scispace - formally typeset
Search or ask a question

Showing papers on "The Internet published in 1990"


01 Feb 1990
TL;DR: This RFC describes a method for compressing the headers of TCP/IP datagrams to improve performance over low speed serial links.
Abstract: This RFC describes a method for compressing the headers of TCP/IP datagrams to improve performance over low speed serial links. The motivation, implementation and performance of the method are described. C code for a sample implementation is given for reference. [STANDARDS-TRACK]

513 citations


01 Oct 1990
TL;DR: ST-II is not compatible with Version 1 of the protocol, but maintains much of the architecture and philosophy of that version, to fill in some of the areas left unaddressed, to make it easier to implement, and to support a wider range of applications.
Abstract: This memo defines the Internet Stream Protocol, Version 2 (ST-II), an IP-layer protocol that provides end-to-end guaranteed service across an internet. This specification obsoletes IEN 119 "ST - A Proposed Internet Stream Protocol" written by Jim Forgie in 1979, the previous specification of ST. ST-II is not compatible with Version 1 of the protocol, but maintains much of the architecture and philosophy of that version. It is intended to fill in some of the areas left unaddressed, to make it easier to implement, and to support a wider range of applications.

373 citations


Patent
Lawrence M. Besaw1, Jeff C. Wu1, Cho Y. Chang1, Darren D. Smith1, Mark J. Kean1 
14 May 1990
TL;DR: In this paper, the authors present a system for automatically laying out and graphically displaying the topology of a computer network system, which retrieves a list of the nodes within the network and their interconnections from a database which can be manually built by a network administrator or automatically constructed by other software.
Abstract: A system for automatically laying out and graphically displaying the topology of a computer network system. The layout system retrieves a list of the nodes within the network and their interconnections from a database which can be manually built by a network administrator or automatically constructed by other software. The system will provide any of three views that can be requested by the user. An internet view is the largest and shows the interconnection of different networks. A network view can be shown for any of the networks described in the internet view. A network is comprised of segments and the system will display a view of the nodes connected to any one of the segments. The system will automatically update the view as new nodes become available in the database. This aspect of the system and allows the system to dynamically update the graph when the list of nodes is being supplied by other software. The system also allows the user to dynamically alter the graph by using a graphical input device to move any of the objects displayed on the graph.

269 citations


Proceedings ArticleDOI
28 May 1990
TL;DR: The DASH resource model is defined as a basis for reserving and scheduling resources involved in end-to-end handling of continuous-media information flowing continuously over real time i.e. digital audio or digital video data.
Abstract: The DASH resource model is defined as a basis for reserving and scheduling resources (disk, CPU, network, etc.) involved in end-to-end handling of continuous-media (information flowing continuously over real time i.e. digital audio or digital video) data. The model uses primitives that express work-load characteristics and performance requirements, and defines an algorithm for negotiated reservation of distributed resources. This algorithm is embodied in the session reservation protocol, a backward-compatible extension of the Internet Protocol. Hardware trends and future applications that motivate the DASH resource model are described. The performance requirements for using continuous media and the limitations of existing systems are discussed. The DASH resource model for reserving and scheduling resources is presented. The DASH kernel is briefly described. >

176 citations


Book
01 Nov 1990
TL;DR: This book offers more in-depth coverage of the Internet and World Wide Web by integrating numerous real world case studies and comprehensive charts and graphics to compare and evaluate competing approaches to make sound business decisions.
Abstract: From the Publisher: This book offers more in-depth coverage that other business data communications texts by integrating numerous real world case studies and comprehensive charts and graphics. FEATURES and BENEFITS: Comprehensive coverage of the Internet and World Wide Web Students learn the mechanisms and capabilities of these integral technologies. Detailed examination of intranets, extranets, and client/server computing Coverage of the newest and most important technology for corporate data communications. In depth discussion of all networking technologies, including LANs and WANs Enables students to compare and evaluate competing approaches to make sound business decisions. Complete survey of network security and network management Students learn the requirements and design issues involved in managing and safeguarding distributed systems. Solid coverage of TCP/IP TCP/IP set of protocols form the foundation for all data networking.

