|
|
DataMuseum.dkPresents historical artifacts from the history of: DKUUG/EUUG Conference tapes |
This is an automatic "excavation" of a thematic subset of
See our Wiki for more about DKUUG/EUUG Conference tapes Excavated with: AutoArchaeologist - Free & Open Source Software. |
top - metrics - downloadIndex: I T
Length: 29945 (0x74f9)
Types: TextFile
Names: »IDEA-INDEX-ABS.TXT.1«
└─⟦9ae75bfbd⟧ Bits:30007242 EUUGD3: Starter Kit
└─⟦this⟧ »EurOpenD3/documents/nic.ddn.mil/IDEA-INDEX-ABS.TXT.1«
(updated 06/11/88)
The Internet Design, Engineering and Analysis noteS (IDEAS)
--- -------- ------- ----------- --- -------- ----- -------
The Internet Design, Engineering and Analysis noteS (IDEAS) are draft
documents of the Internet Engineering Task Force (IETF or INENG). IDEAS
are generally contributed by INENG Working Groups (or by individuals
participating in the INENG) on short- and mid-term issues in network,
internetwork and protocol engineering. However, thoughtful papers from
any responsible source on any related issue will be considered. The
INENG chairman is the nominal editor of the series and can be reached
by emailing to gross@gateway.mitre.org.
Since this is a draft document series, with the goal of giving wider
exposure to the technical issues, minimal editing has been done for
form or style. The basic format is the same as that of the Requests
For Comments (RFC's--published by ISI and the NIC), since some IDEAS
may ultimately be submitted as RFC's.
Constructive comments on all IDEAS are greatly encouraged. Such comments
can be addressed directly to the author or, preferably, can be expressed
in the INENG interest mailing list (ineng-interest@venera.isi.edu).
The current listing of IDEAS is below:
o IDEA0001-00.TXT - `The Internet Engineering Task Force', Phill Gross (Mitre)
(Not yet available)
Description of goals, history, charter and organization of
the Internet Engineering Task Force.
o IDEA0002-00.TXT - `A Comparison of "Link State" and "Distance Vector"
Routing Algorithms', Ross Callon (BBN)
From the document:
"Recently, there has been considerable work towards development
of new standard routing protocols both in ANSI task group X3S3.3
and in the Internet Engineering Task Force (IETF). The work in
ANSI on development of an intra-domain routing protocol is the
most fully developed of these efforts. The considerations
described in this paper are based largely on the work within ANSI,
as well as earlier work at BBN and elsewhere."
o IDEA0003-00.TXT - `Guidelines for the use of Internet-IP addresses in the
ISO Connectionless-Mode Network Protocol', Ross Callon
(BBN) and Hans-Werner Braun (U Mich)
This IDEA is a proposed revision of RFC986.
From the document:
"This RFC suggests a method to allow the existing IP addressing,
including the IP protocol field, to be used for the ISO
Connectionless Network Protocol (CLNP). This is a draft solution
to one of the problems inherent in the use of "ISO-grams" in the
DOD Internet. Related issues will be discussed in subsequent RFCs.
This RFC suggests a proposed protocol for the ARPA-Internet community,
and requests discussion and suggestions for improvements.
Distribution of this memo is unlimited.
This RFC has been revised in order to allow the addressing used
in the CLNP in the DOD Internet to be potentially useful for
routing in the context of a new inter-autonomous system routing
protocol, and in the context of large numbers of networks and
autonomous systems. This is important due to the rapid growth
currently being experienced in the Internet."
o IDEA0004-00.TXT - `Routing Information Protocol', Chuck Hedrick (Rutgers)
From the document:
"This IDEA describes a protocol for exchanging routing
information among gateways and other hosts. It is intended
to be used as a basis for developing gateway software for use
in the Internet community. This is a draft. It is being
circulated in order to solicit comments and suggestions for
improvement."
o IDEA0005-00.TXT - `Requirements for an Open Internal Gateway Protocol',
edited by John Moy (Proteon) for the Open IGP WOrking Group
This is the initial draft of a requirements paper from the
Open Interior Gateway Routing (IGP) Group. This paper deals
with routing within an administrative domain of gateways.
(This distinguishs it from IDEA0007-00 by the Open Routing group
which is concerned with routing between administrative domains
of gateways.)
