Network Reading List: TCP/IP, UNIX, and Ethernet Charles Spurgeon UTnet Network Information Center University of Texas at Austin Document Version 4.0 June, 1993 Copyright (c) 1993. Permission to copy without fee all or part of this material is granted provided that the copies are not made or distributed for direct commercial advantage. Copies must show the University of Texas at Austin as the source, and include this notice. Abstract This annotated list of resources is intended for network managers, developers, and users at the University of Texas at Austin, or anywhere that TCP/IP, UNIX, and Ethernet are used to provide computer communications.* These three net- working technologies share the same major attribute: they can be used to build interoperable network systems across a wide range of computer equipment. Because of their ability to provide the glue that holds networks together, TCP/IP, UNIX, and Ethernet are in wide use on campus and at many other sites. *UNIX is a registered trademark of AT&T. Introduction This annotated list of resources was created to help you find information about TCP/IP, UNIX, and Ethernet. The list describes a number of items that cover the range from intro- ductory to in-depth information. This list is not comprehensive; instead it tries to describe those items that cover the territory well, and that deal with real-world problems found on growing networks. This list is not current, either; the amount of literature in this field is large and growing every day. Why These Three Technologies? The three technologies featured in this list are in wide use on campuses, at research centers and corporations, and at a rapidly growing number of sites worldwide. The popularity of TCP/IP, UNIX, and Ethernet is largely due to the vendor- neutral character of these technologies, which helps make interoperable networking possible. All three technologies are "open" in that the software and specifications are readily available. The TCP/IP protocols were developed with public funding and are in the public domain. UNIX is provided by a wide range of vendors and has included support for TCP/IP protocols and Ethernet for many years. The specification for Ethernet was published by a multi-vendor consortium and has since become a world-wide standard. Any vendor can develop products based on these three widely available technologies, and many have. This openness is the key to the network interoperability that these technologies provide. While there is no precise definition of network interopera- bility, it is often taken to mean a set of computers of widely varying types that are capable of working well together. In an interoperable network system you can get your work done across a range of computer systems linked by a common set of standard network protocols, network software, and network hardware. In the network computing environment on campus today you will find equipment in use that comes from a wide variety of computer vendors. In such an environment interoperability isn't just a desirable feature, it's essential to the opera- tion of the network system. Another common feature of today's networks is their growth and increasing complexity. TCP/IP, UNIX, and Ethernet have proven their ability to adapt as networks evolve and more and more users are added. These technologies make it possible to build large networks that are both reliable and fast, and that can support thousands of users. Organization The list was designed to be as self-contained as possible, and to make it easier for you to decide whether you want to follow up on a given resource. ISBN book numbers are shown to make it easier to find and order the books listed here. Prices are included when available, quoted in US dollars. The prices should be treated only as a rough guide however, since they may have changed by the time you read this list. Comments, corrections, etc. are welcome and may be sent to rlist@utexas.edu. Section 1: TCP/IP Section 1 This is Section 1 of a four-section document entitled "Net- work Reading List: TCP/IP, UNIX, and Ethernet." The four sections of this annotated list of resources were created to help you find information about TCP/IP, UNIX, and Ethernet. The complete list describes a wide range of items, including both introductory and in-depth information. Section 1 covers TCP/IP resources, Section 2 covers UNIX, Section 3, Ethernet, and Section 4, miscellaneous items. 1. TCP/IP A major advantage of the TCP/IP protocol suite is that it is widely implemented in many computer systems. This makes it possible for network managers to use TCP/IP protocols to link computers from many vendors. The TCP/IP protocol suite is a set of network standards ori- ginally developed for the Advanced Research Projects Agency (ARPA), of the US Department of Defense. This development led to the creation of the ARPANET which, in turn, led to the system of national and international networks known as the Internet. In the US the Internet connects regional net- work systems, and the regional networks link university cam- puses, corporate sites, etc. This system of IP networks allows you to send electronic mail, transfer files, and log into computers no matter where they are located, as long as they are attached to the Internet. The formal network standards for the TCP/IP protocol suite are available as a set of documents known as Request for Comments (RFCs). The RFCs contain a wealth of material, and some RFCs are written specifically to provide tutorial information on the TCP/IP protocol suite. However, most of the RFCs are technical specifications and do not contain introductory material to help the newcomer. Also, the details of managing a TCP/IP network are not covered in the formal network protocol specifications. To help fill in the gaps, this section begins with a look at some books that explain how things work. It also includes several guides to the worldwide network system that has grown up around the TCP/IP protocols. 1.1. Guides to the Internet +o The Internet Companion Tracy LaQuey with Jeanne C. Ryer 1993, Addison-Wesley, 196 pps with index and bibliogra- phy Page 1 Network Reading List Section 1: TCP/IP ISBN 0-201-62224-6 $10.95 An excellent beginner's guide to the global Internet. Writ- ten for a general audience, this guide provides an overview of the Internet as well as a briefing on the major services provided on the Internet. An appendix provides a number of useful resources including a list of public access systems that provide individual accounts for access to the Internet. The text of this book is being made available on the Inter- net, two chapters a month. You can FTP them from world.std.com in the pub/OBS/The.Internet.Companion direc- tory. From the Preface: "We will tell you why you need to know about the Internet and show you how people are already using it in their every- day activities. We'll explain how it vitalizes your home or office workstation beyond the usual capacities of word pro- cessing, games, and spreadsheet applications. And we'll introduce you to basic Internet concepts and applications-- showing how it's possible to travel electronic highways and reach destinations such as Australia or Switzerland in mere seconds. If you're not already connected to the Internet, we'll show you how you can get access with only a computer and a modem." +o The Whole Internet User's Guide and Catalog Ed Krol O'Reilly & Associates, Petaluma, CA, 1992. 376 pps. with index and annotated resource guide. ISBN 1-56592-025-2 $24.95 The best general guide to the territory of the Internet. Ed Krol's book functions both as a tutorial on the basic Inter- net services and as a travel guide to a wide range of resources that can be found on the networks. Krol also discusses several of the newer information finding services such as the Internet Gopher, the Wide Area Information Server (WAIS), and the World-Wide Web (WWW). The book's audience is the general computer user, which means that you don't have to be a programmer or networking guru to benefit from the wide range of material in this book. Included is an excellent chapter that provides a step by step approach to dealing with network problems and figur- ing out why things may not be working correctly. Also included is the Whole Internet Catalog which provides an alphabetic list of Internet resources from Aeronautics and Astronautics to Zymurgy. Network Reading List Page 2 Section 1: TCP/IP From Chapter One: "In particular, here's what we will cover: -o- How to log on to other computers on the Internet (tel- net). (...) -o- How to move files from one computer to another (ftp). (...) -o- How to send electronic mail to other people who use the Internet. (...) -o- How to read and participate in group discussions (USENET news). (...) -o- How to find where various network resources, ranging from people to software to general databases, are located ("white pages," archie, gopher, WAIS, World-Wide Web). One of the Internet's problems is that it's too rich; there are so many resources available, it's hard to find what you want, or to remember where what you want is located. A few years ago, the network was like a library without a catalog. The "cataloging" tools are just now being put into place. We'll tell you how to use some new and exciting tools (and some older, less-exciting tools) to locate almost anything you might possible want, ranging from people and software to sociological abstracts and fruit-fly stocks." +o Cruise of the Internet Merit Network, Inc. Merit is a non-profit consortium of state-supported univer- sities in Michigan. The Merit Network Information Center has produced a computer-based guided tour of the Internet that runs on both Mac and DOS computers. You can use anonymous FTP to copy the files from host ftp.merit.edu in directory internet/resources/cruise.mac or internet/resources/cruise.dos Use the "bin" setting in FTP when copying the files to make sure that they remain in their original format. Instructions for using anonymous FTP can be found in the access to resources in Section 4. From the README file: Merit's "Cruise of the Internet" is a computer-based tutorial for new as well as experienced Internet "navi- gators." The Cruise will introduce you to Internet resources as diverse as supercomputing, minorities, multimedia, and even cooking. It will also provide information about the tools needed to access those resources. The Cruise is designed to run on either Macintosh or DOS-compatible computers that meet the following specifications: Page 3 Network Reading List Section 1: TCP/IP Mac - A Macintosh II, LC or Quadra series computer - 8-bit color and any color monitor (12" minimum) - System 6.05 or 7.x - Approximately 3 MB of disk space - 4 MB RAM is recommended" DOS - An IBM-DOS or DOS-compatible computer - XGA- or XGA-compatible adapter set to display 256 colors at 640x480 - Microsoft Windows(TM) version 3.1 running in enhanced mode - Approximately 1.5 MB of disk space - 2 MB RAM minimum If you can't get the Cruise directly from the online archive, you have one other option. The Cruise is available on 1.44MB HD diskettes for both DOS and Mac for $10.00 per copy. Send your name and address, specify the operating system, and include a check or money order (payable to "University of Michigan") or your VISA/MasterCard number (including the expiration date and your signature) to: Merit Network, Inc. Information Services 2901 Hubbard, Pod G Ann Arbor, MI 48105 +o Tour of the Internet HyperCard Stack The NSF Network Service Center (NNSC) This guide is based on HyperCard, a program that runs on Macintosh computers. The guide includes a large amount of information on both the structure and the content of the Internet. The set of cards in this HyperCard stack contain information on subjects ranging from the networks that make up the Internet, to how to find a variety of specific ser- vices available via the Internet. The HyperCard stack includes a section reserved for local information on your network. This allows you to customize the stack for use at your site. From the README file: "The NSF Network Service Center (NNSC), a project of the Laboratories business unit of the Systems and Technologies Division, has developed a Tour of the Internet in HyperCard (TM) format for novice network users. The stack has basic information including history, sample email, ftp, and telnet sessions, and a glossary. The Tour is intended to be a fun and easy way to learn about the Internet." Network Reading List Page 4 Section 1: TCP/IP "We have included a 'Local Info' section as part of the Tour. This section is a place where an organization can add information relevant to its own group of users, for example a listing of resources at that site, or other, specialized information." "In order to run this stack, you need to have HyperCard 2. HyperCard 2 requires Macintosh system 6.0.5 or higher." Access Information for Internet Tour The Internet Tour HyperCard stack is available via anonymous FTP from host nnsc.nsf.net in the internet-tour directory. The file Internet-Tour-README contains instructions on how to retrieve the HyperCard stack and convert it into a Hyper- Card file on your Macintosh. Instructions for using anonymous FTP can be found in the access to resources in Section 4. An alternative method of access is to use the CSNET INFO- SERVER as described in the following excerpt from the README file: (1) Send a message to 'INFO-SERVER@sh.cs.net'. You do not need a subject field. The text of your message must be in a special format (this is very important), but it does not matter whether the letters are uppercase or lowercase. REQUEST: nsfnet topic: INTERNET-TOUR TOPIC: HELP request: end ``Request: nsfnet'' tells the Info-Server to look for the topics in the NSFNET section of the Info-Server. ``Topic:internet-tour'' orders BOTH of the files about the tour, ``Internet-Tour-readme'' and ``Internet- Tour.sit.hqx''. ``Topic: help'' orders a file with information about other NSFNET files in the CSNET Info-Server. (2) If you want to order ONLY the file ``Internet- Tour.sit.hqx'', put the following request in the text of your message: request: NSFNET topic: internet-tour.sit.hqx REQUEST: end 1.2. Electronic Mail and the Internet +o !%@:: A Directory of Electronic Mail Addressing and Networks Page 5 Network Reading List Section 1: TCP/IP Third edition due June 1993 Donnalyn Frey and Rick Adams. O'Reilly & Associates, Petaluma, CA, 1989. 