scispace - formally typeset
Search or ask a question

Showing papers on "The Internet published in 1986"


01 Jul 1986
TL;DR: This memo specifies the extensions required of a host implementation of the Internet Protocol to support multicasting and obsoletes RFCs 998 and 1054.
Abstract: This memo specifies the extensions required of a host implementation of the Internet Protocol (IP) to support multicasting. Recommended procedure for IP multicasting in the Internet. This RFC obsoletes RFCs 998 and 1054. [STANDARDS-TRACK]

1,555 citations


Journal ArticleDOI
TL;DR: This article outlined some of the key elements of an integrated network technology, capable of supporting voice, data, and video communication and having the flexibility to accommodate new services as the need arose, and identified Integrated switching architectures, generalized connection signaling protocols, quality-of-service, multicast switching, and routing were all identified as key challenges to be addressed.
Abstract: hat a difference 25 years makes! When this article was written the telecommunications industry was still a heavily regulated, non-competitive but highly integrated place; the Internet was the private preserve of congnoscenti at a handful of research universities; integrated circuits with a feature size of 2 micron were state-of-the-art; and the room-sized minicomputers of the day could send and receive maybe a thousand packets per second, on a good day. This article articulated an observation that was gaining recognition throughout the early 1980s: first, that the fragmentation of the communications infrastructure into several distinct application-specific networks was wasteful and unnecessary; and second, that by combining concepts from packet switching with the implementation practices of circuit switching (highly parallel, hardware switching systems), one could develop systems with unprecedented flexibility and the performance levels and reliability needed to support large-scale, ubiquitous deployment. By the mid to late 1980s, these ideas were being pursued most vigorously in the development of ATM standards and technology, which was widely expected to play a leading role in the next generation of the public telecommunications infrastructure. The article outlined some of the key elements of such an integrated network technology, capable of supporting voice, data, and video communication and having the flexibility to accommodate new services as the need arose. Integrated switching architectures, generalized connection signaling protocols, quality-of-service, multicast switching, and routing were all identified as key challenges to be addressed. Subsequent years have seen tremendous progress on all these fronts in both the ATM context and in the now all-important Internet context. The changes in packet switching technology over the last two decades are particularly striking. While advanced switching architectures were first developed in the ATM context, these concepts have been applied with striking success in Ethernet switches and IP routers in recent years. Emerging IP router products with aggregate capacities exceeding a terabit per second are becoming available now, and gigabit Ethernet switches are available for just hundreds of dollars per port. Progress on other fronts has been more disappointing. While practical and effective solutions for connection signaling, quality-of-service, congestion control, and multicast have been developed and demonstrated, there has been little progress toward widespread commercial deployment. We still operate separate networks for voice, data, and video, and while the Internet promises to play a growing role in voice and video communication, it cannot achieve that promise without major technical improvements. Fortunately, the potential value of such improvements is becoming more and more clear, as the Internet’s role in our evolving information society continues to develop. While challenges remain, there seems little doubt that the necessary changes can and will be made, and that the full realization of the vision outlined in this article 25 years ago is now within our grasp. Jonathan S. Turner

918 citations


Book
01 Jan 1986
TL;DR: This chapter discusses the research strategies used in the design and production of the Communication Research Project, as well as the process of design and preparation of research projects.
Abstract: PART I: COMMUNICATION RESEARCH STRATEGIES. 1. Studying Communication. 2. Searching the Communication Literature. 3. Using Computers to Search Electronic Databases. 4. Using the Internet for Communication Research. PART II: COMMUNICATION RESEARCH SOURCES. 5. General Sources. 6. Access Tools. 7. Communication Periodicals. 8. Information Compilations. PART III: COMMUNICATION RESEARCH PROCESSES. 9. The Process of Communication Research. 10. Designing the Communication Research Project. 11. Preparing Research Projects. 12. Writing Research Papers. Appendix A: APA Style Basics. Appendix B: Glossary.

185 citations


01 Jan 1986
TL;DR: This RFC presents a description of how mail systems on the Internet are expected to route messages based on information from the domain system, and a discussion of howmailers interpret MX RRs, which are used for message routing.
Abstract: This RFC presents a description of how mail systems on the Internet are expected to route messages based on information from the domain system. This involves a discussion of how mailers interpret MX RRs, which are used for message routing.

