GENWiki

Premier IT Outsourcing and Support Services within the UK

User Tools

Site Tools


archive:internet:nug

[ netinfo/nug.doc ]

NIC 60001, September 1991 DDN New User Guide

                           DDN NEW USER GUIDE
                             September 1991
                                 Editor:
                             Barbara Varallo
                     First Edition:  December 1985
                     Revised:  November 1987
                     Second Edition:  February 1991
                     Third Edition:  September 1991

Prepared by the DDN Network Information Center, Government Systems Incorporated, 14200 Park Meadow Drive, Suite 200, Chantilly, VA 22021. Copies may also be obtained from the Defense Technical Information Center (DTIC), Cameron Station, Alexandria, VA 22314.

DRAFT DRAFT

NIC 60001, September 91 DDN New User Guide

    [ NOTE:  This document is set up for printing in 12 cpi
    non-proportional font.  The top and bottom margins are set
    at .25 with three blank lines above the header and four below
    the footer.  Right and left margins are presumed to be one
    inch.  Hard page breaks (^L) have been inserted. ]
                          ACKNOWLEDGEMENTS

The DDN New User Guide was prepared by the DDN Network Information Center for the Defense Information Systems Agency, Defense Network Systems Organization (DISA DNSO) under contract number DCA 200-90-R-0029.

The NIC wishes to acknowledge the valuable services that the Host Administrators and Node Site Coordinators have provided to the network community and to the development of this guide.

UNIX is a registered trademark of AT&T Bell Laboratories. TOPS 20 is a registered trademark of Digital Equipment Corporation. InfoMail is a trademark of BBN Communications Division. PostScript is a registered trademark of Adobe Systems Incorporated. Procomm is a trademark of Datastorm Technologies, Inc.

DDN New User Guide. Printed and bound in the United States of America. Published by the DDN Network Information Center, 14200 Park Meadow Drive, Suite 200, Chantilly, VA 22021.

DRAFT [Page i] DRAFT

NIC 60001, September 91 DDN New User Guide

                          TABLE OF CONTENTS

SECTION 1. INTRODUCTION. . . . . . . . . . . . . . . . . . . . . . . . . . 1

 1.1  Welcome . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
 1.2  Using This Guide. . . . . . . . . . . . . . . . . . . . . . . . . . 2
 1.3  Document Conventions. . . . . . . . . . . . . . . . . . . . . . . . 4
 1.3.1  User Input Display. . . . . . . . . . . . . . . . . . . . . . . . 4
 1.3.2  Machine Output Display. . . . . . . . . . . . . . . . . . . . . . 4
 1.3.3  Comment Display . . . . . . . . . . . . . . . . . . . . . . . . . 4
 1.3.4  Typing Control Characters . . . . . . . . . . . . . . . . . . . . 5

SECTION 2. THE DEFENSE DATA NETWORK. . . . . . . . . . . . . . . . . . . . 6

 2.1  Network Overview. . . . . . . . . . . . . . . . . . . . . . . . . . 6
 2.2  Network Access Methods. . . . . . . . . . . . . . . . . . . . . . . 7
 2.3  Organization of the DDN . . . . . . . . . . . . . . . . . . . . . . 8
 2.4  Development of the DDN. . . . . . . . . . . . . . . . . . . . . . . 8
 2.5  The Defense Information Systems Agency, Defense Network Systems 
      Organization (DISA DNSO). . . . . . . . . . . . . . . . . . . . . .10

SECTION 3. NETWORK CONNECTION. . . . . . . . . . . . . . . . . . . . . . .11

 3.1  Host Access . . . . . . . . . . . . . . . . . . . . . . . . . . . .11
 3.2  TAC Access. . . . . . . . . . . . . . . . . . . . . . . . . . . . .11
 3.3  Gateway Access. . . . . . . . . . . . . . . . . . . . . . . . . . .12
 3.4  A Word About Personal Computers . . . . . . . . . . . . . . . . . .12

SECTION 4. DDN TAC ACCESS. . . . . . . . . . . . . . . . . . . . . . . . .14

 4.1  TAC Card Information. . . . . . . . . . . . . . . . . . . . . . . .14
 4.1.1  TAC User Registration . . . . . . . . . . . . . . . . . . . . . .14
 4.1.1.1  Users Behind Concentrators. . . . . . . . . . . . . . . . . . .15
 4.1.2  TAC Card Example. . . . . . . . . . . . . . . . . . . . . . . . .16
 4.1.2.1  Common TAC Card Userid/Access-Code Input Errors . . . . . . . .17
 4.1.3  Obtaining the TAC Users' Guide. . . . . . . . . . . . . . . . . .18
 4.2  TAC Login Procedures. . . . . . . . . . . . . . . . . . . . . . . .18
 4.2.1  Connecting to a TAC/Mini-TAC. . . . . . . . . . . . . . . . . . .18
 4.2.1.1  Dial-up TACs. . . . . . . . . . . . . . . . . . . . . . . . . .18
 4.2.1.2  Using a Terminal with an Acoustic Coupler . . . . . . . . . . .19
 4.2.1.3  Using a Dial-up Modem . . . . . . . . . . . . . . . . . . . . .19
 4.2.1.4  Using a PC and Communications Software. . . . . . . . . . . . .19
 4.2.1.5  Hard-Wired TACs . . . . . . . . . . . . . . . . . . . . . . . .20

DRAFT [Page ii] DRAFT

NIC 60001, September 91 DDN New User Guide

 4.2.2  TAC Login . . . . . . . . . . . . . . . . . . . . . . . . . . . .20
 4.2.3  Common TAC Login Problems . . . . . . . . . . . . . . . . . . . .22
 4.2.3.1  TAC Login Error Messages. . . . . . . . . . . . . . . . . . . .22
 4.2.3.2  Host Connection Errors. . . . . . . . . . . . . . . . . . . . .24
 4.2.4  Changing the TAC Intercept Character. . . . . . . . . . . . . . .25
 4.2.5  Using a TAC for File Transfer (FTP) . . . . . . . . . . . . . . .26
 4.2.5.1  Changing the Intercept Character. . . . . . . . . . . . . . . .26
 4.2.5.2  Setting Flow Control on the TAC . . . . . . . . . . . . . . . .26
 4.2.5.3  Putting the TAC in Binary Mode. . . . . . . . . . . . . . . . .27
 4.2.6  A Brief Word About Mini-TACs. . . . . . . . . . . . . . . . . . .28