420 pps. with three-way index. ISBN 1-56592-031-7 $27.95 This directory describes how to use electronic mail. The first section of the book contains a general description of the format and peculiarities of electronic mail addressing. The next section, the major portion of the book, contains brief descriptions of many of the worldwide networks. Each network description includes an explanation of the elec- tronic mail addressing in use, contact information, and a map of the network. As a quick desk reference for the har- ried network manager who is trying to unravel tangled elec- tronic mail messages, there's nothing better. From the preface: "If you routinely send electronic mail, this book will pro- vide you with up-to-date, concise information on the major electronic mail networks around the world. If you are an administrator or network manager, your users can use this book to find information on networks themselves, without asking you." "Assume you need to know how to contact someone in Iceland who you met at a conference. You can use this book by turn- ing to the three-way index and looking up Iceland to find ISNET, the network in Iceland. Next you turn to the section of the book on ISNET and read who participates in the net- work and how to address mail. Then you can look up an indi- vidual university or company in the alphabetical index of second-level domain addresses to help you create a working electronic mail address for your correspondent. You can also send electronic mail to the contact person for ISNET, listed under Contact, and ask how you might find an address for your colleague in Iceland." 1.3. TCP/IP Network Administration +o TCP/IP Network Administration Craig Hunt 1992, O'Reilly & Associates, Petaluma, CA ISBN 0-937175-82-X $29.95 A guide to TCP/IP administration that collects all the bits and pieces of network administration in one place. The topics in the book range from the basics of TCP/IP protocols and how to set up a TCP/IP address on your machine, to Network Reading List Page 6 Section 1: TCP/IP configuration of name service, mail service, and routing. The target machine is a UNIX system running System V or SunOS. From the Preface: "This book is intended for everyone who has a UNIX computer connected to a TCP/IP network. This obviously includes the network managers and the system administrators who are responsible for setting up and running computers and net- works, but the audience also includes any user who wants to understand how his or her computer communicates with other systems. The distinction between a "system administrator" and an "end-user" is growing increasingly fuzzy. You may think of yourself as an end-user, but if you have a UNIX workstation on your desk, you're probably also involved in system administration tasks." Contents include: - overview of TCP/IP - delivering the data - name service concepts - getting started - basic configuration - configuring the interface - configuring routing - configuring DNS name service - network applications - sendmail - troubleshooting TCP/IP - network security - other sources of information - appendixes include: network contacts, forms, a gated reference, named reference +o Introduction to Administration of an Internet-based Local Network Charles L. Hedrick. 1988, Rutgers, The State University of New Jersey. 46 pps. No index. Available via anonymous FTP from host cs.rutgers.edu in the runet subdirectory. The file is called tcp-ip- admin.doc and a PostScript version is available as tcp-ip-admin.ps Instructions for using anonymous FTP can be found in the access to resources in Section 4. This is a tutorial written by Charles Hedrick in July 1988, and intended for network managers faced with the task of setting up a campus network system based on TCP/IP proto- cols. The illustrations are limited to ASCII graphics, and there is no index, but nonetheless the information in this brief guide can be very helpful when it comes to unraveling the issues involved in the complex tangle of network Page 7 Network Reading List Section 1: TCP/IP addressing, network routing, network topologies, and network hardware. Of special interest is the discussion of network repeaters, bridges, and routers, in which Hedrick describes the main features of each, and contrasts their function and utility in the creation of large network systems. From the Introduction: "This document is intended to help people who are planning to set up a new network based on the Internet protocols, or to administer an existing one. It assumes a basic familiar- ity with the TCP/IP protocols, particularly the structure of Internet addresses." "This document does not attempt to replace technical docu- mentation for your specific TCP/IP implementation. Rather, it attempts to give overall background that is not specific to any particular implementation. It is directed specifi- cally at networks of "medium" complexity. That is, it is probably appropriate for a network involving several dozen buildings. Those planning to manage larger networks will need more preparation than you can get by reading this docu- ment." +o The Simple Book An Introduction to Management of TCP/IP-based Internets Marshall T. Rose 1991, Prentice Hall, Englewood Cliffs, New Jersey, 384pps with index and bibliography. ISBN 0-13-812611-9 $54.00 As the TCP/IP Internet has grown, the problem of how to manage the network system has grown as well. The approach to network management that has evolved for TCP/IP is based on the Simple Network Management Protocol (SNMP), described in this, The Simple Book. Marshall Rose is an expert in the field and has been involved in the standards process that led to the adoption of SNMP. The Simple Book explains how the SNMP protocols work, and how they are organized. Marshall Rose candidly discusses the politics of standards development, and includes some pithy observations on this subject between the "soapbox" icons in the book's margins. From the Preface: "This book is intended to serve both as a graduate-level text and also as a professional reference. It is expected that the reader has a modest background in networking." Network Reading List Page 8 Section 1: TCP/IP "The first part of the book, Chapters 1 and 2, presents a brief history of networking and the need for network manage- ment. Following this, the Internet suite of protocols is examined. Since this is a book about managing TCP/IP-based internets, many of the management details can make sense only in the presence of a discussion of the protocols and systems being managed. The text tries to present a "detailed introduction." That is, the level of information must be deep enough so that management issues can be explored later on, but not too detailed so as to dwell on the nuances of each protocol." "The second part of the book, Chapters 3 through 5, details the Internet-standard Network Management Framework. In par- ticular, the Structure of Management Information (SMI) and the Management Information Base (MIB) are thoroughly explored, followed by the mechanism used to manage inter- nets, the Simple Network Management Protocol (SNMP)." "The third part of the book, Chapter 6, briefly introduces the policies used to manage internets. The actual policies (as opposed to mechanical aspects) of network management are currently poorly understood, so only a basic coverage can be presented at this time." "The fourth part of the book, Chapter 7, gives an overview of an actual implementation, the 4BSD/ISODE SNMP package. Both an agent and manager implementation will be examined, along with a common Applications Programmer's Interface (API)." "Finally, as the book concludes, future trends are identi- fied in Chapter 8. In the appendices, the book contains a chapter on Internet management "lore" (commonly asked ques- tions and answers), various lists of object assignments and definitions, and so on. In addition, ordering information for ISODE is given." 1.4. The Request for Comments (RFCs) A major advantage of the TCP/IP protocol suite is that the formal protocol standards are readily available. The stan- dards documents that describe the protocols are freely available over the Internet, or they can be purchased in hard copy form. These standards are known as Request for Comments, or RFCs. The origin of the name is described in RFC 1000. RFC 1000 describes the evolution of the RFCs, beginning with the ori- ginal protocol developers who, being graduate students and faced with the need for publishing the evolving technical specifications, chose to call the documents Request for Page 9 Network Reading List Section 1: TCP/IP Comments so as not to offend anyone who might be in charge of the newly chartered ARPANET. Most of the RFCs are still available, and the entire set of RFCs provides a rare look at the evolution of a major protocol suite. The Internet is still evolving, and RFCs are still being written to guide, codify, and explain this evolution. Some of the RFCs are purely informative in nature, aimed at the newcomer to TCP/IP networking, or intended to help program- mers implement the standards correctly. When looking for an RFC be sure to check the RFC index for the latest version, since RFCs are updated when changes are needed. The RFCs are available electronically by way of the File Transfer Program (FTP), as well as by electronic mail. Both of these methods are described below. Hard copies of the RFCs are also available from SRI International as described below. 1.4.1 Some Useful RFCs The books by Douglas Comer and Marshall Rose contain guides to the RFCs, listed by category, and these guides can pro- vide a handy navigational aid through the sea of specifica- tions. As of this writing there are over 1,450 RFCs listed in the RFC index, and it's impossible to describe even the most important ones here. Instead, listed next are some examples of RFCs written as purely informative documents as well as some RFCs describing essential numbers used in the TCP/IP protocols. +o RFC1462, FYI on What "This FYI RFC answers the question, "What is the Internet?" and is produced by the User Services Working Group of the Internet Engineering Task Force (IETF). Containing a modi- fied chapter from Ed Krol's 1992 book, "The Whole Internet User's Guide and Catalog," the paper covers the Internet's definition, history, administration, protocols, financing, and current issues such as growth, commercialization, and privatization." +o RFC1359, Connecting to the Internet: What connecting institutions should anticipate. "This FYI RFC outlines the major issues an institution should consider in the decision and implementation of a campus connection to the Internet. In order to provide clarity to the reader, some specific information has been detailed. In doing so, the document has been directed toward U.S. academic institutions that Network Reading List Page 10 Section 1: TCP/IP have not yet connected to the Internet. However, the issues for which specific information has been provided can be generalized for any organization that wishes to participate in the world-wide Internet community. It will be necessary for those organizations to obtain the correct and detailed information from their local or national IP service providers. In addition, this document may be used as an evaluation checklist for organizations that are currently connected. Readers are expected to have general familiarity with networking concepts and terminol- ogy." +o RFC1244, Site Security Handbook A comprehensive list of the issues to be considered when developing computer and network security policy at your site. Includes a brief description of each issue, as well as a guide to security-oriented mailing lists and software. Also includes an annotated bibliography of other resources for information on security issues. +o RFC1208, A Glossary of Networking Terms A relatively short glossary produced to help a newcomer to networking find their way around the special jargon and acronyms used in the networking industry. +o RFC1207, Answers to Commonly Asked `Experienced Inter- net User' Questions This is one of two RFCs called "Questions and Answers," pro- duced by the User Services Working Group of the Internet Engineering Task Force. This set of Questions and Answers focuses on the sort of questions that might be asked by someone with experience using the Internet. +o RFC1325, Answers to Commonly Asked `New Internet User' Questions The companion RFC to RFC1207. This set of Questions and Answers focuses on the sort of questions that might be asked by someone new to the Internet. +o RFC1175, Where to Start: A Bibliography of Internet- working Information. This 42-page RFC contains an extensive bibliography on TCP/IP and the Internet, including several of the resources listed here. Also included is a list of conferences and workshops of interest to those in the field, as well as a set of newsletters on the subjects of TCP/IP and the Page 11 Network Reading List Section 1: TCP/IP regional network systems. +o RFC1173, Responsibilities of Host and Network Managers: A Summary of the Oral This short (5 page) RFC attempts to fill in some gaps by providing operational guidelines for network managers and host system managers. As noted in the title, the guidelines presented here are of the sort that "everybody knows" but that are rarely documented. +o RFC1178, Choosing a Name for Your Computer This short RFC provides some guidelines that can help ease the task of choosing a reasonable network name for your com- puter. +o RFC1118, Hitchikers Guide to the Internet This 24 page RFC is an informal guide to the basic concepts and the jargon of the TCP/IP Internet, intended for newco- mers to TCP/IP. +o RFC1402, There's Gold in them thar Networks! or Search- ing for Treasure in all the Wrong Places. An RFC written to help network users navigate among the many sources of information in the Internet. From the RFC: "This document was presented at the 1991 ACM SIGUCCS User Services Conference. It appears here in its updated form. There is a wealth of information on the network. In fact, so much information that you could spend your entire life browsing. This paper will present some of the "gold nuggets" of information and file repositories on the network that could be of use to end users. The ultimate goal is to make the route to these sources of information invisible to the user. At present, this is not easy to do. I will