Escolar Documentos
Profissional Documentos
Cultura Documentos
Copyright © 1994 IBM Corporation. All rights reserved. No part of this publication may be repro-
duced, transmitted, transcribed, stored in a retrieval system, or translated into any language, in
any form or by any means, electronic, mechanical, photocopying, optical, magnetic, or otherwise,
without prior written permission from IBM. Printed in the United States of America.
The information furnished herein is believed to be accurate and reliable. However, no responsi-
bility is assumed by IBM for its use, nor for any infringements of patents or other rights of third
parties resulting from its use.
1 Overview 1
FT-820 overview 2
FT-825 overview 3
FT-820 document file types 6
Destination attributes 7
2 Support Files 9
What is an application entity? 12
Application entity table file 12
Utility configuration file 17
Filestore configuration file 39
Filestore audit trail file 50
Utility audit trail file 53
3 Filestore 57
Configuring FTAM 57
Database lock manager utility: lockmgr 59
Starting the filestore 60
FT-820 filestore utility: ffs 61
iii
4 Maintaining FT-820 67
FT-820 databases 67
Initialize FT-820 databases utility: finit 68
Display attributes utility: fda 70
Reinitializing the FT-820 databases 72
Update attributes utility: fua 74
5 FT-820 Security 77
Authentication file 77
Security driver 79
File and directory permissions 79
Setting up the AIX password file 80
A Error Messages 83
Database error messages 84
Filestore error messages 87
FTAM/ERPM filestore error messages 95
Operating system error messages 108
Utility error messages 108
B References 115
Glossary 117
Index 123
iv Contents
Introduction
Required materials
FT-825 requires FT-820. The following materials are required when
using the OSSC FT-820 product:
v
The protocol stack supporting the FT-820 product must be
compatible with either AT&T’s transport library interface (TLI)
vi Introduction
Appendix A, “Error Messages,” lists error messages that can be
generated by FT-820 and FT-825 and the filestores with which FT-820
communicates.
Type frm
Type filename
Keys that you press on your keyboard are represented with small
capitals:
F T-820 allows you to access and transfer files between your local
AIX operating system and any other system supporting OSI FTAM.
1
the OSSC OSI Application Developer’s Guide if you intend to use a
non-OSSC transport with the TLI stack.
The OSSC FT-820 product is compatible with the OSI TLI stack
configuration:
• The TLI stack, which uses the AT&T transport layer interface
(TLI).
The FT-820 product provides all stack components, above the
transport layer, that are required to run FT-820 (and FT-825)
with the TLI.
FT-820 overview
FT-820 is an implementation of the ISO protocol standard for file
transfer, access, and management (FTAM). This standard establishes
the conventions by which files, and the information necessary to
describe them, are to be used during OSI-conformant network
communications. This standardization allows a user to manipulate
files on remote computer systems by creating a virtual filestore with
standardized information that describes the actual files stored in the
AIXoperating system’s file system. For each actual file on the
responder system, the virtual filestore has descriptive information in
FTAM standardized format. This descriptive information includes,
among other file attributes, who is allowed to access or manipulate
each file.
2 Chapter 1 • Overview
FT-825 overview
FT-825 implements the ISO protocol standard for the error recovery
protocol machine (ERPM) in FTAM. When FT-820 is used over an
unreliable network, or used to transfer files to or from an unreliable
system, a number of errors can occur. These errors can include:
Both the initiator of the file transfer utilities and the responder
maintain information about each current file transfer so that in the
event of an error during transfer, this information can be used to
recover from the error. These pieces of information are called dockets.
The FT-820 initiator FTAM protocol machine supports the set of four
user utilities (fcp, fls, fmv, frm) to allow users to copy, list, move,
and remove files.
FT-825 overview 3
OSI protocols
In addition to FTAM, three other OSI protocols are included as part
of the FT-820 product: association control service element (ACSE),
presentation, and session.
When FT-820 runs over the TLI stack, it uses these modules (shaded
in Figure 1.1) to communicate between the FT-820 protocol machine
and the transport service provider.
4 Chapter 1 • Overview
FT-820
initiator
FT-820
initiator FT-820
utilities responder
FT-820
filestore
ERPM ERPM
initiator responder
protocol protocol
machine machine
(FT-825) (FT-825)
FTAM FTAM
initiator responder
protocol protocol
machine machine
ACSE ACSE
presentation presentation
session session
user space
kernel
(including AIX file system
Note. Shaded components are used only in the TLI stack configuration.
ERPM block is only present if FT-825 has been compiled into FT-820 code.
FT-825 overview 5
• Another vendor’s transport provider. If FT-820 is using a
non-OSSC transport provider, it requires buffer reformatting.
Refer to the OSSC OSI Application Developer’s Guide for
information on how to reformat buffers with the OSSC
transport provider capability compiler.
TLI stack
This stack uses the AT&T transport layer interface (TLI) to
communicate between FT-820 and OSI transport services. This stack
can run in the AIX environment.
6 Chapter 1 • Overview
Table 1.1 FT-820 document file types (continued)
FTAM-2 Structured text A file of this type contains lines of text. Each line
is less than or equal to 134 characters long. Each
line of text is independently addressable by
record number. The file may be read by record
number or read or written as a whole. This file
may be extended.
When you transfer a file of this type, FT-820
automatically converts the format characters and
delimiters (line feeds and carriage returns)
between the line-differentiated format used with
the AIX operating system and standard FTAM
format.
FTAM-3 Simple binary A file of this type contains a string of bytes. Each
string must be less than or equal to 512 bytes
long. This file may only be read or written as a
whole, since there are no subdivisions of the file
contents.
When you transfer a file of this type, FT-820 does
not convert its contents.
NBS-10 Random binary A file of this type contains a string of bytes. Each
string of bytes may be independently addressed
by byte offset and length. This file may be read as
an FTAM-3 file. This file may be read or written as
a whole or by byte offset by length.
Destination attributes
When you copy or move a file to a filestore, the destination file is
created with a set of FTAM file attributes. Depending on the
situation, some of these file attributes may be derived from the
source file, from default values, or from values specified in the utility
configuration file, .ftInit.
Destination attributes 7
For attributes that are not set by the .ftInit configuration file,
Appendix B in the OSSC FTAM User Guide contains a description of
how the destination file attributes are determined when users use
fcp or fmv to copy or move a file to an FTAM filestore.
8 Chapter 1 • Overview
2 Support Files
• The attributes database contains file attributes for all the files in
an FTAM filestore, including document type, permitted actions,
and concurrency keys.
9
If you are using FT-825 file recovery, docket files are created on the
local system and the filestore. Dockets contain information needed to
recover file transfers. In most cases dockets are removed by the
system automatically, but they can be manually removed using the
fdocket utility, if necessary. For more information about the
fdocket utility, see the FTAM User Guide.
__AETABLE__ file
This file contains network addresses and their associated user-
friendly names. These names and addresses are accessed when users
on the network use the FTAM application interface, or use the fcp
copy, fls list, fmv move, or frm remove utilities.
Attributes database
This file contains information about the characteristics of all files
stored on the filestore. This file is used when the FTAM filestore
accesses files that it has created. This file is accessed when you start
the FTAM filestore (ffs) or use the filestore support utilities (fda,
finit, and fua).