SECTION 5. NETWORK USE . . . . . . . . . . . . . . . . . . . . . . . . . .29

 5.1  Electronic Mail . . . . . . . . . . . . . . . . . . . . . . . . . .29
 5.1.1  UNIX Mail Examples. . . . . . . . . . . . . . . . . . . . . . . .32
        Sending Mail Via UNIX . . . . . . . . . . . . . . . . . . . . . .32
        Reading UNIX Mail . . . . . . . . . . . . . . . . . . . . . . . .32
        Getting Help for UNIX Mail. . . . . . . . . . . . . . . . . . . .33
 5.1.2  InfoMail Examples . . . . . . . . . . . . . . . . . . . . . . . .34
        Sending a Message Via InfoMail. . . . . . . . . . . . . . . . . .34
        Reading Mail with InfoMail. . . . . . . . . . . . . . . . . . . .35
        Getting Help for InfoMail . . . . . . . . . . . . . . . . . . . .36
 5.2  File Transfer Protocol (FTP). . . . . . . . . . . . . . . . . . . .36
 5.2.1  Transferring a File on a UNIX System. . . . . . . . . . . . . . .39
 5.2.2  How to FTP a Directory Listing. . . . . . . . . . . . . . . . . .40
 5.3  Using TELNET. . . . . . . . . . . . . . . . . . . . . . . . . . . .42
 5.3.1  Invoking TELNET with the Hostname on the Command Line . . . . . .42
 5.3.2  TELNET Using Host Address . . . . . . . . . . . . . . . . . . . .44

SECTION 6. DDN NETWORK INFORMATION CENTER (NIC). . . . . . . . . . . . . .46

 6.1  Contacting the NIC. . . . . . . . . . . . . . . . . . . . . . . . .46
 6.1.1  NIC User Assistance Help Desk . . . . . . . . . . . . . . . . . .46
 6.1.2  NIC Host. . . . . . . . . . . . . . . . . . . . . . . . . . . . .47
 6.1.3  NIC Online Contacts . . . . . . . . . . . . . . . . . . . . . . .47
 6.1.4  NIC U.S. Mail Address . . . . . . . . . . . . . . . . . . . . . .48
 6.2  NIC Services. . . . . . . . . . . . . . . . . . . . . . . . . . . .48
 6.2.1  Network and User Registration Services. . . . . . . . . . . . . .48
 6.2.2  Usage-Sensitive Billing Service Desk. . . . . . . . . . . . . . .50
 6.2.3  Security Coordination Center (SCC). . . . . . . . . . . . . . . .50
 6.3  NIC User Programs . . . . . . . . . . . . . . . . . . . . . . . . .50
 6.3.1  WHOIS/NICNAME . . . . . . . . . . . . . . . . . . . . . . . . . .51

DRAFT [Page iii] DRAFT

NIC 60001, September 1991 DDN New User Guide

 6.3.1.1  Accessing WHOIS . . . . . . . . . . . . . . . . . . . . . . . 51
          From a TAC. . . . . . . . . . . . . . . . . . . . . . . . . . 51
          From a DDN Host . . . . . . . . . . . . . . . . . . . . . . . 51
          Via Electronic Mail . . . . . . . . . . . . . . . . . . . . . 52
 6.3.1.2  Using WHOIS . . . . . . . . . . . . . . . . . . . . . . . . . 52
 6.3.1.3  WHOIS Search Examples . . . . . . . . . . . . . . . . . . . . 53
          WHOIS Search by Name. . . . . . . . . . . . . . . . . . . . . 54
          WHOIS Search by Partial Name. . . . . . . . . . . . . . . . . 55
          WHOIS Search by Handle. . . . . . . . . . . . . . . . . . . . 56
          WHOIS Search by Hostname. . . . . . . . . . . . . . . . . . . 56
          WHOIS Search by TAC Name. . . . . . . . . . . . . . . . . . . 58
          WHOIS Search by PSN Number. . . . . . . . . . . . . . . . . . 59
          WHOIS Search by Network Number. . . . . . . . . . . . . . . . 60
          WHOIS Search by Domain Name . . . . . . . . . . . . . . . . . 61
 6.3.2  NIC/QUERY . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
 6.3.3  TACNEWS . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
 6.3.4  NIC Kermit Server . . . . . . . . . . . . . . . . . . . . . . . 66
 6.3.5  NIC Automated Mail Service. . . . . . . . . . . . . . . . . . . 67
 6.4  Documents Published by the NIC. . . . . . . . . . . . . . . . . . 68
 6.5  Online Reference Files at the NIC . . . . . . . . . . . . . . . . 69

SECTION 7. SECURITY CONSIDERATIONS AND NETWORK CONDUCT . . . . . . . .. 73

 7.1  Requirements for Legitimate DDN Access. . . . . . . . . . . . . . 73
 7.2  Security Considerations and Guidelines for Network Conduct. . . . 73
 7.3  Network Conduct . . . . . . . . . . . . . . . . . . . . . . . . . 75
 7.3.1  Passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
 7.3.2  File Protection . . . . . . . . . . . . . . . . . . . . . . . . 75
 7.3.3  Plagiarism. . . . . . . . . . . . . . . . . . . . . . . . . . . 76
 7.3.4  Mail. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
 7.4  Additional Security Information . . . . . . . . . . . . . . . . . 77