From the document:
"This document states the requirements expected of the OIGP
Internal Routing Protocol). Also the specific non-goals of
the protocol are discussed, along with the general design
guidelines. Some design decisions (such as choosing an SPF
base) are not defended here due to lack of space and time."
o IDEA0006-00.TXT - `ISO Presentation Services on top of TCP/IP-based
Internets', Marshall Rose (TWG)
From the document:
"[RFC1006] describes a mechanism for providing the ISO transport
service on top of the Transmission Control Protocol (TCP)
[RFC793] and Internet Protocol (IP) [RFC791]. Once this method
is applied, one may implement "real" ISO applications on top of
TCP/IP-based internets, by simply implementing OSI session,
presentation, and application services on top of the transport
service access point which is provided on top of the TCP. Although
straight-forward, there are some environments in which the
richness provided by the OSI application layer is desired, but
it is nonetheless impractical to implement the underlying OSI
infrastructure (i.e., the presentation, session, and transport
services on top of the TCP). This IDEA describes an approach
for providing "stream-lined" support of OSI application services
on top of TCP/IP-based internets for such constrained environments."
o IDEA0007-00.TXT - `Requirements for Inter-Autonomous Systems Routing',
edited by Ross Callon (BBN) for the Open Routing Working
Group
This is the initial draft of a requirements paper from the
Open Routing Group. This paper deals with distributing
routing information between administrative domains of gateways.
(This distinguishs it from IDEA0005-00 by the Open IGP group which
is concerned with routing within an administrative domain of
gateways.)
From the document:
"This IDEA presents the draft requirements for Inter-Autonomous
Systems Routing. It is intended that these requirements will
form the basis for the future development of a new Inter-Autonomous
Systems Routing Architecture and Protocol. This draft is being
circulated to the IETF for comment. Distribution of this memo is
unlimited. Comments should be sent to: open-rout-editor@bbn.com."
o IDEA0008-00.TXT - `The Responsible Person Resource Record', edited by
Louis Mamakos (U of Md) for the Name Domain Working Group
From the document:
"The purpose of this RFC is to focus discussion on a particular
aspect of the domain name system described in RFCs 882, 883 and
973. An extension to the system is proposed to allow identification
of the person or persons responsible for an entity in the domain
name system."
o IDEA0009-00.TXT - `Exterior Gateway Protocol (EGP), Version 3', Marianne
Gardner (BBN) and Mike Karels (UCBerkeley)
From the document:
"EGP, as specified in RFC 904 and here, exists in order to
convey network-reachability information between neighboring
gateways, possibly in different autonomous systems. The protocol
includes mechanisms to acquire neighbors, monitor neighbor
reachability, and exchange network reachability information. The
protocol is based on periodic polling both to determine neighbor
reachability and to exchange network reachability information.
This document differs from RFC 904 in providing for version
negotiation and incremental routing updates and using
Poll/Updates as Hellos and IHYs. The finite state machine of RFC
904 is essentially unchanged. This paper directly addresses the
problem caused when growth of the Internet outpaced the size of a
single routing update by providing for incremental updates.
Version negotiation permits more extensive revisions to EGP in
the future, including a possible relaxation of the tree topology
restriction. Finally, this RFC addresses the problem of
excessive overhead traffic by combining Polls and Hellos, and
allowing Hellos to be Polls containing data. The elimination of
Hellos and IHYs should provide a dramatic reduction in the number
of messages exchanged in EGP interactions between gateways."
o IDEA0010-00.TXT - `A Laboratory For Testing DOD Protocol Implementations:
It's Architecture And Methodologies', John Swanson and
Jose Rodriguez (UNISYS McLean Research Center)
From the document:
"In the early 1980s, the Department of Defense (DoD) molded
a subset of the ARPA Internet into the Defense Data Network (DDN)
and issued Military Standards (MIL-STDs) for the ARPA Internet
protocol suite [...]
DoD standardization of the protocols brought the issue of
protocol testing into sharper focus. Historically, a protocol
implementation's compliance with the ARPA specifications was
often determined on an ad hoc basis using other known working
implementations on the ARPANET [....] On the DDN, however,
where protocol implementations are encouraged by the Defense
Communications Agency (DCA) to be compliant with the MIL-STDs,
DoD customers frequently must field implementations purchased
from third-party vendors. This situation prompted DCA to
establish a Protocol Laboratory to test vendor implementations of
the DoD protocols and certify their compliance to the standards.
Unisys Defense Systems has successfully developed this Protocol
Laboratory at the Defense Communications Engineering Center
(DCEC) in Reston, Virginia. Operational "clones" of the
Laboratory will soon be established at various sites around the
country as part of the National Bureau of Standards' (NBS)
National Voluntary Laboratory Accreditation Program (NVLAP)"
o IDEA0011-00.TXT - `A Simple Network Management Protocol',
Jeffrey Case (U of TN), Mark Fedor (NYSERnet Inc.),
Martin Schoffstall (RPI), and James Davin (Proteon Inc.)