If the user’s initiator ID and password are found, the user is allowed
access to the filestore; otherwise, the user is denied access to the
filestore.
11
What is an application entity?
An FTAM application entity is a process that requests or performs file
services. Application entities need to be uniquely identified within
an OSI network. You identify application entities in the FT-820
application entity table (__AETABLE__), which is described in the
next section.
• The type of protocol used. The last two elements identify the
type of network service and transport class used to
communicate with the application.
Element Description
AE_NAME The application entity name is a simple name you assign to the
(Mandatory) system on which an application or application entities are located.
You can use any combination of characters in an application
entity name (up to a maximum of 39 characters).
Note. You must include the initiating application entity name
ANON in this section if you do not set the environment variable
FTAMLOCAL. When the initiator encounters ANON upon reading
the __AETABLE__ at setup, it generates a unique combination of
TSAP, SSAP, and PSAP for itself. The FTAMLOCAL environment
variable is discussed in the FTAM User Guide.
AP_TITLE The application process title (AP title) is used with the QUAL field
(Mandatory) to uniquely identify every application entity (like FTAM or other
OSI application protocols) in the world. The National Institute of
Standards and Technology (NIST) has not, at present,
designated an organization to administer AP titles. For now, NIST
has asked that organizations use the fixed values:
{1 3 9999 1 7} for AP_TITLE.
SSAP The SSAP identifier is a four-digit value. You can specify any
(Mandatory) value for initiating application entities. However, OSSC
recommends that you set SSAPs for initiating application entities
to /0000. SSAPs for filestore application entities are assigned by
the person who is responsible for administering the filestore you
want to access.
You must begin this element with a slash (/).
PSAP This element is the PSAP identifier. If you are running FT-820
(Mandatory) with the TLI, you can specify any value for initiating application
entities. However, OSSC recommends that you set PSAPs for
initiating application entities to /0000.
PSAPs for filestore application entities are assigned by the
filestore’s administrator.
You must begin this element with a slash (/).
set AETABLE=”/etc/__AETABLE__”
or
setenv AETABLE ”/etc/__AETABLE__”
AETABLE=/etc/__AETABLE__
export AETABLE
Note. You can change the name of the application entity table file
(__AETABLE__) after you install it on your system. If you change
the name of __AETABLE__, you must specify the new name of
__AETABLE__ in the Bourne shell’s export command in the example
shown above.
The FT-820 parameters you can define in the utility configuration file
include:
• access mode
• contents type
• create mode, which defines the attributes for newly created files
• copy indicator
The following FT-825 parameters are only relevant if you are using
FT-825 error recovery:
• quality of service
#===========================================================================
# Requested Access : OPTIONAL
#
# This parameter should be input as the following :
# ACCESS_MODE = "mode1"
# READ_PASSWORD = "xxxxxxxx"
# INSERT_PASSWORD = "xxxxxxxx"
# REPLACE_PASSWORD = "xxxxxxxx"
# EXTEND_PASSWORD = "xxxxxxxx"
# ERASE_PASSWORD = "xxxxxxxx"
# READ_ATTR_PASSWORD = "xxxxxxxx"
# CHANGE_ATTR_PASSWORD = "xxxxxxxx"
# DELETE_FILE_PASSWORD = "xxxxxxxx"
#
# NOTE : See "Access Passwords" in FTAM 8571-3 (1988) p.21 for the
# definition of this parameter.
# THE MAXIMUM LENGTH FOR EACH PASSWORD IS 16 CHARACTERS.
#
# Where :
# mode1 = an ASCII string referring to a group of access
# passwords. It is referenced on the command line
# when using the “-s" option.
# (e.g. fcp -s mode1 x OSSCsm!/tmp).
#
# xxxxxxxx = an ASCII string with a combination of numeric
# (0-9), alphabetic (a-z, A-Z) and special characters
# (.#% ....). This string represents the password
# associated for a specific operation.
#===========================================================================
ACCESS_MODE = "OSSC"
READ_PASSWORD = "readpw"
INSERT_PASSWORD = "insertpw"
REPLACE_PASSWORD = "replacepw"
EXTEND_PASSWORD = "extendpw"
ACCESS_MODE = "accessmode"
READ_PASSWORD = "readpw1"
READ_ATTR_PASSWORD = "readattpw1"
#===========================================================================
# Account : OPTIONAL
#
# This parameter should be input as the following :
# ACCOUNT = "xxxxxxxx"
#
# NOTE : See "Account" in FTAM 8571-3 (1988) p.20 and p.25 for the
# definition of this parameter.
# THE MAXIMUM SIZE FOR ACCOUNT IS 16 CHARACTERS.
#
# Where :
# xxxxxxxx = an ASCII string with a combination of numeric
# (0-9), alphabetic (a-z, A-Z) and special characters
# (.#% ....). This string represents the account
# used for charging by the FTAM regime.
#===========================================================================
ACCOUNT = "OSSC"
#===========================================================================
# Account for File Creation : OPTIONAL
#
# This parameter should be input as the following :
# CREATE_ACCOUNT = "xxxxxxxx"
#
# NOTE : See "Account" in FTAM 8571-3 (1988) p.20 and p.30 for the
# definition of this parameter.
# THE MAXIMUM SIZE FOR ACCOUNT IS 16 CHARACTERS.
#
# Where :
# xxxxxxxx = an ASCII string with a combination of numeric
# (0-9), alphabetic (a-z, A-Z) and special characters
# (.#% ....). This string represents the account
# to be charged for the duration of this selection.
#===========================================================================
CREATE_ACCOUNT = "createaccount"
