DataMuseum.dk

Presents historical artifacts from the history of:

DKUUG/EUUG Conference tapes

This is an automatic "excavation" of a thematic subset of
artifacts from Datamuseum.dk's BitArchive.

See our Wiki for more about DKUUG/EUUG Conference tapes

Excavated with: AutoArchaeologist - Free & Open Source Software.


top - metrics - download
Index: I T

⟦cdc347bcd⟧ TextFile

    Length: 29945 (0x74f9)
    Types: TextFile
    Names: »IDEA-INDEX-ABS.TXT.1«

Derivation

└─⟦9ae75bfbd⟧ Bits:30007242 EUUGD3: Starter Kit
    └─⟦this⟧ »EurOpenD3/documents/nic.ddn.mil/IDEA-INDEX-ABS.TXT.1« 

TextFile

(updated 06/11/88)


The Internet Design, Engineering and Analysis noteS (IDEAS) 
--- -------- ------- ----------- --- -------- ----- -------

The Internet Design, Engineering and Analysis noteS (IDEAS) are draft
documents of the Internet Engineering Task Force (IETF or INENG).  IDEAS
are generally contributed by INENG Working Groups (or by individuals 
participating in the INENG) on short- and mid-term issues in network, 
internetwork and protocol engineering.  However, thoughtful papers from 
any responsible source on any related issue will be considered.  The
INENG chairman is the nominal editor of the series and can be reached 
by emailing to gross@gateway.mitre.org. 

Since this is a draft document series, with the goal of giving wider 
exposure to the technical issues, minimal editing has been done for 
form or style.  The basic format is the same as that of the Requests
For Comments (RFC's--published by ISI and the NIC), since some IDEAS 
may ultimately be submitted as RFC's.  

Constructive comments on all IDEAS are greatly encouraged.  Such comments 
can be addressed directly to the author or, preferably, can be expressed 
in the INENG interest mailing list (ineng-interest@venera.isi.edu).

The current listing of IDEAS is below:

 o IDEA0001-00.TXT - `The Internet Engineering Task Force', Phill Gross (Mitre)

	(Not yet available)

	Description of goals, history, charter and organization of 
	the Internet Engineering Task Force.

 o IDEA0002-00.TXT - `A Comparison of "Link State" and "Distance Vector" 
                     Routing Algorithms', Ross Callon (BBN)

	From the document:

	"Recently, there has been considerable work towards development 
	of new standard routing protocols both in ANSI task group X3S3.3 
	and in the Internet Engineering Task Force (IETF).  The work in 
	ANSI on development of an intra-domain routing protocol is the 
	most fully developed of these efforts.  The considerations 
	described in this paper are based largely on the work within ANSI, 
	as well as earlier work at BBN and elsewhere."

 o IDEA0003-00.TXT - `Guidelines for the use of Internet-IP addresses in the 
                     ISO Connectionless-Mode Network Protocol', Ross Callon
                     (BBN) and Hans-Werner Braun (U Mich)

	This IDEA is a proposed revision of RFC986.

	From the document:

	"This RFC suggests a method to allow the existing IP addressing, 
	including the IP protocol field, to be used for the ISO 
	Connectionless Network Protocol (CLNP).  This is a draft solution 
	to one of the problems inherent in the use of "ISO-grams" in the 
	DOD Internet.  Related issues will be discussed in subsequent RFCs.  
	This RFC suggests a proposed protocol for the ARPA-Internet community, 
	and requests discussion and suggestions for improvements.  
	Distribution of this memo is unlimited.

	This RFC has been revised in order to allow the addressing used 
	in the CLNP in the DOD Internet to be potentially useful for 
	routing in the context of a new inter-autonomous system routing 
	protocol, and in the context of large numbers of networks and 
	autonomous systems.  This is important due to the rapid growth 
	currently being experienced in the Internet."

 o IDEA0004-00.TXT - `Routing Information Protocol', Chuck Hedrick (Rutgers)

	From the document:

	"This IDEA describes a protocol for exchanging routing 
	information among gateways and other hosts.  It is intended 
	to be used as a basis for developing gateway software for use 
	in the Internet community.  This is a draft.  It is being 
	circulated in order to solicit comments and suggestions for 
	improvement."

 o IDEA0005-00.TXT - `Requirements for an Open Internal Gateway Protocol',
                     edited by John Moy (Proteon) for the Open IGP WOrking Group

	This is the initial draft of a requirements paper from the 
	Open Interior Gateway Routing (IGP) Group.  This paper deals 
	with routing within an administrative domain of gateways.
	(This distinguishs it from IDEA0007-00 by the Open Routing group 
	which is concerned with routing between administrative domains
	of gateways.)

