scispace - formally typeset
Search or ask a question

Showing papers on "The Internet published in 1993"


01 Sep 1993
TL;DR: This document gives an overview and specification of Version 5 of the protocol for the Kerberos network authentication system, presently in production use at MIT's Project Athena, and at other Internet sites.
Abstract: This document gives an overview and specification of Version 5 of the protocol for the Kerberos network authentication system Version 4, described elsewhere [1,2], is presently in production use at MIT's Project Athena, and at other Internet sites

1,451 citations


Proceedings ArticleDOI
01 Oct 1993
TL;DR: The measured round trip delays of small UDP probe packets sent at regular time intervals are used to analyze the end-to-end packet delay and loss behavior in the Internet and find that the losses of probe packets are essentially random unless the probe traffic uses a large fraction of the available bandwidth.
Abstract: We use the measured round trip delays of small UDP probe packets sent at regular time intervals to analyze the end-to-end packet delay and loss behavior in the Internet. By varying the interval between probe packets, it is possible to study the structure of the Internet load over different time scales. In this paper, the time scales of interest range from a few milliseconds to a few minutes. Our observations agree with results obtained by others using simulation and experimental approaches. For example, our estimates of Internet workload are consistent with the hypothesis of a mix of bulk traffic with larger packet size, and interactive traffic with smaller packet size. We observe compression (or clustering) of the probe packets, rapid fluctuations of queueing delays over small intervals, etc. Our results also show interesting and less expected behavior. For example, we find that the losses of probe packets are essentially random unless the probe traffic uses a large fraction of the available bandwidth. We discuss the implications of these results on the design of control mechanisms for the Internet.

789 citations


Patent
04 Nov 1993
TL;DR: In this article, a user can use his personal computer to call up an on-line service system over a telecommunications link such as a telephone line, which provides all sorts of useful services to the personal computer such as antiviral protection, auxiliary processing capabilities, and other features that are impractical or inconvenient to provide locally.
Abstract: A user can use his personal computer to call up an on-line service system over a telecommunications link such as a telephone line. The On-line system provides all sorts of useful services to the personal computer such as antiviral protection, auxiliary processing capabilities, and other features that are impractical or inconvenient to provide locally.

616 citations


01 Nov 1993
TL;DR: This RFC describes an internet anycasting service for IP and tries to be agnostic about how the service is actually provided by the internetwork.
Abstract: This RFC describes an internet anycasting service for IP. The primary purpose of this memo is to establish the semantics of an anycasting service within an IP internet. Insofar as is possible, this memo tries to be agnostic about how the service is actually provided by the internetwork. This memo describes an experimental service and does not propose a protocol. This memo is produced by the Internet Research Task Force (IRTF).

428 citations


Proceedings ArticleDOI
18 Sep 1993
TL;DR: The Distributed Interactive Virtual Environment (DIVE) is a heterogeneous distributed virtual reality system based on UNIX and Internet networking protocols that provides a dynamic virtual environment where applications and users can enter and leave the environment on demand.
Abstract: The Distributed Interactive Virtual Environment (DIVE) is a heterogeneous distributed virtual reality system based on UNIX and Internet networking protocols. Each participating process has a copy of a replicated database and changes are propagated to the other processes with reliable multicast protocols. DIVE provides a dynamic virtual environment where applications and users can enter and leave the environment on demand. Several user-related abstractions have been introduced to ease the task of application and user interface construction. >

366 citations



Proceedings ArticleDOI
01 Dec 1993
TL;DR: This paper proposes an extension of access control to integrate licensing called Stateful Access Control and it addresses some aspects of virus protection.
Abstract: Licensing is a topic of increasing importance for software publishers and users. More and more, the magnitude of financial transfers between these two partners are determined by some electronic licensing service being part of the system on which the licensed software is running. In order to ease the use and management of such licensing schemes and to enable economic software usage in enterprise-wide computer systems through flexible and fair billing structures, various organizations are working on formulating requirements, defining architectures, and building standard interfaces for so called license brokerage systems. The trustworthiness of these services is essential because large amounts of money can depend on them. Most of these licensing services are currently operating independently of access control and rely on proprietary and unpublished security algorithms. This paper proposes an extension of access control to integrate licensing called Stateful Access Control and it addresses some aspects of virus protection.

322 citations


01 May 1993
TL;DR: The IRC protocol was developed over the last 4 years since it was first implemented as a means for users on a BBS to chat amongst themselves, and is stringing to cope with growth.
Abstract: The IRC protocol was developed over the last 4 years since it was first implemented as a means for users on a BBS to chat amongst themselves. Now it supports a world-wide network of servers and clients, and is stringing to cope with growth. Over the past 2 years, the average number of users connected to the main IRC network has grown by a factor of 10.