#===========================================================================
# Account for File Selection (Open, ReadAttribute, ChangeAttribute) : OPTIONAL
#
# This parameter should be input as the following :
# SELECT_ACCOUNT= "xxxxxxxx"
#
# NOTE : See "Account" in FTAM 8571-3 (1988) p.20 and p.28 for the
# definition of this parameter.
# THE MAXIMUM SIZE FOR ACCOUNT IS 16 CHARACTERS.
#
# Where :
# xxxxxxxx = an ASCII string with a combination of numeric
# (0-9), alphabetic (a-z, A-Z) and special characters
#===========================================================================
# Concurrency Control For File Transfer : OPTIONAL
#
# This parameter should be input as the following :
# XFER_READ = xx
# XFER_INSERT = xx
# XFER_REPLACE = xx
# XFER_EXTEND = xx
# XFER_ERASE = xx
# XFER_READ_ATTR = xx
# XFER_CHANGE_ATTR = xx
# XFER_DELETE_FILE = xx
#
# NOTE : See "Concurrency Control" in FTAM 8571-3 (1988) p.21 and p.28
# for the definition of this parameter.
#
# Where :
# xx can be any one of the following strings :
# SHARED NOT_REQUIRED EXCLUSIVE NO_ACCESS
#===========================================================================
#XFER_READ = SHARED
#XFER_INSERT = NOT_REQUIRED
#XFER_REPLACE = EXCLUSIVE
#XFER_EXTEND = EXCLUSIVE
#XFER_ERASE = EXCLUSIVE
#XFER_READ_ATTR = SHARED
#XFER_CHANGE_ATTR = EXCLUSIVE
#XFER_DELETE_FILE = EXCLUSIVE
#===========================================================================
# Concurrency Control For File Deletion : OPTIONAL
#
# This parameter should be input as the following :
# DEL_READ = xx
# DEL_INSERT = xx
# DEL_REPLACE = xx
# DEL_EXTEND = xx
# DEL_ERASE = xx
# DEL_READ_ATTR = xx
# DEL_CHANGE_ATTR = xx
# DEL_DELETE_FILE = xx
#
# NOTE : See "Concurrency Control" in FTAM 8571-3 (1988) p.21 and p.28
# for the definition of this parameter.
#
# Where :
# xx can be any one of the following strings :
# SHARED NOT_REQUIRED EXCLUSIVE NO_ACCESS
#===========================================================================
DEL_READ = NO_ACCESS
DEL_INSERT = NO_ACCESS
DEL_REPLACE = NO_ACCESS
DEL_EXTEND = NO_ACCESS
#===========================================================================
# Contents Type : OPTIONAL
#
# This parameter specifies the default document type of a file being
# transferred.
#
# This parameter should be input as the following :
# CONTENTS_TYPE = xx
#
# NOTE : See FTAM 8571-2 (1988) p.29, p.32, and p.35 for the definition
# of these document types.
#
# Where :
# xx can be any one of the following strings :
# FTAM-1 FTAM-2 FTAM-3
#===========================================================================
CONTENTS_TYPE = FTAM-3
#===========================================================================
# Create Password : OPTIONAL
#
# If the responder requires a specific password for file creation, this
# parameter should be used.
#
# This parameter should be input as the following :
# CREATE_PASSWORD = "xxxxxxxx"
#
# NOTE : See "Create Password" in FTAM 8571-3 (1988) p.29 for the
# definition of this parameter.
# THE MAXIMUM LENGTH OF CREATE_PASSWORD IS 16 CHARACTERS.
#
# Where :
# xxxxxxxx = an ASCII string with a combination of numeric
# (0-9), alphabetic (a-z, A-Z) and special characters
# (.#% ....). This string represents the password
# required for file creation.
#===========================================================================
CREATE_PASSWORD = "createpasswd"