explain some of the techniques that can be used to make these nuggets easier to pick up so that we can all be richer." +o RFC1360, Official Protocol Standards This RFC is the most recent version of the Official Protocol Standards. This frequently updated RFC describes the TCP/IP standards creation process, as well as listing the RFCs that are the officially recognized TCP/IP standards. +o RFC1340, Assigned Numbers Network Reading List Page 12 Section 1: TCP/IP The most recent version of the Assigned Numbers RFC as of this writing. The Assigned Numbers RFC contains a descrip- tion of the IP addressing fields as well as lists of all the essential numbers used in various parts of the protocol suite. This RFC also contains a list of Ethernet numbers of interest to anyone managing Ethernets. When looking for a copy of the Assigned Numbers RFC make sure to get the most recent version, as this RFC is periodically updated. +o RFC1180, A TCP/IP Tutorial A brief description of the basic structure of the TCP/IP protocol suite and how it works. Includes a description of sending TCP/IP datagrams over Ethernet networks, and how the ARP protocol is used to build links between IP and Ethernet addresses. +o RFC1147, FYI on a Network Management Tool Catalog: Tools for Monitoring and Debugging TCP/IP Internets and Interconnected Devices This RFC is a large collection of tools for network manage- ment, including sources for public domain software for net- work testing and troubleshooting. The RFC includes a net- work management tutorial that describes some of the basic concepts of networking monitoring and management. A handy guide to a rapidly growing area. +o RFC1122, Requirements for Internet Hosts - Communica- tion Layers RFC1123, Requirements for Internet Hosts - Application and Support These two "Host Requirements" RFCs provide the latest guide- lines and interpretations for the TCP/IP protocols. Together they represent the latest understanding of how the protocol suite functions, as well as providing corrections and expanded information for many of the prior RFCs. These two documents are essential companions to the RFCs that are listed as standards for the TCP/IP protocol suite. +o RFC 1000, The Request For Comments Reference Guide This 149 page RFC contains an annotated guide to the first 1000 RFCs, along with a brief history of the origins of the RFCs. 1.4.2 Electronic Mail and FTP Access to the RFCs The RFCs and several other documents in this guide may be retrieved using the TCP/IP-based File Transfer Program (FTP). If your computer supports the FTP program, and you Page 13 Network Reading List Section 1: TCP/IP have direct access to the Internet, you may retrieve such documents via the "anonymous FTP" process as described in the access to resources in Section 4. The RFCs listed above, and many more, are also available via e-mail for those without a direct Internet connection. One source of information for both FTP and electronic mail access to the RFCs is a mail server located at isi.edu. To get information on using the ISI mail server send a message to mail-server@isi.edu with the world "help" in the message body. Do not use quotation marks in the message you send, just the word "help" by itself. To find a location for retrieving copies of the RFCs send a message to mail-server@isi.edu with the command "help: ways_to_get_rfcs" in the message body. Once again, do not include the quotation marks. In reply you will be sent a file that lists a large number of sites that provide on-line access to the RFCs and many other documents. Here are some excerpts from that document: Where and how to get new RFCs RFCs may be obtained via EMAIL or FTP from many RFC Repositories. The Primary Repositories will have the RFC available when it is first announced, as will many Secondary Repositories. Some Secondary Repositories may take a few days to make available the most recent RFCs. Primary Repositories: RFCs can be obtained via FTP from DS.INTERNIC.NET, NIC.DDN.MIL, FTP.NISC.SRI.COM, NIS.NSF.NET, NISC.JVNC.NET, VENERA.ISI.EDU, WUARCHIVE.WUSTL.EDU, SRC.DOC.IC.AC.UK, or FTP.CONCERT.NET. 1. DS.INTERNIC.NET - InterNIC Directory and Database Services RFC's may be obtained from DS.INTERNIC.NET via FTP, WAIS, and electronic mail. Through FTP, RFC's are stored as rfc/rfcnnnn.txt or rfc/rfcnnnn.ps where 'nnnn' is the RFC number. Login as "anonymous" and provide your e-mail address as the password. Through WAIS, you may use either your local WAIS client or tel- net to DS.INTERNIC.NET and login as "wais" (no password required) to access a WAIS client. Help information and a tutorial for using WAIS are available online. The WAIS database to search is "rfcs". Network Reading List Page 14 Section 1: TCP/IP 2. NIC.DDN.MIL (aka DIIS.DDN.MIL) RFCs can be obtained via FTP from NIC.DDN.MIL, with the pathname rfc/rfcnnnn.txt (where "nnnn" refers to the number of the RFC). Login with FTP username "anonymous" and password "guest". 3. FTP.NISC.SRI.COM RFCs can be obtained via FTP from FTP.NISC.SRI.COM, with the pathname rfc/rfcnnnn.txt or rfc/rfcnnnn.ps (where "nnnn" refers to the number of the RFC). Login with FTP username "anonymous" and password "guest". To obtain the RFC Index, use the pathname rfc/rfc- index.txt. SRI also provides an automatic mail service for those sites which cannot use FTP. Address the request to MAIL-SERVER@NISC.SRI.COM and in the body of the message indicate the RFC to be sent: "send rfcNNNN" or "send rfcNNNN.ps" where NNNN is the RFC number. Multiple requests may be included in the same message by listing the "send" commands on separate lines. To request the RFC Index, the command should read: send rfc-index. 4. NIS.NSF.NET To obtain RFCs from NIS.NSF.NET via FTP, login with username "anonymous" and password "guest"; then connect to the directory of RFCs with cd /internet/documents/rfc. The file name is of the form rfcnnnn.txt (where "nnnn" refers to the RFC number). For sites without FTP capability, electronic mail query is available from NIS.NSF.NET. Address the request to NIS-INFO@NIS.NSF.NET and leave the subject field of the message blank. The first text line of the message must be "send rfcnnnn.txt" with nnnn the RFC number. 5. NISC.JVNC.NET RFCs can also be obtained via FTP from NISC.JVNC.NET, with the pathname rfc/RFCnnnn.TXT.v (where "nnnn" refers to the number of the RFC and "v" refers to the version number of the RFC). JvNCnet also provides a mail service for those sites which cannot use FTP. Address the request to SENDRFC@JVNC.NET and in the subject field of the mes- sage indicate the RFC number, as in "Subject: RFCnnnn" where nnnn is the RFC number. Please note that RFCs whose number are less than 1000 need not place a "0". Page 15 Network Reading List Section 1: TCP/IP (For example, RFC932 is fine.) No text in the body of the message is needed. 6. VENERA.ISI.EDU RFCs can be obtained via FTP from VENERA.ISI.EDU, with the pathname in-notes/rfcnnnn.txt (where "nnnn" refers to the number of the RFC). Login with FTP username "anonymous" and password "guest". 7. WUARCHIVE.WUSTL.EDU RFCs can also be obtained via FTP from WUARCHIVE.WUSTL.EDU, with the pathname info/rfc/rfcnnnn.txt.Z (where "nnnn" refers to the number of the RFC and "Z" indicates that the document is in compressed form). At WUARCHIVE.WUSTL.EDU the RFCs are in an "archive" file system and various archives can be mounted as part of an NFS file system. Please contact Chris Myers (chris@wugate.wustl.edu) if you want to mount this file system in your NFS. 8. SRC.DOC.IC.AC.UK RFCs can be obtained via FTP from SRC.DOC.IC.AC.UK with the pathname rfc/rfcnnnn.txt.Z or rfc/rfcnnnn.ps.Z (where "nnnn" refers to the number of the RFC). Login with FTP username "anonymous" and password "your- email-address". To obtain the RFC Index, use the path- name rfc/rfc-index.txt.Z. (The trailing .Z indicates that the document is in compressed form.) 9. FTP.CONCERT.NET To obtain RFCs from FTP.CONCERT.NET via FTP, login with username "anonymous" and your internet e-mail address as password. The RFCs can be found in the directory /rfc, with file names of the form: rfcNNNN.txt or rfcNNNN.ps where NNNN refers to the RFC number. This repository is also accessible via WAIS and the Internet Gopher. 1.4.3 Hard Copies of the RFCs Paper copies of the RFCs may be acquired from SRI Interna- tional. +o SRI International Network Information Systems Center - EJ291 333 Ravenswood Avenue Network Reading List Page 16 Section 1: TCP/IP Menlo Park, CA 94025 (415) 859-6387 FAX (415) 859-6028 Hard copies of the RFCs, an RFC subscription service, and other products and services may be acquired from the Network Information Systems Center at SRI. 1.5. Internet Registration Service The Internet registration service provides IP network numbers and other registration services to sites wishing to connect to the Internet. In times past the registration of Internet addresses has been performed by the Network Infor- mation Systems Center at SRI International and then by the US Dept. of Defense Network organization (DDN NIC). As of April 1993, the registration service for non-DDN sites on the Internet is part of a new organization called the InterNIC. The InterNIC is a three part organization which includes network registration services, directory services and information services. The operation of the Internet registration service is described in RFC1400. You may also FTP to rs.internic.net to retrieve copies of the registration templates, policy documents, etc. The new Internet registration service provides a root name server zone file and a root name service for the Domain Name Service on the Internet. Information about the Internet Domain Name Service is provided in the books TCP/IP Network Administration and DNS and BIND. The primary root name server is: ns.internic.net at IP address 198.41.0.4 You can FTP the root zone file from: rs.internic.net in the /domain directory. Telephone support for the Internet Registration service may be reached at: 1-800-444-4345 or 1-703-742-4777 The electronic mail address for more information is: hostmaster@internic.net For more information you may also telnet to host: rs.internic.net The U.S. Postal Address is: Network Solutions, Inc. Page 17 Network Reading List Section 1: TCP/IP Attn: InterNIC Registration Service 505 Huntmar Park Drive Herndon, VA 22070 USA 1.6. Other InterNIC Services There are three organizations that make up the InterNIC, and registration services is one of them. The other two ser- vices are Information Services and Directory Services. +o Information Services The information services portion of the InterNIC provides introductory information for Internet users and support for network information centers at other Internet sites. There are a number of ways to access the information at the Infor- mation Services center, including anonymous FTP, Telnet, and Gopher. Anonymous FTP access is provided at host is.internic.net. Gopher access is provided at the internic.net address. To access this gopher, start up a gopher application pointed to internic.net. If you do not have a gopher application run- ning on your computer you can access the gopher via Telnet. Telnet to is.internic.net and login as "gopher" to access the gopher information. This gopher provides access to information for all three portions of the InterNIC. The information services portion of the InterNIC may also be reached at: InterNIC Information Services General Atomics P.O. Box 85608 San Diego, California Telephone: (800) 444-4345 or (619) 455-4600 FAX: (619) 455-3990 E-mail: info@internic.net +o Directory Services The directory services portion of the InterNIC provides a top-level directory of directories, as well as lists of various types of information servers available on the Inter- net. You can get access to the Directory Services information via anonymous FTP, Telnet, etc. For more information see the gopher described above, or telnet to ds.internic.net login as "guest," and follow the instructions. Network Reading List Page 18 Section 1: TCP/IP The directory services portion of the InterNIC may also be reached at: Phone: (908) 668-6587 Fax: (908) 668-3763 Mail: admin@ds.internic.net 1.7. TCP/IP Protocols This section of the reading list describes two resources that provide tutorial information about the TCP/IP protocol suite. +o Internetworking With TCP/IP, Volume I: Principles, Protocols, and Architecture Douglas E. Comer. 1991, Second Edition, Prentice Hall, Englewood Cliffs, New Jersey, 547 pps. with index and bibliography. ISBN 0-13-468505-9. $48.00. Comer's writing style is clear and the book is well organ- ized, making this a good starting point for anyone who wants to understand how the TCP/IP protocol suite works. The book provides an introduction and guide to the entire TCP/IP pro- tocol suite. The basic concepts behind internetworking are described, as well as LAN technologies such as Ethernet and ProNET. With the basics covered, Comer goes on to explain how the essential elements of the TCP/IP protocols function, including examples of network applications based on the pro- tocols. Comer has two other volumes available in this series from Prentice Hall, one providing a complete example implementa- tion of the TCP/IP protocols with source code made avail- able, and the other describing client-server computing using TCP/IP protocols. The titles are Internetworking with TCP/IP, Volume II: Design, Implementation, and Internals and Internetworking with TCP/IP, Volume III: Client-Server Pro- gramming From the Preface of Internetworking with TCP/IP, Volume I: "Most textbooks and network courses concentrate on the first two stages of network research, presenting the well-known theories of data communications and queueing analysis. Although such information is important to engineers who design network technologies and hardware products, most net- work architects purchase commercially available network hardware. Instead of detailed knowledge about how bits or packets flow across communication media, they need to know how to interconnect such hardware and how to use the Page 19 Network Reading List Section 1: TCP/IP resulting system." "This text concentrates on the third stage of networking. It examines the architecture of interconnected networks and explains the principles and protocols that make such inter- connected architectures function as a single unified commun- ication system. More important, it shows how an intercon- nected architecture can be used for distributed computa- tion." "Designed as both a college text and as a professional reference, the book is written at an advanced undergraduate or graduate level. For professionals, the book provides a comprehensive introduction to the TCP/IP technology and the architecture of the Internet. Although it is not intended to replace protocol standards, the book is a good starting point for learning about internetworking because it provides a uniform overview that emphasizes principles. Moreover, it gives the reader perspective that can be extremely difficult to obtain from individual protocol documents." +o Introduction to the Internet Protocols Charles L. Hedrick. 