From the document:
"This memo defines a simple protocol by which management
information for a network element may be inspected or altered
by logically remote users.
This proposal is an upwardly-compatible extension of the
Simple Gateway Monitoring Protocol [1], with four major
functional extensions: 1) the ability to do alterations (SETS)
within a standardized authentication protocol, 2) the support
of proxy commands by a centralized server, 3) significant
extensions to the variable space both for gateways and other
network elements. 4) the separation of trap processing to a
different UDP port."
o IDEA0011-01.TXT - `A Simple Network Management Protocol',
Jeffrey Case (U of TN), Mark Fedor (NYSERnet Inc.),
Martin Schoffstall (RPI), and James Davin (Proteon Inc.)
From the document:
"As reported in RFC 1052, IAB Recommendations for the Develop-
ment of Internet Network Management Standards [1], the Inter-
net Activities Board has directed the Internet Engineering
Task Force (IETF) to create two new working groups in the area
of network management. One group is charged with the further
specification and definition of elements to be included in the
Management Information Base (MIB). The other is charged with
defining the modifications to the Simple Network Management
Protocol (SNMP) to accommodate the short- term needs of the
network vendor and operations communities, and to align with
the output of the MIB working group.
The MIB working group has produced two memos, one which
defines a Structure for Management Information (SMI) [2] for
use by the managed objects contained in the MIB. A second
memo [3] defines the list of managed objects.
The output of the SNMP Extensions working group is this memo,
which incorporates changes to the initial SNMP definition [4]
required to attain alignment with the output of the MIB work-
ing group. The changes should be minimal in order to be con-
sistent with the IAB's directive that the working groups be
"extremely sensitive to the need to keep the SNMP simple."
Although considerable care and debate has gone into the
changes to the SNMP which are reflected in this memo, the
resulting protocol is not backwardly-compatible with its
predecessor, the Simple Gateway Monitoring Protocol (SGMP)
[5]. Although the syntax of the protocol has been altered,
the original philosophy, design decisions, and architecture
remain intact. In order to avoid confusion, new UDP ports
have been allocated for use by the protocol described in this
memo."
o IDEA0012-00.TXT - 'Network Management for TCP/IP Network: An Overview',
A. Ben-Artzi (Sytek)
From the document:
"This paper describes a model of network management that
includes the services and protocols required for building a
network management system (NMS). While the management appli-
cations themselves are not included in the scope of this work,
the model provides all the tools required by a developer to
develop such applications. Applications are explicitly left
as a competitive issue for network developers and providers.
As will become evident, security issues and multiple- manage-
ment domains are not covered by this architecture. The impor-
tance of these issues is well recognized, and should be
covered in subsequent documents.
The services and protocols defined by the NMS are proposed as
standard tools to be implemented in the Internet, as well as
the commercial TCP/IP community, in order to achieve uniform
management capability in a multi-vendor environment.
As the network management system proposed here is based on ISO
standards, the reader is assumed to be familiar with CMIS/CMIP
and ACSE."
o IDEA0013-00.TXT - 'Structure and Identification of Management
Information for the Internet', Lee LaBarre (MITRE)
From the document:
"This memorandum describes the common structures and
identification scheme for the definition of manage-
ment information used in managing the TCP/IP Internet with
the ISO network management models and protocols.
Included are descriptions of an object information
model for network management, and ASN.1 notational conven-
tions and a set of generic types used to describe management
information. It defines the semantics of the operations
associated with the management information, and the
abstract syntax and encodings used for its transfer."
o IDEA0014-00.TXT - `Kerberos Authentication and Authorization System',
S. P. Miller, B. C. Neuman, J. I. Schiller, and
J. H. Saltzer (all of MIT)
From the document:
"This document describes the assumptions, short and
long term goals, and system model for a network authentica-
tion system, named Kerberos, for the Athena environment.
An appendix specifies the detailed design and proto-
cols to support these goals, and a set of UNIX manual
pages, not included here, describes an implementation
for Berkeley 4.3 UNIX of both user interface commands and
also library interfaces for clients and servers. The
next section of the technical plan, E.2.2, describes a set
of network applications that use Kerberos for authentica-
tion.
Most conventional time-sharing systems require a
prospective user to identify him or herself and to authenti-
cate that identity before using its services. In an
environment consisting of a network that connects pros-
pective clients with services, a network service has a
corresponding need to identify and authenticate its
clients. When the client is a user of a time-sharing sys-
tem, one approach is for the service to trust the
authentication that was performed by the time-sharing sys-
tem. For example, the network applications lpr and rcp pro-
vided with Berkeley 4.3 UNIX trust the user's time-sharing
system to reliably authenticate its clients.