#===========================================================================
# Initiator Name and Filestore Password : OPTIONAL
#
# These parameters identify the privileges of the initiator to the
# responder. They may also be specified on the command line by using
# either the "-p" or "-P" option (see FT-820 User Guide).
#
# This parameter should be input as the following :
# INITIATOR_ID = "xxxxxxxx"
# FILE_STORE_PASSWORD = "xxxxxxxx"
#
# NOTE : See "Initiator Identity" and "Filestore Password" in FTAM 8571-3
# (1988) p.25 for the definitions of these parameters.
# THE MAXIMUM SIZE FOR INITIATOR_ID AND PASSWORD IS 16 CHARACTERS.
#===========================================================================
# Override : MANDATORY
#
# This parameter defines what action to take in the event that the
# destination file already exists during file creation.
#
# This parameter should be input as the following :
# OVERRIDE = xx
#
# NOTE : See "Override" in FTAM 8571-3 (1988) p.29 for the definition of
# this parameter.
#
# Where :
# xx can be any one of the following :
# CREATE-FAILURE DEL&CREATE-OLD-ATTR
# SELECT-OLD-FILE DEL&CREATE-NEW-ATTR
#===========================================================================
OVERRIDE = DEL&CREATE-NEW-ATTR
#===========================================================================
# Create Mode : OPTIONAL
#
# This parameter provides a user with the ability to specify the
# attribute characteristics of the destination file being created.
# These characteristic groups are referenced on the command line by
# a string when using the "-c" option.
#
# This parameter should be input as the following :
#
# CREATE_MODE = "create_id"
# FILE_AVAILABILITY = aa
# FUTURE_FILE_SIZE = 1000000
# LEGAL_QUALIFICATION = "qqqqqqqq"
# ACCESS_CONTROL {
# USER_NAME = "uuuuuuuu"
# LOCATION = "llllllll"
# READ_CONTROL = cc, "pppppppp"
# INSERT_CONTROL = cc, "pppppppp"
# REPLACE_CONTROL = cc, "pppppppp"
# EXTEND_CONTROL = cc, "pppppppp"
# ERASE_CONTROL = cc, "pppppppp"
# READ_ATTR_CONTROL = cc, "pppppppp"
# CHANGE_ATTR_CONTROL = cc, "pppppppp"
# DELETE_FILE_CONTROL = cc, "pppppppp"
# }
#
# Note : See FTAM 8571-2 (1988) p.12 for the definitions of these parameters.
#
# Where :
#===========================================================================
# Effector : OPTIONAL
#
# This parameter specifies the form effector used in an FTAM-1 or FTAM-2
# file. By default, the form effector is <LF>.
# The effector is used in the following manner:
#
# AIX -> FTAM-1 : <effector> => <CR><effector>
# FTAM-1 -> AIX : <CR><effector> => <effector>
# AIX -> FTAM-2 : <effector> removed
# FTAM-2 -> AIX : <effector> added
#
# This parameter should be input as the following :
# EFFECTOR = xx
#
# Where :
# xx = ascii decimal code referring to the appropriate character
# (e.g. <LF> = 10; <FF> = 12)
#===========================================================================
EFFECTOR = 10
#===========================================================================
# Universal Class : OPTIONAL
#
# This parameter specifies the universal class for strings in an FTAM-1 or
# FTAM-2 document. By default, the universal class for FTAM-1 and FTAM-2
# documents is GRAPHIC_STRING.
#
# This parameter should be input as the following :
# UNIVERSAL_CLASS = aa
#
# Where :
# aa can be any one of the following :
# IA5_STRING GRAPHIC_STRING
# VISIBLE_STRING GENERAL_STRING
#
# NOTE : Printable string, Teletex string and Video string are not
# present because they are currently not supported in the ISP.
#===========================================================================
UNIVERSAL_CLASS = GRAPHIC_STRING
#===========================================================================
# Maximum String Length : OPTIONAL
#
# These parameters specify the maximum string length for FTAM-1, FTAM-2,
# and FTAM-3 documents. By default, the string length is unbounded; that
# is, there is no maximum string length.
#
# These parameters should be input as the following :
# MAXIMUM_STRING_LENGTH = w
# FTAM1_MAXIMUM_STRING_LENGTH = x
# FTAM2_MAXIMUM_STRING_LENGTH = y
# FTAM3_MAXIMUM_STRING_LENGTH = z
#
# Where :
# w = any positive integer.
#===========================================================================
# Copy Indicator : OPTIONAL
#
# This parameter specifies whether to turn the copy indicator ON or OFF.
# If turned on, successive periods (".") will be displayed as the file
# is being transferred.
#
# NOTE : In addition, the "-v" option must be specified on
# the command line for the copy indicator to be displayed.
#
# This parameter should be input as the following :
# COPY_INDICATOR = xx
#
# Where :
# xx is either ON or OFF
#
#===========================================================================
COPY_INDICATOR = ON
#===========================================================================
# MAPPING : OPTIONAL
#
# This parameter, if set, specifies the supported default character set.
#
# This parameter is input as follows :
# MAPPING = xx
#
# Where :
# xx can be any one of the following strings :
# ISO_646 (the default character set is ISO 646)
# ISO_8859_1 (the default character set is ISO 8859-1)
#
#===========================================================================
MAPPING = ISO_8859_1
#==========================================================================
# Audit File Path and Audit Level
#
# These parameters specify the path name of the utility audit file, and the
# level of audit description. If no filename is specified, the audit will
# be displayed to stderr.
#
# These parameters are input as follows :
# AUDITPATH = pathname
# AUDITLEVEL = x
#
# Where :
#===========================================================================
# CONTINUE : OPTIONAL
#
# This parameter provides the user with the means to ensure that as many
# of the specified files as possible will be transferred.
#
# This parameter is input as follows :
# CONTINUE = xx
#
# Where :
# xx can be
# OFF (Exit on first failure)
# ON (Transfer as many files as possible)
#===========================================================================
CONTINUE = ON
#===========================================================================
# Quality Of Service : OPTIONAL
#
# This parameter provides the user with the means to define the proposed
# level of service to be negotiated.
#
# NOTE : This parameter is only meaningful if the FT-825 option is used.
#
# This parameter should be input as follows :
# QUALITY_OF_SERVICE = x
#
# Where :
# x is a value of
# 0 : class 0; no error recovery
# 1 : class I error recovery
# 2 : class II error recovery
# 3 : class III error recovery
#
# NOTE : When the FT-825 option is not being used, the default
# value is 0; otherwise, the default values is 3.
#===========================================================================
QUALITY_OF_SERVICE = 3
#===========================================================================
# Checkpoint Window : OPTIONAL
#
# This parameter provides the user with the means to define the maximum
# number of checkpoints that may remain unacknowledged.
#
# NOTE : This parameter is only meaningful if the FT-825 option is used.
#
#===========================================================================
# Maximum Retries : OPTIONAL
#
# This parameter provides the user with the means to define the number
# of times that ERPM should attempt to restart/recover before reporting
# an error to the utility/responder.
#
# NOTE : This parameter is only meaningful if the FT-825 option is used,
# and the negotiated quality of service is 3.
#
# This parameter is input as follows :
# MAX_RETRIES = x
#
# Where :
# x is a number representing the maximum number of retries
#===========================================================================
MAX_RETRIES = 5
#===========================================================================
# Maximum Time Limit : OPTIONAL
#
# This parameter provides the user with the means to define the maximum
# time limit after which FT-825 should stop error recovery and report a
# a permanent error.
#
# NOTE : This parameter is only meaningful if the FT-825 option is used,
# and the negotiated quality of service is 3.
#
# This parameter is input as follows :
# MAX_TIME_LIMIT = x
#
# Where :
# x is a number representing the maximum time limit, in seconds.
#===========================================================================
MAX_TIME_LIMIT = 3600 ## 1 hour
#===========================================================================
# Retry Delay : OPTIONAL
#
# This parameter provides the user with the means to define the delay
# time in seconds that FT-825 should wait after failure, before it attempts
# to restart/recover.
#
# NOTE : This parameter is only meaningful if the FT-825 option is used,
# and the negotiated quality of service is 3.
#
# This parameter is input as follows :
# RETRY_DELAY = x
#
# Where :
• The legal characters are any combination of 0–9, a–z, A–Z, and
printing characters, including the period (.), percent (%), and
number (#) symbols.
Element Description
SELECT_ACCOUNT Specifies the account name for the account that should be
(Optional) charged for all costs incurred by the selection (during file
open, read attributes, and change attribute operations) of
a file. The account name must follow the utility
configuration file’s syntax conventions.
OVERRIDE Tells the filestore what action to take if the file being copied
(Optional) or moved already exists at the destination. The value given
here can be overridden by using the -o option on the
command line. The possible values are:
CREATE-FAILURE The creation fails if the
destination file already
exists.
SELECT-OLD-FILE The existing file is selected
instead of creating a new
one.
DEL&CREATE-OLD-ATTR Opens the existing file and
deletes its contents, but its
attributes are unchanged.
DEL&CREATE-NEW-ATTR Deletes the old file and
creates a new one, whose
attributes are taken from
default values, or from the
create mode parameter, if
one is specified in either the
command line or in this
utility configuration file (see
below).
EFFECTOR Sets the effector the user wishes to apply to the file. By
(Optional) default, the form effector for FTAM-1 and FTAM-2 is a line
feed (<LF>). It is used as follows:
AIX operating system document → FTAM-1 document:
<LF> translates to <CR> <LF>
FTAM-1 document → AIX operating system document
<CR> <LF> translates to <LF>
AIX operating system document → FTAM-2 document:
<LF> removed
FTAM-2 document → AIX operating system document:
<LF> added
You can set other control characters to be the effector, and
they will then be treated in the same manner as a linefeed.
For example, an effector stating EFFECTOR = 12 would
treat <FF> as an effector:
AIX operating system document → FTAM-1 document:
<FF> translates to <CR> <LF>
FTAM-1 document → AIX operating system document
<CR> <LF> translates to <FF>
AIX operating system document → FTAM-2 document:
<FF> removed
FTAM-2 document → AIX operating system document:
<FF> added
AUDITPATH These parameters specify the path to the audit file and the
AUDITLEVEL audit level of audit information to be recorded. If no path is
(Optional) specified, the audit information is displayed on your screen
(stderr). The audit levels are as follows:
0 No audit information is recorded.
1 Information recorded on connection, release,
and abort.
2 Information recorded on select, create, deselect,
and delete.
3 Information recorded on open and close.
The AUDITPATH and AUDITLEVEL parameters are
commented out in the sample .ftInit file.
RETRY_DELAY Factor for defining the time delayed (two to the power of
(Optional) RETRY_DELAY seconds) after a failure before
recovery/restart is attempted. This parameter is only
significant if you are using the FT-825 ERPM product.
2. Save the file in the user’s home directory and exit from the
utility configuration file.
The utility configuration file is ready for use. It will take effect the
next time FT-820 is started.
The parameters you can define include the address of the filestore
(responder address), its application entity title, default FTAM
initiator ID (login name), access to FTAM, restricted access to FTAM,
multiple processes, maximum number of FTAM connections, file
access concurrency control, attribute database path, create
permissions, and the names of your transport providers.