1987, Rutgers, The State University of New Jersey, 27 pps. Available via anonymous FTP from host cs.rutgers.edu in the runet subdirectory. The file is called tcp-ip- intro.doc and a PostScript version is available as tcp-ip-intro.ps. This tutorial was written by Charles Hedrick in July 1987. It serves as a short introduction to some of the basic con- cepts of the TCP/IP protocol suite. For another approach to the subject see RFC 1180, "A TCP/IP Tutorial" in the section on RFCs. From the Introduction: "This document is a brief introduction to TCP/IP, followed by advice on what to read for more information. This is not intended to be a complete description. It can give you a reasonable idea of the capabilities of the protocols. But if you need to know any details of the technology, you will want to read the standards yourself." Network Reading List Page 20 Section 2: Unix Section 2 This is Section 2 of a four-section document entitled "Net- work Reading List: TCP/IP, UNIX, and Ethernet." The four sections of this annotated list of resources were created to help you find information about TCP/IP, UNIX, and Ethernet. The complete list describes a wide range of items, including both introductory and in-depth information. Section 1 covers TCP/IP resources, Section 2 covers UNIX, Section 3, Ethernet, and Section 4, miscellaneous items. 2. UNIX It may seem odd to include an operating system in a list of network resources. However the UNIX system has been the platform for many networking innovations over the last decade. This section of the reading list is designed to help you find information on how UNIX networking functions, and how UNIX fits into the networking equation. The development of UNIX has been closely tied to both TCP/IP and Ethernet. In the early 1980's ARPA chose to fund the development of a Berkeley UNIX implementation of the TCP/IP protocols. This led to the inclusion of the TCP/IP proto- cols in Berkeley UNIX release 4.2. At the time, Berkeley had begun using the newly standardized Ethernet LAN technology to link their campus computers together, and the model of UNIX systems running TCP/IP and linked with Ethernet was exported to many other sites with the release of 4.2BSD UNIX. The availability of UNIX, TCP/IP, and Ethernet also helped spur growth of the scien- tific workstation market. The combination of UNIX worksta- tions with TCP/IP networking software and Ethernet hardware is quite common at many sites today. 2.1. UNIX In General UNIX and how it networks can be a daunting subject to the newcomer. To help try to cut things down to size, the next two items provide some background and context on UNIX in general, and UNIX network administration in particular. +o Life With UNIX Don Libes, Sandy Ressler 1989, Prentice Hall, Englewood Cliffs, NJ., 346 pps. with index. ISBN 0-13-536657-7. $34.95 Page 21 Network Reading List Section 2: Unix UNIX documentation can be exceedingly cryptic and difficult to decipher. While the efforts of the many UNIX vendors have frequently improved the UNIX documentation of their systems (it would be hard to make it worse), it's still the case that a newcomer can find themselves drowning in details and wishing for some UNIX expert to come by and supply the big picture. Life With UNIX is that expert. While it could do with an update, nonetheless this is still the best single source for much undocumented folklore about how UNIX grew, and why things are the way they are. From the Preface: "No matter what people have told you, you can't learn UNIX from the manuals, or even the sources. UNIX is so much more than that. To understand UNIX is to understand its users and its applications, as well as its failures and flaws. This is just some of what this book hopes to cover." "Make sure you realize what this book isn't. It isn't a textbook on C or UNIX programming. (There are already plenty of good ones.) You won't learn how to write shell scripts or what is in the kernel. Well, maybe a little. But you will learn plenty of useful things. Things that will fill in gaps between other useful and useless things you already know about UNIX." +o UNIX System Administration Handbook Evi Nemeth, Garth Snyder, and Scott Seebass. 1989, Prentice Hall, Englewood Cliffs, NJ, 593 pps. with index and bibliography. ISBN 0-13-933441-6. $42.00 While somewhat dated, the UNIX System Administration Hand- book still provides an exceptionally comprehensive guide to the nitty gritty details of UNIX system administration. It's also well written, with solid "hands-on" information. Of special interest is the large section on UNIX network administration. Included in this section is a brief description of how Eth- ernet works, featuring a list of typical Ethernet com- ponents. There's a short description of TCP/IP protocols and how to set up the various UNIX files that make TCP/IP software run. There's also a description of some LAN design issues, followed by the Sun Network File System protocols and operation. The section concludes with a few pages on how to debug and monitor your network. The book TCP/IP Net- work Administration listed in Section I contains much more Network Reading List Page 22 Section 2: Unix network-specific information for UNIX systems; however, the UNIX System Administration Handbook is useful for the com- plete range of subjects it covers. From the preface: "Without guidance, it's easy for a new administrator to lose sight of ultimate goals in a sea of documentation or to inadvertently skip over one or more critical areas through failure to realize that they are important. That is where this book fits in. While we can't claim that everything you need to know is included, we can guarantee that after read- ing it you will know pretty much what UNIX administration involves and how to go about it." "The first six chapters of this book are presented in a sequence you should find useful if you are bringing up a system straight from the packing crate. In this section are contained the bare essentials, things you need to know just to get the system up and running. Chapters 7-14 introduce the various kinds of hardware that are typically used with UNIX and discuss how to install, configure, and operate this equipment. Chapters 15-19 discuss five important UNIX software subsystems: electronic mail, telephone communica- tion, network news, backups, and accounting. The rest of the chapters represent a grab-bag of UNIX topics, some of which may not concern you." +o DNS and BIND Paul Albitz and Cricket Liu O'Reilly & Associates, Petaluma, CA, 1993 381 pps. with index ISBN 1-56592-010-4 $29.95 If you are managing a UNIX system that is attached to the Internet, then sooner or later you will need to deal with the Internet domain name system. This book provides an in- depth treatment of the Internet domain name system and the most widely used implementation of the name system software. Basic configuration information for the Internet domain name system software on a UNIX host may be found in the book TCP/IP Network Administration, which is listed in Section I. From the O'Reilly catalog: "Here's a complete guide to the Internet's Domain Name Sys- tem (DNS) and the Berkeley Internet Name Domain (BIND) software, which is the UNIX implementation of DNS. DNS is the system that translates hostnames into Internet addresses. Until BIND was developed, name translation was based on a "host table"--if you were on the Internet, you Page 23 Network Reading List Section 2: Unix got a table that listed all the systems connected to the network, and their addresses. As the Internet grew, host tables became unworkable. DNS is a distributed database that solves the same problem effectively, allowing the net- work to grow without constraints. Rather than having a cen- tral table that gets distributed to every system on the net, it allows local administrators to assign their own hostnames and addresses, and install these names in a local database. This database is automatically distributed to other systems, as names are needed." "In addition to covering the basic motivation behind DNS and how to set up the BIND software, this book covers many more advanced topics: how to become a "parent" (i.e., "delegate" the ability to assign names to someone else); how to use DNS to set up mail forwarding correctly; debugging and trouble- shooting; and programming. Assumes a basic knowledge of system administration and network management." 2.2. UNIX Security The next few items discuss UNIX security. Once you have attached a computer directly to the worldwide Internet your computer system is available to any of the millions of peo- ple who have access to the Internet. Even though your com- puter may be attached to a "local" network, if that network is directly linked to the Internet then your machine is accessible by anyone on the planetary network system. Given that, making sure that the files on your machine are secure from malicious attacks is a very important task. You should not take anything for granted when it comes to system security. Vendors frequently ship system software with minimal or no security enabled, and with well known holes in the system. It's up to you to make sure that your computer system is secure. Computer systems are complex and ensuring the security of those systems can be equally complex. RFC1244, the Site Security Handbook provides an introduction to the territory and a survey of the major issues. The following resources provide more information on this subject. +o Practical UNIX Security Simon Garfinkel and Gene Spafford O'Reilly & Associates, Petaluma, CA, 1991 483 pps. with index $29.95 From the review of Practical UNIX Security in RFC1244: Network Reading List Page 24 Section 2: Unix "This is one of the most useful books available on Unix security. The first part of the book covers standard Unix and Unix security basics, with particular emphasis on pass- words. The second section covers enforcing security on the system. Of particular interest to the Internet user are the sections on network security, which address many of the com- mon security problems that afflict Internet Unix users. Four chapters deal with handling security incidents, and the book concludes with discussions of encryption, physical security, and useful checklists and lists of resources. The book lives up to its name; it is filled with specific refer- ences to possible security holes, files to check, and things to do to improve security." +o Improving the Security of Your UNIX System David Curry SRI International Report ITSTD-721-FR-90-21, April 1990. This paper describes a number of security issues that should be checked on UNIX systems. The paper is oriented to SunOS 4.x systems and other Berkeley UNIX systems. Available from a number of sites on the Internet, including CERT, the Computer Emergency Response Team site. You can retrieve this document via anonymous FTP from cert.sei.cmu.edu in the /pub/info directory as security- doc.txt an ASCII text file and security-doc.tar.Z a compressed UNIX tar file containing the troff source for the document and a PostScript output file of the document. 2.3. UNIX Networking In Detail The next few items cover UNIX networking in vast technical detail. These items are for those who want to understand UNIX networking right down to the details of the kernel implementation. This material assumes that you have a pro- gramming background, or at least a reading knowledge of C programming. As it says on old maps of uncharted and dangerous territories, "Here there be dragons." +o The Design and Implementation of the 4.3BSD UNIX Operating System Samuel J. Leffler, Marshall Kirk McKusick, Michael J. Karels, John S. Quarterman. 1989, Addison-Wesley Publishing Co., Reading, Mass. 471 pps. with index and glossary. ISBN 0-201-06196-1 $46.00 This book provides an in-depth look at the design and imple- mentation of the entire 4.3BSD (Berkeley Software Page 25 Network Reading List Section 2: Unix Distribution) UNIX system. Of special interest is Part 4 which describes UNIX Interprocess Communication. This sec- tion includes Chapter 10, which describes the kernel data structures and socket mechanisms used for networking, and Chapters 11 and 12, which cover Network Communication and Network Protocols, respectively. These chapters provide an in-depth look into the details of the BSD networking imple- mentation, written by the engineers who had a hand in making the decisions. From the Preface: "This book is about the internal structure of 4.3BSD and about the concepts, data structures, and algorithms used in implementing 4.3BSDXs system facilities. Its level of detail is similar to that of Bach's book about System V UNIX however, this text focuses on the facilities, data struc- tures, and algorithms used in the Berkeley variant of the UNIX operating system. The book covers 4.3BSD from the system-call level down -- from the interface to the kernel to the hardware itself. The kernel includes system facili- ties, such as process management, memory management, the I/O system, the file system, the socket IPC mechanism, and network-protocol implementations. Material above the system-call level such as libraries, shells, commands, pro- gramming languages, and other user interfaces is excluded, except for some material related to terminal interface and to system startup. Like Organick's book about Multics, it is an in-depth study of a contemporary operating system." +o UNIX Network Programming W. Richard Stevens 1990, Prentice Hall, Inc., 784 pps. with index and annotated bibliography. ISBN 0-13-949876-1. $51.00. Richard Stevens's book features both a comprehensive treat- ment of UNIX networking concepts and a vast assortment of real world examples. The book contains scores of program examples, and is indispensable reading for the network software developer, or for anyone who wants to see what real networking software looks like in a UNIX system.. The book is an extremely useful resource for anyone who needs an in- depth understanding of the internals of UNIX networking software. The book contains about 15,000 lines of C source code (including comments), some of which is taken directly from the Berkeley UNIX networking software and modified by the author, and some of which was created by the author for the task at hand. Another major advantage of this text is that Network Reading List Page 26 Section 2: Unix all 15,000 lines of source code are available on-line as described below. From the Preface: "This book provides both the required basics that are needed to develop networking software along with numerous case stu- dies of existing network applications. The intent of this book, however, is to concentrate on the development of software to use a computer network." "This text is divided into four parts. 