home *** CD-ROM | disk | FTP | other *** search
Text File | 1993-06-07 | 150.8 KB | 3,697 lines |
-
-
-
-
-
-
-
-
-
-
-
- Network Reading List:
-
-
- TCP/IP, UNIX, and Ethernet
-
-
-
-
-
-
-
-
-
-
-
- Charles Spurgeon
- UTnet Network Information Center
- University of Texas at Austin
-
- Document Version 4.0
- June, 1993
-
-
-
-
-
-
- Copyright (c) 1993. Permission to copy without fee all or
- part of this material is granted provided that the copies
- are not made or distributed for direct commercial advantage.
- Copies must show the University of Texas at Austin as the
- source, and include this notice.
-
- Abstract
-
- This annotated list of resources is intended for network
- managers, developers, and users at the University of Texas
- at Austin, or anywhere that TCP/IP, UNIX, and Ethernet are
- used to provide computer communications.* These three net-
- working technologies share the same major attribute: they
- can be used to build interoperable network systems across a
- wide range of computer equipment. Because of their ability
- to provide the glue that holds networks together, TCP/IP,
- UNIX, and Ethernet are in wide use on campus and at many
- other sites.
-
- *UNIX is a registered trademark of AT&T.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Introduction
-
- This annotated list of resources was created to help you
- find information about TCP/IP, UNIX, and Ethernet. The list
- describes a number of items that cover the range from intro-
- ductory to in-depth information.
-
- This list is not comprehensive; instead it tries to describe
- those items that cover the territory well, and that deal
- with real-world problems found on growing networks. This
- list is not current, either; the amount of literature in
- this field is large and growing every day.
-
- Why These Three Technologies?
-
- The three technologies featured in this list are in wide use
- on campuses, at research centers and corporations, and at a
- rapidly growing number of sites worldwide. The popularity
- of TCP/IP, UNIX, and Ethernet is largely due to the vendor-
- neutral character of these technologies, which helps make
- interoperable networking possible.
-
- All three technologies are "open" in that the software and
- specifications are readily available. The TCP/IP protocols
- were developed with public funding and are in the public
- domain. UNIX is provided by a wide range of vendors and has
- included support for TCP/IP protocols and Ethernet for many
- years. The specification for Ethernet was published by a
- multi-vendor consortium and has since become a world-wide
- standard. Any vendor can develop products based on these
- three widely available technologies, and many have. This
- openness is the key to the network interoperability that
- these technologies provide.
-
- While there is no precise definition of network interopera-
- bility, it is often taken to mean a set of computers of
- widely varying types that are capable of working well
- together. In an interoperable network system you can get
- your work done across a range of computer systems linked by
- a common set of standard network protocols, network
- software, and network hardware.
-
- In the network computing environment on campus today you
- will find equipment in use that comes from a wide variety of
- computer vendors. In such an environment interoperability
- isn't just a desirable feature, it's essential to the opera-
- tion of the network system.
-
- Another common feature of today's networks is their growth
- and increasing complexity. TCP/IP, UNIX, and Ethernet have
- proven their ability to adapt as networks evolve and more
- and more users are added. These technologies make it
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- possible to build large networks that are both reliable and
- fast, and that can support thousands of users.
-
- Organization
-
- The list was designed to be as self-contained as possible,
- and to make it easier for you to decide whether you want to
- follow up on a given resource.
-
- ISBN book numbers are shown to make it easier to find and
- order the books listed here. Prices are included when
- available, quoted in US dollars. The prices should be
- treated only as a rough guide however, since they may have
- changed by the time you read this list.
-
- Comments, corrections, etc. are welcome and may be sent to
- rlist@utexas.edu.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Section 1: TCP/IP
-
-
- Section 1
-
- This is Section 1 of a four-section document entitled "Net-
- work Reading List: TCP/IP, UNIX, and Ethernet." The four
- sections of this annotated list of resources were created to
- help you find information about TCP/IP, UNIX, and Ethernet.
- The complete list describes a wide range of items, including
- both introductory and in-depth information.
-
- Section 1 covers TCP/IP resources, Section 2 covers UNIX,
- Section 3, Ethernet, and Section 4, miscellaneous items.
-
- 1. TCP/IP
-
- A major advantage of the TCP/IP protocol suite is that it is
- widely implemented in many computer systems. This makes it
- possible for network managers to use TCP/IP protocols to
- link computers from many vendors.
-
- The TCP/IP protocol suite is a set of network standards ori-
- ginally developed for the Advanced Research Projects Agency
- (ARPA), of the US Department of Defense. This development
- led to the creation of the ARPANET which, in turn, led to
- the system of national and international networks known as
- the Internet. In the US the Internet connects regional net-
- work systems, and the regional networks link university cam-
- puses, corporate sites, etc. This system of IP networks
- allows you to send electronic mail, transfer files, and log
- into computers no matter where they are located, as long as
- they are attached to the Internet.
-
- The formal network standards for the TCP/IP protocol suite
- are available as a set of documents known as Request for
- Comments (RFCs). The RFCs contain a wealth of material, and
- some RFCs are written specifically to provide tutorial
- information on the TCP/IP protocol suite.
-
- However, most of the RFCs are technical specifications and
- do not contain introductory material to help the newcomer.
- Also, the details of managing a TCP/IP network are not
- covered in the formal network protocol specifications. To
- help fill in the gaps, this section begins with a look at
- some books that explain how things work. It also includes
- several guides to the worldwide network system that has
- grown up around the TCP/IP protocols.
-
- 1.1. Guides to the Internet
-
- +o The Internet Companion
- Tracy LaQuey with Jeanne C. Ryer
- 1993, Addison-Wesley, 196 pps with index and bibliogra-
- phy
-
-
-
- Page 1 Network Reading List
-
-
-
-
-
-
-
- Section 1: TCP/IP
-
-
- ISBN 0-201-62224-6
- $10.95
-
- An excellent beginner's guide to the global Internet. Writ-
- ten for a general audience, this guide provides an overview
- of the Internet as well as a briefing on the major services
- provided on the Internet. An appendix provides a number of
- useful resources including a list of public access systems
- that provide individual accounts for access to the Internet.
- The text of this book is being made available on the Inter-
- net, two chapters a month. You can FTP them from
- world.std.com in the pub/OBS/The.Internet.Companion direc-
- tory.
-
- From the Preface:
-
- "We will tell you why you need to know about the Internet
- and show you how people are already using it in their every-
- day activities. We'll explain how it vitalizes your home or
- office workstation beyond the usual capacities of word pro-
- cessing, games, and spreadsheet applications. And we'll
- introduce you to basic Internet concepts and applications--
- showing how it's possible to travel electronic highways and
- reach destinations such as Australia or Switzerland in mere
- seconds. If you're not already connected to the Internet,
- we'll show you how you can get access with only a computer
- and a modem."
-
- +o The Whole Internet User's Guide and Catalog
- Ed Krol
- O'Reilly & Associates, Petaluma, CA, 1992.
- 376 pps. with index and annotated resource guide.
- ISBN 1-56592-025-2
- $24.95
-
- The best general guide to the territory of the Internet. Ed
- Krol's book functions both as a tutorial on the basic Inter-
- net services and as a travel guide to a wide range of
- resources that can be found on the networks. Krol also
- discusses several of the newer information finding services
- such as the Internet Gopher, the Wide Area Information
- Server (WAIS), and the World-Wide Web (WWW).
-
- The book's audience is the general computer user, which
- means that you don't have to be a programmer or networking
- guru to benefit from the wide range of material in this
- book. Included is an excellent chapter that provides a step
- by step approach to dealing with network problems and figur-
- ing out why things may not be working correctly. Also
- included is the Whole Internet Catalog which provides an
- alphabetic list of Internet resources from Aeronautics and
- Astronautics to Zymurgy.
-
-
-
- Network Reading List Page 2
-
-
-
-
-
-
-
- Section 1: TCP/IP
-
-
- From Chapter One:
-
- "In particular, here's what we will cover:
- -o- How to log on to other computers on the Internet (tel-
- net). (...)
- -o- How to move files from one computer to another (ftp).
- (...)
- -o- How to send electronic mail to other people who use the
- Internet. (...)
- -o- How to read and participate in group discussions (USENET
- news). (...)
- -o- How to find where various network resources, ranging
- from people to software to general databases, are located
- ("white pages," archie, gopher, WAIS, World-Wide Web). One
- of the Internet's problems is that it's too rich; there are
- so many resources available, it's hard to find what you
- want, or to remember where what you want is located. A few
- years ago, the network was like a library without a catalog.
- The "cataloging" tools are just now being put into place.
- We'll tell you how to use some new and exciting tools (and
- some older, less-exciting tools) to locate almost anything
- you might possible want, ranging from people and software to
- sociological abstracts and fruit-fly stocks."
-
- +o Cruise of the Internet
- Merit Network, Inc.
-
- Merit is a non-profit consortium of state-supported univer-
- sities in Michigan. The Merit Network Information Center
- has produced a computer-based guided tour of the Internet
- that runs on both Mac and DOS computers.
-
- You can use anonymous FTP to copy the files from host
- ftp.merit.edu in directory internet/resources/cruise.mac or
- internet/resources/cruise.dos Use the "bin" setting in FTP
- when copying the files to make sure that they remain in
- their original format. Instructions for using anonymous FTP
- can be found in the access to resources in Section 4. From
- the README file:
-
- Merit's "Cruise of the Internet" is a computer-based
- tutorial for new as well as experienced Internet "navi-
- gators." The Cruise will introduce you to Internet
- resources as diverse as supercomputing, minorities,
- multimedia, and even cooking. It will also provide
- information about the tools needed to access those
- resources.
-
- The Cruise is designed to run on either Macintosh or
- DOS-compatible computers that meet the following
- specifications:
-
-
-
-
- Page 3 Network Reading List
-
-
-
-
-
-
-
- Section 1: TCP/IP
-
-
- Mac - A Macintosh II, LC or Quadra series computer
- - 8-bit color and any color monitor (12" minimum)
- - System 6.05 or 7.x
- - Approximately 3 MB of disk space
- - 4 MB RAM is recommended"
-
- DOS - An IBM-DOS or DOS-compatible computer
- - XGA- or XGA-compatible adapter set to display 256
- colors at 640x480
- - Microsoft Windows(TM) version 3.1 running in enhanced
- mode
- - Approximately 1.5 MB of disk space
- - 2 MB RAM minimum
-
- If you can't get the Cruise directly from the online
- archive, you have one other option. The Cruise is
- available on 1.44MB HD diskettes for both DOS and Mac
- for $10.00 per copy. Send your name and address,
- specify the operating system, and include a check or
- money order (payable to "University of Michigan") or
- your VISA/MasterCard number (including the expiration
- date and your signature) to:
- Merit Network, Inc.
- Information Services
- 2901 Hubbard, Pod G
- Ann Arbor, MI 48105
-
- +o Tour of the Internet
- HyperCard Stack
- The NSF Network Service Center (NNSC)
-
- This guide is based on HyperCard, a program that runs on
- Macintosh computers. The guide includes a large amount of
- information on both the structure and the content of the
- Internet. The set of cards in this HyperCard stack contain
- information on subjects ranging from the networks that make
- up the Internet, to how to find a variety of specific ser-
- vices available via the Internet. The HyperCard stack
- includes a section reserved for local information on your
- network. This allows you to customize the stack for use at
- your site.
-
- From the README file:
-
- "The NSF Network Service Center (NNSC), a project of the
- Laboratories business unit of the Systems and Technologies
- Division, has developed a Tour of the Internet in HyperCard
- (TM) format for novice network users. The stack has basic
- information including history, sample email, ftp, and telnet
- sessions, and a glossary. The Tour is intended to be a fun
- and easy way to learn about the Internet."
-
-
-
-
- Network Reading List Page 4
-
-
-
-
-
-
-
- Section 1: TCP/IP
-
-
- "We have included a 'Local Info' section as part of the
- Tour. This section is a place where an organization can add
- information relevant to its own group of users, for example
- a listing of resources at that site, or other, specialized
- information."
-
- "In order to run this stack, you need to have HyperCard 2.
- HyperCard 2 requires Macintosh system 6.0.5 or higher."
-
- Access Information for Internet Tour
-
- The Internet Tour HyperCard stack is available via anonymous
- FTP from host nnsc.nsf.net in the internet-tour directory.
- The file Internet-Tour-README contains instructions on how
- to retrieve the HyperCard stack and convert it into a Hyper-
- Card file on your Macintosh. Instructions for using
- anonymous FTP can be found in the access to resources in
- Section 4.
-
- An alternative method of access is to use the CSNET INFO-
- SERVER as described in the following excerpt from the README
- file:
-
- (1) Send a message to 'INFO-SERVER@sh.cs.net'. You do
- not need a subject field. The text of your message must
- be in a special format (this is very important), but it
- does not matter whether the letters are uppercase or
- lowercase.
- REQUEST: nsfnet
- topic: INTERNET-TOUR
- TOPIC: HELP
- request: end
-
- ``Request: nsfnet'' tells the Info-Server to look for
- the topics in the NSFNET section of the Info-Server.
- ``Topic:internet-tour'' orders BOTH of the files about
- the tour, ``Internet-Tour-readme'' and ``Internet-
- Tour.sit.hqx''. ``Topic: help'' orders a file with
- information about other NSFNET files in the CSNET
- Info-Server.
-
- (2) If you want to order ONLY the file ``Internet-
- Tour.sit.hqx'', put the following request in the text
- of your message:
- request: NSFNET
- topic: internet-tour.sit.hqx
- REQUEST: end
-
- 1.2. Electronic Mail and the Internet
-
- +o !%@:: A Directory of Electronic Mail Addressing and
- Networks
-
-
-
- Page 5 Network Reading List
-
-
-
-
-
-
-
- Section 1: TCP/IP
-
-
- Third edition due June 1993
- Donnalyn Frey and Rick Adams.
- O'Reilly & Associates, Petaluma, CA, 1989. 420 pps.
- with three-way index.
- ISBN 1-56592-031-7
- $27.95
-
- This directory describes how to use electronic mail. The
- first section of the book contains a general description of
- the format and peculiarities of electronic mail addressing.