	From the document:

	"This document states the requirements expected of the OIGP 
	Internal Routing Protocol).  Also the specific non-goals of 
	the protocol are discussed, along with the general design 
	guidelines.  Some design decisions (such as choosing an SPF 
	base) are not defended here due to lack of space and time."

 o IDEA0006-00.TXT - `ISO Presentation Services on top of TCP/IP-based
                     Internets', Marshall Rose (TWG)

	From the document:

	"[RFC1006] describes a mechanism for providing the ISO transport 
	service on top of the Transmission Control Protocol (TCP) 
	[RFC793] and Internet Protocol (IP) [RFC791]. Once this method 
	is applied, one may implement "real" ISO applications on top of 
	TCP/IP-based internets, by simply implementing OSI session, 
	presentation, and application services on top of the transport 
	service access point which is provided on top of the TCP. Although 
	straight-forward, there are some environments in which the 
	richness provided by the OSI application layer is desired, but 
	it is nonetheless impractical to implement the underlying OSI 
	infrastructure (i.e., the presentation, session, and transport 
	services on top of the TCP).  This IDEA describes an approach 
	for providing "stream-lined" support of OSI application services 
	on top of TCP/IP-based internets for such constrained environments."
	
 o IDEA0007-00.TXT - `Requirements for Inter-Autonomous Systems Routing',
                     edited by Ross Callon (BBN) for the Open Routing Working
                     Group

	This is the initial draft of a requirements paper from the 
	Open Routing Group.   This paper deals with distributing
	routing information between administrative domains of gateways.
	(This distinguishs it from IDEA0005-00 by the Open IGP group which
	is concerned with routing within an administrative domain of
	gateways.)

	From the document:

	"This IDEA presents the draft requirements for Inter-Autonomous 
	Systems  Routing.  It is intended that these requirements will 
	form the basis for the future development of a new Inter-Autonomous 
	Systems Routing Architecture and Protocol.  This draft is being 
	circulated to the IETF for comment.  Distribution of this memo is 
	unlimited.  Comments should be sent to: open-rout-editor@bbn.com."

 o IDEA0008-00.TXT - `The Responsible Person Resource Record', edited by
                     Louis Mamakos (U of Md) for the Name Domain Working Group

	From the document:

	"The purpose of this RFC is to focus discussion on a particular 
	aspect of the domain name system described in RFCs 882, 883 and 
	973.  An extension to the system is proposed to allow identification 
	of the person or persons responsible for an entity in the domain 
	name system."

 o IDEA0009-00.TXT - `Exterior Gateway Protocol (EGP), Version 3', Marianne 
                     Gardner (BBN) and Mike Karels (UCBerkeley)

	From the document:

           "EGP, as specified in RFC 904 and here, exists  in  order  to
       convey   network-reachability   information  between  neighboring
       gateways, possibly in different autonomous systems.  The protocol
       includes   mechanisms  to  acquire  neighbors,  monitor  neighbor
       reachability, and exchange network reachability information.  The
       protocol  is based on periodic polling both to determine neighbor
       reachability and to exchange network reachability information.

            This document differs from RFC 904 in providing for  version
       negotiation   and   incremental   routing   updates   and   using
       Poll/Updates as Hellos and IHYs.  The finite state machine of RFC
       904  is essentially unchanged.  This paper directly addresses the
       problem caused when growth of the Internet outpaced the size of a
       single  routing  update  by  providing  for  incremental updates.
       Version negotiation permits more extensive revisions  to  EGP  in
       the  future, including a possible relaxation of the tree topology
       restriction.   Finally,  this  RFC  addresses  the   problem   of
       excessive  overhead  traffic  by  combining Polls and Hellos, and
       allowing Hellos to be Polls containing data.  The elimination  of
       Hellos and IHYs should provide a dramatic reduction in the number
       of messages exchanged in EGP interactions between gateways."

 o IDEA0010-00.TXT - `A Laboratory For Testing DOD Protocol Implementations:
                     It's Architecture And Methodologies', John Swanson and
                     Jose Rodriguez (UNISYS McLean Research Center)
        
	From the document:  
       
       "In the early 1980s, the Department of Defense (DoD) molded 
       a subset of the ARPA Internet into the Defense Data Network (DDN) 
       and issued Military Standards (MIL-STDs) for the ARPA Internet 
       protocol suite   [...]

