Notable Computer Networks
Notable Computer Networks
A computer network is a set of computers using com- any one network, such as legal and social issues, and
mon protocols to communicate over connecting we conclude with a historical perspective on the
transmission media. To warrant inclusion in this ar- development of networks.
ticle, a network must provide at least mail or news
service to its users and interconnect to other net- CHARACTERISTICS OF
works that provide such services. COMPUTER NETWORKS
Among these networks are long-haul (or wide-area)
Purpose, Administration, and Funding
networks that can encompass continents. There are
In our taxonomy, there are five basic kinds of net-
also internets of smaller networks communicating
works:
with one another through the same protocols. The
internets of interest here include long-haul networks 1. Research Networks. Many of the earliest com-
as constituents, and most also include local-area net- puter networks were designed and implemented as
works (LANs). The computers connected can be research in computer networking. There are still a
small microcomputers, supercomputers, or anything number of networks that are either themselves re-
between. Multiple interconnection media can be search projects or are administered in support of
used, including coaxial cable, optical fiber, satellite other research. The ARPANET is the best-known
links, twisted pair, or telephone lines. The protocols example. Such networks are usually administered
can vary widely in speed, reliability, and general by government agencies or contractors, and sup-
functionality. The services provided can range from ported by government grants. Their users and host
the most basic mail service to distributed file sys- machines do not ordinarily pay directly for services.
tems and remote procedure call capability. A similar Because of their goals and the nature of their fund-
diversity applies to ownership, funding, administra- ing, access to these networks tends to be limited to
tion, addressing, and other characteristics. Together, researchers participating in the funded work.
these networks form a metanetwork (sometimes There are also a number of military networks,
called Worldnet) that is used daily by many commu- mostly either of the same technology or closely in-
nities of interest throughout the world. teroperable with certain research networks. In fact,
This article is primarily concerned with describing many of the research networks had as one of their
specific networks. Various characteristics are given goals the eventual development of corresponding
for each of them, where information was available. military networks. The best-known example of this
We also discuss some topics that are broader than sort of pairing is ARPANET and MILNET, which are
‘c 1986 ACM ~lOO~-078E/8G/1000-0932 7% closely allied in the ARPA Internet. Because of these
Contents
CHARACTERISTICS tiF COMPUTER NETWORKS .... 932 ROSE ........................... 950
Purpose, Administration, and Funding. ............ 932 COMPANY NETWORKS. ............ .,.. 951
Layers, Protocols, and Services ................... 934 Xerox Internet. ................... . . 951
Layerir7g Models. ............................... 934 DEC’s Easynet .................... ,. 951
Applicatiot7 Protocols. ........................... 935 IBM’s YNET. ..................... . . 952
Presenfafiorr at7d Sessio77Profocols ................. 937 AT&T.. ......................... ... 953
Trausport a77dlnter77et Protocols. .................. 937 COOPERATIVE NETWORKS ......... .... ...* 953
Network Profocols .............................. 937 BITNET ......................... .. . . . 953
Hardzoare ..................................... 937 BITNET i17the Uf7ifed States. ....... ,.. . 953
Speed and Reliability ............................ 937 NETNORTH .................... .. . . . 955
Naming, Addressing, and Routing ................. 938 EARN .......................... . . . 955
Don7air7s ...................................... 939 FidoNet .......................... . . 955
SourceRoutir7g ................................. 939 ACSNET ......................... .. . . . 956
Aftribute Lists ................................. 939 UUCP.. ......................... ... . . .. 957
Gateways.. ................................... 941 USENET ......................... . ... 958
SizeandScope .................................. 942 EUnet ........................... . . 959
Access ......................................... 942 SDN ............................. , . 961
RESEARCH NETWORKS .......................... 942 JUNET .......................... , . . 962
ARPAInternet ................................. 942 METANETWORKS ................. . . . 963
ARPANET .................................... 943 CSNET .......................... . 963
MILNETIMINET. .............................. 944 NSFnet .......................... . . 963
Other ARPA Z77ter77efNetworks. ................... 944 National Research Internet. ........ , . . 964
CSNET ........................................ 944 RARE ........................... .., .. 964
Pho77enet ..................................... 945 Pacnet ........................... .. . 964
X25NET ...................................... 945 AUSEAnet ....................... , 964
ARPANET .................................... 945 BULLETIN BOARDS AND NETWORKS .. . . 964
Cypress ....................................... 945 Commercial Networks. ............ ... 965
MFENET ...................................... 945 Conferencing Networks. ........... .., 965
SPAN ......................................... 946 SOCIAL AND LEGAL ISSUES ........ .. . , 966
MAILNET ..................................... 947 Networked Communities .......... .,* . 966
JANET ........................................ 947 Techtrical Groups. ................ * 966
EAN(X.400)Networks ........................... 948 Social Groups .................... . . 5 967
CDNnet ...................................... 948 Social Effects 1.................... I 967
European EAN Networks. ........................ 949 Legal Issues ...................... . . 967
SMARTIX/COSAC .............................. 949 HISTORY .......................... .. 967
DFN ........................................... 950 BIBLIOGRAPHIC NOTES ............ 968
the ARPANET and the ARPA Internet [8], as well as The protocol suites discussed above were designed
on related early network efforts such as CYCLADES with the assumption of dedicated links between net-
[z?]. The ARPANET originally had three basic lay- work nodes. There are other protocols, such as
ers: network, transport, and process/applications, UUCP and Fido, that were designed for use with
plus the network hardware. The ARPA Internet adds intermittent connections. These will be discussed
a fourth, internet layer, for which the IP (internet) below in sections on the networks that use them,
protocol is used. (There is also a physical layer, and along with other protocols for dedicated connections.
some descriptions distinguish a link layer plus a util-
ity layer that is similar to a combination of the IS0 Application Protocols. The types of services (applica-
presentation and session layers.) IS0 has also re- tion protocols) provided by the various networks
cently adopted an internet sublayer of the network vary widely, but they tend to fall into recognizable
layer that strongly resembles IP. The two most com- classes.
monly used transport protocols in the ARPA Internet Electronic mail is the most widespread and the
are transmission control protocols (TCPs) [53] (reli- most rudimentary. It allows a user to send a message
able connections) and uniform datagram protocols to another user on either the same or a different
(UDPs) [83] (datagrams). There is contention be- host. The message is placed in the recipient’s mailbox
tween the proponents of the IS0 Reference Model on the destination host. Mail is typically a one-to-
(ISORM) and the ARPANET Reference Model (ARM) one point-to-point communication medium, though
or ARPA Internet Reference Model [8]. The IS0 pro- it is possible to mail to more than one recipient at
tocols expect virtual circuits at the network layer, the same time. Most networks implement mail in a
whereas the TCP/IP suite makes more use of data- batched, asynchronous manner, with errors being
grams (IP is a datagram protocol). (This is an exag- reported by mail messages from a mail daemon pro-
geration for pedagogical purposes of the true situa- cess. Ordinarily, anyone can send mail to anyone
tion.) Table I shows some of the differences in with computer access.
layering as well as the layers used in a networking File transfer (sometimes known as FTP or FTAM) is
implementation in the 4.3BSD version [73] of the probably the second most common service. It allows
UNIX operating system. files to be transferred from one host machine to an-
There is a third major protocol suite called Xerox other. Since data formats vary widely among operat-
Network Services (Xerox NS) (see the “Xerox ing systems and machine types, there are usually
Internet” section), having layers that are similar several file transfer formats supported. The most
to both of the above models. There are also the generally usable one is ASCII text. The user initiat-
Coloured Book protocols, which are primarily used ing a transfer must have read access on the source
in the United Kingdom in JANET. For the purposes file and write or create access on the destination file
of this article, the four layers-network, internet, or directory.
transport, and applications-are at about the right Remote command execution (a special case of which
level of detail. is Remote Job Execution or RJE) facilities are pro-
Application
User programs telnet, ftp, named, time,
Process/
Presentation and libraries rlogin. or rep rwho, or talk
Applications
Session Sockets SOCK-STREAM SOCK-DGRAM
Transport Transport TCP UDP
Protocols
Network Internet IP
(Internet)
Network Ethernet
Network
Data link interfaces driver
Network lnterlan
Physical Physical
hardware controller
vided about as frequently as file transfer. They allow are some complications because different systems
a user to execute a command on a remote machine. expect different terminal types, and some networks
There are usually either strong permission checks or distinguish remote terminal access from host-to-host
a sharply limited set of commands that can be exe- remote logins. Permission checks are usually similar
cuted. to those for access by a direct terminal line.
Remote login is the simplest service in concept, Computer conferencing systems are message ex-
though many networks fail to provide it. It allows a change systems that are generally similar to elec-
user to access a system on a remote host over a tronic mail systems, but differing in that they are
network as if connected to a direct terminal. There many-to-many (or broadcast) rather than one-to-one
TABLE II. Characteristics of Some Notable Networlrs (see Table Ila for an explanation of the symbols used here)
Research networks
ARPA Internet USA 3,8 2,050 ? i T lfmno 56,000,m,9
ARPANET WA .1,1 150 ? a T Ifmo 56,000,m,9
MILNET USA ‘2,3 400 ? a 7 lfmo 56,000,m,9
MINET Europe ‘..I,4 -? ? X T lfmo 9600,m,8
CSNET USA 4,lO 170 ? i c m 1200,h,8
Phonenet USA :‘4 $26 ? d M m 1200,h,7
X25NET USA * I. )_ 38 ? X / f Ifm 9600,m,8
ARPANET (CSNET hosts) USA I’.( $,I ,25 ? I f lfmo 56,00O,m,Q
Cypress IJSA ” :+. ; 1 ,: 6 ? P T lfmo 9600,m,9
NSFNET USA ” , i,l +‘. 65 ~? i .T lfmo Tl ,m,9
MFENET USA ’ i,4. 120 ? i 0 fm 56,000,?,?
SPAN USA : I.? ‘100-b ? Px 0 fm 56,000,m,8
MAILNET USA 2,i? 28 1,800 UxiM m 1200,h.Q
JANET X IB lfmo 4800,?,?
EAN networks Europe ; 3.t2 33 ? X x m 24OO,m,Q
CDNnet Canada j n:s 1,1 32 ? X j x lmno 24OO,m,9
, ),
COSAC France i 1.2 27 ? X * x fmn 1200,d,7
DFN Germany ’ j ,I.,% , 6 ? X , x fm 9600,?,?
_’
Company networks
Xerox Internet USA : ;s,d 1 ? ,,‘K&OOO- i ‘N lfmo 56,000,h,9
Xerox RIN USA .. 1 ? 4,000 i ,. NPT lfmo 56,000,h,9
Xerox CIN USA -- 4 .?.’ 8,000 i : N lfmo 56,000,h,9
.(
DEC’s Easynet USA ., : .,4,20? iq,ooo+ SO,OQO? d iR lfmno 56,00O,m,Q
IBM’s VNET USA : ,_4,? 2,200 ? fmo 96OO,h,9
Cooperative networks
BITNET ? fmo 9600,h,8
BITNET ? fmo 9600,h,8
NETNORTH fKl0 960O,h,8
EARN fmo 9600,h,8
Asianet fm0 9600,h,8
FidoNet m 1200,d,4
ACSNET fmno 1200,h,9
UUCP mail m 1200,d,5
USENET news n 1200,-,7
EUnet lfmno 1200.h.8
SON lfmno 2400,d,8
JUNET mn 2400,d,8
media. Usually one copy of a message is kept per tion of one of the main networks on which they are
host rather than one per user as for mail. Though used.
some conferencing systems are synchronous and im-
Network Protocols. There is not sufficient space
mediately interactive, most of the ones mentioned in
to discuss network layer protocols at any length.
this article are batched and asynchronous, since
Tables IIa and IIb indicate which ones are used by
they are distributed over wide areas. USENET news
which networks.
and bulletin-board systems are examples of this kind
of system. (See the “Bulletin Boards and Networks” Hardware. The main concern with hardware from
section.) our perspective is the speed and reliability it can
Some networks support sophisticated services confer on any particular network.
such as remote procedure call, distributed databases,
or network file systems. Most of these work best on Speed and Reliability
fast networks, however, and most long-haul net- It is difficult to find metrics of speed and reliability
works are not fast enough. Such services are not that can be applied to a range of networks as diverse
widely supported on the networks we discuss. as that covered in this article. It is even more diffi-
cult to get enough information to apply such metrics.
Presentation and Session Protocols. The IS0 model
We provide a few ad hoc measures and do not pre-
distinguishes a presentation layer and a session
tend to treat this topic in depth. For reliability, we
layer. These are of more concern to programmers
use a subjective scale from 1 (worst) to 10 (best). For
than to users of the networks, and many of the net-
speed, we use two measures: bits per second (bps)
works we discuss do not distinguish such layers
and average time of delivery of mail.
clearly. We thus have little to say about them.
Though many internets may include ethernets,
Transport and lnternet Protocols. There are a number ring networks, or other fast local-area networks, we
of protocols that are used either on more than one use bps for the most common long-haul links be-
network or on large, significant networks. We pro- tween widely separated hosts. By “most common”
vide a few details on such protocols in the descrip- we mean most likely to be used in ordinary commu-
nications, not most commonly implemented. If a net- SALLY.UTEXAS.EDU a further subdomain (in this
work had many 9,600-bps links and one Tl micro- case, SALLY.UTEXAS.EDU is a host machine). The
wave link, and most traffic used the latter, we would user interface software on machines in the
list the Tl speed. UTEXAS.EDU domain may allow users to abbreviate
The average time for delivery of mail varies so SALLY.UTEXAS.EDU as SALLY. However, there
much even within networks that we list only three could be another host named SALLY.CSS.GOV, in
values: which case the abbreviation SALLY on hosts in the
domain CSS.GOV would not refer to the same host
l minutes, indicating a delivery time of less than an as in UTEXASEDU.
hour; The address 10.2.0.62 is actually a two-level ARPA
l hours, indicating a delivery time of at least an Internet address. The prefix 10 is the network num-
hour, but less than a day; ber of the ARPANET, and the rest (the local part) is
l days, indicating a delivery time of at least a day. a host number on the ARPANET. The local part can
be mapped to a network address by different meth-
We also record whether a network consists mostly of ods for different networks. In this particular case,
dial-up telephone links or of dedicated links. the network address is actually contained in the
Internet address, and there is a further hierarchy in
Naming, Addressing, and Routing the host address. The final 62 is the PSN number,
These three related terms, which are important to and the rest is the host-on-PSN number.
networking, are often confused [46, 771. The name of Routing in the Internet is also hierarchical: First a
a host, mailbox, or other resource is what a user route is found to the appropriate network through
uses to indicate the resource desired. Its address gateways (by the Gateway to Gateway Protocol
specifies the location of the resource to the network (GGP) [33] and the Exterior Gateway Protocol (EGP)
software. A route is used by the network software to [54, 76]), then a route is found to the appropriate
determine how to get to the resource. In the public host on the network (by protocols appropriate to the
switched telephone network, a name is a personal network). In the ARPANET, the latter problem re-
name, such as Jane Doe, an address is a telephone duces to finding the host’s PSN, the number of
number, and a route is a sequence of telephone lines which is encoded in the address. For an address on
and exchanges that are used to reach Jane’s number an ethernet (e.g., 128.83.138.11), finding the appro-
from the caller’s telephone. priate host is usually simpler since ethernets are
Consider hosts on the ARPA Internet. A host broadcast networks. (Ethernet (capital E) is a specific
might be named SALLY.UTEXAS.EDU and have an Xerox protocol used for LAN, whereas an ethernet
Internet address of 10.2.0.62. The address would be (small e) refers to an Ethernet-like network.)
discovered by the software on the user’s machine There are two kinds of routing: source routing,
(either by old-style static host table lookup or by where the user supplies the route to the desired
new-style domain nameserver protocols). The IP pro- resource, and system routing, where the network soft-
tocol would then use the address to route the packet ware determines a route. Most networks and inter-
to the appropriate network. The network named by nets provide system routing [26]. There are a few
the address 10.2.0.62 is network 10, the ARPANET. exceptions, most prominently UUCP. The metanet-
The ARPANET has a communications subnet of work of differing networks and internets frequently
computers called Packet-Switch Nodes (PSNs) to requires source routing to reach the appropriate net-
which hosts are attached. The PSNs then extract an work because there is as yet no universally accepted
ARPANET address (host 2 on PSN 62) from the IP network addressing convention. Source routes like
address and use it to determine a route to the desti- “alpha!beta%gamma@delta” are thus unfortunately
nation PSN and thus to the destination host. Note still common.