120 citations


Journal ArticleDOI
TL;DR: Two user-level systems that give users an integrated and uniform interface to resources have been built on top of the x-kernel: a file system and a command interpreter that hide differences among the underlying protocols.
Abstract: x-kernel is an experimental operating system for personal workstations that allows uniform access to resources throughout a nationwide internet: an interconnection of networks similar to the TCP/IP internet. This network is also called the National Research and Education Network (NREN). The x-kernel supports a library of protocols, and it accesses different resources with different protocol combinations. In addition, two user-level systems that give users an integrated and uniform interface to resources have been built on top of the x-kernel. These two systems-a file system and a command interpreter-hide differences among the underlying protocols. >

84 citations


Journal ArticleDOI
TL;DR: The major elements of an extended internet model that allows internetworking of new high-speed packet networks with a wide range of other networks, including current data networks and national telephone networks, are outlined.
Abstract: The issues that are specific to heterogeneous networks are addressed. Some background on both the current ARPA internet model and high-speed packet switching is provided. This discussion includes: the internet components; the internet protocol hierarchy, popularly known as the transmission control protocol/internet protocol (TCP/IP) protocol suite; and the internet strengths and weaknesses. The major elements of an extended internet model that allows internetworking of new high-speed packet networks with a wide range of other networks, including current data networks and national telephone networks, are outlined. Some end-to-end and host interface issues are examined. >

79 citations


Bill Cheswick1
01 Jan 1990
TL;DR: An application-level gateway that passes mail and many of the common Internet services between the authors' internal machines and the Internet, and helps protect the internal internet even if the external machine is fully compromised.
Abstract: The Internet supports a vast and growing community of computers users around the world. Unfortunately, this network can provide anonymous access to this community by the unscrupulous, careless, or dangerous. On any given Internet there is a certain percentage of poorly-maintained systems. AT&T has a large internal Internet that we wish to protect from outside attacks, while providing useful services between the two. This paper describes our Internet gateway. It is an application-level gateway that passes mail and many of the common Internet services between our internal machines and the Internet. This is accomplished without IP connectivity using a pair of machines: a trusted internal machine and an untrusted external gateway. These are connected by a private link. The internal machine provides a few carefully-guarded services to the external gateway. This configuration helps protect the internal internet even if the external machine is fully compromised.

72 citations


01 Apr 1990
TL;DR: This RFC suggests several updates to the specification of the Reliable Data Protocol (RDP) in RFC-908 based on experience with the protocol.
Abstract: This RFC suggests several updates to the specification of the Reliable Data Protocol (RDP) in RFC-908 based on experience with the protocol. This revised version of the protocol is experimental.

67 citations


01 Oct 1990
TL;DR: This memo describes an Experimental Protocol extension to TCP for the Internet community, and requests discussion and suggestions for improvements.
Abstract: This memo describes an Experimental Protocol extension to TCP for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "IAB Official Protocol Standards" for the standardization state and status of this protocol.

61 citations


Proceedings ArticleDOI
G. Meixner1, U. Lauther1
11 Nov 1990
TL;DR: For this application the authors combined the flow model approach with linear assignment to achieve a hierarchical global routing scheme that is about six times faster than the old flat net by net global router, while producing denser layouts for the majority of testcases.
Abstract: A novel heuristic for global routing in graphs is developed. Based on a flow model it can handle many nets simultaneously, thus reducing the net ordering problem. To demonstrate the validity of the method it was applied to standard cell design style. For this application the authors combined the flow model approach with linear assignment to achieve a hierarchical global routing scheme. This procedure is about six times faster than the old flat net by net global router, while producing denser layouts for the majority of testcases. Good quality was achieved in comparison with the TimberwolfSC version 5.4 global router. >

01 Jan 1990
TL;DR: This memo correctly describes the incremental update procedure for use with the standard Internet checksum and is intended to replace the description of Incremental Update in RFC 1071.
Abstract: This memo correctly describes the incremental update procedure for use with the standard Internet checksum. It is intended to replace the description of Incremental Update in RFC 1071. This is not a standard but rather, an implementation technique.

