scispace - formally typeset
Search or ask a question

Showing papers on "The Internet published in 1990"


01 Oct 1990
TL;DR: ST-II is not compatible with Version 1 of the protocol, but maintains much of the architecture and philosophy of that version, to fill in some of the areas left unaddressed, to make it easier to implement, and to support a wider range of applications.
Abstract: This memo defines the Internet Stream Protocol, Version 2 (ST-II), an IP-layer protocol that provides end-to-end guaranteed service across an internet. This specification obsoletes IEN 119 "ST - A Proposed Internet Stream Protocol" written by Jim Forgie in 1979, the previous specification of ST. ST-II is not compatible with Version 1 of the protocol, but maintains much of the architecture and philosophy of that version. It is intended to fill in some of the areas left unaddressed, to make it easier to implement, and to support a wider range of applications.

373 citations


Patent
Lawrence M. Besaw1, Jeff C. Wu1, Cho Y. Chang1, Darren D. Smith1, Mark J. Kean1 
14 May 1990
TL;DR: In this paper, the authors present a system for automatically laying out and graphically displaying the topology of a computer network system, which retrieves a list of the nodes within the network and their interconnections from a database which can be manually built by a network administrator or automatically constructed by other software.
Abstract: A system for automatically laying out and graphically displaying the topology of a computer network system. The layout system retrieves a list of the nodes within the network and their interconnections from a database which can be manually built by a network administrator or automatically constructed by other software. The system will provide any of three views that can be requested by the user. An internet view is the largest and shows the interconnection of different networks. A network view can be shown for any of the networks described in the internet view. A network is comprised of segments and the system will display a view of the nodes connected to any one of the segments. The system will automatically update the view as new nodes become available in the database. This aspect of the system and allows the system to dynamically update the graph when the list of nodes is being supplied by other software. The system also allows the user to dynamically alter the graph by using a graphical input device to move any of the objects displayed on the graph.

269 citations


Proceedings ArticleDOI
28 May 1990
TL;DR: The DASH resource model is defined as a basis for reserving and scheduling resources involved in end-to-end handling of continuous-media information flowing continuously over real time i.e. digital audio or digital video data.
Abstract: The DASH resource model is defined as a basis for reserving and scheduling resources (disk, CPU, network, etc.) involved in end-to-end handling of continuous-media (information flowing continuously over real time i.e. digital audio or digital video) data. The model uses primitives that express work-load characteristics and performance requirements, and defines an algorithm for negotiated reservation of distributed resources. This algorithm is embodied in the session reservation protocol, a backward-compatible extension of the Internet Protocol. Hardware trends and future applications that motivate the DASH resource model are described. The performance requirements for using continuous media and the limitations of existing systems are discussed. The DASH resource model for reserving and scheduling resources is presented. The DASH kernel is briefly described. >

176 citations


Book
01 Nov 1990
TL;DR: This book offers more in-depth coverage of the Internet and World Wide Web by integrating numerous real world case studies and comprehensive charts and graphics to compare and evaluate competing approaches to make sound business decisions.
Abstract: From the Publisher: This book offers more in-depth coverage that other business data communications texts by integrating numerous real world case studies and comprehensive charts and graphics. FEATURES and BENEFITS: Comprehensive coverage of the Internet and World Wide Web Students learn the mechanisms and capabilities of these integral technologies. Detailed examination of intranets, extranets, and client/server computing Coverage of the newest and most important technology for corporate data communications. In depth discussion of all networking technologies, including LANs and WANs Enables students to compare and evaluate competing approaches to make sound business decisions. Complete survey of network security and network management Students learn the requirements and design issues involved in managing and safeguarding distributed systems. Solid coverage of TCP/IP TCP/IP set of protocols form the foundation for all data networking.

120 citations


Journal ArticleDOI
TL;DR: Two user-level systems that give users an integrated and uniform interface to resources have been built on top of the x-kernel: a file system and a command interpreter that hide differences among the underlying protocols.
Abstract: x-kernel is an experimental operating system for personal workstations that allows uniform access to resources throughout a nationwide internet: an interconnection of networks similar to the TCP/IP internet. This network is also called the National Research and Education Network (NREN). The x-kernel supports a library of protocols, and it accesses different resources with different protocol combinations. In addition, two user-level systems that give users an integrated and uniform interface to resources have been built on top of the x-kernel. These two systems-a file system and a command interpreter-hide differences among the underlying protocols. >