- The next section, the major portion of the book, contains
- brief descriptions of many of the worldwide networks. Each
- network description includes an explanation of the elec-
- tronic mail addressing in use, contact information, and a
- map of the network. As a quick desk reference for the har-
- ried network manager who is trying to unravel tangled elec-
- tronic mail messages, there's nothing better.
-
- From the preface:
-
- "If you routinely send electronic mail, this book will pro-
- vide you with up-to-date, concise information on the major
- electronic mail networks around the world. If you are an
- administrator or network manager, your users can use this
- book to find information on networks themselves, without
- asking you."
-
- "Assume you need to know how to contact someone in Iceland
- who you met at a conference. You can use this book by turn-
- ing to the three-way index and looking up Iceland to find
- ISNET, the network in Iceland. Next you turn to the section
- of the book on ISNET and read who participates in the net-
- work and how to address mail. Then you can look up an indi-
- vidual university or company in the alphabetical index of
- second-level domain addresses to help you create a working
- electronic mail address for your correspondent. You can
- also send electronic mail to the contact person for ISNET,
- listed under Contact, and ask how you might find an address
- for your colleague in Iceland."
-
- 1.3. TCP/IP Network Administration
-
- +o TCP/IP Network Administration
- Craig Hunt
- 1992, O'Reilly & Associates, Petaluma, CA
- ISBN 0-937175-82-X
- $29.95
-
- A guide to TCP/IP administration that collects all the bits
- and pieces of network administration in one place. The
- topics in the book range from the basics of TCP/IP protocols
- and how to set up a TCP/IP address on your machine, to
-
-
-
- Network Reading List Page 6
-
-
-
-
-
-
-
- Section 1: TCP/IP
-
-
- configuration of name service, mail service, and routing.
- The target machine is a UNIX system running System V or
- SunOS.
-
- From the Preface:
- "This book is intended for everyone who has a UNIX computer
- connected to a TCP/IP network. This obviously includes the
- network managers and the system administrators who are
- responsible for setting up and running computers and net-
- works, but the audience also includes any user who wants to
- understand how his or her computer communicates with other
- systems. The distinction between a "system administrator"
- and an "end-user" is growing increasingly fuzzy. You may
- think of yourself as an end-user, but if you have a UNIX
- workstation on your desk, you're probably also involved in
- system administration tasks."
-
- Contents include:
- - overview of TCP/IP
- - delivering the data
- - name service concepts
- - getting started
- - basic configuration
- - configuring the interface
- - configuring routing
- - configuring DNS name service
- - network applications
- - sendmail
- - troubleshooting TCP/IP
- - network security
- - other sources of information
- - appendixes include: network contacts, forms, a gated
- reference, named reference
-
- +o Introduction to Administration of an Internet-based
- Local Network
- Charles L. Hedrick.
- 1988, Rutgers, The State University of New Jersey. 46
- pps. No index.
- Available via anonymous FTP from host cs.rutgers.edu in
- the runet subdirectory. The file is called tcp-ip-
- admin.doc and a PostScript version is available as
- tcp-ip-admin.ps Instructions for using anonymous FTP
- can be found in the access to resources in Section 4.
-
- This is a tutorial written by Charles Hedrick in July 1988,
- and intended for network managers faced with the task of
- setting up a campus network system based on TCP/IP proto-
- cols. The illustrations are limited to ASCII graphics, and
- there is no index, but nonetheless the information in this
- brief guide can be very helpful when it comes to unraveling
- the issues involved in the complex tangle of network
-
-
-
- Page 7 Network Reading List
-
-
-
-
-
-
-
- Section 1: TCP/IP
-
-
- addressing, network routing, network topologies, and network
- hardware.
-
- Of special interest is the discussion of network repeaters,
- bridges, and routers, in which Hedrick describes the main
- features of each, and contrasts their function and utility
- in the creation of large network systems.
-
- From the Introduction:
-
- "This document is intended to help people who are planning
- to set up a new network based on the Internet protocols, or
- to administer an existing one. It assumes a basic familiar-
- ity with the TCP/IP protocols, particularly the structure of
- Internet addresses."
-
- "This document does not attempt to replace technical docu-
- mentation for your specific TCP/IP implementation. Rather,
- it attempts to give overall background that is not specific
- to any particular implementation. It is directed specifi-
- cally at networks of "medium" complexity. That is, it is
- probably appropriate for a network involving several dozen
- buildings. Those planning to manage larger networks will
- need more preparation than you can get by reading this docu-
- ment."
-
- +o The Simple Book
- An Introduction to Management of TCP/IP-based Internets
- Marshall T. Rose
- 1991, Prentice Hall, Englewood Cliffs, New Jersey,
- 384pps with index and bibliography.
- ISBN 0-13-812611-9
- $54.00
-
- As the TCP/IP Internet has grown, the problem of how to
- manage the network system has grown as well. The approach
- to network management that has evolved for TCP/IP is based
- on the Simple Network Management Protocol (SNMP), described
- in this, The Simple Book. Marshall Rose is an expert in the
- field and has been involved in the standards process that
- led to the adoption of SNMP. The Simple Book explains how
- the SNMP protocols work, and how they are organized.
- Marshall Rose candidly discusses the politics of standards
- development, and includes some pithy observations on this
- subject between the "soapbox" icons in the book's margins.
-
- From the Preface:
-
- "This book is intended to serve both as a graduate-level
- text and also as a professional reference. It is expected
- that the reader has a modest background in networking."
-
-
-
-
- Network Reading List Page 8
-
-
-
-
-
-
-
- Section 1: TCP/IP
-
-
- "The first part of the book, Chapters 1 and 2, presents a
- brief history of networking and the need for network manage-
- ment. Following this, the Internet suite of protocols is
- examined. Since this is a book about managing TCP/IP-based
- internets, many of the management details can make sense
- only in the presence of a discussion of the protocols and
- systems being managed. The text tries to present a
- "detailed introduction." That is, the level of information
- must be deep enough so that management issues can be
- explored later on, but not too detailed so as to dwell on
- the nuances of each protocol."
-
- "The second part of the book, Chapters 3 through 5, details
- the Internet-standard Network Management Framework. In par-
- ticular, the Structure of Management Information (SMI) and
- the Management Information Base (MIB) are thoroughly
- explored, followed by the mechanism used to manage inter-
- nets, the Simple Network Management Protocol (SNMP)."
-
- "The third part of the book, Chapter 6, briefly introduces
- the policies used to manage internets. The actual policies
- (as opposed to mechanical aspects) of network management are
- currently poorly understood, so only a basic coverage can be
- presented at this time."
-
- "The fourth part of the book, Chapter 7, gives an overview
- of an actual implementation, the 4BSD/ISODE SNMP package.
- Both an agent and manager implementation will be examined,
- along with a common Applications Programmer's Interface
- (API)."
-
- "Finally, as the book concludes, future trends are identi-
- fied in Chapter 8. In the appendices, the book contains a
- chapter on Internet management "lore" (commonly asked ques-
- tions and answers), various lists of object assignments and
- definitions, and so on. In addition, ordering information
- for ISODE is given."
-
- 1.4. The Request for Comments (RFCs)
-
- A major advantage of the TCP/IP protocol suite is that the
- formal protocol standards are readily available. The stan-
- dards documents that describe the protocols are freely
- available over the Internet, or they can be purchased in
- hard copy form.
-
- These standards are known as Request for Comments, or RFCs.
- The origin of the name is described in RFC 1000. RFC 1000
- describes the evolution of the RFCs, beginning with the ori-
- ginal protocol developers who, being graduate students and
- faced with the need for publishing the evolving technical
- specifications, chose to call the documents Request for
-
-
-
- Page 9 Network Reading List
-
-
-
-
-
-
-
- Section 1: TCP/IP
-
-
- Comments so as not to offend anyone who might be in charge
- of the newly chartered ARPANET. Most of the RFCs are still
- available, and the entire set of RFCs provides a rare look
- at the evolution of a major protocol suite.
-
- The Internet is still evolving, and RFCs are still being
- written to guide, codify, and explain this evolution. Some
- of the RFCs are purely informative in nature, aimed at the
- newcomer to TCP/IP networking, or intended to help program-
- mers implement the standards correctly. When looking for an
- RFC be sure to check the RFC index for the latest version,
- since RFCs are updated when changes are needed.
-
- The RFCs are available electronically by way of the File
- Transfer Program (FTP), as well as by electronic mail. Both
- of these methods are described below. Hard copies of the
- RFCs are also available from SRI International as described
- below.
-
- 1.4.1 Some Useful RFCs
-
- The books by Douglas Comer and Marshall Rose contain guides
- to the RFCs, listed by category, and these guides can pro-
- vide a handy navigational aid through the sea of specifica-
- tions. As of this writing there are over 1,450 RFCs listed
- in the RFC index, and it's impossible to describe even the
- most important ones here. Instead, listed next are some
- examples of RFCs written as purely informative documents as
- well as some RFCs describing essential numbers used in the
- TCP/IP protocols.
-
- +o RFC1462, FYI on What
-
- "This FYI RFC answers the question, "What is the Internet?"
- and is produced by the User Services Working Group of the
- Internet Engineering Task Force (IETF). Containing a modi-
- fied chapter from Ed Krol's 1992 book, "The Whole Internet
- User's Guide and Catalog," the paper covers the Internet's
- definition, history, administration, protocols, financing,
- and current issues such as growth, commercialization, and
- privatization."
-
- +o RFC1359, Connecting to the Internet: What connecting
- institutions should anticipate.
-
- "This FYI RFC outlines the major issues an institution
- should consider in the decision and implementation of a
- campus connection to the Internet.
-
- In order to provide clarity to the reader, some specific
- information has been detailed. In doing so, the document
- has been directed toward U.S. academic institutions that
-
-
-
- Network Reading List Page 10
-
-
-
-
-
-
-
- Section 1: TCP/IP
-
-
- have not yet connected to the Internet.
-
- However, the issues for which specific information has been
- provided can be generalized for any organization that wishes
- to participate in the world-wide Internet community. It
- will be necessary for those organizations to obtain the
- correct and detailed information from their local or
- national IP service providers. In addition, this document
- may be used as an evaluation checklist for organizations
- that are currently connected. Readers are expected to have
- general familiarity with networking concepts and terminol-
- ogy."
-
- +o RFC1244, Site Security Handbook
-
- A comprehensive list of the issues to be considered when
- developing computer and network security policy at your
- site. Includes a brief description of each issue, as well
- as a guide to security-oriented mailing lists and software.
- Also includes an annotated bibliography of other resources
- for information on security issues.
-
- +o RFC1208, A Glossary of Networking Terms
-
- A relatively short glossary produced to help a newcomer to
- networking find their way around the special jargon and
- acronyms used in the networking industry.
-
- +o RFC1207, Answers to Commonly Asked `Experienced Inter-
- net User' Questions
-
- This is one of two RFCs called "Questions and Answers," pro-
- duced by the User Services Working Group of the Internet
- Engineering Task Force. This set of Questions and Answers
- focuses on the sort of questions that might be asked by
- someone with experience using the Internet.
-
- +o RFC1325, Answers to Commonly Asked `New Internet User'
- Questions
-
- The companion RFC to RFC1207. This set of Questions and
- Answers focuses on the sort of questions that might be asked
- by someone new to the Internet.
-
- +o RFC1175, Where to Start: A Bibliography of Internet-
- working Information.
-
- This 42-page RFC contains an extensive bibliography on
- TCP/IP and the Internet, including several of the resources
- listed here. Also included is a list of conferences and
- workshops of interest to those in the field, as well as a
- set of newsletters on the subjects of TCP/IP and the
-
-
-
- Page 11 Network Reading List
-
-
-
-
-
-
-
- Section 1: TCP/IP
-
-
- regional network systems.
-
- +o RFC1173, Responsibilities of Host and Network Managers:
- A Summary of the Oral
-
- This short (5 page) RFC attempts to fill in some gaps by
- providing operational guidelines for network managers and
- host system managers. As noted in the title, the guidelines
- presented here are of the sort that "everybody knows" but
- that are rarely documented.
-
- +o RFC1178, Choosing a Name for Your Computer
-
- This short RFC provides some guidelines that can help ease
- the task of choosing a reasonable network name for your com-
- puter.
-
- +o RFC1118, Hitchikers Guide to the Internet
-
- This 24 page RFC is an informal guide to the basic concepts
- and the jargon of the TCP/IP Internet, intended for newco-
- mers to TCP/IP.
-
- +o RFC1402, There's Gold in them thar Networks! or Search-
- ing for Treasure in all the Wrong Places.
-
- An RFC written to help network users navigate among the many
- sources of information in the Internet. From the RFC:
- "This document was presented at the 1991 ACM SIGUCCS User
- Services Conference. It appears here in its updated form.
-
- There is a wealth of information on the network. In fact,
- so much information that you could spend your entire life
- browsing. This paper will present some of the "gold nuggets"
- of information and file repositories on the network that
- could be of use to end users.
-
- The ultimate goal is to make the route to these sources of
- information invisible to the user. At present, this is not
- easy to do. I will explain some of the techniques that can
- be used to make these nuggets easier to pick up so that we
- can all be richer."
-
- +o RFC1360, Official Protocol Standards
-
- This RFC is the most recent version of the Official Protocol
- Standards. This frequently updated RFC describes the TCP/IP
- standards creation process, as well as listing the RFCs that
- are the officially recognized TCP/IP standards.
-
- +o RFC1340, Assigned Numbers
-
-
-
-
- Network Reading List Page 12
-
-
-
-
-
-
-
- Section 1: TCP/IP
-
-
- The most recent version of the Assigned Numbers RFC as of
- this writing. The Assigned Numbers RFC contains a descrip-
- tion of the IP addressing fields as well as lists of all the
- essential numbers used in various parts of the protocol
- suite. This RFC also contains a list of Ethernet numbers of
- interest to anyone managing Ethernets. When looking for a
- copy of the Assigned Numbers RFC make sure to get the most
- recent version, as this RFC is periodically updated.