1. The framework of a UNIX process (Chapter 2), and IPC between processes on a single system (Chapter 3). 2. An overview of networking (Chapter 4), and a description of some networking protocols currently in use (Chapter 5): TCP/IP, Xerox NX (XNS), IBM's SNA, NetBIOS, the OSI protocols, and UUCP. These two chapters provide the networking background for the remainder of the text. 3. Transport layer interfaces: Berkeley sock- ets and System V TLI (Chapters 6 and 7). These are the interfaces that an application uses to communicate across a network. 4. Networking examples (Chapters 8 through 18). The specific examples covered are: security, time and date servers, file transfer, line printer spoolers, remote com- mand execution, remote login, remote tape drive access, and remote procedure calls." 2.3.1. Access to Source Code In UNIX Network Programming The complete source code for the Richard Stevens book is available in the UNIX source archives kept by UUNET Techno- logies in Falls Church, Virginia. For those readers with a connection to the Internet, the source code from the Richard Stevens book may be retrieved using the anonymous FTP ser- vice. By opening a connection to host ftp.uu.net and log- ging in as username "anonymous," you can gain access to the source archives stored at UUNET. Once logged into UUNET, the source code is located in the published directory as filename stevens.netprog.tar.Z. The capital Z suffix means that the file has been compressed using the UNIX compress program, which turns the file from a text format to a binary format. This, in turn, means that you will have to type "bin" to the FTP program, to set the file retrieval to binary mode. The compressed version of the file occupies almost 192 Kilobytes. Once retrieved, the file will need to be uncompressed, which will leave you with a tape archive or "tar" file. Unpacking this file with the UNIX tar program will reveal the 15,000 lines of source code. Page 27 Network Reading List Section 3: Ethernet Section 3 This is Section 3 of a four-section document entitled "Net- work Reading List: TCP/IP, UNIX, and Ethernet." The four sections of this annotated list of resources were created to help you find information about TCP/IP, UNIX, and Ethernet. The complete list describes a wide range of items, including both introductory and in-depth information. Section 1 covers TCP/IP resources, Section 2 covers UNIX, Section 3, Ethernet, and Section 4, miscellaneous items. 3. Ethernet Ethernet is a popular local area network (LAN) technology in wide use at sites around the world. Ethernet moves data between computers at a rate of 10 megabits per second over a wide variety of physical media including twisted-pair wire, coaxial cable, and fiber optic cable. A major reason for its popularity is that Ethernet is a very flexible and low cost network system. Ethernet's popularity also provides a high level of network interoperability. Since Ethernet is so widely implemented you can link systems built by many different vendors using the same Ethernet LAN. Like TCP/IP and Unix, Ethernet is a technology that provides a common basis for supporting heterogeneous networks. The 10 megabit Ethernet network standard has been in existence for over a decade, and is an international LAN standard. As a result, a large number of vendors sell Eth- ernet equipment and this helps keep the cost of the technol- ogy low. The large market for Ethernet equipment also leads to a steady stream of innovations, such as the use of thin coaxial and twisted-pair cabling, that makes it easier to build a reliable LAN in a wide variety of sites using stan- dard Ethernet. 3.1. Introduction To LAN Concepts +o Local Area Networks An introduction to the technology John E. McNamara. Prentice Hall Agency, 1985, 165 pps. with index and glossary. $29.00 ISBN 0-13-539669-7 This book provides a clear introduction to the essential ideas and basic technologies of LANs. McNamara keeps it simple, while managing to cover many different technologies. The author avoids covering specific products in favor of describing the general territory of LANs and their Network Reading List Page 28 Section 3: Ethernet topologies. The special problems of extending LANs and sup- porting multiple protocol campus area networks are also dis- cussed. From the Preface: "This book is intended for students, computer system managers, telecommunications managers, and others who want to become more familiar with local area networks. Since product offerings in this area are constantly changing, a deliberate attempt has been made to emphasize the general principles, operating characteristics, and problem areas of local area network hardware, rather than cite specific pro- duct examples." "The book begins with a general introduction, discussing the development of local area networks and emphasizing their possible uses. This is followed by more detailed treatment of physical factors: topology, media, and installation requirements. Next, the hardware that permits programs to access the local area network and transfer data is dis- cussed. Then, software is covered, starting with an intro- duction to communications protocols. Finally, the combined base of hardware and software knowledge from the previous parts of the book are used in discussions of network ser- vices, network expansion, and the problems associated with creating large networks. The need for standards is implied throughout the book, and a brief final chapter discusses the creation of standards and their current status." 3.2. Introduction to Three Ethernet Varieties This short introduction to the three Ethernet technologies most widely used in office connections is provided to help you understand the references to these technologies in the resources that follow. After the IEEE published the basic thick coaxial Ethernet specifications in 1985 it went on to specify new varieties of Ethernet media, including thin coaxial Ethernet and twisted-pair Ethernet. There are currently three media systems designed to provide Ethernet service to an office. They include: (1) Thick Ethernet The original Ethernet system based on coaxial cable which uses a thick (0.4 inch) yellow cable. Computers are attached to the coaxial cable with an outboard Eth- ernet transceiver (also called a MAU) that is clamped to the cable. The transceiver, in turn, is connected to an Ethernet interface in the host computer by way of a transceiver cable (also called an AUI cable). This system is the one developed at Xerox, and could be called "Ethernet Classic." The IEEE has assigned Page 29 Network Reading List Section 3: Ethernet shorthand identifiers for each media variety of Ether- net. The identifier for thick Ethernet is 10BASE5, which stands for 10 megabit per second speed, baseband signaling, and 500 meter maximum segment length. (2) Thin Ethernet A coaxial-based Ethernet system that uses a thinner, more flexible coaxial cable than the original thick Ethernet system, and is known as thin Ethernet or "Cheapernet." In the thin Ethernet system the tran- sceiver is located inside the computer along with the Ethernet interface. This makes it possible to attach the thin Ethernet coax directly to the back of the host computer, reducing the number of devices and cables needed, and making the network connection more afford- able. The IEEE identifier for thin Ethernet is 10BASE2, which stands for 10 megabit per second speed, baseband signalling, and, despite the "2" used in the shorthand identifier, 185 meters maximum segment length. (3) Twisted-Pair Ethernet The twisted-pair variety of Ethernet is based on the same low cost twisted-pair wiring used in telephone systems. The IEEE identifier for twisted-pair Ethernet is 10BASE-T, which stands for 10 megabits per second, baseband signalling, and twisted-pair media. The tran- sceiver is located inside the computer in the twisted- pair system, which helps lower the cost of connecting to the segment. In the 10BASE-T system individual com- puters are attached to twisted-pair segments, which, in turn, are attached to a multiple-connection box called a multiport repeater or hub. A typical standalone hub supports 8 or 12 10BASE-T connections. Ethernet hubs can also be designed as modular systems called chassis hubs. Chassis hubs can support several media varieties of Ethernet, and not just twisted-pair. With its reli- ance on proven telephone system technology the twisted-pair variety of Ethernet provides a reliable, yet simple and low-cost method for attaching computers to an Ethernet system. +o Ethernet Frequently Asked Questions (FAQ) Another handy guide to general Ethernet information can be found in the latest edition of the Ethernet FAQ. A FAQ is a list of frequently asked questions with their answers. The Ethernet FAQ was created for distribution over the Usenet group dedicated to the subject of Ethernet LANs. For more information about Usenet groups and the Ethernet group in particular see Section IV of this list. Network Reading List Page 30 Section 3: Ethernet For those without access to the Usenet, a copy of the Ether- net FAQ may also be acquire via anonymous FTP from dorm.rutgers.edu in pub/novell/DOCS. 3.3. Vendor Guides Some very useful tutorial information on Ethernet may be found in a variety of publications available from vendors. Be warned that vendor guides are not very formal publica- tions and may go out of print at any time. You also have to allow for the vendor-specific orientation, and understand that there may be other ways to do things. Nonetheless, despite the emphasis on a single vendor's products you can find good tutorial information in these guides. Listed next in no particular order are several guides that have proven useful. Hewlett-Packard Manuals +o LAN Cable and Accessories Installation Manual Published by Hewlett-Packard Co, January 1986. Approx. 204 pps. with index. $43.00. HP Part No. 5955-7680. Order from HP Direct Ordering at (800) 227-8164 This slightly out-of-date manual from HP is still one of the better sources of tutorial information on how to deal with the thick and thin Ethernet varieties. The manual does not mention the twisted-pair Ethernet system. Despite the specific product orientation, the Ethernet configuration information is useful, and the guidelines for designing net- works are clear and well written. Thin Ethernet is covered, using HP's ThinLAN name for the technology. In addition, the manual shows how to tap a thick Ethernet cable for ins- tallation of the typical transceiver connection. One nit to pick is that the advice on running cable between buildings is based on older coax technology and does not take into account the newer IEEE Fiber Optic Inter-Repeater Link (FOIRL) standard. The FOIRL standard makes it possible to link Ethernets between buildings while preserving com- plete electrical isolation between the LANs. Such isolation is important when it comes to preserving the safety of the LAN system and preventing damage to the system components. This manual really shines when it comes to descriptions of thick cable and thin cable tooling and details of cable con- struction. The wire strippers and connector crimpers required for each cable type are described, although only HP part numbers are cited for these tools. There are also diagrams showing how to prepare each kind of cable for Page 31 Network Reading List Section 3: Ethernet connectors, and how to crimp on the N connectors and BNC connectors used with the thick and thin coaxial cables. The manual finishes with a short section on verifying the cables you've built, and a section on how to use a time domain reflectometer to test network cables. Another useful feature of the manual are the safety warnings that explain the hazards of the crimping tools, and the various electrical dangers that may be present when working on network cable systems. While on the subject of safety warnings, it should be mentioned that the crimping tools shown in this manual use a mechanism that prevents them from opening until they have closed all the way. It can be pain- ful if a finger, rather than a connector, gets into the works. The HP manual thoughtfully includes an appendix on how to get your finger out of a crimp tool, should the need arise. +o HP SiteWire Twisted-pair Cabling Installation Guide January 1988, Hewlett-Packard Company, Roseville Net- works Division, 8000 Foothills Boulevard, Roseville, California 95678. Approximately 100 pps, with 11 sections, 2 Appendixes, and an Index. $40.00. HP Manual Part Number 5959-2208. Order From HP Direct Ordering at (800) 227-8164 Like the HP guide on coaxial cabling, this document is oriented to HP product offerings. Covering twisted-pair wiring for data communications, and including the Ethernet 10BASE-T variety, this guide provides instructions on how to test and install twisted-pair wiring for networks. While limited to HP offerings, it still provides a useful intro- duction and primer for for twisted-pair Ethernet installa- tions. The guide begins with a general introduction to twisted-pair connections. The system shown is not based on the widely used AT&T Premises Distribution System (PDS); instead the HP approach to wiring both telephones and data service for an office space is described. PDS equipment may be used with the HP approach however, and the guide notes that for large installations you may want to base