SECTION 8. NETWORK CONCEPTS OVERVIEW . . . . . . . . . . . . . . . . . . 78

 8.1  Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . 78
 8.2  Usage Sensitive Billing . . . . . . . . . . . . . . . . . . . . . 78
 8.3  Network Concentrators . . . . . . . . . . . . . . . . . . . . . . 79
 8.4  Network Addressing. . . . . . . . . . . . . . . . . . . . . . . . 81
 8.4.1  Finding Network Address Information . . . . . . . . . . . . . . 85
 8.4.2  Obtaining Network Addresses . . . . . . . . . . . . . . . . . . 85
 8.4.3  Knowing Your Network Address. . . . . . . . . . . . . . . . . . 85
 8.5  The Domain Name System. . . . . . . . . . . . . . . . . . . . . . 86
 8.6  Government Open Systems Interconnection Profile (GOSIP) . . . . . 89

DRAFT [Page iv] DRAFT

NIC 60001, September 1991 DDN New User Guide

SECTION 9. NETWORK SERVICE CENTERS AND CONTACTS. . . . . . . . . . . . . 90

 9.1  The DDN Network Information Center (NIC). . . . . . . . . . . . . 90
 9.1.1  General Reference Service Provided by the NIC . . . . . . . . . 91
 9.1.2  NIC Online Contacts . . . . . . . . . . . . . . . . . . . . . . 91
 9.1.3  NIC U.S. Mail Address . . . . . . . . . . . . . . . . . . . . . 92
 9.2  Network Monitoring Centers (NMCs) . . . . . . . . . . . . . . . . 92
 9.2.1  NMC Services. . . . . . . . . . . . . . . . . . . . . . . . . . 92
 9.2.2  NMC Contacts. . . . . . . . . . . . . . . . . . . . . . . . . . 93
 9.2.3  NMC U.S. Mail Addresses . . . . . . . . . . . . . . . . . . . . 93
 9.3  Host Administrators and Node Site Coordinators. . . . . . . . . . 93
 9.4  Military Communications and Operations Command Contacts . . . . . 94
 9.5  Defense Information Systems Agency, Defense Network
      Systems Organization (DISA DNSO). . . . . . . . . . . . . . . . . 95
 9.6  Network Use Problems. . . . . . . . . . . . . . . . . . . . . . . 95

SECTION 10. BIBLIOGRAPHY . . . . . . . . . . . . . . . . . . . . . . . . 96

SECTION 11. GLOSSARY . . . . . . . . . . . . . . . . . . . . . . . . . .100

APPENDIX A. NETWORK RESOURCES. . . . . . . . . . . . . . . . . . . . . .109

APPENDIX B. COMMONLY ASKED QUESTIONS . . . . . . . . . . . . . . . . . .112

INDEX

                            LIST OF FIGURES

Figure 2-1 Methods of Accessing the Network. . . . . . . . . . . . . .7

Figure 4-1 TAC Card Illustration . . . . . . . . . . . . . . . . . . 16

Figure 6-1 User Registration Template. . . . . . . . . . . . . . . . 49

Figure 8-1 Internet Address Classes. . . . . . . . . . . . . . . . . 84

DRAFT [Page v] DRAFT

NIC 60001, September 1991 DDN New User Guide

                         SECTION 1.  INTRODUCTION

1.1 Welcome

Welcome to the Defense Data Network, or the DDN, as it is more commonly called. The DDN is a powerful operational military network. It might be thought of as an "umbrella" network composed of several large segments or subnetworks. The unclassified portion of the DDN is a subnetwork known as the MILNET. The MILNET connects the DDN to an even larger network that includes military contractors, universities, and research centers; this entire collection of interconnected networks is called the Internet. Its users number in the thousands. It is the MILNET on which this document focuses.

The DDN New User Guide explains the policies, concepts, and conventions of the DDN, with major emphasis on the MILNET. The Guide contains an overview of and a tutorial introduction to the DDN, along with descriptions of its more interesting network programs and services. It is not intended to be a highly technical document, and it does not cover the procedures for attaching hardware, terminals, or other equipment to the network. This information is provided in other documents [1,2].

Originally, the MILNET was an integral part of the research network known as the ARPANET (after the Advanced Research Projects Agency, which was the sponsor). In 1984, the MILNET and the ARPANET were physically separated, and gateways were installed to allow traffic to be interchanged between the MILNET and the research networks sponsored by DARPA (the Defense Advanced Research Projects Agency). By 1990, the original ARPANET technology had become obsolete, and the ARPANET was discontinued in June of that year.

The DDN affords its users a wealth of services and resources. Many of your colleagues already work on the network, and you will be able to communicate with them quickly and easily, even though they may be hundreds of miles away. The DDN also allows you to participate in discussions about topics of interest to you and gives you the opportunity to use network programs and tools to enhance your own capabilities.

Using a computer network is not difficult. However, as with any new tool, using it proficiently requires learning some procedures and guidelines and practicing your new skills. The DDN New User Guide will provide the background information necessary to get you started. We hope you find it a useful introduction to the DDN.

DRAFT [Page 1] DRAFT

NIC 60001, September 1991 DDN New User Guide

1.2 Using This Guide

The DDN New User Guide is written for the beginning user and should be supplemented with reading from other sources. Network-specific terms are defined both in context and in the Glossary (Section 11). Throughout the text, references appear in the form "[n]". The bracketed numbers refer to citations in the Bibliography (Section 10), which lists documents containing additional explanatory or background information. Also, check online help systems and the documentation that usually accompanies the network programs you use. (Watch for pointers to online help files when you first access a program or service.) We encourage you to expand your knowledge of the network by consulting these and other information sources whenever you can.

The Guide is divided into sections and subsections, each covering topics of interest to a new user. A summary of the contents of each section follows.

  • Section 1 (this section) is a brief introduction to the Guide.
  • Section 2, The Defense Data Network, describes the structure of the

DDN and its administration. It also describes the MILNET and the

      role of the Defense Network System Organization (DNSO).  It provides
      a brief historical sketch of the evolution of the DDN from the
      original ARPANET.
  • Section 3, Network Connection, describes the ways in which various

machines access the network.

