home *** CD-ROM | disk | FTP | other *** search
Text File | 2003-06-11 | 222.6 KB | 6,247 lines |
-
- [ netinfo/nug.doc ]
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
-
-
-
-
-
-
-
-
-
-
- DDN NEW USER GUIDE
-
-
-
-
- September 1991
-
-
-
-
-
-
- Editor:
- Barbara Varallo
-
-
- First Edition: December 1985
- Revised: November 1987
- Second Edition: February 1991
- Third Edition: September 1991
-
-
-
-
-
-
- Prepared by the DDN Network Information Center, Government Systems
- Incorporated, 14200 Park Meadow Drive, Suite 200, Chantilly, VA 22021. Copies
- may also be obtained from the Defense Technical Information Center (DTIC),
- Cameron Station, Alexandria, VA 22314.
-
- DRAFT DRAFT
-
-
-
-
-
-
-
- NIC 60001, September 91 DDN New User Guide
-
-
- [ NOTE: This document is set up for printing in 12 cpi
- non-proportional font. The top and bottom margins are set
- at .25 with three blank lines above the header and four below
- the footer. Right and left margins are presumed to be one
- inch. Hard page breaks (^L) have been inserted. ]
-
-
-
-
-
-
-
-
-
- ACKNOWLEDGEMENTS
-
-
- The DDN New User Guide was prepared by the DDN Network Information Center for
- the Defense Information Systems Agency, Defense Network Systems Organization
- (DISA DNSO) under contract number DCA 200-90-R-0029.
-
- The NIC wishes to acknowledge the valuable services that the Host
- Administrators and Node Site Coordinators have provided to the network
- community and to the development of this guide.
-
-
- UNIX is a registered trademark of AT&T Bell Laboratories. TOPS 20 is a
- registered trademark of Digital Equipment Corporation. InfoMail is a
- trademark of BBN Communications Division. PostScript is a registered
- trademark of Adobe Systems Incorporated. Procomm is a trademark of Datastorm
- Technologies, Inc.
-
- DDN New User Guide. Printed and bound in the United States of America.
- Published by the DDN Network Information Center, 14200 Park Meadow Drive,
- Suite 200, Chantilly, VA 22021.
-
-
-
-
-
-
- DRAFT [Page i] DRAFT
-
-
-
-
-
-
-
- NIC 60001, September 91 DDN New User Guide
-
-
- TABLE OF CONTENTS
-
-
- SECTION 1. INTRODUCTION. . . . . . . . . . . . . . . . . . . . . . . . . . 1
- 1.1 Welcome . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
- 1.2 Using This Guide. . . . . . . . . . . . . . . . . . . . . . . . . . 2
- 1.3 Document Conventions. . . . . . . . . . . . . . . . . . . . . . . . 4
- 1.3.1 User Input Display. . . . . . . . . . . . . . . . . . . . . . . . 4
- 1.3.2 Machine Output Display. . . . . . . . . . . . . . . . . . . . . . 4
- 1.3.3 Comment Display . . . . . . . . . . . . . . . . . . . . . . . . . 4
- 1.3.4 Typing Control Characters . . . . . . . . . . . . . . . . . . . . 5
-
- SECTION 2. THE DEFENSE DATA NETWORK. . . . . . . . . . . . . . . . . . . . 6
- 2.1 Network Overview. . . . . . . . . . . . . . . . . . . . . . . . . . 6
- 2.2 Network Access Methods. . . . . . . . . . . . . . . . . . . . . . . 7
- 2.3 Organization of the DDN . . . . . . . . . . . . . . . . . . . . . . 8
- 2.4 Development of the DDN. . . . . . . . . . . . . . . . . . . . . . . 8
- 2.5 The Defense Information Systems Agency, Defense Network Systems
- Organization (DISA DNSO). . . . . . . . . . . . . . . . . . . . . .10
-
- SECTION 3. NETWORK CONNECTION. . . . . . . . . . . . . . . . . . . . . . .11
- 3.1 Host Access . . . . . . . . . . . . . . . . . . . . . . . . . . . .11
- 3.2 TAC Access. . . . . . . . . . . . . . . . . . . . . . . . . . . . .11
- 3.3 Gateway Access. . . . . . . . . . . . . . . . . . . . . . . . . . .12
- 3.4 A Word About Personal Computers . . . . . . . . . . . . . . . . . .12
-
- SECTION 4. DDN TAC ACCESS. . . . . . . . . . . . . . . . . . . . . . . . .14
- 4.1 TAC Card Information. . . . . . . . . . . . . . . . . . . . . . . .14
- 4.1.1 TAC User Registration . . . . . . . . . . . . . . . . . . . . . .14
- 4.1.1.1 Users Behind Concentrators. . . . . . . . . . . . . . . . . . .15
- 4.1.2 TAC Card Example. . . . . . . . . . . . . . . . . . . . . . . . .16
- 4.1.2.1 Common TAC Card Userid/Access-Code Input Errors . . . . . . . .17
- 4.1.3 Obtaining the TAC Users' Guide. . . . . . . . . . . . . . . . . .18
- 4.2 TAC Login Procedures. . . . . . . . . . . . . . . . . . . . . . . .18
- 4.2.1 Connecting to a TAC/Mini-TAC. . . . . . . . . . . . . . . . . . .18
- 4.2.1.1 Dial-up TACs. . . . . . . . . . . . . . . . . . . . . . . . . .18
- 4.2.1.2 Using a Terminal with an Acoustic Coupler . . . . . . . . . . .19
- 4.2.1.3 Using a Dial-up Modem . . . . . . . . . . . . . . . . . . . . .19
- 4.2.1.4 Using a PC and Communications Software. . . . . . . . . . . . .19
- 4.2.1.5 Hard-Wired TACs . . . . . . . . . . . . . . . . . . . . . . . .20
-
- DRAFT [Page ii] DRAFT
-
-
-
-
-
-
-
- NIC 60001, September 91 DDN New User Guide
-
-
- 4.2.2 TAC Login . . . . . . . . . . . . . . . . . . . . . . . . . . . .20
- 4.2.3 Common TAC Login Problems . . . . . . . . . . . . . . . . . . . .22
- 4.2.3.1 TAC Login Error Messages. . . . . . . . . . . . . . . . . . . .22
- 4.2.3.2 Host Connection Errors. . . . . . . . . . . . . . . . . . . . .24
- 4.2.4 Changing the TAC Intercept Character. . . . . . . . . . . . . . .25
- 4.2.5 Using a TAC for File Transfer (FTP) . . . . . . . . . . . . . . .26
- 4.2.5.1 Changing the Intercept Character. . . . . . . . . . . . . . . .26
- 4.2.5.2 Setting Flow Control on the TAC . . . . . . . . . . . . . . . .26
- 4.2.5.3 Putting the TAC in Binary Mode. . . . . . . . . . . . . . . . .27
- 4.2.6 A Brief Word About Mini-TACs. . . . . . . . . . . . . . . . . . .28
-
- SECTION 5. NETWORK USE . . . . . . . . . . . . . . . . . . . . . . . . . .29
- 5.1 Electronic Mail . . . . . . . . . . . . . . . . . . . . . . . . . .29
- 5.1.1 UNIX Mail Examples. . . . . . . . . . . . . . . . . . . . . . . .32
- Sending Mail Via UNIX . . . . . . . . . . . . . . . . . . . . . .32
- Reading UNIX Mail . . . . . . . . . . . . . . . . . . . . . . . .32
- Getting Help for UNIX Mail. . . . . . . . . . . . . . . . . . . .33
- 5.1.2 InfoMail Examples . . . . . . . . . . . . . . . . . . . . . . . .34
- Sending a Message Via InfoMail. . . . . . . . . . . . . . . . . .34
- Reading Mail with InfoMail. . . . . . . . . . . . . . . . . . . .35
- Getting Help for InfoMail . . . . . . . . . . . . . . . . . . . .36
- 5.2 File Transfer Protocol (FTP). . . . . . . . . . . . . . . . . . . .36
- 5.2.1 Transferring a File on a UNIX System. . . . . . . . . . . . . . .39
- 5.2.2 How to FTP a Directory Listing. . . . . . . . . . . . . . . . . .40
- 5.3 Using TELNET. . . . . . . . . . . . . . . . . . . . . . . . . . . .42
- 5.3.1 Invoking TELNET with the Hostname on the Command Line . . . . . .42
- 5.3.2 TELNET Using Host Address . . . . . . . . . . . . . . . . . . . .44
-
- SECTION 6. DDN NETWORK INFORMATION CENTER (NIC). . . . . . . . . . . . . .46
- 6.1 Contacting the NIC. . . . . . . . . . . . . . . . . . . . . . . . .46
- 6.1.1 NIC User Assistance Help Desk . . . . . . . . . . . . . . . . . .46
- 6.1.2 NIC Host. . . . . . . . . . . . . . . . . . . . . . . . . . . . .47
- 6.1.3 NIC Online Contacts . . . . . . . . . . . . . . . . . . . . . . .47
- 6.1.4 NIC U.S. Mail Address . . . . . . . . . . . . . . . . . . . . . .48
- 6.2 NIC Services. . . . . . . . . . . . . . . . . . . . . . . . . . . .48
- 6.2.1 Network and User Registration Services. . . . . . . . . . . . . .48
- 6.2.2 Usage-Sensitive Billing Service Desk. . . . . . . . . . . . . . .50
- 6.2.3 Security Coordination Center (SCC). . . . . . . . . . . . . . . .50
- 6.3 NIC User Programs . . . . . . . . . . . . . . . . . . . . . . . . .50
- 6.3.1 WHOIS/NICNAME . . . . . . . . . . . . . . . . . . . . . . . . . .51
-
- DRAFT [Page iii] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
- 6.3.1.1 Accessing WHOIS . . . . . . . . . . . . . . . . . . . . . . . 51
- From a TAC. . . . . . . . . . . . . . . . . . . . . . . . . . 51
- From a DDN Host . . . . . . . . . . . . . . . . . . . . . . . 51
- Via Electronic Mail . . . . . . . . . . . . . . . . . . . . . 52
- 6.3.1.2 Using WHOIS . . . . . . . . . . . . . . . . . . . . . . . . . 52
- 6.3.1.3 WHOIS Search Examples . . . . . . . . . . . . . . . . . . . . 53
- WHOIS Search by Name. . . . . . . . . . . . . . . . . . . . . 54
- WHOIS Search by Partial Name. . . . . . . . . . . . . . . . . 55
- WHOIS Search by Handle. . . . . . . . . . . . . . . . . . . . 56
- WHOIS Search by Hostname. . . . . . . . . . . . . . . . . . . 56
- WHOIS Search by TAC Name. . . . . . . . . . . . . . . . . . . 58
- WHOIS Search by PSN Number. . . . . . . . . . . . . . . . . . 59
- WHOIS Search by Network Number. . . . . . . . . . . . . . . . 60
- WHOIS Search by Domain Name . . . . . . . . . . . . . . . . . 61
- 6.3.2 NIC/QUERY . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
- 6.3.3 TACNEWS . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
- 6.3.4 NIC Kermit Server . . . . . . . . . . . . . . . . . . . . . . . 66
- 6.3.5 NIC Automated Mail Service. . . . . . . . . . . . . . . . . . . 67
- 6.4 Documents Published by the NIC. . . . . . . . . . . . . . . . . . 68
- 6.5 Online Reference Files at the NIC . . . . . . . . . . . . . . . . 69
-
- SECTION 7. SECURITY CONSIDERATIONS AND NETWORK CONDUCT . . . . . . . .. 73
- 7.1 Requirements for Legitimate DDN Access. . . . . . . . . . . . . . 73
- 7.2 Security Considerations and Guidelines for Network Conduct. . . . 73
- 7.3 Network Conduct . . . . . . . . . . . . . . . . . . . . . . . . . 75
- 7.3.1 Passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
- 7.3.2 File Protection . . . . . . . . . . . . . . . . . . . . . . . . 75
- 7.3.3 Plagiarism. . . . . . . . . . . . . . . . . . . . . . . . . . . 76
- 7.3.4 Mail. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
- 7.4 Additional Security Information . . . . . . . . . . . . . . . . . 77
-
- SECTION 8. NETWORK CONCEPTS OVERVIEW . . . . . . . . . . . . . . . . . . 78
- 8.1 Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . 78
- 8.2 Usage Sensitive Billing . . . . . . . . . . . . . . . . . . . . . 78
- 8.3 Network Concentrators . . . . . . . . . . . . . . . . . . . . . . 79
- 8.4 Network Addressing. . . . . . . . . . . . . . . . . . . . . . . . 81
- 8.4.1 Finding Network Address Information . . . . . . . . . . . . . . 85
- 8.4.2 Obtaining Network Addresses . . . . . . . . . . . . . . . . . . 85
- 8.4.3 Knowing Your Network Address. . . . . . . . . . . . . . . . . . 85
- 8.5 The Domain Name System. . . . . . . . . . . . . . . . . . . . . . 86
- 8.6 Government Open Systems Interconnection Profile (GOSIP) . . . . . 89
-
- DRAFT [Page iv] DRAFT
-
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
- SECTION 9. NETWORK SERVICE CENTERS AND CONTACTS. . . . . . . . . . . . . 90
- 9.1 The DDN Network Information Center (NIC). . . . . . . . . . . . . 90
- 9.1.1 General Reference Service Provided by the NIC . . . . . . . . . 91
- 9.1.2 NIC Online Contacts . . . . . . . . . . . . . . . . . . . . . . 91
- 9.1.3 NIC U.S. Mail Address . . . . . . . . . . . . . . . . . . . . . 92
- 9.2 Network Monitoring Centers (NMCs) . . . . . . . . . . . . . . . . 92
- 9.2.1 NMC Services. . . . . . . . . . . . . . . . . . . . . . . . . . 92
- 9.2.2 NMC Contacts. . . . . . . . . . . . . . . . . . . . . . . . . . 93
- 9.2.3 NMC U.S. Mail Addresses . . . . . . . . . . . . . . . . . . . . 93
- 9.3 Host Administrators and Node Site Coordinators. . . . . . . . . . 93
- 9.4 Military Communications and Operations Command Contacts . . . . . 94
- 9.5 Defense Information Systems Agency, Defense Network
- Systems Organization (DISA DNSO). . . . . . . . . . . . . . . . . 95
- 9.6 Network Use Problems. . . . . . . . . . . . . . . . . . . . . . . 95
-
- SECTION 10. BIBLIOGRAPHY . . . . . . . . . . . . . . . . . . . . . . . . 96
-
- SECTION 11. GLOSSARY . . . . . . . . . . . . . . . . . . . . . . . . . .100
-
- APPENDIX A. NETWORK RESOURCES. . . . . . . . . . . . . . . . . . . . . .109
-
- APPENDIX B. COMMONLY ASKED QUESTIONS . . . . . . . . . . . . . . . . . .112
-
- INDEX
-
-
- LIST OF FIGURES
-
-
- Figure 2-1 Methods of Accessing the Network. . . . . . . . . . . . . .7
-
- Figure 4-1 TAC Card Illustration . . . . . . . . . . . . . . . . . . 16
-
- Figure 6-1 User Registration Template. . . . . . . . . . . . . . . . 49
-
- Figure 8-1 Internet Address Classes. . . . . . . . . . . . . . . . . 84
-
-
-
-
-
- DRAFT [Page v] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
- SECTION 1. INTRODUCTION
-
- 1.1 Welcome
-
- Welcome to the Defense Data Network, or the DDN, as it is more commonly
- called. The DDN is a powerful operational military network. It might be
- thought of as an "umbrella" network composed of several large segments or
- subnetworks. The unclassified portion of the DDN is a subnetwork known as the
- MILNET. The MILNET connects the DDN to an even larger network that includes
- military contractors, universities, and research centers; this entire
- collection of interconnected networks is called the Internet. Its users
- number in the thousands. It is the MILNET on which this document focuses.
-
- The DDN New User Guide explains the policies, concepts, and conventions of the
- DDN, with major emphasis on the MILNET. The Guide contains an overview of and
- a tutorial introduction to the DDN, along with descriptions of its more
- interesting network programs and services. It is not intended to be a highly
- technical document, and it does not cover the procedures for attaching
- hardware, terminals, or other equipment to the network. This information is
- provided in other documents [1,2].
-
- Originally, the MILNET was an integral part of the research network known as
- the ARPANET (after the Advanced Research Projects Agency, which was the
- sponsor). In 1984, the MILNET and the ARPANET were physically separated, and
- gateways were installed to allow traffic to be interchanged between the MILNET
- and the research networks sponsored by DARPA (the Defense Advanced Research
- Projects Agency). By 1990, the original ARPANET technology had become
- obsolete, and the ARPANET was discontinued in June of that year.
-
- The DDN affords its users a wealth of services and resources. Many of your
- colleagues already work on the network, and you will be able to communicate
- with them quickly and easily, even though they may be hundreds of miles away.
- The DDN also allows you to participate in discussions about topics of interest
- to you and gives you the opportunity to use network programs and tools to
- enhance your own capabilities.
-
- Using a computer network is not difficult. However, as with any new tool,
- using it proficiently requires learning some procedures and guidelines and
- practicing your new skills. The DDN New User Guide will provide the
- background information necessary to get you started. We hope you find it a
- useful introduction to the DDN.
-
- DRAFT [Page 1] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
- 1.2 Using This Guide
-
- The DDN New User Guide is written for the beginning user and should be
- supplemented with reading from other sources. Network-specific terms are
- defined both in context and in the Glossary (Section 11). Throughout the
- text, references appear in the form "[n]". The bracketed numbers refer to
- citations in the Bibliography (Section 10), which lists documents containing
- additional explanatory or background information. Also, check online help
- systems and the documentation that usually accompanies the network programs
- you use. (Watch for pointers to online help files when you first access a
- program or service.) We encourage you to expand your knowledge of the network
- by consulting these and other information sources whenever you can.
-
- The Guide is divided into sections and subsections, each covering topics of
- interest to a new user. A summary of the contents of each section follows.
-
- * Section 1 (this section) is a brief introduction to the Guide.
-
- * Section 2, The Defense Data Network, describes the structure of the
- DDN and its administration. It also describes the MILNET and the
- role of the Defense Network System Organization (DNSO). It provides
- a brief historical sketch of the evolution of the DDN from the
- original ARPANET.
-
- * Section 3, Network Connection, describes the ways in which various
- machines access the network.
-
- * Section 4, DDN TAC Access, describes the procedures for obtaining
- and using a TAC Access Card and provides detailed procedures for
- accessing the network through a Terminal Access Controller (TAC) or
- a Mini-TAC. Also included is background information that will be
- helpful to TAC and Mini-TAC users, such as common error messages,
- TAC commands, and instructions for performing file transfers.
-
- * Section 5, Network Use, provides "how-to" instructions for some of
- the DDN's most useful services, such as electronic mail programs, FTP,
- and TELNET.
-
- * Section 6, The DDN Network Information Center (NIC), describes in
- detail the databases, programs, files, documents, and services offered
- by the NIC.
-
- DRAFT [Page 2] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
- * Section 7, Security Considerations and Network Conduct, explains the
- legal and courtesy standards of the network. The importance of host
- and network security is discussed, and in Section 7.1, the require-
- ments for legitimate access to the DDN are defined. Be sure to read
- the etiquette section (Section 7.3). Adhering to the guidelines given
- there will decrease your chances of unwittingly offending other users
- during your first days on the net.
-
- * Section 8, Network Concepts Overview, provides some background
- information on terms and concepts that a new user might hear but not
- understand. This section includes discussions on topics such as the
- Domain Name System (DNS), network addressing, Government Open Systems
- Interconnection Profile (GOSIP), and gateway concentrators.
-
- * Section 9, Network Service Centers and Contacts, describes network
- service providers and how to reach them. The DDN Network Information
- Center (NIC) is logically the first place to look for information
- unavailable at the local level. The NIC can help you solve network
- use problems, locate documents and resources, or identify appropriate
- points of contact (POCs) for further assistance.
-
- * Sections 10 and 11 are a Bibliography and a Glossary of terms used in
- this guide.
-
- * The appendices contain information about resources available to
- network users and answers to some of the questions most often asked
- by new users.
-
- * A feedback form is located at the back of the Guide. We encourage our
- readers to use the form to make suggestions or point out errors. We
- value your comments and suggestions and will consider them for future
- versions of the DDN New User Guide. You may also send suggestions
- online to SUGGESTIONS@NIC.DDN.MIL.
-
-
-
-
-
-
-
-
-
- DRAFT [Page 3] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
- 1.3 Document Conventions
-
- [NOTE: Most of the printing/typographic conventions described here
- do not apply to the online version of this document. They are visible
- only in the hard-copy version.]
-
- This document uses several printing conventions to identify the difference
- between characters you type (input) and those that a computer prints to your
- screen (output). These conventions are described below.
-
- Unless otherwise indicated, all user input is terminated by pressing the
- carriage return or Enter key on your keyboard. (Pressing this key does not
- cause a visible character to be printed.) In this document, the carriage
- return or Enter key is represented as <Return>. Both input and output are
- characterized by a typewriter-like font to further differentiate them from the
- surrounding text.
-
-
- 1.3.1 User Input Display
-
- Your input (i.e., the characters you type) is represented in bold typeface:
-
- Your input looks like this.
-
-
- 1.3.2 Machine Output Display
-
- A non-bold, non-proportional font represents machine prompts, messages, and
- other output.
-
- Machine text looks like this.
-
-
- 1.3.3 Comment Display
-
- In examples or instructions, Italics indicate comments we have inserted for
- further clarification.
-
- Our comments look like this.
-
-
-
- DRAFT [Page 4] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
- 1.3.4 Typing Control Characters
-
- In using the network, it may sometimes be necessary for you to type special
- characters known as control characters. These characters are often
- represented in documentation by a letter prefixed with the circumflex
- character "^" -- e.g., ^y. When entering these control characters, you must
- press the control key simultaneously with the desired letter. For example, if
- you see a "^y" in input instructions, this indicates a control-y, and it means
- that you should press the control key while you type the letter "y".
- Throughout this Guide, the control key is represented by the circumflex,
- unless otherwise stated.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- DRAFT [Page 5] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
-
- SECTION 2. THE DEFENSE DATA NETWORK
-
-
- 2.1 Network Overview
-
- When you access a local computer, you are largely unaware of what kind of link
- connects your terminal to the computer you wish to use. The terminal seems to
- be the computer, since it prints or displays what is happening. As you
- progress in your work, you may need to move data from your local computer onto
- another computer, or you may wish to send a message to a colleague working on
- a computer at a distant location. At this point, the usefulness of a
- communication network becomes apparent.
