberline {8.1.4}Searching}{62}
\contentsline {subsection}{\numberline {8.1.5}Quitting}{62}
\contentsline {chapter}{\numberline {9}Attribute Syntaxes}{63}
\contentsline {section}{\numberline {9.1}Standard Syntaxes}{63}
\contentsline {subsection}{\numberline {9.1.1}PrintableString}{64}
\contentsline {subsection}{\numberline {9.1.2}CaseExactString}{64}
\contentsline {subsection}{\numberline {9.1.3}CaseIgnoreString}{65}
\contentsline {subsection}{\numberline {9.1.4}CountryString}{67}
\contentsline {subsection}{\numberline {9.1.5}IA5String}{67}
\contentsline {subsection}{\numberline {9.1.6}VisibleString}{68}
\contentsline {subsection}{\numberline {9.1.7}OctetString}{68}
\contentsline {subsection}{\numberline {9.1.8}NumericString}{68}
\contentsline {subsection}{\numberline {9.1.9}DestinationString}{69}
\contentsline {subsection}{\numberline {9.1.10}TelephoneNumber}{69}
\contentsline {subsection}{\numberline {9.1.11}PostalAddress}{70}
\contentsline {subsection}{\numberline {9.1.12}DN}{70}
\contentsline {subsection}{\numberline {9.1.13}OID}{72}
\contentsline {subsection}{\numberline {9.1.14}ObjectClass}{72}
\contentsline {subsection}{\numberline {9.1.15}TelexNumber}{72}
\contentsline {subsection}{\numberline {9.1.16}TeletexTerminalIdentifier}{73}
\contentsline {subsection}{\numberline {9.1.17}FacsimileTelephoneNumber}{73}
\contentsline {subsection}{\numberline {9.1.18}DeliveryMethod}{73}
\contentsline {subsection}{\numberline {9.1.19}PresentationAddress}{74}
\contentsline {subsection}{\numberline {9.1.20}Password}{74}
\contentsline {subsection}{\numberline {9.1.21}Certificate}{74}
\contentsline {subsection}{\numberline {9.1.22}CertificatePair}{74}
\contentsline {subsection}{\numberline {9.1.23}CertificateList}{75}
\contentsline {subsection}{\numberline {9.1.24}Guide}{75}
\contentsline {subsection}{\numberline {9.1.25}UTCTime}{76}
\contentsline {subsection}{\numberline {9.1.26}Boolean}{76}
\contentsline {subsection}{\numberline {9.1.27}Integer}{76}
\contentsline {section}{\numberline {9.2}QUIPU Attribute Syntaxes}{76}
\contentsline {subsection}{\numberline {9.2.1}ACL}{76}
\contentsline {subsection}{\numberline {9.2.2}Schema}{77}
\contentsline {subsection}{\numberline {9.2.3}ProtectedPassword}{77}
\contentsline {subsection}{\numberline {9.2.4}SecurityPolicy}{78}
\contentsline {subsection}{\numberline {9.2.5}EdbInfo}{78}
\contentsline {section}{\numberline {9.3}RARE Attribute Syntaxes}{78}
\contentsline {subsection}{\numberline {9.3.1}Mailbox}{78}
\contentsline {subsection}{\numberline {9.3.2}CaseIgnoreIA5String}{78}
\contentsline {subsection}{\numberline {9.3.3}Photo}{79}
\contentsline {section}{\numberline {9.4}THORN System Attribute Syntaxes}{79}
\contentsline {subsection}{\numberline {9.4.1}ThornACL}{79}
\contentsline {subsection}{\numberline {9.4.2}RDType}{79}
\contentsline {subsection}{\numberline {9.4.3}ODType}{79}
\contentsline {subsection}{\numberline {9.4.4}ADType}{79}
\contentsline {subsection}{\numberline {9.4.5}KnowledgeReference}{80}
\contentsline {subsection}{\numberline {9.4.6}NRSInformation}{80}
\contentsline {section}{\numberline {9.5}MHS Attribute Syntaxes}{80}
\contentsline {subsection}{\numberline {9.5.1}ORAddress}{80}
\contentsline {subsection}{\numberline {9.5.2}ORName}{80}
\contentsline {subsection}{\numberline {9.5.3}DLSubmitPermissions}{80}
\contentsline {section}{\numberline {9.6}ASN}{80}
\contentsline {chapter}{\numberline {10}Introduction to Security Features}{82}
\contentsline {section}{\numberline {10.1}Passwords}{82}
\contentsline {subsection}{\numberline {10.1.1}Choosing a Password}{82}
\contentsline {subsection}{\numberline {10.1.2}Taking Care of Your Password}{83}
\contentsline {section}{\numberline {10.2}Discretionary Access Control}{84}
\contentsline {subsection}{\numberline {10.2.1}Model}{84}
\contentsline {subsection}{\numberline {10.2.2}Detect Access}{86}
\contentsline {subsection}{\numberline {10.2.3}Effect of ACLs on Operations}{86}
\contentsline {subsection}{\numberline {10.2.4}Example Use of ACLs}{87}