your design entirely on the PDS system. The guide explains the basics of how to build twisted-pair cables, test them for continuity, and install them in an office. The use of 66-type and 100-type punch-down tools and punch-down blocks is explained, along with the basics of making a host connection to a twisted-pair Ethernet. Network Reading List Page 32 Section 3: Ethernet The rest of the document describes how to install 10BASE-T hubs. The guide also shows the HP 10BASE-T interface boards for PCs that contain two modular jacks; one for connection to the building wiring system, and one for connection to a telephone. This allows you to support both telephone and data on the same twisted-pair cable, and you are shown how to install wiring for such a system. DEC Manuals +o Telecommunications and Networks Buyer's Guide Published twice a year by Digital Press. Free. No part number. Ask for it by title from a DEC sales office. Call (800) 332-4636 if you don't have a local DEC sales contact. This guide lists all communication hardware, communication software products, and network services that DEC provides. Of special interest are the configuration guidelines for DEC's 802.3/Ethernet products. Here you will find all manner of information about 802.3/Ethernet in general and the DEC product line in particular. Included is a descrip- tion of DEC's building wiring standard, Open DECconnect. You will also find media and topology information for fiber optic Ethernet connections, unshielded twisted pair, thin Ethernet and thick Ethernet. The guide includes illustra- tions and descriptions of many Ethernet components including barrels and terminators for thick Ethernet, DECconnect wir- ing equipment, and repeaters and bridges. The guide is completely DEC-centric, of course, but the price is right and the information can be quite useful. The guide lists many other products, including DEC's offerings for the 100 Mbit/sec LAN standard known as FDDI. +o OPEN DECconnect Building Wiring Components and Applica- tions Catalog 1990, Digital Equipment Corporation. Free. No part number. Ask for it by title from DEC sales office. Or call the DEC pre-sales support group at (800) 344-4825 The components and applications catalog lists individual parts of the DECconnect wiring system including a descrip- tion and order number. Line drawings for each part are shown. The second half of the catalog shows some typical wiring applications and how they are configured to use the DECconnect system. Page 33 Network Reading List Section 3: Ethernet MOD-TAP +o MOD-TAP Applications Manual 1993 +o MOD-TAP Components Catalog MOD-TAP, 285 Ayer Road, PO Box 706, Harvard, MA 01451- 0706, (508) 772-5630. Applications Manual $5.00, Components Catalog Free. MOD-TAP supplies communications cabling products for com- puter users. Their applications manual covers a wide range of communications cabling applications for several different network standards. Of interest here is their support for 10BASE-T Ethernet. The applications manual describes some basic concepts for building cabling design, and also goes into detail on the wide variety of twisted pair wiring schemes in use today. A major benefit of this manual is the information on the various twisted pair wiring schemes currently in use and how they can be used to support 10BASE-T twisted pair Ethernet. The manual also describes some basic wiring installation techniques, including how to develop a cable numbering scheme to help keep it all straight. The components catalog describes the entire line of MOD-TAP products. Included are a set of charts that show the twisted pair wiring schemes used in the USOC, AT&T 258A, AT&T 356A, ROLM, DEC, EIA, and 10BASE-T standards. The building you may be trying to wire for 10BASE-T Ethernet may include twisted-pair wires installed according to any one (or more) of these standards. The information shown here can be invaluable for figuring out how to get the signals from the 10BASE-T hub in the wiring closet to show up on the user's desk. 3.4. Ethernet Hardware and Vendors Ethernet hardware comes in several forms. At the physical media level there are basic pieces of hardware: coaxial cable, twisted-pair cable, and connectors. The next level up features components such as transceivers, transceiver cables, and Ethernet interfaces. At the higher levels of network concatenation are devices such as multiport tran- sceivers, Ethernet repeaters, chassis hubs, and bridges. Just to keep things interesting, the different media varieties of Ethernet require different components. For instance, thick Ethernet media systems use different low- level hardware and components than twisted-pair media. Moreover, every vendor seems to have its own special design for equipment such as Ethernet hubs. It's a large market, Network Reading List Page 34 Section 3: Ethernet and impossible to cover in any short list of resources such as this one. Lists of vendors and products may be found in buyer's guides published by some of the LAN magazines shown in the next section. Shown next are a few representative examples of equipment and hardware catalogs from equipment distributors. +o Anixter Wiring Systems Product Catalog Anixter Bros., Inc. 4711 Golf Road Skokie, IL 60076 Phone (312) 677-2600 The Anixter Wiring Systems Product Catalog is a vast compen- dium that lists many different vendors, supplying all manner of communications equipment. The catalog describes the full range of products supplied by Anixter, but does not include pricing. The catalog has separate sections for both Ethernet and DEC's special Ethernet wiring system (called DECconnect). The catalog also features a glossary of communications industry terms, and an index. All in all, this catalog is a useful resource for the LAN manager. Catalogs are available from your local Anixter distributor, or call the main office in Skokie. +o Anixter Networking Products Guide 4711 Golf Road Skokie, IL 60076 Phone (800) 622-6415 (orders) (800) 622-6417 (technical assistance) This 166 page catalog is also called "One Network Place" and features a selection of networking equipment including Eth- ernet products. The catalog lists components used in twisted-pair wiring systems, basic networking devices like transceivers, Ethernet interfaces, and hubs, and network devices such as Ethernet bridges. Prices are included for all items. +o AT&T Systimax PDS Components Catalog For access see a local AT&T representative or call: (800) 344-0223 ext 1102 (USA) 32-2-676-3623 (Europe) (416) 756-5118 (Canada) This catalog describes the wiring components used in the AT&T Premises Distribution System (PDS). AT&T's PDS is a widely adopted scheme for installing twisted-pair wire in commercial buildings. The design of the Ethernet twisted- Page 35 Network Reading List Section 3: Ethernet pair standard allows it to operate over PDS wire systems. There are no prices in this catalog and no tutorial informa- tion. Instead it provides you with a description of the wiring components used in one of the most widely adopted twisted-pair wiring systems for buildings. +o Hubbel Premise Wiring Inc. Full Line Catalog #1100R 14 Lord's Hill Road PO Box 901 Stonington, CT 06378-0901 (203) 535-3809 or (800) 626-0005 Another catalog listing a complete line of premise wiring for twisted-pair systems. Includes some information on the EIA/TIA Commercial Building Wiring Standard. A useful cata- log for anyone implementing a twisted-pair Ethernet system. +o Network Electronics LAN Catalog 4801 N. Ravenswood Ave. Chicago, IL. 60640-4496 (312) 784-5100 Newark has branch offices all over the US. This catalog provides access to the network products that Newark carries, including coaxial and twisted-pair Ethernet. Also included are a wide range of network cabling components. Prices are included for all items listed. 3.5. Network and LAN Troubleshooting Guides +o Network Troubleshooting Guide August 1990, Digital Equipment Corporation Approx. 278 pps. with index and glossary. $95.00 Digital part number is EK-339AB-GD-002. Digital Direct phone is (800) 344-4825. While the price is steep, this is a useful guide to a variety of techniques for testing and troubleshooting net- works that support both DECnet and TCP/IP protocols. The guide begins with a brief description of how both DECnet and TCP/IP function, including details of addressing in both protocol suites. Chapter 2 describes how to develop a basic network troub- leshooting methodology for your site. Following this is a chapter on network management and troubleshooting tools, listed alphabetically, and including both VMS and ULTRIX- based tools. The emphasis is on Digital applications, but more general applications such as "ping" and "traceroute" are also shown. Network Reading List Page 36 Section 3: Ethernet Chapter 4 describes resources for troubleshooting. These include various ULTRIX and VMS log files that contain infor- mation on problems that may have occurred with software run- ning the DECnet and TCP/IP protocols. Chapter 5 is the largest chapter of the guide. It describes network troubleshooting procedures for a wide variety of common network problems in both DECnet and TCP/IP. The problems are categorized as ULTRIX host problems, VMS host problems, LAN problems, WAN problems, and cross-category problems that include two or more of the preceding problems. This chapter explains how to interpret common error messages seen, and how to go about troubleshooting the source of the error. Each problem is described and troubleshooting pro- cedures explained. An example for TCP/IP includes the the error message "connection timed out." A variety of errors that could cause this message are explained, and a troub- leshooting strategy is listed. You are shown how to use "ping" to check for connectivity, "netstat" to check for errors on the host interface, etc. While the guide focuses on DEC equipment running VMS and ULTRIX operating systems, there is still much useful infor- mation provided for debugging complex network problems in a mixed vendor environment. For example, many of the utili- ties described for ULTRIX are commonly available on other Unix systems. Although the guide assumes you have a DEC LAN Traffic Monitor (LTM) available, this is not a severe limi- tation. You can replicate much of the information you can get from the LTM by running commonly available applications such as "etherfind" or "tcpdump" on your system. This guide has two major advantages; the structured approach to troubleshooting and the unusual mix of both DECnet and TCP/IP troubleshooting procedures in the same manual. While the troubleshooting information appears to list more DECnet-based errors than TCP/IP ones, the guide manages to present quite a lot of technical information about both pro- tocol suites and their possible failure modes in a clear and well organized format. +o LAN Troubleshooting Handbook Mark A. Miller 1989, M&T Publishing Co., Redwood City, CA., 309 pps. with index. $29.95. ISBN 1-55851-054-0 A wide-ranging guide to troubleshooting information for several LAN technologies including Ethernet. The author manages to fit a surprising amount of technical information Page 37 Network Reading List Section 3: Ethernet about three LAN technologies, Ethernet, token ring, and ARCNET, into one volume. Though there isn't any tutorial information about Ethernet, the troubleshooting information is clear and the book is well illustrated. The material on Ethernet covers two sections: one on coaxial cable based Ethernets (both thick and thin), and one on twisted-pair Ethernet technology, including Synoptics Lat- tisNet and AT&T StarLAN products. The IEEE 10BASE-T unshielded twisted-pair system is also briefly described. This book provides quick access to some essential troub- leshooting information for the three main varieties of Eth- ernet. From the Preface: "This book has a very fundamental thesis: how to keep your local area network alive. There are three parts to that goal. First, you must understand how the LAN should operate if you are to properly define when it is not operating. Secondly, you must have the proper hardware and software tools readily available to troubleshoot problems. Third, you must take preventative measures to keep those failures from recurring in the future." "To accomplish this goal, the book is divided into "network generic" and "network specific" chapters. Chapters 1, 2, 3, and 4 address the generic issues of LAN standards, Documen- tation, Test Equipment, and Cabling. Chapters 5, 6, 7, and 8 address specific issues associated with popular LAN archi- tectures: ARCNET, Token Ring, Ethernet, and StarLAN, respec- tively. Also included in the network-specific chapters are examples of protocol analysis of Novell's NetWare, IBM's NetBIOS, DEC's DECnet, and TCP/IP. Chapter 9 concludes with a dose of preventative medicine." 3.6. The Ethernet Standards Ethernet became the first non-proprietary LAN technology with the publication of the original multi-vendor Ethernet specification in 1980. There are two basic Ethernet standards: one issued by the multi-vendor consortium in 1980, and one developed by the Institute of Electrical and Electronics Engineers (IEEE). The multi-vendor standard is known as the DIX standard, so called due to the initials of the three participants: Digi- tal Equipment Corp, Intel, and Xerox. The DIX standard includes versions 1.0 and 2.0. In 1985 the IEEE 802.3 CSMA/CD standard for Ethernet tech- nology was released. Based on the DIX Ethernet standard, Network Reading List Page 38 Section 3: Ethernet the IEEE version brought the thick Ethernet system into the world of international standards. While they may appear quite different at first, the DIX version and the IEEE ver- sion of the standard are functionally similar. Many vendors rate their Ethernet hardware for use in both IEEE 802.3 and DIX version 2.0 systems. Of course, the prudent networker makes sure that all of the hardware used to attach a com- puter to the Ethernet is based on a single version of the standard. Most of the changes that the IEEE version of the standard made were at the level of the Ethernet frame, which is the set of bits that carry the data between computers. However, both IEEE and DIX Ethernet frames can coexist on the same Ethernet LAN without problems. The next several items list an introduction to IEEE stan- dards and describe the formal Ethernet standards in use today. The formal standards are the technical documents for Ethernet/802.3 LANs, and they can be heavy going for non- engineers. There is no tutorial information in the stan- dards, and the technical jargon they use makes them diffi- cult to read. The newer IEEE standards use a special language developed for open systems standards that can bewilder the unprepared. The book listed next provides a guide to the newcomer to IEEE standards. +o LANs Applications of IEEE/ANSI 802 Standards Thomas W. Madron. 