72 citations


Journal ArticleDOI
TL;DR: It is found that through their favourable effects on quality of medical services, the user fees in public clinics would yield welfare gains, however, these gains might involve unacceptable equity trade-offs, and the net welfare effects of user charges on medical services is ambiguous.

49 citations


Book
01 Jan 1986
TL;DR: This much anticipated revision of a leading business data communications book will offer the most current information available and include coverage of the Internet, digital cash, and Internet technology.
Abstract: From the Publisher: This much anticipated revision of a leading business data communications book will offer the most current information available. New chapters will include coverage of the Internet, digital cash, and Internet technology.

39 citations


01 May 1986
TL;DR: This document is a preliminary discussion of the design of a personal- computer-based distributed mail system that provides mail service to an arbitrary number of users, each of which owns one or more personal computers (PCs).
Abstract: This document is a preliminary discussion of the design of a personal- computer-based distributed mail system. Pcmail is a distributed mail system that provides mail service to an arbitrary number of users, each of which owns one or more personal computers (PCs). The system is divided into two halves. The first consists of a single entity called the "repository". The repository is a storage center for incoming mail. Mail for a Pcmail user can arrive externally from the Internet or internally from other repository users. The repository also maintains a stable copy of each user's mail state. The repository is therefore typically a computer with a large amount of disk storage. It is published for discussion and comment, and does not constitute a standard. As the proposal may change, implementation of this document is not advised. See RFC-993.

38 citations


Journal ArticleDOI
TL;DR: In this paper, the authors suggest an interoperability approach for the transition from the ARPA Internet community to the Open System Interconnection (OSI) for the purpose of providing higher level services (i.e., session and above) without disrupting existing facilities.
Abstract: The ARPA Internet community has a well-developed, mature set of transport and internetwork protocols, which are quite successful in offering network and transport services to end-users. The protocols provide “open system interconnection” (OSI) for users, and a robust competitive market is supplied by a growing number of vendors. The CCITT and ISO have defined various network, transport, session, presentation, and application recommendations and standards which have been adopted by the international community and numerous vendors. To the largest extent possible, it is desirable to offer the higher level services (i.e., session and above) in networks based on the ARPA protocols, without disrupting existing facilities. It is also desirable to develop expertise with ISO and CCITT protocols while utilizing a robust set of transport services. Finally, given the probable, long-term dominance of the international standards, it is desirable to design a graceful transition strategy from network based on the ARPA protocols to OSI-based networks. In this paper, we suggest an exercise in interoperability which achieves all three of these goals. Our solution is practical in the sense that it: can be easily implemented in a cost-effective manner in the short-term; permits application-designers to work with an OSI applications-framework, while utilizing existing robust transport and network protocols; and, provides the basis for a far-reaching migration strategy to the OSI protocols.

31 citations



Journal ArticleDOI
TL;DR: A case study of the transparent, distributed operating system Locus, extended to operate transparently across an internet system that includes long-haul links, is discussed at length.
Abstract: Network transparency refers to the ability of a distributed system to hide machine boundaries from people and application programs; i.e. all resources are accessed in the same manner, independent of their locations. It is demonstrated that transparency across a long-haul network is both highly desirable and technically feasible. A case study of the transparent, distributed operating system Locus, extended to operate transparently across an internet system that includes long-haul links, is discussed at length. New protocols, distributed cache management, and process execution site selection are all used to achieve the results reported.

24 citations


01 Feb 1986
TL;DR: This document defines the standard format for the transmission of mail messages between computers in the UUCP Project; it does not however, address the format for storage of messages on one machine, nor the lower level transport mechanisms used to get the date from one machine to the next.
Abstract: This document defines the standard format for the transmission of mail messages between computers in the UUCP Project. It does not however, address the format for storage of messages on one machine, nor the lower level transport mechanisms used to get the date from one machine to the next. It represents a standard for conformance by hosts in the UUCP zone.