that names and addresses are relative to network A resource may have more than one name,
protocols. The IP address is treated as a name when address, or route. In the ARPA Internet,
the ARPANET address is extracted from it. Routing SALLY.UTEXAS.EDU might have two addresses,
is first done on the IP address and then on the 10.2.0.62 and 128.83.138.11, if it were connected to
ARPANET address. two networks. Though hosts in the Internet have
Naming, addressing, and routing can all be hierar- only one primary name, they may be known by
chical. SALLY.UTEXAS.EDU is an ARPA Internet other names on non-Internet networks. For instance,
domain name, where EDU is a top-level domain, SALLY.UTEXAS.EDU might be known as ut-sally on
UTEXASEDU a subdomain of EDU, and the UUCP network. It would be better if every host
had one name for all networks, but that is not yet administrator to run a program (pathalias) on a large
possible. Both the IP protocol and the ARPANET database of information about most of the hosts in
network protocol are datagram based, and different the network and which other hosts they connect to.
datagrams can pass through different routes to reach The result is a database of source routes from the
the same destination, even when the source is the local machine to all the machines that are in the
same. connectivity database. The local mail system uses
the source route database to convert addresses into
Domains. The ARPA Internet domain name system
routes.
is an attempt to decentralize administration of the
Problems with this scheme include the extrava-
mapping of host names to host addresses by the use
gant use of CPU time and disk space required to run
of nameservers, each of which controls part of the
pathalias and keep copies of the databases, plus the
name space [57, 59, 70, 711. This became necessary
fact that the connectivity database is published only
partly because the static host table formerly used for
once a month and is thus guaranteed to always be
that purpose had become unwieldy with the growth
out-of-date.
of the Internet and partly because most of the hosts
in the Internet are on networks local to particular Attribute Lists. Names and addresses can be either
organizations thus making it desirable to allow the absolute or relative. In the ARPA Internet, both In-
local administration to control that mapping. The ternet addresses and fully qualified domain names
domain name system also implements a hierarchical are absolute (within the Internet), but user mailbox
naming scheme and provides protocols for commu- names are relative to domain names. Most other net-
nication with the nameservers [55, 56, 58, 671. works have absolute names and addresses (again,
The British network JANET has a domain system UUCP is an exception).
similar to that of the ARPA Internet, but with the Relative names are a problem because they make
domains in the opposite order. The root is on the left mapping into addresses ambiguous. This is why
rather than on the right. The Australian network short names like SALLY are considered to be only
ACSNET also has an Internet-like domain name abbreviations for a single primary name such as
system. SALLY.UTEXAS.EDU; it is the responsibility of the
At a recent meeting, North American representa- local user interface to produce the primary name
tives of the ARPA Internet, BITNET, CSNET, and when communicating with any other host. Relative
UUCP decided to adopt the ARPA Internet domain addresses are a problem because a host may have a
naming syntax and domains as a common naming different address depending on where it is being ad-
syntax [68, 691. (The adoption is voluntary on a per- dressed from. Both relative names or relative ad-
host basis on UUCP and BITNET.) EUnet in Europe dresses leave open the possibility that two hosts
is moving in the same direction and has already might have the same address, which would make
registered several top-level national domains. JUNET proper routing impossible. Nonetheless, maintaining
in Japan already has a similar domain system. A absolute names is difficult, since absolute really
metanetwork, NSFnet, has also standardized on means relative to some standard, and there is no
TCP/IP and related protocols. Thus Internet do- universal standard. X.400 is one attempt to handle
mains may become the de facto standard, at least this problem.
in the United States. The UUCP network has not had absolute host
The IS0 X.400 mail standard also has a domain names or addresses. A single name (e.g., bilbo) may
system, which uses attributes. A resource is defined be assigned by several different companies to several
by a name and several attributes. Name conflicts can different machines. This may happen because a
be resolved by specifying sufficient attributes [39]. company was not connected to the general UUCP
There is a similar mechanism at the network level network at the time and thus was unaware of the
in X.175. conflict, or because a host was not originally ex-
The EAN networks use a simplified version of the pected to communicate with the world at large, or
X.400 system because there is as yet no registry for because the first bilbo was not listed in the UUCP
X.400 domains. map, or for other reasons.
Source Routing. Possibly the only widespread net- One method for disambiguating such conflicts is to
work without system routing is UUCP. Practically refer to each bilbo by a route from a well-known
everyone agrees that users should not have to supply neighbor (e.g., princeton!bilbo or ihnpJ!bilbo). These
source routes manually. The usual means of avoid- partial routes are a kind of attribute list in the X.400
ing this on the UUCP network is for the system sense. Of course, if someone names another host
“princeton,” or if Princeton leaves the network, a and usually have to be considered by the user when
longer or different partial route would have to be sending mail across such network boundaries. (Mail
given for that bilbo. This problem occurs with all is often the only service that can be used.) In some
attribute list schemes: Names and addresses are not cases, such gateways may not be known. In others, it
absolute. may not be possible to reveal them because of politi-
Another possible solution, now being worked on cal or economic considerations. Table III is a compi-
by a group called the UUCP Project, is to give each lation of likely mail routing syntaxes between some
UUCP host an ARPA Internet domain name, such as of the networks discussed in this article. However,
bilbo.princeton.edu. The former UUCP name would gateways are subject to change, and the nature of
still be used as a kind of network address. Routing the information makes it impossible to compile a
would be done from domain to domain, so network- table that will be accurate for very long. In particu-
wide tables would only be needed for routes to lar, addresses using a percent sign (W) to indicate
domain gateway hosts, and complete connectivity indirection through a relay host (a kind of source
information would only be kept on hosts within a routing) are a kludge that most people hope will
subdomain by those same hosts (similar methods are be temporary. A specification (RFC987 [45]) has
already used in EUnet). The UUCP network would recently been formulated for translation between
thus be integrated into the ARPA Internet domain ARPA Internet domain addresses and X.400 attribute
name system. This plan is opposed by some people addresses. Software now exists to do that translation
who actually like UUCP source routing. For an in- and also to translate between X.400 and EAN ad-
teresting discussion of related issues by a prominent dresses. When such software is in general use, per-
party on each side, see [l]. We should point out that cent sign source routing should no longer be neces-
source routing, attribute lists, and domain names are sary between those kinds of networks.
not mutually exclusive-at least not on the UUCP The user interface may even vary among systems
network. Each can be used in combination with the on the same network. The examples in Figure 1
others. (courtesy of Christian Huitema and Steve Kille) ad-
dress the same person.
Gateways. There are several related and somewhat User interface presentation (UIP) refers to the rep-
controversial terms related to machines that inter- resentation of an address to the user. The first three
connect networks. These include repeaters, bridges, examples are for networks whose internal naming
packet routers, relays, and gateways. Most of these formats use ASCII text and also are the same as the
operate below the upper layers of protocols and are UIP. The next five examples represent the same bi-
transparent to the users. Here we are concerned nary X.400 encoding, and the last two represent the
with gateways between networks with dissimilar in- same EAN address. The binary encoding of X.400
ternet layers. These usually work less well than addresses allows all networks that use it to commu-
gateways at lower layers, are often less transparent, nicate, but there is no single standard human-
readable text UIP. Confusion results from different l Finally, a site is a place (such as a building, com-
user interface software, from differing addressing pany, or campus) where a group of network nodes
syntaxes peculiar to specific networks, from at- is located. However, the term has a more specific
tempts to represent one network’s syntax in anoth- meaning in CSNET, whereas UUCP, USENET, and
er’s, and from attempts to encapsulate one network’s EUnet users often use the word “site” to refer to a
syntax inside another’s host. To avoid confusion, the latter usage does not
The moral of all this is that there is no magic occur in this article.
formula to get mail between any two points in
Most of the networks we describe have wide geo-
Worldnet. It’s a jungle with trails that may cross and
graphical extent, but the distribution of their hosts
conflict, lead to the wrong place, or become over-
(or users) is not uniform. Many of the internets con-
grown.
sist of many local-area networks connected by a few
long-haul networks. Thus the hosts cluster on the
Size and Scope
local-area networks, which themselves tend to clus-
It is difficult to find a single metric for size that is
ter. Most networks in North America have concen-
meaningful on all networks. The traditional unit
trations of hosts in Silicon Valley near San Fran-
is number of hosts. This is useful for networks
cisco, Route 128 near Boston, and in the Toronto
like ARPANET or CSNET, where most nodes are
area because computing-related companies in North
medium-size time-sharing systems and the exact
America tend to be concentrated in these areas. Pri-
number of users on each is hard to determine. Some
marily academic networks such as MAILNET and
networks consist primarily of workstations (Xerox
CSNET are widely dispersed, with nodes mostly at
Internet) or personal computers (FidoNet) where
academic institutions. USENET and UUCP have con-
there is usually one user per host (though many
centrations in New Jersey because of AT&T.
FidoNet nodes are bulletin boards that may have
many users). Others, such as BITNET and its rela-
Access
tives, consist mostly of large IBM and Digital Equip-
Networks generally have rules (or at least guide-
ment Corporation (DE(?) mainframes that are hosts
lines) controlling access to their services. In the de-
in the ARPANET sense, but have many more users
scriptions of the networks, we list a network admin-
per host. Also, the number of users who have access
istrator to contact for information regarding access
to a network is not usually the same as the number
guidelines and more detailed information about that
who actually use the network. Thus the number of
specific network whenever possible. For some net-
active mailboxes, for instance, may be interesting,
works, we have no published references to cite. In
but is usually hard to determine.
many such cases, someone associated with the net-
The most common unit of measurement we use in
work’s administrative organization was the source.
this article is number of hosts. Where possible, we
also give number of users or such other measures as
RESEARCH NETWORKS
we can find.
It is useful to distinguish several common terms as ARPA Internet
used herein: The ARPA Internet is an internetwork of several
networks all running the TCP/IP protocol suite [51],
l A machine is a computer of any size.
connected through gateways, and sharing common
l A system is a computer system of any size; this name and address spaces [8]. The ARPANET is the
term is usually used synonymously with machine. oldest of the networks in the ARPA Internet. Both
l A node is any vertex of a graph representing a are named after the Defense Advanced Research
network, that is, any machine (or system) on a Projects Agency (DARPA), which is part of the U.S.
network. Department of Defense. DARPA (formerly known as
l A host is a network node that has resources of its ARPA) has long been a major sponsor of networking
own (such as disks, user mailboxes, or user ac- research.
counts). A host is not a node (such as an X.25 PAD Internet with a capital 1 refers to a specific inter-
or an ARPANET TAC) used only to connect across net, usually the ARPA Internet, whereas internet
the network to other nodes. Nor is a host a gate- with a small i can refer to any internetwork. (There
way. A single machine or system may serve both is also the Xerox Internet, which uses different pro-
as a host and as a gateway, however. tocols and may be older.) Other networks, such as
BITNET, UUCP, EUnet, and ACSNET, are not part of
DEC is a trademark of Digital Equipment Corporation the capital-l Internet. CSNET is a special case: Part
of it is part of the ARPA Internet, and part of it is However, there are probably more than 2000 hosts
not. and tens to hundreds of thousands of users. There
The ARPA Internet exists to facilitate sharing of are special nodes called TACs (Terminal Access
resources at participating organizations and collabo- Controllers) on both ARPANET and MILNET whose
ration among researchers, as well as to provide a only function is to allow terminals (perhaps via dial-
testbed for new developments in networking. Practi- up modems) to reach other hosts in the Internet.
cal coordination of the entire Internet is provided by Every Internet host is supposed to support a com-
the Network Information Center (NIC) at SRI Inter- mand called whois that can be used to look up direc-
national and the Network Operations Center (NOC) tory information. Failing that, it is possible to telnet
at Bolt, Beranek and Newman (BBN). to SRI-NICARPA and type WHOIS. That host is run
The two main backbone networks of the Internet, by the NIC.
ARPANET and MILNET, are funded mostly by gov- A great deal of information can be obtained by
ernment grants. The campus area networks are anonymous FTP (login anonymous, password guest)
mostly funded by local organizations. There are in from SRI-NICARPA, particularly from the files in
general no per-user or per-message charges. Services the (NETINFO) directory. The specifications for
include remote login (telnet), file transfer (FTP), most Internet protocols are on-line in documents
mail (SMTP), and numerous other smaller services called RFCs (Request for Comments) in the (RFC)
(date, time, system status, Internet directory, etc.). directory ([83]; see especially RFC980 [41]). Most of
ARPANET and MILNET hosts are all connected to a the major Internet protocols have their actual speci-
subnet of PSNs, which are then connected to each fications in Military Standards for DOD lnternet Proto-
other over 56,000-bps dedicated lines, plus a few cols [53]; most relevant RFCs and MIL-STD docu-
satellite links (e.g., to Hawaii). PSNs were formerly ments are collected and published in the 1985 DDN
known as IMPS (for interface message processors). Protocol Handbook [82]. Many RFCs related to mail
Reliability is usually very high, but may suffer dur- and domains have also been posted to the USENET
ing implementation of new capabilities (e.g., during newsgroup comp.doc.
the implementation of the domain name system).
Speed suffers during peak periods, and telnet can be ARPANET. Implementation of the ARPANET began
painful then, but mail always gets through in a rea- in 1969 [15, 521. ARPA administrators noticed that
sonable amount of time, usually in minutes. their contractors were tending to request the same
The old top-level domain (ARPA) is temporary and resources (databases, powerful CPUs, graphics facili-
will vanish soon. Many hosts are already registered ties, etc.), and decided to develop a network among
in the new domains, which are the contractors that would allow them to share such
resources. This network demonstrated the viability
COM-commercial organizations; of long-haul packet-switched computer networks. It
EDU-educational organizations; worked so well it had developed into a research
GOV-civilian government organizations; utility (run by the Defense Communications Agency,
MIL-Department of Defense; or DCA) by the end of 1983, when it was split into
NET-administrative organizations for networks MILNET, a production military network, and ARPA-
such as CSNET, UUCP, and BITNET; NET, which reverted to research. In addition to the
ORG-other organizations. original goals of networking research and resource
Several networks may be in the same domain (as at sharing, researchers almost immediately began using
large universities), and a single network may have the network for collaboration through electronic
hosts in several domains (as does the ARPANET). mail and other services.