-
- A communication network is a group of computers joined by data-carrying links.
- A network may be as small as two or three personal computers tied together by
- local telephone lines and located in the same building, or it may be a vast
- complex of computers spread over the world, whose data links include long-haul
- telephone lines, satellite relays, fiber-optic cables, or radio links. It is
- also possible for several different networks to be interconnected to form an
- "internetwork" or "internet."
-
- Everyone is familiar with telephones. Phone sets inside the house connect to
- outside lines that lead into nearby local or regional telephone exchanges.
- These exchanges are connected to make up one or more national telephone
- systems. The national telephone systems communicate with each other to make
- up an international telephone network. There are also private telephone
- systems that are totally separate from the public telephone system and have
- their own equipment.
-
- Computer networks follow a similar pattern. Local area networks (called LANs)
- may connect computers within a building or in different buildings. A LAN may
- remain separate, or it may interconnect to regional, national, or worldwide
- commercial or government networks. Many of these large and small networks are
- gradually interconnecting through gateways to form a worldwide system of data
- networks similar to the telephone system. Indeed, since many computer
- networks use telephone communication lines to carry data from one computer to
- the next, the two systems are closely interwoven.
-
-
-
-
- DRAFT [Page 6] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
- You do not need detailed knowledge of this technology to use a network, but
- you do need to understand the concept of going through layers of equipment and
- interconnections. Effective network use also requires knowing the online
- addresses of people or machines with which you wish to communicate and knowing
- your own network address as well.
-
- The DDN is a special kind of data network known as a packet-switched network.
- On this network, a terminal or a source host computer (generally just called a
- host) passes a message along with its destination address to the local Packet
- Switching Node (PSN) computer. The PSN breaks the message into packets, or
- smaller chunks of data. Each of these packets has the same destination
- address and source address as the original message, plus a sequence number
- indicating which piece of the original message it represents. The packets are
- passed from PSN to PSN until they reach the destination PSN, where they are
- reassembled in their original order and delivered to the destination host.
-
- A packet switched network differs from a circuit-switched network in that no
- predetermined dedicated path exists for delivery of the data. Each packet
- takes the best route that it can find at the time, and all the packets in a
- message do not necessarily take the same route. Once the packets arrive at
- the destination PSN, they are reassembled in the correct sequence and
- delivered to the destination host as a complete message.
-
-
- 2.2 Network Access Methods
-
- The Defense Data Network (DDN) is made up of a variety of equipment. Its
- users provide terminals, modems, and host computers. The DDN supplies node
- computers, encryption equipment, and leased telephone lines. You can reach
- the network from your terminal in several ways by using different combinations
- of hardware in conjunction with different network programs. These network
- connection methods are shown in Figure 2-1.
-
- [NOTE: Because of software limitations, figures are not visible in
- the online version of this document.]
-
-
-
-
-
- Figure 2-1. Methods of Accessing the Network
-
- DRAFT [Page 7] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
- A terminal may reach a host in several ways.
-
- * A wire or cable may run directly from the terminal to the computer;
- this is called a hard-wired terminal.
-
- * A terminal may communicate with a computer via a telephone connected
- to the terminal through a modem or acoustic coupler; this is called a
- dial-up terminal.
-
- Dial-up terminals generally connect to the network at 1200 bits per second
- (bps), although other speeds can be used.
-
- [NOTE: The speed setting of both your terminal and your modem must
- be the same to enable the two devices to communicate properly with
- one another.]
-
- With the appropriate equipment, personal computers may also be used as
- terminals. In this case, the personal computer emulates (or acts like) a
- terminal when it is used in terminal mode.
-
- A terminal may be directly attached to a local area network (LAN) or to a
- local switch (similar to a telephone switch). The user of such a terminal can
- reach any computer on the LAN or any computer connected to the switch. The
- LAN may also be connected to the DDN through a gateway, which is a computer
- whose software can direct traffic from the LAN onto the larger long-haul
- network and vice versa.
-
-
- 2.3 Organization of the DDN
-
- The Defense Data Network is a large military common-user data communications
- internetwork operated for the Department of Defense (DoD) by the Defense
- Network Systems Organization (DNSO) of the Defense Information Systems Agency
- (DISA). The DDN is made up of several networks. The MILNET is the DDN
- network that is connected to the Internet.
-
-
- 2.4 Development of the DDN
-
- As mentioned previously, the MILNET is an unclassified military network that
- is part of the DDN. It was built using technology developed as part of the
- ARPANET, which was the prototype packet-switched network.
-
- DRAFT [Page 8] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
- The ARPANET was built by the Defense Advanced Research Projects Agency (DARPA)
- in 1969 as an experiment to determine the viability of a store-and-forward,
- host-to-host, packet-switched network. The network designers wanted to
- demonstrate that computers made by different manufacturers, of different
- sizes, and running different operating systems, could communicate with one
- another across a network. It was envisioned that users of such a network
- could share programs and communicate via the network with other users at
- distant locations. The experiment was successful, and today many data
- networks are modeled after the ARPANET.
-
- In 1979, the Department of Defense decided to interconnect several DoD
- long-haul computer networks through a set of internet protocols so that these
- networks could share the same backbone of node computers linked by high-speed
- telephone lines. Protocols are rules or standards by which computers
- communicate on a network.
-
- The ARPANET protocols were developed by researchers known as the Internet
- Working Group (IWG), under the sponsorship of the DARPA Information Processing
- Techniques Office (IPTO). The protocols were tested for several years on the
- ARPANET, and they proved useful for creating the networking environment that
- the DoD wanted.
-
- In 1982, the DoD issued a directive [3] adopting a single set of communication
- protocols based on the ARPANET protocols. This was followed later in 1982 by
- a directive [4] to create the DDN as a parent, or umbrella, operational
- military network made up of several existing or planned DoD computer networks.
-
- By 1983, the ARPANET, which was still considered an experimental network, had
- grown to over 300 computers, many used for day-to-day operational military
- purposes as well as for research. Other military users were seeking
- networking services. To meet this growing need for an operational military
- network, the DoD evaluated several network architectures and finally chose the
- DARPA Internet architecture as the model for its common-user communications
- network, the DDN.
-
- In September 1984, the original ARPANET was split into two separate
- unclassified networks--a military research and development network (ARPANET)
- and a military operational communications network (MILNET). The split
- returned to DARPA a network for experimentation and established an
- unclassified military network able to accommodate the DoD's growing
- operational needs.
-
- DRAFT [Page 9] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
- In June 1990, the ARPANET was officially dissolved. Many sites that were
- formerly part of the ARPANET are now connected to the National Science
- Foundation Network, NSFNet. The MILNET remains under the administration of
- DISA. Plans for upgrading and expanding the current network are now underway.
-
- A Defense Research Internet (DRI) will meet defense needs, while the National
- Research and Education Network (NREN) will provide a national forum for
- research and education.
-
-
- 2.5 The Defense Information Systems Agency, Defense Network Systems
- Organization (DISA DNSO)
-
- DISA's Defense Network Systems Organization (DNSO) evolved from the Defense
- Communications System Organization in 1991 (the same year in which DISA
- evolved from the Defense Communications Agency). The DNSO handles overall
- management, operations, and policy guidelines for the DDN. It assists new
- military subscribers in bringing their computers and related equipment onto
- the DDN.
-
- The DNSO provides many services to network users and potential network
- subscribers. It is responsible for
-
- * Keeping the network "up and running,"
- * Providing user assistance,
- * Setting policies and guidelines,
- * Anticipating growth and expansion,
- * Assisting new subscribers.
-
- Among its other duties, the DNSO also
-
- * Manages access control and security for the network backbone,
- * Designates host and node contacts,
- * Coordinates military sponsors,
- * Provides technical management of contracts for services, equipment,
- and software obtained from outside vendors.
-
- To provide operational management support for the DDN, the DISA DNSO has
- designated a person to act as the primary Point of Contact (POC) for
- operations for each of the DDN networks. For example, the MILNET Manager is
- responsible for MILNET operations. One of his/her duties is to approve all
- host connections to the MILNET and all changes to such connections. For
- information about how to contact the current MILNET Manager or any of the
- other DDN network managers, you may contact the DDN Network Information
- Center. (See Section 6.1.1.)
- DRAFT [Page 10] DRAFT
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
-
- SECTION 3. NETWORK CONNECTION
-
-
- 3.1 Host Access
-
- To open a connection through the network from one host to another, you must
- first log in to one of the hosts from a terminal. After logging in, you may
- open a connection across the network to a second host. Once this connection
- is established, you may log in to the remote host computer and work there.
- When you finish and log out of the remote computer, the network connection is
- closed and you are back where you began--still logged in to the first host.
- In this way, it is easy to use the resources of more than one computer
- (assuming that you have a valid account on each system).
-
- The direct host-to-host connection just described is called a TELNET
- connection. TELNET is a valuable network tool, because it lets you use
- programs and utilities on remote machines that may not be available locally.
- You may also open a specialized host-to-host link called a file transfer or
- FTP connection. (FTP is the acronym for File Transfer Protocol.) FTP allows
- you to copy or transfer files from one host to another. Sections 5.1.2 and
- 5.1.3 provide specific details for executing host-to-host FTP and TELNET
- connections.
-
-
- 3.2 TAC Access
-
- You can access the network by connecting a hard-wired or dial-up terminal to a
- terminal access controller, or TAC, and then logging into the TAC by entering
- a valid Userid and Access Code (password). When a wire or cable runs directly
- from a terminal to a TAC, it is called a "hard-wired" terminal. A TAC allows
- a wide variety of terminals to communicate directly with any host on the
- network without going through an intervening host. After logging into a TAC,
- you can reach a network host by specifying its host address. You may also
- establish this type of connection on a Mini-TAC (see Section 4.2.6).
-
- [NOTE: You must be a registered, authorized user to obtain a TAC
- Userid and Access Code. See details in Section 4.1.1.]
-
-
-
-
- DRAFT [Page 11] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
- 3.3 Gateway Access
-
- If a computer is attached to a LAN or a non-DDN network, a gateway or
- concentrator manages communication between the local network and the DDN. The
- gateway is transparent--that is, you should be unaware that it is there. Some
- sites do not allow traffic to flow from the DDN to their internal network. In
- such cases, the gateway exists and is functional, but you must use the gateway
- host itself to perform any tasks that require access to the DDN (e.g., to
- establish a TELNET or FTP connection to a DDN host). Electronic mail can
- travel over this type of gateway transparently. Ordinarily, you need no
- special commands or syntax to communicate through a gateway. Figure 2-1
- illustrates a gateway connection from a LAN to the DDN, as well as the other
- connection strategies discussed in this Section.
-
- [NOTE: Because of software limitations, figures are not visible in
- the ASCII format of the online version of this document.]
-
-
- 3.4 A Word About Personal Computers
-
- Although Personal Computers (PCs) can be attached to the DDN in several ways
- (including as hosts), at present, most personal computers on the DDN are not
- hosts--that is, they have not implemented the network protocols and are not
- attached directly to a PSN. Functioning simply as terminals, they have no
- other capabilities so far as the network is concerned.
-
- Like a terminal, a PC can be connected to a host, Terminal Access Controller
- (TAC), or Mini-TAC through either a dedicated or a dial-up line. In these
- cases, the PC needs special software that allows it to imitate a terminal.
-
- Once you have assembled the proper equipment, you will need to configure the
- software for your particular system. You will often need to set the following
- parameters:
-
- speed The baud rate (in bits per second) at which data is sent
- and received; usually 300 or 1200 baud if your connection
- is through a dial-up modem. However, 9.6 dial-up service
- is currently being introduced. For direct lines, check
- with your Node Site Coordinator.
-
- data bits Usually set at 8
-
- DRAFT [Page 12] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
- stop bits Usually set at 1
-
- parity Usually set to "even" or "none"
-
- If these settings do not work, ask local user representatives or host
- personnel what your system requires. Consult the documentation that
- accompanies your personal computer, software, and/or modem for details of
- operation.
-
- Local site representatives should be the first point of contact for PC-related
- problems. If you have no such representative, contact the Host Administrator
- for the host you are trying to reach. The NIC may also be able to help with
- some of the problems you encounter. Check to see if your organization has a
- PC users group, as other users can be a valuable source of advice. In
- addition, the network has several general and machine-specific PC interest
- groups that can provide a broad range of information and answers. (See
- Appendix A for information on these groups, and see Section 4.2.5 for a
- discussion of transferring files through a TAC or Mini-TAC to a PC.)
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- DRAFT [Page 13] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
-
- SECTION 4. DDN TAC ACCESS
-
- This section provides information about TAC cards and explains how to use a
- TAC or Mini-TAC to log on to the network and set it to transfer files. It
- also provides information on special settings that may be required to allow
- the TAC/Mini-TAC to transfer files and function more efficiently.
-
-
- 4.1 TAC Card Information
-
- The following paragraphs explain how users are registered to receive TAC
- cards, what items are printed on a TAC card, and how to get a TAC Users'
- Guide.
-
-
- 4.1.1 TAC User Registration
-
- If you are unable to connect directly to your host computer, you will be
- issued a TAC Access Card that allows you to access your host via a TAC or
- Mini-TAC. Whether you are located hundreds or thousands of miles away from
- the host or right next door, you will need a TAC card only if you cannot
- access your host directly.
-
- TAC access requires official authorization from a MILNET Host Administrator,
- as well as the assignment of a unique TAC Userid and Access Code (Password).
-
- After official authorization, the NIC issues each MILNET TAC user a TAC Access
- Card containing a Userid and Access Code. The NIC cannot issue a card until
- it has received approval from the Host Administrator for the user's primary
- MILNET host.
-
- [NOTE: If you need a TAC card for a limited time, your Host
- Administrator can probably issue you a TAC guest card, which is
- good for up to three months. If you need such temporary access,
- contact your Host Administrator.]
-
- Regardless of whether you normally use a direct connection to your host, you
- may need a TAC Access Card if you travel extensively. Because TACs and
- Mini-TACs are located all over the world, an Access Card allows you to log in
- when you are out of town without incurring long distance phone charges.
-
- DRAFT [Page 14] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
- The TAC Access Card contains a Userid and Access Code. This Userid and Access
- Code are to be used only by the person to whom the card is issued. While
- there is a strict policy of limiting TAC cards to one per person, you may have
- many DDN host login accounts, and one TAC card can be used to access any of
- these accounts. You do not need a TAC card from each host on which you have
- an account. Any TAC card works on all TACs.
-
- Note that TAC cards are issued to users by individual name only. They are not
- issued to groups of users or entire offices. This policy applies even when
- many users share a single login account. Not only is this a security measure,
- but it also prevents multiple users from losing DDN access when a single card
- is invalidated.
-
- If you are using a card issued to another DDN user, please notify the person
- listed as the CONTACT on the card. This is probably your Host Administrator.
- Inform him/her that you are using an account on his/her host and that you wish
- to have a TAC card issued in your own name.
-
-
- 4.1.1.1 Users Behind Concentrators
-
- DDN Management Bulletin 76 [5] states that only administrators of hosts that
- are directly connected to the MILNET can authorize TAC or Mini-TAC Access
- Cards for their users. Administrators of hosts that are behind concentrators
- or gateways cannot directly authorize their users for TAC access. Such
- administrators will need to transfer jurisdiction over their users to a Host
- Administrator associated with a directly-connected MILNET host. If you are a
- user or Host Administrator who has questions about this policy, please send a
- message to
-
- REGISTRAR@NIC.DDN.MIL
-
- or call 1-800-365-DNIC for assistance.
-
- If you access the MILNET via a concentrator, the name of that concentrator,
- its address, and its administrator will appear on the HOST, NETADDRESS, and
- CONTACT lines of your TAC card. You may still use your card to access your
- primary login account, even if it is on another host; however, you must know
- the network address of your primary host. The administrator of your primary
- host can tell you its address. You must know this address when you log into a
- TAC and when you request help with a TAC login problem.
-
- DRAFT [Page 15] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
- 4.1.2 TAC Card Example
-
- Figure 4-1 is a sample of the left portion of a DDN TAC Access Card. To help
- you understand the information on the TAC card, we have identified what each
- information item represents.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Figure 4-1. TAC Card Example
-
-
-
- TAC cards are perforated and include instructions to "detach here" and "fold
- here," allowing you to reduce the size of the card so that you may insert it
- in a wallet or credit card case.
-
-
- DRAFT [Page 16] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
- WARNING!! Do not laminate your TAC Card. Because of NIC printing
- requirements, blank cards are enclosed within carbon-coated envelopes.
- This carbon material fades very quickly when placed in plastic envelopes
- or when permanently laminated. This phenomenon also extends to the
- placement of transparent tape over the print. If you wish to preserve
- or darken the information printed on your card, we recommend that you
- use a ballpoint pen to rewrite it just above or below the appropriate
- item.
-
- The most important information on the right-hand portion of your TAC card is
- your mailing address. However, the NIC includes its toll-free User Assistance
- Hotline number on this section of the card in case you lose the left half. In
- addition to the hotline number, the top of the card contains a brief set of
- user guidelines. As an authorized TAC or Mini-TAC user, you are expected to
- comply with these guidelines. If you find yourself in the position of sharing
- a TAC Access Card with other users, please notify your Host Administrator and
- request a TAC card for each individual.
-
-
- 4.1.2.1 Common TAC Card Userid/Access-Code Input Errors
-
- Just below the guidelines section is a key that shows how each printed
- character appears on a TAC card. The statement, "Access codes never contain a
- one, zero, 'Q' or 'Z'" follows. Remember that these characters are invalid
- only in Access Codes and not in Userids. If you find that the TAC or Mini-TAC
- is returning a "Bad Login" error message during your first attempts to log in,
- check to see if you are typing one of these invalid characters. For example,
- if you're typing a zero, try the letter O (oscar). If you're typing a Q
- (quebec), try the letter G (golf) instead. Use the key to compare the printed
- characters. Be aware that other character can also be similar. For instance,
- the 8 (eight) sometimes looks like a B (bravo), and the S (sierra) sometimes
- looks like a 5 (five). TAC card Userids and Access Codes are not case-
- sensitive, i.e., you can enter them in either uppercase or lowercase
- letters.
-
- If you have any questions about reading or using your TAC access card, call
- the NIC for assistance at 1-800-365-DNIC.
-
-
-
-
-
- DRAFT [Page 17] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
- 4.1.3 Obtaining the TAC Users' Guide
-
- The paragraph in fine print at the bottom of your TAC card alerts you that
- further, more comprehensive information is available to you. Upon written
- request, you can obtain the TAC Users' Guide from the Defense Information
- Systems Agency (DISA). This document is geared toward users who are
- interested in learning some of the finer points of TAC usage.
-
- To order the TAC Users' Guide, send a note specifying its title and DCAC
- 310-P70-74 to the following address:
-
- Defense Information Systems Agency
- Attn: Code BIAR
- 701 S. Courthouse Road
- Arlington, VA 22204-2199
-
-
- 4.2 TAC Login Procedures
-
- This section discusses how to use a TAC or Mini-TAC to log in to the DDN. It
- also describes how to connect to a TAC or Mini-TAC, lists some common TAC or
- Mini-TAC error messages, and presents information about transferring files
- through a TAC to a PC.
-
-
- 4.2.1 Connecting to a TAC or Mini-TAC
-
- The following paragraphs explain the various ways in which you can connect to
- a TAC or a Mini-TAC.
-
-
- 4.2.1.1 Dial-up TACs
-
- To connect to a TAC/Mini-TAC using the telephone system, follow the general
- procedures described here. Because the exact steps required to dial the
- TAC/Mini-TAC depend on your local hardware setup, check with local site
- representatives for details.
-
- You may obtain the number of the nearest TAC/Mini-TAC directly from the
- network by using the TACNEWS service (see Section 6.3.3) or by calling the NIC
- at 1-800-365-DNIC. You can look up the phone number of a specific TAC or
- Mini-TAC via the NIC WHOIS service (see Section 6.3.1).
-
- DRAFT [Page 18] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
- In addition, many TAC/Mini-TAC phone numbers are listed on the back of your
- TAC Access Card.
-
-
- 4.2.1.2 Using a Terminal with an Acoustic Coupler
-
- To use an acoustic coupler, first dial the TAC/Mini-TAC number on a telephone
- and listen for the dial tone. When you hear the tone, put the telephone
- handset into the indicated position on the coupler cuffs.
-
-
- 4.2.1.3 Using a Dial-up Modem
-
- A dial-up modem will be wired to your telephone and to your terminal.
- (Consult the instructions that come with the modem to attach it to your
- terminal and set it properly.) Begin by dialling the TAC/Mini-TAC number on
- the telephone. Then, wait for the tone, switch the modem from "voice" to
- "data," and set the handset back on the telephone cradle. Note that the speed
- of the terminal must match the speed of the modem. Also note that some modems
- are "smart"--that is, you will not have to use the telephone to dial the
- number. Instead, you will type some instructions to your terminal, such as
- "DIAL5551212" or "ATDT9,18003682227." The modem will then dial the number as
- instructed and make the connection for you. See your modem instruction manual
- for exact details.
-
-
- 4.2.1.4 Using a PC and Communications Software
-
- To access a TAC/Mini-TAC, you can use one of the popular communications
- software packages such as Procomm or Xmodem. These programs often enable the
- PC to dial the TAC/Mini-TAC, open the host connection, and enter your Userid
- and Access Code automatically. If you use such a package, be sure you know
- how to dial the TAC/Mini-TAC by hand in case there are problems with the
- script or the equipment. It is also useful to know the address of the host
- you connect to and how to alter the script when changes are made to the
- network.
-
- Finally, for security reasons, you should enter your Userid and Access Code
- manually when logging in rather than including this information within the
- access script.
-
-
- DRAFT [Page 19] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
- 4.2.1.5 Hard-Wired TACs
-
- If you are to connect to a host via a hard-wired TAC, you will need to consult
- a local user representative or Node Site Coordinator to learn the procedure
- for getting to the TAC/Mini-TAC. The procedure will vary depending upon what
- equipment is used and how it is configured at your location.
-
-
- 4.2.2 TAC Login
-
- After you have successfully connected to a TAC/Mini-TAC, you must supply a
- "wake-up" character to alert the TAC to your presence. Do this by holding
- down the <Control> key and typing the letter Q on your keyboard (^Q). The
- TAC/Mini-TAC should respond with a banner--often a message from the MILNET
- Monitoring Center.
-
- Once the TAC banner is displayed on your screen, you can begin the process of
- logging into the TAC/Mini-TAC and connecting to a remote host.