84 citations


Journal ArticleDOI
TL;DR: The major elements of an extended internet model that allows internetworking of new high-speed packet networks with a wide range of other networks, including current data networks and national telephone networks, are outlined.
Abstract: The issues that are specific to heterogeneous networks are addressed. Some background on both the current ARPA internet model and high-speed packet switching is provided. This discussion includes: the internet components; the internet protocol hierarchy, popularly known as the transmission control protocol/internet protocol (TCP/IP) protocol suite; and the internet strengths and weaknesses. The major elements of an extended internet model that allows internetworking of new high-speed packet networks with a wide range of other networks, including current data networks and national telephone networks, are outlined. Some end-to-end and host interface issues are examined. >

79 citations


Bill Cheswick1
01 Jan 1990
TL;DR: An application-level gateway that passes mail and many of the common Internet services between the authors' internal machines and the Internet, and helps protect the internal internet even if the external machine is fully compromised.
Abstract: The Internet supports a vast and growing community of computers users around the world. Unfortunately, this network can provide anonymous access to this community by the unscrupulous, careless, or dangerous. On any given Internet there is a certain percentage of poorly-maintained systems. AT&T has a large internal Internet that we wish to protect from outside attacks, while providing useful services between the two. This paper describes our Internet gateway. It is an application-level gateway that passes mail and many of the common Internet services between our internal machines and the Internet. This is accomplished without IP connectivity using a pair of machines: a trusted internal machine and an untrusted external gateway. These are connected by a private link. The internal machine provides a few carefully-guarded services to the external gateway. This configuration helps protect the internal internet even if the external machine is fully compromised.

72 citations


01 Apr 1990
TL;DR: This RFC suggests several updates to the specification of the Reliable Data Protocol (RDP) in RFC-908 based on experience with the protocol.
Abstract: This RFC suggests several updates to the specification of the Reliable Data Protocol (RDP) in RFC-908 based on experience with the protocol. This revised version of the protocol is experimental.

67 citations


01 Oct 1990
TL;DR: This memo describes an Experimental Protocol extension to TCP for the Internet community, and requests discussion and suggestions for improvements.
Abstract: This memo describes an Experimental Protocol extension to TCP for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "IAB Official Protocol Standards" for the standardization state and status of this protocol.

61 citations


01 Jan 1990
TL;DR: This memo correctly describes the incremental update procedure for use with the standard Internet checksum and is intended to replace the description of Incremental Update in RFC 1071.
Abstract: This memo correctly describes the incremental update procedure for use with the standard Internet checksum. It is intended to replace the description of Incremental Update in RFC 1071. This is not a standard but rather, an implementation technique.

56 citations


01 Oct 1990
TL;DR: This memo defines a network management architecture that uses the International Organization for Standardization's (ISO) Common Management Information Services/Common Management Information Protocol (CMIS/CMIP) in the Internet.
Abstract: This memo defines a network management architecture that uses the International Organization for Standardization's (ISO) Common Management Information Services/Common Management Information Protocol (CMIS/CMIP) in the Internet. [STANDARDS-TRACK]

01 Jul 1990
TL;DR: The Point-to-Point Protocol (PPP) provides a method for transmitting datagrams over serial point- to-point links.
Abstract: The Point-to-Point Protocol (PPP) provides a method for transmitting datagrams over serial point-to-point links. PPP is composed of three parts:

Journal ArticleDOI
Carl A. Sunshine1
TL;DR: Two leading alternatives have been developed by the DARPA Internet community and by the CCITT for public data networks, but providing interoperability between them is still a problem.
Abstract: Major technical issues for interconnecting computer networks that must be solved, which include selection of a protocol level at which to interconnect, addressing, routing, fragmentation, and congestion control, are discussed. Specialized gateway devices used to interconnect networks and implement any necessary internet protocols are examined. Two leading alternatives have been developed by the DARPA (Defense Advanced Research Projects Agency) Internet community (datagram internet protocol) and by the CCITT (International Telegraphy and Telephony Consultative Committee) for public data networks (concatenation of virtual circuits). The new ISO standards encompass both approaches, but providing interoperability between them is still a problem. >

Journal Article
TL;DR: A hierarchical approach for key management is presented which utilizes the existing network specific protocols at the lower levels and protocols between authentication servers and/or control centers of different networks at the higher levels.
Abstract: A hierarchical approach for key management is presented which utilizes the existing network specific protocols at the lower levels and protocols between authentication servers and/or control centers of different networks at the higher levels. Details of this approach are discussed for specific illustrative scenarios to demonstrate the implementation simplicity. A formal verification of the security of the resulting system in the sense of protecting the privacy of privileged information is also conducted by an axiomatic procedure utilizing certain combinatory logic principles. This approach is general and can be used for verifying the security of other existing key management schemes. >