There are also domains for countries, such as UK for Policy is set by DARPA and executed by the De-
the United Kingdom and AU for Australia. There are fense Data Network Project Management Office (see
many people outside the United States (and some the “MILNET/MINET” section). The network is
within) who claim that all of COM, EDU, GOV, etc., funded by DARPA and other government agencies.
should be under a top-level domain (U.S.). There were several versions of the early NCP (for
ARPANET and MILNET have about 150 and 400 network control protocols) and several early versions
hosts, respectively. There are also numerous net- of TCP, but since 1983 the network has used the
works at universities and private companies that are fourth version of the TCP/IP protocol suite above
part of the Internet. Since many of the hosts on such the PSN network layer (known as BBN 1822 after the
local networks are known only to their parent orga- report that describes it). Most of the links between
nizations, the real size of the Internet is hard to judge. PSNs are 56,000-bps leased lines. Response is quick
(except at peak load periods) and reliability is high. some that still run NCP. The main DOD network
The name of the network is ARPANET; the name uses switched TELETYPE messages. TCP/IP mili-
of the Internet is the ARPA Internet (not ARPANET tary networks other than MILNET and MINET in
Internet). There is also an Internet domain ARPA for DDN are DISNET (Defense Investigative Network),
hosts on the ARPANET and related networks, but SCINET (Sensitive Compartmented Information
that domain exists only to ease the transition to the Network), and WINCS (WWMCCS Intercomputer
real domains (COM, EDU, etc.), and will soon vanish. Network Communication Subsystem-WWMCCS
There are about 150 ARPANET hosts, all in the stands for World Wide Military Command and Con-
continental United States. Access to the ARPANET trol System). There are local networks in the Inter-
is officially limited to organizations doing research net at military installations such as the Ballistics
funded by federal money [17]. Most potential users Research Laboratory (BRL).
will find it more productive to contact CSNET. Canada has the military network DRENET, which
is an ARPANET-like PSN/TCP/IP network and is
MlLNET/MINET. MILNET is a long-haul military
connected to the ARPA Internet.
network that was built using the results of the
ARPANET research. It split from the ARPANET in Ofher ARPA Internef Networks. There are several
October 1983, but is still connected to the ARPANET unusual networks in the Internet. SATNET uses geo-
by gateways at the internet l.ayer. These gateways synchronous satellites to provide paths between the
were originally intended to at least be able to limit east and west coasts of the United States that are
traffic between the networks to mail only. Currently faster than the usual ARPANET or MILNET land
they pass all traffic as if the networks had not been lines, and there are satellite links to Hawaii and
divided (except for a performance penalty). None- Norway. There are packet radio networks with
theless, their PSNs form two disjoint sets, and the nodes on mobile vehicles.
two networks could easily be separated if the need Many companies, schools, and government agen-
were to arise. More recently. the European nodes on cies have local networks that are part of the Inter-
MILNET have been separated into a network called net. These include ethernets, token rings, broadband
MINET, which is also connected by gateways. Al- networks, and ARPANET-style PSN networks. Some
though MILNET eventually adopts most successful Internet networks run the TCP/IP protocol suite on
products of networking research done on the top of X.25 on public data networks. There are even
ARPANET, it does not usually participate directly in point-to-point. connections over terminal lines, Hy-
such research, since it is intended to be a stable perchannel links, dial-up links, and Tl microwave
operational network and service disruptions are kept links. These point-to-point links are usually used to
to a minimum. connect higher speed networks. The speeds of such
ARPANET, MILNET, and MINET are the main local networks may thus vary from 1,206 bps to Hy-
constituents of the Defense Data Network (DDN), perchannel speeds or higher.
which is a subset of the ARPA Internet and consists Many campus-sized organizations actually have
of networks that are directly managed by the De- several local networks. Since there is no need for
fense Data Network Program Management Office people outside of the local organization to know the
(DDN PMO), an Office of the Defense Communica- details of such internal networking arrangements,
tions Agency (DCA). Funding is by the U.S. Depart- and since there is also a limit on the number of
ment of Defense (DOD). MILNET uses the same pro- networks that the Internet core gateways can han-
tocols as ARPANET, except MILNET has not yet dle, many organizations arrange that their networks
adopted domain nameservers and still uses static appear logically as a single network to the rest of the
host tables for host name to address mapping. Internet, with subnets that are known only locally
MILNET PSNs are connected by 56,000-bps leased [W
lines like ARPANET PSNs, but MINET hosts are con- To be part of the Internet, a network must run the
nected by 9,600-bps links and reliability is lower. TCP/IP protocol suite and be connected (perhaps
The gateways between MILNET and ARPANET are indirectly through another network) to one of the
currently overloaded and form a severe bottleneck. backbone long-haul Internet networks. Most are con-
Better gateway machines are expected to be in- nected to either ARPANET or MILNET (but seldom
stalled soon, There are about 400 hosts, most in the to both).
continental United States, with some in Hawaii and
Europe (the latter on MINET). There is a classified CSNET
segment of MILNET in addition to the readily acces- The purpose of CSNET is to facilitate research and
sible part. Access is determined by the DOD. advanced development in computer science by pro-
There are other classified networks, including viding a means for increased collaboration among
those working in the field [12, 201. The developers of CSNET CIC
CSNET noticed that electronic mail was the most [email protected]
popular service on the ARPANET. They proposed a BBN Laboratories, Inc.
network to provide electronic mail only and used it 10 Moulton Street
to connect institutions that did not have ARPANET Cambridge, MA 02238
access to those that did. CSNET is currently a logical
Phonenet. Phonenet is a dial-up star network of
network consisting of several physical networks, but
about 128 hosts. A central relay computer (CSNET-
serving a single community. All parts of CSNET are
RELAY) at CSNET CIC polls hosts on the network at
administered by a Coordination and Information
mutually agreed upon times. Most such links are
Center (CIC) at BBN in Cambridge, Massachusetts [3].
over 1,200-bps telephone lines, but 2,400-bps service
The network has been self-supporting since 1985,
has recently been installed, and some connections
though initial funding was provided by a grant from
are over public X.25 links. The software used to
the NSF starting in 1981. Annual dues are collected
manage the connections is called MMDF2, though
from member organizations with rates set according
many sites use PMDF, a Pascal subset of MMDF,
to several classifications (usually either academic or
combined with sendmail or the VMS mailer.
industrial).
The only service supported on all the parts of X25NET. X25NET uses X.25-based public data net-
CSNET is mail, transferred in ARPA Internet works to support TCP/IP links. Because the TCP/IP
RFC822 format. But CSNET has in fact become a protocol suite is used, additional services such as file
metanetwork built up of several parts that vary in transfer and remote login are provided. The use of
their additional services, lower level protocols, that protocol suite also allows many of these hosts
speed, reliability, and other qualities. Some of these to be integrated into the ARPA Internet directly, if
parts do support remote login, file transfer, and other approved by DCA. There are about 18 hosts on
services. With time, CSNET users began to realize X25NET.
that electronic mail alone was not enough. Though
old-style ARPANET syntax (e.g., user@host) is still ARPANET. About 25 hosts on the ARPANET proper
in use, CSNET is moving toward the new ARPA pay CSNET dues and are thus logically considered
Internet domain name syntax. part of CSNET as well as part of ARPANET and the
ARPA Internet. However, all hosts in the ARPA In-
The network is mostly confined to the United
ternet can be reached from any part of CSNET.
States and Canada, but has links to international
affiliates in Australia, France, Germany, Israel, Ja- Cypress. Cypress is an attempt to provide
pan, Korea, Sweden, and the United Kingdom. There ARPANET-like service to academic research depart-
are about 180 hosts in all, many of which serve as ments at a cost as inexpensive as Phonenet service
gateways to internal company networks or national [42, p. 2311. It will use TCP/IP over 9,600-bps leased
networks. Perhaps thousands of hosts on such inter- telephone lines. The nodes are called IMPlets, and
nal networks can be reached through CSNET. Mem- the first ones are small VAXes [50, p. 91. Unlike
bership is limited to organizations “engaged in Phonenet, Cypress will support file transfer, remote
computer-related research or advanced development login, and other Internet services in addition to mail.
in science or engineering.” Use of CSNET for com- Cypress will more resemble a tree network like
mercial gain is explicitly prohibited. BITNET than a star network like Phonenet, though
CSNET CIC runs a nameserver, which is a direc- there will probably be some redundant links.
tory database of CSNET users and sites. It can be
accessed by mail or by remote login (from those con- MFENET
stituents of CSNET that support remote login). The This network originated in the mid 1970s to allow
CSNET Info-Server allows retrieval of numerous access to a Cray 1 at Lawrence Livermore National
documents by mail, To get a description of the infor- Laboratories [42]. It has since grown, using several
mation available and how to get it, mail a letter to underlying network and transport protocols to sup-
[email protected] with text containing the following port access to more supercomputers. The basic pur-
lines: pose of the network is to connect physics depart-
ments doing research in nuclear fusion, specifically
REQUEST: INFO
in Magnetic Fusion Energy (MFE). It is funded and
TOPIC: HELP
administered by the U.S. Department of Energy
REQUEST: END
(DOE) and mostly managed from Lawrence Liver-
This information is also available over the ARPA more.
Internet via anonymous FTP from sh.cs.net. Mail, file transfer, remote command execution,
and remote login are all supported on at least parts interfaces. Much of the original hardware, such as
of the network. There are also specialized remote the routing center computers, came from NASA.
procedure calls for interactive graphics terminals. The upper layer protocols are DECNET (see the
Some of the links use DECNET@, while others use section on DEC’s Easynet). The lower layers are pro-
special-purpose protocols developed at Livermore. vided by NASA’s Program Support Communications
The use of nonstandard protocols has led to inter- Network (PSCN) and the NASA Packet-Switch Sys-
operability problems with other networks. Therefore, tem (NPSS). PSCN is a circuit switched network,
the DOE is considering moving MFENET to the that is, a collection of leased lines and microwave
TCP/IP protocol suite and perhaps eventually to the links. NPSS consists of X.25 links, some of them over
IS0 protocols. public X.25 networks. The backbone of the network
The existing links range from 9,600-bps to is four routing centers at the Goddard Space Flight
56,000-bps leased lines to 122,000-bps satellite links. Center in Greenbelt, Maryland, the Johnson Space
Speed between any two hosts depends greatly on the Center in Houston, Texas, the Jet Propulsion Labora-
intervening links. Reliability is high. Addressing in tory in Pasadena, California, and the Marshall Space
DECNET networks is discussed in the sections on Flight Center in Huntsville, Alabama. These are con-
DEC’s Easynet and SPAN. There are about 120 hosts nected by 56,000-bps links. Each router server is the
on the network, all in the continental United States center of a star of 9,000-bps links to the other insti-
except for one in Japan. Four supercomputers are tutions on the network. Reliability is becoming high.
reachable: a Cray 1, a Cray X-MP/B, a Cray 2, and a DECNET addresses consist of 16 bits, 6 specifying
Cyber 205. There are gateways to the ARPA Internet an area and 10 specifying a node within the area.
and possibly to other networks. Access is restricted Since there are only 64 possible areas, management
to DOE-funded researchers. of area numbers is very important. Within Easynet,
DEC’s DECNET-based company network, all area
SPAN numbers are in use; thus direct gateways between
Planning for SPAN (the Space Physics Analysis Net- Easynet and other DECNETs are problematic.
work) [28] began in 1980, and operations com- There are many DECNETs other than SPAN out-
menced in 1981. SPAN was originally oriented to- side of Easynet. They cooperate in assigning area
ward researchers in Solar Terrestial and Interplane- numbers, with SPAN management providing a
tary Physics, but is now expanding to serve other forum, especially for those networks interested in
disciplines. SPAN is a multimission, correlative data joining SPAN (ESA provides a similar forum in Eu-
comparison network serving projects and facilities of rope). A major task of SPAN’s routing centers is the
the American National Aeronautics and Space Ad- assignment of nodes to areas.
ministration (NASA) in collaboration with the Euro- There are currently more than one hundred hosts
pean Space Agency (ESA). These agencies have tra- connected directly to SPAN, all of them DEC ma-
ditionally set up data collection networks to serve chines. Outside of NASA, there are many participat-
specific space missions, but SPAN is mission inde- ing universities and laboratories, such as the Los
pendent, general purpose, low cost, and easy to con- Alamos National Laboratory. There are many LANs
nect to. (However, it is sometimes used to support indirectly connected to SPAN. Because other exist-
specific missions, such as the ICE mission to the ing DECNETs want to join SPAN, the total number
Giacobini-Zinner comet [75] and the encounter with of hosts is expected to reach five hundred within a
Comet Halley [27]). It is an operational network in year. There is a transatlantic X.25 link between
that it is not intended to promote the development Marshall Space Flight Center in Huntsville, Alabama,
of network technology, but it is a research network and ESA’s Operations Centre (ESOC) in Darmstadt,
in that it provides an infrastructure for space-related West Germany. A 9,600-bps link was installed in
research. It was not created in order to access super- September from Goddard to Germany, and one to
computers, but supercomputers are becoming more Japan is expected by the end of the year.
available through it. SPAN can be reached from TELENET, and there
Guidance for the network is provided by the users are gateways to BITNET and the ARPA Internet. Ac-
through the Data Systems Users Workers Group cess is limited to researchers in appropriate areas.
(DSUWG) and project scientists [29]. Direct adminis- For more information, contact
tration is done by project managers, network man-
SPAN Project Manager
agers, and routing center managers [30]. NASA pays
Code 633
for all the links, while other participating organiza-
NASA Goddard Space Flight Center
tions pay for their own host computers and network
National Space Science Data Center
DECNET is a trademark of Digital Equipment Corporation. Greenbelt, MD 20771
counted or an attempt is made to estimate the actual year grant that will terminate in 1988 [25]. The
number of connected hosts. There are about 915 grant includes support for ongoing research and de-
registered hosts including those on local-area nets, velopment, for the initial support of CDNnet, and for
but there are probably really about 1500 connected cooperation with a commercial organization (Sydney
hosts. There are only about 20 hosts directly on Development Corporation). CDNnet is to be self-
JANET. For access, contact sufficient by 1988. Annual dues will be collected
starting in 1987 with rates set according to the type
Network Executive of organization (e.g., educational, government, non-
Rutherford Appleton Laboratory profit, commercial) and according to the number of
Chilton CDNnet hosts at an organization. Organizations pay
Didcot the telecommunications costs for connections to
Oxfordshire, OX1 1 OQX other organizations. CDNnet does not have usage
England charges except to recover the costs associated with
For the Coloured Book protocols, contact JNT at the gateways and bridges to other networks.
same address. The EAN implementation conforms to CCITT and
IS0 specifications at the session (CCITT X.225, IS0
EAN (X.400) Networks 8327), transport (TPO: CCITT X.224, IS0 8072 and
There are several networks in Europe and elsewhere 8073), and network (X.25, PSTN, DECNET, etc.)
using the EAN implementation (first developed for layers. TTXP is also used as a network layer; it is
Canada’s CDNnet) of X.400 and other IS0 protocols. based on the specifications of CSNET’s MMDF.
They have an address format with a usual user pre- Mail is the basic application service provided.
sentation form that resembles ARPA Internet do- X.400 also provides receipt notification, which is
mains, but with an internal format of X.400 attribute widely used in CDNnet and in the other EAN-based
lists [16, 451. EARN is not an EAN network, but it networks. This is implemented in EAN as follows: If
will also migrate to X.400 (and other IS0 protocols) the sender requests this service, a receipt report will
by the end of 1987. This should be interesting, since be returned to the sender when the recipient dis-
BITNET in the United States is considering moving plays the body of the message. USENET news is
to the TCP/IP protocol suite (including RFC8.22 available on at least part of the network. There is a
mail). directory service for locating users of CDNnet and
other EAN-based networks. Remote login is avail-
CDNnef. CDNnet is available to workers in the Ca- able to hosts with X.25 service. EAN implementa-
nadian research, advanced development, and educa- tions exist for 4.2BSD, VMS, System V, and will
tional communities. It is autonomous of the Cana- soon be developed for VM/CM%
dian Department of Defense. The first intermachine Most long-haul links are X.25 at 2,400 bps, though
messages were exchanged on CDNnet in 1983 [43, they vary from 1,200 bps to 9,600 bps (the range
62, 871. The network currently uses the EAN imple- offered by the Canadian PDN Datapac). There are
mentation of X.400, although other X.400 software some leased lines. Mail delivery is usually accom-
may be approved as it becomes available. EAN was plished within minutes, and reliability is high.
and is developed at the University of British Colum- The CDNET address format is [email protected],
bia. Work was begun late in 1981 and tracked the where subdomain is composed of a list of one or more
standards work already in progress by IFIP and simple names separated by dots. This is actually the
CCITT. Sydney Development has the commercial format for presentation to the users. Internally, ad-
rights to EAN. The primary purpose of CDNnet dresses are represented in binary form as X.400 Ori-
is resource sharing and collaboration among ginator/Recipient names; the exact mapping is
researchers. likely to change with the next version of X.400, in
The network is administered by CDNnet Head- particular because of work on directory services,
quarters at the University of British Columbia, and though it is possible that the same presentation for-
by representatives at each member organization. mat will continue to be used. For messages from the
CDNnet policies are set by a Steering Committee outside world, the addressing is more complicated
representing its users. EAN development work has (see Table III).
been supported by grants from the Canadian Natural CDNnet has about 65 hosts, the busiest
Sciences and Engineering Research Council (NSERC) (ean.ubc.cdn) processing about 2000 messages a day.
since November 1981. The present NSERC grant is There are gateways to CSNET, MAILNET, BITNET,
under its university-industry program; it is a three- and UUCP, and close connections to the other EAN
networks. ARPANET can be reached indirectly livery in minutes to hours is usual, with medium
through CSNET, and ELJnet through either UUCP or reliability.
the European EAN networks. Access is restricted to Naming, addressing, and routing are the same as
organizations engaged in research, advanced devel- for CDNnet. Methods for reaching EAN networks
opment, and education. The network may not be from non-EAN networks vary greatly depending on
used for commercial purposes. the network of origin and the locations of the sender
For access, contact and the addressee. There is a gateway at CERN that
connects EARN, UUCP, and the EAN networks. For
CDNnet Headquarters access, contact
[email protected]
Computing Centre Alf Hansen
University of British Columbia [email protected]
Vancouver, British Columbia alf-hansen%[email protected]
Canada V6T 1W5 Trond Skjesol/Alf Hansen
N-7043 Trondheim-NTH
European EAN Networks. The EAN protocols have Norway
spread so rapidly into new nations that it is interest-
ing to track their progress (see Table IV). There are SMARTIX/COSAC
actually no EAN networks as such in the United COSAC (COmmunications SAns Connections) is
Kingdom or Australia: There are merely gateways a French research network. Development work
into the national networks, much as Australia has started in 1981 at the Centre National d’fitudes des
UUCP gateways. The German network is not strictly Telecommunications (CNET). Version 3 has been
EAN-based. CDNnet, the progenitor of all the others, operational since 1984 and has some restrictions.
may not remain solely EAN as other X.400 imple- Version 5 is in development now and will be a full
mentations become available. X.400 implementation, to be operational by the end
The objective of the EAN networks is to establish of 1986. COSAC is administered by CNET, which
communication links for the European research also funds the network through CNET, INRIA
community, in cooperation with RARE (p. 000). The (Institut National pour le Recherche d’hrformatique
networks use the EAN implementation of X.400. It is et l’Automatique), CNRS (Centre National de la
expected that they will migrate to other implemen- Recherche Scientifique), and Bull.
tations in a few years due to the preliminary nature SMARTIX is intended as a generalization of the
of and lack of support for the current implementa- ideas of COSAC. It will use an implementation of
tion. Most of the sites connected inside the same X.400 by INRIA. Funding for SMARTIX will come
country are linked by 9,600-bps leased lines. Inter- from the French government and will involve
domain links consist mostly of X.25 public switched CNET, INRIA, AD1 (Agence de l’brformatique), Bull,
networks, with some using 9,600-bps lines. Mail de- and CNRS.