  • Section 4, DDN TAC Access, describes the procedures for obtaining

and using a TAC Access Card and provides detailed procedures for

      accessing the network through a Terminal Access Controller (TAC) or
      a Mini-TAC.  Also included is background information that will be
      helpful to TAC and Mini-TAC users, such as common error messages, 
      TAC commands, and instructions for performing file transfers.
  • Section 5, Network Use, provides "how-to" instructions for some of

the DDN's most useful services, such as electronic mail programs, FTP,

      and TELNET.
  • Section 6, The DDN Network Information Center (NIC), describes in

detail the databases, programs, files, documents, and services offered

      by the NIC.

DRAFT [Page 2] DRAFT

NIC 60001, September 1991 DDN New User Guide

  • Section 7, Security Considerations and Network Conduct, explains the

legal and courtesy standards of the network. The importance of host

      and network security is discussed, and in Section 7.1, the require-
      ments for legitimate access to the DDN are defined.  Be sure to read
      the etiquette section (Section 7.3).  Adhering to the guidelines given
      there will decrease your chances of unwittingly offending other users
      during your first days on the net.
  • Section 8, Network Concepts Overview, provides some background

information on terms and concepts that a new user might hear but not

      understand.  This section includes discussions on topics such as the
      Domain Name System (DNS), network addressing, Government Open Systems
      Interconnection Profile (GOSIP), and gateway concentrators.
  • Section 9, Network Service Centers and Contacts, describes network

service providers and how to reach them. The DDN Network Information

      Center (NIC) is logically the first place to look for information
      unavailable at the local level.  The NIC can help you solve network
      use problems, locate documents and resources, or identify appropriate
      points of contact (POCs) for further assistance.
  • Sections 10 and 11 are a Bibliography and a Glossary of terms used in

this guide.

  • The appendices contain information about resources available to

network users and answers to some of the questions most often asked

      by new users.
  • A feedback form is located at the back of the Guide. We encourage our

readers to use the form to make suggestions or point out errors. We

      value your comments and suggestions and will consider them for future
      versions of the DDN New User Guide.  You may also send suggestions
      online to SUGGESTIONS@NIC.DDN.MIL.

DRAFT [Page 3] DRAFT

NIC 60001, September 1991 DDN New User Guide

1.3 Document Conventions

    [NOTE:  Most of the printing/typographic conventions described here 
    do not apply to the online version of this document.  They are visible
    only in the hard-copy version.]

This document uses several printing conventions to identify the difference between characters you type (input) and those that a computer prints to your screen (output). These conventions are described below.

Unless otherwise indicated, all user input is terminated by pressing the carriage return or Enter key on your keyboard. (Pressing this key does not cause a visible character to be printed.) In this document, the carriage return or Enter key is represented as <Return>. Both input and output are characterized by a typewriter-like font to further differentiate them from the surrounding text.

1.3.1 User Input Display

Your input (i.e., the characters you type) is represented in bold typeface:

       Your input looks like this.     

1.3.2 Machine Output Display

A non-bold, non-proportional font represents machine prompts, messages, and other output.

       Machine text looks like this.   

1.3.3 Comment Display

In examples or instructions, Italics indicate comments we have inserted for further clarification.

       Our comments look like this.

DRAFT [Page 4] DRAFT

NIC 60001, September 1991 DDN New User Guide

1.3.4 Typing Control Characters

In using the network, it may sometimes be necessary for you to type special characters known as control characters. These characters are often represented in documentation by a letter prefixed with the circumflex character "^" – e.g., ^y. When entering these control characters, you must press the control key simultaneously with the desired letter. For example, if you see a "^y" in input instructions, this indicates a control-y, and it means that you should press the control key while you type the letter "y". Throughout this Guide, the control key is represented by the circumflex, unless otherwise stated.

DRAFT [Page 5] DRAFT

NIC 60001, September 1991 DDN New User Guide

                   SECTION 2.  THE DEFENSE DATA NETWORK

2.1 Network Overview

When you access a local computer, you are largely unaware of what kind of link connects your terminal to the computer you wish to use. The terminal seems to be the computer, since it prints or displays what is happening. As you progress in your work, you may need to move data from your local computer onto another computer, or you may wish to send a message to a colleague working on a computer at a distant location. At this point, the usefulness of a communication network becomes apparent.

A communication network is a group of computers joined by data-carrying links. A network may be as small as two or three personal computers tied together by local telephone lines and located in the same building, or it may be a vast complex of computers spread over the world, whose data links include long-haul telephone lines, satellite relays, fiber-optic cables, or radio links. It is also possible for several different networks to be interconnected to form an "internetwork" or "internet."

Everyone is familiar with telephones. Phone sets inside the house connect to outside lines that lead into nearby local or regional telephone exchanges. These exchanges are connected to make up one or more national telephone systems. The national telephone systems communicate with each other to make up an international telephone network. There are also private telephone systems that are totally separate from the public telephone system and have their own equipment.

Computer networks follow a similar pattern. Local area networks (called LANs) may connect computers within a building or in different buildings. A LAN may remain separate, or it may interconnect to regional, national, or worldwide commercial or government networks. Many of these large and small networks are gradually interconnecting through gateways to form a worldwide system of data networks similar to the telephone system. Indeed, since many computer networks use telephone communication lines to carry data from one computer to the next, the two systems are closely interwoven.

DRAFT [Page 6] DRAFT

NIC 60001, September 1991 DDN New User Guide

You do not need detailed knowledge of this technology to use a network, but you do need to understand the concept of going through layers of equipment and interconnections. Effective network use also requires knowing the online addresses of people or machines with which you wish to communicate and knowing your own network address as well.