In contrast with the time-sharing system, in which
a protection wall separates the operating system from its
users, a workstation is under the complete control of its
user, to the extent that the user can run a private version
of the operating system, or even replace the machine itself.
As a result, a network service cannot rely on the
integrity of the workstation operating system when it (the
network service) performs authentication.
This plan extends the conventional notions of
authentication, authorization, and accounting to the
network environment with untrusted workstations. It estab-
lishes a trusted third-party service named Kerberos that
can perform authentication to the mutual satisfaction of
both clients and services. The authentication approach
allows for integration with authorization and account-
ing facilities. The resulting design is also applicable to
a mixed time-sharing/network environment in which a net-
work service is not willing to rely on the authentica-
tion performed by the client's time-sharing system."
1
UNIX is a trademark of AT&T Bell Laboratories
o IDEA0015-00.TXT - `Host Extensions for IP Multicasting',
S. E. Deering (Stanford)
From the document:
"This memo specifies the extensions required of a host
implementation of the Internet Protocol (IP) to support
multicasting. It is proposed as a standard for IP multi-
casting in the ARPA-Internet. This specification is a major
revision of RFC-988; changes from RFC-988 are listed in an
Appendix."
o IDEA0016-00.TXT - `TELNET LOCALEDIT OPTION', Dave Borman (Cray Research)
From the document:
"This RFC describes a proposed standerd for doing Line mode
TELNET. It has unlimited distribution for discussion pur-
poses. After the first round of discussion, values for the
options will be requested from the NIC.
With increasing TELNET usage, it has become apparent that the
ability to do command line processing on the local machine and
send completed lines to the remote machine is a feature neces-
sary in several environments. First, in the case of a connec-
tion over long delay equipment, it is very frustrating to the
user to have the echoing of his data take several seconds.
Second, some supercomputers, due to their nature, are not good
at handling and processing single character input. For these
machines, it is better to have the front end computer do the
character processing, and leave the supercomputer's cycles
available for doing vectorized number crunching.
After examining several implementations, it has become clear
that the correct thing to do is to implement new options to
enhance the current TELNET specification so that it can sup-
port local line editing in a reasonable, reliable, and con-
sistent manner."
o IDEA0017-00.TXT - `ISO Presentation Services on top of TCP/IP-based
Internets', Marshall T Rose (The Wollongong Group)
From the document:
"[RFC1006] describes a mechanism for providing the ISO tran-
sport service on top of the Transmission Control Protocol
(TCP) [RFC793] and Internet Protocol (IP) [RFC791]. Once this
method is applied, one may implement "real" ISO applications
on top of TCP/IP-based internets, by simply implementing OSI
session, presentation, and application services on top of the
transport service access point which is provided on top of the
TCP. Although straight-forward, there are some environments in
which the richness provided by the OSI application layer is
desired, but it is nonetheless impractical to implement the
underlying OSI infrastructure (i.e., the presentation, ses-
sion, and transport services on top of the TCP). This memo
describes an approach for providing "stream-lined" support of
OSI application services on top of TCP/IP-based internets for
such constrained environments."
o IDEA0018-00.TXT - `System Load', Inder Sidhu, N Arunkumar (Bridge
Communications)
From the document:
"Loading files for software distribution is a frequently per-
formed function that falls under the purview of network
management. This RFC proposes a standard to perform this func-
tion for the Internet community, and requests discussion and
suggestions. It is one of a set of RFCs created by the NETMAN
working group of the IETF for management of the TCP/IP Inter-
net. This draft version of the RFC is being submitted as an
IDEA. It contains two proposals, of which only one is to be
adopted and included in the final RFC.
Nodes on a network may require a portion of their local
address space to be loaded using information held on a remote
node. Standardized mechanisms to achieve this functionality
are desirable in multi-vendor networks. This RFC proposes a
standard to be used for performing system load. Heterogeneous
systems that use the standard can then load each other.
The standard proposed here derives from the IEEE 802.1 System
Load Protocol [9]. The RFC, however, also takes into account
previous work in the Internet community in this area
(BOOTP/TFTP, etc. [2, 3, 8]). As far as possible, compatibil-
ity with the past is maintained, and future ISO orientation is
pursued."
o IDEA0019-00.TXT - `Multi-Homed Hosts in an IP Network', J. Lekashman (NASA
Ames GE)
From the document:
"A multi-homed host is a computer system which has more than
one network interface. It is distinguished from a gateway in
that the requirements placed upon a multi-homed host are for
servicing requests for network resources with itself as desti-
nation or source, whereas the requirements placed upon a gate-
way are for servicing transit traffic.