-
- +o RFC1180, A TCP/IP Tutorial
-
- A brief description of the basic structure of the TCP/IP
- protocol suite and how it works. Includes a description of
- sending TCP/IP datagrams over Ethernet networks, and how the
- ARP protocol is used to build links between IP and Ethernet
- addresses.
-
- +o RFC1147, FYI on a Network Management Tool Catalog:
- Tools for Monitoring and Debugging TCP/IP Internets and
- Interconnected Devices
-
- This RFC is a large collection of tools for network manage-
- ment, including sources for public domain software for net-
- work testing and troubleshooting. The RFC includes a net-
- work management tutorial that describes some of the basic
- concepts of networking monitoring and management. A handy
- guide to a rapidly growing area.
-
- +o RFC1122, Requirements for Internet Hosts - Communica-
- tion Layers
- RFC1123, Requirements for Internet Hosts - Application
- and Support
-
- These two "Host Requirements" RFCs provide the latest guide-
- lines and interpretations for the TCP/IP protocols.
- Together they represent the latest understanding of how the
- protocol suite functions, as well as providing corrections
- and expanded information for many of the prior RFCs. These
- two documents are essential companions to the RFCs that are
- listed as standards for the TCP/IP protocol suite.
-
- +o RFC 1000, The Request For Comments Reference Guide
-
- This 149 page RFC contains an annotated guide to the first
- 1000 RFCs, along with a brief history of the origins of the
- RFCs.
-
- 1.4.2 Electronic Mail and FTP Access to the RFCs
-
- The RFCs and several other documents in this guide may be
- retrieved using the TCP/IP-based File Transfer Program
- (FTP). If your computer supports the FTP program, and you
-
-
-
- Page 13 Network Reading List
-
-
-
-
-
-
-
- Section 1: TCP/IP
-
-
- have direct access to the Internet, you may retrieve such
- documents via the "anonymous FTP" process as described in
- the access to resources in Section 4.
-
- The RFCs listed above, and many more, are also available via
- e-mail for those without a direct Internet connection. One
- source of information for both FTP and electronic mail
- access to the RFCs is a mail server located at isi.edu. To
- get information on using the ISI mail server send a message
- to mail-server@isi.edu with the world "help" in the message
- body. Do not use quotation marks in the message you send,
- just the word "help" by itself.
-
- To find a location for retrieving copies of the RFCs send a
- message to mail-server@isi.edu with the command "help:
- ways_to_get_rfcs" in the message body. Once again, do not
- include the quotation marks. In reply you will be sent a
- file that lists a large number of sites that provide on-line
- access to the RFCs and many other documents. Here are some
- excerpts from that document:
-
- Where and how to get new RFCs
-
- RFCs may be obtained via EMAIL or FTP from many RFC
- Repositories. The Primary Repositories will have the
- RFC available when it is first announced, as will many
- Secondary Repositories. Some Secondary Repositories
- may take a few days to make available the most recent
- RFCs.
-
- Primary Repositories:
-
- RFCs can be obtained via FTP from DS.INTERNIC.NET,
- NIC.DDN.MIL, FTP.NISC.SRI.COM, NIS.NSF.NET,
- NISC.JVNC.NET, VENERA.ISI.EDU, WUARCHIVE.WUSTL.EDU,
- SRC.DOC.IC.AC.UK, or FTP.CONCERT.NET.
-
- 1. DS.INTERNIC.NET - InterNIC Directory and Database
- Services
-
- RFC's may be obtained from DS.INTERNIC.NET via FTP,
- WAIS, and electronic mail. Through FTP, RFC's are
- stored as rfc/rfcnnnn.txt or rfc/rfcnnnn.ps where
- 'nnnn' is the RFC number. Login as "anonymous" and
- provide your e-mail address as the password. Through
- WAIS, you may use either your local WAIS client or tel-
- net to DS.INTERNIC.NET and login as "wais" (no password
- required) to access a WAIS client. Help information
- and a tutorial for using WAIS are available online.
- The WAIS database to search is "rfcs".
-
-
-
-
-
- Network Reading List Page 14
-
-
-
-
-
-
-
- Section 1: TCP/IP
-
-
- 2. NIC.DDN.MIL (aka DIIS.DDN.MIL)
-
- RFCs can be obtained via FTP from NIC.DDN.MIL, with the
- pathname rfc/rfcnnnn.txt (where "nnnn" refers to the
- number of the RFC). Login with FTP username
- "anonymous" and password "guest".
-
- 3. FTP.NISC.SRI.COM
-
- RFCs can be obtained via FTP from FTP.NISC.SRI.COM,
- with the pathname rfc/rfcnnnn.txt or rfc/rfcnnnn.ps
- (where "nnnn" refers to the number of the RFC). Login
- with FTP username "anonymous" and password "guest". To
- obtain the RFC Index, use the pathname rfc/rfc-
- index.txt.
-
- SRI also provides an automatic mail service for those
- sites which cannot use FTP. Address the request to
- MAIL-SERVER@NISC.SRI.COM and in the body of the message
- indicate the RFC to be sent: "send rfcNNNN" or "send
- rfcNNNN.ps" where NNNN is the RFC number. Multiple
- requests may be included in the same message by listing
- the "send" commands on separate lines. To request the
- RFC Index, the command should read: send rfc-index.
-
- 4. NIS.NSF.NET
-
- To obtain RFCs from NIS.NSF.NET via FTP, login with
- username "anonymous" and password "guest"; then connect
- to the directory of RFCs with cd
- /internet/documents/rfc. The file name is of the form
- rfcnnnn.txt (where "nnnn" refers to the RFC number).
-
- For sites without FTP capability, electronic mail query
- is available from NIS.NSF.NET. Address the request to
- NIS-INFO@NIS.NSF.NET and leave the subject field of the
- message blank. The first text line of the message must
- be "send rfcnnnn.txt" with nnnn the RFC number.
-
- 5. NISC.JVNC.NET
-
- RFCs can also be obtained via FTP from NISC.JVNC.NET,
- with the pathname rfc/RFCnnnn.TXT.v (where "nnnn"
- refers to the number of the RFC and "v" refers to the
- version number of the RFC).
-
- JvNCnet also provides a mail service for those sites
- which cannot use FTP. Address the request to
- SENDRFC@JVNC.NET and in the subject field of the mes-
- sage indicate the RFC number, as in "Subject: RFCnnnn"
- where nnnn is the RFC number. Please note that RFCs
- whose number are less than 1000 need not place a "0".
-
-
-
- Page 15 Network Reading List
-
-
-
-
-
-
-
- Section 1: TCP/IP
-
-
- (For example, RFC932 is fine.) No text in the body of
- the message is needed.
-
- 6. VENERA.ISI.EDU
-
- RFCs can be obtained via FTP from VENERA.ISI.EDU, with
- the pathname in-notes/rfcnnnn.txt (where "nnnn" refers
- to the number of the RFC). Login with FTP username
- "anonymous" and password "guest".
-
- 7. WUARCHIVE.WUSTL.EDU
-
- RFCs can also be obtained via FTP from
- WUARCHIVE.WUSTL.EDU, with the pathname
- info/rfc/rfcnnnn.txt.Z (where "nnnn" refers to the
- number of the RFC and "Z" indicates that the document
- is in compressed form).
-
- At WUARCHIVE.WUSTL.EDU the RFCs are in an "archive"
- file system and various archives can be mounted as part
- of an NFS file system. Please contact Chris Myers
- (chris@wugate.wustl.edu) if you want to mount this file
- system in your NFS.
-
- 8. SRC.DOC.IC.AC.UK
-
- RFCs can be obtained via FTP from SRC.DOC.IC.AC.UK with
- the pathname rfc/rfcnnnn.txt.Z or rfc/rfcnnnn.ps.Z
- (where "nnnn" refers to the number of the RFC). Login
- with FTP username "anonymous" and password "your-
- email-address". To obtain the RFC Index, use the path-
- name rfc/rfc-index.txt.Z. (The trailing .Z indicates
- that the document is in compressed form.)
-
- 9. FTP.CONCERT.NET
-
- To obtain RFCs from FTP.CONCERT.NET via FTP, login with
- username "anonymous" and your internet e-mail address
- as password. The RFCs can be found in the directory
- /rfc, with file names of the form: rfcNNNN.txt or
- rfcNNNN.ps where NNNN refers to the RFC number. This
- repository is also accessible via WAIS and the Internet
- Gopher.
-
- 1.4.3 Hard Copies of the RFCs
-
- Paper copies of the RFCs may be acquired from SRI Interna-
- tional.
-
- +o SRI International
- Network Information Systems Center - EJ291
- 333 Ravenswood Avenue
-
-
-
- Network Reading List Page 16
-
-
-
-
-
-
-
- Section 1: TCP/IP
-
-
- Menlo Park, CA 94025
- (415) 859-6387
- FAX (415) 859-6028
-
- Hard copies of the RFCs, an RFC subscription service, and
- other products and services may be acquired from the Network
- Information Systems Center at SRI.
-
- 1.5. Internet Registration Service
-
- The Internet registration service provides IP network
- numbers and other registration services to sites wishing to
- connect to the Internet. In times past the registration of
- Internet addresses has been performed by the Network Infor-
- mation Systems Center at SRI International and then by the
- US Dept. of Defense Network organization (DDN NIC). As of
- April 1993, the registration service for non-DDN sites on
- the Internet is part of a new organization called the
- InterNIC. The InterNIC is a three part organization which
- includes network registration services, directory services
- and information services.
-
- The operation of the Internet registration service is
- described in RFC1400. You may also FTP to rs.internic.net
- to retrieve copies of the registration templates, policy
- documents, etc.
-
- The new Internet registration service provides a root name
- server zone file and a root name service for the Domain Name
- Service on the Internet. Information about the Internet
- Domain Name Service is provided in the books TCP/IP Network
- Administration and DNS and BIND. The primary root name
- server is: ns.internic.net at IP address 198.41.0.4
-
- You can FTP the root zone file from:
-
- rs.internic.net in the /domain directory.
-
- Telephone support for the Internet Registration service may
- be reached at:
- 1-800-444-4345
- or
- 1-703-742-4777
-
- The electronic mail address for more information is:
- hostmaster@internic.net
-
- For more information you may also telnet to host:
- rs.internic.net
-
- The U.S. Postal Address is:
- Network Solutions, Inc.
-
-
-
- Page 17 Network Reading List
-
-
-
-
-
-
-
- Section 1: TCP/IP
-
-
- Attn: InterNIC Registration Service
- 505 Huntmar Park Drive
- Herndon, VA 22070 USA
-
- 1.6. Other InterNIC Services
-
- There are three organizations that make up the InterNIC, and
- registration services is one of them. The other two ser-
- vices are Information Services and Directory Services.
-
- +o Information Services
-
- The information services portion of the InterNIC provides
- introductory information for Internet users and support for
- network information centers at other Internet sites. There
- are a number of ways to access the information at the Infor-
- mation Services center, including anonymous FTP, Telnet, and
- Gopher.
-
- Anonymous FTP access is provided at host is.internic.net.
- Gopher access is provided at the internic.net address. To
- access this gopher, start up a gopher application pointed to
- internic.net. If you do not have a gopher application run-
- ning on your computer you can access the gopher via Telnet.
- Telnet to is.internic.net and login as "gopher" to access
- the gopher information. This gopher provides access to
- information for all three portions of the InterNIC.
-
- The information services portion of the InterNIC may also be
- reached at:
-
- InterNIC Information Services
- General Atomics
- P.O. Box 85608
- San Diego, California
- Telephone: (800) 444-4345 or (619) 455-4600
- FAX: (619) 455-3990
- E-mail: info@internic.net
-
- +o Directory Services
-
- The directory services portion of the InterNIC provides a
- top-level directory of directories, as well as lists of
- various types of information servers available on the Inter-
- net.
-
- You can get access to the Directory Services information via
- anonymous FTP, Telnet, etc. For more information see the
- gopher described above, or telnet to ds.internic.net login
- as "guest," and follow the instructions.
-
-
-
-
-
- Network Reading List Page 18
-
-
-
-
-
-
-
- Section 1: TCP/IP
-
-
- The directory services portion of the InterNIC may also be
- reached at:
-
- Phone: (908) 668-6587
- Fax: (908) 668-3763
- Mail: admin@ds.internic.net
-
- 1.7. TCP/IP Protocols
-
- This section of the reading list describes two resources
- that provide tutorial information about the TCP/IP protocol
- suite.
-
- +o Internetworking With TCP/IP,
- Volume I: Principles, Protocols, and Architecture
- Douglas E. Comer.
- 1991, Second Edition, Prentice Hall, Englewood Cliffs,
- New Jersey, 547 pps. with index and bibliography.
- ISBN 0-13-468505-9.
- $48.00.
-
- Comer's writing style is clear and the book is well organ-
- ized, making this a good starting point for anyone who wants
- to understand how the TCP/IP protocol suite works. The book
- provides an introduction and guide to the entire TCP/IP pro-
- tocol suite. The basic concepts behind internetworking are
- described, as well as LAN technologies such as Ethernet and
- ProNET. With the basics covered, Comer goes on to explain
- how the essential elements of the TCP/IP protocols function,
- including examples of network applications based on the pro-
- tocols.
-
- Comer has two other volumes available in this series from
- Prentice Hall, one providing a complete example implementa-
- tion of the TCP/IP protocols with source code made avail-
- able, and the other describing client-server computing using
- TCP/IP protocols. The titles are Internetworking with
- TCP/IP, Volume II: Design, Implementation, and Internals and
- Internetworking with TCP/IP, Volume III: Client-Server Pro-
- gramming
-
- From the Preface of Internetworking with TCP/IP, Volume I:
-
- "Most textbooks and network courses concentrate on the first
- two stages of network research, presenting the well-known
- theories of data communications and queueing analysis.
- Although such information is important to engineers who
- design network technologies and hardware products, most net-
- work architects purchase commercially available network
- hardware. Instead of detailed knowledge about how bits or
- packets flow across communication media, they need to know
- how to interconnect such hardware and how to use the
-
-
-
- Page 19 Network Reading List
-
-
-
-
-
-
-
- Section 1: TCP/IP
-
-
- resulting system."
-
- "This text concentrates on the third stage of networking.