-
- Following is a sample scenario showing how to log in to a TAC/Mini-TAC. For
- more detailed instructions on using a TAC/Mini-TAC and setting terminal
- parameters, consult the TAC Users' Guide [1].
-
-
-
- CONNECT 1200 (After user dials or otherwise connects to the
- TAC/Mini-TAC, the modem may print a message
- similar to this.)
-
- ^q (To alert the TAC/Mini-TAC, the user types a
- control-q. It will not appear on the screen.)
- FOR OFFICIAL USE ONLY
- NIC 1-800-365-DNIC
- 29 TAC 114 #:20
- @o 192.112.36.5 (The TAC responds; the user opens a host
- connection by typing "@o" for open and entering
- the host address in dot notation format.)
- TAC Userid: NIC-GUEST
- Access Code: (The TAC prompts for Userid and Access Code, and
- the user enters the data. The Access Code does
- not echo.)
-
- DRAFT [Page 20] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
- TAC Login, continued...
-
- Login OK (The connection is opened and NIC displays
- information.)
- TCP Trying...Open
- * -- DDN Network Information Center --
- *
- * For TAC news, type: TACNEWS <return>
- * For user and host information, type: WHOIS <return>
- * For NIC information, type: NIC <return>
- *
- * For user assistance call (800) 365-3642 or (800) 365-DNIC or
- (703) 802-4535
- * Report system problems to ACTION@NIC.DDN.MIL
- NIC, SunOS Release 4.1.1 (NIC) #1:
- Thu Sep 26 11:18:20 1991 EST
- @. . .
- (User works on the host and logs off when finished.
- When disconnected from the host, user returns to the
- TAC command level.)
- @l
- Logged out (User types "@l" to log off the TAC/Mini-TAC and the
- TAC confirms.)
-
-
- When you enter your TAC Userid and Access Code, remember the following:
-
- * <Return> terminates each input line and causes the next prompt to
- appear.
-
- * It doesn't matter whether you type your TAC Userid and Access Code
- in uppercase or lowercase letter.
-
- * For security reasons, your Access Code input is either not echoed
- or it is obscured from view with strikeover characters.
-
- * If you make a mistake, try using the backspace key (^H) to delete a
- single character. Use ^U to delete an entire line. Although these
- commands do not work on every keyboard, they often do.
-
- * If you make a mistake while entering either your TAC Userid or Access
- Code, type ^C to abort the login process and return to the TAC command
- mode. Then try again.
-
- DRAFT [Page 21] DRAFT
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
- * Sometimes the TAC/Mini-TAC is unable to reach the requested host
- address. To tell the TAC/Mini-TAC to stop making connection attempts,
- issue a close command:
-
- @c <Return>
- Closed.
-
- * As long as you have an open connection to a host, you remain logged
- in to the TAC/Mini-TAC. If you close the connection to the host or
- the connection is shut down for any reason, you are given ten minutes
- to open another connection with no further login to the TAC/Mini-TAC.
- If you do not open another connection within ten minutes, the TAC
- attempts to hang up your connection and automatically log you out.
- To open another connection, simply type the "open" command again and
- supply another host address, as in the example below:
-
- @o 128.1.0.1 <Return>
-
-
- 4.2.3 Common TAC Login Problems
-
- This section covers only TAC login problems. Problems specific to the
- Mini-TAC will be covered in a future revision of this document.
-
- The TAC issues an error message when it does not receive the expected input.
- Some of the most common error messages are presented in this section, along
- with suggestions about what to do if you see one.
-
- The TAC sends two kinds of messages. The first deals with errors in the TAC
- login process; the second deals with difficulties in opening a connection to
- the destination host.
-
-
- 4.2.3.1 TAC Login Error Messages
-
- You may see one of the following error messages if you have problems logging
- in to a TAC. Each message is accompanied by a brief explanation of its cause
- and suggestions for further action.
-
-
-
-
- DRAFT [Page 22] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
- BAD LOGIN
- This message means that the combination of Userid and Access Code you
- entered is invalid. Examine your TAC Access Card carefully to be sure
- you are typing the correct characters and that you are not using any of
- the characters that are invalid in an Access Code. Note that Access
- Codes never contain a zero (0), a one (1), a Q (quebec), or a Z (zulu),
- since each of these characters may easily be mistaken for another. If
- your Access Code appears to contain one of these characters, it may be
- the letter O (oscar), the letter L (lima), the letter G (golf), or the
- number 2 (two).
-
- This message is also displayed if you are using an expired or invalid
- TAC card. If you are sure you are typing correctly and suspect you are
- using a bad card, contact the NIC at 1-800-365-DNIC, and we can
- determine the validity of your card.
-
-
- BAD
- This message means you typed a string that is not a valid TAC command,
- and the TAC does not understand your input. Either you typed something
- incorrectly or there was some interference on your connection.
- Frequently, simply repeating the command corrects the problem. However,
- if repeating your input causes another error message, check to make sure
- that you typed the correct command and that your input is in an
- acceptable format.
-
-
- NUM
- This message means that the TAC was expecting you to type a number, but
- you typed some other character. The message is displayed if you type
- the letter O (oscar) as part of the address of the host you are trying
- to connect to, or if you omit the numeric host address after typing @o
- (for open). Make sure that you are not typing letters in places you
- should be typing numbers; this will probably correct the problem.
-
-
- WAIT
- The TAC displays this message while it is attempting to validate your
- Userid and Access Code.
-
-
-
- DRAFT [Page 23] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
- NO CARRIER
- This message comes from your PC or modem. If this message is displayed
- on your initial attempt to dial the TAC/Mini-TAC, it means that the
- TAC/Mini-TAC did not answer the phone. This could be because of a power
- failure or other emergency at the site where the TAC/Mini-TAC is
- located, or it could be the result of a mis-dialed telephone number.
- Try calling the number with a telephone that is not connected to your
- terminal and see if your get a busy signal or other recording from the
- telephone company.
-
- If this message appears after you have logged in and while you are
- working on the host, it means that something happened to disconnect your
- modem from the TAC/Mini-TAC. Try dialing the TAC/Mini-TAC again. If
- the problem persists, contact your site systems representative to check
- your modem, or call the Monitoring Center for your area to check the
- TAC/Mini-TAC.
-
-
- 4.2.3.2 Host Connection Errors
-
- Host connection error messages are sent when you have successfully logged in
- to the TAC and while the TAC is trying to connect to the host you specified.
- You know that you have successfully logged in to the TAC when you see the
- "Login OK, TCP trying..." message.
-
-
- DESTINATION HOST DEAD
- This message means that the remote host is physically powered off or
- the cable to the network has been removed. The host is "down." Since
- host down-times are normally relatively short, wait a while and try to
- log in again. If the host remains unavailable, call the Host
- Administrator for the destination host and ask when the system will be
- available again. If you do not know the Host Administrator's phone
- number, the NIC can provide it or the name and number of the coordinator
- of the network the host is attached to.
-
-
-
-
-
-
-
- DRAFT [Page 24] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
- DESTINATION HOST UNREACHABLE
- DESTINATION NET UNREACHABLE
- HOST NOT RESPONDING
- Several network conditions can cause these messages. They may be
- displayed if the host or its PSN is down or if a gateway between the TAC
- and the host is down. Also, check to ensure that you specified the
- correct host address. Typing a nonexistent network address will cause
- such a message to be generated. If the condition persists, call the NIC
- for assistance.
-
-
- 4.2.4 Changing the TAC Intercept Character
-
- The "@" sign is the default TAC intercept character. The intercept character
- is the character that signals the TAC to interpret any character(s) that
- follow immediately as TAC commands rather than passing them through to the
- network.
-
- However, once you have connected to your host, you may want to send an @
- directly through to the network--for example, when you type a DDN mail
- address. To make the TAC pass the @ on to the host rather than intercepting
- it, you must type @ twice--i.e., @@. When you do this, the TAC intercepts the
- first "@", transmits the second "@" to the host, and echoes that one back to
- you. You will see @@@ on your screen. Remember, when you want to type an "@"
- for anything other than a TAC command, you must type it twice. For example,
- to send a message to auser@milhost, you would have to type
-
- auser@@milhost
-
- and on your screen you would see
-
- auser@@@milhost
-
- To change the TAC intercept character, you must type @i (for intercept)
- followed by the decimal value of the ASCII code of the character you wish to
- use in place of the @. The TAC Users' Guide contains a list of ASCII codes.
- For purposes of text file transfers, we recommend that you change the
- intercept to a non-printing character, such as a control character. For
- example, to change the intercept character to control-y (^y), type the
- following:
- @i 25 <Return>
-
- DRAFT [Page 25] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
- (Be sure to insert a space between the @i and the ASCII code number.) After
- you change the intercept character, you must use the new character for all
- subsequent TAC commands. To return to the default TAC intercept character
- (the "@" sign) after changing it to ^y, type the following:
-
- ^yi e <Return>
-
- where "i e" stands for intercept escape.
-
-
- 4.2.5 Using a TAC for File Transfer (FTP)
-
- This section presents several TAC command procedures that may facilitate file
- transfers through a TAC. The procedures covered here are
-
- * Changing the TAC intercept character,
- * Setting flow control on the TAC,
- * Putting the TAC into binary mode.
-
-
- 4.2.5.1 Changing the Intercept Character
-
- For executing file transfers, you may want to change the TAC intercept
- character to one that your file transfer program does not use. For example,
- the Kermit file transfer program uses the "@" (discussed in a subsequent
- section). To change the intercept character, follow the directions in Section
- 4.2.4 above.
-
-
- 4.2.5.2 Setting Flow Control on the TAC
-
- Setting flow control on the TAC ensures that data will not be transferred at a
- rate that causes the TAC buffers to overflow. The example below assumes that
- you have changed the TAC intercept character to ^y. (The ^y characters are
- shown in the examples, but they will not display on your screen as you type
- them on your keyboard.)
-
- ^yd c a <Return>
- ^yf i s <Return>
- ^yf o s <Return>
-
-
- DRAFT [Page 26] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
- where
- ^yd c a = device code ASCII, which clears any previously set
- flow control as well as any padding and parity.
- Flow control is incompatible with padding and parity.
-
- ^yf i s = flow control input start, which enables flow control
- so that the terminal sending data will not send it
- faster than the TAC can handle it.
-
- ^yf o s = flow control output start, which disables flow control
- from the TAC to the terminal.
-
-
- 4.2.5.3 Putting the TAC in Binary Mode
-
- To transfer binary files over the network, you must first put the TAC into
- binary mode. Doing so disables the TAC intercept character. You must disable
- the intercept character because if the TAC receives what it considers to be an
- intercept character--even though the character is embedded in a file--it
- interrupts the transfer process and tries to interpret whatever follows the
- intercept as a command.
-
- To put the TAC in binary mode, first open a connection to your host. After
- establishing the host connection, put the TAC in binary mode with the commands
- shown below. (Here again, the example assumes you have changed the intercept
- character to ^y.) The commands must be typed in the order shown, because if
- you start binary input before you initiate binary output, the TAC will ignore
- the "^yb o s command" and treat it simply as a character string to transmit
- over the network.
-
- ^yb o s <Return>
- ^yb i s <Return>
-
- where
-
- ^yb o s = binary output start, which enables 8-bit binary
- output mode from the TAC.
-
- ^yb i s = binary input start, which enables 8-bit binary
- input mode to the TAC.
-
-
- DRAFT [Page 27] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
- Logging out of your host returns the TAC to non-binary mode, re-enabling local
- control with @ commands. This is the only way to reset the TAC from binary to
- non-binary mode (short of hanging up or disconnecting from the TAC itself).
-
-
- 4.2.6 A Brief Word About Mini-TACs
-
- Mini-TACS are new and improved DDN access controllers similar to the TACs
- currently in use. As with the original TACs, Mini-TACs provide DDN access to
- network users who are geographically distant from their host computers. When
- a user dials a local or toll-free phone number and types the required series
- of commands, it opens a long-distance connection to the user's host computer.
-
- TACs support up to 63 asynchronous user ports. The smaller, more compact
- Mini-TAC can handle only 16 asynchronous terminal connections, but it has
- other capabilities (i.e., synchronous terminals, HFEP, etc.). Both TACs and
- Mini-TACs allow normally incompatible terminals and hosts to communicate with
- one another using the DDN as the go-between. While both types of access
- controllers serve similar roles, the Mini-TACs provide more advanced
- operational and security features.
-
- Like a TAC, the Mini-TAC returns error messages to its users if it cannot
- understand a command. Currently, from a user standpoint, the Mini-TACs and
- the TACs are essentially the same. If you notice any difference in behavior
- between TACs and Mini-TACs and you need assistance, call the MILNET Monitoring
- Center or the NIC. At present, some TAC commands can be abbreviated to one
- character. However, in the future, Mini-TAC commands may need to be at least
- two characters long to ensure that they are differentiated from other commands
- starting with the same letters.
-
-
-
-
-
-
-
-
-
-
-
-
-
- DRAFT [Page 28] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
- SECTION 5. NETWORK USE
-
-
- A computer attached to the DDN can reach a large community of users and access
- a wide variety of software. Research tools, documents, files, and mailing
- lists are all readily accessible through the DDN. This section describes the
- procedures for using these network tools, three of which are major network
- services: electronic mail (SMTP), file transfer (FTP), and remote login
- (TELNET). These services are integral to the DDN protocols and are offered by
- all hosts that have implemented the full set of network protocols.
-
- Although the functionality of the services discussed here is the same on every
- host, what the user sees may differ from host to host because software is
- often customized to suit the host operating system. For this reason, it is
- important to read local online and hard-copy documentation and to consult
- online help files for specific details on using these services on your host.
- Check with your local Host Administrator or site systems representative if you
- need more information. The sections below provide a generic description of
- how to use electronic mail, FTP, and TELNET.
-
-
- 5.1 Electronic Mail
-
- The DDN capability that is used more often than any other is electronic mail.
- Electronic mail lets users send messages to one another over the network.
- System programs accept and store mail messages from users on other hosts that
- are directed to local users. These programs automatically recognize the
- incoming traffic as electronic mail, translate it to a format compatible with
- the receiving mail program, and direct the messages to the correct recipients.
-
- Most users have an online mail file where all messages addressed to them are
- stored.
-
- You can print, read, or delete your mail using the local mail program.
- However, you should not edit or alter the structure of your mail file except
- through a mail program, as each message has unique characteristics that
- identify it as mail, such as a header, a character count, and a time stamp.
- Editing the mail file directly may alter these characteristics so that the
- mail program no longer recognizes the data as mail.
-
- Host computers usually provide one or more programs for reading and sending
- mail. Most mail programs provide you with the following capabilities:
-
- DRAFT [Page 29] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
- * Reading messages
-
- All mail programs have a command that allows you to read messages
- received over the network. Mail programs normally offer options
- for selecting and displaying specific messages from those received
- and stored in your mailbox.
-
-
- * Printing, deleting, or moving messages
-
- With your local mail program, you can print your messages (if a
- printer is available), move them into other (editable) files, or
- delete them. It is important that you learn how to delete or move
- messages after reading them; otherwise, your mail file may overflow
- and prevent additional mail from being delivered.
-
-
- * Sending messages
-
- You can send messages to other users on the same host or to anyone
- on the network that has a mail service. No passwords are required
- to send mail, but it is necessary to know the network mailbox, or
- address, of the person to whom you are sending mail. Network
- mailboxes usually take the form
-
- USERNAME@HOSTNAME.DOMAIN
-
- e.g., SMITH@NIC.DDN.MIL.
-
- Mail that is transmitted over the DDN normally requires a network address made
- up of a username and a hostname. Occasionally, you can omit the hostname.
- For example, if you are sending a message to a user on the same host as the
- one you are using (your local host), you need not include the hostname. This
- is similar to sending an interoffice memo, which rarely needs a full name and
- address to reach its destination. On the other hand, a message sent to "John
- Smith, U.S.A" has little chance of being delivered without more information.
- The same is true of electronic messages without a valid address. Any message
- with an incomplete or incorrect address is returned to the sender with an
- error message. If a mail message is undeliverable due to network or machine
- problems, most mail programs try to resend it several times before returning
- it to the sender.
-
- DRAFT [Page 30] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
- Many mail programs allow you to use a local text editor to revise or correct
- the text of the message you are preparing. The mail programs themselves
- usually have simple editing features that allow you to delete a character,
- word, or line, or to make simple corrections. An entire file may be sent as
- the text of a message, assuming the file is not too large. Many mailers
- outside the DDN truncate or discard messages that are longer than 50,000
- characters in size, envelope and header data included.
-
- Following are examples of some typical procedures for sending and reading
- mail, and for getting help within a network mail program. These are general
- scenarios; your host may run a different program or implementation than the
- ones shown. Only the bare essentials for using these mail programs are
- included here. We urge you to read the manuals for your mail system and to
- explore the online help facilities to expand your knowledge of what your
- implementation has to offer.
-
- In the examples that follow, note that the prompt character consistently
- indicates what operating system or program you are dealing with currently, and
- that the prompt character changes as you progress from one system/program to
- another.
-
-
- [NOTE: Computer names, user names, electronic addresses, and other
- data used in examples throughout this manual are not intended to
- represent currently valid input/output--i.e., some of the data may
- be "ficticious" but the format is accurate.]
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- DRAFT [Page 31] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
- 5.1.1 UNIX MAIL Examples
-
- Sending Mail Via UNIX
-
- [NOTE: UNIX is case-sensitive. Most UNIX systems require that
- commands be entered in lowercase.]
-
- % mail nic@nic.ddn.mil <Return> (User asks to send mail to a well-
- known mailbox. The percent sign (%)
- is a standard UNIX system prompt,
- while "mail" is the command that
- invokes the Mail program. User must
- insert a space before typing the
- message address on the same line.)
-
- Subject: How to get RFCs <Return>
- (The Mail program prompts for a
- subject, and the user supplies it.)
-
- How do I retrieve RFCs using the electronic mail utility?
- Thanks for your help. <Return>
- ^d (The user types the message text,
- ending with a control-d (^d) in the
- first character space of a line.)
-
- % (UNIX prompt returns.)
-
-
- Reading UNIX MAIL
-
- % mail <Return> (User invokes the Mail program at
- the UNIX prompt.)
-
- You have mail. (The Mail program announces that
- there is mail waiting in the user's
- mailbox and prints the headers of
- messages received since user last
- checked his mail.)
-
- New mail: 1) 16/Dec SMITH@ISI.EDU (292) Where is RFC 212?
- 2) 17/Dec JONES@NIC.DDN.MIL (145) Re: RFC 212
- 3) Etc...
-
- DRAFT [Page 32] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
- Reading UNIX Mail, continued...
-
-
- & p 1 <Return> (Mail prompt [&] is presented, and
- user asks the Mail program to print
- message 1 [p 1]. The full message
- text will be printed on the user's
- screen.)
-
-
- Getting Help for UNIX MAIL
-
- Typing
-
- man mail connects you to the online Mail manual from the UNIX
- prompt.
-
- help displays help for Mail users after program is invoked.
-
- ? displays a list of Mail commands after program is
- invoked.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- DRAFT [Page 33] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
- 5.1.2 InfoMail Examples
-
- Sending a Message Via InfoMail
-
- [NOTE: Since InfoMail runs under the UNIX operating system, and UNIX
- is case sensitive, InfoMail commands must normally be entered in
- lowercase.]
-
-
- DDN1-> infomail <Return> (User invokes the InfoMail program
- at his local system prompt.)
- InfoMail -- Version 0.3x
- Username: code123 <Return>
- Password: <no echo> <Return> (The InfoMail banner is displayed,
- and user is asked to log in with his
- mail username and password.)
-
- --> compose <Return> (At the InfoMail prompt, the user
- asks to create a message --
- "compose".)
- To: command@ddn2.dca.mil <Return>
- From: CODE123@DDN1.DCA.MIL (InfoMail prompts for address of
- recipient and automatically supplies
- user's address on "From" line.)
- Subject: Dial-ups <Return>
- Date: 12 July 1992 (InfoMail prompts for subject, and
- user enters the subject of the
- message. InfoMail automatically
- supplies the current date.)
-
- Text: Request dial-ups for our site. Usage demand is up.
- .
- (InfoMail prompts for text, and
- user enters, terminating the text
- with a carriage return, a period in
- the first space of the next line,
- and another carriage return.)
- --> quit <Return>
- DDN1-> (User types "quit" to exit from
- InfoMail. The local system prompt
- returns.)
-
- DRAFT [Page 34] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
- Reading Mail with InfoMail
-
- DDN2->infomail <Return> (User invokes the InfoMail program
- at his local system prompt.)
- InfoMail -- Version 0.3x
- Username: COMMAND <Return>
- Password: <no echo> <Return> (The InfoMail banner is displayed,
- and user is asked to log in with his
- mail username and password. These
- may be entered in either upper or
- lowercase. After a successful login,
- InfoMail notifies user of mail in
- his "Inbox.")
- INBOX.
- 1 FROM: CODEB999 / SUBJECT: DIAL-UPS / 13 Jul
- 2 FROM: AF@DDN.A / SUBJECT: SCHEDULE / 14 Jul
- --> next <Return>
- (At the InfoMail prompt, user issues
- a command to display the next
- message, and InfoMail does so.)
- To: COMMAND@DDN2.DCA.MIL
- From: CODE123@DDN1.DCA.MIL
- Subject: Dial-ups
- Date: 13 July 1992
- Text:
- Request dial-ups for our site. Usage demand is up.
-
- --------------------END OF DOCUMENT----------------------
- --> next <Return> (User types "next" to ask for the
- next message.)
- To: COMMAND@DDN2.DCA.MIL
- From: AF@DDN1.DCA.MIL
- Subject: SCHEDULE
- Date: 14 July 1992
- Text:
- What is the schedule for the next InfoMail demo?
-
- --------------------END OF DOCUMENT----------------------
- --> quit <Return> (User types "quit"to exit from the
- InfoMail program.)
-
-
- DRAFT [Page 35] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
- Getting Help for InfoMail
-
- Typing
-
- -->? Prints a list of all the commands that can be
- issued at this stage of the Mail procedure.
-
- --><commandname> ? Lists possible input for completing the
- specified command.
-
- -->describe <commandname> Tells what the specified command does and how
- to use it.
-
- -->example <commandname> Prints an example of the specified command.
-
- InfoMail manuals are available from
-
- BBN Communications Division
- 10 Moulton St., Cambridge, MA 02238
-
-
-
- 5.2 File Transfer Protocol (FTP)
-
- FTP is a protocol that enables you to move a file from one computer to another
- even if the computers have different operating systems and file storage
- formats. You can move data files, programs, text files, and/or anything that
- can be stored online.