1989, John Wiley & Sons, New York, NY, 308 pps. with index and glossary $34.95. ISBN 0-471-62049-1. An introduction to LANs from the point of view of the evolv- ing network standards. This book presents the world of net- work standards and how they're organized. The various stan- dards agencies are described and the Open System Intercon- nection (OSI) model is explained. Following this, the IEEE 802 standards are described, and the way that the IEEE stan- dards fit within the OSI organization is explained. The bulk of the book describes the individual IEEE LAN stan- dards. The book closes with a explanation of the basics of TCP/IP operation, including the function of LANs in the delivery of TCP/IP services. From the Preface: "The object of this book is to provide a reasonably detailed overview of contemporary LAN standards, especially those Page 39 Network Reading List Section 3: Ethernet developed through the auspices of the Institute of Electri- cal and Electronics Engineers (IEEE). To be meaningful, however, the discussion of the IEEE standards is placed in the context of the development of standards generally, then in the framework of the Open System Interconnection (OSI) Reference Model of the International Organization for Stan- dardization (ISO). After describing the IEEE standards (from 802.1 through 802.6), the way in which the standards can be applied in 'real' networks is illustrated through a discussion of the Manufacturing Automation Protocol (MAP) and the Transmission Control Protocol/Internet Protocol (TCP/IP), in Chapters 9 and 10 respectively." 3.6.1. The DIX Standard +o Version 2.0, DEC-Intel-Xerox (DIX) Ethernet Standard Ethernet Local Area Network Specification Version 2.0. November, 1982 Digital Equipment Corporation, Intel Corporation, Xerox Corporation, 103 pps. $31.00. DEC Part Number: AA-K759B-TK. Available from DEC-Direct by calling (800) 344-4825. This is Version 2.0 of the original 10 Mbit/sec thick Ether- net specification. The newer IEEE 802.3 standard supersedes the DIX spec listed here, but many network protocol imple- mentations still use the Ethernet frame from the DIX specif- ication. This specification is organized according to the OSI model, but uses somewhat less technical jargon than newer stan- dards. That makes it a document that is more approachable by the non-expert than the IEEE standard tends to be. The DIX specification is still a technical standard, however, and contains no tutorial information on the design and operation of Ethernets. Just the facts. 3.6.2. The IEEE 802.3 Standard (ISO 8802.3) The IEEE 802.3 standard is the current standard for thick Ethernet as well as for all newer varieties. However, noth- ing stands still very long in the standards world, and the IEEE standard is no exception. Starting as a multi-vendor standard (DIX), the Ethernet system then became a national standard (IEEE/ANSI), and the IEEE specs are now incor- porated in an international (ISO/IEC) standard. This explains why the IEEE organization now sells the ISO volume of specifications, instead of the older IEEE 802.3 volume. The name of the latest international "Ethernet-like" stan- dard is (take a deep breath): Network Reading List Page 40 Section 3: Ethernet +o (ISO/IEC) (ANSI/IEEE Std 802.3, 1992) Information Processing Systems - Local and Metropolitan Area Networks - Part 3: Carrier Sense Multiple Access with Collision Detection (CSMA/CD) Access Method and Physical Layer Specifications (ANSI) ISBN 1-55937-049-1 IEEE product number: SH13482 $75.00 (from IEEE publications catalog) Available from: IEEE Customer Service 445 Hoes Lane PO Box 1331 Piscataway, New Jersey 08854-1331 or by calling (800) 678-4333 (IEEE). Outside US and Canada call, (908) 981-1393. The FAX number is (908) 981-9667 These are the current specifications for an Ethernet-like CSMA/CD LAN. Despite the major reworking of the original DIX standard by the IEEE, and despite changes made in the way some things work, the IEEE and DIX specs have a strong functional similarity at the hardware level. Old and new hardware can interoperate well on Ethernet/802.3 LANs, despite the differences in the specifications. Many network protocol implementations (TCP/IP among them) con- tinue to use the original DIX Ethernet frame, for example. Campus Ethernets used to interconnect computers equipped with hardware built according to both the DIX and 802.3 specs can interoperate on the same Ethernet LAN. The stan- dards were written so that mixing things together like this on the same Ethernet system still works. 3.6.3. Twisted-Pair Ethernet Specifications Since the creation of the twisted-pair Ethernet standard in 1990 the twisted-pair Ethernet market has seen extraordinary growth. The twisted-pair system makes it possible to install Ethernet in an office using standard twisted-pair wiring. This has led to the twisted-pair Ethernet system becoming the system of choice at many sites. The twisted- pair specification is described in a supplement from the IEEE. Eventually the twisted-pair standard will be incor- porated in the ISO 8802.3 standard document. Until that happens you need to acquire this document to get the formal twisted-pair specifications. This supplement also contains some newly written guidelines for building large, multi- segment Ethernets using a mix of Ethernet varieties. The title is (take an even deeper breath): Page 41 Network Reading List Section 3: Ethernet +o 802.3i-1990 IEEE Supplement to Carrier Sense Multiple Access with Collision Detection CSMA/CD Access Method and Phy- sical Layer Specifications: System Considerations for Multisegment 10 Mb/s Baseband Networks (Section 13) and Twisted-Pair Medium Attachment Unit (MAU) and Baseband Medium, Type 10BASE-T (Section 14) ISBN 1-55937-070-X IEEE Product Number SH13763 Price $26.00, from IEEE catalog. Same access for IEEE as above. 3.7. Ethernet Numbers This section describes two sets of numbers used in the Eth- ernet system. Both sets are useful in network troubleshoot- ing. The standards agencies that oversee the administration of these numbers are also listed. 3.7.1. Ethernet Type Numbers and Addresses The Ethernet frame specified by the DIX standard contains a Type field. The DIX Ethernet Type field contains a type number that describes the type of high-level network proto- col (such as TCP/IP) being carried by the Ethernet frame. This information can be quite handy when you're troub- leshooting a LAN problem and trying to figure out which high-level protocol may be involved. In the new IEEE 802.3 frame specification, the type field was replaced by a more general, but more complex, set of frame specifiers. Nevertheless, many network software implementations still use the DIX frame specification with its accompanying Ethernet type field. The addresses used in Ethernet frames are also useful to the network troubleshooter. The 48-bit Ethernet address is called an "Organizationally Unique Identifier" (OUI) and is divided into two 24-bit portions. The first portion is assigned to a specific manufacturer by the IEEE and the second portion is used by that manufacturer to create a unique address for each Ethernet interface. The total result is a 48-bit address for each Ethernet interface con- sisting of a 24-bit pattern that is assigned by the IEEE and another 24 bits assigned by the manufacturer to each inter- face. If you know the manufacturer's number, you can frequently identify which computer may be causing network problems. This is not a foolproof mechanism, since some vendors may Network Reading List Page 42 Section 3: Ethernet buy their boards from other manufacturers. Nonetheless, in many cases knowing the Ethernet addresses assigned to a manufacturer can help track down a malfunctioning device. 3.7.2. IEEE OUI List The IEEE used to treat all OUI assignments as confidential information. The latest policy is that the address assign- ment will be made publicly available unless the vendor requests privacy. Vendors may regard the number of OUIs they request as confidential information, so the public list of OUIs assigned by the IEEE must be assumed to be incom- plete. The IEEE list can be retrieved via anonymous FTP from host ieee.org in the info/stds directory as filename info.stds.oui. You may also retrieve a copy of the IEEE list by sending an e-mail message to info.stds.oui@ieee.org and a copy of the list will be sent to you in return. 3.7.3. MIT Numbers List The IEEE does not supply a list of DIX Ethernet Type fields, since the IEEE does not assign Type fields. Also, the IEEE list of OUIs is necessarily incomplete. To help overcome these problems a publicly available list of type fields and vendors' addresses has been compiled by network administra- tors who have observed and analyzed Ethernet traffic on their networks. This list too is necessarily incomplete, but nonetheless provides a wealth of useful information. The list of OUIs and Type fields may be found via anonymous FTP on host ftp.lcs.mit.edu in directory pub/map as filename EtherNet-codes. If you have discovered a new vendor's address or other Ethernet number that you would like to add to this list, you can send your entry to map@lcs.mit.edu. 3.7.4. Assigned Numbers RFC A list of Ethernet numbers for troubleshooting, including both the type field numbers and the Ethernet address numbers, can also be found in the Assigned Numbers RFC. The Assigned Numbers RFC is an RFC for the TCP/IP protocol suite that also contains a list of some of the Ethernet numbers. This RFC may be retrieved as described in the section on TCP/IP and the RFCs. 3.7.5. Administration of Ethernet Numbers Page 43 Network Reading List Section 3: Ethernet Type Field Since the type field is part of the older DIX specification, Xerox manages the administration of Ethernet type fields. The Ethernet patents are owned by Xerox as well, and licenses to build Ethernet equipment using these patents can be obtained from the same source. Anyone wishing to apply for a new type field should contact Xerox at the following address: Xerox Corporation Xerox Systems Institute 3400 Hillview Ave. P.O. Box 10034 Palo Alto, CA 94303 (415) 813-7164 As stated in Xerox literature: "Per Appendix B of the Ether- net Specification, a Ethernet type field will be assigned on written request to each licensee of Ethernet patents. The licensing fee is $1000.00. Others wishing to obtain type field assignments may do so by including a $300.00 adminis- trative fee with their written request." IEEE 802.3 Addresses All new Ethernet addresses (OUIs) are assigned by the IEEE, although older ones assigned by Xerox are still valid. Any- one attaching a computer to an Ethernet system need not con- cern themselves with addresses, since a unique Ethernet address is assigned to each Ethernet interface at the fac- tory. On the other hand, for the curious, a block of addresses costs $1000.00. The address for inquiries is: IEEE Standards Office 820 Second Avenue, 7th Floor New York, NY 10017-4504 (201) 981-0060 3.8. Ethernet Performance Analysis Ethernet has been around for a while and provides network communications at many sites, so you'd think that the per- formance characteristics would be well established. Nonetheless there have been surprising claims made about Ethernet's ability to transmit data. Some of the claims have been based on papers written about the Ethernet system over the last several years, and a number of these papers have based their performance analysis on simulations and simplifications of the Ethernet protocols. This has inad- vertently helped to establish a mythology about Ethernet performance limits. Fortunately there has been some Network Reading List Page 44 Section 3: Ethernet empirical analysis that demonstrates the actual performance of Ethernet. +o Measured Capacity of an Ethernet: Myths and Reality David R. Boggs, Jeffrey C. Mogul, Christopher A. Kent. Proceedings of the SIGCOMM '88 Symposium on Communica- tions Architectures and Protocols, ACM SIGCOMM, Stanford, CA., August 1988, 31 pps. This technical report from Digital's Western Research Lab presents empirical evidence showing that the 10 Mbit/sec Ethernet system is capable of transmitting at the full 10 megabit data rate. Also useful is the analysis of what makes a good Ethernet implementation. The report includes a brief set of network design guidelines for network managers who want to optimize their Ethernet system. From the Abstract: "Ethernet, a 10 Mbit/sec CSMA/CD network, is one of the most successful LAN technologies. Considerable confusion exists as to the actual capacity of an Ethernet, especially since some of the theoretical studies have examined operating regimes that are not characteristic of actual networks. Based on measurements of an actual implementation, we show that for a wide class of applications, Ethernet is capable of carrying its nominal bandwidth of useful traffic, and allocates the bandwidth fairly." This paper is available over the Internet via electronic mail from the DEC Western Research archive server. Send a message to the automatic mail server with the word "help" in the Subject line of the message for detailed instructions. The address of the DEC technical reports mail server is WRL-Techreports@decwrl.dec.com. You may also request a copy of the report through the U.S. postal system by writing to: Technical Report Distribution DEC Western Research Laboratory, UCO-4 100 Hamilton Avenue Palo Alto, California 94301 Page 45 Network Reading List Section 4: Interest-Groups, Periodicals, and Conferences Section 4 This is Section 4 of a four-section document entitled "Net- work Reading List: TCP/IP, UNIX, and Ethernet." The four sections of this annotated list of resources were created to help you find information about TCP/IP, UNIX, and Ethernet. The complete list describes a wide range of items, including both introductory and in-depth information. Section 1 covers TCP/IP resources, Section 2 covers UNIX, Section 3, Ethernet, and Section 4, miscellaneous items. 