258 citations


01 Jan 1993
TL;DR: This paper indicates trends in these three dimensions of information infrastructure, and suggests several promising directions of future resource discovery research, along with some initial results from projects carried out by members of the Internet Research Task Force Research Group on Resource Discovery and Directory Service.

215 citations


Journal ArticleDOI
TL;DR: This note is about Amplify, a program I wrote a little more than a year ago, and about the more general topic of distributing scientific software.

189 citations


01 Aug 1993
TL;DR: This brief paper offers a perspective on the subject of names of destinations in data communication networks and suggests two ideas: first, it is helpful to distinguish among four different kinds of objects that may be named as the destination of a packet in a network.
Abstract: This brief paper offers a perspective on the subject of names of destinations in data communication networks. It suggests two ideas: First, it is helpful to distinguish among four different kinds of objects that may be named as the destination of a packet in a network. Second, the operating system concept of binding is a useful way to describe the relations among the four kinds of objects. To illustrate the usefulness of this approach, the paper interprets some more subtle and confusing properties of two real-world network systems for naming destinations.

Journal ArticleDOI
TL;DR: An overview of resource discovery services currently available on the Internet is presented and a taxonomy of their characteristics and design decisions is presented, describing where to find and how to access several of the surveyed discovery services.
Abstract: An overview of resource discovery services currently available on the Internet is presented. The authors concentrate on the following discovery tools: the Wide Area Information Servers (WAIS) project, Archie, Prospero, Gopher. The World-Wide Web (WWW), Netfind, the X.500 directory, Indie, the Knowbot Information Service (KIS), Alex, Semantic File Systems, and Nomenclator. The authors summarize the surveyed tools by presenting a taxonomy of their characteristics and design decisions. They also describe where to find and how to access several of the surveyed discovery services. They conclude with a discussion of future directions in the area of resource discovery and retrieval. >

01 Feb 1993
TL;DR: This document provides definitions, formats, references, and citations for cryptographic algorithms, usage modes, and associated identifiers and parameters used in support of Privacy Enhanced Mail (PEM) in the Internet community.
Abstract: This document provides definitions, formats, references, and citations for cryptographic algorithms, usage modes, and associated identifiers and parameters used in support of Privacy Enhanced Mail (PEM) in the Internet community [STANDARDS-TRACK]

Book
01 May 1993
TL;DR: This book helps to scratch the intellectual itch you might have about where the data resides and what goes on inside the cable, equipment, and software of a network.
Abstract: From the Book: More than 80 percent of the personal computers used in business and education are connected to a network or the Internet. The chances are good that you'll have to interact with a network soon if you don't already. This book helps you understand computer networks in several ways. It helps to scratch the intellectual itch you might have about where the data resides and what goes on inside the cable, equipment, and software. If you understand the basic structure and operation of a network, you can be more efficient in your job. The information in this book is an excellent foundation for growth if you want to learn more about networking. Finally, you can use this book as a training tool for working on networked computers. Computer networking didn't just emerge as a unique and independent technology. Networking depends on many things you've seen or are familiar with already. In fact, modern networks have roots in the early telegraph and telephone systems. In this book, we take advantage of those historical ties to explain and illustrate the underlying technology of networks in a simple graphic format. Then, we move into modern networking and explain the relationships between the hardware and software in networks. Our illustrations detail packets, network interface cards, servers, routers, management software, and many other aspects of networking. Our constant goal is to provide useful information in an easily understood manner. The information in this book isn't specific to any particular type of computer or network operating system. We illustrate models of operation and tell you how some popular products fit into the models. Whether your computer is an IBM PC, DEC VAX, or anApple Macintosh; whether your network operating system is NetWare, LANtastic, or UNIX; and whether your cabling is copper or fiber-optic, the information in this book applies to your network.

01 Apr 1993
TL;DR: It is the purpose of this document, the Structure of Management Information (SMI), to define that adapted subset, and to assign a set of associated administrative values.
Abstract: It is the purpose of this document, the Structure of Management Information (SMI), to define that adapted subset, and to assign a set of associated administrative values. [STANDARDS-TRACK]

Proceedings ArticleDOI
28 Mar 1993
TL;DR: The measurements indicate that the IP level service provided in the network yields high losses, duplicates, and reorderings of packets, and the round-trip transit delay varies significantly.
Abstract: A simple experiment designed to capture the end-to-end behavior of the Internet is described. The measurements indicate that the IP level service provided in the network yields high losses, duplicates, and reorderings of packets. In addition, the round-trip transit delay varies significantly. These measurements indicate that the network may have several problems which still need to be analyzed in order to improve the efficiency of protocols and control mechanisms that it uses. >

01 Jul 1993
TL;DR: This RFC documents the extended TACACS protocol use by the Cisco Systems terminal servers, which is used by the University of Minnesota's distributed authentication system.
Abstract: This RFC documents the extended TACACS protocol use by the Cisco Systems terminal servers. This same protocol is used by the University of Minnesota's distributed authentication system. This memo provides information for the Internet community. It does not specify an Internet standard.