-
- To use FTP, you must know the hostname or the host address of the remote host.
-
- You must also have an authorized username and password on the remote host
- system, and you must know the name of the file you want to retrieve from or
- send to that system. You can then copy files either to or from the remote
- system. Not every file, however, can be FTP'd. Only those files that have
- public "read access" (i.e., a file protection designation that permits
- transfers) can be transferred from one system to another.
-
- Some hosts provide the username "anonymous" for FTP file retrieval from their
- systems; this is called the "anonymous login convention." Any character
- string is accepted as a password for an anonymous login.
-
-
- DRAFT [Page 36] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
- An anonymous login account works only with FTP. It is not an account that can
- be accessed for general use. You cannot use the anonymous convention to send
- files to a remote host, as this requires a specific login account on that
- host; you may only use it to transfer files to your local workspace from a
- host on which you do not have a login account.
-
- These are the general steps used for a file transfer procedure:
-
- 1. Log in to your local host and invoke the FTP program.
-
- 2. Provide the hostname or host address for the remote system.
-
- 3. When you have successfully established a connection to the remote
- host, log in with your authorized username and password on that
- system.
-
- 4. Issue commands to send or retrieve files.
-
- 5. When you are finished, log off the remote host and exit from the
- FTP program.
-
- Depending on the FTP implementations on your host and on the remote host, it
- may be possible to display a directory listing of the public files on the
- remote host and to request remote system status information.
-
- As you will see from the examples, when you transfer a file with FTP, messages
- regarding the status of the action you have requested are displayed throughout
- the process. The FTP server on the remote host sends the File Transfer
- messages. These messages have the following characteristics:
-
- * Every FTP command generates at least one reply.
-
- * A reply consists of a three-digit return code, followed by a line of
- text describing the response.
-
- * If a single line of text accompanies the return code, a single space
- separates the code from the text.
-
- * If more than one line accompanies the return code, a hyphen (-)
- separates the code from the text.
-
-
- DRAFT [Page 37] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
- During a File Transfer session, you enter a command and then wait for a
- message indicating whether the command was accepted. Further system messages
- describe the outcome of any transfer you may request.
-
- The text that accompanies the FTP return codes may differ slightly from server
- to server, but the general meaning of the numeric codes remains constant.
-
- Programs based on the FTP protocol vary a great deal in implementation
- details. The examples provided here should be taken only as guidelines.
- Consult your local system representatives for assistance with the FTP
- implementation on your host.
-
- Before you begin a File Transfer session, it is best to become familiar with
- the general command sequence.
-
- An example of an FTP session conducted between two UNIX systems appears on the
- next page. In the example, a user carries out several standard FTP
- procedures, such as asking for a directory listing of the public files on the
- remote system and then changing to another directory. Remember that the
- commands to accomplish these tasks may vary from host to host, and not all
- host FTP servers implement all commands.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- DRAFT [Page 38] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
- 5.2.1 Transferring a File on a UNIX System
-
- In the following example, both hosts are running UNIX.
-
- abacus-1>ftp fs3.nisc.nic.com <Return>
- Connected to FS3.NISC.NIC.COM (User invokes the FTP program at his
- local system prompt, and the remote
- FTP server responds by displaying
- its banner and requesting a login,
- as shown below.)
-
- 220 fs3 FTP server (NIC Version x.xx ... Wed July 17 16:20:33 EDT) ready.
- Name (fs3.nisc.nic.com:barbv): anonymous <Return>
- 331 Guest login ok, send ident as password.
- Password: guest <Return> (no echo)
- 230 Guest login ok, access restrictions apply.
- ftp>ls <Return>
- 200 PORT command successful.
- 150 Opening ASCII mode data connection for file list.
- etc
- pub
- netinfo
- INDEX
- ls-lR
- 226 Transfer complete.
- 47 bytes received in 0.02secs (2.3 Kbytes/sec)
- (After successfully logging in as
- "anonymous guest," the user asks for
- a directory listing of public files
- at the FTP prompt. FTP responds,
- printing messages regarding the
- transfer.)
- ftp>cd netinfo <Return>
- 250 CWD command successful.
- ftp>ls <Return>
- 200 PORT command successful. (At the FTP prompt, user issues a
- command to change to the netinfo
- directory, then asks for a listing
- of files in the new working
- directory--netinfo.)
-
- DRAFT [Page 39] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
- UNIX File Transfer, continued...
-
-
- 150 Opening ASCII mode data connection for file list.
- interest-groups
- domains
- nsfnet.policy
- 226 Transfer complete.
- 125 bytes received in 0.04. seconds (3.1 Kbytes/s)
- ftp>get nsfnet.policy <Return> (User asks for a transfer of the
- specified file to his own file
- system. Since he does not specify
- a new filename, the file retains the
- same name on the local system.)
- 200 PORT command successful.
- 150 Opening ASCII mode data connection for nsfnet.policy (2790 bytes).
- 226 Transfer complete.
- local: nsfnet.policy remote: nsfnet.policy
- 2847 bytes received in 0.12 seconds (23 Kbytes/s)
- ftp> bye <Return>
- ftp> Goodbye.
- abacus-2> (User types "bye"to exit from the
- FTP program. The local system
- prompt is displayed again.)
-
-
- 5.2.2 How to FTP a Directory Listing
-
- The example that follows demonstrates how to retrieve a list of file names
- from a public directory. (Not all hosts provide this feature; check with the
- online help system or your local user support representative.) In the
- example, the user is logged on to a host running the UNIX operating system.
- He uses FTP to connect to the host NIC.DDN.MIL, then logs in under username
- "anonymous" and password "guest." He enters the "dir" (directory) command for
- the directory "RFC" to see the names of accessible files. (Because the actual
- directory list is long, only the first few files and the last file are shown
- in the example.)
-
-
-
-
-
- DRAFT [Page 40] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
- After the directory listing is displayed, the user can copy a file or files
- from the remote host directory, but this procedure is not included in the
- example. He issues the FTP "quit" command to exit from the FTP program and
- close the connection to the remote host, which returns him to the local host
- operating system.
-
- % ftp <Return>
-
- FTP> nic.ddn.mil <Return>
-
- Assuming 36-bit connections, paged transfers)
- <NIC.DDN.MIL FTP Server Process...
-
- FTP> login anonymous <Return>
-
- Password: guest <Return>
-
- User ANONYMOUS logged in at Wed 7-Aug-91 14:14 EDT, job 31.
- FTP> dir rfc <Return>
-
- <List started.
- PS:<RFC>
- rfc-index.TXT.114
- rfc189.TXT.1
- rfc407.TXT.1
- .
- .
- .
- rfc931.TXT.1
- 226 Transfer complete.
- 47 bytes received in 0.02secs (2.3 Kbytes/sec)
- FTP> quit <Return>
- QUIT command received. Goodbye.
-
- %
-
-
-
-
-
-
-
- DRAFT [Page 41] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
- 5.3 Using TELNET
-
- Another valuable way to use the network is offered by the TELNET utility,
- which allows you to log in to a remote host from a local host (assuming that
- you have an authorized account on the remote host). Once you have established
- a TELNET connection and logged into the remote host, you can enter data, run
- programs, and otherwise operate just as though you were logged in directly.
- During a TELNET session, each transition to a different interactive program
- causes a shift to a different command level. With each level, the form of the
- prompt varies. Command formats also vary with each level. You can often tell
- which system/program you are using by the prompt symbol. The steps for
- running TELNET are very briefly summarized as follows:
-
- * Log in to your local host.
-
- * Invoke the TELNET program from that host.
-
- * Identify by hostname or host address the remote host that you want
- access to.
-
- * When the TELNET connection is established, log in to the remote host
- with the username and password that have been assigned to you on that
- host.
-
- * Perform whatever tasks you like on the remote machine, being careful
- not to violate any remote operating system rules.
-
- * When finished working on the remote host, type the remote logout
- command. Then close the TELNET connection if it is not automatically
- closed on logout.
-
- * You are once again operating in your local host system environment.
-
- TELNET has other advanced features too numerous to discuss here. Check you
- local TELNET user program for online documentation, or talk to your local Host
- Administrator or user support representative for more information.
-
-
- 5.3.1 Invoking TELNET with the Hostname on the Command Line
-
- In the following example, a user TELNETs from a local UNIX host to a remote
- SunOS host. Once the connection has been established, the prompts, commands,
-
- DRAFT [Page 42] DRAFT
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
- and responses are those of the SunOS environment. To the user, it appears as
- though he/she were directly logged in to the SunOS computer.
-
- After the user is done working on the remote host, he issues the SunOS logout
- command. This logout automatically returns him to the TELNET program on the
- local host, closes the TELNET session, and returns the local operating system
- prompt (%).
-
- Note that instead of invoking the TELNET program and then issuing an "open"
- command to the remote host at a TELNET prompt, the user supplies the remote
- host address directly on the program invocation line. (Not all
- implementations recognize this form of connection.) In addition, note that
- the user would need an authorized account on the NIC host to log in with
- username and password as shown in the example.
-
- % telnet nic.ddn.mil <Return> (User issues the telnet command,
- giving the remote hostname as an
- argument on the command line.)
- trying...
- connected to nic.ddn.mil
- escape character is '^]'
-
- NIC.DDN.MIL, SunOS UNIX (nic) (TELNET prints messages during
- connection establishment, affirms
- the connection, and notifies the
- user of the escape character [see
- discussion of escape charaters in
- Chapter 4]. The Sun host prints its
- banner and prompt--@.)
- @ login <userid> <Return>
- Password: <Return> (User enters his remote system
- userid and password. The password
- does not echo on screen.)
- ...USER SESSION...
-
- @ logout <Return> (After completing his work on the
- SunOS host, user issues a logout
- command to exit from the remote
- system. The connection is closed
- automatically and the local prompt
- reappears.)
- Connection closed by remote host.
- %
-
- DRAFT [Page 43] DRAFT
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
- 5.3.2 TELNET Using Host Address
-
- Instead of invoking TELNET and specifying a hostname for the remote host, you
- may specify the remote address in dot notation format. Some hosts require the
- network address to be enclosed in brackets if it is supplied on the command
- line. (Many TELNET implementations prompt for a network hostname or address if
- you do not specify one, and they may allow you to open the connection after
- asking for help or issuing other TELNET commands.) To establish a TELNET
- connection using a host address, proceed as shown in the example below. The
- example presumes a user on a UNIX host connecting to the NIC's SunOS system
- via TELNET. After reaching the NIC host, the user looks up a name with the
- WHOIS program, exits from WHOIS, and then closes the connection. (Note the
- change from UNIX prompt symbol to the NIC prompt and back again.)
-
- % telnet 192.112.36.5 <Return>
- Trying 192.112.36.5 ...
- Connected to nic.ddn.mil.
- Escape character is '^]'.
-
- SunOS UNIX (nic)
-
- -- DDN Network Information Center --
- *
- * For TAC news, type: TACNEWS <return>
- * For user and host information, type: WHOIS <return>
- * For NIC information, type: NIC <return>
- *
- * For user assistance call (800) 365-3642 or (800) 365-DNIC or
- (703) 802-4535
- * Report system problems to ACTION@NIC.DDN.MIL
-
- NIC, SunOS Release 4.1.1 (NIC) #1:
- Thu Sep 26 11:18:20 1991 EST
- @ whois varallob <Return>
- Connecting to id Database . . . . . .
- Connected to id Database
- Varallo, Barbara (BV36) varallob@NIC.DDN.MIL
- Network Solutions, Inc.
- 505 Huntmar Park Drive
- Herndon, VA 22070
- (703) 802-8461
- Record last updated on 08-Aug-91.
-
- DRAFT [Page 44] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
- TELNET from UNIX to NIC, continued...
-
- Enter a handle, name, mailbox, or other field, optionally preceded
- by a keyword, like "host nic". Type "?" for short, 2-page
- details, "HELP" for full documentation, or hit RETURN to exit.
- ---> Do ^E to show search progress, ^G to abort a search or output <---
- Whois: <Return>
- @ logout <Return>
-
- Thu Sep 26 11:19:28 1991 EST
- Connection closed by foreign host.
- %
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- DRAFT [Page 45] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
-
- SECTION 6. DDN NETWORK INFORMATION CENTER (NIC)
-
-
- The DDN Network Information Center (NIC) is located at the DDN Installation
- and Integration Support (DIIS) program office in Chantilly, Virginia. The NIC
- is funded by the Defense Information Systems Agency (DISA), Defense Network
- Systems Organization (DNSO). The NIC is responsible for providing general
- reference services to DDN users via telephone, electronic mail, and U.S. mail.
-
- The NIC also provides databases and information services of interest to
- network users, including the WHOIS registry of network users, the NIC/Query
- browsing system, TACNEWS, and the official DoD Host Name Service. The NIC
- maintains the RFC (Request for Comments) collection. Many of the online files
- are available through the NIC's automatic mail service, SERVICE@NIC.DDN.MIL.
-
- Among its other duties, the NIC
-
- * registers hosts and domains,
- * assigns IP network numbers and Autonomous System Numbers (ASNs),
- * provides hostname translation tables and domain name system server
- files to the DDN and the Internet,
- * registers network users,
- * issues MILNET TAC Access Cards.
-
- These services are described in more detail in the "Current DDN NIC Services"
- booklet.
-
-
- 6.1 Contacting the NIC
-
- 6.1.1 NIC User Assistance Help Desk
-
- The NIC provides user assistance in a number of ways. Our main Help Desk
- phone numbers are
-
- 1-800-365-DNIC (within the continental United States)
- 1-703-802-4535 (outside the continental United States and in the
- Washington, D.C. metropolitan area)
-
- 1-703-802-8376 FAX Number
-
-
- DRAFT [Page 46] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
- The first number is toll free, while the area code 703 numbers are toll free
- in the Washington area only.
-
- The NIC provides Help Desk assistance to those who experience problems with
- using the network in general, and with terminal-to-TAC use in particular.
- Should you have a security problem or concern, the NIC can connect you with
- the Security Coordination Center. In addition, the NIC is happy to answer
- questions about any other service outlined in this section. The NIC Help Desk
- services are available from 7 a.m. to 7 p.m. (EST or EDT), Monday through
- Friday.
-
-
- 6.1.2 NIC Host
-
- The NIC computer's hostname and network address are
-
- NIC.DDN.MIL
- 192.112.36.5
-
- NIC online services are available 24 hours a day, 7 days a week.
-
-
- 6.1.3 NIC Online Contacts
-
- The NIC supports several online mailboxes to provide assistance in specific
- areas. This list is provided here for easy reference. The following sections
- provide more detailed information regarding the type of inquiries each mailbox
- handles.
-
- Type of Inquiry Network Mailbox
-
- General User Assistance NIC@NIC.DDN.MIL
- TAC and Non-TAC User Registration REGISTRAR@NIC.DDN.MIL
- Urgent Security Matters NIC-ALERT@NIC.DDN.MIL
- Host, Domain, and Net Registration HOSTMASTER@NIC.DDN.MIL
- NIC.DDN.MIL Computer Operations ACTION@NIC.DDN.MIL
- Comments on NIC Publications, Services SUGGESTIONS@NIC.DDN.MIL
- Security Concerns and Questions SCC@NIC.DDN.MIL
- Usage-Sensitive Billing Questions BILLING@NIC.DDN.MIL
- Automatic Mail Service SERVICE@NIC.DDN.MIL
- Reporting NIC Software Bugs BUG-SERVICE@NIC.DDN.MIL
-
- DRAFT [Page 47] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
- 6.1.4 NIC U.S. Mail Address
-
- The current mailing address of the NIC is
-
- Network Information Center
- 14200 Park Meadow Drive, Suite 200
- Chantilly, VA 22021
-
-
- 6.2 NIC Services
-
- In addition to the user assistance Help Desk described in Section 6.1.1, the
- NIC provides registration, billing, and security support services.
-
-
- 6.2.1 Network and User Registration Services
-
- The NIC registers the following network entities:
-
- * domains
- * IP network numbers
- * inverse addressing data
- * Autonomous System Numbers (ASNs)
- * hosts
- * TACs/Mini-TACs
- * gateways and PSNs
- * some network-related organizations.
-
- MILNET host, TAC, gateway, and PSN registrations are coordinated with the
- MILNET Manager. If you wish to register an IP network, domain, or ASN,
- contact the NIC Help Desk for information regarding procedures. New users
- seldom need to register these entities.
-
- Each individual who has TAC access to the DDN must be registered in the NIC
- WHOIS database. Host Administrators register individuals in the database as
- part of the process of authorizing TAC cards for them. However, any
- individual with a working Internet electronic mail address can be registered
- in the database. You will find it useful to be registered in this database
- because it serves as an electronic white pages for DDN users.
-
-
-
- DRAFT [Page 48] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
- To be registered in the NIC WHOIS database, you will need to fill out a copy
- of the NIC registration template (Figure 6-1 below) and send it to the network
- mailbox REGISTRAR@NIC.DDN.MIL. You may obtain this template via file transfer
- (FTP) from the NIC.DDN.MIL machine (192.112.36.5 is the numeric host address)
- using the pathname
-
- NETINFO/USER-TEMPLATE.TXT
-
- or you may enter the required information yourself. In addition to the
- template, this file contains detailed instructions and samples to help with
- completing the form. (Instructions for using FTP to copy/retrieve a file are
- presented in Section 5.1.2, or you may consult your local FTP documentation.)
-
-
- FULL NAME: Jones, James J. Last name, first name, middle initials
- (no titles)
- U.S. MAIL ADDRESS: NIC
- Room 38C, Suite 200
- 14200 Park Meadow Drive
- Chantilly, VA 22021 Complete address, including codes, mail
- stops, etc.
-
- PHONE: (703) 802-4535 Give both commercial and DSN, if
- available, e.g., (DSN) 123-4567
-
- AUTHORIZING HOST: NIC.DDN.MIL Host address of host on which you have
- your primary login account.
-
- PRIMARY LOGIN NAME: jjjones Name you log in with (username)
-
- PRIMARY NETWORK MAILBOX:
- jjjones@NIC.DDN.MIL Network mailbox where your mail is
- normally delivered.
-
-
- Figure 6-1. User Registration Template
-
-
-
-
-
-
- DRAFT [Page 49] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
- 6.2.2 Usage-Sensitive Billing Service Desk
-
- Since the advent of usage-sensitive billing on the DDN, the NIC has provided a
- service to answer queries about bills charging for use of the DDN. This
- support is aimed at those POCs who receive bills and have questions about
- them. If you have a bill for DDN usage and have any questions about it, you
- can contact the NIC Help Desk as described in Section 6.1.1 or send a message
- to BILLING@NIC.DDN.MIL.
-
-
- 6.2.3 Security Coordination Center (SCC)
-
- The NIC is the site of the DDN Security Coordination Center (SCC). The SCC
- acts in conjunction with the DDN Network Security Officer (NSO) to coordinate
- actions related to security incidents and network vulnerabilities. The SCC
- relays security-related information to the Network Security Officer (NSO) and
- works with him/her in handling network security problems. In addition, the
- SCC issues DDN Security Bulletins to network users. You can contact the SCC
- in the following ways:
-
- By Electronic Mail: SCC@NIC.DDN.MIL
-
- By Phone: 1-800-365-DNIC (continental U.S.)
- 1-703-802-4535 (outside U.S. and in the
- D.C. metro area)
- By FAX: 1-703-802-8376
-
- By U.S. Mail: Network Information Center/SCC
- 14200 Park Meadow Drive, Suite 200
- Chantilly, VA 22021
-
- Phone hours are from 7 a.m. to 7 p.m., Eastern Standard or Eastern Daylight
- Time.
-
-
- 6.3 NIC User Programs
-
- The NIC offers several online programs that DDN users may access to retrieve
- various kinds of information. The WHOIS, TACNEWS, NIC/Query, and SERVICE
- programs and their access procedures are described in this section. The NIC's
- Kermit server is also described.
-
- DRAFT [Page 50] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
- 6.3.1 WHOIS/NICNAME
-
- WHOIS/NICNAME is the NIC program that looks up information in an electronic
- "white pages" directory of network users. You can also obtain information on
- hosts, TACs, domains, and other network entities from WHOIS. WHOIS lists the
- name, network mailbox, U.S. mail address, telephone number, and host for each
- user registered in its database. For other entities, it provides such
- information as the domain name, a list of domain servers, domain contacts,
- network numbers, network contacts, known hosts on a given network, Host
- Administrators, Node Site Coordinators, and phone numbers and network mailbox
- addresses for all contacts.
-
-
- 6.3.1.1 Accessing WHOIS
-
- Here are some instructions for accessing the WHOIS program from different
- points of origin:
-
- From a TAC
-
- * Type @n.
-
- * After being greeted by the TAC banner, press <Return> and enter
- your TAC userid and TAC Access Code when prompted.
-
- * After the NIC host banner and greeting are displayed, type WHOIS
- <Return>.
-
-
- From a DDN Host
-
- * Log onto your local host and TELNET to the NIC, e.g.,
-
- telnet nic.ddn.mil <Return>
-
- or
-
- telnet 192.112.36.5 <Return>
-
- * After the NIC host banner and greeting is displayed, type WHOIS
- <Return>.
-
- DRAFT [Page 51] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
- Via Electronic Mail
-
- * From your login host, invoke the mail program and send a message to
-
- SERVICE@NIC.DDN.MIL
-
- * As the subject of the message (i.e., on the "Subject:" line), enter
- WHOIS and the string you want the program to search on--e.g.,
-
- Subject: whois nic.ddn.mil
-
- Any valid WHOIS search input string can be sent to the SERVICE
- program. However, if the response is large, it will be split into
- several return messages. If it is very, very large, it may exceed
- the capacity of the Mail server, but most search outputs are well
- within its limits.
-
- You may also run the WHOIS/NICNAME program from a local host if you have one
- of the several WHOIS/NICNAME user programs that are available for various
- operating systems. Contact the NIC if you are interested in obtaining such a
- program.
-
-
- 6.3.1.2 Using WHOIS
-
- To use WHOIS, you can supply either the name or the NIC "handle" of the person
- or entity you are trying to identify. The handle is a unique identifier that
- the NIC assigns to each entity registered in its database. Partial searches
- on the first part of a name are also possible.
-
- The WHOIS program accessible on the NIC host also recognizes certain keywords.
-
- These keywords are inserted in the search string before the entity for which
- you want information. They tell WHOIS to limit its search to certain kinds of
- records--such as host records only, or domain records only. Such keywords can
- increase the speed of a search. Some of the keywords that the NIC host's
- WHOIS program recognizes are as follows:
-
- DOM for domain records
- GA for gateway records
- HO for host records
- NET for network records
- PSN for PSN records
- TAC for TAC records.