- It examines the architecture of interconnected networks and
- explains the principles and protocols that make such inter-
- connected architectures function as a single unified commun-
- ication system. More important, it shows how an intercon-
- nected architecture can be used for distributed computa-
- tion."
-
- "Designed as both a college text and as a professional
- reference, the book is written at an advanced undergraduate
- or graduate level. For professionals, the book provides a
- comprehensive introduction to the TCP/IP technology and the
- architecture of the Internet. Although it is not intended
- to replace protocol standards, the book is a good starting
- point for learning about internetworking because it provides
- a uniform overview that emphasizes principles. Moreover, it
- gives the reader perspective that can be extremely difficult
- to obtain from individual protocol documents."
-
- +o Introduction to the Internet Protocols
- Charles L. Hedrick.
- 1987, Rutgers, The State University of New Jersey, 27
- pps.
- Available via anonymous FTP from host cs.rutgers.edu in
- the runet subdirectory. The file is called tcp-ip-
- intro.doc and a PostScript version is available as
- tcp-ip-intro.ps.
-
- This tutorial was written by Charles Hedrick in July 1987.
- It serves as a short introduction to some of the basic con-
- cepts of the TCP/IP protocol suite. For another approach to
- the subject see RFC 1180, "A TCP/IP Tutorial" in the section
- on RFCs.
-
- From the Introduction:
-
- "This document is a brief introduction to TCP/IP, followed
- by advice on what to read for more information. This is not
- intended to be a complete description. It can give you a
- reasonable idea of the capabilities of the protocols. But
- if you need to know any details of the technology, you will
- want to read the standards yourself."
-
-
-
-
-
-
-
-
-
-
-
- Network Reading List Page 20
-
-
-
-
-
-
-
- Section 2: Unix
-
-
- Section 2
-
- This is Section 2 of a four-section document entitled "Net-
- work Reading List: TCP/IP, UNIX, and Ethernet." The four
- sections of this annotated list of resources were created to
- help you find information about TCP/IP, UNIX, and Ethernet.
- The complete list describes a wide range of items, including
- both introductory and in-depth information.
-
- Section 1 covers TCP/IP resources, Section 2 covers UNIX,
- Section 3, Ethernet, and Section 4, miscellaneous items.
-
- 2. UNIX
-
- It may seem odd to include an operating system in a list of
- network resources. However the UNIX system has been the
- platform for many networking innovations over the last
- decade. This section of the reading list is designed to
- help you find information on how UNIX networking functions,
- and how UNIX fits into the networking equation.
-
- The development of UNIX has been closely tied to both TCP/IP
- and Ethernet. In the early 1980's ARPA chose to fund the
- development of a Berkeley UNIX implementation of the TCP/IP
- protocols. This led to the inclusion of the TCP/IP proto-
- cols in Berkeley UNIX release 4.2.
-
- At the time, Berkeley had begun using the newly standardized
- Ethernet LAN technology to link their campus computers
- together, and the model of UNIX systems running TCP/IP and
- linked with Ethernet was exported to many other sites with
- the release of 4.2BSD UNIX. The availability of UNIX,
- TCP/IP, and Ethernet also helped spur growth of the scien-
- tific workstation market. The combination of UNIX worksta-
- tions with TCP/IP networking software and Ethernet hardware
- is quite common at many sites today.
-
- 2.1. UNIX In General
-
- UNIX and how it networks can be a daunting subject to the
- newcomer. To help try to cut things down to size, the next
- two items provide some background and context on UNIX in
- general, and UNIX network administration in particular.
-
- +o Life With UNIX
- Don Libes, Sandy Ressler
- 1989, Prentice Hall, Englewood Cliffs, NJ., 346 pps.
- with index.
- ISBN 0-13-536657-7.
- $34.95
-
-
-
-
-
- Page 21 Network Reading List
-
-
-
-
-
-
-
- Section 2: Unix
-
-
- UNIX documentation can be exceedingly cryptic and difficult
- to decipher. While the efforts of the many UNIX vendors
- have frequently improved the UNIX documentation of their
- systems (it would be hard to make it worse), it's still the
- case that a newcomer can find themselves drowning in details
- and wishing for some UNIX expert to come by and supply the
- big picture.
-
- Life With UNIX is that expert. While it could do with an
- update, nonetheless this is still the best single source for
- much undocumented folklore about how UNIX grew, and why
- things are the way they are.
-
- From the Preface:
-
- "No matter what people have told you, you can't learn UNIX
- from the manuals, or even the sources. UNIX is so much more
- than that. To understand UNIX is to understand its users
- and its applications, as well as its failures and flaws.
- This is just some of what this book hopes to cover."
-
- "Make sure you realize what this book isn't. It isn't a
- textbook on C or UNIX programming. (There are already
- plenty of good ones.) You won't learn how to write shell
- scripts or what is in the kernel. Well, maybe a little.
- But you will learn plenty of useful things. Things that
- will fill in gaps between other useful and useless things
- you already know about UNIX."
-
- +o UNIX System Administration Handbook
- Evi Nemeth, Garth Snyder, and Scott Seebass.
- 1989, Prentice Hall, Englewood Cliffs, NJ, 593 pps.
- with index and bibliography.
- ISBN 0-13-933441-6.
- $42.00
-
- While somewhat dated, the UNIX System Administration Hand-
- book still provides an exceptionally comprehensive guide to
- the nitty gritty details of UNIX system administration.
- It's also well written, with solid "hands-on" information.
- Of special interest is the large section on UNIX network
- administration.
-
- Included in this section is a brief description of how Eth-
- ernet works, featuring a list of typical Ethernet com-
- ponents. There's a short description of TCP/IP protocols
- and how to set up the various UNIX files that make TCP/IP
- software run. There's also a description of some LAN design
- issues, followed by the Sun Network File System protocols
- and operation. The section concludes with a few pages on
- how to debug and monitor your network. The book TCP/IP Net-
- work Administration listed in Section I contains much more
-
-
-
- Network Reading List Page 22
-
-
-
-
-
-
-
- Section 2: Unix
-
-
- network-specific information for UNIX systems; however, the
- UNIX System Administration Handbook is useful for the com-
- plete range of subjects it covers.
-
- From the preface:
-
- "Without guidance, it's easy for a new administrator to lose
- sight of ultimate goals in a sea of documentation or to
- inadvertently skip over one or more critical areas through
- failure to realize that they are important. That is where
- this book fits in. While we can't claim that everything you
- need to know is included, we can guarantee that after read-
- ing it you will know pretty much what UNIX administration
- involves and how to go about it."
-
- "The first six chapters of this book are presented in a
- sequence you should find useful if you are bringing up a
- system straight from the packing crate. In this section are
- contained the bare essentials, things you need to know just
- to get the system up and running. Chapters 7-14 introduce
- the various kinds of hardware that are typically used with
- UNIX and discuss how to install, configure, and operate this
- equipment. Chapters 15-19 discuss five important UNIX
- software subsystems: electronic mail, telephone communica-
- tion, network news, backups, and accounting. The rest of
- the chapters represent a grab-bag of UNIX topics, some of
- which may not concern you."
-
- +o DNS and BIND
- Paul Albitz and Cricket Liu
- O'Reilly & Associates, Petaluma, CA, 1993
- 381 pps. with index
- ISBN 1-56592-010-4
- $29.95
-
- If you are managing a UNIX system that is attached to the
- Internet, then sooner or later you will need to deal with
- the Internet domain name system. This book provides an in-
- depth treatment of the Internet domain name system and the
- most widely used implementation of the name system software.
- Basic configuration information for the Internet domain name
- system software on a UNIX host may be found in the book
- TCP/IP Network Administration, which is listed in Section I.
-
- From the O'Reilly catalog:
-
- "Here's a complete guide to the Internet's Domain Name Sys-
- tem (DNS) and the Berkeley Internet Name Domain (BIND)
- software, which is the UNIX implementation of DNS. DNS is
- the system that translates hostnames into Internet
- addresses. Until BIND was developed, name translation was
- based on a "host table"--if you were on the Internet, you
-
-
-
- Page 23 Network Reading List
-
-
-
-
-
-
-
- Section 2: Unix
-
-
- got a table that listed all the systems connected to the
- network, and their addresses. As the Internet grew, host
- tables became unworkable. DNS is a distributed database
- that solves the same problem effectively, allowing the net-
- work to grow without constraints. Rather than having a cen-
- tral table that gets distributed to every system on the net,
- it allows local administrators to assign their own hostnames
- and addresses, and install these names in a local database.
- This database is automatically distributed to other systems,
- as names are needed."
-
- "In addition to covering the basic motivation behind DNS and
- how to set up the BIND software, this book covers many more
- advanced topics: how to become a "parent" (i.e., "delegate"
- the ability to assign names to someone else); how to use DNS
- to set up mail forwarding correctly; debugging and trouble-
- shooting; and programming. Assumes a basic knowledge of
- system administration and network management."
-
- 2.2. UNIX Security
-
- The next few items discuss UNIX security. Once you have
- attached a computer directly to the worldwide Internet your
- computer system is available to any of the millions of peo-
- ple who have access to the Internet. Even though your com-
- puter may be attached to a "local" network, if that network
- is directly linked to the Internet then your machine is
- accessible by anyone on the planetary network system.
-
- Given that, making sure that the files on your machine are
- secure from malicious attacks is a very important task. You
- should not take anything for granted when it comes to system
- security. Vendors frequently ship system software with
- minimal or no security enabled, and with well known holes in
- the system. It's up to you to make sure that your computer
- system is secure.
-
- Computer systems are complex and ensuring the security of
- those systems can be equally complex. RFC1244, the Site
- Security Handbook provides an introduction to the territory
- and a survey of the major issues. The following resources
- provide more information on this subject.
-
- +o Practical UNIX Security
- Simon Garfinkel and Gene Spafford
- O'Reilly & Associates, Petaluma, CA, 1991
- 483 pps. with index
- $29.95
-
- From the review of Practical UNIX Security in RFC1244:
-
-
-
-
-
- Network Reading List Page 24
-
-
-
-
-
-
-
- Section 2: Unix
-
-
- "This is one of the most useful books available on Unix
- security. The first part of the book covers standard Unix
- and Unix security basics, with particular emphasis on pass-
- words. The second section covers enforcing security on the
- system. Of particular interest to the Internet user are the
- sections on network security, which address many of the com-
- mon security problems that afflict Internet Unix users.
- Four chapters deal with handling security incidents, and the
- book concludes with discussions of encryption, physical
- security, and useful checklists and lists of resources. The
- book lives up to its name; it is filled with specific refer-
- ences to possible security holes, files to check, and things
- to do to improve security."
-
- +o Improving the Security of Your UNIX System
- David Curry
- SRI International Report ITSTD-721-FR-90-21, April
- 1990.
-
- This paper describes a number of security issues that should
- be checked on UNIX systems. The paper is oriented to SunOS
- 4.x systems and other Berkeley UNIX systems.
-
- Available from a number of sites on the Internet, including
- CERT, the Computer Emergency Response Team site. You can
- retrieve this document via anonymous FTP from
- cert.sei.cmu.edu in the /pub/info directory as security-
- doc.txt an ASCII text file and security-doc.tar.Z a
- compressed UNIX tar file containing the troff source for the
- document and a PostScript output file of the document.
-
- 2.3. UNIX Networking In Detail
-
- The next few items cover UNIX networking in vast technical
- detail. These items are for those who want to understand
- UNIX networking right down to the details of the kernel
- implementation. This material assumes that you have a pro-
- gramming background, or at least a reading knowledge of C
- programming. As it says on old maps of uncharted and
- dangerous territories, "Here there be dragons."
-
- +o The Design and Implementation of the 4.3BSD UNIX
- Operating System
- Samuel J. Leffler, Marshall Kirk McKusick, Michael J.
- Karels, John S. Quarterman.
- 1989, Addison-Wesley Publishing Co., Reading, Mass. 471
- pps. with index and glossary.
- ISBN 0-201-06196-1
- $46.00
-
- This book provides an in-depth look at the design and imple-
- mentation of the entire 4.3BSD (Berkeley Software
-
-
-
- Page 25 Network Reading List
-
-
-
-
-
-
-
- Section 2: Unix
-
-
- Distribution) UNIX system. Of special interest is Part 4
- which describes UNIX Interprocess Communication. This sec-
- tion includes Chapter 10, which describes the kernel data
- structures and socket mechanisms used for networking, and
- Chapters 11 and 12, which cover Network Communication and
- Network Protocols, respectively. These chapters provide an
- in-depth look into the details of the BSD networking imple-
- mentation, written by the engineers who had a hand in making
- the decisions.
-
- From the Preface:
-
- "This book is about the internal structure of 4.3BSD and
- about the concepts, data structures, and algorithms used in
- implementing 4.3BSDXs system facilities. Its level of
- detail is similar to that of Bach's book about System V UNIX
- however, this text focuses on the facilities, data struc-
- tures, and algorithms used in the Berkeley variant of the
- UNIX operating system. The book covers 4.3BSD from the
- system-call level down -- from the interface to the kernel
- to the hardware itself. The kernel includes system facili-
- ties, such as process management, memory management, the I/O
- system, the file system, the socket IPC mechanism, and
- network-protocol implementations. Material above the
- system-call level such as libraries, shells, commands, pro-
- gramming languages, and other user interfaces is excluded,
- except for some material related to terminal interface and
- to system startup. Like Organick's book about Multics, it
- is an in-depth study of a contemporary operating system."
-
- +o UNIX Network Programming
- W. Richard Stevens
- 1990, Prentice Hall, Inc., 784 pps. with index and
- annotated bibliography.
- ISBN 0-13-949876-1.
- $51.00.
-
- Richard Stevens's book features both a comprehensive treat-
- ment of UNIX networking concepts and a vast assortment of
- real world examples. The book contains scores of program
- examples, and is indispensable reading for the network
- software developer, or for anyone who wants to see what real
- networking software looks like in a UNIX system.. The book
- is an extremely useful resource for anyone who needs an in-
- depth understanding of the internals of UNIX networking
- software.