The DDN is a special kind of data network known as a packet-switched network. On this network, a terminal or a source host computer (generally just called a host) passes a message along with its destination address to the local Packet Switching Node (PSN) computer. The PSN breaks the message into packets, or smaller chunks of data. Each of these packets has the same destination address and source address as the original message, plus a sequence number indicating which piece of the original message it represents. The packets are passed from PSN to PSN until they reach the destination PSN, where they are reassembled in their original order and delivered to the destination host.

A packet switched network differs from a circuit-switched network in that no predetermined dedicated path exists for delivery of the data. Each packet takes the best route that it can find at the time, and all the packets in a message do not necessarily take the same route. Once the packets arrive at the destination PSN, they are reassembled in the correct sequence and delivered to the destination host as a complete message.

2.2 Network Access Methods

The Defense Data Network (DDN) is made up of a variety of equipment. Its users provide terminals, modems, and host computers. The DDN supplies node computers, encryption equipment, and leased telephone lines. You can reach the network from your terminal in several ways by using different combinations of hardware in conjunction with different network programs. These network connection methods are shown in Figure 2-1.

    [NOTE:  Because of software limitations, figures are not visible in 
    the online version of this document.]
               Figure 2-1.  Methods of Accessing the Network

DRAFT [Page 7] DRAFT

NIC 60001, September 1991 DDN New User Guide

A terminal may reach a host in several ways.

  • A wire or cable may run directly from the terminal to the computer;

this is called a hard-wired terminal.

  • A terminal may communicate with a computer via a telephone connected

to the terminal through a modem or acoustic coupler; this is called a

      dial-up terminal.

Dial-up terminals generally connect to the network at 1200 bits per second (bps), although other speeds can be used.

    [NOTE:  The speed setting of both your terminal and your modem must
    be the same to enable the two devices to communicate properly with
    one another.]

With the appropriate equipment, personal computers may also be used as terminals. In this case, the personal computer emulates (or acts like) a terminal when it is used in terminal mode.

A terminal may be directly attached to a local area network (LAN) or to a local switch (similar to a telephone switch). The user of such a terminal can reach any computer on the LAN or any computer connected to the switch. The LAN may also be connected to the DDN through a gateway, which is a computer whose software can direct traffic from the LAN onto the larger long-haul network and vice versa.

2.3 Organization of the DDN

The Defense Data Network is a large military common-user data communications internetwork operated for the Department of Defense (DoD) by the Defense Network Systems Organization (DNSO) of the Defense Information Systems Agency (DISA). The DDN is made up of several networks. The MILNET is the DDN network that is connected to the Internet.

2.4 Development of the DDN

As mentioned previously, the MILNET is an unclassified military network that is part of the DDN. It was built using technology developed as part of the ARPANET, which was the prototype packet-switched network.

DRAFT [Page 8] DRAFT

NIC 60001, September 1991 DDN New User Guide

The ARPANET was built by the Defense Advanced Research Projects Agency (DARPA) in 1969 as an experiment to determine the viability of a store-and-forward, host-to-host, packet-switched network. The network designers wanted to demonstrate that computers made by different manufacturers, of different sizes, and running different operating systems, could communicate with one another across a network. It was envisioned that users of such a network could share programs and communicate via the network with other users at distant locations. The experiment was successful, and today many data networks are modeled after the ARPANET.

In 1979, the Department of Defense decided to interconnect several DoD long-haul computer networks through a set of internet protocols so that these networks could share the same backbone of node computers linked by high-speed telephone lines. Protocols are rules or standards by which computers communicate on a network.

The ARPANET protocols were developed by researchers known as the Internet Working Group (IWG), under the sponsorship of the DARPA Information Processing Techniques Office (IPTO). The protocols were tested for several years on the ARPANET, and they proved useful for creating the networking environment that the DoD wanted.

In 1982, the DoD issued a directive [3] adopting a single set of communication protocols based on the ARPANET protocols. This was followed later in 1982 by a directive [4] to create the DDN as a parent, or umbrella, operational military network made up of several existing or planned DoD computer networks.

By 1983, the ARPANET, which was still considered an experimental network, had grown to over 300 computers, many used for day-to-day operational military purposes as well as for research. Other military users were seeking networking services. To meet this growing need for an operational military network, the DoD evaluated several network architectures and finally chose the DARPA Internet architecture as the model for its common-user communications network, the DDN.

In September 1984, the original ARPANET was split into two separate unclassified networks–a military research and development network (ARPANET) and a military operational communications network (MILNET). The split returned to DARPA a network for experimentation and established an unclassified military network able to accommodate the DoD's growing operational needs.

DRAFT [Page 9] DRAFT

NIC 60001, September 1991 DDN New User Guide

In June 1990, the ARPANET was officially dissolved. Many sites that were formerly part of the ARPANET are now connected to the National Science Foundation Network, NSFNet. The MILNET remains under the administration of DISA. Plans for upgrading and expanding the current network are now underway.

A Defense Research Internet (DRI) will meet defense needs, while the National Research and Education Network (NREN) will provide a national forum for research and education.

2.5 The Defense Information Systems Agency, Defense Network Systems

   Organization (DISA DNSO)

DISA's Defense Network Systems Organization (DNSO) evolved from the Defense Communications System Organization in 1991 (the same year in which DISA evolved from the Defense Communications Agency). The DNSO handles overall management, operations, and policy guidelines for the DDN. It assists new military subscribers in bringing their computers and related equipment onto the DDN.

The DNSO provides many services to network users and potential network subscribers. It is responsible for

  • Keeping the network "up and running,"
  • Providing user assistance,
  • Setting policies and guidelines,
  • Anticipating growth and expansion,
  • Assisting new subscribers.

Among its other duties, the DNSO also

  • Manages access control and security for the network backbone,
  • Designates host and node contacts,
  • Coordinates military sponsors,
  • Provides technical management of contracts for services, equipment,

and software obtained from outside vendors.