       DoD standardization of the protocols brought the issue of 
       protocol testing into sharper focus.  Historically, a protocol 
       implementation's compliance with the ARPA specifications was 
       often determined on an ad hoc basis using other known working 
       implementations on the ARPANET  [....]  On the DDN, however, 
       where protocol implementations are encouraged by the Defense 
       Communications Agency (DCA) to be compliant with the MIL-STDs, 
       DoD customers frequently must field implementations purchased 
       from third-party vendors.  This situation prompted DCA to 
       establish a Protocol Laboratory to test vendor implementations of 
       the DoD protocols and certify their compliance to the standards.  
       
       Unisys Defense Systems has successfully developed this Protocol 
       Laboratory at the Defense Communications Engineering Center 
       (DCEC) in Reston, Virginia.  Operational "clones" of the 
       Laboratory will soon be established at various sites around the 
       country as part of the National Bureau of Standards' (NBS) 
       National Voluntary Laboratory Accreditation Program (NVLAP)"

 o IDEA0011-00.TXT - `A Simple Network Management Protocol',
                     Jeffrey Case (U of TN), Mark Fedor (NYSERnet Inc.),
                     Martin Schoffstall (RPI), and James Davin (Proteon Inc.)

	From the document:

        "This memo defines a simple protocol by which management
        information for a network element may be inspected or altered
        by logically remote users.

        This proposal is an upwardly-compatible extension of the
        Simple Gateway Monitoring Protocol [1], with four major
        functional extensions: 1) the ability to do alterations (SETS)
        within a standardized authentication protocol, 2) the support
        of proxy commands by a centralized server, 3) significant
        extensions to the variable space both for gateways and other
        network elements.  4) the separation of trap processing to a
        different UDP port."

 o IDEA0011-01.TXT - `A Simple Network Management Protocol',
                     Jeffrey Case (U of TN), Mark Fedor (NYSERnet Inc.),
                     Martin Schoffstall (RPI), and James Davin (Proteon Inc.)

	From the document:

        "As reported in RFC 1052, IAB Recommendations for the Develop-
        ment  of Internet Network Management Standards [1], the Inter-
        net Activities Board has  directed  the  Internet  Engineering
        Task Force (IETF) to create two new working groups in the area
        of network management.  One group is charged with the  further
        specification and definition of elements to be included in the
        Management Information Base (MIB).  The other is charged  with
        defining  the  modifications  to the Simple Network Management
        Protocol (SNMP) to accommodate the short- term  needs  of  the
        network  vendor  and operations communities, and to align with
        the output of the MIB working group.

        The MIB working  group  has  produced  two  memos,  one  which
        defines  a  Structure for Management Information (SMI) [2] for
        use by the managed objects contained in  the  MIB.   A  second
        memo [3] defines the list of managed objects.

        The output of the SNMP Extensions working group is this  memo,
        which  incorporates changes to the initial SNMP definition [4]
        required to attain alignment with the output of the MIB  work-
        ing  group.  The changes should be minimal in order to be con-
        sistent with the IAB's directive that the  working  groups  be
        "extremely  sensitive  to  the  need to keep the SNMP simple."
        Although considerable  care  and  debate  has  gone  into  the
        changes  to  the  SNMP  which  are reflected in this memo, the
        resulting  protocol  is  not  backwardly-compatible  with  its
        predecessor,  the  Simple  Gateway  Monitoring Protocol (SGMP)
        [5].  Although the syntax of the protocol  has  been  altered,
        the  original  philosophy,  design decisions, and architecture
        remain intact.  In order to avoid  confusion,  new  UDP  ports
        have  been allocated for use by the protocol described in this
        memo."

 o IDEA0012-00.TXT - 'Network Management for TCP/IP Network: An Overview',
                     A. Ben-Artzi (Sytek)

        From the document:

        "This paper describes  a  model  of  network  management  that
        includes  the  services  and protocols required for building a
        network management system (NMS).  While the management  appli-
        cations themselves are not included in the scope of this work,
        the model provides all the tools required by  a  developer  to
        develop  such  applications.  Applications are explicitly left
        as a competitive issue for network developers and providers.