-
- DRAFT [Page 52] DRAFT
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
- WHOIS is not case sensitive. Some of the examples that follow use keywords
- and some do not. Those that do use keywords assume that you have used TELNET
- to connect to the NIC.DDN.MIL for access to their WHOIS program. For a
- complete list of keywords and examples of how to use them, simply type help or
- a question mark (?) at the WHOIS prompt, e.g.,
-
- Whois: help <Return>
-
- WHOIS responds to your query in one of three ways:
-
- 1. If WHOIS finds a unique record for the individual/entity you have
- identified as the subject of the search, it immediately displays
- the following information:
-
- * the name
- * the NIC handle
- * the organization (if applicable)
- * the mailing address
- * the phone number
- * the network mailbox.
-
- 2. If WHOIS finds several records that match the search input, it
- displays a brief list of the matching entries and asks you to choose
- the correct match by using the handle (a unique character string in
- parentheses following the name). A search by handle produces the
- expanded output for the matching entity.
-
- 3. If no record matches the search input, WHOIS displays the message
- "No match for <username>," where username is the search string
- entered.
-
- The following examples illustrate some of the WHOIS capabilities. For more
- information on using WHOIS, connect to the NIC host and type "whois help".
-
-
- 6.3.1.3 WHOIS Search Examples
-
- [NOTE: The names, addresses, phone numbers, and other information
- shown in the following examples are meant to be representative only;
- they are not necessarily actual or accurate data and should not be
- used for contacting any of the entities/persons so identified!]
-
- DRAFT [Page 53] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
- WHOIS Search by Name
-
- SunOS UNIX (nic)
-
- -- DDN Network Information Center --
- *
- * For TAC news, type: TACNEWS <return>
- * For user and host information, type: WHOIS <return>
- * For NIC information, type: NIC <return>
- *
- * For user assistance call (800) 365-3642 or (800) 365-DNIC or
- (703) 802-4535
- * Report system problems to ACTION@NIC.DDN.MIL
-
- NIC, SunOS Release 4.1.1 (NIC) #1:
- Thu Sep 26 14:11:08 1991 EST
- @ whois roscoe <Return> (There is only one "Roscoe," so a
- complete entry is displayed for him.)
- Connecting to id Database . . . . . .
- Connected to id Database
-
- ROSCOE, Joe A. (JAR) JROSCOE@HOST-1.DOMAIN.MIL
- Air Force Data Systems
- Design Center/SDTS
- Willits Air Force Base, W. Va. 12345
- Phone: (123) 456-7890
- MILNET TAC User
-
- Record last updated on 31-Oct-90
-
-
-
-
-
-
-
-
-
-
-
-
-
- DRAFT [Page 54] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
- WHOIS Search by Partial Name
-
- You may search using only a partial name as the search string by entering the
- partial name followed by one to three dots (...). This search feature will
- work only if the dots follow the partial name without any intervening spaces.
- This kind of search is apt to produce multiple "hits" (hits are entries that
- match a given search string).
-
- Note that the partial name search also finds any NIC handles that begin with
- the partial name input ("ros" in the example below).
-
- @ whois ros... <Return>
-
- Rosati, David (DR16) Rosati@BAR.FOO (234) 567-8901
- Rosales, Alphonso L. (ALR) Rosales@NIC.DDN.MIL (345) 678-9012
- Roscoe, Joe A. (JAR) Roscoe@HOST-1.DOMAIN.MIL (123) 456-7890
- .
- .
- .
- Schuman, Richard O. (ROS) Schuman@FOO.BOO.Com (456) 789-0123
-
- There are 25 more entries. Show them?
-
-
- To obtain all the information pertaining to any of the names identified by the
- search, do a WHOIS search on the handle (the text in parentheses immediately
- following the name); this will produce a full entry.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- DRAFT [Page 55] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
- WHOIS Search by Handle
-
- If a WHOIS search produces multiple hits on your query, search by the unique
- handle to get the full entry of the hit you want to display. Precede the
- handle with an exclamation point. Users on hosts running a UNIX operating
- system may need to precede the exclamation point with a backslash (\).
-
- @ whois !jar (Jar is the handle for ROSCOE.)
-
- ROSCOE, Joe A. (JAR) JROSCOE@HOST-1.DOMAIN.MIL
- Air Force Data Systems
- Design Center/SDTS
- Willits Air Force Base, W. Va. 12345
- Phone: (123) 456-7890
- MILNET TAC User
-
- Record last updated on 31-Oct-90
-
-
-
- WHOIS Search by Hostname
-
- If you know a hostname and need to obtain the host address, you may use WHOIS
- to look it up by typing your input as shown in the following example:
-
-
- NIC, SunOS Release 4.1.1 (NIC) #1:
- Thu Sep 26 14:11:08 1991 EST
- @ whois ddn-conus.ddn.mil <Return> (User enters known host-
- Connecting to id Database . . . . . . name after connecting to
- Connected to id Database the NIC host and types a
- ^E 14:13:03 -- No matches yet in 0 searches. ^E to see how the search
- is progressing.)
- BBN INC. (DDN1)
- 1300 North 17th Street
- Arlington, VA 22209
-
- Hostname: DDN-CONUS.DDN.MIL
- Nicknames: DDN1.DCA.MIL,DDN.DCA.MIL
- Address: 26.21.0.17
- System: BBN-C/70 running UNIX
-
- DRAFT [Page 56] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
- WHOIS Search by Hostname, continued...
-
-
- Host Administrator:
- Bolden, Michelle L. (Shelly) (MLS6) Bolden@BBN.COM
- (703) 284-4600
-
- Record last updated on 05-Sep-91.
-
- Would you like to see the registered users of this host? y <Return>
-
- There are 202 registered users:
-
- Adams, Quentin (QAA1) nsc-robins@DDN-CONUS.DDN.MIL
- (912) 926-6912 (DSN) 468-6912
- Agney, Violet (VA24) NSCElmen@DDN-CONUS.DDN.MIL
- (907) 552-4919 (DSN) 317-552-4919
- Agnor, Robert J. (RJA25) NAVTELCOM@DDN-CONUS.DDN.MIL
- (202) 282-0824 (DSN) 292-0824
- Atkinson, Barry K. (BKA) DIA-RSE@DDN-CONUS.DDN.MIL
- (703) 284-0801 (DSN) 251-0801
- Bailey, Erich (EB68) NSC-Presidio@DDN-CONUS.DDN.MIL
- (415) 561-2241 (DSN) 586-2241
- There are 197 more matches. Show them? n <Return>
- Enter a handle, name, mailbox, or other field, optionally preceded
- by a keyword, like "host sri-nic". Type "?" for short, 2-page
- details, "HELP" for full documentation, or hit RETURN to exit.
- ---> Do ^E to show search progress, ^G to abort a search or output <---
-
-
-
- Note that this search produces the hostname, the host address, and the name
- and phone number of the Host Administrator. Pressing <Return> will produce a
- list of the people registered with the NIC as users of that host. You will
- find the same information if you know the host address or nickname and search
- on one of those instead of the official hostname.
-
-
-
-
-
-
- DRAFT [Page 57] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
- WHOIS Search by TAC Name
-
- You may use WHOIS to obtain a TAC telephone number if you know the name of the
- TAC. A search by TAC name will also show contact information on the Node Site
- Coordinator for the TAC. Follow the example below to do this type of search.
-
-
- Enter a handle, name, mailbox, or other field, optionally preceded
- by a keyword, like "host sri-nic". Type "?" for short, 2-page
- details, "HELP" for full documentation, or hit RETURN to exit.
- ---> Do ^E to show search progress, ^G to abort a search or output <---
-
- Whois: tac belvoir.mt.ddn.mil <Return>
- Fort Belvoir (BELVOIR-MIL-TAC)
- Army Information Systems Command (USAISC)
- Building 246, Room 202, 2nd Floor
- Fairfax, VA 22060
-
- (703) 781-0050 (R8) [300/1200 bps] {B}
- (703) 781-0100 (R8) [300/1200 bps] {B}
-
- Hostname: BELVOIR.MT.DDN.MIL
- Address: 26.0.0.142
- TAC number: 162
- Hardware: C/30
-
- Coordinator:
- Jewell, Brenda K. (BJ53) NSCBelvoir@DDN-CONUS.DDN.MIL
- (703) 664-3458 (DSN) 354-3458
-
- Record last updated on 22-Jun-90.
-
-
-
-
-
-
-
-
-
-
-
- DRAFT [Page 58] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
- WHOIS Search by PSN Number
-
- You may use WHOIS to search by node (PSN) number. The output from this search
- will show the usual POC information as well as a list of the hosts connected
- to that node that are registered with the NIC.
-
- Whois: psn 202 <Return>
- GSI (CHANTILLY2-IMP)
- 14200 Park Meadow Drive
- Chantilly, VA 22021
-
- CHANTILLY2 is PSN/IMP 202 on network 26
-
- Coordinator:
- Zalubski, John (JZ7) zalubskij@NIC.DDN.MIL
- (703) 802-8462
-
- Record last updated on 04-Sep-91.
-
- No hosts found on this PSN.
-
-
- Whois: psn 201 <Return>
- GSI (CHANTILLY-IMP)
- 14200 Park Meadow Drive
- Chantilly, VA 22021
-
- CHANTILLY is PSN/IMP 201 on network 26
-
- Coordinator:
- Zalubski, John (JZ7) zalubskij@NIC.DDN.MIL
- (703) 802-8462
-
- Record last updated on 04-Sep-91.
-
- Hosts on this PSN:
-
- CHANTILLY1.MT.DDN.MIL 26.0.0.201
- NIC1.DDN.MIL 26.1.0.201
- SUN1.DDN.MIL 26.24.0.201
- GSI-GW1.DDN.MIL 26.25.0.201, 192.112.36.1,
- 192.112.37.1, 192.112.38.1
-
- DRAFT [Page 59] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
- WHOIS Search by Network Number
-
- You may use WHOIS to search by network number. To search for information
- about a Class C network, make sure the last octet in the network number is
- zero. To search for a Class B network, make sure that the last two octets are
- zero. See section 8.4 for a discussion of network addresses and classes.
-
-
- Whois: 192.112.36.0 <Return>
- Government Systems, Inc. (NET-LOCALNET)
- 14200 Park Meadow Drive, Suite 200
- Chantilly, VA 22020
-
- Netname: LOCALNET
- Netnumber: 192.112.36.0
-
- Coordinator:
- McCollum, Robert (RM584) bobm@NIC.DDN.MIL
- (703) 802-8476
-
- Domain System inverse mapping provided by:
-
- NIC.DDN.MIL 192.112.36.5
- NIC-DEV.DDN.MIL 192.112.38.89
-
- Record last updated on 14-Aug-91.
-
- Would you like to see the known hosts on this network? y <Return>
-
- There are 2 known hosts:
-
- NIC.DDN.MIL 192.112.36.5
- GSI-GW1.DDN.MIL 26.25.0.201, 192.112.36.1,
- 192.112.37.1, 192.112.38.1
-
-
-
- The user can enter "y" for yes or simply press <Return> to see a list of hosts
- registered with the NIC as part of this network.
-
-
-
- DRAFT [Page 60] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
- WHOIS Search by Domain Name
-
-
- Whois: dom dca.mil <Return>
- Defense Information Systems Agency (DCA-DOM)
-
- Domain Name: DCA.MIL
-
- Administrative Contact, Technical Contact, Zone Contact:
- Hostmaster (HOSTMASTER) HOSTMASTER@NIC.DDN.MIL
- (800) 365-DNIC (703) 802-4535
-
- Record last updated on 18-Sep-91.
-
- Domain servers in listed order:
-
- NS.NIC.DDN.MIL 192.67.67.53
- A.ISI.EDU 26.3.0.103, 128.9.0.107
- C.NYSER.NET 192.33.4.12
- TERP.UMD.EDU 128.8.10.90
- NS.NASA.GOV 128.102.16.10, 192.52.195.10
- AOS.BRL.MIL 192.5.25.82
-
- Would you like to see the known hosts under this secondary domain? y
-
- There are 60 known hosts:
-
- ANTARES.DCA.MIL 128.19.0.14
- BELLATRIX.DCA.MIL 128.19.0.5
- C4SD.DCA.MIL 26.8.0.76
- CMMC-BBN.DCA.MIL 26.18.0.70
- CMMC-IMW.DCA.MIL 26.29.0.76
- There are 55 more matches. Show them? n <Return>
- Whois:
-
-
- As you can see, domain searches allow you to identify the hosts providing name
- service for the domain, as well as the names and phone numbers of the
- administrative and technical contacts for the domain (in this case, the NIC
- Hostmaster group).
-
-
- DRAFT [Page 61] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
- 6.3.2 NIC/QUERY
-
- NIC/Query is a browsing service that allows you to page through general
- information about the Defense Data Network (DDN). Topics included under
- NIC/Query are presented in a numbered menu. All the services of the TACNEWS
- program are also available via NIC/Query for the sake of simpler user
- accessibility.
-
- The program is largely self-explanatory, and online help is available if you
- need it. You do not need a login account on the NIC machine for access. To
- access NIC/Query, simply open a TELNET connection to NIC.DDN.MIL, and then
- type "nic" or "query", as shown below.
-
-
- @ nic <Return>
- NIC/Query Version: 1.4 Thu, 26 Sep 91 14:27:13
-
- Stop output every 24 lines? ([Y]/N/# of lines) y <Return>
- ROOT
-
- Use NIC/Query to access a hierarchy of information about the Defense
- Data Network (DDN) and the Network Information Center (NIC) using simple
- menus. Bugs to BUG-QUERY@NIC.DDN.MIL.
-
- **
- ** Note that a carriage return is required after every command.
- ** Select menu item 1 for help using this program.
- **
-
- 1) HELP -- Introduction, changes, detailed help, help summary.
- 2) WHOIS -- Directory of DDN users.
- 3) HOSTS -- Describes DDN hosts.
- 4) PROTOCOLS -- Describes DDN protocols.
- 5) RFCS -- Requests For Comments technical notes.
- 6) NIC DOCUMENTS -- Documents available from the NIC.
- 7. TACNEWS -- TACnews program.
-
- ROOT: Enter a menu# (1 - 7), or a command ('?' to list).
- NIC/Query: 1 <Return>
- HELP -- Introduction, changes, detailed help, help summary.
-
-
- DRAFT [Page 62] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
- NIC Query Example, continued...
-
-
- 1. INTRODUCTION -- An introduction to the NIC/Query system.
- 2. CHANGES -- Differences from the old version of NIC/Query.
- 3) NOVICES -- Detailed help for new users.
- 4. HELP SUMMARY -- Brief description of NIC/Query concepts and
- commands.
-
- HELP: Enter a menu# (1 - 4), or a command ('?' to list).
- NIC/Query: 1 <Return>
-
-
- In the example above, the user asks for help at the "NIC/Query:" prompt. A
- submenu is presented so he can select the level or type of information he
- wishes to have displayed.
-
-
- 6.3.3 TACNEWS
-
- TACNEWS is a NIC online service that offers login help to TAC users. It also
- offers access to the interactive TAC locator program that allows you to find
- the three TAC phone numbers closest to a phone number you enter. TACNEWS
- provides a mechanism for reading the DDN Newsletters, DDN Management
- Bulletins, and DDN Security Bulletins. Users should read these publications
- regularly to stay current on DDN policies, announcements, and network news
- items. Access TACNEWS by logging into a TAC and typing "tacnews", as shown in
- the example on the next page:
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- DRAFT [Page 63] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
- @n <Return>
- TAC Userid: <Username> <Return> Enter your TAC Username here.
- Access Code: <Access Code> Enter your TAC Access Code. It
- will not echo on screen.
- Login OK
- TCP Trying...Open
- Trying 192.112.36.5 ...
- Connected to NIC.DDN.MIL.
- Escape character is '^]'.
-
- * -- DDN Network Information Center --
- *
- * For TAC news, type: TACNEWS <Return>
- * For user and host information, type: WHOIS <Return>
- * For NIC information, type: NIC <Return>
- *
- * For user assistance call (800) 365-DNIC or (703) 802-4535
- * Report system problems to ACTION@NIC.DDN.MIL or call
- (703) 802-4535
- @ tacnews <Return>
- TACnews Version: (xxxx.xxx) Thu, 26 Sep 91 14:30:14
-
- Stop output every 24 lines? ([Y]/N/# of lines) y <Return>
- 1. Announcements -- Updated 11-Jul-91
- 2. TACs, List of U.S. TAC Dial-Ins, 23K
- 3. Locator, Finds U.S. TAC Dial-Ins
- 4. Eur/Pac, List of European/Pacific TAC Dial-Ins, 15K
- 5. Login, Help with TAC login, 6K
- 6. Newsletters, DDN -- Updated 16-Sep-91
- 7. Bulletins, DDN Management -- Updated 16-Sep-91
- 8. Bulletins, DDN Security -- Updated 16-Sep-91
-
- Type a menu number (1 - 8), ? for options, "HELP" for instructions.
- TACnews: 7 <Return>
- There are 30 Bulletins online. The latest:
- .
- 80 21-Dec-90 REGISTRATION OF IP NETWORK NUMBERS
- 81 9-Apr-91 MTACs Operational with Limited Monitoring and
- Control Capability
- --> 82 23-Apr-91 Corrected MTACs Operational with Limited
- Monitoring and Control Capability
- Type an issue number (22 - 82), ? for options, or "HELP" for full help.
- TACnews: 82 <Return>
-
- DRAFT [Page 64] DRAFT
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
- Alternatively, you may open a TELNET connection to NIC.DDN.MIL from a local
- host to read TACNEWS, as shown in the following example:
-
- % telnet nic.ddn.mil <Return>
- Trying 192.112.36.5 ...
- Connected to nic.ddn.mil.
- Escape character is '^]'.
-
- SunOS UNIX (nic)
-
- -- DDN Network Information Center --
- *
- * For TAC news, type: TACNEWS <return>
- * For user and host information, type: WHOIS <return>
- * For NIC information, type: NIC <return>
- *
- * For user assistance call (800) 365-3642 or (800) 365-DNIC or
- (703) 802-4535
- * Report system problems to ACTION@NIC.DDN.MIL
-
- NIC, SunOS Release 4.1.1 (NIC) #1:
- Thu Sep 26 14:11:08 1991 EST
- @ tacnews <Return>
- TACnews Version: (xxxx.xxx) Thu, 26 Sep 91 14:30:14
-
- Stop output every 24 lines? ([Y]/N/# of lines) y <Return>
-
- 1. Announcements -- Updated 11-Jul-91
- 2. TACs, List of U.S. TAC Dial-Ins, 23K
- 3. Locator, Finds U.S. TAC Dial-Ins
- 4. Eur/Pac, List of European/Pacific TAC Dial-Ins, 15K
- 5. Login, Help with TAC login, 6K
- 6. Newsletters, DDN -- Updated 16-Sep-91
- 7. Bulletins, DDN Management -- Updated 16-Sep-91
- 8. Bulletins, DDN Security -- Updated 16-Sep-91
-
- Type a menu number (1 - 8), ? for options, "HELP" for instructions.
- TACnews:
-
-
-
-
- DRAFT [Page 65] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
- TACNEWS services are also available via the NIC/Query program; this redundancy
- allows users connecting to the NIC via TELNET to take advantage of all
- services in a single connection session.
-
- If you wish to have newsletters and bulletins delivered online to your network
- mailbox, send a message to REGISTRAR@NIC.DDN.MIL including your name and
- address and indicating that you wish to be on the online distribution for the
- newsletters and bulletins.
-
-
- 6.3.4 NIC Kermit Server
-
- For PC users who cannot access FTP from their hosts, the NIC has an anonymous
- Kermit server available. (A server is a software module that provides a
- service to users or user programs that request it.) You should be familiar
- with the Kermit file transfer protocol and have a PC communications program
- that supports that protocol before you attempt to transfer documents with it.
-
- To download a file from the NIC using the Kermit server, proceed as follows:
-
- 1. Set the receive packet size on your PC Kermit to 60.
-
- 2. Connect to NIC.DDN.MIL (192.112.36.5) through a TAC or Mini-TAC.
-
- 3. Once you get the NIC login prompt (@), change the TAC intercept
- character to a control-y (^y) by issuing the following TAC command:
-
- @i 25 <Return>
-
- Notice that you must type the "@" symbol because it signals the TAC
- that you are issuing a command.
-
- 4. Press <Return> to get the NIC prompt (@ is now the NIC prompt
- symbol), then type
-
- kermit <Return>
-
- This command activates the Kermit server on the NIC.
-
- 5. Drop back to your PC Kermit and get the file that you want from
- the NIC.
-
- DRAFT [Page 66] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
- 6. When you are finished, type "bye" to end the Kermit session on
- your PC.
-
- For more information on using Kermit through a TAC, see the files KERMIT-
- TAC-INFO.TXT and KERMIT-NICSERVER.TXT in the NETINFO/ directory on the
- NIC.DDN.MIL host. These files are also available via the SERVICE mail server
- (see Section 6.3.5).
-
-
- 6.3.5 NIC Automated Mail Service
-
- SERVICE is an automated electronic mail system provided by the DDN Network
- Information Center. It allows access to most online NIC documents and
- information via electronic mail.
-
- To use the mail service, send a message to SERVICE@NIC.DDN.MIL. In the
- SUBJECT field, enter the type of service you are requesting, followed by any
- arguments needed to further define your request. The message body is normally
- ignored; however, if you leave the SUBJECT field empty, the first line of the
- message body is used as the request. If your request involves the
- transmission of large files, they are broken into smaller, separate messages;
- however, a few files are too large to be sent through the mail system.
- SERVICE requests are processed automatically once a day.
-
- The following services are currently available. Each item on the list is
- followed by an example of a subject line for requesting that service:
-
- HELP This message; a list of current services.
- Subj: HELP
-
- RFC nnnn nnnn is the RFC number.
- Subj: RFC 822
-
- RFC Index Retrieves the index of RFCs.
- Subj: RFC INDEX
-
- IEN nnn nnn is the IEN number or the word INDEX.
- Subj: IEN 828
-
-
-
-
- DRAFT [Page 67] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
- NETINFO xxx xxx is a file name or the word INDEX.
- Subj: NETINFO DOMAIN-TEMPLATE.TXT
-
- SEND xxx xxx is a fully specified file name.
- Subj: SEND IETF/1WG-SUMMARY
- Subj: SEND INTERNET-DRAFTS/DRAFT-IETF-IWG-BGP-OO.TXT
-
- HOST xxx Returns information about host xxx.
