13. [[Request for Comments|RFC]] [https://datatracker.ietf.org/doc/html/rfc1034 1034]. Internet Standard 13. Obsoletes RFC [https://datatracker.ietf.org/doc/html/rfc882 882], [https://datatracker.ietf.org/doc/html/rfc883 883] and [https://datatracker.ietf.org/doc/html/rfc973 973]. Updated by RFC [https://datatracker.ietf.org/doc/html/rfc1101 1101], [https://datatracker.ietf.org/doc/html/rfc1183 1183], [https://datatracker.ietf.org/doc/html/rfc1348 1348], [https://datatracker.ietf.org/doc/html/rfc1876 1876], [https://datatracker.ietf.org/doc/html/rfc1982 1982], [https://datatracker.ietf.org/doc/html/rfc2065 2065], [https://datatracker.ietf.org/doc/html/rfc2181 2181], [https://datatracker.ietf.org/doc/html/rfc2308 2308], [https://datatracker.ietf.org/doc/html/rfc2535 2535], [https://datatracker.ietf.org/doc/html/rfc4033 4033], [https://datatracker.ietf.org/doc/html/rfc4034 4034], [https://datatracker.ietf.org/doc/html/rfc4035 4035], [https://datatracker.ietf.org/doc/html/rfc4343 4343], [https://datatracker.ietf.org/doc/html/rfc4592 4592], [https://datatracker.ietf.org/doc/html/rfc5936 5936], [https://datatracker.ietf.org/doc/html/rfc8020 8020], [https://datatracker.ietf.org/doc/html/rfc8482 8482] and [https://datatracker.ietf.org/doc/html/rfc8767 8767].\n "},"parts":[{"template":{"target":{"wt":"Ref RFC","href":"./Template:Ref_RFC"},"params":{"1":{"wt":"1034"},"rsection":{"wt":"3.6"}},"i":0}}]}"> [7]:§3.6BIND uses a built-in pseudo-top-level-domain in the "CHAOS class" for retrieving information about a running DNS server.[8]
Chaosnet protocol
The Chaosnet protocol identifies hosts by 16-bit addresses, 8 bits of which identify the subnet, 8 bits of which identify the host within the subnet.[9] The basic protocol was a full-duplex reliable packet transmission between two user processes. The packet contents could be treated as bytes of 8 or 16 bits, with support for other word sizes provided by higher-level protocols. The connection was identified by a combination of the 16-bit addresses of each host and a 16-bit "connection index" assigned by each host to maintain uniqueness. "Controlled" packets within a connection were identified by a 16-bit packet number, which was used to deliver controlled packets reliably and in order, with re-transmission and flow control. "Uncontrolled" packets were not retransmitted, and were used at a lower level to support the flow-control and re-transmission. Chaosnet also supported "BRD" broadcast packets to multiple subnets.[10]
Initial establishment of the connection was made using "contact names." These names identified the network service and higher-level protocol. For example, "STATUS" was the contact name which requested basic network statistics from a host. "TELNET" was a contact name for the Arpanet TELNET protocol. "FILE" was a contact name for the Lisp Machine network file service. Other contact names included "SUPDUP", "MAIL", "NAME" for the Arpanet Finger protocol, "TIME", "SEND" for interactive messaging, "ARPA" for a gateway service to Arpanet. "DOVER" was the contact name for sending print jobs to Chaosnet hosts with a Xerox Dover printer attached (an early laser printer).[11] Developers could easily experiment with new protocols by inventing new contact names. In ITS, a new server for that protocol could be installed by creating a link to the program in the location DSK:DEVICE;CHAOS <cname> where <cname> was up to six letters of the contact name.
Simple transactions could be completed by a single "RFC" packet containing a contact name, answered by a single "ANS" packet with the relevant information. For example, an RFC to contact name "TIME" would result in a single ANS packet containing a 32-bit number indicating the time.[12]
The original GNU Manifesto mentioned that it aimed to, among other things, support the Chaosnet protocol.
Symbolics, a maker of the Lisp machines, licensed the MIT Chaosnet hardware and software implementation from the CADR computer design.
Moon, David A. (June 1981). Chaosnet (Technical report). MIT AI Memos (1959–2004). Massachusetts Institute of Technology Artificial Intelligence Laboratory. AIM-628.
"CHAOS ORDER (chaord.57)". Retrieved June 12, 2013. Online documentation from the ITS SYSDOC; directory
This page is based on this Wikipedia article Text is available under the CC BY-SA 4.0 license; additional terms may apply. Images, videos and audio are available under their respective licenses.