This is not to conclude that a given computer system cannot
have both gateway and multi-homed host characteristics. The
characteristics of a gateway are outlined in RFC 1009 [1].
This is intended to show that configuration requirements are
for multi-homed host and gateway behavior are different, and
how this should be handled by a host. Some of the ideas
presented are applicable to gateways also, especially in the
area of multiple interfaces on the same network."
o IDEA0020-00.TXT - `Comparison to the DEC IS-IS Proposal', J. Moy (Proteon)
From the document:
"The Open SPF-based Internal Gateway Protocol (OSPFIGP) is an
internet routing protocol currently in the design stage. It
will draw on existing SPF routing technology, notably the work
done by BBN for the Arpanet and the DEC IS-IS ANSI pro-
posal. We will refer to the DEC IS-IS ANSI Proposal [DEC]
as the ANSI proposal throughout this paper. Since both the
OSPFIGP and the ANSI proposal are IS-IS routing protocols
they will be quite similar. This paper describes the expected
differences between the two protocols. We assume the reader
is familiar with the ANSI proposal."
o IDEA0021-00.TXT - `EGP and Policy Based Routing in the New NSFNET Backbone',
Jacob Rehkter (IBM)
From the document:
"The NSFNET backbone routes packets between the Regionals
Networks to which it is connected, i.e., the packets arriving
at a backbone entry node are routed to an exit node. How they
travel through the network is determined by two components:
the NSFNET backbone routing protocol/algorithm and
additional information about the externally connected
networks
This paper is concerned with how reachability information
between the external networks and the NSFNET backbone
is exchanged so that packets can be routed to the correct
destination by using a reasonable path."
o IDEA0022-00.TXT - `The NSFNET Routing Architecture', Hans-Werner Braun
(MERIT)
From the document:
"This document describes the routing architecture for the
NSFNET centered around the new NSFNET Backbone, with specific
emphasis on the interface between the backbone and its
attached networks. It reflects and augments thoughts
described in (1), discussions during the Internet
Engineering Task Force meeting at the San Diego
Supercomputing Center in March 1988, discussions on mail-
ing lists, especially on a backbone/regional network working
group mailing list, and a final discussion held at the IBM
T.J. Watson Research Center in Yorktown, NY, on the 21st of
March 1988. The Yorktown meeting was attended by
Hans-Werner Braun (Merit), Scott Brim (Cornell Univer-
sity), Mark Fedor (NYSERNet), Jeff Honig (Cornell Univer-
sity), and Jacob Rekhter (IBM). Thanks also to them, Milo
Medin (NASA), John Moy (Proteon) and Greg Satz (Cisco) for
discussing this document by email and/or phone.
Understanding of (1) is highly recommended prior to read-
ing this document."
o IDEA0023-00.TXT - `Structure and Identification of Management Information
for TCP/IP based internets', Marshall T. Rose, Keith
McCloghrie (both of The Wollongong Group)
From the document:
"This memo describes the common structures and identification
scheme for the definition of management information used in
managing TCP/IP-based internets. Included are descriptions of
an object information model for network management along with
a set of generic types used to describe management informa-
tion. Formal descriptions of the structure are given using
Abstract Syntax Notation One (ASN.1) [1].
This memo is largely concerned with organizational concerns
and administrative policy: it neither specifies the objects
which are managed, nor the protocols used to manage those
objects. These concerns are addressed by two companion memos:
one describing the Management Information Base (MIB) [2], and
the other describing the Simple Network Management Protocol
(SNMP) [3].
This memo is based in part on IETF IDEA 13, Structure and
Identification of Management Information for the Internet [4].
This memo uses a skeletal structure derived from IDEA 13, but
differs in one very significant way: IDEA 13 focuses entirely
on the use of OSI-style network management. As such, it is
not suitable for use in the short-term for which a non-OSI
protocol, the SNMP, has been designated as the standard."
o IDEA0024-00.TXT - 'Management Information Base for Network Management
of TCP/IP-based internets', K. McCloghrie, M.T. Rose
(both of The Wollongong Group)
This document proposes a standard for the Internet community.
From the document:
"This memo provides the initial version of the Management
Information Base (MIB) for use with network management proto-
cols in TCP/IP-based internets in the short-term. In particu-
lar, together with its companion memos which describe the
structure of management information along with the initial
network management protocol, these documents provide a simple,
workable architecture and system for managing TCP/IP-based
internets and in particular the DARPA/NSF Internet.