Proceedings ArticleDOI
24 Sep 1990
TL;DR: The authors discuss the design and implementation of the authentication system called SPLICE/AS in the WIDE (widely integrated distributed environment) Internet environment and developing a new protocol for database propagation which is discussed.
Abstract: The authors discuss the design and implementation of the authentication system called SPLICE/AS in the WIDE (widely integrated distributed environment) Internet environment. SPLICE/AS is designed based on the public-key encryption, and the authentication scheme originally proposed by R.M. Needham and M.O. Schroeder (1978). In order to manage a large-scale network like WIDE Internet, the hierarchical domain-based management scheme is introduced. Currently, the prototype of SPLICE/AS is working on the 4.3 Berkeley UNIX system. To improve the reliability and robustness of SPLICE/AS, the authors are modifying SPLICE/AS and developing a new protocol for database propagation which is discussed. >

Book
01 Jan 1990
TL;DR: This reference manual assists programmers developing distributed software applications based on a network computing system that will be shared over a network or Internet by providing examples written in C for Apollo workstations and other UNIX systems.
Abstract: This reference manual assists programmers developing distributed software applications based on a network computing system that will be shared over a network or Internet. It provides examples written in C for Apollo workstations and other UNIX systems including Sun and DEC.

01 Apr 1990
TL;DR: This catalog contains descriptions of several tools available to assist network managers in debugging and maintaining TCP/IP internets and interconnected communications resources.
Abstract: The goal of this FYI memo is to provide practical information to site administrators and network managers. This memo provides information for the Internet community. It does not specify any standard. It is not a statement of IAB policy or recommendations. [Also FYI 2.] This catalog contains descriptions of several tools available to assist network managers in debugging and maintaining TCP/IP internets and interconnected communications resources. Entries in the catalog tell what a tool does, how it works, and how it can be obtained.

Book
01 Aug 1990
TL;DR: On the evening of 2 November 1988, someone “infected” Internet with a worm program that exploited flaws in utility programs in systems based on BSD-derived versions of Unix to break into machines and copy itself, thus infecting those systems.
Abstract: On the evening of 2 November 1988, someone “infected” Internet with a worm program. That program exploited flaws in utility programs in systems based on BSD-derived versions of Unix. The flaws allowed the program to break into those machines and copy itself, thus infecting those systems. This program eventually spread to thousands of machines, and disrupted normal activities and Internet connectivity for many days.

01 Oct 1990
TL;DR: This memo defines five new DNS types for experimental purposes and describes an Experimental Protocol for the Internet community, and requests discussion and suggestions for improvements.
Abstract: This memo defines five new DNS types for experimental purposes. This RFC describes an Experimental Protocol for the Internet community, and requests discussion and suggestions for improvements.

Proceedings ArticleDOI
03 Jun 1990
TL;DR: The authors introduce the VHSI abstraction, focusing on the description of MCHIP, a novel multipoint congram-oriented high-performance internet protocol that includes support for multipoint communication and suitability for high-speed implementation.
Abstract: G.M. Parulkar (Comput. Commun. Rev., vol.20, no.1, p.18-43, Jan. 1990) previously proposed a very high-speed internet (VHSI) abstraction that provides a variable grade of service with performance guarantees on top of diverse networks. An improvement component of the VHSI abstraction is a novel multipoint congram-oriented high-performance internet protocol (MCHIP). Features of this protocol include the following: support for multipoint communication; the congram as the service primitive, incorporating strengths of both connection and datagram approaches; the ability to provide a variable grade of service with performance guarantees; and suitability for high-speed implementation. The authors introduce the VHSI abstraction, focusing on the description of MCHIP. >

Proceedings ArticleDOI
01 Aug 1990
TL;DR: As networks and internetworks of computers expand in size and scope, discovery and location of resources becomes a primary function of the networked computing environment and dynamic directory services provide more timely and accurate information about network resources than static tables.
Abstract: As networks and internetworks of computers expand in size and scope, discovery and location of resources becomes a primary function of the networked computing environment. Static tables describing network resources have been replaced by dynamic directory services, such as X.500 and the Internet Domain Name System. These dynamic directory services provide more timely and accurate information about network resources than static tables.A wide variety of services address various components of the resource discovery and location problem. These services can be loosely classified as either low-level protocols or high-level services. Low-level protocols, such as RARP and ICMP, are simple delivery protocols and provide limited information; high-level services, such as the Internet Domain Name System and X.500, use complex delivery protocols to answer complex queries. Neither class of directory service is appropriate in all situations. Low-level services are too restrictive in the type of queries and information they support, while high-level services may be too expensive for some low-function networks.