-
- The book contains about 15,000 lines of C source code
- (including comments), some of which is taken directly from
- the Berkeley UNIX networking software and modified by the
- author, and some of which was created by the author for the
- task at hand. Another major advantage of this text is that
-
-
-
- Network Reading List Page 26
-
-
-
-
-
-
-
- Section 2: Unix
-
-
- all 15,000 lines of source code are available on-line as
- described below.
-
- From the Preface:
-
- "This book provides both the required basics that are needed
- to develop networking software along with numerous case stu-
- dies of existing network applications. The intent of this
- book, however, is to concentrate on the development of
- software to use a computer network."
-
- "This text is divided into four parts. 1. The framework of
- a UNIX process (Chapter 2), and IPC between processes on a
- single system (Chapter 3). 2. An overview of networking
- (Chapter 4), and a description of some networking protocols
- currently in use (Chapter 5): TCP/IP, Xerox NX (XNS), IBM's
- SNA, NetBIOS, the OSI protocols, and UUCP. These two
- chapters provide the networking background for the remainder
- of the text. 3. Transport layer interfaces: Berkeley sock-
- ets and System V TLI (Chapters 6 and 7). These are the
- interfaces that an application uses to communicate across a
- network. 4. Networking examples (Chapters 8 through 18).
- The specific examples covered are: security, time and date
- servers, file transfer, line printer spoolers, remote com-
- mand execution, remote login, remote tape drive access, and
- remote procedure calls."
-
- 2.3.1. Access to Source Code In UNIX Network Programming
-
- The complete source code for the Richard Stevens book is
- available in the UNIX source archives kept by UUNET Techno-
- logies in Falls Church, Virginia. For those readers with a
- connection to the Internet, the source code from the Richard
- Stevens book may be retrieved using the anonymous FTP ser-
- vice. By opening a connection to host ftp.uu.net and log-
- ging in as username "anonymous," you can gain access to the
- source archives stored at UUNET.
-
- Once logged into UUNET, the source code is located in the
- published directory as filename stevens.netprog.tar.Z. The
- capital Z suffix means that the file has been compressed
- using the UNIX compress program, which turns the file from a
- text format to a binary format. This, in turn, means that
- you will have to type "bin" to the FTP program, to set the
- file retrieval to binary mode. The compressed version of
- the file occupies almost 192 Kilobytes.
-
- Once retrieved, the file will need to be uncompressed, which
- will leave you with a tape archive or "tar" file. Unpacking
- this file with the UNIX tar program will reveal the 15,000
- lines of source code.
-
-
-
-
- Page 27 Network Reading List
-
-
-
-
-
-
-
- Section 3: Ethernet
-
-
- Section 3
-
- This is Section 3 of a four-section document entitled "Net-
- work Reading List: TCP/IP, UNIX, and Ethernet." The four
- sections of this annotated list of resources were created to
- help you find information about TCP/IP, UNIX, and Ethernet.
- The complete list describes a wide range of items, including
- both introductory and in-depth information.
-
- Section 1 covers TCP/IP resources, Section 2 covers UNIX,
- Section 3, Ethernet, and Section 4, miscellaneous items.
-
- 3. Ethernet
-
- Ethernet is a popular local area network (LAN) technology in
- wide use at sites around the world. Ethernet moves data
- between computers at a rate of 10 megabits per second over a
- wide variety of physical media including twisted-pair wire,
- coaxial cable, and fiber optic cable. A major reason for
- its popularity is that Ethernet is a very flexible and low
- cost network system. Ethernet's popularity also provides a
- high level of network interoperability. Since Ethernet is
- so widely implemented you can link systems built by many
- different vendors using the same Ethernet LAN. Like TCP/IP
- and Unix, Ethernet is a technology that provides a common
- basis for supporting heterogeneous networks.
-
- The 10 megabit Ethernet network standard has been in
- existence for over a decade, and is an international LAN
- standard. As a result, a large number of vendors sell Eth-
- ernet equipment and this helps keep the cost of the technol-
- ogy low. The large market for Ethernet equipment also leads
- to a steady stream of innovations, such as the use of thin
- coaxial and twisted-pair cabling, that makes it easier to
- build a reliable LAN in a wide variety of sites using stan-
- dard Ethernet.
-
- 3.1. Introduction To LAN Concepts
-
- +o Local Area Networks
- An introduction to the technology
- John E. McNamara.
- Prentice Hall Agency, 1985, 165 pps. with index and
- glossary.
- $29.00
- ISBN 0-13-539669-7
-
- This book provides a clear introduction to the essential
- ideas and basic technologies of LANs. McNamara keeps it
- simple, while managing to cover many different technologies.
- The author avoids covering specific products in favor of
- describing the general territory of LANs and their
-
-
-
- Network Reading List Page 28
-
-
-
-
-
-
-
- Section 3: Ethernet
-
-
- topologies. The special problems of extending LANs and sup-
- porting multiple protocol campus area networks are also dis-
- cussed.
-
- From the Preface:
-
- "This book is intended for students, computer system
- managers, telecommunications managers, and others who want
- to become more familiar with local area networks. Since
- product offerings in this area are constantly changing, a
- deliberate attempt has been made to emphasize the general
- principles, operating characteristics, and problem areas of
- local area network hardware, rather than cite specific pro-
- duct examples."
-
- "The book begins with a general introduction, discussing the
- development of local area networks and emphasizing their
- possible uses. This is followed by more detailed treatment
- of physical factors: topology, media, and installation
- requirements. Next, the hardware that permits programs to
- access the local area network and transfer data is dis-
- cussed. Then, software is covered, starting with an intro-
- duction to communications protocols. Finally, the combined
- base of hardware and software knowledge from the previous
- parts of the book are used in discussions of network ser-
- vices, network expansion, and the problems associated with
- creating large networks. The need for standards is implied
- throughout the book, and a brief final chapter discusses the
- creation of standards and their current status."
-
- 3.2. Introduction to Three Ethernet Varieties
-
- This short introduction to the three Ethernet technologies
- most widely used in office connections is provided to help
- you understand the references to these technologies in the
- resources that follow. After the IEEE published the basic
- thick coaxial Ethernet specifications in 1985 it went on to
- specify new varieties of Ethernet media, including thin
- coaxial Ethernet and twisted-pair Ethernet. There are
- currently three media systems designed to provide Ethernet
- service to an office. They include:
-
- (1) Thick Ethernet
- The original Ethernet system based on coaxial cable
- which uses a thick (0.4 inch) yellow cable. Computers
- are attached to the coaxial cable with an outboard Eth-
- ernet transceiver (also called a MAU) that is clamped
- to the cable. The transceiver, in turn, is connected
- to an Ethernet interface in the host computer by way of
- a transceiver cable (also called an AUI cable). This
- system is the one developed at Xerox, and could be
- called "Ethernet Classic." The IEEE has assigned
-
-
-
- Page 29 Network Reading List
-
-
-
-
-
-
-
- Section 3: Ethernet
-
-
- shorthand identifiers for each media variety of Ether-
- net. The identifier for thick Ethernet is 10BASE5,
- which stands for 10 megabit per second speed, baseband
- signaling, and 500 meter maximum segment length.
-
- (2) Thin Ethernet
- A coaxial-based Ethernet system that uses a thinner,
- more flexible coaxial cable than the original thick
- Ethernet system, and is known as thin Ethernet or
- "Cheapernet." In the thin Ethernet system the tran-
- sceiver is located inside the computer along with the
- Ethernet interface. This makes it possible to attach
- the thin Ethernet coax directly to the back of the host
- computer, reducing the number of devices and cables
- needed, and making the network connection more afford-
- able. The IEEE identifier for thin Ethernet is
- 10BASE2, which stands for 10 megabit per second speed,
- baseband signalling, and, despite the "2" used in the
- shorthand identifier, 185 meters maximum segment
- length.
-
- (3) Twisted-Pair Ethernet
- The twisted-pair variety of Ethernet is based on the
- same low cost twisted-pair wiring used in telephone
- systems. The IEEE identifier for twisted-pair Ethernet
- is 10BASE-T, which stands for 10 megabits per second,
- baseband signalling, and twisted-pair media. The tran-
- sceiver is located inside the computer in the twisted-
- pair system, which helps lower the cost of connecting
- to the segment. In the 10BASE-T system individual com-
- puters are attached to twisted-pair segments, which, in
- turn, are attached to a multiple-connection box called
- a multiport repeater or hub. A typical standalone hub
- supports 8 or 12 10BASE-T connections. Ethernet hubs
- can also be designed as modular systems called chassis
- hubs. Chassis hubs can support several media varieties
- of Ethernet, and not just twisted-pair. With its reli-
- ance on proven telephone system technology the
- twisted-pair variety of Ethernet provides a reliable,
- yet simple and low-cost method for attaching computers
- to an Ethernet system.
-
- +o Ethernet Frequently Asked Questions (FAQ)
-
- Another handy guide to general Ethernet information can be
- found in the latest edition of the Ethernet FAQ. A FAQ is a
- list of frequently asked questions with their answers. The
- Ethernet FAQ was created for distribution over the Usenet
- group dedicated to the subject of Ethernet LANs. For more
- information about Usenet groups and the Ethernet group in
- particular see Section IV of this list.
-
-
-
-
- Network Reading List Page 30
-
-
-
-
-
-
-
- Section 3: Ethernet
-
-
- For those without access to the Usenet, a copy of the Ether-
- net FAQ may also be acquire via anonymous FTP from
- dorm.rutgers.edu in pub/novell/DOCS.
-
- 3.3. Vendor Guides
-
- Some very useful tutorial information on Ethernet may be
- found in a variety of publications available from vendors.
- Be warned that vendor guides are not very formal publica-
- tions and may go out of print at any time. You also have to
- allow for the vendor-specific orientation, and understand
- that there may be other ways to do things. Nonetheless,
- despite the emphasis on a single vendor's products you can
- find good tutorial information in these guides. Listed next
- in no particular order are several guides that have proven
- useful.
-
- Hewlett-Packard Manuals
-
- +o LAN Cable and Accessories Installation Manual
- Published by Hewlett-Packard Co, January 1986.
- Approx. 204 pps. with index.
- $43.00.
- HP Part No. 5955-7680.
- Order from HP Direct Ordering at (800) 227-8164
-
- This slightly out-of-date manual from HP is still one of the
- better sources of tutorial information on how to deal with
- the thick and thin Ethernet varieties. The manual does not
- mention the twisted-pair Ethernet system. Despite the
- specific product orientation, the Ethernet configuration
- information is useful, and the guidelines for designing net-
- works are clear and well written. Thin Ethernet is covered,
- using HP's ThinLAN name for the technology. In addition,
- the manual shows how to tap a thick Ethernet cable for ins-
- tallation of the typical transceiver connection.
-
- One nit to pick is that the advice on running cable between
- buildings is based on older coax technology and does not
- take into account the newer IEEE Fiber Optic Inter-Repeater
- Link (FOIRL) standard. The FOIRL standard makes it possible
- to link Ethernets between buildings while preserving com-
- plete electrical isolation between the LANs. Such isolation
- is important when it comes to preserving the safety of the
- LAN system and preventing damage to the system components.
-
- This manual really shines when it comes to descriptions of
- thick cable and thin cable tooling and details of cable con-
- struction. The wire strippers and connector crimpers
- required for each cable type are described, although only HP
- part numbers are cited for these tools. There are also
- diagrams showing how to prepare each kind of cable for
-
-
-
- Page 31 Network Reading List
-
-
-
-
-
-
-
- Section 3: Ethernet
-
-
- connectors, and how to crimp on the N connectors and BNC
- connectors used with the thick and thin coaxial cables. The
- manual finishes with a short section on verifying the cables
- you've built, and a section on how to use a time domain
- reflectometer to test network cables.
-
- Another useful feature of the manual are the safety warnings
- that explain the hazards of the crimping tools, and the
- various electrical dangers that may be present when working
- on network cable systems. While on the subject of safety
- warnings, it should be mentioned that the crimping tools
- shown in this manual use a mechanism that prevents them from
- opening until they have closed all the way. It can be pain-
- ful if a finger, rather than a connector, gets into the
- works. The HP manual thoughtfully includes an appendix on
- how to get your finger out of a crimp tool, should the need
- arise.
-
- +o HP SiteWire Twisted-pair Cabling Installation Guide
- January 1988, Hewlett-Packard Company, Roseville Net-
- works Division, 8000 Foothills Boulevard, Roseville,
- California 95678.
- Approximately 100 pps, with 11 sections, 2 Appendixes,
- and an Index.
- $40.00.
- HP Manual Part Number 5959-2208.
- Order From HP Direct Ordering at (800) 227-8164
-
- Like the HP guide on coaxial cabling, this document is
- oriented to HP product offerings. Covering twisted-pair
- wiring for data communications, and including the Ethernet
- 10BASE-T variety, this guide provides instructions on how to
- test and install twisted-pair wiring for networks. While
- limited to HP offerings, it still provides a useful intro-
- duction and primer for for twisted-pair Ethernet installa-
- tions.
-
- The guide begins with a general introduction to twisted-pair
- connections. The system shown is not based on the widely
- used AT&T Premises Distribution System (PDS); instead the HP
- approach to wiring both telephones and data service for an
- office space is described. PDS equipment may be used with
- the HP approach however, and the guide notes that for large
- installations you may want to base your design entirely on
- the PDS system.
-
- The guide explains the basics of how to build twisted-pair
- cables, test them for continuity, and install them in an
- office. The use of 66-type and 100-type punch-down tools
- and punch-down blocks is explained, along with the basics of
- making a host connection to a twisted-pair Ethernet.
-
-
-
-
- Network Reading List Page 32
-
-
-
-
-
-
-
- Section 3: Ethernet
-
-
- The rest of the document describes how to install 10BASE-T
- hubs. The guide also shows the HP 10BASE-T interface boards
- for PCs that contain two modular jacks; one for connection
- to the building wiring system, and one for connection to a
- telephone. This allows you to support both telephone and
- data on the same twisted-pair cable, and you are shown how
- to install wiring for such a system.
-
- DEC Manuals
-
- +o Telecommunications and Networks Buyer's Guide
- Published twice a year by Digital Press.
- Free.