- Subj: HOST NIC.DDN.MIL
-
- INDEX Returns the master list of available index files.
-
- FYI nnn Returns the specified FYI document, where nnn is the
- FYI number or the word INDEX.
- Subj: FYI 1
-
- WHOIS xxx Returns information about xxx from the WHOIS service.
- Use "WHOIS HELP" for information on using WHOIS.
- Subj: WHOIS MCCOLLUMB
-
-
- 6.4 Documents Published by the NIC
-
- The NIC compiles, edits, and publishes the documents listed below, all of
- which are available online. The file NIC-PUBS.TXT in the NETINFO/ directory
- on NIC.DDN.MIL contains an expanded, annotated list of NIC publications that
- are currently available either online or in hardcopy. Many of these documents
- are deposited at the Defense Technical Information Center (DTIC), where they
- are available to military network users. Hardcopies of documents and RFCs are
- also available from the former NIC, SRI International in Menlo Park, CA.
- Contact SRI for prices and ordering information. (Ordering instructions are
- also provided in the online file NIC-PUBS.TXT.) You may contact the NIC to
- confirm document availability or to learn about newly available documents.
-
-
- THE DDN NEW USER GUIDE
- The document you are reading. A brief guide to DDN network tools and
- services designed to introduce users to the network. The Guide is
- available online as NETINFO/NUG.DOC.
-
-
-
- DRAFT [Page 68] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
- THE NETWORK PROTOCOL IMPLEMENTATIONS AND VENDORS GUIDE
- The Vendors Guide lists software and hardware implementations of the
- DDN protocols, based upon information supplied by vendors. This
- document is for informational purposes only. Entry on this list does
- not imply endorsement. Available online as NETINFO/VENDORS-GUIDE.DOC.
-
-
- RFCs (Copies only via FTP)
- Requests for Comments, or RFCs, are network technical notes, each of
- which is identified by a unique number. The RFCs are available online
- via anonymous FTP as RFC/RFCnnnn.txt (where nnnn is the RFC number).
- RFCs are available in hardcopy from SRI International, Menlo Park, CA.
-
-
- 6.5 Online Reference Files at the NIC
-
- Several public files on the NIC.DDN.MIL host are of special interest to
- network users. The pathnames and brief descriptions of some of these files
- are listed below. You may retrieve these files via FTP (using USERNAME
- anonymous, PASSWORD guest). See Section 5.1.2 for FTP instructions. You may
- also obtain the files by electronic mail using the NIC Mail SERVICE program
- (see Section 6.3.5) or via the NIC Kermit Server (see Section 6.3.4).
-
- NETINFO/MIL-NSC.TXT
- Node Site Coordinators for each node or PSN on the MILNET.
-
-
- NETINFO/HOSTS.TXT
- Official Internet DoD Hostname Table, which lists the names and numbers
- of domains, networks, gateways, and hosts on the DoD Internet. It is
- designed to be machine readable. From this file, two additional files
- are generated:
-
- HOSTS.TXT-Z, a UNIX compressed version of the HOSTS.TXT file, and
- MIL-HOSTS.TXT, a complete listing of the MILNET hosts in HOSTS.TXT.
-
-
- NETINFO/HOST-LOCATION.TXT
- Addresses of MILNET hosts locations, sorted geographically.
-
- DRAFT [Page 69] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
- NETINFO/HOSTSERVER-INSTRUCTIONS.TXT
- Instructions for using the NIC's hostname server to transfer the host
- table.
-
-
- NETINFO/MIL-HOST-ADMINISTRATORS-A-L.TXT
- Military Host Administrators "A" through "L," sorted by hostname.
-
-
- NETINFO/MIL-HOST-ADMINISTRATORS-M-Z.TXT
- Military Host Administrators "M" through "Z," sorted by hostname.
-
-
- NETINFO/NIC-PUBS.TXT
- Information about publications available from the NIC.
-
-
- NETINFO/NUG.DOC
- Online version of this document.
-
-
- NETINFO/WHAT-THE-NIC-DOES.TXT
- General information regarding NIC services.
-
-
- NETINFO/USER-TEMPLATE.TXT
- Template for users who want to be registered in the WHOIS database.
-
-
- NETINFO/TAC-LOCATION.TXT
- Geographic location of each TAC. This file is useful for locating the
- TAC closest to you.
-
-
- NETINFO/USA-TAC-PHONES.TXT
- Phone numbers for TACS within the fifty states.
-
-
- NETINFO/FOREIGN-TAC-PHONES.TXT
- Phone numbers for TACs outside the U.S.
-
-
- DRAFT [Page 70] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
- NETINFO/DOMAIN-CONTACTS.TXT
- Name, mailbox, and phone number for each domain contact registered with
- the NIC.
-
-
- NETINFO/NETWORK-CONTACTS.TXT
- Name, mailbox, and phone number for each network contact registered with
- the NIC. The NIC registers all IP networks and designates a contact for
- each one.
-
-
- NETINFO/00NETINFO-INDEX.TXT
- Name and a brief description of each file available in the publicly
- accessible NETINFO directory on the NIC host.
-
-
- NETINFO/KERMIT-INFO.TXT
- General information on the Kermit program.
-
-
- NETINFO/KERMIT-NICSERVER.TXT
- Specific information on the NIC Kermit server.
-
-
- NETINFO/KERMIT-TAC-INFO.TXT
- Specific information on TAC usage with Kermit.
-
-
- PROTOCOLS/GOSIP-V1.DOC
- Version 1 of the GOSIP document.
-
-
- PROTOCOLS/GOSIP-ORDER-INFO.TXT
- Descriptions of GOSIP-related documents and information on how to obtain
- them.
-
-
- RFC/RFCnnnn.TXT, where nnnn is the RFC number
- Network technical notes, known as Requests for Comments, or RFCs, are
- online in the directory RFC/ on the NIC.DDN.MIL host. New RFCs are
- announced to network users via an online distribution list maintained
- by the NIC. Individuals who want to be added to the RFC notification
- list should send a message to RFC-REQUEST@NIC.DDN.MIL.
-
- DRAFT [Page 71] DRAFT
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
- RFC/RFC-INDEX.TXT
- Lists all RFCs in reverse numerical order, with the most recent RFC at
- the top. Includes author, title, date of issue, RFC number, number of
- hardcopy pages, number of online bytes, format (ASCII text), and
- information regarding other RFCs that make a given RFC obsolete or
- update it. Notes whether an RFC is also an FYI.
-
-
- FYI/FYInn.TXT, where nn is the FYI number
- (FYI = For Your Information) General information technical notes issued
- as special RFCs.
-
-
- FYI/FYI-INDEX.TXT
- Mirror of the RFC Index, but listing only FYIs. Notes the corresponding
- RFC number for each FYI.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- DRAFT [Page 72] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
-
- SECTION 7. SECURITY CONSIDERATIONS AND NETWORK CONDUCT
-
-
- 7.1 Requirements for Legitimate DDN Access
-
- Only authorized users engaged in U.S. Government business or applicable
- research, or who are directly involved in providing operations or system
- support for Government-owned or Government-sponsored computer communications
- equipment, may use the DDN. The network is not available for use by the
- general public, nor is it intended to compete with comparable commercial
- network services. Users of the DDN must not violate privacy or other
- applicable laws and should not use the networks for advertising or recruiting
- purposes without the express permission of the Defense Information Systems
- Agency.
-
- Unauthorized use of the DDN is illegal. Persons who break into Government
- networks or use Government computer resources without authorization will be
- prosecuted. Hosts that permit this type of access will be disconnected from
- the network.
-
- [NOTE: DISA reserves the right to discontinue DDN access to any
- user(s) who are, in DISA's opinion, not conducting legitimate
- Government business/activity. DISA will send one letter of warning
- through command channels (via registered mail) to any user found to
- be conducting illegitimate business. Should the illegitimate activity
- continue, DISA will terminate the user's access without additional
- notice.]
-
-
- 7.2 Security Considerations and Guidelines for Network Conduct
-
- Several levels of responsibility provide security for the DDN. At the most
- basic level, individual users should take precautions to minimize the chances
- that their accounts could be compromised. They bear the primary
- responsibility for the protection of their information. If more users were to
- take this responsibility seriously and act accordingly, the majority of
- computer security breaches would not occur.
-
-
-
-
- DRAFT [Page 73] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
- You can best protect your own files via careful password management. Do not
- use an unmodified word from any language; this includes words spelled
- backward. Your Host Administrator should have suggestions as to proper
- password choices.
-
- Follow these recommendations to reduce the possibility of compromise of your
- computer system or files:
-
- * Do not leave your terminal logged in and unattended.
-
- * Know your operating system's protection mechanisms and make sure
- that all your files are set up with appropriate protection modes.
-
- * Choose a password that meets the guidelines of your site or, at
- minimum, one that is not an unmodified word from any language. A
- simple modification involves prefixing a word with a numeral (or
- several numerals).
-
- * Change your password as required by your site or, at minimum, every
- six months.
-
- * Do not write your password down on paper or record it in a file
- stored on any computer disk, floppy disk, PC, or magnetic tape.
-
- Users have the primary responsibility for protecting their own accounts, but
- several other people have roles in providing system and network security.
-
- Host Administrators are generally responsible for ensuring that their host
- sites maintain a reasonable level of protection from the possibility of
- network compromise. They must act as liaisons with the DDN Network Security
- Officer (DDN NSO), the Security Coordination Center (SCC), vendors, law
- enforcement bodies, and other appropriate agencies to resolve any outstanding
- security problems and prevent their recurrence. They are responsible for the
- enforcement of all DDN policies at their site.
-
- The NSO recommends security policy affecting the DDN and is responsible for
- its general enforcement. The NSO also works closely with Host Administrators
- to resolve network and related computer security problems and incidents
- affecting their sites.
-
-
-
- DRAFT [Page 74] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
- The DDN Security Coordination Center is located at the NIC. The SCC acts as a
- liaison between Host Administrators and the NSO and between MILNET sites and
- Internet security response centers such as the Computer Emergency Response
- Team (CERT).
-
- If you suspect that a computer break-in has occurred, you should contact your
- Host Administrator. The flow of security incident reporting should be from
- the end user to the Host Administrator or other appropriate individual, who
- then determines if the problem is local or network related. If the problem is
- network related, the Host Administrator should refer the problem to the
- appropriate site as noted in DDN Security Bulletin 9003 [7]. In such cases,
- the Host Administrator's first step is to call the MILNET Monitoring Center
- for your area. Phone numbers for the Monitoring Centers are found in Section
- 9.2.
-
-
- 7.3 Network Conduct
-
- The network environment is somewhat different from the traditional workplace.
- Rules for proper conduct are gradually emerging to fit this new environment.
- The rules and guidelines presented here relate to four areas:
-
- * passwords
- * file protection
- * plagiarism
- * network mail.
-
-
- 7.3.1 Passwords
-
- Since use of the network is restricted, passwords, access codes, and TAC cards
- should never be shared. Change your host login password regularly and report
- any unauthorized use of passwords to your Host Administrator. MILNET TAC
- cards and records of host Userids and Access Codes should be kept in a safe
- place. Users should be familiar with and follow local security guidelines.
-
-
- 7.3.2 File Protection
-
- Most operating systems have a method of protecting files from network read and
- write access. The recommended file protection default for directories is "no
-
- DRAFT [Page 75] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
- read and no write to outside users." If your files are protected in this way,
- you can still make them accessible to outside users over the network, but you
- must take action to reset file and directory protections to make this happen.
-
- As a new user, you should find out what the protection default is on your host
- and ensure that files you don't want accessible to other users are protected.
- Ask you Host Administrator about default file and directory protection
- settings and for instructions on protecting/unprotecting files.
-
-
- 7.3.3 Plagiarism
-
- Even if a file is unprotected, you are not free to copy or read it without
- first asking permission. It is as inappropriate to read online mail or browse
- through online files without permission as it would be to read a colleague's
- hardcopy mail or rummage around in his desk.
-
- Electronic plagiarism of another's work is just as unethical as plagiarism by
- any other means. Be sure to credit users whose work you cite or whose ideas
- you express. Copyright laws must also be carefully observed and obeyed.
-
- It is easy and convenient to exchange code and programming across the network.
-
- Many code developers are extremely generous in sharing their work. Even so,
- before copying or using someone else's code, be sure to get permission from
- the developer or maintainer and credit the source in your documentation.
- Under no circumstances should programming or code from anywhere on the network
- be used (verbatim or edited) commercially without the owner's explicit
- permission.
-
-
- 7.3.4 Mail
-
- Electronic mail is a powerful communication tool that must be used with care.
- The following guidelines will help you avoid offending other users and
- overloading the network.
-
- It is easy to forward mail you receive; but the writer may never have intended
- that anyone else read the message. For this reason, it is wise to check with
- the sender before forwarding a private message of any significance.
-
-
-
- DRAFT [Page 76] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
- The DDN is a business environment, so try to keep your messages short and to
- the point. It is easy to send off a quick message, only to realize a moment
- later that you needed to say more. To avoid this, organize your thoughts and
- send a single message rather than several incomplete ones. This will make
- your mail far more useful to the recipients, and minimize the load on the
- network.
-
- Online mail tends to change a person's style of communication. Sending mail
- is so quick that it is tempting to send your immediate reaction to a message
- rather than a more considered, appropriate response. Do not use derogatory or
- inappropriate language in messages, especially those sent to discussion
- groups. Keep in mind that no one likes to be offended or embarrassed by
- careless comments.
-
- Finally, if you regularly send mail to a large group, learn how to create a
- mailing list. Otherwise, each recipient must scroll through a list of the
- mailboxes of all other recipients as a part of the message header.
-
- Remember, use of the network is a privilege. It is your duty to use the
- network responsibly as it was intended to be used and to obey general network
- policies. In return, the network gives you access to many tools and to an
- online community of other network users.
-
-
- 7.4 Additional Security Information
-
- Host and system administrators are encouraged to order "DCAC 310-P115-1, DDN
- Security Management procedures for Host Administrators," May 1991. Copies may
- be obtained in the following manner:
-
- a. Government agencies may request a publication by submitting a DCA
- Form 117, Publication of Blank Form Request, to the Director, DISA,
- ATTN: BIAR, Arlington, VA 22204-2199.
-
- b. Other organizations may request a publication by submitting a letter
- with appropriate justification to the address given above. The DCA
- Form 117 is used by Government agencies ONLY.
-
-
-
-
-
- DRAFT [Page 77] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
-
- SECTION 8. NETWORK CONCEPTS OVERVIEW
-
-
- 8.1 Introduction
-
- In the following paragraphs, we provide some general information about topics
- such as usage-sensitive billing, network concentrators, network addresses, the
- Domain Name System, and GOSIP. Although most new DDN users will not be
- actively involved in any of the areas covered in this section, they do involve
- concepts you should become familiar with, since they are important to all DDN
- users.
-
-
- 8.2 Usage-Sensitive Billing
-
- The usage-sensitive billing system was implemented on the DDN to distribute
- costs more equitably, based on actual use of network resources. The tariff
- structure is designed to support cost recovery so that the amount recovered
- from each subscriber is proportional to that subscriber's use of network
- resources.
-
- Generally speaking, all hosts and dedicated terminals are charged a basic
- monthly rate. Users' network connections are charged on a per-minute basis.
- A charge is also levied for each kilopacket of traffic sent by each host or
- terminal user. Charges reflect peak-versus-nonpeak usage and precedence
- level.
-
- Monthly bills are sent to designated representatives of the military branches
- as well as to other Government agencies. The bills are then distributed
- according to locally established policies. That is, a packet of several bills
- might be sent to a site and then distributed to other individuals by the
- billing Point of Contact (POC) at that site.
-
- It is rare for an individual user to see a bill. However, you should be aware
- that your use of the DDN does affect costs charged back to your service and,
- perhaps, to your host site. Therefore, all users should be conscientious in
- conforming to host site usage policies.
-
-
-
-
- DRAFT [Page 78] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
- The NIC provides a Usage Sensitive Billing (USB) Service Desk to help answer
- inquiries from DDN users or user organizations regarding the traffic and/or
- connection charges shown on their billing reports. USB Service Desk personnel
- are available by phone Monday through Friday from 7:00 a.m. to 3:00 p.m.,
- Eastern time. Electronic mail is accepted 24 hours per day.
-
- Service Desk personnel have access to many sources of DDN usage information.
- They are available to answer general questions as well as site- or
- user-specific questions. In the event a question or inquiry goes beyond the
- scope of the Service Desk, the caller can be referred to a more appropriate
- contact or agency.
-
- Use the following information to contact the USB Service Desk:
-
- By Electronic Mail: BILLING@NIC.DDN.MIL
-
- By Phone: 1 (800) 365-DNIC (inside the U.S.)
- 1 (703) 802-4535 (outside the U.S.)
-
- By U.S. Mail: DDN Network Information Center
- ATTN: Usage-Sensitive Billing Desk
- 14200 Park Meadow Drive, Suite 200
- Chantilly, VA 22021
-
-
-
- 8.3 Network Concentrators
-
- Networks can be categorized according to size or geographic distribution, and
- they can be referred to as local area networks (LANs) or wide area networks
- (WANs). A LAN might serve a single office, a building, or an entire military
- site. WANs are typically cross-country networks employing technologies such
- as satellites or long distance land lines; they can serve large geographic
- areas such as military installations located throughout the world. The DDN is
- a WAN that reaches all major DoD installations worldwide.
-
- To expand computer communications not only across geographical distances, but
- also across different networking technologies, gateways are used to connect
- networks together into internetworks or "internets." The DDN is part of an
- IP-based internetwork known to DDN users as "the Internet."
-
-
- DRAFT [Page 79] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
- The use of gateway concentrators as a method of connecting to the DDN is a
- relatively new trend. Gateway concentrators enable LANs and hosts at military
- installations to connect to the DDN. Concentrators lessen the need for
- individual host connections without limiting local users' access to full DDN
- service.
-
- Gateway concentrator use increased when DISA limited the number of PSN ports
- that would be available to connect hosts directly to the DDN. This
- limitation, coupled with the long lead time required for direct host
- connections, lent impetus to the establishment of gateway concentrator
- programs for the military. Currently, the Air Force and the Army have
- concentrator programs to fulfill their long-haul data communication
- requirements. These programs have become their primary method of connecting
- unclassified computer systems to the DDN.
-
- Gateway concentrators provide a number of advantages for connecting
- installations to the DDN:
-
- * Greater Connection Capacity.
- With the installation of a gateway concentrator at a local site, the
- number of hosts that can be connected to the DDN is no longer limited
- by the number of ports available on a PSN. Instead, many hosts can
- be connected to a concentrator, and the total amount of traffic they
- pass to the DDN is accommodated by the connection between the gateway
- concentrator and the MILNET PSN to which it is attached.
-
- * Quick Connection.
- The gateway concentrator program was designed to allow multiple hosts
- to access a single DDN port simultaneously. Computers at an
- installation that requires unclassified worldwide communication will
- be connected to the Internet automatically because their local
- networks are attached to the Internet via the concentrator. Thus,
- these hosts will not require direct connections to DDN ports. This
- configuration enables the various military services (e.g., Air Force,
- Army) to manage their host connections directly, and to avoid the
- long wait for individual host connections to DDN ports.
-
- * Lower Cost Per Host.
- Because of the DDN usage-sensitive billing system structure, the
- gateway concentrator programs reduce costs for DDN connection. With
- the installation of a gateway concentrator, the charges for initial
-
- DRAFT [Page 80] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
- host connections are reduced, as the service is charged only once for
- the initial connection of the concentrator itself, rather than for
- each individual host connection. In addition, traffic between local
- hosts on the network behind a gateway concentrator will not be billed
- because such traffic will not travel across DDN facilities.
-
- The Air Force has a help desk at the Internet Control Center (INCC) to aid
- concentrator users in accessing the DDN:
-
- AFINCC@SERVER.AF.MIL
- Headquarters Standard Systems Center/AQFC
- Building 857, Room 200A
- Gunter Air Force Base, AL 36114-6343
- (205) 416-5771, (205) 416-5861; (DSN) 596-5771, 596-5861
-
-
-
- 8.4 Network Addressing
-
- The network address is the official numeric address of a host, TAC, or gateway
- (as opposed to the official name by which these entities are addressed).
- Network addresses take the format "nnn.nnn.nnn.nnn" (dotted decimal format),
- where nnn represents an up to 3-digit decimal identifier from 0 through 255,
- and each numeric component is separated from the next with a period. Each
- decimal part represents one octet of a 32-bit network address. The standard
- Internet address is divided into two parts: a network part and a local host
- part. Based on this two-part division, three classes of Internet addresses
- have been defined: Class A, Class B, and Class C.
-
-
- CLASS A Network Addresses
-
- Class A network addresses have the following characteristics:
-
- * Composed of a 1-byte network address and a 3-byte local address.
- * The highest-order bit of the (1-byte) network address is set to 0.
- * Therefore, the first (or network address) byte of a CLASS A address
- must be in the range from 0 to 127.
- * Consequently, CLASS A could have as many as 128 networks with 2 to
- the 24th power (16,777,216) hosts on each of these networks.
-
-
- DRAFT [Page 81] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
- All directly connected MILNET hosts are on network 26, which is a Class A
- network.
-
- For MILNET hosts,
-
- * The first part of the address is the network number (26).
- * The second part is the physical port number on the host's PSN.
- * The third part is the logical port number (currently 0 (zero) for
- MILNET hosts).
- * The fourth part is the number of the PSN to which the host is
- connected.
-
- Therefore, a host with the address 26.31.0.73 is on network 26 (the number
- assigned to the MILNET) and is attached to port 31 on PSN 73.
-
-
- CLASS B Network Addresses
-
- Class B network addresses have the following characteristics:
-
- * The two high-order bytes of the Internet address contain the network
- number, while the two low-order bytes contain the local host number.
- * The highest order bits are set to 10, which means that the first byte
- must be a number in the range 128 to 191.
- * Consequently, CLASS B could have as many as 16,384 networks with 2 to
- the 16th power (65,536) hosts on each of these networks.
-
-
- CLASS C Network Addresses
-
- Class C network addresses have the following characteristics:
-
- * The network number is contained in the three high-order bytes of the
- Internet address, while the local host address is represented in the
- single low-order byte.
- * The three highest-order bits of the network address are set to 110.
- * Therefore, the first byte must be in the range 192 to 233.
- * Consequently, CLASS C could have as many as 2,097,152 networks with
- 2 to the 8th power (256) hosts on each of these networks.