# Responder address
# Enter HEX octets or Character strings
# Example TSAP can be "FTAM" or 4654414D
# NSAP must be entered in HEX
#NSAP = 4901020301
TSAP = 0100
SSAP = "SS"
PSAP = "PP"
# Create Permissions
# This is the default AIX permissions that will be used if
# user does not send Access Control Elements on the CREATE
# request. Set value for USER, GROUP and OTHER to READ,
# WRITE, or READ_WRITE.
USER_CREATE_PERMISSION = READ_WRITE
GROUP_CREATE_PERMISSION = READ_WRITE
OTHER_CREATE_PERMISSION = READ_WRITE
#===========================================================================
# Effector: OPTIONAL
#
# This parameter is the list of effectors user wish to define. By default,
# the Form effector for FTAM1 and FTAM2 is <LF>. Here is how the
# effector is used :
# AIX -> FTAM1 : <LF> = <CR> <LF>
# FTAM -> AIX : <CR><LF> = <LF>
# AIX -> FTAM2 : <LF> removed
# FTAM2 -> AIX : <LF> added
# If user put other character(s) (must be control character) in this
effector
# list, then every character in this list will be treated the same as <LF>
# in the example above.
# For example :
# An effector list stating EFFECTOR = 12 will treat both
# <FF> as effector. For the example below, <effector>
# means <FF>.
# AIX -> FTAM1 : <effector> = <CR> <LF>
# FTAM -> AIX : <CR><LF> = <effector>
# AIX -> FTAM2 : <effector> removed
# * FTAM2 -> AIX : <effector> added
#
#===========================================================================
#EFFECTOR = 10
#===========================================================================
# Delete Unsuccessful File Flag : OPTIONAL
#
# Defaulted Value : FALSE
#
# Description :
# This parameter allows user to configure the responder to delete
# unsuccessfully transferred file.
# The responder checks this configuration flag when it is aborting
# the connection. If the destination file is still open at this point,
# it assumes that the data transfer failed and therefore deletes
# the file.
#
#===========================================================================
#DELETE_FAILED_FILE = TRUE
#===========================================================================
#===========================================================================
# Quality Of Service : OPTIONAL
#
# This parameter provides the user with the means of defining the
# proposed level of service to be negotiated. This parameter is
# only meaningful if the FT-825 option is being used.
#
# This parameter is inputted as follows :
# QUALITY_OF_SERVICE = x
#
# Where x is a value of 0,1,2 or 3, which represents class 0, I, II
# or III error recovery.
# Default value is 0 when FT-825 option is not being used
T-825 option is being used
#
#===========================================================================
#QUALITY_OF_SERVICE = 3
#===========================================================================
# Checkpoint Window : OPTIONAL
#
# This parameter provides the user with the means of defining the
# maximum number of checkpoints that may remain unacknowledged
#
# This parameter is inputted as follows :
# CHECK_WINDOW = x
#
# Where x is a number representing the window size required
#
#===========================================================================
#CHECK_WINDOW = 1
#===========================================================================
#
# Maximum Retries : OPTIONAL
#
# This parameter provides the user with the means of defining the
# number of times that ERPM should attempt to restart/recover
# before reporting an error to the utility/responder.This parameter is
# only meaningful if the FT-825 option is being used, and the
# negotiated quality of service is 3.
#
# This parameter is inputted as follows :
# MAX_RETRIES = x
#
# Where x is a number representing the maximum number of retries
# required
#
#===========================================================================
#
# Maximum Time Limit : OPTIONAL
#
# This parameter provides the user with the means of defining the
# maximum time limit after which FT-825 should stop
# re-trying and should report a permanent error. This parameter is
# only meaningful if the FT-825 option is being used, and the
# negotiated quality of service is 3.
#
# This parameter is inputted as follows :
# MAX_TIME_LIMIT = x
#
# Where x is a number representing the maximum time limit
# required , in seconds
#
#===========================================================================
#MAX_TIME_LIMIT = 3600 # 1 hour
#===========================================================================
#
# Retry Delay : OPTIONAL
#
# This parameter provides the user with the means of defining the
# delay time in seconds that FT-825 should wait after failure,
# before it attempts to restart/recover. This parameter is
# only meaningful if the FT-825 option is being used, and the
# negotiated quality of service is 3.
#
# This parameter is inputted as follows :
# RETRY_DELAY = x
#
# Where x is a number representing the retry delay required and the
# delay time is 2^x seconds.
#
#===========================================================================
#RETRY_DELAY = 9
#===========================================================================
#
# MAPPING : OPTIONAL
#
# This parameter, if set denotes the supported default character set
#
# This parameter is inputted as follows :
# MAPPING = x
#
# Where x is ISO_646 - the default character set is ISO 646
# or ISO_8859_1 - the default character set is ISO 8859-1
#
#===========================================================================
#MAPPING = ISO_646
Element Description
USER Defines the name of the default login name (initiator ID) that
(Optional) is to be used if a user does not specify one or if the
anonymous login name ANON is used when accessing a
filestore.
An example of an entry for this parameter is:
USER = ”guest”
You can restrict an anonymous user’s access to the filestore
by omitting this parameter in the configuration file.
LIMIT Limits access to the filestore. If you set LIMIT to TRUE, the
(Mandatory) login name of all remote users is set to the user you identify
by the USER parameter. Hence, all users who access the
filestore are constrained to accessing the filestore with that
user’s permissions. If the filestore is not running as root, then
LIMIT must equal TRUE, and USER must be the name of the
user who starts the filestore. If you set LIMIT to FALSE, the
initiator ID and password of each incoming connection is
verified against the list of initiator IDs and passwords in the
AIX operating system /etc/passwd file and, if found, the
user who is trying to access the filestore is granted access
with his or her individual permissions.
Note. If you set LIMIT to TRUE, you must specify a name
after USER (see above).
NO_ACCESS_LIST Specifies the users for whom you want to deny access to the
(Mandatory) filestore. You specify the login names (initiator IDs) for the
users for whom you want to deny access.
An example of an entry for this parameter is:
{”root” ”wilma” ”fred”}
Note. You must separate each user name with a space
character.
TEXT_EXT Allows you to specify a default document file type for a file
(Mandatory) based on its extension (that is, the text that follows the last
period (.) in a filename).
By default, a file that does not have a file type already
associated with it in the FT-820 filestore is assigned FTAM-3
(unstructured binary) or NBS-9 (if the file is a directory).
You may want to make a file an FTAM-1 (unstructured text)
type rather than an FTAM-3 (unstructured binary). To
override the FTAM-3 (unstructured binary) file default, add
the extension of the file to the list of extensions between the
{ } symbols.
EFFECTOR Sets the effector the user wishes to apply to the file. By
(Optional) default, the form effector for FTAM-1 and FTAM-2 is a line
feed (<LF>). It is used as follows:
AIX operating system document → FTAM-1 document:
<LF> translates to <CR> <LF>
FTAM-1 document → AIX operating system document:
<CR> <LF> translates to <LF>
AIX operating system document → FTAM-2 document:
<LF> removed
FTAM-2 document → AIX operating system document:
<LF> added
You can set other control characters to be the effector, and
they will then be treated in the same manner as a linefeed.
For example, an effector stating EFFECTOR = 12 would
treat <FF> as an effector:
AIX operating system document → FTAM-1 document:
<FF> translates to <CR> <LF>
FTAM-1 document → AIX operating system document:
<CR> <LF> translates to <FF>
AIX operating system document → FTAM-2 document:
<FF> removed
FTAM-2 document → AIX operating system document:
<FF> added
Note. In the sample file, EFFECTOR is commented out of the
code with the # symbol.
TRANSPORT_NAMES Names all of the transport providers for which you wish to
(Mandatory) receive connect indications. The names for the transport
providers are defined in the osid.cfg file, which is
described in the OSSC OSI Application Developer’s Guide.