4. Interest Groups, Periodicals, and Conferences This section briefly lists some electronic mail interest groups, networking periodicals, networking conferences, and other miscellaneous items. 4.1. Interest Groups There is a large and ever-increasing set of interest groups that communicate via redistributed e-mail and the Usenet (User's Network). Details on how electronic mail functions may be found in sources listed in previous sections. One form of electronic mail redistribution consists of mail- ing lists to which you add your e-mail address. Mail sent to the list is redistributed to all members of the list. Some of the lists have moderators who filter the incoming mail before sending it out to the members. Other lists are unmoderated, and all mail sent to the main address of the list is automatically resent to every member of the list. The Usenet system is a method of distributing electronic mail that has been organized as a set of articles stored as a newsgroup. In practice, each group consists of a disk file that holds a given number of messages sent to the group address. The number of files saved in each group at any given moment is a local administration issue, and depends on the disk space available, etc. As the space is filled up, old messages disappear when new messages arrive. There are many groups being distributed by the Usenet system, with an uncounted but huge audience worldwide. Usenet is often sim- ply called "netnews," or even just "news." 4.1.1. BITNET The BITNET networks support a wide range of interest lists and archives. The best way to find out about these resources is to send a message to the LISTSERV utility main- tained at host BITNIC. You can request a help file describ- ing the LISTSERV utility. You can also request a copy of Network Reading List Page 46 Section 4: Interest Groups, Periodicals, and Conferences the BITNET list of lists which is called the LISTSERV GROUPS file. Access to BITNET Lists To get a copy of the LISTSERV lists file send a mail message to LISTSERV@BITNIC.BITNET and include the command: SENDME LISTSERV GROUPS The command should be in the body of the message and there should be no other text in the message. To get a copy of a description of the LISTSERV utility send a request to the same address with the command: SENDME LISTSERV MEMO 4.1.2. Usenet Groups There are a large number of interest groups available via the Usenet. Here are just a few examples: +o comp.protocols.tcp-ip This stands for "computers, protocols, TCP/IP." This list discusses any and all TCP/IP issues. +o comp.unix.misc One of many UNIX Usenet groups, this one assigned to discussions of miscellaneous issues. +o comp.dcom.lans General LAN questions and answers, including some Eth- ernet information. +o comp.dcom.lans.ethernet Dedicated to Ethernet questions and information. There are many, many more lists of this sort available via the Usenet. The group news.announce.newusers periodically publishes articles that contain lists of groups available on Usenet, as well as mailing lists available on other network systems. The monthly postings in this group also include introductory articles for newcomers to the Usenet system. Consult your local system administrator for information about access to the Usenet system. The group news.answers contains postings of the various lists of Frequently Asked Questions (FAQs) for each Usenet list that has generated a FAQ. You can also get FAQs by anonymous FTP from host pit-manager.mit.edu in the pub/usenet/news.answers directory. These files can be retrieved via e-mail as well. You can retrieve an introduc- tion to FAQs by sending the command send usenet/news.answers/news-answers/introduction in an e-mail message sent to mail-server@pit-manager.mit.edu Page 47 Network Reading List Section 4: Interest-Groups, Periodicals, and Conferences 4.2. Periodicals You'll find networking topics described in many different periodicals and journals. The book "Life With UNIX" lists a number of UNIX periodicals that include articles on network- ing. There are also many periodicals and journals that specialize in networking issues or have a heavy emphasis on covering networking stories. Several network periodicals are listed here to provide an idea of what's available. Each periodical has a different format, mix of articles, and writing style. It's up to you to try them out and decide which ones provide the information you need. For more exam- ples consult an engineering library or technical bookstore. +o Network World The Newsweekly of User Networking Strategies Weekly tabloid Available free to qualified subscribers Network World 161 Worchester Road Framingham, Mass. 01701 (508) 875-6400 Wide coverage of the network market including frequent pro- duct guides focused on specific equipment such as bridges or routers. A good place to find the latest news on what the major vendors are up to, as well as the latest network tech- nology offerings. +o Communications Week The Newspaper For Network Decision Makers Weekly tabloid Available free to qualified subscribers Communications Week P.O. Box 2070 Manhasset, NY 11030 A networking weekly that also tracks the networking market as well as the activities of major vendors. Publishes pro- duct guides. +o Data Communications McGraw-Hill's Networking Technology Magazine Monthly magazine Available free to qualified subscribers Data Communications McGraw-Hill Inc. McGraw-Hill Building 1221 Avenue of the Americas Network Reading List Page 48 Section 4: Interest Groups, Periodicals, and Conferences New York, N.Y. 10020 (212) 512-2000 Features large network systems along with LAN coverage. Includes articles on wide area networks, T1 and other serial line technologies, equipment tests, the latest networking developments, etc. +o Connexions The Interoperability Report U.S./Canada subscriptions $150 for 12 issues/year No advertising Connexions 480 San Antonio Road Mountain View, CA 94040-1219 (415) 941-3399 E-mail: connexions@interop.com A publication associated with the Interop conference, Con- nexions concentrates on technical articles from protocol developers and others working on the latest issues in net- work interoperability. Status reports on the latest research in various network issues are also featured. +o Computer Communication Review The SIGCOMM Quarterly Publication $37 includes copy of Annual SIGCOMM conference proceed- ings Association for Computing Machinery P.O. Box 12115 Church Street Station New York, N.Y. 10249 (212) 869-7440 The Computer Communication Review is a quarterly report on SIGCOMM, the ACM special interest group on data communica- tion. It includes reports on networking, telephony, and protocol verification. The topics covered include network architecture and design for LANs and large networks, recent network standards activities, etc. You can find news here about the latest thinking in network standards, as well as reports on work to increase the speed of networks and proto- cols. A subscription also gets you a copy of the annual SIGCOMM conference proceedings. +o InfoWorld Infoworld Publishing Co. 155 Bovet Road Suite 800 San Mateo, CA 94402 (415) 572-7341 or (800) 227-8365 Page 49 Network Reading List Section 4: Interest-Groups, Periodicals, and Conferences Focusses on personal computing and networks. Includes "From the Ether" column by publisher Bob Metcalfe, chief inventor of the Ethernet system. +o LAN The Local Area Network Magazine $19.97 for 12 issues /year For subscriptions: LAN Miller Freeman Publications P.O. Box 41904 Nashville, TN 37204 (800) 933-3321 or (615) 377-3322 Covers personal computer LANs, and includes interviews with various networking experts. Also features regular product guides, equipment tests and reviews, and articles on new network technologies. +o Network Computing Available free to qualified subscribers: Network Computing 600 Community Drive Manhasset NY 11030-9789 (516) 562-5071 Emphasizes network operating systems and software. Personal computer issues and the latest in PC network hardware and software are topics. 4.3. Conferences Just about every computer conference includes networking issues these days. There are also several conferences that focus on networking, each with their own particular slant such as PC networks, mainframe networks, etc. INTEROP The Interop conferences focus on networks and network interoperability and are loaded with information on the three main topics of this reading list. They are held on the east and west coasts in the Spring and the Fall, although future conferences will be held in Las Vegas. A feature of Interop is that the vendor booths are all attached to a large show network in a practical demonstra- tion of network interoperability. The conference features tutorials by TCP/IP experts, and several days of technical sessions on all manner of TCP/IP subjects, UNIX networking, and Ethernet issues, as well as on evolving OSI protocols, etc. For more information contact: Network Reading List Page 50 Section 4: Interest Groups, Periodicals, and Conferences +o Interop Inc. 480 San Antonio Road Mountain View, CA 94040 (415) 941-3399 (800) 776-6676 FAX (415) 949-1779 USENIX One UNIX-oriented meeting that is likely to be of use to networkers is the USENIX conference, run by the USENIX Asso- ciation. USENIX conferences are aimed at the technical UNIX developer and feature technical sessions based on refereed papers. You can stay fairly current with the latest in UNIX networking and other developments by reading the conference proceedings for the twice a year USENIX conferences. The USENIX Association also publishes a newsletter, ";login:," which publishes book reviews, reports on UNIX standardization meetings, and the like. For more informa- tion, contact: +o USENIX Association 2560 Ninth Street, Suite 215 Berkeley, CA 94710 (415) 528-8649 Internet Address: office@usenix.org 4.4. Access to the Internet The UT Austin campus network is connected to the national and worldwide Internet via THEnet, the statewide Texas Higher Education network. Like UT, many universities are connected to the Internet by way of various regional net- works. Many companies have gained access to the Internet in the same fashion. If you are looking for an Internet con- nection, the first thing to do is check with your local net- work administrator. You can also find lists of service providers in the books The Internet Companion and The Whole Internet User's Guide and Catalog. 4.5. Access to Resources Many of the resources listed here are books, and can be found in technical bookstores and engineering libraries. If you are having trouble finding a book listed here, the fol- lowing bookstore can probably help. +o Computer Literacy Bookshop 2590 North First St. Page 51 Network Reading List Section 4: Interest-Groups, Periodicals, and Conferences San Jose, CA 95131 Phone (408) 435-0744 FAX (408) 435-1823 E-mail: info@clbooks.com Computer Literacy is an excellent source for computer and electronics books of all kinds. They also carry some of the IEEE and ISO network standards, and can probably supply most of the books listed in this guide. Anonymous FTP Anonymous FTP simply means that the remote site makes files available by way of the TCP/IP-base File Transfer Program to anyone who wishes to acquire them. After making a connec- tion to the site with the FTP program, you log in using "anonymous" as a username. At the password prompt it is often the case that you are asked to provide your electronic mail address, or you may use the word "guest." FTP by E-mail For sites that have only e-mail access to the Internet it is still possible to retrieve files via FTP. For Internet sites send e-mail to ftpmail@decwrl.dec.com with the word "help" in the body of the message. You will receive a help file in response, explaining the commands that you can send in an e-mail message that will cause the FTPmail service to retrieve a file for you. UUCP sites with an Internet con- nection can use the address yourlink!decwrl!ftpmail to con- tact the FTPmail service. BITNET sites may retrieve instructions on the use of a BIT- NET FTPmail service by sending the word "help" in an e-mail message sent to bitftp@pucc.princeton.edu Network Reading List Page 52 TABLE OF CONTENTS Section 1 -- TCP/IP Guides To The Internet ................................ 1.1 Electronic Mail and the Internet ...................... 1.2 TCP/IP Network Administration ......................... 1.3 The Request for Comments (RFCs) ....................... 1.4 Some Useful RFCs ......................................1.4.1 Electronic Mail and FTP Access to the RFCs ............1.4.2 Hard Copies of the RFCs ...............................1.4.3 Internet Registration Service ......................... 1.5 Other InterNIC Services ............................... 1.6 TCP/IP Protocols ...................................... 1.7 Section 2 -- UNIX UNIX In General ....................................... 2.1 UNIX Security ......................................... 2.2 UNIX Networking In Detail ............................. 2.3 Section 3 -- Ethernet Introduction To LAN Concepts ......................... 3.1 Introduction to Three Ethernet Varieties .............. 3.2 Vendor Guides ......................................... 3.3 Hewlett-Packard Manuals ...............................3.3.1 DEC Manuals ...........................................3.3.2 MOD-TAP ...............................................3.3.3 Ethernet Hardware and Vendors ......................... 3.4 Network and LAN Troubleshooting Guides ................ 3.5 Ethernet Standards .................................... 3.6 The DIX Standard ......................................3.6.1 The IEEE 802.3 Standard (ISO 8802.3) .................3.6.2 Twisted-Pair Ethernet Specifications ..................3.6.3 Ethernet Numbers ...................................... 3.7 Ethernet Performance Analysis ......................... 3.8 Section 4 -- Interest Groups, Periodicals, and Conferences Interest Groups ....................................... 4.1 BITNET ................................................4.1.2 Usenet Groups .........................................4.1.3 Periodicals ........................................... 4.2 Conferences ........................................... 4.3 Access to the Internet ................................ 4.4 Access to Resources ................................... 4.5