Journal ArticleDOI
TL;DR: A strawman architecture is presented and how conference-specific information is captured, then conveyed among end systems is described, and five critical needs for a scalable teleconferencing architecture are identified.
Abstract: As the last two meetings of the Internet Engineering Task Force have shown, the demand for Internet teleconferencing has arrived. Packet audio and video have now been multicast to approximately 170 different hosts in ten countries, and for upcoming meetings the number of remote participants is likely to be substantially larger. Yet the network infrastructure to support wide-scale packet teleconferencing is not in place. These experiments represent a departure from the two- to ten-site telemeetings that are the norm today. They represent an increase in scale of multiple orders of magnitude in several interrelated dimensions. This paper discusses the impact of scaling on our efforts to define a multimedia teleconferencing architecture. Three scaling dimensions of particular interest are: (1) very large numbers of participants per conference, (2) many simultaneous teleconferences, and (3) a widely dispersed user population. Here we present a strawman architecture and describe how conference-specific information is captured, then conveyed among end systems. We provide a comparison of connection models and outline the tradeoffs and requirements that change as we travel along each dimension of scale. In conclusion, we identify five critical needs for a scalable teleconferencing architecture.

01 Mar 1993
TL;DR: This document describes the protocol, lists some of the implementations currently available, and has an overview of how to implement new client and server applications.
Abstract: The Internet Gopher protocol is designed for distributed document search and retrieval. This document describes the protocol, lists some of the implementations currently available, and has an overview of how to implement new client and server applications. This document is adapted from the basic Internet Gopher protocol document first issued by the Microcomputer Center at the University of Minnesota in 1991.

01 Feb 1993
TL;DR: This document describes three types of service in support of Internet Privacy-Enhanced Mail: key certification, certificate- revocation list (CRL) storage, and CRL retrieval.
Abstract: This document describes three types of service in support of Internet Privacy-Enhanced Mail (PEM) [1-3]: key certification, certificate- revocation list (CRL) storage, and CRL retrieval. [STANDARDS-TRACK]

01 Apr 1993
TL;DR: The purpose of this document is to provide an overview of version 2 of the Internet-standard Network Management Framework, termed the SNMP version 2 framework (SNMPv2).
Abstract: The purpose of this document is to provide an overview of version 2 of the Internet-standard Network Management Framework, termed the SNMP version 2 framework (SNMPv2). [STANDARDS-TRACK]

Journal ArticleDOI
01 Jul 1993
TL;DR: This work has discovered many examples of anomalous behavior, which range from excessive ICMP messages to nominally-local broadcast packets that have reached us from around the world.
Abstract: As part of our security measures, we spend a fair amount of time and effort looking for things that might otherwise be ignored. Apart from assorted attempted penetrations, we have also discovered many examples of anomalous behavior. These range from excessive ICMP messages to nominally-local broadcast packets that have reached us from around the world.

Journal ArticleDOI
TL;DR: In this article, the measured round trip delays of small UDP probe packets sent at regular time intervals were used to analyze the end-to-end packet delay and loss behavior in the Internet.
Abstract: We use the measured round trip delays of small UDP probe packets sent at regular time intervals to analyze the end-to-end packet delay and loss behavior in the Internet. By varying the interval bet...

01 Feb 1993
TL;DR: In this paper, the authors provide definitions, formats, references, and citations for cryptographic algorithms, usage modes, and associated identifiers and parameters used in support of Privacy Enhanced Mail (PEM) in the Internet community.
Abstract: This document provides definitions, formats, references, and citations for cryptographic algorithms, usage modes, and associated identifiers and parameters used in support of Privacy Enhanced Mail (PEM) in the Internet community. It is intended to become one member of the set of related PEM RFCs. This document is organized into four primary sections, dealing with message encryption algorithms, message integrity check algorithms, symmetric key management algorithms, and asymmetric key management algorithms (including both asymmetric encryption and asymmetric signature algorithms).