- No part number. Ask for it by title from a DEC sales
- office. Call (800) 332-4636 if you don't have a local
- DEC sales contact.
-
- This guide lists all communication hardware, communication
- software products, and network services that DEC provides.
- Of special interest are the configuration guidelines for
- DEC's 802.3/Ethernet products. Here you will find all
- manner of information about 802.3/Ethernet in general and
- the DEC product line in particular. Included is a descrip-
- tion of DEC's building wiring standard, Open DECconnect.
-
- You will also find media and topology information for fiber
- optic Ethernet connections, unshielded twisted pair, thin
- Ethernet and thick Ethernet. The guide includes illustra-
- tions and descriptions of many Ethernet components including
- barrels and terminators for thick Ethernet, DECconnect wir-
- ing equipment, and repeaters and bridges.
-
- The guide is completely DEC-centric, of course, but the
- price is right and the information can be quite useful. The
- guide lists many other products, including DEC's offerings
- for the 100 Mbit/sec LAN standard known as FDDI.
-
- +o OPEN DECconnect Building Wiring Components and Applica-
- tions Catalog
- 1990, Digital Equipment Corporation.
- Free.
- No part number. Ask for it by title from DEC sales
- office. Or call the DEC pre-sales support group at
- (800) 344-4825
-
- The components and applications catalog lists individual
- parts of the DECconnect wiring system including a descrip-
- tion and order number. Line drawings for each part are
- shown. The second half of the catalog shows some typical
- wiring applications and how they are configured to use the
- DECconnect system.
-
-
-
-
- Page 33 Network Reading List
-
-
-
-
-
-
-
- Section 3: Ethernet
-
-
- MOD-TAP
-
- +o MOD-TAP Applications Manual 1993
-
- +o MOD-TAP Components Catalog
- MOD-TAP, 285 Ayer Road, PO Box 706, Harvard, MA 01451-
- 0706, (508) 772-5630.
- Applications Manual $5.00, Components Catalog Free.
-
- MOD-TAP supplies communications cabling products for com-
- puter users. Their applications manual covers a wide range
- of communications cabling applications for several different
- network standards. Of interest here is their support for
- 10BASE-T Ethernet. The applications manual describes some
- basic concepts for building cabling design, and also goes
- into detail on the wide variety of twisted pair wiring
- schemes in use today.
-
- A major benefit of this manual is the information on the
- various twisted pair wiring schemes currently in use and how
- they can be used to support 10BASE-T twisted pair Ethernet.
- The manual also describes some basic wiring installation
- techniques, including how to develop a cable numbering
- scheme to help keep it all straight.
-
- The components catalog describes the entire line of MOD-TAP
- products. Included are a set of charts that show the
- twisted pair wiring schemes used in the USOC, AT&T 258A,
- AT&T 356A, ROLM, DEC, EIA, and 10BASE-T standards. The
- building you may be trying to wire for 10BASE-T Ethernet may
- include twisted-pair wires installed according to any one
- (or more) of these standards. The information shown here
- can be invaluable for figuring out how to get the signals
- from the 10BASE-T hub in the wiring closet to show up on the
- user's desk.
-
- 3.4. Ethernet Hardware and Vendors
-
- Ethernet hardware comes in several forms. At the physical
- media level there are basic pieces of hardware: coaxial
- cable, twisted-pair cable, and connectors. The next level
- up features components such as transceivers, transceiver
- cables, and Ethernet interfaces. At the higher levels of
- network concatenation are devices such as multiport tran-
- sceivers, Ethernet repeaters, chassis hubs, and bridges.
-
- Just to keep things interesting, the different media
- varieties of Ethernet require different components. For
- instance, thick Ethernet media systems use different low-
- level hardware and components than twisted-pair media.
- Moreover, every vendor seems to have its own special design
- for equipment such as Ethernet hubs. It's a large market,
-
-
-
- Network Reading List Page 34
-
-
-
-
-
-
-
- Section 3: Ethernet
-
-
- and impossible to cover in any short list of resources such
- as this one. Lists of vendors and products may be found in
- buyer's guides published by some of the LAN magazines shown
- in the next section.
-
- Shown next are a few representative examples of equipment
- and hardware catalogs from equipment distributors.
-
- +o Anixter Wiring Systems Product Catalog
- Anixter Bros., Inc.
- 4711 Golf Road
- Skokie, IL 60076
- Phone (312) 677-2600
-
- The Anixter Wiring Systems Product Catalog is a vast compen-
- dium that lists many different vendors, supplying all manner
- of communications equipment. The catalog describes the full
- range of products supplied by Anixter, but does not include
- pricing.
-
- The catalog has separate sections for both Ethernet and
- DEC's special Ethernet wiring system (called DECconnect).
- The catalog also features a glossary of communications
- industry terms, and an index. All in all, this catalog is a
- useful resource for the LAN manager. Catalogs are available
- from your local Anixter distributor, or call the main office
- in Skokie.
-
- +o Anixter Networking Products Guide
- 4711 Golf Road
- Skokie, IL 60076
- Phone (800) 622-6415 (orders) (800) 622-6417 (technical
- assistance)
-
- This 166 page catalog is also called "One Network Place" and
- features a selection of networking equipment including Eth-
- ernet products. The catalog lists components used in
- twisted-pair wiring systems, basic networking devices like
- transceivers, Ethernet interfaces, and hubs, and network
- devices such as Ethernet bridges. Prices are included for
- all items.
-
- +o AT&T Systimax PDS Components Catalog
- For access see a local AT&T representative or call:
- (800) 344-0223 ext 1102 (USA)
- 32-2-676-3623 (Europe)
- (416) 756-5118 (Canada)
-
- This catalog describes the wiring components used in the
- AT&T Premises Distribution System (PDS). AT&T's PDS is a
- widely adopted scheme for installing twisted-pair wire in
- commercial buildings. The design of the Ethernet twisted-
-
-
-
- Page 35 Network Reading List
-
-
-
-
-
-
-
- Section 3: Ethernet
-
-
- pair standard allows it to operate over PDS wire systems.
- There are no prices in this catalog and no tutorial informa-
- tion. Instead it provides you with a description of the
- wiring components used in one of the most widely adopted
- twisted-pair wiring systems for buildings.
-
- +o Hubbel Premise Wiring Inc.
- Full Line Catalog #1100R
- 14 Lord's Hill Road
- PO Box 901
- Stonington, CT 06378-0901
- (203) 535-3809 or (800) 626-0005
-
- Another catalog listing a complete line of premise wiring
- for twisted-pair systems. Includes some information on the
- EIA/TIA Commercial Building Wiring Standard. A useful cata-
- log for anyone implementing a twisted-pair Ethernet system.
-
- +o Network Electronics LAN Catalog
- 4801 N. Ravenswood Ave.
- Chicago, IL. 60640-4496
- (312) 784-5100
-
- Newark has branch offices all over the US. This catalog
- provides access to the network products that Newark carries,
- including coaxial and twisted-pair Ethernet. Also included
- are a wide range of network cabling components. Prices are
- included for all items listed.
-
- 3.5. Network and LAN Troubleshooting Guides
-
- +o Network Troubleshooting Guide
- August 1990, Digital Equipment Corporation
- Approx. 278 pps. with index and glossary.
- $95.00
- Digital part number is EK-339AB-GD-002.
- Digital Direct phone is (800) 344-4825.
-
- While the price is steep, this is a useful guide to a
- variety of techniques for testing and troubleshooting net-
- works that support both DECnet and TCP/IP protocols. The
- guide begins with a brief description of how both DECnet and
- TCP/IP function, including details of addressing in both
- protocol suites.
-
- Chapter 2 describes how to develop a basic network troub-
- leshooting methodology for your site. Following this is a
- chapter on network management and troubleshooting tools,
- listed alphabetically, and including both VMS and ULTRIX-
- based tools. The emphasis is on Digital applications, but
- more general applications such as "ping" and "traceroute"
- are also shown.
-
-
-
- Network Reading List Page 36
-
-
-
-
-
-
-
- Section 3: Ethernet
-
-
- Chapter 4 describes resources for troubleshooting. These
- include various ULTRIX and VMS log files that contain infor-
- mation on problems that may have occurred with software run-
- ning the DECnet and TCP/IP protocols.
-
- Chapter 5 is the largest chapter of the guide. It describes
- network troubleshooting procedures for a wide variety of
- common network problems in both DECnet and TCP/IP. The
- problems are categorized as ULTRIX host problems, VMS host
- problems, LAN problems, WAN problems, and cross-category
- problems that include two or more of the preceding problems.
-
- This chapter explains how to interpret common error messages
- seen, and how to go about troubleshooting the source of the
- error. Each problem is described and troubleshooting pro-
- cedures explained. An example for TCP/IP includes the the
- error message "connection timed out." A variety of errors
- that could cause this message are explained, and a troub-
- leshooting strategy is listed. You are shown how to use
- "ping" to check for connectivity, "netstat" to check for
- errors on the host interface, etc.
-
- While the guide focuses on DEC equipment running VMS and
- ULTRIX operating systems, there is still much useful infor-
- mation provided for debugging complex network problems in a
- mixed vendor environment. For example, many of the utili-
- ties described for ULTRIX are commonly available on other
- Unix systems. Although the guide assumes you have a DEC LAN
- Traffic Monitor (LTM) available, this is not a severe limi-
- tation. You can replicate much of the information you can
- get from the LTM by running commonly available applications
- such as "etherfind" or "tcpdump" on your system.
-
- This guide has two major advantages; the structured approach
- to troubleshooting and the unusual mix of both DECnet and
- TCP/IP troubleshooting procedures in the same manual. While
- the troubleshooting information appears to list more
- DECnet-based errors than TCP/IP ones, the guide manages to
- present quite a lot of technical information about both pro-
- tocol suites and their possible failure modes in a clear and
- well organized format.
-
- +o LAN Troubleshooting Handbook
- Mark A. Miller
- 1989, M&T Publishing Co., Redwood City, CA., 309 pps.
- with index.
- $29.95.
- ISBN 1-55851-054-0
-
- A wide-ranging guide to troubleshooting information for
- several LAN technologies including Ethernet. The author
- manages to fit a surprising amount of technical information
-
-
-
- Page 37 Network Reading List
-
-
-
-
-
-
-
- Section 3: Ethernet
-
-
- about three LAN technologies, Ethernet, token ring, and
- ARCNET, into one volume. Though there isn't any tutorial
- information about Ethernet, the troubleshooting information
- is clear and the book is well illustrated.
-
- The material on Ethernet covers two sections: one on coaxial
- cable based Ethernets (both thick and thin), and one on
- twisted-pair Ethernet technology, including Synoptics Lat-
- tisNet and AT&T StarLAN products. The IEEE 10BASE-T
- unshielded twisted-pair system is also briefly described.
- This book provides quick access to some essential troub-
- leshooting information for the three main varieties of Eth-
- ernet.
-
- From the Preface:
-
- "This book has a very fundamental thesis: how to keep your
- local area network alive. There are three parts to that
- goal. First, you must understand how the LAN should operate
- if you are to properly define when it is not operating.
- Secondly, you must have the proper hardware and software
- tools readily available to troubleshoot problems. Third,
- you must take preventative measures to keep those failures
- from recurring in the future."
-
- "To accomplish this goal, the book is divided into "network
- generic" and "network specific" chapters. Chapters 1, 2, 3,
- and 4 address the generic issues of LAN standards, Documen-
- tation, Test Equipment, and Cabling. Chapters 5, 6, 7, and
- 8 address specific issues associated with popular LAN archi-
- tectures: ARCNET, Token Ring, Ethernet, and StarLAN, respec-
- tively. Also included in the network-specific chapters are
- examples of protocol analysis of Novell's NetWare, IBM's
- NetBIOS, DEC's DECnet, and TCP/IP. Chapter 9 concludes with
- a dose of preventative medicine."
-
- 3.6. The Ethernet Standards
-
- Ethernet became the first non-proprietary LAN technology
- with the publication of the original multi-vendor Ethernet
- specification in 1980.
-
- There are two basic Ethernet standards: one issued by the
- multi-vendor consortium in 1980, and one developed by the
- Institute of Electrical and Electronics Engineers (IEEE).
- The multi-vendor standard is known as the DIX standard, so
- called due to the initials of the three participants: Digi-
- tal Equipment Corp, Intel, and Xerox. The DIX standard
- includes versions 1.0 and 2.0.
-
- In 1985 the IEEE 802.3 CSMA/CD standard for Ethernet tech-
- nology was released. Based on the DIX Ethernet standard,
-
-
-
- Network Reading List Page 38
-
-
-
-
-
-
-
- Section 3: Ethernet
-
-
- the IEEE version brought the thick Ethernet system into the
- world of international standards. While they may appear
- quite different at first, the DIX version and the IEEE ver-
- sion of the standard are functionally similar. Many vendors
- rate their Ethernet hardware for use in both IEEE 802.3 and
- DIX version 2.0 systems. Of course, the prudent networker
- makes sure that all of the hardware used to attach a com-
- puter to the Ethernet is based on a single version of the
- standard.
-
- Most of the changes that the IEEE version of the standard
- made were at the level of the Ethernet frame, which is the
- set of bits that carry the data between computers. However,
- both IEEE and DIX Ethernet frames can coexist on the same
- Ethernet LAN without problems.
-
- The next several items list an introduction to IEEE stan-
- dards and describe the formal Ethernet standards in use
- today. The formal standards are the technical documents for
- Ethernet/802.3 LANs, and they can be heavy going for non-
- engineers. There is no tutorial information in the stan-
- dards, and the technical jargon they use makes them diffi-
- cult to read. The newer IEEE standards use a special
- language developed for open systems standards that can
- bewilder the unprepared. The book listed next provides a
- guide to the newcomer to IEEE standards.
-
- +o LANs
- Applications of IEEE/ANSI 802 Standards
- Thomas W. Madron.
- 1989, John Wiley & Sons, New York, NY, 308 pps. with
- index and glossary
- $34.95.
- ISBN 0-471-62049-1.