01 Oct 1990
TL;DR: This memo defines a network management architecture that uses the International Organization for Standardization's (ISO) Common Management Information Services/Common Management Information Protocol (CMIS/CMIP) in the Internet.
Abstract: This memo defines a network management architecture that uses the International Organization for Standardization's (ISO) Common Management Information Services/Common Management Information Protocol (CMIS/CMIP) in the Internet. [STANDARDS-TRACK]

01 Jul 1990
TL;DR: The Point-to-Point Protocol (PPP) provides a method for transmitting datagrams over serial point- to-point links.
Abstract: The Point-to-Point Protocol (PPP) provides a method for transmitting datagrams over serial point-to-point links. PPP is composed of three parts:

Journal ArticleDOI
Carl A. Sunshine1
TL;DR: Two leading alternatives have been developed by the DARPA Internet community and by the CCITT for public data networks, but providing interoperability between them is still a problem.
Abstract: Major technical issues for interconnecting computer networks that must be solved, which include selection of a protocol level at which to interconnect, addressing, routing, fragmentation, and congestion control, are discussed. Specialized gateway devices used to interconnect networks and implement any necessary internet protocols are examined. Two leading alternatives have been developed by the DARPA (Defense Advanced Research Projects Agency) Internet community (datagram internet protocol) and by the CCITT (International Telegraphy and Telephony Consultative Committee) for public data networks (concatenation of virtual circuits). The new ISO standards encompass both approaches, but providing interoperability between them is still a problem. >

Book
01 Feb 1990
TL;DR: Each Chapter concludes with a Summary, Exercises, and Additional Resources about writing for the mass media and management of programs and campaigns.
Abstract: Each Chapter concludes with a Summary, Exercises, and Additional Resources I THE BASICS OF PUBLIC WRITING 1 The Basics of Public Relations Writing 2 Persuasive Writing 3 Legal and Ethical Guidelines 4 Finding and Generating News II WRITING FOR THE MASS MEDIA 5 News Releases and Fact Sheets 6 News Features 7 Photos and Graphics 8 Pitch Letters, Advisories, Media Kits, And Op-Ed 9 Radio, Television, And Webcasts 10 Distribution: Snail Mail to the Internet 11 Working With the Media III WRITING FOR OTHER MEDIA 12 Newsletters, E-Zines, and Brochures 13 The World Wide Web 14 Letters, Memos, and Reports 15 Direct Mail and Advertising 16 Speeches & Presentations IV MANAGING PROGRAMS AND CAMPAIGNS 17 Meetings and Events 18 Program Planning 19 Measurement and Evaluation Glossary Index

Journal Article
TL;DR: A hierarchical approach for key management is presented which utilizes the existing network specific protocols at the lower levels and protocols between authentication servers and/or control centers of different networks at the higher levels.
Abstract: A hierarchical approach for key management is presented which utilizes the existing network specific protocols at the lower levels and protocols between authentication servers and/or control centers of different networks at the higher levels. Details of this approach are discussed for specific illustrative scenarios to demonstrate the implementation simplicity. A formal verification of the security of the resulting system in the sense of protecting the privacy of privileged information is also conducted by an axiomatic procedure utilizing certain combinatory logic principles. This approach is general and can be used for verifying the security of other existing key management schemes. >

Proceedings ArticleDOI
24 Sep 1990
TL;DR: The authors discuss the design and implementation of the authentication system called SPLICE/AS in the WIDE (widely integrated distributed environment) Internet environment and developing a new protocol for database propagation which is discussed.
Abstract: The authors discuss the design and implementation of the authentication system called SPLICE/AS in the WIDE (widely integrated distributed environment) Internet environment. SPLICE/AS is designed based on the public-key encryption, and the authentication scheme originally proposed by R.M. Needham and M.O. Schroeder (1978). In order to manage a large-scale network like WIDE Internet, the hierarchical domain-based management scheme is introduced. Currently, the prototype of SPLICE/AS is working on the 4.3 Berkeley UNIX system. To improve the reliability and robustness of SPLICE/AS, the authors are modifying SPLICE/AS and developing a new protocol for database propagation which is discussed. >