To provide operational management support for the DDN, the DISA DNSO has designated a person to act as the primary Point of Contact (POC) for operations for each of the DDN networks. For example, the MILNET Manager is responsible for MILNET operations. One of his/her duties is to approve all host connections to the MILNET and all changes to such connections. For information about how to contact the current MILNET Manager or any of the other DDN network managers, you may contact the DDN Network Information Center. (See Section 6.1.1.) DRAFT [Page 10] DRAFT

NIC 60001, September 1991 DDN New User Guide

                      SECTION 3.  NETWORK CONNECTION

3.1 Host Access

To open a connection through the network from one host to another, you must first log in to one of the hosts from a terminal. After logging in, you may open a connection across the network to a second host. Once this connection is established, you may log in to the remote host computer and work there. When you finish and log out of the remote computer, the network connection is closed and you are back where you began–still logged in to the first host. In this way, it is easy to use the resources of more than one computer (assuming that you have a valid account on each system).

The direct host-to-host connection just described is called a TELNET connection. TELNET is a valuable network tool, because it lets you use programs and utilities on remote machines that may not be available locally. You may also open a specialized host-to-host link called a file transfer or FTP connection. (FTP is the acronym for File Transfer Protocol.) FTP allows you to copy or transfer files from one host to another. Sections 5.1.2 and 5.1.3 provide specific details for executing host-to-host FTP and TELNET connections.

3.2 TAC Access

You can access the network by connecting a hard-wired or dial-up terminal to a terminal access controller, or TAC, and then logging into the TAC by entering a valid Userid and Access Code (password). When a wire or cable runs directly from a terminal to a TAC, it is called a "hard-wired" terminal. A TAC allows a wide variety of terminals to communicate directly with any host on the network without going through an intervening host. After logging into a TAC, you can reach a network host by specifying its host address. You may also establish this type of connection on a Mini-TAC (see Section 4.2.6).

    [NOTE:  You must be a registered, authorized user to obtain a TAC
    Userid and Access Code.  See details in Section 4.1.1.]

DRAFT [Page 11] DRAFT

NIC 60001, September 1991 DDN New User Guide

3.3 Gateway Access

If a computer is attached to a LAN or a non-DDN network, a gateway or concentrator manages communication between the local network and the DDN. The gateway is transparent–that is, you should be unaware that it is there. Some sites do not allow traffic to flow from the DDN to their internal network. In such cases, the gateway exists and is functional, but you must use the gateway host itself to perform any tasks that require access to the DDN (e.g., to establish a TELNET or FTP connection to a DDN host). Electronic mail can travel over this type of gateway transparently. Ordinarily, you need no special commands or syntax to communicate through a gateway. Figure 2-1 illustrates a gateway connection from a LAN to the DDN, as well as the other connection strategies discussed in this Section.

    [NOTE:  Because of software limitations, figures are not visible in 
    the ASCII format of the online version of this document.]

3.4 A Word About Personal Computers

Although Personal Computers (PCs) can be attached to the DDN in several ways (including as hosts), at present, most personal computers on the DDN are not hosts–that is, they have not implemented the network protocols and are not attached directly to a PSN. Functioning simply as terminals, they have no other capabilities so far as the network is concerned.

Like a terminal, a PC can be connected to a host, Terminal Access Controller (TAC), or Mini-TAC through either a dedicated or a dial-up line. In these cases, the PC needs special software that allows it to imitate a terminal.

Once you have assembled the proper equipment, you will need to configure the software for your particular system. You will often need to set the following parameters:

   speed           The baud rate (in bits per second) at which data is sent
                   and received; usually 300 or 1200 baud if your connection
                   is through a dial-up modem.  However, 9.6 dial-up service
                   is currently being introduced.  For direct lines, check
                   with your Node Site Coordinator.
    data bits      Usually set at 8

DRAFT [Page 12] DRAFT

NIC 60001, September 1991 DDN New User Guide

    stop bits      Usually set at 1
    parity         Usually set to "even" or "none"

If these settings do not work, ask local user representatives or host personnel what your system requires. Consult the documentation that accompanies your personal computer, software, and/or modem for details of operation.

Local site representatives should be the first point of contact for PC-related problems. If you have no such representative, contact the Host Administrator for the host you are trying to reach. The NIC may also be able to help with some of the problems you encounter. Check to see if your organization has a PC users group, as other users can be a valuable source of advice. In addition, the network has several general and machine-specific PC interest groups that can provide a broad range of information and answers. (See Appendix A for information on these groups, and see Section 4.2.5 for a discussion of transferring files through a TAC or Mini-TAC to a PC.)

DRAFT [Page 13] DRAFT

NIC 60001, September 1991 DDN New User Guide

                         SECTION 4.  DDN TAC ACCESS

This section provides information about TAC cards and explains how to use a TAC or Mini-TAC to log on to the network and set it to transfer files. It also provides information on special settings that may be required to allow the TAC/Mini-TAC to transfer files and function more efficiently.

4.1 TAC Card Information

The following paragraphs explain how users are registered to receive TAC cards, what items are printed on a TAC card, and how to get a TAC Users' Guide.

4.1.1 TAC User Registration

If you are unable to connect directly to your host computer, you will be issued a TAC Access Card that allows you to access your host via a TAC or Mini-TAC. Whether you are located hundreds or thousands of miles away from the host or right next door, you will need a TAC card only if you cannot access your host directly.

TAC access requires official authorization from a MILNET Host Administrator, as well as the assignment of a unique TAC Userid and Access Code (Password).

After official authorization, the NIC issues each MILNET TAC user a TAC Access Card containing a Userid and Access Code. The NIC cannot issue a card until it has received approval from the Host Administrator for the user's primary MILNET host.

    [NOTE:  If you need a TAC card for a limited time, your Host
    Administrator can probably issue you a TAC guest card, which is
    good for up to three months.  If you need such temporary access,
    contact your Host Administrator.]