1. Use the AIX operating system’s text editor to correctly set the
parameters in the ffs.cfg filestore configuration file.
Note. When you start the filestore, you must specify the path of
the ffs.cfg file on the command line.
Each entry in the filestore audit trail file may contain nine elements:
the filename, type of event, time at which the event occurred,
connection ID, initiator ID, AIX operating system user name, address
of the initiating system, error code, and error message (if any).
Note. Before a new filestore audit trail file is created, the existing file
is saved as xxx.BAK, where xxx is the name of the file specified in
the AUDITPATH element of ffs.cfg.
START 890510115643
CONNECT 890510115655 00001 ”tom” ”tom” /470004000600010101/1319/0000/0000
ABORT 890510115703 00001
CONNECT 890510115737 00002 ”ANON” ”ftam” /470004000600010101/2619/0000/0000
CONNECT 890510115738 00003 ”ANON” ”ftam” /470004000600010101/2619/0000/0000
RELEASE 890510115742 00003
RELEASE 890510115743 00002
CONNECT 890510115846 00004 ”tom” ”tom” /470004000600010101/1319/0000/0000
CREATE 890510115850 00004 ”/tmp/foobar”
OPEN 890510115851 00004 ”/tmp/foobar”
CLOSE 890510115902 00004 ”/tmp/foobar”
DESELECT 890510115903 00004 ”/tmp/foobar”
RELEASE 890510115922 00004
CONNECT 890510115925 00005 ”ed” ”ed” /470004000600010101/3619/0000/0000
FT2015 ”Initiator identity unacceptable.”
STOP 890510120000
Note. The error code and error message shown in the above diagram
are displayed on a separate line due to space limitations. They are
normally displayed on the same line as the event that caused the
error.
Element Description
Event Describes the action that occurs in the FT-820 filestore. Eleven
events are currently shown:
START The time when the FT-820 filestore was started.
CONNECT Information about establishing connections with
the filestore.
RELEASE Information about releasing connections with the
filestore.
ABORT Information about aborting connections with the
filestore.
SELECT Information about the file you are selecting.
DESELECT Information about the file you are deselecting.
CREATE Information about the file you are creating.
DELETE Information about the file you are deleting.
OPEN Information about the file you are opening.
CLOSE Information about the file you are closing.
STOP The time when the FT-820 filestore was
terminated.
Time Time at which the event occurred. The format of this time record
is yymmddhhmmss, where:
yy Last two digits of the year in which the event occurred.
mm Month in which the event occurred.
dd Day on which the event occurred.
hh Hour at which the event occurred.
mm Minute at which the event occurred.
ss Second at which the event occurred.
User name Login name of the user on the local AIX operating system. If
ANON or NULL is passed as the initiator ID, the user name is
taken from the USER parameter; otherwise, the user name takes
on the value passed in the initiator ID. If the LIMIT parameter is
set to TRUE, the user name is limited (that is, access is limited) to
only the default user specified in the USER parameter.
Address Address of the initiating system (the system from which a user is
attempting to access the FT-820 filestore). The slash (/)
separates the hexadecimal addresses of the SAPs, in the
following order:
NSAP/TSAP/SSAP/PSAP
Error code Error code that was generated during an event (if an error
occurred). Error codes are described in Appendix A, "Error
Messages"
Error Error message that is associated with an error code that was
message generated during an event (if an error occurred). Error messages
are described in Appendix A, "Error Messages"
Filename Name of the file that is being created, selected, opened, closed,
deselected, or deleted.
Each entry in the utility audit trail file may contain nine elements:
filename, name of the invoked utility, type of request/confirmation,
time of the request/confirmation, connection ID, initiator ID,
address of the filestore, error code, and error message (if any).
Element Description
Request/ Describes the action that occurs in the FT-820 filestore. Ten
confirmation events currently can be reported:
START The time when the FT-820 filestore was started.
CONNECT Information about establishing connections with
the filestore.
RELEASE Information about releasing connections with the
filestore.
ABORT Information about aborting connections with the
filestore.
SELECT Information about the file you are selecting.
DESELECT Information about the file you are deselecting.
CREATE Information about the file you are creating.
DELETE Information about the file you are deleting.
OPEN Information about the file you are opening.
CLOSE Information about the file you are closing.
Filename Name of the file that is being created, selected, opened, closed,
deselected, or deleted.
Error code Error code that was generated during a request/confirmation (if
an error occurred). Error codes are described in Appendix A,
"Error Messages"
Error Error message that is associated with an error code that was
message generated during a request/confirmation (if an error occurred).
Error messages are described in Appendix A, "Error Messages"
The lock manager must be running before the filestore starts. If you
use the startup script to start the filestore (see page 60), the lockmgr
command is executed automatically.
Configuring FTAM
For FT-820 and FT-825 to operate properly, you need to configure the
FTAM and supporting software. Some of the following tasks are
mandatory, and some are optional.
Configuring FT-820
You need to verify the configurable values in the FT-820 support
files. In many cases, there are default values, which may be
appropriate to your system.
• Set up the filestore configuration file (see page 39). The default
file is ffs.cfg. This file must contain one or more of the
filestore system’s transport provider names. You should verify
the number of supported connections, the directories for the at-
tributes databases and the audit trail file, and check that the
57
anonymous user name is recognized. You may also choose to
change the default values for the other parameters in this file.
• Start the lock manager utility. See “Database lock manager utili-
ty: lockmgr,” on page 59.
58 Chapter 3 • Filestore
Database lock manager utility: lockmgr
The lock manager program controls concurrent access to the FT-820
database files, based on the concurrency locks associated with each
file. These locks are assigned through default values. For more
information about concurrency locks, see “Filestore audit trail file,”
on page 50.
The lockmgr command runs automatically when you run the start
filestore command, ft820.rc start.
lockmgr [-u n]
Command line options that are used with lockmgr are listed below:
Option Description
lockmgr -u 16
Startup script
The following steps show you how to start the filestore using the
startup script.
ft820.rc start
Manual startup
If you prefer to start the filestore without using the startup script,
you can do so with the ffs command. When you start the filestore
with the ft820.rc start command, a shell script executes that
also starts the lock manager, updates the attribute database, and
clears the concurrency locks. If you want to start the filestore
manually, you must issue the ffs command after these tasks:
60 Chapter 3 • Filestore
• Update the attributes database. See Chapter 4, “Maintaining
FT-820,” for information about updating the attributes data-
base.
Command line options that are used with ffs are listed below:
Option Description
The ffs utility maps the FTAM file attributes and FTAM primitive
operations from the FTAM virtual filestore into the real operating
system filestore (in this case, AIX).
The FTAM file attributes reflect the state of the file as it is actually
stored in the virtual filestore. The ffs utility uses both the AIX
operating system and an attribute database to keep track of the file
attributes. The AIX operating system maintains its attributes
internally, and FTAM maintains its attributes in a database within
the file system. All of the attributes that the AIX operating system
Contents type FTAM: File type passed in the FTAM create request.
AIX: The file type is determined by the AIX operating
system (FTAM-1, FTAM-3, or NBS-9).