        As will become evident, security issues and multiple-  manage-
        ment domains are not covered by this architecture.  The impor-
        tance of these  issues  is  well  recognized,  and  should  be
        covered in subsequent documents.

        The services and protocols defined by the NMS are proposed  as
        standard  tools  to be implemented in the Internet, as well as
        the commercial TCP/IP community, in order to  achieve  uniform
        management capability in a multi-vendor environment.

        As the network management system proposed here is based on ISO
        standards, the reader is assumed to be familiar with CMIS/CMIP
        and ACSE."

 o IDEA0013-00.TXT - 'Structure and Identification of Management
                     Information for the Internet', Lee LaBarre (MITRE)

        From the document:

        "This   memorandum   describes   the  common  structures   and
        identification   scheme   for   the   definition   of  manage-
        ment information  used  in  managing  the TCP/IP Internet with
        the   ISO   network   management   models    and    protocols.
        Included  are descriptions    of    an    object   information
        model   for   network management, and ASN.1 notational conven-
        tions and a set of generic types used  to describe  management
        information.    It  defines the semantics  of  the  operations
        associated   with   the   management  information,  and    the
        abstract  syntax and encodings used for its transfer."

 o IDEA0014-00.TXT - `Kerberos Authentication and Authorization System',
                     S. P. Miller, B. C. Neuman, J. I. Schiller, and
                     J. H. Saltzer (all of MIT)

	From the document:

        "This  document describes  the  assumptions,  short  and
        long  term goals, and system model for a network authentica-
        tion system, named Kerberos,  for  the Athena   environment.
        An   appendix   specifies  the  detailed  design  and proto-
        cols to support these goals, and a set   of   UNIX    manual
        pages,   not  included   here,  describes  an implementation
        for Berkeley 4.3 UNIX of both user interface  commands   and
        also   library   interfaces  for  clients  and servers.  The
        next section of the technical plan, E.2.2, describes  a  set
        of  network  applications  that use Kerberos for authentica-
        tion.

        Most  conventional  time-sharing  systems   require   a
        prospective user to identify him or herself and to authenti-
        cate that identity  before  using   its  services.   In   an
        environment  consisting  of  a  network  that connects pros-
        pective clients with services, a  network  service   has   a
        corresponding   need   to   identify  and  authenticate  its
        clients.  When the client is a user of a  time-sharing  sys-
        tem,  one  approach  is  for   the   service  to  trust  the
        authentication that was performed by the  time-sharing  sys-
        tem.  For example, the network applications lpr and rcp pro-
        vided with Berkeley 4.3 UNIX  trust the user's  time-sharing
        system to reliably authenticate its clients.

        In  contrast  with  the  time-sharing  system, in which
        a  protection  wall  separates the operating system from its
        users, a workstation is  under  the complete control of  its
        user,  to the extent that the user can run a private version
        of the operating system, or even replace the machine itself.
        As   a  result,   a   network  service  cannot  rely  on the
        integrity of the workstation operating system when  it  (the
        network service) performs authentication.

        This  plan  extends   the   conventional   notions   of
        authentication,  authorization,   and   accounting   to  the
        network environment with untrusted workstations.  It  estab-
        lishes  a  trusted  third-party service named  Kerberos that
        can perform authentication to  the  mutual  satisfaction  of
        both  clients  and  services.   The authentication  approach
        allows  for  integration  with authorization  and   account-
        ing  facilities.  The resulting design is also applicable to
        a mixed time-sharing/network environment in which   a   net-
        work service  is  not  willing  to  rely  on the authentica-
        tion performed by the client's time-sharing system."

        1
         UNIX is a trademark of AT&T Bell Laboratories

 o IDEA0015-00.TXT - `Host Extensions for IP Multicasting',
                     S. E. Deering (Stanford)

	From the document:

        "This memo specifies the extensions required of  a  host
        implementation  of  the  Internet  Protocol  (IP) to support
        multicasting.  It is proposed as a standard  for  IP  multi-
        casting in the ARPA-Internet.  This specification is a major
        revision of RFC-988; changes from RFC-988 are listed  in  an
        Appendix."

 o IDEA0016-00.TXT - `TELNET LOCALEDIT OPTION', Dave Borman (Cray Research)

	From the document:

        "This RFC describes a proposed standerd for  doing  Line  mode
        TELNET.   It  has  unlimited  distribution for discussion pur-
        poses.  After the first round of discussion,  values  for  the
        options will be requested from the NIC.