Regardless of whether you normally use a direct connection to your host, you may need a TAC Access Card if you travel extensively. Because TACs and Mini-TACs are located all over the world, an Access Card allows you to log in when you are out of town without incurring long distance phone charges.

DRAFT [Page 14] DRAFT

NIC 60001, September 1991 DDN New User Guide

The TAC Access Card contains a Userid and Access Code. This Userid and Access Code are to be used only by the person to whom the card is issued. While there is a strict policy of limiting TAC cards to one per person, you may have many DDN host login accounts, and one TAC card can be used to access any of these accounts. You do not need a TAC card from each host on which you have an account. Any TAC card works on all TACs.

Note that TAC cards are issued to users by individual name only. They are not issued to groups of users or entire offices. This policy applies even when many users share a single login account. Not only is this a security measure, but it also prevents multiple users from losing DDN access when a single card is invalidated.

If you are using a card issued to another DDN user, please notify the person listed as the CONTACT on the card. This is probably your Host Administrator. Inform him/her that you are using an account on his/her host and that you wish to have a TAC card issued in your own name.

4.1.1.1 Users Behind Concentrators

DDN Management Bulletin 76 [5] states that only administrators of hosts that are directly connected to the MILNET can authorize TAC or Mini-TAC Access Cards for their users. Administrators of hosts that are behind concentrators or gateways cannot directly authorize their users for TAC access. Such administrators will need to transfer jurisdiction over their users to a Host Administrator associated with a directly-connected MILNET host. If you are a user or Host Administrator who has questions about this policy, please send a message to

                        REGISTRAR@NIC.DDN.MIL

or call 1-800-365-DNIC for assistance.

If you access the MILNET via a concentrator, the name of that concentrator, its address, and its administrator will appear on the HOST, NETADDRESS, and CONTACT lines of your TAC card. You may still use your card to access your primary login account, even if it is on another host; however, you must know the network address of your primary host. The administrator of your primary host can tell you its address. You must know this address when you log into a TAC and when you request help with a TAC login problem.

DRAFT [Page 15] DRAFT

NIC 60001, September 1991 DDN New User Guide

4.1.2 TAC Card Example

Figure 4-1 is a sample of the left portion of a DDN TAC Access Card. To help you understand the information on the TAC card, we have identified what each information item represents.

                         Figure 4-1.  TAC Card Example

TAC cards are perforated and include instructions to "detach here" and "fold here," allowing you to reduce the size of the card so that you may insert it in a wallet or credit card case.

DRAFT [Page 16] DRAFT

NIC 60001, September 1991 DDN New User Guide

    WARNING!!  Do not laminate your TAC Card.  Because of NIC printing
    requirements, blank cards are enclosed within carbon-coated envelopes.
    This carbon material fades very quickly when placed in plastic envelopes
    or when permanently laminated.  This phenomenon also extends to the
    placement of transparent tape over the print.  If you wish to preserve
    or darken the information printed on your card, we recommend that you
    use a ballpoint pen to rewrite it just above or below the appropriate
    item.

The most important information on the right-hand portion of your TAC card is your mailing address. However, the NIC includes its toll-free User Assistance Hotline number on this section of the card in case you lose the left half. In addition to the hotline number, the top of the card contains a brief set of user guidelines. As an authorized TAC or Mini-TAC user, you are expected to comply with these guidelines. If you find yourself in the position of sharing a TAC Access Card with other users, please notify your Host Administrator and request a TAC card for each individual.

4.1.2.1 Common TAC Card Userid/Access-Code Input Errors

Just below the guidelines section is a key that shows how each printed character appears on a TAC card. The statement, "Access codes never contain a one, zero, 'Q' or 'Z'" follows. Remember that these characters are invalid only in Access Codes and not in Userids. If you find that the TAC or Mini-TAC is returning a "Bad Login" error message during your first attempts to log in, check to see if you are typing one of these invalid characters. For example, if you're typing a zero, try the letter O (oscar). If you're typing a Q (quebec), try the letter G (golf) instead. Use the key to compare the printed characters. Be aware that other character can also be similar. For instance, the 8 (eight) sometimes looks like a B (bravo), and the S (sierra) sometimes looks like a 5 (five). TAC card Userids and Access Codes are not case- sensitive, i.e., you can enter them in either uppercase or lowercase letters.

If you have any questions about reading or using your TAC access card, call the NIC for assistance at 1-800-365-DNIC.

DRAFT [Page 17] DRAFT

NIC 60001, September 1991 DDN New User Guide

4.1.3 Obtaining the TAC Users' Guide

The paragraph in fine print at the bottom of your TAC card alerts you that further, more comprehensive information is available to you. Upon written request, you can obtain the TAC Users' Guide from the Defense Information Systems Agency (DISA). This document is geared toward users who are interested in learning some of the finer points of TAC usage.

To order the TAC Users' Guide, send a note specifying its title and DCAC 310-P70-74 to the following address:

    Defense Information Systems Agency
    Attn:  Code BIAR
    701 S. Courthouse Road
    Arlington, VA  22204-2199

4.2 TAC Login Procedures

This section discusses how to use a TAC or Mini-TAC to log in to the DDN. It also describes how to connect to a TAC or Mini-TAC, lists some common TAC or Mini-TAC error messages, and presents information about transferring files through a TAC to a PC.

4.2.1 Connecting to a TAC or Mini-TAC

The following paragraphs explain the various ways in which you can connect to a TAC or a Mini-TAC.

4.2.1.1 Dial-up TACs

To connect to a TAC/Mini-TAC using the telephone system, follow the general procedures described here. Because the exact steps required to dial the TAC/Mini-TAC depend on your local hardware setup, check with local site representatives for details.

You may obtain the number of the nearest TAC/Mini-TAC directly from the network by using the TACNEWS service (see Section 6.3.3) or by calling the NIC at 1-800-365-DNIC. You can look up the phone number of a specific TAC or Mini-TAC via the NIC WHOIS service (see Section 6.3.1).