Book
01 Jan 1990
TL;DR: This reference manual assists programmers developing distributed software applications based on a network computing system that will be shared over a network or Internet by providing examples written in C for Apollo workstations and other UNIX systems.
Abstract: This reference manual assists programmers developing distributed software applications based on a network computing system that will be shared over a network or Internet. It provides examples written in C for Apollo workstations and other UNIX systems including Sun and DEC.

01 Apr 1990
TL;DR: This catalog contains descriptions of several tools available to assist network managers in debugging and maintaining TCP/IP internets and interconnected communications resources.
Abstract: The goal of this FYI memo is to provide practical information to site administrators and network managers. This memo provides information for the Internet community. It does not specify any standard. It is not a statement of IAB policy or recommendations. [Also FYI 2.] This catalog contains descriptions of several tools available to assist network managers in debugging and maintaining TCP/IP internets and interconnected communications resources. Entries in the catalog tell what a tool does, how it works, and how it can be obtained.

Proceedings ArticleDOI
01 Feb 1990
TL;DR: The authors concentrate on the net browser and the concepts, methods, and graphical notations used for improving the usability of high-order Petri nets.
Abstract: An environment for the construction and execution of requirement specifications for embedded systems is described. High-order Petri nets are used as a notation for the specifications. The environment consists of a net browser, a net editor, an animated net simulator, and a simulation engine. A hierarchically structured specification can be constructed using the graphics-based net editor. The animated simulator helps to detect errors and inconsistencies. The net browser enables management of several net hierarchies and the retrieval and reuse of nets. The simulation engine allows specifications to be executed in real time in the real environment. The authors concentrate on the net browser and the concepts, methods, and graphical notations used for improving the usability of high-order Petri nets. >

Book ChapterDOI
01 Jun 1990
TL;DR: This technique is compared to the token-player algorithm, commonly used for centralized implementation as well as to a direct translation of the net into a rule-based system which is compiled afterwards.
Abstract: The aim of this paper is to discuss the issue of high-level Petri nets implementation. The specific class of high-level net considered is such that tokens are objects and transitions are rules with variables. They are a special case of Predicate/Transition nets. The implementation technique proposed here is an adaptation of the compilation technique developed for rule-based systems preserving the net structure. This technique is compared to the token-player algorithm, commonly used for centralized implementation as well as to a direct translation of the net into a rule-based system which is compiled afterwards.

Book
01 Aug 1990
TL;DR: On the evening of 2 November 1988, someone “infected” Internet with a worm program that exploited flaws in utility programs in systems based on BSD-derived versions of Unix to break into machines and copy itself, thus infecting those systems.
Abstract: On the evening of 2 November 1988, someone “infected” Internet with a worm program. That program exploited flaws in utility programs in systems based on BSD-derived versions of Unix. The flaws allowed the program to break into those machines and copy itself, thus infecting those systems. This program eventually spread to thousands of machines, and disrupted normal activities and Internet connectivity for many days.

01 Oct 1990
TL;DR: This memo defines five new DNS types for experimental purposes and describes an Experimental Protocol for the Internet community, and requests discussion and suggestions for improvements.
Abstract: This memo defines five new DNS types for experimental purposes. This RFC describes an Experimental Protocol for the Internet community, and requests discussion and suggestions for improvements.