Journal ArticleDOI
TL;DR: Parts of Internet's resource discovery problem are discussed: how users specify searches, the difference between discovering classes of resources and locating appropriate instances, system-management problems that can be cast as global state discovery searches, issues involved with characterizing resources and with the efficient distribution of characterizing information, and social issues, especially privacy.
Abstract: The author discusses aspects of Internet's resource discovery problem: how users specify searches, the difference between discovering classes of resources and locating appropriate instances, system-management problems that can be cast as global state discovery searches, issues involved with characterizing resources and with the efficient distribution of characterizing information, and social issues, especially privacy. Results of efforts to address these problems as part of the Networked Resource Discovery project at the University of Colorado are presented. These efforts use a variety of experimental approaches, including prototype systems, network measurement studies, and simulation studies. >

01 Jan 1993
TL;DR: This report describes a low-bandwidth videoconferencing applications on the Internet using the IP multicast extensions and the User Datagram Protocol (UDP) transport protocol and finds that the mean output rate of the coder is less than 30kb/s, thus making videoconference applications possible over low-speed networks such as the Internet.
Abstract: This report describes a low-bandwidth videoconferencing applications on the Internet using the IP multicast extensions and the User Datagram Protocol (UDP) transport protocol. The video coder-decoder is a software implementation of the CCITT recommendation H.261 originally developped for the Integrated Services Digital Network (ISDN). Until now, H.261 codecs have been implemented in hardware. We find that the mean output rate of the coder is less than 30kb/s, thus making videoconferencing applications possible over low-speed networks such as the Internet. After a brief overview of the different data copression techniques and a description of the recommendation H.261, we describe in more details IVS, our videoconferencing application which is freely available on the public domain.

Journal ArticleDOI
TL;DR: Two amorphous groups, let's call them the Internet communi ty and the interactive T V community, are work ing on in fo rma t ion infrastructure, and there is ! similarity in what they envii ~ .~o ~ , , , ~ sion, there are also significant differences in their world,., views.
Abstract: The idea of a National Information Infrastructure (NII) is in the air. The Clinton ad? ministration feels the NII can \"transform the lives of the ~ > ; American people\" [5], and NII has made the covers of ; ~ v ~ j Time and Newsweek. 1 The NII is old hat to members of the computer science corn! munity. We have had the , Internet, a global information infrastructure, for many years. But Time is not focus| ing on the Internet. Time is ~ ~ ' 4 interested in home shopping and movies on demand, not • email and ftp. Two amorphous groups, let's call them the Internet communi ty and the interactive T V community, are work ing on in fo rma t ion infrastructure. While there is ! similarity in what they envii ~ .~o ~ , , ~ sion, there are also significant ~.-. differences in their world,., views. Later in this column ~ I will compare these two communities.

Journal ArticleDOI
03 Jan 1993
TL;DR: A preliminary design for Network Address Translators (Nat), which can be installed without changes to any existing systems, although FTP will fail in some but not all cases, is presented.
Abstract: The two most compelling problems facing the IP Internet are IP address depletion and scaling in routing. This paper discusses the characteristics of one of the proposed solutions---address reuse. The solution is to place Network Address Translators (Nat) at the borders of stub domains. Each Nat box has a small pool of globally unique IP addresses that are dynamically assigned to IP flows going through Nat. The dynamic assignment is coordinated with Domain Name Server operation. The IP addresses inside the stub domain are not globally unique---they are reused in other domains, thus solving the address depletion problem. The pool of IP addresses in Nat is from a subnet administered by the regional backbone, thus solving the scaling problem. The main advantage of Nat is that it can be installed without changes to any existing systems, although FTP will fail in some but not all cases. This paper presents a preliminary design for Nat, and discusses its pros and cons.

Proceedings ArticleDOI
18 Sep 1993
TL;DR: The Peer Package is introduced and the theory of its operation is explained, and the authors' experience with a demonstration program which they have written, called multi-player handball, that uses the Peer Package.
Abstract: The MR Toolkit Peer Package is an extension to the MR Toolkit that allows multiple independent MR Toolkit applications to communicate with one another across the Internet. The master process of an MR Toolkit application can transmit device data to other remote applications, and receive device data from remote applications. Application-specific data can also be shared between independent applications. Nominally, any number of peers may communicate together in order to run a multiprocessing application, and peers can join or leave the collaborative application at any time. The Peer Package is introduced and the theory of its operation is explained. The authors' experience with a demonstration program which they have written, called multi-player handball, that uses the Peer Package is discussed. >

Book
01 Jan 1993
TL;DR: In this article, the authors highlight the increasing value of information and IT within organizations and show how organizations use it and the crucial relationship between information and personal effectiveness, and discuss the use of computer software and communications in a management context.
Abstract: From the Publisher: Managing Information highlights the increasing value of information and IT within organizations and shows how organizations use it. It also deals with the crucial relationship between information and personal effectiveness. The use of computer software and communications in a management context are discussed in detail, including how to mould an information system to your needs. The book explains the basics using real-life examples and brings managers up-to-date with the latest developments in electronic commerce and the Internet. The book is based on the Management Charter Initiative's Occupational Standards for Management NVQs and SVQs at level 4. It is particularly suitable for managers on the Certificate in Management, or Part I of the Diploma, especially those accredited by the IM and BTEC.