-
-
-
- DRAFT [Page 82] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
- The Internet Registry (IR) at the DDN NIC assigns the network portion of an
- address to a network. The local network coordinator for a specific host
- assigns the local portion of that host's network address.
-
- Here are some examples of how each type of network number looks:
-
- Class A: 26.31.0.73
- Class B: 128.18.1.1
- Class C: 192.67.67.20
-
- [NOTE: A network address is different from a user's address. The
- term "user address" refers to a person's electronic mailbox, such as
- henry@nic.ddn.mil.]
-
- In addition to the three classes defined above, a class of addresses whose
- three highest order bits are 111 has been defined. It is currently in limited
- use. This class is sometimes referred to as "CLASS D." Figure 8-1 on the
- next page graphically represents the three major Internet address classes.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- DRAFT [Page 83] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
- CLASS A Internet Address:
-
-
- Byte: 1 2 3 4
- <-----------><-----------><-----------><----------->
- Bit: 0 07 15 23 31
-
- +--------------------------------------------------+
- | | Network | |
- |0| Address | Local Address |
- +--------------------------------------------------+
-
-
-
- CLASS B Internet Address:
-
-
- Byte: 1 2 3 4
- <-----------><-----------><-----------><----------->
- Bit: 0 07 15 23 31
-
- +--------------------------------------------------+
- |1|0| Network Address | Local Address |
- +--------------------------------------------------+
-
-
-
- CLASS C Internet Address:
-
-
- Byte: 1 2 3 4
- <-----------><-----------><-----------><----------->
- Bit: 0 07 15 23 31
-
- +--------------------------------------------------+
- | | | | | Local |
- |1|1|0| Network Address | Address |
- +--------------------------------------------------+
-
-
- Figure 8-1. Internet Address Classes
-
- DRAFT [Page 84] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
- 8.4.1 Finding Network Address Information
-
- The WHOIS database at the NIC contains POC information for every network the
- IR (Internet Registry) assigns; however, it may not contain information for
- every host on a network. Therefore, remember to search on the network portion
- of the address rather than the complete address when you are using the WHOIS
- program to obtain information on a host.
-
- For example, the Class C address
-
- 192.112.36.70
-
- is not in the database, but searching on
-
- 192.112.36.0
-
- shows you information for LOCALNET. When using WHOIS to find the POC
- information for a network, set the local portion(s) of the address to zero.
- (See Section 6.3.1.3 for an example of using WHOIS to search for a network
- address.)
-
-
- 8.4.2 Obtaining Network Addresses
-
- DISA assigns all MILNET network addresses (Class A, network 26), and the
- MILNET Manager must approve any changes to or deletions of MILNET network
- addresses.
-
- The NIC assigns all other Class A, B, and C network addresses. Requests to
- obtain an official Class B or C number or to make changes to hosts registered
- with these addresses should be directed online to HOSTMASTER@NIC.DDN.MIL. To
- arrange for a hardcopy application, call the NIC at 1 (800) 365-DNIC.
- Applications can also be requested through the SERVICE mail server (see
- Section 6.3.5).
-
-
- 8.4.3 Knowing Your Network Address
-
- Each user should know the network address of his/her host. It is especially
- important to know your host's address if you use a TAC or Mini-TAC because you
- will have to enter the address as part of the TAC login sequence. Your host
-
- DRAFT [Page 85] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
- address is often--but not always--the address printed on your TAC card by the
- label AUTHORIZING HOST. Even if you have a script file or program that enters
- this information for you as you log in, learn your address so you can tell it
- to the NIC or the MILNET Monitoring Center when you call them about a login
- problem.
-
-
- 8.5 The Domain Name System
-
- Until the mid-1980s, a DDN host could find data on hostname-to-network-address
- translation solely through the use of a file called the host table, which was
- generated at the NIC.
-
- The host table contained the name and network address of every host that was
- registered with the NIC. Individual host sites had to transfer and install
- new copies of the host table regularly in order to have correct host
- addressing information. The host table had to be updated frequently to enable
- mail and other data to be sent back and forth across the Internet.
-
- As time went on, however, the number of hosts listed in the host table became
- so large that the file was difficult to maintain efficiently, as well as
- difficult and time-consuming for sites to transfer. As an alternative to the
- host table file, the Domain Name System (DNS) was developed. Currently, the
- NIC maintains data for both the host table and the DNS. The host table
- listing is an extremely restricted subset of the hosts registered in the
- Domain Name System.
-
- In a nutshell, the DNS is a way of administratively grouping hosts into a
- hierarchy of authority. The DNS allows addressing information to be widely
- distributed and updated locally, which results in more efficient data
- retrieval and maintenance. Complete conversion to the DNS will eliminate the
- need for one site to maintain a centralized table of names and addresses.
-
- Under the DNS, host name and address information, along with other data, is
- distributed throughout the network in a hierarchical scheme. At the top of
- the hierarchy are the root servers that contain information about the
- top-level and second-level domains. At the bottom of the hierarchy are the
- individual hosts.
-
-
-
-
- DRAFT [Page 86] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
- Each domain within the DNS must have two hosts that provide name service for
- it, which means that these hosts must run programs called name servers. When
- queried by programs known as resolvers (located on individual hosts), these
- name servers provide name and address information to/for the particular hosts
- within their domain. (The hosts themselves are called servers, even though,
- technically, a server is a program.) Each server contains a subset of
- Internet domain information. If a query arrives at a server that does not
- have address information for a particular host, it will be able to direct the
- query to the server where the information resides.
-
- Queries regarding specific hostnames usually begin by asking a server that
- knows about the top-level domain under which that host falls. Currently, most
- domains on the Internet are registered within one of the following top-level
- domains:
-
- * COM for commercial institutions
- * EDU for educational institutions
- * GOV for non-military government agencies and organizations
- * MIL for military agencies and organizations
- * NET for backbone networking entities
- * ORG for non-profit institutions.
-
- Top-level domains are also registered for countries--e.g., BE for Belgium and
- FI for Finland. The NIC registers information for only the top level of these
- country domains. Lower-level domains are registered within the country.
-
- Hosts registered on the Internet must have names that reflect the domains
- under which they are registered. Such names are called Fully Qualified Domain
- Names (FQDNs) and include all domains of which the host is a part. For
- example, NIC.DDN.MIL is the name of the NIC's main host. The hostname
- NIC.DDN.MIL, when taken piece by piece, gives information about the host
- itself. A hostname ending in MIL signifies sponsorship from a
- military-related organization. The second-level domain, DDN, indicates that
- the host is used by an organization within the DDN. The third-level domain,
- NIC, indicates the host is used by the NIC.
-
- Between the root servers and the individual hosts are other hosts that act as
- servers and contain part of the information within the DNS hierarchy. For
- example, a program looking for the address of NIC.DDN.MIL might first send a
- query to a root server.
-
-
- DRAFT [Page 87] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
- The root server would not know the address of NIC.DDN.MIL in particular, but
- would direct the query to another server that had information about the
- DDN.MIL domain. The second server would know which hosts provide name service
- about NIC.DDN.MIL and direct the query to those hosts. Finally, the query
- would arrive at the specific host providing name service for NIC.DDN.MIL. That
- host would return the network address information via the DNS to the host that
- initiated the query. All of this happens very quickly--usually in less than a
- minute.
-
- Mail programs must know the address of each host to which they send mail.
- Users normally include a hostname in the headers of their messages. The mail
- program queries either the DNS or a host table to translate that hostname to a
- network address. This enables the mail message to be delivered across the
- network.
-
- For example, if a user named Sam wants to send mail to his friend Joe at the
- host EXAMPLE.SAMPLE.COM, he can do so in one of two ways.
-
- 1. Via the Host Table--
-
- * The host EXAMPLE.SAMPLE.COM is registered in the host table
- along with its netaddress.
-
- * The mail program finds the correct netaddress from the host
- table on the sender's local host and sends the mail to Joe.
-
- In this method of transmission, every host that Sam wants to
- communicate with must be listed in the host table file on his own
- host. Sam may not be able to reply to messages sent to him if his
- host does not recognize the hostname in the sender's return address.
-
-
- 2. Via the Domain Name System--
-
- * The mail program trying to deliver a message addressed to
- JOE@EXAMPLE.SAMPLE.COM sends a tracker called a query to one of
- seven root servers.
-
- * The root server has information on the COM top-level domain and
- knows which two domain servers hold further information on the
- SAMPLE.COM domain.
-
- DRAFT [Page 88] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
- * The root server points the query to those domain servers.
-
- * When the query arrives at the ultimate destination server, it
- learns the netaddress of the host EXAMPLE.SAMPLE.COM, and the
- mail program obtains the information necessary to establish a
- path from the sender's host to Joe's host.
-
- * The query directs the mail down that path to Joe's mail account
- on the EXAMPLE.SAMPLE.COM host.
-
-
-
- 8.6 Government Open Systems Interconnection Profile (GOSIP)
-
- The Government Open Systems Interconnection Profile (GOSIP) is a document that
- describes the Government's plans to transition its networks from the
- TCP/IP-based protocols to international protocols based on the Open Systems
- Interconnection (OSI) Reference Model. The goal is to add OSI-based functions
- to the Internet without sacrificing services now available to Internet users.
-
- Several documents pertain to GOSIP or its implementation; however, we will
- mention only one resource that will point you toward the most current
- information available.
-
- RFC 1169, "Explaining the Role of GOSIP," [6] discusses how GOSIP should be
- applied to near-term network planning and explains the role and applicability
- of the GOSIP document. In addition, it has an appendix that describes other
- GOSIP documents and tells how to obtain them. The appendix also lists
- contacts for further information regarding the documents. This RFC will
- probably be updated as the status of GOSIP changes, so check the RFC Index,
- available at the NIC, to ensure that you have the most current information.
-
-
-
-
-
-
-
-
-
-
-
- DRAFT [Page 89] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
-
- SECTION 9. NETWORK SERVICE CENTERS AND CONTACTS
-
-
- The three main service centers on the DDN are:
-
- * The DDN Network Information Center (NIC)
-
- * The DDN Network Monitoring Centers (NMC) for the United States,
- Pacific, and European areas
-
- * The Defense Information Systems Agency's Defense Network Systems
- Organization (DISA DNSO).
-
- This section of the Guide describes the services provided by these
- organizations and gives a list of key contacts for each.
-
- This section also tells you how to obtain the names of other key network
- contacts, including the following:
-
- * Host Administrators
- * Node Site Coordinators
- * Military Communications and Operations Command Contacts.
-
- These people and places are sources of network-related information and help,
- so it is important for you to familiarize yourself with them.
-
-
- 9.1 The DDN Network Information Center (NIC)
-
- The DDN Network Information Center (NIC) is located at Government Systems,
- Inc. (GSI) headquarters in Chantilly, Virginia. The NIC is funded by the
- Defense Information Systems Agency's Defense Network Systems Organization
- (DISA DNSO). Its mission is to provide general reference services to DDN
- users via telephone, electronic mail, and U.S. mail. The NIC is the first
- place to turn to if you are not sure who provides the service you need or who
- is the right person to contact. Section 6 describes the NIC services in
- detail.
-
-
-
-
- DRAFT [Page 90] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
- 9.1.1 General Reference Service Provided by the NIC
-
- The NIC provides several kinds of user assistance. Our main Help Desk phone
- numbers are
-
- 1 (800) 365-DNIC (inside the U.S.)
- +1 (703) 802-4535 (outside the U.S.)
-
- The first number is toll-free. Service is available Monday through Friday,
- from 7 a.m. to 7 p.m., Eastern time.
-
- The NIC Help Desk assists those who experience problems with the network and
- with terminal-to-TAC use. In addition, the NIC is happy to answer questions
- about any other service outlined in this section.
-
- The NIC host computer's hostname and its network address are:
-
- NIC.DDN.MIL 192.112.36.5
-
- NIC online services are available 24 hours a day, 7 days a week.
-
-
- 9.1.2 NIC Online Contacts
-
- The NIC supports several online mailboxes to provide assistance in specific
- areas.
-
- Type of Inquiry Network Mailbox
-
- General User Assistance NIC@NIC.DDN.MIL
- TAC and Non-TAC User Registration REGISTRAR@NIC.DDN.MIL
- Urgent Security Matters NIC-ALERT@NIC.DDN.MIL
- Host, Domain, and Net Registration HOSTMASTER@NIC.DDN.MIL
- NIC.DDN.MIL Computer Operations ACTION@NIC.DDN.MIL
- Comments on NIC Publications, Services SUGGESTIONS@NIC.DDN.MIL
- Security Concerns and Questions SCC@NIC.DDN.MIL
- Usage-Sensitive Billing Questions BILLING@NIC.DDN.MIL
- Automatic Mail Service SERVICE@NIC.DDN.MIL
- Reporting NIC Software Bugs BUG-SERVICE@NIC.DDN.MIL
-
-
-
- DRAFT [Page 91] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
- 9.1.3 NIC U.S. Mail Address
-
- Network Information Center
- 14200 Park Meadow Drive, Suite 200
- Chantilly, VA 22021
-
-
- 9.2 Network Monitoring Centers (NMCs)
-
- The three Network Monitoring Centers are:.
-
- * The CONUS MILNET Monitoring Center (CMMC) located at DISA
- headquarters in Washington, DC; the CMMC provides a toll-free hotline
- Trouble Desk phone number for quick reporting of network problems.
-
- * The Pacific MILNET Monitoring Center (PMMC) located at Wheeler AFB
- in Hawaii.
-
- * The European MILNET Monitoring Center (EMMC) located in Patch
- Barracks, Vaihingen, Germany.
-
- All NMCs provide operations support for several DoD packet-switching networks.
-
- The NMCs concentrate on real-time network management, with the primary
- objective of maximizing each network's operating efficiency. In addition,
- they receive the first DDN security incident reports.
-
- Bolt Beranek and Newman, Inc., Communications Division (BBNCD) provides DDN
- with operations and technical support, configuration management, software
- maintenance and enhancement, hardware maintenance, and required hardware.
-
-
- 9.2.1 NMC Services
-
- NMC services include remote status monitoring, coordination of network outage
- troubleshooting efforts, and 24-hours-per-day, 7-days-per-week technical
- assistance to users. The NMCs typically work on backbone-related outages
- consisting of node and circuit problems; they provide help in determining
- whether host connectivity problems are network related.
-
- Your Host Administrator contacts the appropriate NMC for all network hardware
- problems, hardware field service, problems with host interfaces, suspected
- node software problems, or DDN security problems.
-
- DRAFT [Page 92] DRAFT
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
- 9.2.2 NMC Contacts
-
- Title Telephone Network Mailbox
-
- CONUS MMC 1 (800) 451-7413 DCA-MMC@DCA-EMS.DCA.MIL
- 1 (703) 692-2268
-
- European MMC 011 49 711 687 7766 STT-CONTROL@FRG.BBN.COM
-
- Pacific MMC 1 (808) 656-1472 PMMC@PAC-MILNET-MC.DCA.MIL
-
- MILNET Trouble Desk 1 (703) 692-5726
-
-
- 9.2.3 NMC U.S. Mail Addresses
-
-
- CONUS MILNET Monitoring Center Pacific MILNET Monitoring Center
- DCA Headquarters Defense Communications Agency, Pacific
- 701 South Courthouse Rd. Wheeler AFB, HI 96854-5000
- Arlington, VA 22204-2199 Attn: P-600
- Attn: MILNET Manager
-
- European MILNET Monitoring Center
- BBNCD
- DCA-Europe
- Box 1000 Att: DED
- APO NY 09131-4103
-
-
- 9.3 Host Administrators and Node Site Coordinators
-
- Each host has a representative who serves as its technical and administrative
- contact--the Host Administrator. The Host Administrator provides important
- host-related services such as the following:
-
- * Collaborates with the DDN PMO on security matters involving hosts,
-
- * Interprets network policies as they apply to his/her host,
-
- * Decides which users may access the network (within the guidelines
- set by the DDN PMO),
-
- DRAFT [Page 93] DRAFT
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
- * Authorizes user access to the MILNET Terminal Access Controllers
- (TACs) and Mini-TACs,
-
- * Helps network users with technical problems involving hosts, and
-
- * Works with the Network Information Center and the Network Monitoring
- Centers to provide information and technical assistance.
-
- Each network node, or PSN, has a Node Site Coordinator (NSC). The Node Site
- Coordinator is the local site representative who has access control,
- accountability, and coordination responsibility for the DDN-owned network
- hardware, software, and circuits located at the node site.
-
- Occasionally, one person serves both roles. A Host Administrator or Node Site
- Coordinator may also designate an alternate who can assist with the
- administrative or technical demands of the position.
-
- To find the names, addresses, telephone numbers, and network mailboxes for
- these contacts, see Section 6.3.
-
-
- 9.4 Military Communications and Operations Command Contacts
-
- Each military department has designated an organization to serve as the
- primary DDN Point of Contact. Requests for information or assistance should
- be directed to the following organizations:
-
- Service Address Telephone DSN
-
- Air Force AFDDN PMO 1 (205) 279-4075/3290 446-4075
- Gunter AFS, AL 36224-6340
-
- Army OSAISC, AS-PLN-RF 1 (602) 538-6915 879-6915
- Fort Huachuca, AZ 85613-5000
-
- Navy COMNAVTELCOM, Code N521 1 (202) 282-0381/2 292-0381
- Washington, DC 20390-5290
-
-
-
-
-
- DRAFT [Page 94] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
- 9.5 Defense Information Systems Agency, Defense Network Systems
- Organization (DISA DNSO)
-
- [NOTE: The Defense Communications Agency, DCA, became the DISA in 1991;
- in the same year, the Defense Communications System Organization became
- the DNSO.]
-
- The Defense Information Systems Agency, Defense Network Systems Organization
- (DISA DNSO) is responsible for overall management of the Defense Data Network
- (DDN). DDN Newsletter 58, available online as DDN-NEWS/DDN-NEWS-58.TXT from
- the NIC.DDN.MIL host, contains the most current listing of DISA DNSO personnel
- and their areas of responsibility. Contact the NIC to ensure that this
- newsletter still reflects the most current information on DNSO staff contacts.
-
-
- 9.6 If You Have a Network Use Problem
-
-
- For Questions on: Contact:
-
- Terminal settings Host Administrator or User Representative
- Host login Host Administrator or User Representative
- MILNET TAC access Host Administrator for your primary MILNET host
- TAC login procedure Network Information Center
- TAC line problems TAC Node Site Coordinator or the Monitoring
- Center
- TAC phone numbers NIC TACNEWS program
- General DDN information Network Information Center
- Host line problems Respective Network Monitoring Center
-
-
-
-
-
-
-
-
-
-
-
-
-
- DRAFT [Page 95] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
- SECTION 10. BIBLIOGRAPHY
-
-
- Many of the manuals and documents listed below are cited in this Guide; others
- provide information that should be helpful to you as users of the DDN. When
- available, ordering numbers are given for items that can be ordered from the
- Defense Technical Information Center (DTIC) or from DISA. Hardcopies of some
- of these documents can be ordered from SRI International, Menlo Park, CA.
-
- If the NIC offers online versions, the filenames are shown in brackets.
-
-
- Cited References
-
- 1. TAC Users' Guide. DCAC 310-P70-74. 1988 June.
-
- 2. DDN Subscriber Interface Guide. Defense Data Network, Program Management
- Office, Defense Information Systems Agency, 701 S. Courthouse Rd,
- Arlington, VA 22204-2199. 1983. (AD-A132 877/2).
-
- 3. DeLauer, R.D., DoD Policy on Standardization of Host-to-Host Protocols for
- Data Communications Networks. Office of the Secretary of Defense,
- Washington, D.C., 1982 March. [IEN/IEN-207.TXT]
-
- 4. Carlucci, F. C., "Autodin II Termination," Memorandum for Secretaries of
- the Military Departments, Deputy Secretary of Defense, Washington, D.C.,
- 1982 April.
-
- 5. Defense Information Systems Agency, DDN Network Systems Organization.
- Defense Data Network Management Bulletin 76: "TAC User Registration
- Clarification." Menlo Park, CA. SRI International, 1990 August 24; DDN
- Mgt. Bul. 76, 1 p. [DDN-NEWS/DDN-MGT-BULLETIN-76.TXT]
-
- 6. RFC 1169, Explaining the Role of GOSIP. 1990 August. 15 p.
- [RFC/RFC1169.TXT.]
-
- 7. Defense Information Systems Agency, Defense Network Systems Organization.
- Defense Data Network Security Bulletin 9003: "Security Violation
- Reporting." Menlo Park, CA: SRI International, DDN Security Coordination
- Center; 1990 February 15; DDN Security Bul. 9003. 2 p.
- [SCC/DDN-SECURITY-9003]
-
- DRAFT [Page 96] DRAFT
-
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
- 8. RFC 1177, FYI on Questions and Answers: Answers to commonly asked "new
- internet user" questions. 1990 August. 24 p. (Also FYI 4)
- [RFC/RFC1177.TXT]
-
-
- Auxiliary User Documentation
-
- DEC-20 User's Manual. Digital Equipment Corporation, Maynard, MA, 1982.
-
- InfoMail Primer. DCAC 310-P70-70. 1986 May.
-
- InfoMail Reference Manual. DCAC 310-P70-71. 1986 June.
-
- InfoMail User Guide. Bolt Beranek and Newman Inc., Cambridge, MA, 1982.
-
- Mooers, Charlotte. The HERMES Guide. Bolt Beranek and Newman Inc.,
- Cambridge, MA, 1982.
-
-
- General References
-
- Bolt Beranek and Newman Inc. A History of the ARPANET: the First Decade.
- Report No. 4799, Defense Advanced Research
- Agency, Arlington, VA, 1981. [AD-A1115 440]
-
- Cerf, V. and Lyons, R. "Military Requirements for Packet-Switched
- Networks and Their Implications for Protocol
- Standardization." Computer Networks. 7(5):
- 293-306; 1983 October.
-
- Chou, W. (Ed.). Computer Communications: Principles.
- Englewood Cliffs, NJ: Prentice-Hall, Inc.;
- 1983.
-
- Comer, D.E. Internetworking with TCP/IP: Principles,
- Protocols, and Architecture. Englewood
- Cliffs, NJ: Prentice-Hall, Inc.; 1988.
- 382 p.
-
-
-
- DRAFT [Page 97] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
- DDN Defense Data Network Brochure. Defense Information Systems Agency,
- Defense Network Systems Organization, Washington, DC, 1984.
-
- DDN Protocol Handbook, 4 Volumes. SRI International (former DDN NIC), Menlo
- Park, CA. 1985.