TABLE IV. Timetable for the Development of the European EAN Networks
COSAC uses the CCITT X.400 protocols over X.25, oped. The network layer is X.25, which supports re-
with IS0 transport and session protocols plus FTAM mote login. Most links are 9,600 bps.
for file transfer. Local links use 64,000-bps X.25 There are about half a dozen existing hosts sup-
links, and long-distance ones use TRANSPAC, the porting mail, all in the Federal Republic of Ger-
French public data network. There is a gateway many. Immediate plans are to have about 30 hosts:
with FNET (the French UUCP network; part of 10 4.2BSD, 10 System V, and 10 VMS. Gateways ex-
EUnet). It is possible to get to the ARPA Internet, ist to EUnet, EARN, CSNET, and the EAN networks.
CSNET, and BITNET from COSAC. Between CSNET For access, contact
and COSAC, the French CSNET host france.csnet is
DFN-Verein
used. COSAC has 27 hosts in France, of which about
Pariser Strasse 44
a dozen each are Multics and UNIX machines, a
1000 Berlin 15
couple each are IBMs and DEC-2Os, and one is a
Bundesrepublik Deutschland
VMS VAX. Most are in the environs of Paris or pro-
vincial capitals, though the two DEC-20s are actually There is also a newsletter published by a consortium
in Dublin, Ireland. For access, write to of people from several German networks, giving a
comprehensive view of all networking activities in
mulcnet/[email protected] (Claude Kintzig)
Germany:
seismo!mcvax!inria!gipsy!ch (Christian Huitema)
adi/[email protected] (Jean-Luc Bernard) Neueste Netz Nachrichten
Universitat Karlsruhe, Zirkel 2
or to Claude Kintzig at
D-7500 Karlsruhe 1
Projet SMARTIX Bundesrepublik Deutschland
CNET (PAA/TIM)
38-40 Rue General Leclerc ROSE
F-92131 Issy-les-Moulineaux ROSE (Research Open Systems for Europe) is the
France principal development project of IES, the ESPRIT In-
formation Exchange System [4]. ESPRIT is the Euro-
DFN pean Strategic Program in Information Technology of
DFN (Deutsche Forshungnetz) is the national re- the European Economic Commission (EEC). Work
search network in West Germany. There was early started on the ROSE implementations in 1984, with
German networking activity at the Hahn Meitner the goal of providing an infrastructure for collabora-
Institut in Berlin, where an X.25-based network tive research and development projects within
called HMInet was developed. There was also an ESPRIT, and eventually for other projects of other
academic network between two universities there. kinds in Europe. It is also a proving ground for the
The largest research network in the country is use of the IS0 protocols in an environment of heter-
BERNET, which is still in Berlin. In 1982 there was a ogeneous machines and both wide- and local-area
move to expand BERNET to be a Northern German networks. Funding comes from the EEC and goes to
network. However, a study conducted by Stanford five industrial partners who do the work: Bull of
University recommended as an alternative a na- France, GEC and ICL of the United Kingdom, Oli-
tional network to provide ARPANET-like services. vetti of Italy, and Siemens of West Germany. Some
DFN was started to implement this idea. tasks are subcontracted.
The purpose of DFN is to develop protocols and Services eventually expected under ROSE include
implementations in the IS0 suite that can be used mail, conferencing, file transfer (including text files),
for resource sharing and collaboration among re- remote command execution, and remote login. The
searchers nationwide and communications with for- UNIX operating system has been chosen as the first
eign researchers. DFN is the German part of RARE. implementation system. Initially, existing implemen-
The West German Ministry of Research and Tech- tations of protocols already in widespread use on
nology funds DFN and has about 15-20 people work- UNIX, such as UUCP, will be used (see also the
ing on the DFN project, though all implementation “EUnet” section). Eventually, all protocols will be
work is contracted out. those of the IS0 suite. Those protocols are chosen
DFN uses X.400 for mail, plus file transfer and from those recommended by the Standards Promo-
remote job entry using protocols designed for the tion and Application Group (SPAG) [80], which is a
network but compatible with the OS1 suite. The group of a dozen European manufacturers interested
EAN implementation of X.400 is used currently, in promoting common networking standards in their
though a German implementation is being devel- products.
Remote terminal access will be accomplished by Grapevine name: Userregistry (e.g., JLarson.PA, PA
X.3, X.23, and X.29 PADS, file transfer will be by IS0 = Palo Alto)
8571 (FTAM), mail will use the X.400 series of Clearinghouse name: Name:Domain:Org (e.g., John
CCITT recommendations, session will be imple- Doe:OSBU North:Xerox)
mented as IS0 8326 and IS0 8327, transport will
XIN communicates with the outside world via
be IS0 8072 with classes 0, 2, and 3 over X.25 and
two hosts on the ARPA Internet: Xerox.COM
class 4 over CSMA/CD networks, the internet layer
andparcvax.Xerox.COM. Xerox.COM (formerly
will be IS0 8473, and the network layer will mostly
Xerox.ARPA) is the ARPANET-Grapevine mail gate-
be X.25 and X.75.
way, and parcvax.Xerox.COM is used for telnet and
The end-to-end addressing convention to be used
FTP. Several mail gateways connect Grapevine to
in ROSE with the IS0 protocols is a three-level hier-
the CIN mail system. Example addresses (from the
archy of eight octets for the name of the remote
ARPA Internet) are
network, eight octets for the system on the LAN, and
two octets for the transport selector. This allows (to RIN/Grapevine): [email protected]
gateways between networks to be the only machines (e.g., [email protected])
that need to know about the interconnection topol-
ogy of the networks. The transport selector could and
allow the user to choose UUCP instead of the IS0 (to GIN/Clearinghouse):
session service. A prototype network is just being set [email protected]
up. (e.g., [email protected])
Certain aliases are maintained at the Xerox.COM
COMPANY NETWORKS
gateway for ease of external addressing (e.g., Post-
Xerox Internet [email protected] goes to Postmaster.pa).
Xerox was a pioneer in network research and in fact The services offered by RIN and CIN include re-
invented Ethernet [91] along with the Xerox Palo mote login, file transfer, mail, remote procedure call,
Alto Research Center (PARC) Universal Packet distributed file system, distributed computation, and
(PUP) protocol [5] and the Xerox network system many others. Both CIN and RIN support many thou-
(XNS) [92] protocol suites. An internetwork among sands of machines. Grapevine, a very large distrib-
various company sites, the Xerox Research Internet uted mail and name system for RIN, supports about
(RIN), had developed by 1976. The Corporate Inter- 4000 users around the world. CIN has its own dis-
net (CIN) split from the RIN about mid 1985. tributed mail system and about 8000 users. The XIN
The CIN and RIN are highly interconnected and is international in scope, maintaining links to sites in
together form the Xerox Internet (XIN). The CIN was Japan, England, and Canada, as well as to numerous
intended as a stable backbone network for various sites within the United States. For access, contact
corporate needs, and the RIN is primarily intended [email protected].
to serve research and development.
Administration of the networks is distributed DEC’s Easynet
among several groups within Xerox. RIN is adminis- DEC maintains an internal engineering network
tered for the most part by Xerox PARC, while CIN is called Easynet. DEC began its network endeavors as
primarily run by other divisions within the Xerox one of the pioneers of the ARPANET. The company
Corporation. Both RIN and CIN are funded by the went on to develop its own network software, called
Xerox Corporation. DECNET, and to make it available to DEC customers
Several protocols are used by XIN. The XNS proto- by 1976. Easynet was started in 1978.
col is used by both CIN and RIN. RIN also uses PUP The basic network capabilities provided by
as well as TCP/IP on some of its nets. Reliability is DECNET include intersystem file access and trans-
reported to be at least as good as that of ARPANET. fer, electronic mail, intersystem resource sharing,
Higher speed on RIN is maintained in part by interprocess communications, adaptive routing, and
56,000-bps leased lines and Tl Microwave links. remote login. These are enhanced by Easynet ser-
Naming and addressing are handled differently for vices such as ELF (a DEC Employee Locator Facility),
internal and external users. The mail system in RIN Videotext Infobases, on-line network conference dis-
is called Grapevine, and the name system in CIN is cussions (interactive bulletin boards), system moni-
called Clearinghouse. For internal names, the fol- toring, and communications for general operational
lowing examples are typical: issues.
Easynet is administered by DEC Corporate Tele- files. Another internal network is CCDN, which is
communications with funding provided by DEC. used solely for remote login.
Easynet uses the DECNET protocol. Reliability is re- VNET and the RSCS protocols began in 1972 as an
ported to be at least as good as the ARPANET’s ad hoc project of some IBM employees who felt that
Easynet’s speed is maintained by lo-Mbit ethernets the available alternatives did not meet their needs.
and 56,000-64,000-bps backbone intersite links, with IBM eventually adopted the new network, and in
lower speed links to sites with lower traffic require- this sense, VNET is the UUCP of IBM. VNET is
ments. Addressing is the same as for the Internet: for IBM’s internal network, providing services such as
instance, mail, remote login, and file transfer for company em-.
user%[email protected] ployees. VNET administration is run by a group
called the VNET Project Team, which was formed in
For UUCP, the correct address mode is 1978. This team maintains and sets network guide-
. .J!decwrl!enetnode.dec.com!user lines. There is also a VNET corporate office that was
{ucbvax, decvax,
established in 1982. VNET is funded by the IBM
Easynet has more than 10,000 hosts. Assuming Corporation.
that two-thirds of DEC’s employees are users, there The RSCS protocols are used for mail transfer.
are about 60,000 network users. The network is in- These are the same as the ones BITNET uses. VNET
ternational in scope, extending throughout North links are typically 9,600-bps leased lines, though
America, the Caribbean, Europe, the Near East, they vary from 2,400-bps to Tl speeds. Addressing is
Australia, New Zealand, and the Far East. similar to the Internet style, for instance,
The gateway on the DEC end is decwrl.dec.com,
a VAX 11/750 running 4.2BSD UNIX, along with From ARPA Internet: [email protected]
RHEA, an Easynet node in the same room that is VNET to VNET: USERID at HOSTNAME
another VAX 1l/750 running VAX/VMS plus Eun- This will result in either a direct transmission of the
ice with TCP/IP. These two machines share the re- mail to the IBM employee or in the generation of a
sponsibility for gatewaying mail between Easynet message that the intended recipient needs to regis-
and the ARPA Internet, CSNET, and UUCP. ter.
For access, contact Some non-IBM mailing lists (including the
johnsson%[email protected] USENET newsgroups) are gatewayed into internal
Digital Equipment Corporation IBM conferencing systems. VNET has grown from a
Distributed Systems Architecture few hundred hosts a few years ago to about 2200
550 King Street now. The VNET PVM nodes are perhaps not a pure
LKGl-2/A19 subset of the VNET RSCS nodes, but for all practical
Littleton, MA 01460-1289 purposes, they can be considered as such. VNET has
gateways to both CSNET and BITNET that operate
IBM’s VNET within the restrictions stated below. Through these
IBM has several internal networks supporting mail, gateways it is possible to send mail to any registered
remote login, and file transfer for company opera- IBM employee. File transfer and remote login are not
tions. The main internal network is actually two dis- supported for outsiders. The CSNET gateway can
tinct networks that together form what is generally support mail to any registered IBM employee on any
called VNET. The RSCS (for Remote Spooling and internal machine. The BITNET gateway at Yorktown
Communications Subsystem) network [31] comprises Heights is not as flexible. It can support mail only to
the mail and file transfer part of VNET and cur- those hosts at Yorktown Heights and Almaden (note
rently has approximately 2200 nodes. The PVM that the IBM Research Division site on the West
(Passthru VM) network provides a remote login facil- Coast has moved from San Jose to Almaden and is
ity for VNET. There are about 1100 PVM nodes. now known as IBM Almaden Research, often re-
VNET RSCS and PVM nodes are found in North ferred to as ARC) that are in the CUNY BITNET
and South America, Africa, Middle East, Europe, (RSCS) node table. There are also other BITNET
Australia, and Asia. As mentioned, there are other gateways that are more flexible, and there is a report
internal networks; for example, VIBTS (VTAM Inte- that describes them [88].
grated Bulk Data Transfer System) is a fast network IBM maintains its own internal security to provide
consisting mostly of Tl microwave links. VIBTS is limited access to VNET. For a person within IBM to
for transferring memory images during debugging be able to send or receive mail, it is necessary to
and other activities that require fast access to huge obtain an account on a VNET node; in addition, to
exchange mail with external networks it is neces- ACCUNET is AT&T’s commercial X.25 network.
sary to register. Most professionals within IBM are AT&T MAIL is a commercial service that is heavily
VNET users, although a relatively small number are used within AT&T Information Systems for corpo-
registered to talk to the outside world via gateways. rate internal mail.
An outsider need not be registered to send mail to
VNET, but the person receiving the mail inside IBM COOPERATIVE NETWORKS
must be registered. Many of the people in the Re-
search Division (Yorktown Heights, Almaden, and BITNET
Zurich) and the various Scientific Centers are regis- BITNET (Because It’s Time NETwork) [24] is a coop-
tered, although most others in IBM are not. For addi- erative network serving over 1300 hosts located at
tional information, contact several hundred sites (mostly universities) in 21
countries, as shown in Table V, on the next page.