-
- An introduction to LANs from the point of view of the evolv-
- ing network standards. This book presents the world of net-
- work standards and how they're organized. The various stan-
- dards agencies are described and the Open System Intercon-
- nection (OSI) model is explained. Following this, the IEEE
- 802 standards are described, and the way that the IEEE stan-
- dards fit within the OSI organization is explained.
-
- The bulk of the book describes the individual IEEE LAN stan-
- dards. The book closes with a explanation of the basics of
- TCP/IP operation, including the function of LANs in the
- delivery of TCP/IP services.
-
- From the Preface:
-
- "The object of this book is to provide a reasonably detailed
- overview of contemporary LAN standards, especially those
-
-
-
- Page 39 Network Reading List
-
-
-
-
-
-
-
- Section 3: Ethernet
-
-
- developed through the auspices of the Institute of Electri-
- cal and Electronics Engineers (IEEE). To be meaningful,
- however, the discussion of the IEEE standards is placed in
- the context of the development of standards generally, then
- in the framework of the Open System Interconnection (OSI)
- Reference Model of the International Organization for Stan-
- dardization (ISO). After describing the IEEE standards
- (from 802.1 through 802.6), the way in which the standards
- can be applied in 'real' networks is illustrated through a
- discussion of the Manufacturing Automation Protocol (MAP)
- and the Transmission Control Protocol/Internet Protocol
- (TCP/IP), in Chapters 9 and 10 respectively."
-
- 3.6.1. The DIX Standard
-
- +o Version 2.0, DEC-Intel-Xerox (DIX) Ethernet Standard
- Ethernet Local Area Network Specification Version 2.0.
- November, 1982
- Digital Equipment Corporation, Intel Corporation, Xerox
- Corporation, 103 pps.
- $31.00.
- DEC Part Number: AA-K759B-TK.
- Available from DEC-Direct by calling (800) 344-4825.
-
- This is Version 2.0 of the original 10 Mbit/sec thick Ether-
- net specification. The newer IEEE 802.3 standard supersedes
- the DIX spec listed here, but many network protocol imple-
- mentations still use the Ethernet frame from the DIX specif-
- ication.
-
- This specification is organized according to the OSI model,
- but uses somewhat less technical jargon than newer stan-
- dards. That makes it a document that is more approachable
- by the non-expert than the IEEE standard tends to be. The
- DIX specification is still a technical standard, however,
- and contains no tutorial information on the design and
- operation of Ethernets. Just the facts.
-
- 3.6.2. The IEEE 802.3 Standard (ISO 8802.3)
-
- The IEEE 802.3 standard is the current standard for thick
- Ethernet as well as for all newer varieties. However, noth-
- ing stands still very long in the standards world, and the
- IEEE standard is no exception. Starting as a multi-vendor
- standard (DIX), the Ethernet system then became a national
- standard (IEEE/ANSI), and the IEEE specs are now incor-
- porated in an international (ISO/IEC) standard. This
- explains why the IEEE organization now sells the ISO volume
- of specifications, instead of the older IEEE 802.3 volume.
- The name of the latest international "Ethernet-like" stan-
- dard is (take a deep breath):
-
-
-
-
- Network Reading List Page 40
-
-
-
-
-
-
-
- Section 3: Ethernet
-
-
- +o (ISO/IEC) (ANSI/IEEE Std 802.3, 1992)
- Information Processing Systems - Local and Metropolitan
- Area Networks -
- Part 3: Carrier Sense Multiple Access with Collision
- Detection (CSMA/CD)
- Access Method and Physical Layer Specifications (ANSI)
- ISBN 1-55937-049-1
- IEEE product number: SH13482
- $75.00 (from IEEE publications catalog)
- Available from:
- IEEE Customer Service
- 445 Hoes Lane
- PO Box 1331
- Piscataway, New Jersey 08854-1331
- or by calling (800) 678-4333 (IEEE).
- Outside US and Canada call, (908) 981-1393.
- The FAX number is (908) 981-9667
-
- These are the current specifications for an Ethernet-like
- CSMA/CD LAN. Despite the major reworking of the original
- DIX standard by the IEEE, and despite changes made in the
- way some things work, the IEEE and DIX specs have a strong
- functional similarity at the hardware level.
-
- Old and new hardware can interoperate well on Ethernet/802.3
- LANs, despite the differences in the specifications. Many
- network protocol implementations (TCP/IP among them) con-
- tinue to use the original DIX Ethernet frame, for example.
- Campus Ethernets used to interconnect computers equipped
- with hardware built according to both the DIX and 802.3
- specs can interoperate on the same Ethernet LAN. The stan-
- dards were written so that mixing things together like this
- on the same Ethernet system still works.
-
- 3.6.3. Twisted-Pair Ethernet Specifications
-
- Since the creation of the twisted-pair Ethernet standard in
- 1990 the twisted-pair Ethernet market has seen extraordinary
- growth. The twisted-pair system makes it possible to
- install Ethernet in an office using standard twisted-pair
- wiring. This has led to the twisted-pair Ethernet system
- becoming the system of choice at many sites. The twisted-
- pair specification is described in a supplement from the
- IEEE. Eventually the twisted-pair standard will be incor-
- porated in the ISO 8802.3 standard document. Until that
- happens you need to acquire this document to get the formal
- twisted-pair specifications. This supplement also contains
- some newly written guidelines for building large, multi-
- segment Ethernets using a mix of Ethernet varieties. The
- title is (take an even deeper breath):
-
-
-
-
-
- Page 41 Network Reading List
-
-
-
-
-
-
-
- Section 3: Ethernet
-
-
- +o 802.3i-1990 IEEE Supplement to Carrier Sense Multiple
- Access
- with Collision Detection CSMA/CD Access Method and Phy-
- sical Layer
- Specifications: System Considerations for Multisegment
- 10 Mb/s
- Baseband Networks (Section 13) and Twisted-Pair Medium
- Attachment Unit
- (MAU) and Baseband Medium, Type 10BASE-T (Section 14)
- ISBN 1-55937-070-X
- IEEE Product Number SH13763
- Price $26.00, from IEEE catalog. Same access for IEEE
- as above.
-
- 3.7. Ethernet Numbers
-
- This section describes two sets of numbers used in the Eth-
- ernet system. Both sets are useful in network troubleshoot-
- ing. The standards agencies that oversee the administration
- of these numbers are also listed.
-
- 3.7.1. Ethernet Type Numbers and Addresses
-
- The Ethernet frame specified by the DIX standard contains a
- Type field. The DIX Ethernet Type field contains a type
- number that describes the type of high-level network proto-
- col (such as TCP/IP) being carried by the Ethernet frame.
- This information can be quite handy when you're troub-
- leshooting a LAN problem and trying to figure out which
- high-level protocol may be involved.
-
- In the new IEEE 802.3 frame specification, the type field
- was replaced by a more general, but more complex, set of
- frame specifiers. Nevertheless, many network software
- implementations still use the DIX frame specification with
- its accompanying Ethernet type field.
-
- The addresses used in Ethernet frames are also useful to the
- network troubleshooter. The 48-bit Ethernet address is
- called an "Organizationally Unique Identifier" (OUI) and is
- divided into two 24-bit portions. The first portion is
- assigned to a specific manufacturer by the IEEE and the
- second portion is used by that manufacturer to create a
- unique address for each Ethernet interface. The total
- result is a 48-bit address for each Ethernet interface con-
- sisting of a 24-bit pattern that is assigned by the IEEE and
- another 24 bits assigned by the manufacturer to each inter-
- face.
-
- If you know the manufacturer's number, you can frequently
- identify which computer may be causing network problems.
- This is not a foolproof mechanism, since some vendors may
-
-
-
- Network Reading List Page 42
-
-
-
-
-
-
-
- Section 3: Ethernet
-
-
- buy their boards from other manufacturers. Nonetheless, in
- many cases knowing the Ethernet addresses assigned to a
- manufacturer can help track down a malfunctioning device.
-
- 3.7.2. IEEE OUI List
-
- The IEEE used to treat all OUI assignments as confidential
- information. The latest policy is that the address assign-
- ment will be made publicly available unless the vendor
- requests privacy. Vendors may regard the number of OUIs
- they request as confidential information, so the public list
- of OUIs assigned by the IEEE must be assumed to be incom-
- plete.
-
- The IEEE list can be retrieved via anonymous FTP from host
- ieee.org in the info/stds directory as filename
- info.stds.oui. You may also retrieve a copy of the IEEE
- list by sending an e-mail message to info.stds.oui@ieee.org
- and a copy of the list will be sent to you in return.
-
- 3.7.3. MIT Numbers List
-
- The IEEE does not supply a list of DIX Ethernet Type fields,
- since the IEEE does not assign Type fields. Also, the IEEE
- list of OUIs is necessarily incomplete. To help overcome
- these problems a publicly available list of type fields and
- vendors' addresses has been compiled by network administra-
- tors who have observed and analyzed Ethernet traffic on
- their networks. This list too is necessarily incomplete,
- but nonetheless provides a wealth of useful information.
-
- The list of OUIs and Type fields may be found via anonymous
- FTP on host ftp.lcs.mit.edu in directory pub/map as filename
- EtherNet-codes. If you have discovered a new vendor's
- address or other Ethernet number that you would like to add
- to this list, you can send your entry to map@lcs.mit.edu.
-
- 3.7.4. Assigned Numbers RFC
-
- A list of Ethernet numbers for troubleshooting, including
- both the type field numbers and the Ethernet address
- numbers, can also be found in the Assigned Numbers RFC. The
- Assigned Numbers RFC is an RFC for the TCP/IP protocol suite
- that also contains a list of some of the Ethernet numbers.
- This RFC may be retrieved as described in the section on
- TCP/IP and the RFCs.
-
- 3.7.5. Administration of Ethernet Numbers
-
-
-
-
-
-
-
- Page 43 Network Reading List
-
-
-
-
-
-
-
- Section 3: Ethernet
-
-
- Type Field
-
- Since the type field is part of the older DIX specification,
- Xerox manages the administration of Ethernet type fields.
- The Ethernet patents are owned by Xerox as well, and
- licenses to build Ethernet equipment using these patents can
- be obtained from the same source. Anyone wishing to apply
- for a new type field should contact Xerox at the following
- address:
-
- Xerox Corporation
- Xerox Systems Institute
- 3400 Hillview Ave.
- P.O. Box 10034
- Palo Alto, CA 94303
- (415) 813-7164
-
- As stated in Xerox literature: "Per Appendix B of the Ether-
- net Specification, a Ethernet type field will be assigned on
- written request to each licensee of Ethernet patents. The
- licensing fee is $1000.00. Others wishing to obtain type
- field assignments may do so by including a $300.00 adminis-
- trative fee with their written request."
-
- IEEE 802.3 Addresses
-
- All new Ethernet addresses (OUIs) are assigned by the IEEE,
- although older ones assigned by Xerox are still valid. Any-
- one attaching a computer to an Ethernet system need not con-
- cern themselves with addresses, since a unique Ethernet
- address is assigned to each Ethernet interface at the fac-
- tory. On the other hand, for the curious, a block of
- addresses costs $1000.00. The address for inquiries is:
-
- IEEE Standards Office
- 820 Second Avenue, 7th Floor
- New York, NY 10017-4504
- (201) 981-0060
-
- 3.8. Ethernet Performance Analysis
-
- Ethernet has been around for a while and provides network
- communications at many sites, so you'd think that the per-
- formance characteristics would be well established.
- Nonetheless there have been surprising claims made about
- Ethernet's ability to transmit data. Some of the claims
- have been based on papers written about the Ethernet system
- over the last several years, and a number of these papers
- have based their performance analysis on simulations and
- simplifications of the Ethernet protocols. This has inad-
- vertently helped to establish a mythology about Ethernet
- performance limits. Fortunately there has been some
-
-
-
- Network Reading List Page 44
-
-
-
-
-
-
-
- Section 3: Ethernet
-
-
- empirical analysis that demonstrates the actual performance
- of Ethernet.
-
- +o Measured Capacity of an Ethernet: Myths and Reality
- David R. Boggs, Jeffrey C. Mogul, Christopher A. Kent.
- Proceedings of the SIGCOMM '88 Symposium on Communica-
- tions
- Architectures and Protocols, ACM SIGCOMM, Stanford,
- CA., August 1988,
- 31 pps.
-
- This technical report from Digital's Western Research Lab
- presents empirical evidence showing that the 10 Mbit/sec
- Ethernet system is capable of transmitting at the full 10
- megabit data rate. Also useful is the analysis of what
- makes a good Ethernet implementation. The report includes a
- brief set of network design guidelines for network managers
- who want to optimize their Ethernet system.
-
- From the Abstract:
-
- "Ethernet, a 10 Mbit/sec CSMA/CD network, is one of the most
- successful LAN technologies. Considerable confusion exists
- as to the actual capacity of an Ethernet, especially since
- some of the theoretical studies have examined operating
- regimes that are not characteristic of actual networks.
- Based on measurements of an actual implementation, we show
- that for a wide class of applications, Ethernet is capable
- of carrying its nominal bandwidth of useful traffic, and
- allocates the bandwidth fairly."
-
- This paper is available over the Internet via electronic
- mail from the DEC Western Research archive server. Send a
- message to the automatic mail server with the word "help" in
- the Subject line of the message for detailed instructions.
- The address of the DEC technical reports mail server is
- WRL-Techreports@decwrl.dec.com.
-
- You may also request a copy of the report through the U.S.
- postal system by writing to:
-
- Technical Report Distribution
- DEC Western Research Laboratory, UCO-4
- 100 Hamilton Avenue
- Palo Alto, California 94301
-
-
-
-
-
-
-
-
-
-
- Page 45 Network Reading List
-
-
-
-
-
-
-
- Section 4: Interest-Groups, Periodicals, and Conferences
-
-
- Section 4
-
- This is Section 4 of a four-section document entitled "Net-
- work Reading List: TCP/IP, UNIX, and Ethernet." The four
- sections of this annotated list of resources were created to
- help you find information about TCP/IP, UNIX, and Ethernet.
- The complete list describes a wide range of items, including
- both introductory and in-depth information.
-
- Section 1 covers TCP/IP resources, Section 2 covers UNIX,
- Section 3, Ethernet, and Section 4, miscellaneous items.