Proceedings ArticleDOI
03 Jun 1990
TL;DR: The authors introduce the VHSI abstraction, focusing on the description of MCHIP, a novel multipoint congram-oriented high-performance internet protocol that includes support for multipoint communication and suitability for high-speed implementation.
Abstract: G.M. Parulkar (Comput. Commun. Rev., vol.20, no.1, p.18-43, Jan. 1990) previously proposed a very high-speed internet (VHSI) abstraction that provides a variable grade of service with performance guarantees on top of diverse networks. An improvement component of the VHSI abstraction is a novel multipoint congram-oriented high-performance internet protocol (MCHIP). Features of this protocol include the following: support for multipoint communication; the congram as the service primitive, incorporating strengths of both connection and datagram approaches; the ability to provide a variable grade of service with performance guarantees; and suitability for high-speed implementation. The authors introduce the VHSI abstraction, focusing on the description of MCHIP. >

Journal ArticleDOI
TL;DR: A Markov model of the performance of transport protocols over congestive channels, which are channels whose delay and loss characteristics depend significantly upon the number of messages in transit, is analyzed.

Proceedings ArticleDOI
01 Aug 1990
TL;DR: As networks and internetworks of computers expand in size and scope, discovery and location of resources becomes a primary function of the networked computing environment and dynamic directory services provide more timely and accurate information about network resources than static tables.
Abstract: As networks and internetworks of computers expand in size and scope, discovery and location of resources becomes a primary function of the networked computing environment. Static tables describing network resources have been replaced by dynamic directory services, such as X.500 and the Internet Domain Name System. These dynamic directory services provide more timely and accurate information about network resources than static tables.A wide variety of services address various components of the resource discovery and location problem. These services can be loosely classified as either low-level protocols or high-level services. Low-level protocols, such as RARP and ICMP, are simple delivery protocols and provide limited information; high-level services, such as the Internet Domain Name System and X.500, use complex delivery protocols to answer complex queries. Neither class of directory service is appropriate in all situations. Low-level services are too restrictive in the type of queries and information they support, while high-level services may be too expensive for some low-function networks.

Journal ArticleDOI
TL;DR: The author explores methods for transition and coexistence between the two protocol suites of Internet/OSI and enumerates several approaches, discusses the positive and negative aspects of each, and describes their inter-relationships.
Abstract: The US DoD (Department of Defense) Internet suite of protocols (commonly known as TCP/IP for transmission control protocol/internet protocol) is the de facto open (nonproprietary) standard for computer communications in multivendor and multiadministration networks. However, some feel that protocols based on the open systems interconnection (OSI) model and promulgated by the International Organization for Standardization (ISO) will eventually achieve dominance and enjoy even greater success than TCP/IP. The author explores methods for transition and coexistence between the two protocol suites. He enumerates several approaches, discusses the positive and negative aspects of each, and describes their inter-relationships. Further, although the focus is on the problems of Internet/OSI transition and coexistence, none of the approaches described are unique to this problem. Rather, they are all general solutions to the problem of changing from one protocol suite to another or of having two arbitrary protocol suites coexisting. >

Journal ArticleDOI
TL;DR: In this article, the authors focus on the interrelationship between lottery wagering and parimutuel horseracing in California and show that the lottery has reduced the amount of money spent in different program areas.
Abstract: Several previous articles in this Journal have dealt with state lotteries, including the determinants of lottery wagering and the revenue effects of changing lottery tax rates.' This paper presents additional evidence regarding another aspect of lotteries-namely, the extent to which newly established lotteries reduce other types of wagering on which states also depend for revenues. The analysis focuses on the interrelationship between lottery wagering and parimutuel horseracing wagering in California. This state, whose lottery began in 1985, is now the nation's largest for both types of wagering. In 1989, for example, Californians wagered a total of $5.3 billion, including $2.6 billion on the lottery and $2.7 billion on horseracing. The extent to which California's lottery has reduced horseracing wagering is especially of interest for two reasons. First, because California taxes both types of wagering, the interrelationship between them is necessary to identify and forecast the net state revenue gain from having the lottery. Second, California's lottery revenues are earmarked for education, whereas its horseracing revenues accrue to the state's General Fund to support governmental programs generally. Thus, the wagering interrelationship affects the relative amounts of money spent in different program areas.

01 Jul 1990
TL;DR: The Point-to-Point Protocol (PPP) provides a method for transmitting datagrams over serial point- to-point links.
Abstract: The Point-to-Point Protocol (PPP) provides a method for transmitting datagrams over serial point-to-point links. PPP is composed of