|
DataMuseum.dkPresents historical artifacts from the history of: DKUUG/EUUG Conference tapes |
This is an automatic "excavation" of a thematic subset of
See our Wiki for more about DKUUG/EUUG Conference tapes Excavated with: AutoArchaeologist - Free & Open Source Software. |
top - metrics - downloadIndex: T q
Length: 6412 (0x190c) Types: TextFile Names: »quipu.toc«
└─⟦3d0c2be1b⟧ Bits:30001254 ISODE-5.0 Tape └─⟦eba4602b1⟧ »./isode-5.0.tar.Z« └─⟦d3ac74d73⟧ └─⟦this⟧ »isode-5.0/doc/quipu/quipu.toc« └─⟦2d1937cfd⟧ Bits:30007241 EUUGD22: P.P 5.0 └─⟦35176feda⟧ »EurOpenD22/isode/isode-6.tar.Z« └─⟦de7628f85⟧ └─⟦this⟧ »isode-6.0/doc/quipu/quipu.toc«
\contentsline {chapter}{\numberline {1}Overview}{1} \contentsline {section}{\numberline {1.1}Introduction}{1} \contentsline {section}{\numberline {1.2}General Aims}{2} \contentsline {section}{\numberline {1.3}Technical Goals}{2} \contentsline {section}{\numberline {1.4}Further QUIPU documents}{3} \contentsline {section}{\numberline {1.5}Acknowledgements}{4} \contentsline {section}{\numberline {1.6}Pronouncing QUIPU}{4} \contentsline {section}{\numberline {1.7}Why QUIPU}{4} \contentsline {chapter}{\numberline {2}General Design}{5} \contentsline {section}{\numberline {2.1}Overview}{5} \contentsline {section}{\numberline {2.2}Service Controls}{6} \contentsline {section}{\numberline {2.3}Access Control}{6} \contentsline {subsection}{\numberline {2.3.1}ACLInfo applied to Attributes}{8} \contentsline {subsection}{\numberline {2.3.2}ACLInfo applied to entries}{8} \contentsline {subsection}{\numberline {2.3.3}childACL}{9} \contentsline {subsection}{\numberline {2.3.4}Example Use of ACLs}{9} \contentsline {subsection}{\numberline {2.3.5}An issue for further study}{10} \contentsline {section}{\numberline {2.4}Authentication}{10} \contentsline {section}{\numberline {2.5}Schemas}{10} \contentsline {subsection}{\numberline {2.5.1}Matching}{10} \contentsline {subsection}{\numberline {2.5.2}Structure}{12} \contentsline {section}{\numberline {2.6}Extended Searching}{13} \contentsline {section}{\numberline {2.7}Update}{13} \contentsline {section}{\numberline {2.8}Operation Status}{14} \contentsline {chapter}{\numberline {3}The QUIPU Nameservice}{15} \contentsline {section}{\numberline {3.1}Requirements}{15} \contentsline {section}{\numberline {3.2}Design}{15} \contentsline {section}{\numberline {3.3}Support}{17} \contentsline {chapter}{\numberline {4}Distributed Operation}{18} \contentsline {section}{\numberline {4.1}Overview}{18} \contentsline {section}{\numberline {4.2}DSA/DUA Interaction Model}{18} \contentsline {section}{\numberline {4.3}Model of Data Distribution}{19} \contentsline {subsection}{\numberline {4.3.1}Entry Data Blocks}{19} \contentsline {subsection}{\numberline {4.3.2}Masters and Slaves}{19} \contentsline {subsection}{\numberline {4.3.3}QUIPU Subordinate References}{20} \contentsline {subsection}{\numberline {4.3.4}Access to the root EDB}{20} \contentsline {section}{\numberline {4.4}Standard Knowledge References}{20} \contentsline {section}{\numberline {4.5}Navigation}{21} \contentsline {section}{\numberline {4.6}List}{23} \contentsline {section}{\numberline {4.7}Search}{23} \contentsline {section}{\numberline {4.8}Unavailable DSAs}{25} \contentsline {section}{\numberline {4.9}Presentation Addresses}{25} \contentsline {section}{\numberline {4.10}Operating When DSAs are not fully interconnected}{25} \contentsline {section}{\numberline {4.11}The External view of QUIPU}{25} \contentsline {section}{\numberline {4.12}Use of ACLs in