        With increasing TELNET usage, it has become apparent that  the
        ability to do command line processing on the local machine and
        send completed lines to the remote machine is a feature neces-
        sary in several environments.  First, in the case of a connec-
        tion over long delay equipment, it is very frustrating to  the
        user  to  have  the  echoing of his data take several seconds.
        Second, some supercomputers, due to their nature, are not good
        at  handling and processing single character input.  For these
        machines, it is better to have the front end computer  do  the
        character  processing,  and  leave  the supercomputer's cycles
        available for doing vectorized number crunching.

        After examining several implementations, it has  become  clear
        that  the  correct  thing to do is to implement new options to
        enhance the current TELNET specification so that it  can  sup-
        port  local  line  editing in a reasonable, reliable, and con-
        sistent manner."

 o IDEA0017-00.TXT - `ISO Presentation Services on top of TCP/IP-based
                     Internets', Marshall T Rose (The Wollongong Group)

	From the document:

        "[RFC1006] describes a mechanism for providing the  ISO  tran-
        sport  service  on  top  of  the Transmission Control Protocol
        (TCP) [RFC793] and Internet Protocol (IP) [RFC791]. Once  this
        method  is  applied, one may implement "real" ISO applications
        on top of TCP/IP-based internets, by simply  implementing  OSI
        session,  presentation, and application services on top of the
        transport service access point which is provided on top of the
        TCP. Although straight-forward, there are some environments in
        which the richness provided by the OSI  application  layer  is
        desired,  but  it  is nonetheless impractical to implement the
        underlying OSI infrastructure (i.e.,  the  presentation,  ses-
        sion,  and  transport  services on top of the TCP).  This memo
        describes an approach for providing "stream-lined" support  of
        OSI  application services on top of TCP/IP-based internets for
        such constrained environments."

 o IDEA0018-00.TXT - `System Load', Inder Sidhu, N Arunkumar (Bridge
                     Communications)

        From the document:

        "Loading files for software distribution is a frequently  per-
        formed  function  that  falls  under  the  purview  of network
        management. This RFC proposes a standard to perform this func-
        tion  for  the Internet community, and requests discussion and
        suggestions. It is one of a set of RFCs created by the  NETMAN
        working  group of the IETF for management of the TCP/IP Inter-
        net. This draft version of the RFC is being  submitted  as  an
        IDEA.  It  contains  two proposals, of which only one is to be
        adopted and included in the final RFC.

        Nodes on a network  may  require  a  portion  of  their  local
        address  space to be loaded using information held on a remote
        node. Standardized mechanisms to  achieve  this  functionality
        are  desirable  in  multi-vendor networks. This RFC proposes a
        standard to be used for performing system load.  Heterogeneous
        systems that use the standard can then load each other.

        The standard proposed here derives from the IEEE 802.1  System
        Load  Protocol  [9]. The RFC, however, also takes into account
        previous  work  in  the  Internet  community  in   this   area
        (BOOTP/TFTP,  etc. [2, 3, 8]). As far as possible, compatibil-
        ity with the past is maintained, and future ISO orientation is
        pursued."

 o IDEA0019-00.TXT - `Multi-Homed Hosts in an IP Network', J. Lekashman (NASA
                     Ames GE)

        From the document:

        "A multi-homed host is a computer system which has  more  than
        one  network interface.  It is distinguished from a gateway in
        that the requirements placed upon a multi-homed host  are  for
        servicing requests for network resources with itself as desti-
        nation or source, whereas the requirements placed upon a gate-
        way are for servicing transit traffic.

        This is not to conclude that a given  computer  system  cannot
        have  both  gateway and multi-homed host characteristics.  The
        characteristics of a gateway are outlined  in  RFC  1009  [1].
        This  is  intended to show that configuration requirements are
        for multi-homed host and gateway behavior are  different,  and
        how  this  should  be  handled  by  a host.  Some of the ideas
        presented are applicable to gateways also, especially  in  the
        area of multiple interfaces on the same network."

 o IDEA0020-00.TXT - `Comparison to the DEC IS-IS Proposal', J. Moy (Proteon)

        From the document:

        "The Open SPF-based Internal Gateway Protocol (OSPFIGP) is  an
        internet  routing protocol  currently in the design stage.  It
        will draw on existing SPF routing technology, notably the work
        done  by BBN for the  Arpanet  and  the DEC  IS-IS  ANSI  pro-
        posal.   We  will refer to the DEC IS-IS ANSI  Proposal  [DEC]
        as  the  ANSI proposal throughout this paper.  Since both  the
        OSPFIGP and  the ANSI proposal  are  IS-IS  routing  protocols
        they will be quite similar.  This paper describes the expected
        differences between the  two  protocols.  We assume the reader
        is familiar with the ANSI proposal."

 o IDEA0021-00.TXT - `EGP and Policy Based Routing in the New NSFNET Backbone',
                     Jacob Rehkter (IBM)

        From the document:

        "The NSFNET backbone  routes  packets  between  the  Regionals
        Networks to which  it is connected, i.e., the packets arriving
        at a backbone entry node are routed to an exit node.  How they
        travel through the  network is determined by two components:

             the NSFNET backbone routing protocol/algorithm and

             additional information about the externally connected
             networks

        This paper is  concerned  with  how  reachability  information
        between   the  external  networks  and  the  NSFNET   backbone
        is  exchanged so that packets can be  routed  to  the  correct
        destination by using a reasonable path."

 o IDEA0022-00.TXT - `The NSFNET Routing Architecture', Hans-Werner Braun
                     (MERIT)

        From the document:

        "This document  describes  the  routing  architecture for  the
        NSFNET  centered around the new NSFNET Backbone, with specific
        emphasis  on  the  interface  between  the  backbone  and  its
        attached   networks.  It   reflects  and   augments   thoughts
        described   in   (1),   discussions   during    the   Internet
        Engineering   Task    Force   meeting   at   the   San   Diego
        Supercomputing  Center  in  March  1988, discussions on  mail-
        ing  lists,  especially on a backbone/regional network working
        group mailing  list, and  a final discussion held at  the  IBM
        T.J.  Watson  Research  Center in Yorktown, NY, on the 21st of
        March  1988.    The   Yorktown   meeting   was  attended    by
        Hans-Werner   Braun   (Merit),   Scott  Brim  (Cornell Univer-
        sity), Mark Fedor (NYSERNet), Jeff  Honig   (Cornell   Univer-
        sity),  and   Jacob  Rekhter  (IBM). Thanks also to them, Milo
        Medin (NASA), John Moy (Proteon) and  Greg  Satz  (Cisco)  for
        discussing  this  document  by email and/or phone.

        Understanding of (1) is  highly  recommended  prior  to  read-
        ing  this document."

 o IDEA0023-00.TXT - `Structure and Identification of Management Information
                     for TCP/IP based internets', Marshall T. Rose, Keith
                     McCloghrie (both of The Wollongong Group)

        From the document:

        "This memo describes the common structures and  identification
        scheme  for  the  definition of management information used in
        managing TCP/IP-based internets.  Included are descriptions of
        an  object information model for network management along with
        a set of generic types used to  describe  management  informa-
        tion.   Formal  descriptions  of the structure are given using
        Abstract Syntax Notation One (ASN.1) [1].

        This memo is largely concerned  with  organizational  concerns
        and  administrative  policy:  it neither specifies the objects
        which are managed, nor the  protocols  used  to  manage  those
        objects.  These concerns are addressed by two companion memos:
        one describing the Management Information Base (MIB) [2],  and
        the  other  describing  the Simple Network Management Protocol
        (SNMP) [3].

        This memo is based in part on  IETF  IDEA  13,  Structure  and
        Identification of Management Information for the Internet [4].
        This memo uses a skeletal structure derived from IDEA 13,  but
        differs  in one very significant way: IDEA 13 focuses entirely
        on the use of OSI-style network management.  As  such,  it  is
        not  suitable  for  use  in the short-term for which a non-OSI
        protocol, the SNMP, has been designated as the standard."

 o IDEA0024-00.TXT - 'Management Information Base for Network Management
                     of TCP/IP-based internets', K. McCloghrie, M.T. Rose
                     (both of The Wollongong Group)

        This document proposes a standard for the Internet community.

        From the document:

        "This memo provides the  initial  version  of  the  Management
        Information  Base (MIB) for use with network management proto-
        cols in TCP/IP-based internets in the short-term.  In particu-
        lar,  together  with  its  companion  memos which describe the
        structure of management information  along  with  the  initial
        network management protocol, these documents provide a simple,
        workable architecture and  system  for  managing  TCP/IP-based
        internets and in particular the DARPA/NSF Internet.