\contentsline {part}{\uppercase {iii}\phspace {1em}Administrator's Guide}{91}
\contentsline {chapter}{\numberline {11}Installing QUIPU}{93}
\contentsline {section}{\numberline {11.1}Files}{94}
\contentsline {chapter}{\numberline {12}Configuring a DUA}{96}
\contentsline {section}{\numberline {12.1}Connecting to a DSA}{96}
\contentsline {section}{\numberline {12.2}Tailoring}{97}
\contentsline {chapter}{\numberline {13}Configuring a DSA}{101}
\contentsline {section}{\numberline {13.1}Basic Formats and Structures}{101}
\contentsline {subsection}{\numberline {13.1.1}Entry Data Block}{101}
\contentsline {subsection}{\numberline {13.1.2}Object Class attribute}{103}
\contentsline {subsection}{\numberline {13.1.3}Database Structure}{104}
\contentsline {subsection}{\numberline {13.1.4}Long Distinguished Names}{105}
\contentsline {section}{\numberline {13.2}Setting up an Initial DSA}{106}
\contentsline {subsection}{\numberline {13.2.1}Setting up YOUR DSA}{108}
\contentsline {section}{\numberline {13.3}Tailoring}{110}
\contentsline {subsection}{\numberline {13.3.1}Tailoring a Running DSA}{113}
\contentsline {section}{\numberline {13.4}Connection to Other DSAs}{113}
\contentsline {subsection}{\numberline {13.4.1}Choosing a Name for Your DSA}{115}
\contentsline {subsection}{\numberline {13.4.2}Connection to the Global Directory}{117}
\contentsline {section}{\numberline {13.5}Adding more Data}{118}
\contentsline {subsection}{\numberline {13.5.1}More on Object Classes}{119}
\contentsline {subsubsection}{Person}{119}
\contentsline {subsubsection}{OrganizationalPerson}{120}
\contentsline {subsubsection}{ThornPerson}{121}
\contentsline {subsubsection}{OrganizationalRole}{121}
\contentsline {subsubsection}{Alias}{122}
\contentsline {subsubsection}{OrganizationalUnit}{123}
\contentsline {subsubsection}{Organization}{124}
\contentsline {subsubsection}{domainRelatedObject}{124}
\contentsline {subsection}{\numberline {13.5.2}Schemas}{125}
\contentsline {subsection}{\numberline {13.5.3}Photograph Attributes}{126}
\contentsline {subsection}{\numberline {13.5.4}File Attributes}{127}
\contentsline {section}{\numberline {13.6}How a DSA Starts}{128}
\contentsline {section}{\numberline {13.7}Adding more DSAs}{129}
\contentsline {section}{\numberline {13.8}Receiving EDB Updates}{129}
\contentsline {section}{\numberline {13.9}Tables}{131}
\contentsline {section}{\numberline {13.10}More Help Installing Quipu}{133}
\contentsline {chapter}{\numberline {14}Security Management}{134}
\contentsline {section}{\numberline {14.1}Configuration}{134}
\contentsline {subsection}{\numberline {14.1.1}Compilation Options}{134}
\contentsline {subsection}{\numberline {14.1.2}Quipu Userid}{135}
\contentsline {subsection}{\numberline {14.1.3}File Permissions}{135}
\contentsline {section}{\numberline {14.2}Discretionary Access Control}{136}
\contentsline {subsection}{\numberline {14.2.1}What must be Publicly Readable}{136}
\contentsline {section}{\numberline {14.3}Audit}{137}
\contentsline {subsection}{\numberline {14.3.1}Enabling Auditing}{137}
\contentsline {subsection}{\numberline {14.3.2}Relating Events to Users}{137}
\contentsline {subsection}{\numberline {14.3.3}Format of Audit Records}{137}
\contentsline {subsection}{\numberline {14.3.4}Start of an Association}{138}
\contentsline {subsection}{\numberline {14.3.5}End of an Association}{138}
\contentsline {subsection}{\numberline {14.3.6}DAP Operation}{138}
\contentsline {subsection}{\numberline {14.3.7}DAP Result}{139}
\contentsline {subsection}{\numberline {14.3.8}Chaining}{139}
\contentsline {subsection}{\numberline {14.3.9}Other Events}{139}
\contentsline {chapter}{\numberline {15}The QUIPU Nameservice}{140}
\contentsline {section}{\numberline {15.1}Requirements}{140}
\contentsline {section}{\numberline {15.2}Design}{140}
\contentsline {section}{\numberline {15.3}Support}{142}
\contentsline {section}{\numberline {15.4}Configuring the Name Service}{142}
\contentsline {section}{\numberline {15.5}Dsabuild}{143}
\contentsline {section}{\numberline {15.6}Representation in the DIT}{143}