Date and time of FTAM: Indicates when the contents of the file were last
last modification modified.
AIX: Indicates when the contents of the file were last
modified.
62 Chapter 3 • Filestore
Table 3.1 File attributes supported by FTAM (continued)
Date and time of FTAM: Indicates when the contents of the file were last
last read access read.
AIX: Indicates when the contents of the file were last
read.
Date and time FTAM: Indicates when the value of a file attribute was
of last attribute last modified
modification AIX: Indicates when the value of a file attribute was
last modified.
Identity of creator FTAM: Set to the current initiator identity when the file is
created.
AIX: Retrieves the user name associated with the
current user.
File size FTAM: Set to the nominal size of the file, in octets, when
the file is closed.
AIX: Set to the nominal size of the file, in octets, when
the file is closed.
Future file size FTAM: Indicates the nominal size of the file, in octets, to
which the file may grow as a result of modification
and extension.
AIX: Not supported.
Legal qualifications FTAM: Conveys information about the legal status of the
file and its use. This is set at file create time.
AIX: Not supported.
☞ Caution. Do not use the utility kill -9 to stop the FT-820 filestore
or you may seriously damage the FT-820 databases.
ft820.rc stop
64 Chapter 3 • Filestore
Stopping the filestore gracefully
These steps show you how to stop the FT-820 filestore on your
system gracefully.
2. Find the process ID (PID) for the filestore (listed as ffs) you
want to stop.
kill -1 PID
where PID represents the PID for the filestore you want to stop.
☞ Caution. Do not use the utility kill -9 to stop the FT-820 filestore
or you may seriously damage the FT-820 databases.
FT-820 databases
The two FT-820 databases, namely the attributes database and the
concurrency control database, contain dynamic information about
the files on a filestore, and must be updated regularly so that they
reflect the true current state of the filestore.
• The attributes database contains the attributes for every file that
FTAM creates in the filestore. (The vfsattdb.d01 and
vfsattdb.k01 files contain the data and key information for
the attributes database.)
When you first start the filestore, you must initialize each of these
databases. If the filestore’s system crashes or suffers some
corruption, you may need to reinitialize these databases. The
commands for the first initialization and a subsequent
reinitialization differ; instructions for each procedure appear later in
this chapter.
67
The file attributes that are reflected in these files are initially
established when the file is created. When the FT-820 copies or
moves a data file, the newly created file’s attributes are derived from
the original file’s attributes. See “Utility configuration file,” on
page 17, for information on assigning file attributes using .ftInit.
Option Description
3. Are you using global concurrency control? (Did you set the
parameter LOCAL_CONC_CTRL to FALSE in the filestore
configuration file?)
Command line options that are used with fda are listed below:
Option Description
fda -f [fs_config.file]
Element Description
USER GROUP OTHER These are the identity portions of the three elements
of the access control attribute, which defines the
conditions under which access to the file is valid.
Each element gives one condition under which
access to the file is valid, and consists of three parts:
the identity, the action-list, and the concurrency keys.
Access to a file is determined by the initiator’s
relationship to the file. The initiator may be the owner
of the file (USER), in the same group as the owner
(GROUP), or not in the same group (OTHER). After this
relationship is determined, an access control element
is selected from the database.
Read This is the action list, which appears vertically, to the
: left of the elements. The status (ON/OFF) is listed to
Delete the right of each action. The action list is used
whenever an attempt is made to access the file.
ON/OFF states whether the particular action in the
action list is available to the identity
(USER/GROUP/OTHER) in that access control
element.
NR SH EX NA These are the concurrency keys. They show the
possible values of the concurrency locks that the file
accessor may request. The values are:
NR not required
SH shared
EX exclusive
NA no access
These keys are explained on page 30.
finit -c
vfsccdb.dbd initialized
finit -a
vfsattdb.dbd initialized
fua [fs_config_file]
You use the fua utility to verify that any files that users moved,
removed, or renamed exist on the AIX operating system’s file
system, and, if they do, to bring the attributes database into
correspondence with the AIX operating system’s file system.
Note that using this utility is not mandatory; how often you need to
update depends on the level of FTAM activity.
2. Type:
fua
Authentication file
The FT-820 authentication file controls access by users to the FT-820
filestore.
You may also control access to the FT-820 filestore by specifying the
network address of only those systems through which you want
users to access the FT-820 filestore.
77
# application entities that are allowed access to the
# FT-820 filestore. The address of the application
# entity of the user who is attempting# to access the
# FT-820 filestore is compared to the address in this
# file. If the address is found, the user is allowed
# access. If the address is not found, the
# connection is rejected and error “FT0005 FTAM
# management - security not passed” is generated.
#
# Entries in this file may be partial addresses only.
# This will allow ranges of network addresses to gain
# access. For example, if the entry 490104 is entered
# in the table, then any address with 490104... will
# gain access.
#
# NOTES for filling in this file:
#
# Enter network addresses in HEX octets only. For
# example:
# 490104000600010207010061B101.
#
4901 # Allow OSINET addresses only.
Element Description
If the driver is not installed, the ffs utility checks to see if a remote
user has access to the file only when the operation is first started.
Therefore, if the file permissions change (that is, if remote user access
is denied during the operation), ffs cannot detect it. However, if the
security driver is installed, file access permissions are checked
continually during the operation, and if access is revoked, the
operation is terminated.
Minimum permissions:
Multiple
processes 777 → for the directory
666 → for the file
__AETABLE__ file:
Minimum permissions:
Multiple
processes 555 → for the directory
444 → for the file
Note. If both the database files and __AETABLE__ file reside in the
same directory, the directory requirements for the database files
override the directory requirements for the __AETABLE__ file.
Add an entry to the password file for each remote user to whom you
wish to grant filestore access.
83
Table A.1 Elements of an FT-820 error message (continued)
Range Description
FT5000 – FT5999 Returned from an FTAM filestore when a file access error
has been detected by the filestore. An example of an error
in this range is when a bad location is requested or when
disk file space has been exhausted.
Range Description
* FT1013 Timeout
FT6005 No docket
Reason: Error recovery cannot be performed because the
docket maintained for the file transfer is not
present in the docket file.
These error messages are not listed because the actual error message
differs from system to system.
115
Related AT&T documentation
9. AT&T Network Programmer’s Guide
T his glossary defines key terms and acronyms that appear in this
manual.
Acronym Definition
AE application entity
AP application process
117
Acronym Definition
118 Glossary
ACSE
Association control service element. This protocol establishes and
maintains a virtual connection with a remote system, either the
initiator or responder.
AI
Application interface. A library of functions, in object code format,
that are called from the application program.
CCITT
International Telegraph and Telephone Consultative Committee. An
international association that develops communications standards
for services typically provided by public data networks. The X.400
series is an example of such a standard.
CLNS
Connectionless network service. A type of data transfer in which the
sender transmits data without first establishing a logical connection
with the receiver.
CONS
Connection-oriented network service. A mode of communication
between two networks in which a logical connection between the
two is established before data is transferred. This type of network
service is provided by the X.25 protocol when used in conjunction
with TP0 or TP2.