[email protected] BITNET is a communications link between universi-
ties and research centers with few requirements or
AT&T restrictions other than that a site must acquire a
AT&T has some internal networks, most of which leased line to facilitate the connection to another
use internally developed transport mechanisms. BITNET node and, in the spirit of a cooperative net-
Their most widely used networks are UUCP and work, be willing to serve as a connection node for at
USENET, which are not limited only to that corpora- least one new member. (Commercial members can-
tion and which are discussed later. All internal not currently communicate with other commercial
AT&T networks support UUCP-style hl!h2!h!u members, however.) This concept of virtually
source routing syntax and thus appear to the user to unrestricted access and the absence of membership
be UUCP. Within AT&T, UUCP links are typically fees not only characterizes the cooperative essence
over 1,28@bps dial-up telephone lines or Datakit (see of BITNET, but distinguishes it from other networks
below). available for interinstitutional communication such
Among AT&T’s other networks, CORNET is an in- as CSNET. Any university or college that is able to
ternal analog phone network used by UUCP and mo- connect to BITNET possesses unlimited collaborative
dems as an alternative to Direct Distance Dialing possibilities for both academic and administrative
(DDD). Datakit is a circuit-switched digital net and is purposes for faculty, staff, and students. This policy
similar to X.25 in some ways. Most of Bell Laborato- is similar to that of UUCP and USENET, except that
ries is trunked together on Datakit. On top of the DK it is more limited to academic institutions. BITNET
transport service, people run UUCP for mail and also resembles CSNET somewhat, but is not as
dkcu for remote login. In addition to host-to-host con- centralized and has never been supported by the
nections, Datakit supports RS232 connections for ter- government.
minals, printers, and hosts. ISN is the version of There are three main constituents of the network:
Datakit supported by AT&T Information Systems. BITNET in the United States and Mexico, NET-
Bell Laboratories in Holmdel, New Jersey, uses ISN NORTH in Canada, and EARN in Europe. There is
for internal data communication. BLICN (Bell Labs also AsiaNet in Japan, and there are plans for expan-
Interlocation Computing Network) is an IBM main- sion into South America. The distinctions are purely
frame RJE network dating from the early 1970s political, and mail can be freely exchanged between
when Programmer’s Workbench (PWB) was a com- any two hosts.
mon version of the UNIX operating system. Many
UNIX machines with PWB-style RJE links use BLICN BZTNET in the United States. BITNET had its begin-
to queue mail and netnews for other UNIX ma- nings in 1981 when the first two sites, City Univer-
chines. A major USENET host uses this mechanism sity of New York (CUNY) and Yale University, were
to feed news to about 80 neighbor hosts. BLICN connected on May 5. BITNET was originally used
covers Bell Laboratories installations in New Jersey, primarily for collaboration and communications
Columbus, Ohio, and Chicago, and links most com- among systems programmers at university computa-
puter center machines. BLN (Bell Labs Network) is tion centers. Since existing IBM networking software
an NSC Hyperchannel at Indian Hill, Chicago. was used, BITNET was initially a network of IBM
AT&T Internet is a TCP/IP internet. It is not a hosts. As BITNET has grown, software to emulate
major AT&T network, though some of the best- the protocols has been developed by commercial
known machines are on it. There are many ether- vendors and members of the BITNET community.
nets connected by TCP/IP over Datakit. This inter- The basic premise for establishing BITNET was to
net may soon be connected to the ARPA Internet. provide a communications network among universi-
ties with no special requirements, restrictions, or BITNET services and implementing new ones.
fees for membership. Today BITNET is used by Through this coordinated effort, BITNIC and
scholars and administrators from a variety of differ- BITDOC are able to provide a very high level of sup-
ent disciplines. Services provided include electronic port for BITNET. BITSERVE is a help facility orga-
mail (RFC822), file transfer, and interactive mes- nized and operated by BITDOC at CUNY that offers
sages. The interactive messages allow several users a BITNET news service, a user directory, and a list of
to communicate interactively while experiencing BITNET sites and computers, and is being expanded
only moderate delays, usually less than eight seconds. to include information on conferences, software,
User, technical, and administrative support is pro- and special facilities available to BITNET members.
vided by the BITNET Network Support Center, BITSERVE is presently accessible to all BITNET sites
which is operated jointly by EDUCOM and CUNY. and is being enhanced to allow access from other
EDUCOM handles the user services and administra- networks.
tive support through the BITNET Network Informa- Considering the absence of membership fees, the
tion Center (BITNIC), the purpose of which is to cost to institutions for BITNET is small and the re-
promote the use of BITNET in higher education. Ser- strictions are minimal, compared to other networks.
vices provided include an on-line directory, paper The site must provide the connection to an adjacent
and electronic newsletters, end-user documentation, site and either acquire IBM’s VM-based RSCS from a
workshops, seminars, and conference presentations. vendor or obtain emulation software free of charge
In addition to these direct user-service functions, from BITDOC. Government support provides the
BITNIC also provides administrative support by ne- funding for the support sites. IBM has provided
gotiating for software and equipment discounts and funds for BITNIC, but that funding ends soon. How-
by archiving network procedures and policies. ever, EDUCOM and the BITNET board of directors
CUNY directs the technical support, systems main- realize that BITNIC is essential to the success and
tenance, and software development efforts via its efficiency of the network. As of now no decision has
BITNET Development and Operations Center been made on how to support BITNIC, but it is clear
(BITDOC). BITDOC maintains the Support Center that a member fee will have to be initiated for
computer and is dedicated to improving existing BITNIC to remain in existence.
BITNET started as a network of IBM hosts, and pean nodes must be listed at all U.S. BITNET sites
most BITNET hosts communicate using an IBM com- and vice versa. The central administrative and tech-
munication environment. BITNET uses the NJE nical services are handled by one central computer
(Network Job Entry) protocol. Most hosts use RSCS. in each country (analogous to CUNYVM for BITNET).
Today there are many non-IBM hosts using emula- EARN has an administrative branch very similar
tion software to provide the appropriate protocols for to BITNIC. IBM supports EARN and its gateway to
the DEC, VMS, UNIX, and Sperry environments. BITNET. For example, IBM will fund BITNET links to
Hosts are interconnected by leased phone lines sup- several major European EARN sites until April 1987.
porting 9,606bps data transmission. The mail and Connections to other sites are welcome, but the con-
file delivery delay ranges from minutes to hours necting host must pay for such new links.
with medium reliability. An unusual feature of The gateway between EARN and other nets is the
BITNET is that there is usually exactly one path be- same as for BITNET. For example, to send mail from
tween any two hosts. A geographic map of the net- the ARPA Internet to EARN, the address format
work shows it to be a tree network rooted at CUNY. would be
This means that nodes near the root of the tree are
user%[email protected].
more important. An example is CUNYVM. If this
node goes down, the network will still run, but will There are more than 350 hosts in 17 European coun-
essentially be split into two networks, with files and tries. Gateways to several national academic net-
mail queued at the nodes nearest CUNYVM. works in Europe are planned. EARN is currently
The addressing format from the ARPANET to expanding into Turkey, Iceland, and Portugal.
BITNET is Countrv coordinators are available for each of the
18 countries currently connected to EARN. The
useu%[email protected]
large majority of nodes have installed a mailbox
Methods for specifying addresses to the mail system named INFO. Users on other networks may use the
vary widely, depending on the host. There are cur- internet address,
rently over 800 nodes distributed among several
hundred sites. The scope is the United States plus
one host in Mexico, although there are direct links
FidoNet
to NETNORTH and EARN. Gateways exist between
FidoNet uses a telecommunications package for
BITNET and MAILNET, EDUCOM, CSNET, and
personal computers that was developed by Tom
ARPANET, and there is also restricted access to
Jennings in 1983. FidoNet is basically an extension
IBM’s VNET. For access, contact
of the Fido Bulletin Board System (BBS), which pro-
BITNET network information center (BITNIC). vides the electronic mail portion and makes the Fido
BITNET: INFO@BITNIC BBS unique in that unattended mail transfer be-
ARPA Internet: tween other “nets” and their “nodes” is not often
INFO%[email protected] offered with bulletin-board services.
FidoNet provides a network for personal-computer
NETNORTH. NETNORTH provides communica-
users in the spirit of BITNET’s utility to the aca-
tions for a number of Canadian academic and re-
demic community. There are no special require-
search sites, and was designed using the same tech-
ments or fees for membership. The software is share-
nology and several of the same basic assumptions
ware. There is no distribution cost, though users are
as BITNET. The network currently has over 96
asked to donate a small sum. The network is distrib-
nodes, and direct links exist to BITNET and EARN.
uted without sources. The main services are elec-
NETNORTH and BITNET are connected by a leased
tronic mail for personal computers and access to
line between Cornell University and the University
USENET newsgroups for personal-computer users.
of Guelph, in Ontario. Plans are also underway to
Since FidoNet is part of the Fido BBS, all of the
provide connections between NETNORTH and
services of the BBS are also available (these are cov-
other Canadian networks.
ered in the section on bulletin-board systems).
EARN. EARN, The European Academic Research The administrative node of FidoNet is located in
Network, links over 150 hosts at over 100 insti- St. Louis. The USENET/Fido gateway is adminis-
tutions in 18 countries. EARN is similiar to tered by Bob Hartman at FidoNode lOl/lOl,
NETNORTH in that it is based on the same design vaxine!sparks!m!n!user. FidoNet is funded by its
principles and philosophy as BITNET. EARN is an users, who must send the Sysop (System Operator) of
integral part of BITNET, which means that all Euro- the Fido node a cash retainer (usually $5 or $10) to
cover the phone costs when a mail message is sent. protocols. Dynamic routing was added in 1980, but
Since FidoNet operates late in the evening (after only applied to mail and file transfer. SUN-II was
11 PM local time) when phone rates are lowest, the similar, but allowed intermittent [dial-up) links
cost per message is minimal. Sysops usually provide as well as dedicated ones, plus a method of layer-
the machines (since Fido and FidoNet only run un- ing SUN-II on top of other networks (such as
der MS or PC DOS-the operating systems for IBM CSIRONET).
PCs and compatibles-the machines are IBM PCs The current version is a complete redesign and
and compatible machines) and donate their time at reimplemention done in 1983 and is called SUN-III
no cost. FidoNet is not designed to be a commercial [48]. It is layered in the traditional networking man-
venture. ner and provides a message delivery service with
FidoNet uses the Fido protocol with connections implicit (system) routing and domains in order to
made at 1,200 or 2,400 bps. A FidoNet address is support higher level protocols including file transfer,
composed of the user’s name, a net (a region or host), electronic mail, news, remote printing, simple direc-
and a node (a Fido) from the available list; for tory service, and a number of experimental services.
instance, It can transfer messages in both directions simulta-
neously over full-duplex links. It supports multicast-
user Net net-number Node node-number. ing, which is useful with USENET news and also
with mail addressed to users on multiple hosts.
The bulk of the nodes are in the United States and
The transport protocol can make use of any form
tend to be clumped in metropolitan areas such as
of virtual circuit between hosts. The links currently
St. Louis, Boston, and Chicago. However, there are a
in use include leased lines, dial-up lines, X.25, and
number of nodes in Europe, a few in Indonesia, and
CSIRONET. CSIRONET is a government research
even one in Alaska. Fido BBS is installed on over
network originally developed to connect terminal
500 hosts (IBM PCs or compatibles), and new hosts
users in remote areas to a central facility: it now
or nodes are joining on a regular basis. To access
provides virtual circuits between host machines.
FidoNet, contact the local IBM PC User Group to see
CSIRONET is slow but cheap for long distances, of
if there is a local Fido node in your area. If so, they
which there are many in Australia. There is a plan
should have the dial-up number. For more complete
to migrate the system to X.400 in the next few years.
information about FidoNet in general, contact
Most links run at 1,200 bps, and reliability is high.
Tom Jennings ACSNET has a domain naming syntax [49] similar
FidoNet: Fido’s-Board Net 125 Node 1 to that for ARPA Internet domains. The domain
UUCP: OZ.AU is registered with the Internet and can be
ihnp4!encore!vaxine!spark!l25!l!tom_jennings interpreted as a subdomain, OZ, for ACSNET, of the
country domain, AU, for Australia. There are cur-
ACSNET rently no other subdomains of AU, but there are
ACSNET (Australian Computer Science Network) is subdomains within OZ.AU, many of which are for
the main network in Australia and is based on the distributed organizations. Domains are used for rout-
Sydney UNIX Network (SUN) software developed at ing in ACSNET, so connections between machines
the University of Sydney [ZZ]. The network started determine domains more than anything else. Hosts
in 1979 and connected a machine at Sydney to an- can register in any subdomain. In practice, this
other at the University of New South Wales. It cur- means major hosts are directly in OZ, and everthing
rently spans the continent and is closely connected else is in subdomains.
to networks elsewhere [47]. The purpose of the net- There are several UUCP gateways to North Amer-
work is to support mail traffic and file transfer ica and Europe, all from Melbourne and all using
among research, academic, and industry users. The X.25. There is a CSNET link to the United States.
underlying transport protocols are also used to sup- There are EAN links to Canada, the United King-
port the USENET news network in Australia. There dom, Germany, Norway, and Switzerland. In addi-
is no central administration, though this may change tion, there are several 1,299-bps dial-up links to
in the future. At present the original developers and North America (New Hampshire, New Jersey, and
the international gateway operator act as coordina- California). There are about 300 hosts throughout
tors. There is no government funding: Each host the Australian continent on ACSNET.
pays for its own links. For general information, contact
The original protocols were called SUN-I and sup- [email protected]
ported remote login, file transfer, and multiplexed seismo!munnari!postmaster
For connection requests, contact generated as responses to USENET news. The same
underlying UUCP transport mechanisms are also
[email protected] used to support much of USENET.
seismo!munnari!basser.oz!acsnet-request The UUCP mail network has many problems with
or the ACSNET Coordinator at routing (it is one of the few major networks that uses
source routing) and with its scale. Nonetheless, it is
Department of Computer Science extremely popular and still growing rapidly. This is
University of Sydney attributable to three circumstances: ease of connec-
New South Wales, 2006 tion, low cost, and its close relationship with the
Australia USENET news network.
Mailing lists similar to those long current on the
UUCP ARPANET have recently increased in popularity on
The name “UUCP,” for UNIX to UNIX Copy, origi- the UUCP mail network. These permit a feature that
nally applied to a transport service used over dial USENET newsgroups cannot readily supply: a limi-
ups between adjacent systems [63]. File transfer and tation of access on a per-person basis rather than on
remote command execution were the original intent a per-host basis. Also, for low-traffic discussions
and main use of UUCP. There was an assumption mailing lists are more economical, since traffic can
that any pair of communicating machines had direct be directed to individuals according to their specific
dial-up links, that is, that no relaying was done interests.
through intermediate machines. By the end of 1978, There is no central administration. To connect to
there were 82 hosts within Bell Laboratories con- the network, one need only find one machine that
nected by UUCP. Though remote command execu- will agree to be a neighbor. For people at other hosts
tion and file transfer were heavily used, there is no to be able to find your host, however, it is good to be
mention of mail in the standard reference [64]. registered in the UUCP map, which is kept by the
There was another similar network of “operational” group of volunteers known as the UUCP Project
hosts with UUCP links that were apparently outside [84]. The map is posted monthly in the USENET
Bell Laboratories, but still within the Bell System. newsgroup comp.mail.maps. There is a directory of
The two networks intersected at one Bell Laborato- personal addresses on the UUCP network [44], al-
ries machine. though this is a commercial venture unrelated to the
Both of these early networks differed from the UUCP Project.
current UUCP network in assuming direct connec- Each host pays for its own links; some hosts en-
tions between communicating hosts and in not hav- courage others to connect to them in order to
ing mail service. The UUCP mail network proper shorten mail delivery paths.
developed from the early networks and spread as the There is no clear distinction between transport
UUCP programs were distributed as part of the and network layers in UUCP, and there is nothing
UNIX system. resembling an Internet Protocol. The details of the
Remote command execution can be made to work transport protocol are undocumented (apparently
over successive links by arranging for each job in not actually proprietary to AT&T, contrary to rumor,
the chain to submit the next one. There are several though the source code that implements the protocol
programs that do this: Unfortunately, they are all and is distributed with UNIX is AT&T’s trade secret).
incompatible. There is no facility at the transport Mail is transferred by submitting a mail command
level for routing beyond adjacent systems or for er- over a direct connection by the UUCP remote com-
ror acknowledgment. All routing and end-to-end re- mand execution mechanism [36]. The arguments of
liability support is done explicitly by application that mail command indicate whether the mail is to
protocols implemented using the remote command be delivered locally on that system or resubmitted to
execution facility. There has never been any remote another system. In the early days, it was necessary
login facility associated with UUCP, though the CM to guess the route to a given host and hope. The only
and tip programs are sometimes used over the same method of acknowledgment was to ask the addressee
telephone links. to reply. Now there is a program (pathalias) that can
The UUCP mail network connects a very diverse compute reasonable routes from the UUCP map, and
set of machines and users. Most of the host ma- there is software that can automatically look up
chines run the UNIX operating system [73, 741. Mail those routes for users.