Book
01 Jun 1986
TL;DR: The third edition of this popular book retains the practical insights of the previous editions and adds descriptions of the profound impact the Internet and cell phones have had on the daily work of the legislative process as mentioned in this paper.
Abstract: This book -- authored by a longtime legislator, law professor, appellate judge and volunteer lobbyist -- provides a pragmatic view of how state legislatures operate. It gives a behind-the-scenes look at the fascinating and little understood intellectual journey that is the legislative process. This book helps its readers understand how hard thought and hard work turn first-draft legislative ideas into effective laws. It describes the process used by all legislative institutions to refine bills, and examines the tactics of advocates that speed or impede legislation. The dynamic life of legislative law after enactment is detailed, including how agencies, local governments and businesses use statutes and how citizens, lawyers and courts adjust legislative words to fit life's realities. The third edition of this popular book retains the practical insights of the previous editions and adds descriptions of the profound impact the Internet and cell phones have had on the daily work of the

01 Sep 1986
TL;DR: The Bone People as mentioned in this paper is a novel that meshes events, mysticism and dreams in such a tight net that the author leads us to speculate on the importance of total experience in the search for meaning.
Abstract: Keri Hulme's Booker prize winning novel for 1985, The Bone People, meshes events, mysticism and dreams in such a tight net that the author leads us to speculate on the importance of total experience in the search for meaning. Over four hundred pages span the events that take place within a short time, possibly little more than six months. By commenting only briefly on those past events that continue to influence the lives of the main characters, Hulme forces us to concentrate on the shaping present which the main characters often misunderstand.

Proceedings ArticleDOI
07 Apr 1986
TL;DR: A hierarchical approach for key management is presented which utilizes the existing network specific protocols at the lower levels and protocols between Authentication Servers and/or Control Centers of different networks at the higher levels.
Abstract: The problem of designing key management schemes for establishing end-to-end encrypted sessions between source-destinationpairs when the source and the destination are on different networks interconnected via Gateways and intermediate networks is considered. In such an internet environment, the key management problem attains a high degree of complexity due to the differences in the key distribution mechanisms used in the constituent networks and the infeasibility of effecting extensive hardware and software changes to the existing networks. In this paper, a hierarchical approach for key management is presented which utilizes the existing network specific protocols at the lower levels and protocols between Authentication Servers and/or Control Centers of different networks at the higher levels. Details of this approach are discussed for specific illustrative scenarios to demonstrate the implementational simplicity. A formal verification of the security of the resulting system is also conducted by an automatic procedure utilizing certain combinatory logic principles. This approach is general and can be used for verifying the security of any existing key management scheme.

Proceedings ArticleDOI
01 Oct 1986
TL;DR: The design of two Gateways for access to the Defense Data Network is presented and the functions of these Gateways are presented and their implementations are discussed.
Abstract: The research work performed on Internet Gateways in the Computer Engineering Research Laboratory at the University of Arizona is described in this paper. The research is sponsored by the U.S. Army Information Systems Command. The design of two Gateways for access to the Defense Data Network is presented. The IP Gateway has been demonstrated and links two Sytek LocalNet 20 Broadband networks via the DDN. The TCP/IP Gateway is currently being built so that it can be used to access the DDN from generic networks. The functions of these Gateways are presented and their implementations are discussed.

01 Nov 1986
TL;DR: A collection of multicast communication primitives integrated with a mechanism for handling process failure and recovery facilitate the implementation of fault-tolerant process groups, which can be used to provide distributed services in an environment subject to non-malicious crash failures.
Abstract: This memo describes a collection of multicast communication primitives integrated with a mechanism for handling process failure and recovery. These primitives facilitate the implementation of fault-tolerant process groups, which can be used to provide distributed services in an environment subject to non-malicious crash failures.

01 Jan 1986
TL;DR: This RFC specifies a standard for the ARPA Internet community that provides a set of six randomly generated eight-character "words" with a reasonable level of pronounceability, using a multi-level algorithm.
Abstract: This RFC specifies a standard for the ARPA Internet community. The Password Generator Service (PWDGEN) provides a set of six randomly generated eight-character "words" with a reasonable level of pronounceability, using a multi-level algorithm. Hosts on the ARPA Internet that choose to implement a password generator service are expected to adopt and implement this standard.

Proceedings ArticleDOI
01 Oct 1986
TL;DR: This paper discusses enhancements to current gateway-to-gateway protocols which could be necessary in future tactical environments.
Abstract: Communication networks for future tactical deployments are required to be survivable against the expected physical, electronic, and environmental threats. To provide survivability to these systems, new distributed architectures must be developed. Within these new architectures there will be a heterogeneous mix of networks, bridges, gateways, communications media, and other hardware. In this environment protocols will be necessary to communicate information which is pertinent to routing and connectivity between gateways. This paper discusses enhancements to current gateway-to-gateway protocols which could be necessary in future tactical environments.