-
- 4. Interest Groups, Periodicals, and Conferences
-
- This section briefly lists some electronic mail interest
- groups, networking periodicals, networking conferences, and
- other miscellaneous items.
-
- 4.1. Interest Groups
-
- There is a large and ever-increasing set of interest groups
- that communicate via redistributed e-mail and the Usenet
- (User's Network). Details on how electronic mail functions
- may be found in sources listed in previous sections.
-
- One form of electronic mail redistribution consists of mail-
- ing lists to which you add your e-mail address. Mail sent
- to the list is redistributed to all members of the list.
- Some of the lists have moderators who filter the incoming
- mail before sending it out to the members. Other lists are
- unmoderated, and all mail sent to the main address of the
- list is automatically resent to every member of the list.
-
- The Usenet system is a method of distributing electronic
- mail that has been organized as a set of articles stored as
- a newsgroup. In practice, each group consists of a disk
- file that holds a given number of messages sent to the group
- address. The number of files saved in each group at any
- given moment is a local administration issue, and depends on
- the disk space available, etc. As the space is filled up,
- old messages disappear when new messages arrive. There are
- many groups being distributed by the Usenet system, with an
- uncounted but huge audience worldwide. Usenet is often sim-
- ply called "netnews," or even just "news."
-
- 4.1.1. BITNET
-
- The BITNET networks support a wide range of interest lists
- and archives. The best way to find out about these
- resources is to send a message to the LISTSERV utility main-
- tained at host BITNIC. You can request a help file describ-
- ing the LISTSERV utility. You can also request a copy of
-
-
-
- Network Reading List Page 46
-
-
-
-
-
-
-
- Section 4: Interest Groups, Periodicals, and Conferences
-
-
- the BITNET list of lists which is called the LISTSERV GROUPS
- file.
-
- Access to BITNET Lists
-
- To get a copy of the LISTSERV lists file send a mail message
- to LISTSERV@BITNIC.BITNET and include the command:
- SENDME LISTSERV GROUPS
- The command should be in the body of the message and there
- should be no other text in the message. To get a copy of a
- description of the LISTSERV utility send a request to the
- same address with the command:
- SENDME LISTSERV MEMO
-
- 4.1.2. Usenet Groups
-
- There are a large number of interest groups available via
- the Usenet. Here are just a few examples:
-
- +o comp.protocols.tcp-ip
- This stands for "computers, protocols, TCP/IP." This
- list discusses any and all TCP/IP issues.
-
- +o comp.unix.misc
- One of many UNIX Usenet groups, this one assigned to
- discussions of miscellaneous issues.
-
- +o comp.dcom.lans
- General LAN questions and answers, including some Eth-
- ernet information.
-
- +o comp.dcom.lans.ethernet
- Dedicated to Ethernet questions and information.
-
- There are many, many more lists of this sort available via
- the Usenet. The group news.announce.newusers periodically
- publishes articles that contain lists of groups available on
- Usenet, as well as mailing lists available on other network
- systems. The monthly postings in this group also include
- introductory articles for newcomers to the Usenet system.
- Consult your local system administrator for information
- about access to the Usenet system.
-
- The group news.answers contains postings of the various
- lists of Frequently Asked Questions (FAQs) for each Usenet
- list that has generated a FAQ. You can also get FAQs by
- anonymous FTP from host pit-manager.mit.edu in the
- pub/usenet/news.answers directory. These files can be
- retrieved via e-mail as well. You can retrieve an introduc-
- tion to FAQs by sending the command send
- usenet/news.answers/news-answers/introduction in an e-mail
- message sent to mail-server@pit-manager.mit.edu
-
-
-
- Page 47 Network Reading List
-
-
-
-
-
-
-
- Section 4: Interest-Groups, Periodicals, and Conferences
-
-
- 4.2. Periodicals
-
- You'll find networking topics described in many different
- periodicals and journals. The book "Life With UNIX" lists a
- number of UNIX periodicals that include articles on network-
- ing.
-
- There are also many periodicals and journals that specialize
- in networking issues or have a heavy emphasis on covering
- networking stories. Several network periodicals are listed
- here to provide an idea of what's available.
-
- Each periodical has a different format, mix of articles, and
- writing style. It's up to you to try them out and decide
- which ones provide the information you need. For more exam-
- ples consult an engineering library or technical bookstore.
-
- +o Network World
- The Newsweekly of User Networking Strategies
- Weekly tabloid
- Available free to qualified subscribers
- Network World
- 161 Worchester Road
- Framingham, Mass. 01701
- (508) 875-6400
-
- Wide coverage of the network market including frequent pro-
- duct guides focused on specific equipment such as bridges or
- routers. A good place to find the latest news on what the
- major vendors are up to, as well as the latest network tech-
- nology offerings.
-
- +o Communications Week
- The Newspaper For Network Decision Makers
- Weekly tabloid
- Available free to qualified subscribers
- Communications Week
- P.O. Box 2070
- Manhasset, NY 11030
-
- A networking weekly that also tracks the networking market
- as well as the activities of major vendors. Publishes pro-
- duct guides.
-
- +o Data Communications
- McGraw-Hill's Networking Technology Magazine
- Monthly magazine
- Available free to qualified subscribers
- Data Communications
- McGraw-Hill Inc.
- McGraw-Hill Building
- 1221 Avenue of the Americas
-
-
-
- Network Reading List Page 48
-
-
-
-
-
-
-
- Section 4: Interest Groups, Periodicals, and Conferences
-
-
- New York, N.Y. 10020
- (212) 512-2000
-
- Features large network systems along with LAN coverage.
- Includes articles on wide area networks, T1 and other serial
- line technologies, equipment tests, the latest networking
- developments, etc.
-
- +o Connexions
- The Interoperability Report
- U.S./Canada subscriptions $150 for 12 issues/year
- No advertising
- Connexions
- 480 San Antonio Road
- Mountain View, CA 94040-1219
- (415) 941-3399
- E-mail: connexions@interop.com
-
- A publication associated with the Interop conference, Con-
- nexions concentrates on technical articles from protocol
- developers and others working on the latest issues in net-
- work interoperability. Status reports on the latest
- research in various network issues are also featured.
-
- +o Computer Communication Review
- The SIGCOMM Quarterly Publication
- $37 includes copy of Annual SIGCOMM conference proceed-
- ings
- Association for Computing Machinery
- P.O. Box 12115
- Church Street Station
- New York, N.Y. 10249
- (212) 869-7440
-
- The Computer Communication Review is a quarterly report on
- SIGCOMM, the ACM special interest group on data communica-
- tion. It includes reports on networking, telephony, and
- protocol verification. The topics covered include network
- architecture and design for LANs and large networks, recent
- network standards activities, etc. You can find news here
- about the latest thinking in network standards, as well as
- reports on work to increase the speed of networks and proto-
- cols. A subscription also gets you a copy of the annual
- SIGCOMM conference proceedings.
-
- +o InfoWorld
- Infoworld Publishing Co.
- 155 Bovet Road Suite 800
- San Mateo, CA 94402
- (415) 572-7341 or (800) 227-8365
-
-
-
-
-
- Page 49 Network Reading List
-
-
-
-
-
-
-
- Section 4: Interest-Groups, Periodicals, and Conferences
-
-
- Focusses on personal computing and networks. Includes "From
- the Ether" column by publisher Bob Metcalfe, chief inventor
- of the Ethernet system.
-
- +o LAN
- The Local Area Network Magazine
- $19.97 for 12 issues /year
- For subscriptions:
- LAN
- Miller Freeman Publications
- P.O. Box 41904
- Nashville, TN 37204
- (800) 933-3321 or (615) 377-3322
-
- Covers personal computer LANs, and includes interviews with
- various networking experts. Also features regular product
- guides, equipment tests and reviews, and articles on new
- network technologies.
-
- +o Network Computing
- Available free to qualified subscribers:
- Network Computing
- 600 Community Drive
- Manhasset NY 11030-9789
- (516) 562-5071
-
- Emphasizes network operating systems and software. Personal
- computer issues and the latest in PC network hardware and
- software are topics.
-
- 4.3. Conferences
-
- Just about every computer conference includes networking
- issues these days. There are also several conferences that
- focus on networking, each with their own particular slant
- such as PC networks, mainframe networks, etc.
-
- INTEROP
-
- The Interop conferences focus on networks and network
- interoperability and are loaded with information on the
- three main topics of this reading list. They are held on
- the east and west coasts in the Spring and the Fall,
- although future conferences will be held in Las Vegas.
-
- A feature of Interop is that the vendor booths are all
- attached to a large show network in a practical demonstra-
- tion of network interoperability. The conference features
- tutorials by TCP/IP experts, and several days of technical
- sessions on all manner of TCP/IP subjects, UNIX networking,
- and Ethernet issues, as well as on evolving OSI protocols,
- etc. For more information contact:
-
-
-
- Network Reading List Page 50
-
-
-
-
-
-
-
- Section 4: Interest Groups, Periodicals, and Conferences
-
-
- +o Interop Inc.
- 480 San Antonio Road
- Mountain View, CA 94040
- (415) 941-3399
- (800) 776-6676
- FAX (415) 949-1779
-
- USENIX
-
- One UNIX-oriented meeting that is likely to be of use to
- networkers is the USENIX conference, run by the USENIX Asso-
- ciation. USENIX conferences are aimed at the technical UNIX
- developer and feature technical sessions based on refereed
- papers. You can stay fairly current with the latest in UNIX
- networking and other developments by reading the conference
- proceedings for the twice a year USENIX conferences.
-
- The USENIX Association also publishes a newsletter,
- ";login:," which publishes book reviews, reports on UNIX
- standardization meetings, and the like. For more informa-
- tion, contact:
-
- +o USENIX Association
- 2560 Ninth Street, Suite 215
- Berkeley, CA 94710
- (415) 528-8649
- Internet Address: office@usenix.org
-
- 4.4. Access to the Internet
-
- The UT Austin campus network is connected to the national
- and worldwide Internet via THEnet, the statewide Texas
- Higher Education network. Like UT, many universities are
- connected to the Internet by way of various regional net-
- works. Many companies have gained access to the Internet in
- the same fashion. If you are looking for an Internet con-
- nection, the first thing to do is check with your local net-
- work administrator.
-
- You can also find lists of service providers in the books
- The Internet Companion and The Whole Internet User's Guide
- and Catalog.
-
- 4.5. Access to Resources
-
- Many of the resources listed here are books, and can be
- found in technical bookstores and engineering libraries. If
- you are having trouble finding a book listed here, the fol-
- lowing bookstore can probably help.
-
- +o Computer Literacy Bookshop
- 2590 North First St.
-
-
-
- Page 51 Network Reading List
-
-
-
-
-
-
-
- Section 4: Interest-Groups, Periodicals, and Conferences
-
-
- San Jose, CA 95131
- Phone (408) 435-0744
- FAX (408) 435-1823
- E-mail: info@clbooks.com
-
- Computer Literacy is an excellent source for computer and
- electronics books of all kinds. They also carry some of the
- IEEE and ISO network standards, and can probably supply most
- of the books listed in this guide.
-
- Anonymous FTP
-
- Anonymous FTP simply means that the remote site makes files
- available by way of the TCP/IP-base File Transfer Program to
- anyone who wishes to acquire them. After making a connec-
- tion to the site with the FTP program, you log in using
- "anonymous" as a username. At the password prompt it is
- often the case that you are asked to provide your electronic
- mail address, or you may use the word "guest."
-
- FTP by E-mail
-
- For sites that have only e-mail access to the Internet it is
- still possible to retrieve files via FTP. For Internet
- sites send e-mail to ftpmail@decwrl.dec.com with the word
- "help" in the body of the message. You will receive a help
- file in response, explaining the commands that you can send
- in an e-mail message that will cause the FTPmail service to
- retrieve a file for you. UUCP sites with an Internet con-
- nection can use the address yourlink!decwrl!ftpmail to con-
- tact the FTPmail service.
-
- BITNET sites may retrieve instructions on the use of a BIT-
- NET FTPmail service by sending the word "help" in an e-mail
- message sent to bitftp@pucc.princeton.edu
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Network Reading List Page 52
-
-
-
-
-
-
-
-
-
-
- TABLE OF CONTENTS
- Section 1 -- TCP/IP
- Guides To The Internet ................................ 1.1
- Electronic Mail and the Internet ...................... 1.2
- TCP/IP Network Administration ......................... 1.3
- The Request for Comments (RFCs) ....................... 1.4
- Some Useful RFCs ......................................1.4.1
- Electronic Mail and FTP Access to the RFCs ............1.4.2
- Hard Copies of the RFCs ...............................1.4.3
- Internet Registration Service ......................... 1.5
- Other InterNIC Services ............................... 1.6
- TCP/IP Protocols ...................................... 1.7
-
- Section 2 -- UNIX
- UNIX In General ....................................... 2.1
- UNIX Security ......................................... 2.2
- UNIX Networking In Detail ............................. 2.3
-
- Section 3 -- Ethernet
- Introduction To LAN Concepts ......................... 3.1
- Introduction to Three Ethernet Varieties .............. 3.2
- Vendor Guides ......................................... 3.3
- Hewlett-Packard Manuals ...............................3.3.1
- DEC Manuals ...........................................3.3.2
- MOD-TAP ...............................................3.3.3
- Ethernet Hardware and Vendors ......................... 3.4
- Network and LAN Troubleshooting Guides ................ 3.5
- Ethernet Standards .................................... 3.6
- The DIX Standard ......................................3.6.1
- The IEEE 802.3 Standard (ISO 8802.3) .................3.6.2
- Twisted-Pair Ethernet Specifications ..................3.6.3
- Ethernet Numbers ...................................... 3.7
- Ethernet Performance Analysis ......................... 3.8
-
- Section 4 -- Interest Groups, Periodicals, and
- Conferences
- Interest Groups ....................................... 4.1
- BITNET ................................................4.1.2
- Usenet Groups .........................................4.1.3
- Periodicals ........................................... 4.2
- Conferences ........................................... 4.3
- Access to the Internet ................................ 4.4
- Access to Resources ................................... 4.5
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-