is the only service provided throughout the network. The UUCP mail network is currently supported in
In addition to the usual uses of mail, much traffic is North America mostly by dial-up telephone links. In
bone hosts have higher bills than most other hosts usually have the same name on both networks, mail
due to their long-distance links among themselves. addresses have no meaning on USENET: Mail re-
The unit of communication is the news article. Each lated to USENET articles is usually sent via UUCP
article is sent by a flooding routing algorithm to all mail; it cannot be sent over USENET, by definition.
nodes on the network [34]. The transport layer is Though the two networks have always been closely
UUCP for most links, although many others are related, there are many more hosts on UUCP than
used, including ethernets, berknets, and long-haul on USENET. In Australia the two networks do not
packet-switched networks; sometimes UUCP is run even intersect except at one host.
on top of the others, and sometimes UUCP is not There are different distributions of newsgroups on
used at all. USENET. Some go everywhere, whereas others are
The many problems with USENET (e.g., reader limited to a particular continent, nation, state or
overload, old software, slow propagation speed, and province, city, organization, or even machine,
high and unevenly carried costs of transmission) though the more local distributions are not really
have raised the possibility of using the experience part of USENET proper. The European network
gained in USENET to design a new network to re- EUnet carries some USENET newsgroups and has
place it. The new network might also involve at another set of its own [79]. JUNET in Japan is similar
least a partial replacement for the UUCP mail net- to EUnet in this regard.
work. There are about 2000 USENET hosts in the United
One unusual mechanism that has been proposed States, Canada, Australia, and probably in other
to support the new network is Stargate [89, 901. countries. The hosts on EUnet, SDN, and JUNhT
Commercial television broadcasting techniques communicate with USENET hosts: The total number
leave unused bandwidth in the vertical blanking in- of news hosts including ones on those three net-
terval between picture frames. Some broadcasters works is probably at least 2500. The UUCP map in-
are currently using this part of the signal to transmit cludes USENET map information as annotations. A
Teletext services. Since many cable-television chan- list of legitimate netwide hewsgroups is posted to
nels are distributed via geosynchronous satellites, a several newsgroups monthly. Volunteers keep statis-
single input to a satellite uplink facility can reach all tics on the use of the various newsgroups (all 250
of North America on an appropriate satellite and of them) and on frequency of posting by persons
channel. A satellite uplink company interested in and hosts. These are posted to news.newslists
allowing USENET-like articles to be broadcast by once a month, as is the list of newsgroups. Impor-
satellite on a well-known cable-television channel tant announcements are posted to two mode-
has been found. Prototypes of hardware and soft- rated newsgroups, news.announce and
ware to encode the articles and other hardware to news.announce.newusers, which are intended to
decode them from a cable-television signal have reach all users (the current moderator is Mark
been built and tested in the field for more than a Horton, cbosgd!mark). An address for information
year. A new, reasonably priced model of the decod- on the network is seismo!usenet-request.
ing box may be available soon.
This facility would allow most compatible systems EUnet
within the footprint (area of coverage) of the satellite The European UNIX network (EUnet) started at the
and with access to the appropriate cable-television April 1982 European UNIX systems Users’ Group
channel to obtain decoding equipment and hook into (EUUG) meeting in Paris, and originally connected
the new network at a very reasonable cost. Articles machines in the Netherlands, Denmark, Sweden,
wbuld be submitted for transmission by UUCP links and the United Kingdom. It began as an extension or
to the satellite uplink facility. Most of the technical application of the software and protocols used in
problems of Stargate seem to have been solved. USENET and UUCP in North America, and most
More than 90 percent of all USENET articles reach hosts, as on those networks, run UNIX. There have
90 percent of all hosts on the network within three always been and still are some marked differences,
days. Though there have been some famous bugs however. Mail and news are much more closely tied
that caused loss of articles, that particular problem together in EUnet: The backbone hosts and adminis-
has become rare. trators are the same for both, and a single name is
Every USENET host has a name. That host name used for the combined mail and news network. The
and the name of the poster are used to identify the administration of the network is much more orga-
source of an article. Though those hosts that are on nized than for UUCP and USENET in North Amer-
both the UUCP mail and USENET news networks ica, and there has always been a much stronger rela-
tionship between EUnet and EUUG than there has initial connection charge, but the per-packet charge
ever been between USENET or UUCP and either accounts for more than 80 percent of the costs. Rates
USENIX or /usr/group (the two organizations in for X.25 connections are lower in Europe than in
North America1 most similar to EUUG). Many of the North America, and usually lower than equivalent
“soapbox” discussion groups are not carried on North American telephone rates for similar dis-
EUnet (due to their high costs in transatlantic and tances and connection times. But, despite uniformity
European traffic), and there are many newsgroups in charging units, X.25 tariffs vary widely within
that are only distributed within Europe. EUnet also Europe. Mail originating outside of Europe in some
differs from USENET, UUCP, and ACSNET in almost cases must be paid for by a EUnet backbone host,
every other regard, especially funding, as will be particularly when gatewaying to a national non-
seen. Yet the purpose of the network, to provide its charging network. This makes bulk mailings rather
users with modern communication facilities, partic- annoying to the gateway administrators.
ularly electronic mail and news, which are capable English is the lingua franca of the network, though
of reaching the users of as many networks as possi- many other European languages are also used. The
ble, is in line with the other networks. basic application protocols are news and mail as in
There is one EUnet backbone host in each Euro- USENET and UUCP, plus remote login where X.25
pean member country. Each such backbone host or- links are used. EUnet originally used UUCP over
ganizes communications within its country, often by dial-up telephone links like those of USENET and
maintaining direct connections to all other hosts in UUCP in North America. This arrangement did not
the country. The backbone hosts also communicate last more than about six months, as it quickly be-
among themselves across international boundaries. came evident that X.25 links were more practical
The whole set of backbone hosts is the backbone of (faster and cheaper) in Europe for long-distance
the network. There is a central host to which all links. Most EUnet links between backbones and out-
backbone hosts have connections and that carries all side Europe are now UUCP (without much of the
the intercontinental news and most of the mail usual error checking) over X.25. Ordinary UUCP
traffic; this host has always been mcvax in Amster- telephone dial-up links are still the most common
dam. for local links and to leaf nodes.
The administrators of the backbone hosts hold EUnet has recently concluded an arrangement to
meetings (usually at EUUG meetings) where they redistribute the ACSNET software within Europe,
determine concerted strategies and tactics. Currently and it appears likely that many links between back-
they are moving toward implementing ARPA Inter- bone hosts will soon use ACSNET rather than UUCP
net RFC886 domains in EUnet and expect to have because of such obvious advantages as multiplexed
completed doing so by mid 1987. The top-level do- and full duplex connections.
mains being chosen are the ISO- two-letter The SLIP software that allows TCP/IP over serial
country codes, following RFC920. When a single le- lines may be used over some interbackbone links in
gal or political entity is needed to speak for the net- place of X.25 because of its advantage in speed
work, EUUG does so. There is some financial sup- (4,800 bps is the practical limit for X.25 links), espe-
port from EUUG, but most funds are provided by the cially over some of the faster digital telephone links
owners of the individual hosts. For example, the cost now becoming available (up to 50,000 bytes at about
of the news connections with North America is $0.25 a minute). EUnet will probably eventually
shared proportionately among the EUnet backbone adopt X.400 for mail, using whatever transport
hosts according to the number of news hosts each mechanisms, such as TP4 or other IS0 transport pro-
feeds. They in turn share these costs equally among tocols, are appropriate at that time.
all the hosts in their country. Thus no host bears a Most dial-up telephone links are still 1,200 bps,
disproportionate burden. but 2,400 bps is becoming more common. X.25 links
Mail is charged to the originating host on a are mostly effective about 4,800 bps, though the
message-by-message and link-by-link basis. Except nominal rate most commonly used is 9,600 bps.
this is not possible for intercontinental links and Ninety percent of all mail and news traffic arrives
links to nonchargeable networks. The originating within one day. Reliability is quite high.
host usually brings these charges to the attention of EUnet has already almost completely eliminated
the senders of the mail in some manner. the old-style UUCP hosta!hostb!host!user syntax in
The European Public Data Networks charge per favor of user@host. Routing is managed by the back-
segment (maximum 64 bytes] for use of X.25. There bone hosts, each of which knows the organization
is also a negligible connection time charge and an within its own country and which hosts are in
Japanese in roman characters in 8-bit ASCII: academic community with the kind of networking
Watashi tachiwa sakuban Mark no iede tanoshii resources that CSNET now provides to computer sci-
hitotoki wo sugoshita. ence researchers [3]. It extends the ideas of resource
Japanese in a 16-bit JIS C6228 encoding of Kanji sharing, which motivated the ARPANET, and of col-
characters: laboration among researchers, which grew out of the
development of the ARPANET [19]. NSFnet will also
concentrate more on customer support and informa-
tion than has been customary in the ARPA Internet.
The mail and news interface software has been mod-
The NSFnet project is administered by the OASC
ified to support Kanji characters, which also require
in coordination with the administrations of existing
special display hardware.
networks. The NSF will provide initial funding, al-
Most JUNET links are 2,400 bps, and reliability is
though there is potential for the network to even-
high. There is a domain system, and its top-level
tually become self-supporting.
domain is JUNET. Second-level domains are usually
Diverse network protocols will be used to support
named for organizations such as universities, and
the TCP/IP protocol suite; the network may even-
third-level domains are usually hosts. This scheme
tually migrate to the IS0 protocols. Initially, NSFnet
is similar to RFC733 [14], the predecessor of the cur-
will use the existing long-haul (ARPANET) and cam-
rent ARPA Internet domain system. Routing is done
pus networks of the ARPA Internet plus state net-
by tables on gateways, which are manually updated
works and a new supercomputer backbone network.
once a month. Modifications have been made to
NSFnet can be viewed as an expansion of the ARPA
sendmail to support routing by domains.
Internet: The ARPANET alone may gain about 15
JUNET has 46 participating organizations and
new PSNs. BITNET is considering migrating from
160 hosts. There are now several links to Europe,
RSCS to TCP/IP, and CSNET is investigating a new
North America, Australia, and Korea. A gateway to
network, Cypress, based on TCP/IP 9,600-bps leased
Asianet (BITNET in Japan) is planned, and there
lines. Both of these may be used as part of NSFnet.
is a gateway to CSNET. The contact address is
The TCP/IP protocols are also being implemented
JUNET under the Cray CTSS operating system.
c/o Jun Murai In addition to services such as already exist in
Computer Center CSNET and the ARPA Internet, it is hoped that
Tokyo Institute of Technology NSFnet will have a sophisticated nameservice ex-
Ookayama Meguroku tending not only to hosts, but also to users and re-
Tokyo 152 Japan sources. A program might be given a networkwide
location-independent name, such as Useful-Program,
which would be mapped by the nameservice into
METANETWORKS
uprog@somedomain. Users would not have to be con-
CSNET cerned with the location of the program.
CSNET is a metanetwork, but has already been de- Long-haul links are expected to typically be Tl
scribed in the section on research networks. microwave links. Reliability will be high due to the
use of TCP/IP. Naming, addressing, and routing will
be as in the ARPA Internet. Administrators of
NSFnet
CSNET, BITNET, and UUCP have recently agreed to
The history of NSFnet properly starts with
adopt the ARPA Internet domain name system
ARPANET and continues with CSNET. In 1984, the
(though conformance is voluntary per host in the
National Science Foundation (NSF) established the
latter two networks). This decision was motivated by
Office of Advanced Scientific Computing (OASC).
purely practical considerations, but will facilitate
That office started one program to develop super-
the implementation of NSFnet.
computer centers, and another to develop network
The network will reach academic campuses and
access to them. The planned network was called
research organizations throughout the United States
NSFnet [42]. This network will eventually provide
and already has 65 initial participant organizations.
more services than just supercomputer access, and
For futher information, contact
serve an extensive user community. Agreement was
reached between NSF and DARPA in October 1985 Program Director for Networking
to provide access to NSFnet for ARPANET users and Office of Advanced Scientific Computing
vice versa. National Science Foundation
The objective of NSFnet is to provide the general Washington, DC 20050
National Research Internet stages, though there are some existing UUCP links
The National Research Internet (NRI) is being between the various national networks in the Pacific
planned by a network working group of several region, including East Asia, Australia, and the
White House committees. The relevant committees United States.
are collectively known as the Federal Coordinating
Committee on Science, Engineering, and Technology AUSEAnet
(FCCSET), and their purpose is to coordinate activi- AUSEAnet is a metanetwork for a joint microelec-
ties in the various federal agencies. One of them is tronics (VLSI) project among ASEAN (Association of
the FCCSET Committee on Very High Performance South East Asian) countries and Australia. The
Computing (VHPC), which is aimed at the super- ASEAN countries include Thailand, Indonesia, Ma-
computer activities. laysia, Singapore, Brunei, and the Philippines. The
NRI will interconnect the networks owned by the project started in July 1986 and is expected to be
various federal agencies in order to promote re- operational by November 1986. The goal is to permit
source sharing and collaboration among researchers. electronic submission of VLSI designs to the fabrica-
This differs from NSFnet’s purpose in that it at- tion plant in Australia and to exchange information
tempts to satisfy most if not all needs for scientific about microelectronics techniques. Funds are pro-
networking, whereas NSFnet is more directed to- vided by the Australian government and will be
ward providing access to supercomputer centers. augmented by the other participant countries.
NSFnet will be one of the networks connected by AUSEAnet will use UUCP and ACSNET over the
NRI. The NRI project is administered by the international X.25 networks. Outside of Australia,
FCCSET Network Working Group, and the network it will use mostly UUCP. Most of the links will be
will be funded by various federal agencies. Account- 1,200 bps. Reliability should be high.
ing methods are still under study. Country domain and node addressing modes will
The TCP/IP protocol suite will be used for NRI. be decided in August 1986. Indonesia will act as
The main focus of development will be on gateway ASEAN regional center of AUSEAnet and will con-
standards in order to facilitate interconnection of the nect to a designated node in Australia through an
networks. The links used will presumably be fast, international packet-switching line. Each participat-
and the TCP/IP protocols will promote reliability. ing ASEAN country will have its own network and
Access restrictions among the various agency net- an international gateway that will poll the Indone-
works may become an issue, and prior arrangement sian hub machine. The national center in Indonesia
with the administration of a network may be neces- will be at NETLAB, the Network Laboratory that is
sary before a given resource on one network can be part of the Inter-University Center for Computer
used by a user of a different network. Science at the University of Indonesia in Jakarta.
Four institutional organizations were connected to
RARE NETLAB as of July 1986. At least nine ASEAN insti-
The EEC’s ESPRIT project is sponsoring plans for a tutional nodes will participate in AUSEAnet. The liai-
metanetwork called RARE (Reseaux Associees pour son is Joseph F. P. Luhukay, who can be reached at
la Recherche Europeenne). RARE is an attempt to
unify and standardize the European national net- Computer Science Center
works. Funding may come from both the EEC and University of Indonesia
from the governments of participating countries. The P.O. Box 3442
IS0 protocols will be used, though ESPRIT also spon- Jakarta 10002
sors projects li.ke ROSE that may convert existing Indonesia
networks from other protocols gradually. Compo-
nents of some international networks, such as EUnet BULLETIN BOARDS AND NETWORKS
or EARN, may be funded and incorporated. Some Bulletin-board systems have become ubiquitous, and
constituents of this metanetwork already exist in na- many people today think of bulletin-board systems
tional or regional networks like DFN (West Ger- when they hear the word “network.” The two are in
many) or NORDUNET (Scandinavia). NORDUNET fact quite distinct. A typical bulletin-board system is
uses not only IS0 protocols, but also some Coloured a personal computer supporting a database of mes-
Book ones. sages. Users can read or submit messages by dialing
up one or more modems over the public switched
Pacnet telephone network. The telephone network is the
Pacnet is a logical grouping of Pacific hosts and orga- only network involved, since all the messages are on
nizations [g]. It is currently in the early planning one machine.