Journal Article
TL;DR: The Rand Message Handling System (MH) as discussed by the authors is a powerful user agent which operates in the ARPA Internet and UUCP environments and has several distinguishing characteristics which give the user additional message handling capabilities.

01 Apr 1986
TL;DR: The intention is that hosts in the ARPA-Internet that choose to implement ISO TSAP services on top of the TCP be expected to adopt and implement this standard.
Abstract: This memo describes a proposed protocol standard for the ARPA Internet community. The CCITT and the ISO have defined various session, presentation, and application recommendations which have been adopted by the international community and numerous vendors. To the largest extent possible, it is desirable to offer these higher level services directly in the ARPA Internet, without disrupting existing facilities. This permits users to develop expertise with ISO and CCITT applications which previously were not available in the ARPA Internet. The intention is that hosts in the ARPA-Internet that choose to implement ISO TSAP services on top of the TCP be expected to adopt and implement this standard. Suggestions for improvement are encouraged.

01 Jan 1986
TL;DR: Results of the Cypress project are reported, a successful prototype network that already supplies production quality service to several sites is described, performance measurements are presented, and plans for expansion are outlined.
Abstract: An internet consists of multiple interconnected data communication networks that function like a single, large packet switching network. Standard internet communication protocols hide details of the underlying network architectures and technology from users of the internet, and allow computers to communicate across the internet without knowing the sLructllre of the underlying interconnections. This paper restricts attention to the Internet developed by the Defense Advanced Research Projects Agency (DARPA), and actively supported by the National Science Foundation (NSF) as part of NSFnet, the National Aeronautics and Space Agency (NASA), and other groups in goverruncnt, academia, and industry. The Cypress project at Purdue University has been exploring ways to provide low-cost Internet connections. This paper reports results of the project, describes a successful prototype network that already supplies production quality service to several sites, presents performance measurements, and outlines plans for expansion. The key ideas behind Cypress include consolidation of functionality, use of off-the-shelf hardware and software, protocols optimized for best~ effort delivery of Intemet datagrams, and an incrementally expandable hub-site technology. We gralefully acknowledge suppon for !he Cypress projecllrom AT&T, CSNET, DigiUlI Equipmcnl COIpOnn.ion. National Science Foundation (ASC-SSI8369). and Purdue University. PanicipanlS in the experimental protolypC have purchlLSed some of !he impleJ. hardware and paid some of !he lensed line costs.


DOI
01 Aug 1986
TL;DR: The architecture and the software components of Emodis, a network monitoring and diagnosis system deployed on a diverse set of Internet nodes, are described, which implements a scheduling algorithm to synchronize the measurements from different vantage points, which relieves end users from complicated network measurement management.
Abstract: Network monitoring and diagnosis capabilities are critical for the seamless operation of a network. ISPs use sophisticated systems to routinely monitor and diagnose their networks, but end users do not have such capabilities. To address this problem, we develop Emodis—a network monitoring and diagnosis system. In this paper, we describe the architecture and the software components of Emodis. Like other end-user oriented network monitoring systems, Emodis is deployed on a diverse set of Internet nodes, so it shares common requirements such as security and robustness with these systems. However, the focus of Emodis is on route-sensitive path metrics such as available bandwidth and packet loss rate, resulting in two unique characteristics: (1) it implements a variety of measurement techniques, including sophisticated bandwidth measurement techniques, but hides many technical details from end users; (2) it implements a scheduling algorithm to synchronize the measurements from different vantage points, which relieves end users from complicated network measurement management. Ningning Hu and Peter Steenkiste were in part supported by the NSF under award number CCR-0205266.

Journal ArticleDOI
TL;DR: The purpose of Internet domains and nameservers, how domains and networks are related, and the historical reasons for the existence of domains are described.
Abstract: The implementation of domain nameservice in a certain campus subdomain of the ARPA Internet has lead to several questions on the part of the local user community. This paper answers some of them. It describes the purpose of Internet domains and nameservers, how domains and networks are related, and the historical reasons for the existence of domains. There is a summary of the protocols nameservers use and of how they are implemented. Then the paper describes the logistics of how nameservers are used in a campus environment, first from the user's point of view, then from the administrators. Issues of the utility or necessity of subdomains of the campus domain are addressed. Finally, mailbox binding is treated: this is a potential use of the nameservers to provide a campus-wide distributed database of personal human names and their mappings into network host addresses.