\contentsline {section}{\numberline {15.7}Replacing the Name Service with DAP}{144}
\contentsline {chapter}{\numberline {16}User Naming Architecture}{145}
\contentsline {section}{\numberline {16.1}Overview}{145}
\contentsline {section}{\numberline {16.2}THORN}{145}
\contentsline {section}{\numberline {16.3}Common Name Forms}{146}
\contentsline {section}{\numberline {16.4}DSA Naming Architecture }{146}
\contentsline {part}{\uppercase {iv}\phspace {1em}Programmer's Guide}{149}
\contentsline {chapter}{\numberline {17}Programming the Directory}{151}
\contentsline {section}{\numberline {17.1}Conventions}{151}
\contentsline {section}{\numberline {17.2}Attributes}{154}
\contentsline {section}{\numberline {17.3}Distinguished Names}{158}
\contentsline {section}{\numberline {17.4}Adding New Syntaxes to QUIPU}{160}
\contentsline {subsection}{\numberline {17.4.1}Where to Add the Syntax Definition}{162}
\contentsline {chapter}{\numberline {18}The Procedural DUA}{164}
\contentsline {section}{\numberline {18.1}Procedure Model}{164}
\contentsline {section}{\numberline {18.2}Common Parameters}{165}
\contentsline {subsection}{\numberline {18.2.1}Arguments}{165}
\contentsline {subsection}{\numberline {18.2.2}Results}{166}
\contentsline {section}{\numberline {18.3}Continuation References}{166}
\contentsline {section}{\numberline {18.4}Errors}{168}
\contentsline {subsection}{\numberline {18.4.1}Attribute Error}{169}
\contentsline {subsection}{\numberline {18.4.2}Name Error}{170}
\contentsline {subsection}{\numberline {18.4.3}Referral Errors}{170}
\contentsline {subsection}{\numberline {18.4.4}Security Error}{170}
\contentsline {subsection}{\numberline {18.4.5}Service Error}{171}
\contentsline {subsection}{\numberline {18.4.6}Update Error}{171}
\contentsline {subsection}{\numberline {18.4.7}Abandon Failure}{171}
\contentsline {subsection}{\numberline {18.4.8}Error Handling Procedures}{172}
\contentsline {section}{\numberline {18.5}Binding and Unbinding}{172}
\contentsline {subsection}{\numberline {18.5.1}No Authentication}{174}
\contentsline {subsection}{\numberline {18.5.2}Simple Authentication}{175}
\contentsline {subsection}{\numberline {18.5.3}Protected Simple Authentication}{175}
\contentsline {subsection}{\numberline {18.5.4}Strong Authentication}{175}
\contentsline {section}{\numberline {18.6}Unbind}{175}
\contentsline {section}{\numberline {18.7}Read}{176}
\contentsline {subsection}{\numberline {18.7.1}Entry Information Selection}{177}
\contentsline {subsection}{\numberline {18.7.2}Entry Information}{177}
\contentsline {section}{\numberline {18.8}Compare}{178}
\contentsline {subsection}{\numberline {18.8.1}Attribute Value Assertion}{179}
\contentsline {section}{\numberline {18.9}List}{180}
\contentsline {section}{\numberline {18.10}Search}{181}
\contentsline {subsection}{\numberline {18.10.1}Filters}{184}
\contentsline {section}{\numberline {18.11}Modification Operations}{187}
\contentsline {subsection}{\numberline {18.11.1}Add}{187}
\contentsline {subsection}{\numberline {18.11.2}Remove}{187}
\contentsline {subsection}{\numberline {18.11.3}Modify}{188}
\contentsline {subsection}{\numberline {18.11.4}ModifyRDN}{189}
\contentsline {section}{\numberline {18.12}Abandon}{190}
\contentsline {section}{\numberline {18.13}Multiple Associations}{190}
\contentsline {subsection}{\numberline {18.13.1}Multiple Binds}{190}
\contentsline {subsection}{\numberline {18.13.2}Other DAP Operations}{191}
\contentsline {section}{\numberline {18.14}Asynchronous Access}{191}
\contentsline {chapter}{\numberline {19}Using the Quipu Library}{192}
\contentsline {section}{\numberline {19.1}The Entry Structure}{192}
\contentsline {section}{\numberline {19.2}Caching Results}{194}
\contentsline {section}{\numberline {19.3}Finding Data in the Cache}{195}
\contentsline {section}{\numberline {19.4}Caching List Results}{195}
\contentsline {section}{\numberline {19.5}Changes}{196}
\contentsline {part}{\uppercase {v}\phspace {1em}Design}{199}
\contentsline {chapter}{\numberline {20}Overview}{201}