DSP}{26} \contentsline {section}{\numberline {4.13}Access Control and Authentication}{26} \contentsline {section}{\numberline {4.14}Cached Data}{27} \contentsline {subsection}{\numberline {4.14.1}Caching Configuration Data}{27} \contentsline {subsection}{\numberline {4.14.2}Caching User Data}{28} \contentsline {subsection}{\numberline {4.14.3}Negative Data}{28} \contentsline {subsection}{\numberline {4.14.4}Writing Caches to disk}{28} \contentsline {section}{\numberline {4.15}Configuration and Slave Update}{29} \contentsline {section}{\numberline {4.16}DSA Naming}{30} \contentsline {subsection}{\numberline {4.16.1}Choice of Names to prevent loops}{30} \contentsline {section}{\numberline {4.17}Local DSA Information}{31} \contentsline {section}{\numberline {4.18}DSA Naming Architecture }{31} \contentsline {chapter}{\numberline {5}Replicating Updates}{34} \contentsline {section}{\numberline {5.1}Basic Update Approach}{34} \contentsline {section}{\numberline {5.2}Reliable ROS}{36} \contentsline {section}{\numberline {5.3}Incremental Update}{37} \contentsline {section}{\numberline {5.4}Subtree Update}{38} \contentsline {section}{\numberline {5.5}Spot Shadowing}{38} \contentsline {chapter}{\numberline {6}Management}{39} \contentsline {section}{\numberline {6.1}Introduction}{39} \contentsline {section}{\numberline {6.2}DUA Configuration}{39} \contentsline {section}{\numberline {6.3}DSA Management}{40} \contentsline {subsection}{\numberline {6.3.1}DSA Static Configuration}{40} \contentsline {subsection}{\numberline {6.3.2}DSA Dynamic Configuration}{41} \contentsline {subsection}{\numberline {6.3.3}DSA Control}{41} \contentsline {subsection}{\numberline {6.3.4}Consistency Checks}{42} \contentsline {section}{\numberline {6.4}Configuration Inspection}{42} \contentsline {section}{\numberline {6.5}Configuration Changes}{43} \contentsline {subsection}{\numberline {6.5.1}General Approach}{43} \contentsline {subsection}{\numberline {6.5.2}Add DSA}{43} \contentsline {subsection}{\numberline {6.5.3}Remove DSA}{44} \contentsline {subsection}{\numberline {6.5.4}Modify DSA info}{44} \contentsline {subsection}{\numberline {6.5.5}Add new EDB}{44} \contentsline {subsection}{\numberline {6.5.6}Add EDB copy}{45} \contentsline {subsection}{\numberline {6.5.7}Remove EDB copy}{45} \contentsline {subsection}{\numberline {6.5.8}Remove EDB}{45} \contentsline {subsection}{\numberline {6.5.9}Change EDB Master}{46} \contentsline {subsection}{\numberline {6.5.10}References}{46} \contentsline {subsection}{\numberline {6.5.11}Spot Shadows}{46} \contentsline {section}{\numberline {6.6}Bootstrap}{46} \contentsline {section}{\numberline {6.7}Authorisation}{47} \contentsline {section}{\numberline {6.8}User Data Management}{47} \contentsline {subsection}{\numberline {6.8.1}Aliases}{47} \contentsline {subsection}{\numberline {6.8.2}Externally mastered data}{47} \contentsline {subsection}{\numberline {6.8.3}Consistency Checking}{48} \contentsline {subsection}{\numberline {6.8.4}Changing Names and Arboriculture}{49} \contentsline {chapter}{\numberline {7}Implementation Choices}{50} \contentsline {section}{\numberline {7.1}DSA Structure}{50} \contentsline {subsection}{\numberline {7.1.1}Memory Structures}{50} \contentsline {subsection}{\numberline {7.1.2}Disk Structures}{51} \contentsline {subsection}{\numberline {7.1.3}BNF}{52} \contentsline {subsection}{\numberline {7.1.4}Procedural interface}{52} \contentsline {section}{\numberline {7.2}OSI Choices}{52} \contentsline {chapter}{\numberline {A}ASN.1 Summary}{53}