Journal ArticleDOI
TL;DR: The author explores methods for transition and coexistence between the two protocol suites of Internet/OSI and enumerates several approaches, discusses the positive and negative aspects of each, and describes their inter-relationships.
Abstract: The US DoD (Department of Defense) Internet suite of protocols (commonly known as TCP/IP for transmission control protocol/internet protocol) is the de facto open (nonproprietary) standard for computer communications in multivendor and multiadministration networks. However, some feel that protocols based on the open systems interconnection (OSI) model and promulgated by the International Organization for Standardization (ISO) will eventually achieve dominance and enjoy even greater success than TCP/IP. The author explores methods for transition and coexistence between the two protocol suites. He enumerates several approaches, discusses the positive and negative aspects of each, and describes their inter-relationships. Further, although the focus is on the problems of Internet/OSI transition and coexistence, none of the approaches described are unique to this problem. Rather, they are all general solutions to the problem of changing from one protocol suite to another or of having two arbitrary protocol suites coexisting. >

01 Jul 1990
TL;DR: The Point-to-Point Protocol (PPP) provides a method for transmitting datagrams over serial point- to-point links.
Abstract: The Point-to-Point Protocol (PPP) provides a method for transmitting datagrams over serial point-to-point links. PPP is composed of

01 Aug 1990
TL;DR: This informational RFC represents the official view of the Internet Activities Board (IAB), and describes the recommended policies and procedures on distributing Internet identifier assignments and dropping the connected status requirement.
Abstract: This informational RFC represents the official view of the Internet Activities Board (IAB), and describes the recommended policies and procedures on distributing Internet identifier assignments and dropping the connected status requirement. This RFC does not specify a standard.

01 Apr 1990
TL;DR: This document expands upon the elective experimental Encoding header field which permits the mailing of multi-part, multi-structured messages and replaces RFC 1154.
Abstract: This document expands upon the elective experimental Encoding header field which permits the mailing of multi-part, multi-structured messages. It replaces RFC 1154 [1].

Journal Article
01 Jun 1990-Online
TL;DR: Les procedures d'acces a differents services offerts par ces reseaux nationaux sont expliquees, concernent la messagerie electronique, les tableaux d'affichage, le telechargement de fichiers, l-acces interactif a distance (par Internet), les catalogues en lignes and the bases de donnees locales (Internet).
Abstract: Les procedures d'acces a differents services offerts par ces reseaux nationaux sont expliquees. Elles concernent la messagerie electronique, les tableaux d'affichage, le telechargement de fichiers, l'acces interactif a distance (par Internet), les catalogues en lignes et les bases de donnees locales (Internet). Les perspectives d'avenir sont evoquees