\contentsline {section}{\numberline {20.1}Introduction}{201}
\contentsline {section}{\numberline {20.2}General Aims}{202}
\contentsline {section}{\numberline {20.3}Technical Goals}{203}
\contentsline {section}{\numberline {20.4}Further QUIPU documents}{204}
\contentsline {chapter}{\numberline {21}General Design}{205}
\contentsline {section}{\numberline {21.1}Overview}{205}
\contentsline {section}{\numberline {21.2}Service Controls}{206}
\contentsline {chapter}{\numberline {22}Distributed Operation}{207}
\contentsline {section}{\numberline {22.1}Overview}{207}
\contentsline {section}{\numberline {22.2}DSA/DUA Interaction Model}{207}
\contentsline {section}{\numberline {22.3}Model of Data Distribution}{208}
\contentsline {subsection}{\numberline {22.3.1}Entry Data Blocks}{208}
\contentsline {subsection}{\numberline {22.3.2}Masters and Slaves}{209}
\contentsline {subsection}{\numberline {22.3.3}QUIPU Subordinate References}{209}
\contentsline {subsection}{\numberline {22.3.4}Access to the root EDB}{210}
\contentsline {section}{\numberline {22.4}Standard Knowledge References}{210}
\contentsline {section}{\numberline {22.5}Navigation}{211}
\contentsline {section}{\numberline {22.6}List}{213}
\contentsline {section}{\numberline {22.7}Search}{214}
\contentsline {section}{\numberline {22.8}Selecting a DSA}{215}
\contentsline {subsection}{\numberline {22.8.1}DSA Quality}{216}
\contentsline {subsection}{\numberline {22.8.2}Unavailable DSAs}{217}
\contentsline {subsection}{\numberline {22.8.3}Operating When DSAs are not Fully Interconnected}{217}
\contentsline {section}{\numberline {22.9}The External View of QUIPU}{217}
\contentsline {section}{\numberline {22.10}Cached Data}{218}
\contentsline {section}{\numberline {22.11}Configuration and Slave Update}{219}
\contentsline {section}{\numberline {22.12}DSA Naming}{220}
\contentsline {subsection}{\numberline {22.12.1}Choice of Names to Prevent Loops}{220}
\contentsline {chapter}{\numberline {23}Access Control and Authentication}{222}
\contentsline {section}{\numberline {23.1}Models}{222}
\contentsline {subsection}{\numberline {23.1.1}Access Control}{222}
\contentsline {subsection}{\numberline {23.1.2}Security Domains}{222}
\contentsline {section}{\numberline {23.2}Representation in the DIT}{223}
\contentsline {subsection}{\numberline {23.2.1}Simple Authentication}{223}
\contentsline {subsection}{\numberline {23.2.2}Protected Simple Authentication}{223}
\contentsline {subsection}{\numberline {23.2.3}Access Control Lists}{224}
\contentsline {subsection}{\numberline {23.2.4}Security Policies}{224}
\contentsline {subsection}{\numberline {23.2.5}Labels}{224}
\contentsline {section}{\numberline {23.3}Distributed Operations}{225}
\contentsline {subsection}{\numberline {23.3.1}(Protected) Simple Authentication}{225}
\contentsline {subsection}{\numberline {23.3.2}Strong Authentication}{225}
\contentsline {subsection}{\numberline {23.3.3}Restricting Read Access}{225}
\contentsline {subsection}{\numberline {23.3.4}Restricting Write Access}{226}
\contentsline {subsection}{\numberline {23.3.5}Caching}{226}
\contentsline {subsection}{\numberline {23.3.6}Replicated Data}{227}
\contentsline {chapter}{\numberline {24}Replicating Updates}{228}
\contentsline {section}{\numberline {24.1}Basic Update Approach}{228}
\contentsline {chapter}{\numberline {25}Implementation Choices}{231}
\contentsline {section}{\numberline {25.1}DSA Structure}{231}
\contentsline {subsection}{\numberline {25.1.1}Memory Structures}{232}
\contentsline {subsection}{\numberline {25.1.2}Malloc}{233}
\contentsline {subsection}{\numberline {25.1.3}Disk Structures}{233}
\contentsline {section}{\numberline {25.2}OSI Choices}{234}
\contentsline {part}{\uppercase {vi}\phspace {1em}Appendices}{235}
\contentsline {chapter}{\numberline {A}Registered QUIPU DSAs}{237}
\contentsline {chapter}{\numberline {B}BNF used Quipu}{242}
\contentsline {chapter}{\numberline {C}The QUIPU Naming Architecture}{248}
\contentsline {chapter}{\numberline {D}ASN.1 Summary}{252}