Bulletin-board systems are computer conferencing data networks-that are used to reach them become
systems. Unlike mail systems, where communication saturated, and the mainframes themselves become
is one-to-one or one-to-many, communication on loaded.
computer conferencing systems is many-to-many PDNs are real networks, or at least communica-
[32]. People who use personal-computer bulletin- tion subnets, as they are implemented up to the net-
board systems have a tendency to call anything work layer and enable users to reach computers.
larger a network. An example of this is the WELL There are many PDNs; every European country, for
(Whole Earth ‘Lectronic Link) [6], which is a VAX- instance, has a national government-run PDN. The
11/750 with two Fujitsu Eagle disk drives running government agency irtvolved is usually the same one
UNIX (4.2BSD) in the office of the Whole Earth Re- that runs the paper post and telephone services. The
view in Sausalito, California. Despite the difference French acronym PTT (Poste, Tklbphone, et T%-
between the WELL’s 800 megabytes of disk space graphe) is the standard abbreviation for this kind of
and the typical home computer’s few megabytes, the agency.
WELL is still a bulletin-board system. People dial it
up and use it like they would CompuServe or THE Conferencing Networks
SOURCE. The WELL can do more than the average A basic technical difference that distinguishes con-
BBS system, however. There is a local magazine that ferencing systems from mail systems is that confer-
is published on-line, as well as parts of other maga- encing systems need multicast or broadcast transport
zines and books [7]. In addition, the WELL is on mechanisms to support them, whereas mail systems
LJSENET and UUCP and serves as one of the few can get along with unicast mechanisms. This and
public access entry points to those networks. While other technical issues related to the extent and
most USENET users are employees of organizations method of distribution of the message database are
that have machines connected to USENET, anyone not highly visible to the users of any of the BBS or
who can dial up and submit a valid credit-card num- news systems.
ber can (in principle) be a WELL user. Access is not Local bulletih boards have existed for many years
unlimited, however, since the administrators of the on TOPS-20 (and other) machines on the ARPA In-
WELL are aware of the nonprofit nature of USENET. ternet, with one message database per system. Those
There are several other public access UNIX sys- systems pass the messages in the databases around
tems that provide USENET access, such as the Soup to each other so that the database on each system
Kitchen in New Jersey. Few of them support pub- approximates those on the others. The transfer
lishing ventures, however. methods are an ad hoc combination of file transfer of
the message databases and mail of individual mes-
Commercial Networks sages. There are many established ARPANET mail-
Commercial networks sell services to outside users ing lists, many of which are stored on arrival at
for profit. Many are in effect common carriers like TOPS-20 systems as BBOARDS, but these are still
the telephone system. Administration is always cen- not true distributed systems.
tralized, though execution may be delegated. Fees USENET is similar in concept to the TOPS-20
are usually charged to individual persons or organi- BBOARD systems. Each USENET host machine con-
zations on the basis of connect or CPU time used. tains one copy of the news article database. The key
CompuServe, THE SOURCE, and other such difference is that, when a USENET article is posted
services are not really networks. They consist of a locally, it is sent to every neighboring machine,
few large computers closely coupled into a large dis- which in turn sends it to all of its neighbors, and so
tributed system and are accessed just like home forth. To keep this flooding algorithm from produc-
personal-computer bulletin-board systems, except ing loops, each article contains a record of the path
that users get bills. it has traversed, which is updated at each machine
On a commercial service, more traffic is good, be- the article passes through; no machine will send an
cause it brings in more revenue, but, on an anarchic article to a machine that is already in the path. The
network like USENET, more traffic just means more article also contains a unique ID that the hosts use to
expense. Users of either kind of system have to deal recognize and discard duplicates. Many people have
wiih information overload, though the availability taken to having their personal computers dial up
of money and administration in the centralized ser- CompuServe in the middle of the night (when tele-
vices allows the development of sophisticated filter- phone rates are low) and download many articles for
ing mechanisms to limit that problem. But central- later perusal. This is a step in the USENET direction.
ization produces its own problems: During popular Most computer conferencing systems organize
hours, most of the dial-up ports and PDNs-public messages into conferences according to subject mat-
ter. Many have each conference (SIG, newsgroup, knowledgeable people, and so to keep elementary
etc.) overseen by a person who may be called an questions out of UNIX-WIZARDS. This new news-
editor, a moderator, or a Sysop (the term used on group is popular, at least. There is also a moderated
most commercial and personal systems). This person newsgroup, comp.unix. This has little traffic, appar-
filters out duplicate submissions, and may in some ently because people do not want to have to justify
cases reject ob.jectional submissions or remove them the value of their submissions. UNIX-WIZARDS still
after they are posted. Reasons for rejection vary has a recognizable group of technical contributors
widely according to the network, conference, and and readers who use it in their work. Many of them
people involveId. Sometimes actual editing is done. can also be found attending USENIX conferences for
The role of the moderator-as perceived by the the same reasons. Many of those who no longer fol-
tnoderators themselves, as well as network adminis- low UNIX-WIZARDS use other newsgroups or mail-
trators, submittors, and readers-can vary widely. ing lists or private mail for the same purpose.
For example, accusations of censorship are unfortu-
AILIST@SRI-ALARPA or comp.ai: This is a general
nately common, though few moderators believe they
technical discussion list or newsgroup for artificial
are justified.
intelligence (AI) researchers. It is moderated and di-
SOCIAL AND LEGAL ISSUES gestified. The volume is high, and topics range from
Networks have effects on their users that go beyond press treatment of AI to esoteric points of logic to
the issue of immediate practical utility [32]. The pri- implementation details. Submittors range from the
mary effect is increased human interaction. If infor- most eminent practitioners to novices, with the
mation overload can be avoided, increased interac- moderator selecting more for the former. It is not
tion can lead to better technical productivity clear that this list accurately reflects the working AI
through the exchange of ideas and references. It can community, but it certainly has its own following.
also lead to unanticipated social interaction among [email protected]: This is an ARPA Internet
specialized or diverse groups of people. In addition mailing list that deals with the TCP/IP protocol
to social effects, network interaction has potential suite. It is used both for dissemination of information
legal implications for users and administrators. to people not familiar with the protocols, and for
working technical discussions among their imple-
Networked Communities
mentors, most of whom appear to follow the list.
Certain newsgroups, mailing lists, bulletin boards,
There are other similar lists on more specific net-
and SIGs have reliable followings that form social
working topics.
groups. These range from groups interacting strictly
in pursuit of technical goals to others interacting for news.group: This is a USENET newsgroup for dis-
the sake of interaction, to still others for whom the cussing the creation and deletion of newsgroups. It
networked interaction is an aspect of or leads to has on occasion been one of the highest volume
outside interaction. newsgroups on the network. There are other news-
groups that are also about USENET itself.
Technical Groups.
[email protected]: This ARPA Internet INFO-NETS%[email protected]: This is
mailing list’ dates back to around 1977 on the a mailing list about networks. Typical postings might
ARPANET and i.s currently gatewayed bidirection- deal with requests for paths to specific hosts on cer-
ally and automatically with the USENET newsgroup tain networks or requests for position statements by
comp.unix.wizards. It is possible that most working people involved with NSFnet. Some information in
UNIX software developers and system administra- this article was obtained from responses to requests
tors read this list up to a few years ago, but many on this list.
have since canceled their subscriptions because of [email protected]: HUMAN-
how long it takes to sort through the much larger NETS is perhaps the prototypical technical list about
volume of submissions. There have been several social issues. It is a forum for discussions of the so-
attempts to reduce the traffic and to keep it more cial effects of computers and specifically of com-
technical. The comp.unix.help newsgroup, which is puter networks. A discussion in this list led to the
gatewayed with the [email protected] mailing writing of an earlier version of this article.
list, was created to provide novices with access to
There are technical mailing lists for such things as
>The convention for subscribing to ARPA Internet mailing lists is to send mail
to list-REQUEST@domain. not list@domain. For example: If you want to get workstations, local-area networks, and many differ-
on the HUMAN-NETS list. mail a request to HUMAN-NETS-REQLJEST@- ent lists for many different manufacturers’ com-
RED.RUTGERS.EDU. Only actual submissions should go to HUMAN-
[email protected]:DU. puters. Not all technical lists or newsgroups are
to be used not only for communication among di- have many workstations on their LAN components,
rectly connected hosts, but also to tie LANs into so the average size of their hosts is smaller. Personal
internets. computers are sometimes connected to internets like
ARPANET technology had been used by BBN to the ARPA Internet, and some are part of the dial-up
build the commercial network TELENET (later sold networks. Users of IBM PCs have found a network of
to GTE) by 1976, and commercial X.25-based net- their own in FidoNet. At the other end of the spec-
works followed. In Europe the PTTs controlled (and trum, at least one network, MFENET, was developed
still control) the PDNs in each country (one per primarily for access to supercomputers.
country) and hlave universally settled on X.25 as Computer networks have spread to larger and
their network layer protocol. The PTTs favor circuit smaller machines, different lower layer technologies,
switching rather than packet switching, so most of different protocols, and many nations. Though their
the CCITT protocols such as X.25 and X.400 are ori- diversity continues to increase, most noncommercial
ented toward virtual circuits. networks are connected with each other at least for
Computer conferencing systems started in 1976 the purposes of mail exchange and thus already con-
and later found commercial viability in centralized stitute a worldwide metanetwork, first predicted
services such as EIES and Delphi as well as some- years ago and called Worldnet (see Figure 2).
what more distributed systems like CompuServe.
Personal computers are often used as free bulletin BIBLIOGRAPHIC NOTES
boards. A good introduction to actual functioning networks
Meanwhile, another networking technology, based is [50]. The standard tutorial introduction to the the-
on dial-up telephone links instead of dedicated con- ory of computer networks is still [85]. The reader
nections, was being developed. Two of the earliest can gain a useful amount of context by reading just
products of thi,s technology were ACSNET and its first chapter, and there is an overview paper by
UUCP, both of which survive in modified forms. The the same author [86]. Either of these should be sup-
dial-up networks produced the most distributed of plemented by recent publications on the various
the conferencing systems: USENET. protocols and protocol suites, for which see the
CSNET started as an attempt to bring the collabo- specific references. A perspective on historical and
rative advantages of the ARPANET to researchers recent developments in protocol design and imple-
beyond the ARPANET community by using dial-up mentation can be found in [66]. Good discussions
mechanisms similar to those of UUCP. MAILNET concerning networks and protocols can be found
grew out of a similar effort. BITNET made IBM’s in [38], and there are some useful comparative net-
internal mainframe networking technology available work papers in [13]. Much of the information in this
to the academic community and even spread to article was obtained over the networks it describes,
some non-IBM hosts. It has also spread outside the either by mail, file transfer, or news. Some of the
United States as NETNORTH and EARN. references are to articles in well-known digests
Internets required new protocol suites, such as or newsgroups.
Xerox NS, the U.S. DOD’S TCP/IP, and the IS0 pro-
tocols. The spread of NS has, some say, been stifled Acknowledgments. The number of people who
by the secrecy of its originating company. The have supplied information for or otherwise helped
TCP/IP protocols are by far the most widely imple- with this article is much too large for their names to
mented of these three due to the accessibility of be listed here; the authors thank all of them. How-
their specifications, their long history of practical ever, we would like to especially acknowledge a few
use, and the backing of the U.S. government. Some whose aid has extended far beyond their own net-
of the IS0 protocols found implementation in 1983 works and the call of duty, including Rick Adams,
on CDNnet, the first EAN network, and spread rap- Janet Asteroff, Piet Beertema, Kilnam Chon, Pete
idly in Europe the following year. Other implemen- Collinson, John R. Covert, Franklin Davis, Peter J.
tations, particularly of X.400 (actually a CCITT pro- Denning, Robert Elz, Erik Fair, Michel Gien, Mark
tocol), have followed, especially in Europe. Most of Horton, Jin H. Hur, Christian Huitema, Daniel
the IS0 protocols are either adoptions of CCITT Karrenberg, Steve Kille, Joshua Knight, John Larson,
protocols or are, like them, oriented toward virtual Barry Leiner, Jun Murai, Henry Nussbacher, Craig
circuits. Partridge, Hans Strack-Zimmermann, Gligor
Hosts on early networks were usually either main- Tashkovich, Valerie Thomas, Hide Tokuda, and
frames or minicomputers. A few networks, such as doubtless others whom we have inadvertently ne-
BITNET, continue this tradition. Internets usually glected to mention. Many network administrators
CYCLADES
MILNET
*
ARPANET ARPA Irlferwf DDN
-\ *
‘\ \ NSFnet
\ ;-
\
\ CSNET /’
\ \ *
\ \ \ Cypress
\ \
\ *
\ ‘, X25NET
\ *
\
\ Phonenet
*
SERCnet JANET
*
CDNnet
b
European EAN networks
---_--_-- COSAC
*
SMARTIX
VNET
\ *
\ NETNORTH
\ *
\ BITNET
*
EARN
*
FidoNet
ACSNET
\ *
\
\
EUnet \
>
USENET
*
UUCP
*
SDN A
JUNET
*
1969 1970 1972 1974 1976 1977 1978 1979 1980 1981 1982 1983 1984 1985 1986 1987
Solid lines indicate a continuing operational network, and dashed lines indicate a transfer
of technology to a newer network. Italics indicate internets.
have supplied information, but information included 25. Gilmore, P., and Neufeld, G. A strategy for a national electronic
messaging system for research in Canada. In Proceedings of the Cana-
about any network may not necessarily reflect the dian Information Processing Society National Meeting (Montreal, Can-
views of its administrators, users, or others associ- ada, June). 1985.
26. Ginsberg, K. Getting from here to there. In Unix Review, vol. 4, no. I,
ated with it. Inclusion or omission of a section on M. Compton. Ed. Freeman, San Francisco, Calif., Jan. 1986, p. 45.
any network d.oes not imply anything about the im- (“How UNIX communications facilities compare with the routing
mechanisms of TYMNET, DNA, SNA, and ARPANET-and why
portance, quality, size, or an.y other property of that UNIX users should care.“)
network: The networks included are simply those 27. Green, J.L., and King, J.H. Behind the scenes during a comet encoun-
ter. EOS 67, 105 (Mar. 1986).
that the authors noticed. Any intentional inaccura- 28. Green, J.L., and Peters, D., Eds. Introduction to the space physics
cies or other falults in this article are the sole respon- analysis network (SPAN). TM-86499, NASA Ames Research Center,
Moffett Field, Calif.. Apr. 1985.
sibility of the aluthors. 29. Green, J.L., and Zwickl, R.D. Data system users working group meet-
ing report. EOS (meeting report) 67, 8 (1986).
30. Green, J.L., Peters, D.J., Heijden, N., and Lopez-Swafford, B. Manage-
ment of the space physics analysis network. NSSDC Publication,
REFERENCES July 1986.
1. Allman, E. Interview with Peter Honeyman. In UNIX Review, vol. 4, 31. Hendricks, E.C., and Hartman, T.C. Evolution of a virtual machine
no. 1, M. Compton. Ed. Freeman, San Francisco, Calif., Jan. 1986, subsystem. IBM Syst. 1. 18, 1 (1979), 111.
p. 64. 32. Hiltz, S.R., and Turoff, M. Structuring computer-mediated commu-
2. Barber, D.L.A. A European informatics network: Achievement and nication systems to avoid information overload. Commun. ACM 28, 7
prospects. In IEEE ‘76 (Toronto. Canada, Aug.). IEEE, New York, (July 1985), 680-689.
1976, pp. 44-50, 33. Hinden, R., and Sheltzer, A. The DARPA internet gateway; RFC823.
3. BBN Laboratories. 4th anniversary issue. CSNET News 8 [Summer In ARPANET Working Group Requests for Comments, no. 823. SRI
1985). CSNET CIC, BBN Laboratories, Cambridge, Mass. International, Menlo Park, Calif., Sept. 1982.
4. Blumann, W., Cadwallader, R.. Diediw, A., Lovelock, J., Power. D., 34. Horton, M.R. Standard for interchange of USENET messages;
Pozzana, S., and Saury, C. Implementation of OS1 protocols in the RFC850. In ARPANET Working Group Requests for Comments, no. 850.
ESPRIT information exchange system. In ESPRIT ‘85: Status Report of SRI International, Menlo Park, Calif., June 1983.