FADU
File access data unit. A unit of the file access structure on which the
actions of transfer, delete, extend, replace, or insert can be
performed. A data unit is the smallest unit of a file’s contents which
the filestore actions can manipulate.
FTAM
File transfer, access, and management. Software that allows a user to
manipulate files on remote computer systems by creating a virtual
filestore that describes the actual files stored in the operating
system’s file system.
GOSIP
Government Open Systems Interconnection Profile. Software and
systems that comply with Open Systems Interconnection standards.
initiator
A file service user who begins an FTAM session.
Glossary 119
ISO
International Organization for Standardization. An organization that
issues international standards for a wide variety of fields, including
communication protocols.
LAN
Local area network. A network that connects computers in a limited
geographic area such as an office, factory floor, building, or campus.
LANs are generally owned entirely by one organization.
MAC address
Medium access control address. An address that points to a device-
dependent entity within the data-link layer.
NSAP
Network service access point. The service access point address that
uniquely identifies a system on a network.
OSI
Open systems interconnection. A hierarchical standard of network
architecture that subdivides communication functions into seven
logically separate layers. The standards are developed by ISO.
presentation
The layer of the OSI protocol that provides for the representation of
information that is communicated to or referred to by an application
process.
protocol
A set of rules and conventions that governs how two entities
exchange data.
responder
The file service user which accepts an FTAM session request from an
initiator.
session
The layer of the OSI protocol that provides a means by which the
dialogue between the application processes is organized and
synchronized. It manages data between application processes.
STREAMS
A combination of system calls, kernel routines, and kernel utilities
offered in the UNIX System V Release 3.2 operating system that
provides a dynamic communications stack. STREAMS defines a
standard interface between a STREAMS-based user applications and
the STREAMS protocol stack with which it communicates.
120 Glossary
transport class
A category of protocols for the OSI transport layer. The transport
class defines which transport layer protocols are appropriate for the
level of network service used.
transport layer
An OSI layer that accepts data from the session layer, splits it into
smaller units, if need be, and passes them to the network layer. It
ensures that the pieces arrive correctly at the other end.
TLI
Transport library interface. An AT&T function call library associated
with STREAMS that provides a standard interface between user
applications and network transport services.
TPC
Transport provider capability. The TPC language is used to prepare
a set of functions to format and parse OSI addresses according to the
transport provider’s specifications.
transport stack
The software and hardware that provide data transport services for
the physical medium.
TSAP
Transport service access point. The transport access point address
that uniquely identifies a transport service user on a network.
WAN
Wide area network. A network that connects computers over a wide
geographic area. WAN service is often provided by public and
private telephone companies.
Glossary 121
122 Glossary
Index
Symbols
__AETABLE__ file
diagram of 13
how to set up 16
use of 12
A
access control
file attribute 72
parameters 34
ACCESS_CONTROL parameter 34
ACCOUNT parameter 30
ACESS_MODE parameter 29
action list file attribute 72
address
network
in authentication file 78
AE title
in filestore configuration file 45
AETABLE environment variable 16
ANON 12, 14
application entity
definition 12
example of 12
application entity. See also AETABLE
attributes
database 10, 67
display 69
table of 70
123
ATTRPATH parameter 47 DEL_READ parameter 31
audit trail DELETE_FAILED_FILE parameter 48
file display attributes 69
filestore 11, 50 procedure 70
utility 11, 53 document file types 6, 31
level parameter 47 parameter 48
path parameter 47
AUDITLEVEL parameter 38, 47
AUDITPATH parameter 38, 47 E
authentication file 11, 77 EFFECTOR parameter 36, 48
path parameter 47 environment variable
AUTHPATH parameter 47 AETABLE 16
ERPM
description 1
C error messages
CHECK_WINDOW parameter 38, 49 database 84
comment symbol filestore 87
description of 78 FTAM filestore 95
concurrency control operating system 108
database 10, 67 parts of
concurrency keys descriptions 83
file attribute 72 illustration 83
configuration file sample 83
filestore 10, 39 utility 108
parameters 45
setting up 50
utility 10, 17 F
setting up 39 fda command 69
syntax conventions 29 ffs command 61
CONNECTS parameter 46 file attributes
CONTENTS_TYPE parameter 31 destination 8
CONTINUE parameter 38 FILE_AVAILABILITY parameter 33
COPY_INDICATOR parameter 37 FILE_STORE_PASSWORD parameter 32
CREATE_ACCOUNT parameter 30 filestore
CREATE_MODE parameter 33 audit trail file 11
CREATE_PASSWORD parameter 31 description of 1
kill command 65
number of processes option 59
D start command 59, 60
database error messages 84 stop abruptly 64
database path parameter 47 stop gracefully 65
databases stop running in foreground 65
attributes 67 utility command 61
concurrency control 67 filestore error messages 87
reinitializing 72 FTAM 95
124 Index
finit command 68 and security 79
FTAM MULTIPLE_PROCESSES parameter 46
filestore error messages 95
purpose 1
FTAM1_MAXIMUM_STRING_LENGTH parameter N
37 NO_ACCESS_LIST parameter 46
FTAM2_MAXIMUM_STRING_LENGTH parameter NSAP parameter 45
37
FTAM3_MAXIMUM_STRING_LENGTH parameter
37 O
FTAMLOCAL environment variable 12, 14 operating system error messages 108
FUTURE_FILE_SIZE parameter 33 OTHER_CREATE_PERMISSION parameter 47
OVERRIDE parameter 32
G
GROUP_CREATE_PERMISSION parameter 47 P
password file 11, 80
permissions
I default parameter 47
IDs permitted actions
effective group and user 79 file attribute 71
initialize databases PSAP parameter 45
procedure 69
utility 68
INITIATOR_ID parameter 32 Q
QUALITY_OF_SERVICE parameter 38, 49
K
kill command 65 R
reinitializing databases 72
RETRY_DELAY parameter 38, 50
L
LEGAL_QUALIFICATION parameter 33
LIMIT parameter 46 S
local concurrencey control parameter 47 security
LOCAL_CONC_CTRL parameter 47 driver 79
lockmgr command 59 preventing unauthorized access 79
SELECT_ACCOUNT parameter 30
SSAP parameter 45
M start command 60
MAPPING parameter 37, 50 stop command 64
MAX_RETRIES parameter 38, 49 stop filestore
MAX_TIME_LIMIT parameter 38, 49 abruptly 64
MAXIMUM_STRING_LENGTH parameter 37 gracefully 65
multiple processes parameter in foreground 65
Index 125
T USER parameter 45
USER_CREATE_PERMISSION parameter 47
table of attributes 70
utility
TEXT_EXT parameter 48
audit trail file 11
TITLE parameter 45
configuration file
transport
example of 18
provider capability 2
utility error messages 108
providers parameter 49
TRANSPORT_NAMES parameter 49
TSAP parameter 45 V
vfsattdb.d01 file 67
U vfsattdb.k01 file 67
vfsccdb.d01 file 67
UNIVERSAL_CLASS parameter 37
vista.taf file 68
UNIX operating system
password file 80
user X
in filestore configuration file
parameter 81 XFER_READ parameter 30
number of, option 59
126 Index