Book
01 Jan 1990
TL;DR: The Importance of Research Thinking Critically Establishing Your Purpose and Raising Questions Analyzing the Topic Synthesizing Making Inferences Evaluating The General Process of Research Preparation Incubation Illumination Verification
Abstract: Preface I. RESEARCH METHODS 1. College Research Introduction Research in the Disciplines The Importance of Research Thinking Critically Establishing Your Purpose and Raising Questions Analyzing the Topic Synthesizing Making Inferences Evaluating The General Process of Research Preparation Incubation Illumination Verification A Physician Uses the Research Process Engaging Critically and Actively in the Reading Process Reading on Three Different Levels Structuring Your Reading Process Annotating the Text While Reading Using Sources Responsibly and Avoiding Plagiarism 2. Finding Library and Internet Resources Introduction Libraries and General Library Resources The Library Reference Area General Reference Works Locating Library Books and Resources: Computer Cataloging Systems Locating Articles in Serials: Popular Periodicals Locating Articles in Serials: Professional Journals Locating Government Documents Other Technologies Electronic Full-text Databases Internet Resources Using Search Tools to Locate Information on Your Topic Using Internet Library and Periodicals Collections Bookmarking Important Sites 3. Using Library and Internet Sources Introduction Preparation and Incubation Finding a Topic Selecting a Specific Topic Narrowing and Focusing the Topic Asking Research Questions Developing a Hypothesis Gathering Research Materials Taking Notes with Photocopies and Printouts Photocopies and Database Printouts Printing Internet Sources Downloading Internet Sources Saving Online Sources The Working Bibliography Developing a Search Strategy Outlining a Time Frame Locating Sources Evaluating Print and Electronic Sources Working with Sources Avoiding Plagiarism Acknowledge Required No Acknowledge Required Unintentional Plagiarism International Plagiarism Illumination and Verification Evaluation Writing from Sources 4. Planning and Writing Your Research Paper Introduction Planning Your Research Paper Rhetorical Situation Organization Outlining and Drafting Your Research Paper Constructing an Outline or Plan Drafting Your Paper Avoiding Writer's Block Collaborating Drafting with a Computer 5. Revising and Formatting Your Research Paper Introduction Rewriting Your Research Paper Rereading and Reviewing Your Draft Revising for Structure and Style Improving Paragraphs Improving Sentences Improving Words Editing for Grammar, Punctuation, and Spelling Rewriting Your Paper Using Word Processing Incorporating Reference Materials Incorporating Direct Quotations Formatting and Printing Using Computers Proofreading Considering Formal Details Word Processing Line Spacing Margins Title Page Numbering Indentation and Word Spacing The Abstract The Endnote Page The References Page The Annotated Bibliography The Appendix Sample Student Paper II. MODEL RESEARCH PROJECTS 6. Writing a Research Paper in the Humanities Introduction Reports and Research Papers The Inquiry Process in the Humanities The Importance of Texts in the Humanities Research in the Humanities Acceptable Evidence in the Humanities Primary Research in the Humanities Using Primary Texts Life-History Interviewing Organizing and Writing the Humanities Research Paper Outlining Writing the First Draft Documentation in the Humanities: MLA Style Internal Citation The Reference List Model References: Language and Literature (MLA) Type of Reference Footnote and Bibliography Style Model Notes: Humanities Type of Reference Exercises and Research Project Discipline-Specific Resources for Humanities Technology and the Humanities Resources for Humanities Sample Research Paper: Humanities Format (MLA) 7. Writing a Review Paper in Science and Technology Introduction The Inquiry Process in Science and Technology The Importance of Observation in the Sciences The Importance of Formulating and Testing Hypotheses Critical Scientific Research The Importance of Replicability and Scientific Debate Primary Research in the Sciences Lab Experiments and Reports Field Observations and Reports Organizing and Writing the Scientific Review Paper Arranging the Materials Writing the First Draft: Verification Documentation in Science and Technology Internal Citation The Reference List Model References: Natural and Physical Sciences (Number System) (CBE) Exercises and Research Project Discipline-Specific Resources for Science and Technology Resources for the Sciences and Technology Sample Engineering Paper: Science Format (CBE) 8. Writing a Research Paper in Social Science Introduction The Inquiry Process in Social Science The Importance of Observing Human Behavior The Importance of Understanding Human Consciousness Objectivity versus Subjectivity Primary Research in the Social Sciences Step 1- Problem and Hypothesis Step 2- Research Design Step 3- Gathering the Data Step 4- Analyzing the Data Step 5- Interpreting the Results Social Science Research Designs Organizing and Writing the Social Science Research Paper Organizing Your Materials Planning and Outlining Writing the First Draft Manuscript Preparation (APA Style) Title Page Abstract Text Introduction Body Reference Page Appendix Documentation in Social Science: The Author/Date Style (APA) Internal Citation The Reference List in APA Style Model References: Social Science (APA) Type of Reference Exercises and Research Project Discipline-Specific Resources for Social Science Resources for the Social Sciences Sample Research Paper: Social Science Format (APA) 9. Writing a Research Report in Business Introduction The Inquiry Process in Business Three Types of R&D Other Types of Business Research Primary Research in Business Presenting Business Information Conducting a Survey in Business Organizing and Writing the Business Report Documentation in Business and Economics Internal Citations The Reference List Model References: Business and Economics (Chicago) Type of Reference Exercises and Research Project Discipline-Specific Resources for Business and Economics Technology and Business Sample Research Report: Business and Economics Format (Chicago) Index


01 Oct 1990
TL;DR: In this paper, a family of algorithms for bulk table retrieval using the Simple Network Management Protocol (RFC 1157) is described, based on the algorithm described in this paper. But this algorithm is not suitable for large tables.
Abstract: This memo reports an interesting family of algorithms for bulk table retrieval using the Simple Network Management Protocol (RFC 1157) [1].

Journal Article
TL;DR: This essay presents guidelines for deciding what makes a name good or bad, and explains how to choose good and bad names for children.
Abstract: In order to easily distinguish between multiple computers, we give them names. Experience has taught us that it is as easy to choose bad names as it is to choose good ones. This essay presents guidelines for deciding what makes a name good or bad.