Confinuing Work. Elsevier North-Holland, New York, 1986, pp. 1387- 35. Horton, M.R. What is a domain? In USENIX Association Conference
1396. Proceedings (Salt Lake City, Utah, June 12-15). USENIX Association,
5. Boggs, D.R., et al. Pup: An internetwork architecture. IEEE Trans. El Cerrito, Calif.. 1984, pp. 368-372.
Commun. COM-28.4 (1980), 612-624. 36. Horton, M.R. UUCP mail interchange format standard: RFC976. In
6. 13rand, S. Gate Five Road. Whole Earth Rev. 47 (July 1985), 103-104. ARPANET Working Group Requests for Comments, no. 976. SRI Inter-
7. Brand, S. Gate Five Road. Whole Earth Rev. 48 (Fall 1985), 139. national, Menlo Park, Calif., Feb. 1986.
8. Cerf, V.G., and Cain, E. The DOD internet architecture model. 37. Horton, M.R.. Summers-Horton, K., and Kercheval, B. Proposal for a
Comput. Networks 7 (1983). 307-318. UUCP/Usenet registry host. In USENIX Association Conference Pro-
9. Chon, K. National and regional computer networks for academic ceedings (Salt Lake City, Utah, June 12-15). USENlX Association,
and research communities in the Pacific region. In Proceedings of El Cerrito, Calif., 1984, p. 373.
PCCS (Seoul. Korea. Oct.). 1985, pp. 560-566. 38. IEEE. Proceedings of the 25th IEEE Computer Society International Con-
10. Chon. K., et al. System development network. In Proceedings of ference (COMPCONJ. Society Press, Los Angeles, Calif., Sept. 1982.
TENCON (Singapore, Apr.). 1984, pp. 133-135. 39. International Organization for Standardization. IS0 open systems
11. Chon. K., et al. SDN: A computer network for Korean research interconnection-Basic reference model. ISO/TC 97/SC, vol. 16, no.
community. In Proceedings ofPCCS (Seoul, Korea. Oct.). 1985, 719, International Organization for Standardization. Aug. 1981. Or-
pp. 567-570. dering information: American National Standards Institute, 1430
12. Comer, D. The computer science research network CSNET: A his- Broadway, New York, NY 10018. Phone: l-212-642-4900; elsewhere
tory and status report. Commun. ACM 26, 10 (Oct. 1983), 747-753. there are equivalent national ordering offices.
13. Compton, M.. Ed. Unix Review, vol. 4. no. 1. Freeman, San Francisco, 40. Ishida, H. Current status of the N-l inter-university network with
Calif., Jan. 1986. access to supercomputers in Japan. In Proceedings of PCCS (Seoul,
14. Cracker, D.H., Viltal, J.J., Pogran, K.T., and Henderson, D.A., Jr. Korea, Oct.). 1985.
Standard for the format of ARPA network text messages; RFC733. In 41. Jacobsen, O., and Postel, J. Protocol document order information;
ARPANET Workin‘g Group Requests for Comments. SRI International, RFC980. In ARPANET Working Group Requests for Comments, no. 980.
Menlo Park, Calif.. Nov. 21.1977. SRI International, Menlo Park, Calif., Mar. 1986.
15. DARPA. A History of the ARPANET: The First Decade. Bolt, Beranek 42. Jennings, D.M., Landweber. L.H., Fuchs, I.H., Farber, D.J., and
and Newman, Cambridge, Mass., Apr. 1983. (Defense Tech. Info. Ctr. Adrion. W.R. Computer networking for scientists. Science 231 (Feb.
AD Al 15440.) 28,1986). 943-950.
16. Davis, F. “Worldnet” and X.400 in Switzerland. IAM, Universitaet 43. Kawaguchi, K., Sate, K., Sample, R., Demco, J,, and Hilpert, B. Inter-
Bern, Bern. Switzerland. Apr. 1986. i’[email protected]~ connecting two X.400 message systems. In Proceedings $ the 2nd
17. Dennett, S., Feinler, E.J., and Perillo, F. ARPANET Znformation Bro- International Symposium on Computer Message Systems (Sept.). IFIP,
chure. DDN Network Information Center, SRI International, Room Washington, D.C., 1985, pp. 15-26. (Also in Computer Message Sys-
EJ291, 333 Ravenswood Ave., Menlo Park, CA 94025, Dec. 1985. tems-85, pp. 17-28.)
18. Denning, P.J. Internal structure of networks. Am. Sri. (Mar.-Apr. 44. Kiessig. R. UUCP Network Directory, vol. 2, no. 2. Spring 1986.
1985). P.O. Box 50174, Palo Alto, CA 94303.
19. Denning, P.J. Supernetworks. Am. Sci. (May-June 1985), 225-227. 45. Kille, SE. Mapping between X.400 and RFC822; RFC987. In
20. Denning. P.J., Hear”, A.C., and Kern, C.W. History and overview of ARPANET Working Group Requests for Comments, no. 987. SRI Inter-
CSNET. In Proceedings of the ACM SIGCOMM Symposium (Mar.). national, Menlo Park, Calif., June 1986.
ACM, New York, 1983, pp. 138-145. 46. Kluger. L., and Shoch, J. Names, addresses, and routes. In Unix
21. Deparis, M., Duenki, A., Gien. M.. Louis, J., LeMoli, G., and Weak- Review, vol. 4, no. 1, M. Compton, Ed. Freeman, San Francisco,
ing, K. The implementation of an end-to-end protocol by EIN Calif., Jan. 1986, p. 30.
centres: A survey and comparison. In Proceedings of IEEE ‘76 (To- 47. Kummerfeld, R.J. ACSnet Current Stafus and Future Developmenf. Ko-
ronto, Canada, Aug.). IEEE, New York, 1976. rea, 1985.
22. Dick-Lauder, P., Kummerfeld, R.J., and Elz, R. ACSNET-The Aus- 48. Kummerfeld, R.J.. and Dick-Lauder, P.R. The Sydney Unix network.
tralian alternative to UUCP. In USENIX Association Conference Pro- Aust. Comput. J. 13, 2 (May 1981), 52-57.
ceedings (Salt Lake City, Utah, June 12-15). USENIX Association, El 49. Kummerfeld, R.J., and Dick-Lauder, P.R. Domain addressing in SUN
Cerrito, Calif.. 1984. pp. 11-17. III. In Proceedings of EUUG (Paris). 1985.
23. Emerson, S.L. LJSENET: A bulletin board for UNIX users. Byte (Oct. 50. Landweber, L.H., Jennings, D.M., and Fuchs, I. Research computer
19831, 219. networks and their interconnection. 1EEE Commun. Msg. 24, 6 (June
24. Fuchs, I.H. BITNET: Because it’s time. Perspect. in Comput. 3, 1 (Mar. 1986), 5-17.
1983). 51. Leiner, B.M., Cole, R.. Postel, J.. and Mills, D. The DARPA internet
protocol suite. IEEE Commun. Mug. (Mar. 1985). [Also in 1985 DDN 76. Seamonson, L.J., and Rosen, E.C. “STUB” Exterior gateway protocol;
Protocol Handbook, vol. 2.) RFC888. In ARPANET Working Group Requests for Comments, no. 888.
52. McQuillan, J.M., and Walden, D.C. The ARPA network design deci- SRI International, Menlo Park, Calif., Jan. 1984.
sions. Comput. Networks 1 (1977), 243-269. 77. Shoch, J.F. Internetwork naming, addressing, and routing. In Pro-
53. MIL-STD. Military Standards for DOD Internet Protocols. Naval Publi- ceedings of the 17th IEEE Computer Society Infernational Conference
cations and Forms Center, Code 3015, 5801 Tabor Ave., Philadel- (COMPCOM (Sept.). IEEE, New York, 1978, pp. 430-437.
phia, PA 19120. The ARPA Internet protocols are defined by the set 78. Shulman, C.H. Legal research on USENET liability issues. ;login: The
of military standards IP (MIL-STD-1777), TCP (MIL-STD-1778). FTP USENIX Assoc. News/. 9, 6 (Dec. 1984), 11-17. (USENIX Association,
(MIL-STD-1780). SMTP (MIL-STD-1781), and TELNET (MIL-STD- El Cerrito, Calif.)
1782). See also ARPANET Working Group Requests for Comments and 79. Simonsen, K.J. Re: Re: Network differences. net.unix, no.
1985 DDN Protocol Handbook. ([email protected]), USENET, Dec. 18,1985.
54. Mills, D.L. Exterior gateway protocol formal specification; RFC904. 80. SPAG. Guide to the Use of Standards. 1985.
In ARPANET Working Group Requests for Comments, no. 904. SRI 81. Spratt, E.B. Networking developments in the U.K. academic commu-
International, Menlo Park, Calif., Apr. 1984. nity. In International Conference on Information Network and Data
55. Mockapetris, P. Domain names-Concepts and facilities; RFC882. In Communication (INDC-86), IFIP TC.6 (Ronnedy, Sweden, May). IFIP,
ARPANET Working Group Requests for Comments, no. 882. SRI Inter- Washington, DC., 1986.
national, Menlo Park, Calif., Nov. 1983. 82. SRI International. 1985 DDN Protocol Handbook. DDN Network Infor-
56. Mockapetris, P. Domain names-Implementation and specification: mation Center, SRI International, Room EJ291, 333 Ravenswood
RFC883. In ARPANET Working Group Requests for Comments, no. 883. Ave., Menlo Park, CA 94025, 1985. Most relevant papers from both
SRI International, Menlo Park, Calif., Nov. 1983. ARPANET Working Group Requests for Comments and Military Stand-
57. Mockapetris, P. The domain name system. In Proceedings of the IFJP ards for DOD Internet Protocols are collected here.
6.5 Working Conference on Computer Message Services (Nottingham, 83. SRI International. ARPANET Working Group Requests for Comments.
England, May). IFIP. Washington, DC., 1984. (Also as ISI/RS-84-133, DDN Network Information Center, SRI International, Room EJ291,
June 1984.) 333 Ravenswood Ave., Menlo Park, CA 94025. This series of techni-
58. Mockapetris, P. Domain system changes and observations: RFC973. cal notes includes the specifications for the ARPA Internet protocols
In ARPANET Working Group Requests for Comments, no. 973. SRI IP (RFC791), ICMP (RFC792], TCP (RFC793), UDP (RFC768), FTP
International, Menlo Park, Calif., Jan. 1986. (RFC959). SMTP (RFC821), and TELNET (RFC854), plus related
59. Mockapetris, P., Pastel. J.. and Kirton, P. Name server design for papers. All the protocols are indexed in Assigned Numbers
distributed systems. In Proceedings of the 7th International Conference (RFC960) and Official ARPA-Internet Protocols (RFC961).
on Computer Communication (Sydney, Australia, Oct.). 1984. (Also as 84. Summers-Horton, K., and Horton, M. Status of the USENIX UUCP
ISl/RS-84-132, June 1984.) project. In USENIX Association Conference Proceedings (Dallas, Tex.,
60. Mogul, J., and Pastel, J. Internet standard subnetting procedure: Jan. 23-25). USENIX Association, El Cerrito. Calif.. 1985, p. 183.
RFC950. In ARPANET Working Group Requests for Comments, no. 950. 85. Tanenbaum. AS Computer Networks. Prentice-Hall Software Series,
SRI International, Menlo Park, Calif., Aug. 1985. Prentice-Hall, Englewood Cliffs, N.J., 1981.
61. Murai, J.. and Asami. T. A network for research and development 86. Tanenbaum. A.S. Network protocols. ACM Comput. Sure. 13, 4 (Dec.
communities in Japan-JUNET. In Proceedings of PCCS (Kaist, Korea, 1981). 453-489.
Oct.). 1985, pp. 579-588. 87. Uhlig, R., Ed. Computer Message Systems-85. Elsevier North-
62. Neufeld, G., Demco. J., Hilpert, B., and Sample, R. EAN: An X.400 Holland, New York, 1986.
message system. In Proceedings of the 2nd Infernafional Symposium on 88. VNET-BITNET Gateway General User’s Guide. Available on BITNET
Computer Message Systems (Sept.). IFIP, Washington, D.C.. 1985, via INFO@BITNIC, Mar. 22, 1985.
pp. l-13. (Also in Cornpurer Message Systems-85, pp. 3-15.) 89. Weinstein, L. Project Stargate. In USENlX Association Conference
63. Nowitz, D.A. Uucp implementation description. In UNIX Program- Proceedings (Portland, Oreg., June 11-14). USENIX Association,
mer’s Manual, 7th ed., vol. 2. Holt, Rinehart and Winston, New York, El Cerrito. Calif.. 1985. pp. 79-80.
1983. 90. Weinstein, L. Project Stargate. In EUUG Conference Proceedings
64. Nowitz, D.A., and Lesk, M.E. A dial-up network of UNIX systems. In (Florence, Italy, Apr.). European Unix Systems Users’ Group,
UNlX Programmer’s Manual, 7th ed., vol. 2. Halt, Rinehart and Win- Buntingford, England, 1986.
ston, New York, 1983. 91. Xerox Corporation. The Ethernet, a local area network: Data link
65. Organick, E.I. The Multics System: An Examinarion of Its Structure. layer and physical layer specification. X3T51/80-50. Xerox Corpora-
MIT Press, Cambridge, Mass., 1975. tion, Stamford, Corm., Oct. 1980.
66. Padlipsky, M.A. The Elements of Networking Style. Prentice-Hall, En- 92. Xerox Corporation. An internetwork architecture. XSIS 028112,
glewood Cliffs, N.J., 1985. Xerox Corporation, Stamford, Corm., Dec. 1981.
67. Partridge, C. Mail routing and the domain system; RFC974. In
ARPANET Working Group Requests for Comments, no. 974. SRI Inter-
national, Menlo Park, Calif., Jan. 1986.
68. Partridge, C. Report from the Internet NIC on domains, CSNET-
FORUM Dig. 2, 2 (Feb. 19, 1986). CSNET CIC. BBN Laboratories, CR Categories and Subject Descriptors: C.2.0 [Computer-
Cambridge, Mass. Communication Networks]: General-data communicofions: K.2 [History
69. Partridge, C. Mail routing using domain names: An informal tour. In of Computing]: systems, networks
Proceedings of the 1986 Summer USENIX Conference (Atlanta, Ga., General Terms: Management, Performance, Reliability, Standardiza-
June 9-13). USENIX Association, El Cerrito, Calif., 1986, pp. 366- tion
376. Additional Key Words and Phrases: Addressing, domains, gateways,
70. Postel, J. Domain name system implementation schedule-Revised; networks, protocols, Worldnet
RFCSPI. In ARPANET Working Group Requests for Comments, no. 921.
SRI International, Menlo Park, Calif., Oct. 1984.
71. Pastel. J., and Reynolds, J, Domain requirements; RFC920. In
ARPANET Working Group Requests for Comments, no. 920. SRI Inter-
national, Menlo Park, Calif., Oct. 1984.
72. Pouzin, L., Ed. The CYCLADES computer network-Towards lay- Author’s Present Address: John S. Quarterman. P.O. Box 14621, Austin,
ered network architectures. In Monograph Series of the ICCC, vol. 2. TX 78761; Josiah C. Hoskins, MCC, 9430 Research Blvd.. Kaleido
Elsevier North-Holland, New York, 1982, p. 387. Bldg. 2, Austin, TX 78759-6509.
73. Quarterman, J.S., Silberschatz, A., and Peterson, J.L. 4.2BSD and
4.3BSD as examples of the UNIX system. ACM Comput. Surv. I7,4
(Dec. 1985), 379-418.
74. Ritchie, D.M., and Thompson, K. The UNIX time-sharing system.
Bell Syst. Tech. 1. 57. 6, Part 2 (July-Aug. 1978), 1905-1929. (The Permission to copy without fee all or part of this material is granted
original version (Commun. ACM 17, 7 [July 19741, 365-375.) de- provided that the copies are not made or distributed for direct commer-
scribed Version 6. whereas this one describes Version 7.) cial advantage, the ACM copyright notice and the title of the publication
75. Sanderson, T., Ho, S., Heijden, N., Jabs, E.. and Green, J.L. Near- and its date appear, and notice is given that copying is by permission of
realtime data transmission during the ICE-comet Giacobini-Zinner the Association for Computing Machinery. To copy otherwise, or to
encounter. ESA Bull. 45, 21 (1986). republish, requires a fee and/or specific permission.