-
- DDN Subscriber Security Guide. Defense Data Network, Program Management
- Office, Defense Information Systems Agency, Washington, D.C. 1983.
- [AD-A152 524]
-
- Frey, D.; Adams, R. !%@:: A Directory of Electronic Mail
- Addressing and Networks. Newton, MA:
- O'Reilly and Associates; 1989 August. 284 p.
-
- FYI 2; FYI on a network management tool catalog: Tools for monitoring and
- debugging TCP/IP internets and interconnected devices. 1990 April. 126 p.
- (Also RFC 1147) [FYI/FYI2.TXT]
-
- FYI 3; FYI on where to start: A bibliography of internetworking information.
- 1990 August. 42 p. (Also RFC 1175) [FYI/FYI3.TXT]
-
- Hinden, R., Haverty, J.
- and Sheltzer, A. "The DARPA Internet: Interconnecting
- Heterogenous Computer Networks with
- Gateways." Computer. 16(9): 38-48;
- 1983 September.
-
- Jennings, D.M., et al "Computer Networking for Scientists."
- Science. Vol 231: 943-950; 1986 February.
-
- LaQuey, T.L. (Ed.) Users' Directory of Computer Networks.
- Bedford, MA: Digital Press; 1990. 630 p.
-
- Network Protocol Implementations and Vendors Guide. SRI International (Former
- Network Information Center), Menlo Park, CA. 1990. [NETINFO/VENDORS-GUIDE.DOC]
-
- Partridge, C. (Ed.) Innovations in Internetworking. Norwood, MA:
- Artech House; 1988.
-
- Perry, D.G., et al The ARPANET and the DARPA Internet. Library
- Hi Tech. 6(2): 51-62; 1988 April.
-
- DRAFT [Page 98] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
- Quarterman, J.S. Matrix: Computer Networks and Conferencing
- Systems Worldwide. Bedford, MA: Digital
- Press; 1989. 719 p.
-
- Ubois, J. "Defense Data Network." National Defense.
- Vol.74: 33-35; 1990 February.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- DRAFT [Page 99] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
-
- SECTION 11. GLOSSARY
-
-
- acoustic coupler
- A type of modem that converts digital signals into sound for trans-
- mission through telephone lines and performs the reverse operation when
- receiving such signals. Acoustic couplers generally have cups into
- which the telephone handset is placed to make the connection.
-
- anonymous login convention
- Standard username (anonymous) and password (guest) that allows a user to
- log in within FTP for the purpose of retrieving an unprotected public
- access file.
-
- ARPANET
- Packet-switched network developed by the Defense Advanced Research
- Projects Agency.
-
- ASN Autonomous System Number. A number assigned by the NIC to an autonomous
- network that request connection to the Internet.
-
- backbone
- The nodes (PSNs), the TACs, and the telephone lines connecting them that
- form the core of the DDN.
-
- BBNCD
- Bolt Beranek and Newman, Inc., Communications Division; a major hardware
- and software developer for the DDN.
-
- bps Bits per second. The unit used for measuring line speed, i.e., the
- number of information units transmitted per second.
-
- case sensitive
- Software differentiation between uppercase and lowercase characters.
-
- CERT
- Computer Emergency Response Team, the DARPA-sponsored group responsible
- for coordinating many security incident response efforts.
-
-
-
- DRAFT [Page 100] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
- circuit-switched
- A type of network connection. A circuit-switched connection is a
- continuous electrical connection established between sending and
- receiving users for their exclusive use. The connection remains active
- until it is closed by the using parties.
-
- concentrator
- A gateway; that is, a computer that interconnects networks.
-
- connection
- An access path between two ports on a network, established for data
- transmission between the ports.
-
- CONUS
- Military acronym for the Continental United States.
-
- DARPA
- Defense Advanced Research Project Agency. The agency that created and
- administered the ARPANET.
-
- DCA DCSO
- Defense Communications Agency, Defense Communications System
- Organization; the group responsible for administering the DDN. (Now
- known as the Defense Information Systems Agency, Defense Network Systems
- Organization│DISA DNSO.)
-
- DDN Defense Data Network. The DoD long-haul, packet-switched computer
- communications network that includes the MILNET as one of its
- subnetworks.
-
- DIIS
- The DDN Installation Integration and Support task, which encompasses the
- NIC and its services.
-
- DISA DNSO
- Defense Information Systems Agency, Defense Network Systems
- Organization. Formerly the DCA DCSO (see above).
-
- DNS Domain Name System. The hierarchical, distributed database used for
- host name and address resolution that has replaced the need for a
- centralized host table.
-
- DRAFT [Page 101] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
- DoD Department of Defense.
-
- DRI Defense Research Internet. A network that will provide state-of-the-art
- internetworking services for the DoD. It is still in the planning
- stages.
-
- DSN Defense Switched Network. A proprietary Government telephone network.
-
- DTIC
- Defense Technical Information Center, Cameron Station, Alexandria,
- VA 22314. A depository for many DoD technical reports.
-
- FQDN
- Fully Qualified Domain Name. The complete hostname that reflects the
- domains of which the host is a part.
-
- FTP File Transfer Protocol. A network utility for copying files across the
- network; defined in RFC 959.
-
- FYI A "For Your Information" document, issued also as an RFC, that contains
- information of general interest to the Internet community.
-
- gateway
- A computer that interconnects networks.
-
- GOSIP
- Government Open Systems Interconnection Profile. A document that
- addresses the DDN's planned transition from TCP/IP protocols to OSI
- protocols.
-
- handle
- Unique character string identifier assigned to each entry in the NIC
- WHOIS database.
-
- host
- A computer connected to a PSN on the DDN.
-
- hostname
- A name that officially identifies each computer attached to the DDN.
-
- IMP Interface Message Processor; see PSN.
-
- DRAFT [Page 102] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
- INCC
- The Internet Control Center. The service center that provides help to
- Air Force concentrator users.
-
- InfoMail
- The electronic mail program developed by BBNCD.
-
- Internet
- The specific IP-based internetwork of which the DDN is a part.
-
- internetwork
- A network, such as the DDN, that consists of many interconnected
- networks.
-
- IP Internet Protocol. A DoD standard protocol that allows dissimilar
- hosts to connect to each other through the DDN, defined in RFC 791.
-
- IR Internet Registry. The function at the NIC that assigns official IP
- network numbers.
-
- Kermit
- An error-checking file-transfer protocol used to copy files from one
- computer to another. Also the name given to the public domain software,
- distributed by Columbia University, that supports this protocol.
-
- LAN Local Area Network. A network of directly connected machines usually
- located within 10 miles of one another.
-
- long-haul net
- A network spanning long geographic distances, usually connected by
- telephone lines or satellite radio links.
-
- mailbridge
- A gateway between the MILNET and the Internet, through which mail and
- other data passes.
-
- MIL STD
- Military Standard. The official military version of a specification.
-
- MILNET
- The DDN unclassified operational military network.
-
- DRAFT [Page 103] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
- modem
- A device that converts digital signals into analog signals (and back)
- for transmission over telephone lines (modulator/demodulator).
-
- MTAC
- Or Mini-TAC. A new, improved machine that allows remote network access
- in essentially the same manner as a TAC, but accommodates a wider
- variety of operating systems.
-
- NETINFO
- The name of the publicly accessible directory on the NIC.DDN.MIL host
- that stores many files of interest to users of the network.
-
- network
- The hardware, software, and connections needed to distribute the
- processing of data in a reliable and efficient manner and to enable
- users to exchange and share that data.
-
- NIC DDN Network Information Center, located at GSI headquarters in
- Chantilly, VA.
-
- NIC.DDN.MIL
- The hostname of the NIC host. Its network address is 192.112.36.5.
-
- NICNAME
- See WHOIS.
-
- NIC/Query
- A general information program on NIC.DDN.MIL.
-
- NMC Network Monitoring Center. The CONUS MILNET NMC is located at 701 S.
- Courthouse Rd., Arlington, VA 22204-2199. Others are located in Europe
- and Hawaii.
-
- NNSC
- The National Science Foundation's Network Service Center. The center
- that provides support for the NSFNet backbone. The NNSC also publishes
- the Internet Resource Guide.
-
- node
- On the DDN, a packet switch or PSN. A computer that handles network
- message traffic.
- DRAFT [Page 104] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
- NREN
- The National Research and Education Network, the planned high-speed
- national network that will provide a platform for research and
- educational networking efforts.
-
- NSC Node Site Coordinator. The local DDN contact responsible for node or
- TAC equipment.
-
- NSFNet
- The packet-switched network that is the backbone of much of the
- Internet.
-
- NSO Network Security Officer. The NSO is responsible for setting DDN
- security policy and overseeing its implementation.
-
- NTIS
- National Technical Information Service, U.S. Department of Commerce,
- Springfield, VA 22151, (703) 487-4650. A national depository for
- unclassified technical documents.
-
- OCONUS
- A military acronym for "Outside the Continental U.S."
-
- operating system
- Software that supervises and controls tasks on a computer.
-
- OSD Office of the Secretary of Defense.
-
- packet switching
- A data transmission system that uses addressed packets, and in which a
- communications channel is occupied only for the duration of the packet
- transmission.
-
- pathname
- A character string that fully identifies a file. Pathnames normally
- contain (or imply) device and/or directory names and a filename
- specification. FTP, TELNET, and electronic mail do not specify a
- standard pathname convention. Each user must follow the file naming
- conventions of the file systems he wishes to use.
-
-
-
- DRAFT [Page 105] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
- packet
- The basic unit of data transmitted over the DDN. Each packet contains
- a header, which consists of addressing and other control information
- and, optionally, any associated data destined for a network user
- process.
-
- POC Point of Contact.
-
- protocol
- Technical specifications governing the format and timing of information
- exchange between two communicating software processes.
-
- PSN Packet Switch Node. A store-and-forward packet switch (formerly called
- an IMP).
-
- RFC Request For Comment. A series of technical notes describing DARPA and
- DDN research and development, particularly in the areas of protocol
- design and internetworking. Available for anonymous FTP at NIC.DDN.MIL
- in directory RFC.
-
- SCC The Security Coordination Center, located at the NIC, that is
- responsible for collecting security-related information, cooperating
- with the NSO in security incident response, and issuing DDN Security
- Bulletins.
-
- server
- A process providing a generalized service to subscribing user processes.
- Server processes normally "listen" on a network address, ready to
- respond to an incoming service request. The FTP Server is such a
- process; it responds to file transfer requests from FTP users.
-
- SERVICE
- The name of the NIC's automatic mail server, SERVICE@NIC.DDN.MIL.
- Send a message to SERVICE@NIC.DDN.MIL with "Subject: HELP" for more
- information.
-
- session
- The time during which a connection remains open between a user and
- server port on a network. For example, in an FTP session, the end-user
- invokes FTP, names the server host he wishes to connect with, issues FTP
- commands, and logs off.
-
- DRAFT [Page 106] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
- SIG Special Interest Group. An online mailing group whose members exchange
- information on a particular topic.
-
- site Organization or facility where a host is located.
-
- SMTP
- Simple Mail Transfer Protocol. Defined in RFC 821.
-
- socket
- Logical address of a communications access point to a specific device or
- program on a host.
-
- SRI SRI International, Menlo Park, CA, former location of the DDN Network
- Information Center and early contributor to the development of the DDN.
-
- SunOS
- Sun Microcomputer Systems' proprietary UNIX-based operating system.
- The operating system used by the NIC host.
-
- TAC Terminal Access Controller. A special type of computer attached to a
- PSN. It allows direct terminal access to the DDN backbone.
-
- TAC Access Code
- Password assigned to MILNET TAC users for TAC login.
-
- TAC Userid
- Alphanumeric character string that identifies a TAC user upon TAC login.
-
- TACACS
- TAC Access Control System. A password system that limits use of TACs
- to authorized users.
-
- TACNEWS
- NIC program for reading DDN Newsletters, Bulletins, and other items of
- interest to TAC users.
-
- TCP/IP
- Transmission Control Protocol/Internet Protocol. DoD standard network
- protocols defined in RFC 793 (TCP) and RFC 791 (IP).
-
-
-
- DRAFT [Page 107] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
- TELNET
- A protocol for opening a transparent connection to a distant host;
- defined in RFC 854.
-
- terminal
- A communication device that lets a user send information to a computer
- by typing on a keyboard. It prints responses from the computer on paper
- or a screen.
-
- TIP Terminal Interface Processor. A predecessor of the TAC, serving a
- similar function. See TAC.
-
- UNIX
- An AT&T Bell Laboratories proprietary operating system that runs on
- large and small computers. It has become widely used in the scientific
- research and development community.
-
- user
- A human end-user or an automated user process authorized to access
- network services.
-
- WHOIS
- NIC program used to access the NIC electronic white pages database.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- DRAFT [Page 108] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
-
- APPENDIX A. NETWORK RESOURCES
-
-
- One of the questions new users frequently ask when they finally get access to
- the network is, "Now what? What's out there?" This section lists a few
- places you can look for more information about what is available to Internet
- users.
-
-
- Special Interest Groups
-
- An important part of the Internet are its many online Special Interest Groups
- (SIGs), which discuss topics ranging from artificial intelligence to Zenith
- PCs. A SIG is an electronic mailing list dedicated to the discussion of a
- particular topic. SIGs are a good way for a new user to learn more about the
- network. Anyone can contribute to a SIG by simply sending mail, and most SIGs
- are open for anyone to join. Information on network SIGs can be found in a
- file nicknamed the List-of-Lists, a master list of SIGs with a brief
- description of each group and how to join it.
-
- For users who have never done a file transfer before, this is a perfect first
- opportunity. You can use FTP to copy the List-of-Lists from the
- FTP.NISC.SRI.COM host by logging in with "USERID anonymous" and "PASSWORD
- guest" and using the pathname netinfo:interest-groups.
-
- Note that many individual hosts redistribute mail for their users--that is,
- mailing list messages or digests are delivered once to a single local mailbox,
- and then they are announced or forwarded to a list of interested local users.
- Mail redistribution eliminates the need for the local mailer to process myriad
- copies of the same message directed to different users and so conserves local
- computer resources. Before adding your name to a SIG distribution list, ask
- your Host Administrator or User Representative if SIG or digest mail is
- redistributed on your host or posted in a centralized place to be read by all
- local users.
-
- In addition, all traffic on the MILNET is subject to usage-sensitive billing,
- so before adding your name to a SIG, be sure that the mail traffic you would
- generate is consistent with the usage policies of your host.
-
-
-
- DRAFT [Page 109] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
- NNSC Internet Resource Guide
-
- The NSF Network Service Center (NNSC) compiles and makes available an Internet
- Resource Guide. The goal of the guide is to increase the visibility of
- various Internet resources that might help users do their work better. While
- not yet an exhaustive list, the guide is a useful compendium of many
- resources and can be very helpful to a new user.
-
- In the NNSC guide, resources are grouped into sections by type. Current
- sections include descriptions of online library catalogs, data archives,
- online white pages directory services, networks, network information centers,
- and computational resources such as supercomputers. Each entry contains the
- following information:
-
- * a description of the resource,
- * an identification of who can use the resource,
- * an explanation of how to reach the resource network via the Internet,
- * a list of contacts for more information.
-
- The NNSC distributes the list electronically. To receive a guide, or to get
- on a mailing list that alerts you when it is updated, send a message to
- RESOURCE-GUIDE-REQUEST@NNSC.NSF.NET.
-
-
- FYI Documents
-
- "FYIs" are a series of special RFCs. The FYI documents address information
- that is of general interest to the Internet user community. They do not
- define standards or contain protocol specifications. Rather, they address
- more general topics, provide insight into Internet conventions, answer
- commonly asked questions, contain background or historical information, or
- provide resource information such as bibliographies or descriptions of
- software. Some FYIs are addressed specifically to new users.
-
- Because FYIs are also RFCs, they are listed along with all the other RFCs in
- the RFC Index. However, the file FYI/FYI-INDEX.TXT on the NIC host lists only
- the FYIs. Each index notes both the FYI number and the RFC number of each
- FYI. You can obtain the FYI Index online by FTPing it or by requesting it
- through the SERVICE@NIC.DDN.MIL mail service. See Section 5.1.2 for FTP
- guidelines and Section 6.3.5 for directions on retrieving information via
- SERVICE. Hardcopies of RFCs are available from SRI International, Menlo Park,
- CA (the former NIC).
-
- DRAFT [Page 110] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
- NIC Contacts Files
-
- Often users need to communicate with the official Point of Contact (POC)
- responsible for a specific network or domain. While this information is
- available via the WHOIS program on the NIC host, as described in Section
- 6.3.1, the NIC also provides files that contain compilations of the contacts
- for domains and networks. These files are updated weekly and provide a
- central resource for useful domain and network POC information.
-
- * NETINFO/NETWORK-CONTACTS.TXT lists all assigned networks by number
- and lists the name of the network, plus the name, phone number, and
- electronic mailbox for each POC.
-
- * NETINFO/DOMAIN-CONTACTS.TXT is organized by domain name and lists the
- name, phone number, and electronic mailbox for each domain POC.
-
- With the network information sources and contacts just outlined and the tools
- introduced in the previous section, you are now ready to explore the network
- on your own.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- DRAFT [Page 111] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
- APPENDIX B. COMMONLY ASKED QUESTIONS
-
-
- Here are answers to some of the questions most commonly asked by users. The
- selections were made from questions addressed to the DDN Network Information
- Center. (See Section 6.1 for NIC network and U.S. mail addresses.)
-
-
- 1. I want to send mail to my colleague, John Smith. What is his network
- mailbox?
-
- Answer:
- The NIC provides an online program called WHOIS (or NICNAME) that
- contains the names, addresses, phone numbers, and online mailboxes of
- many network users. Since some Host Administrators install this program
- on their host, you should ask him/her if it is available locally.
- Alternatively, you may make a TELNET connection to NIC.DDN.MIL and use
- the WHOIS program running on the NIC host. (Login to NIC.DDN.MIL is not
- required.) The WHOIS program may also be accessed via electronic mail.
- Send a message to SERVICE@NIC.DDN.MIL and include the word WHOIS and the
- item you wish to search for in the subject line of your message. You
- will receive an answer overnight. For more information on using SERVICE,
- see Section 6.3.5.
-
-
- 2. This TAC phone number doesn't work. What should I do?
-
- Answer:
- The Network Information Center can test the TAC from our site to
- determine if the problem is in the TAC or if it relates to your equipment
- or the procedure you are using. If the problem is the TAC, we can give
- you phone numbers for other TACs. We can help you coordinate with the
- MILNET Monitoring Center to report the TAC problem.
-
-
- 3. I will be traveling and need to log in to read my mail. How can I find
- a TAC phone number to use while I'm on the road?
-
- Answer:
- You can locate TAC phone numbers in several ways. The back of your TAC
- card lists many of them. The TACNEWS program available on the
-
- DRAFT [Page 112] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
-
- NIC.DDN.MIL host has a menu option that will show you the three TACs
- closest to a phone number you provide. TACNEWS also provides lists of
- phone numbers for TACs both within and outside the U.S. See Section
- 6.3.3 for an example of TACNEWS usage. In addition, if you call the NIC
- Help Desk, we will be happy to provide you with phone numbers of TACs.
-
-
- 4. What is the difference between the MILNET and the DDN?
-
- Answer:
- The MILNET is a wide area network that constitutes one subnetwork of the
- DDN. The MILNET carries unclassified operational data. It is the
- segment of the DDN that is connected to the Internet. The other
- subnetworks of the DDN carry classified information and are standalone
- networks.
-
-
- 5. What is the difference between the MILNET and the Internet?
-
- Answer:
- The Internet is a collection of TCP/IP-based wide area and local area
- networks that are interconnected by various gateways so that users on one
- network can communicate to users on any of the other networks. (In
- addition, some non-TCP/IP-based networks, such as BITNET, are accessible
- to Internet users via electronic mail. These networks are usually not
- strictly considered a part of "the Internet.") The MILNET is a wide area
- network that is connected to the Internet via several gateways called
- mailbridges.
-
-
- 6. I see a connection on my host from a network number I don't recognize.
- How can I find the number of someone to contact on that network to check
- on this connection?
-
- Answer:
- Every IP network number assigned by the Internet Registry at the NIC has
- a registered Point of Contact (POC) who is responsible for that network.
- To find a particular POC, you can look up the number of the network via
- the NIC's WHOIS program. Search only on the network portion of the
- number and type the local portions as zeroes. (See Section 8.4 for a
- brief explanation of network addressing. See Section 6.3.1 for how to
-
- DRAFT [Page 113] DRAFT
-
-
-
-
-
-
- NIC 60001, September 1991 DDN New User Guide
-
- use WHOIS.) In addition, the NIC provides a publicly accessible,
- regularly updated file that lists all the POCs for each network number
- assigned. The file is NETINFO/NETWORK-CONTACTS.TXT. The POC information
- is listed by network number.
-
- 7. How do I get a TAC card?
-
- Answer:
- Before you can get a TAC card, you must have an account on a host. Then
- the Host Administrator of a MILNET host (that is, a host whose address is
- on network 26) must approve a TAC card for you. See Section 4 for a more
- complete explanation of TAC cards and TAC usage.
-
- 8. What is an RFC?
-
- Answer:
- As RFC 1177 [8] explains, the Request for Comments documents (RFCs) are
- working notes of the Internet research and development community. A
- document in this series may be on essentially any topic related to
- computer communication, and may consist of anything from a meeting report
- to the specification of a standard. Most RFCs are descriptions of
- network protocols or services, often giving detailed procedures and
- formats. These RFCs generally provide information in sufficient
- technical detail to enable developers to create implementations. Other
- RFCs report on the results of policy studies or summarize the work of
- technical committees or workshops. Currently, all Internet standards
- are published as RFCs, but not all RFCs are standards. RFCs are publicly
- available on the NIC.DDN.MIL host. Indexes of RFCs organized by number
- (in reverse order with the most current RFC at the top), by author, or by
- title are available from the NIC as well.
-
-
- 9. May I be registered in the WHOIS database?
-
- Answer:
- Any TAC user must be registered with the NIC. In addition, any other
- network user can be added to the WHOIS database if he has a working
- network mailbox. Information regarding a registered user, such as his
- address and network mailbox, is visible via the WHOIS program. Thus,
- WHOIS acts as a "white pages" directory of network users, enabling other
- users to ascertain where to send mail to them. To register in the
- database, fill out the template provided in Section 6.2.1 and return it
- online to REGISTRAR@NIC.DDN.MIL. The NIC depends on users to send
- updated information whenever their addresses or mailboxes change.
-
- DRAFT [Page 114] DRAFT
-
-
-
-