DRAFT [Page 18] DRAFT

NIC 60001, September 1991 DDN New User Guide

In addition, many TAC/Mini-TAC phone numbers are listed on the back of your TAC Access Card.

4.2.1.2 Using a Terminal with an Acoustic Coupler

To use an acoustic coupler, first dial the TAC/Mini-TAC number on a telephone and listen for the dial tone. When you hear the tone, put the telephone handset into the indicated position on the coupler cuffs.

4.2.1.3 Using a Dial-up Modem

A dial-up modem will be wired to your telephone and to your terminal. (Consult the instructions that come with the modem to attach it to your terminal and set it properly.) Begin by dialling the TAC/Mini-TAC number on the telephone. Then, wait for the tone, switch the modem from "voice" to "data," and set the handset back on the telephone cradle. Note that the speed of the terminal must match the speed of the modem. Also note that some modems are "smart"–that is, you will not have to use the telephone to dial the number. Instead, you will type some instructions to your terminal, such as "DIAL5551212" or "ATDT9,18003682227." The modem will then dial the number as instructed and make the connection for you. See your modem instruction manual for exact details.

4.2.1.4 Using a PC and Communications Software

To access a TAC/Mini-TAC, you can use one of the popular communications software packages such as Procomm or Xmodem. These programs often enable the PC to dial the TAC/Mini-TAC, open the host connection, and enter your Userid and Access Code automatically. If you use such a package, be sure you know how to dial the TAC/Mini-TAC by hand in case there are problems with the script or the equipment. It is also useful to know the address of the host you connect to and how to alter the script when changes are made to the network.

Finally, for security reasons, you should enter your Userid and Access Code manually when logging in rather than including this information within the access script.

DRAFT [Page 19] DRAFT

NIC 60001, September 1991 DDN New User Guide

4.2.1.5 Hard-Wired TACs

If you are to connect to a host via a hard-wired TAC, you will need to consult a local user representative or Node Site Coordinator to learn the procedure for getting to the TAC/Mini-TAC. The procedure will vary depending upon what equipment is used and how it is configured at your location.

4.2.2 TAC Login

After you have successfully connected to a TAC/Mini-TAC, you must supply a "wake-up" character to alert the TAC to your presence. Do this by holding down the <Control> key and typing the letter Q on your keyboard (^Q). The TAC/Mini-TAC should respond with a banner–often a message from the MILNET Monitoring Center.

Once the TAC banner is displayed on your screen, you can begin the process of logging into the TAC/Mini-TAC and connecting to a remote host.

Following is a sample scenario showing how to log in to a TAC/Mini-TAC. For more detailed instructions on using a TAC/Mini-TAC and setting terminal parameters, consult the TAC Users' Guide [1].

 CONNECT 1200               (After user dials or otherwise connects to the
                            TAC/Mini-TAC, the modem may print a message
                            similar to this.)
 ^q                         (To alert the TAC/Mini-TAC, the user types a
                            control-q.  It will not appear on the screen.)
 FOR OFFICIAL USE ONLY
 NIC 1-800-365-DNIC
 29 TAC 114 #:20
 @o 192.112.36.5            (The TAC responds; the user opens a host
                            connection by typing "@o" for open and entering
                            the host address in dot notation format.)
 TAC Userid:  NIC-GUEST
 Access Code:               (The TAC prompts for Userid and Access Code, and
                            the user enters the data.  The Access Code does
                            not echo.)

DRAFT [Page 20] DRAFT

NIC 60001, September 1991 DDN New User Guide

TAC Login, continued…

 Login OK                   (The connection is opened and NIC displays
                            information.)
 TCP Trying...Open
 * -- DDN Network Information Center --
 *  
 * For TAC news, type:                     TACNEWS <return>
 * For user and host information, type:    WHOIS <return>
 * For NIC information, type:              NIC <return>
 *
 * For user assistance call (800) 365-3642 or (800) 365-DNIC or
                                                          (703) 802-4535
 * Report system problems to ACTION@NIC.DDN.MIL
 NIC, SunOS Release 4.1.1 (NIC) #1: 
 Thu Sep 26 11:18:20 1991 EST
 @. . .
                      (User works on the host and logs off when finished.
                      When disconnected from the host, user returns to the
                      TAC command level.)
 @l
 Logged out           (User types "@l" to log off the TAC/Mini-TAC and the
                      TAC confirms.)

When you enter your TAC Userid and Access Code, remember the following:

  • <Return> terminates each input line and causes the next prompt to

appear.

  • It doesn't matter whether you type your TAC Userid and Access Code

in uppercase or lowercase letter.

  • For security reasons, your Access Code input is either not echoed

or it is obscured from view with strikeover characters.

  • If you make a mistake, try using the backspace key (^H) to delete a

single character. Use ^U to delete an entire line. Although these

      commands do not work on every keyboard, they often do.
  • If you make a mistake while entering either your TAC Userid or Access

Code, type ^C to abort the login process and return to the TAC command

      mode.  Then try again.

DRAFT [Page 21] DRAFT

NIC 60001, September 1991 DDN New User Guide

  • Sometimes the TAC/Mini-TAC is unable to reach the requested host

address. To tell the TAC/Mini-TAC to stop making connection attempts,

      issue a close command:
                      @c <Return>     
                      Closed.          
  • As long as you have an open connection to a host, you remain logged

in to the TAC/Mini-TAC. If you close the connection to the host or

      the connection is shut down for any reason, you are given ten minutes
      to open another connection with no further login to the TAC/Mini-TAC. 
      If you do not open another connection within ten minutes, the TAC
      attempts to hang up your connection and automatically log you out. 
      To open another connection, simply type the "open" command again and
      supply another host address, as in the example below:
                      @o 128.1.0.1 <Return>       

4.2.3 Common TAC Login Problems

This section covers only TAC login problems. Problems specific to the Mini-TAC will be covered in a future revision of this document.

The TAC issues an error message when it does not receive the expected input. Some of the most common error messages are presented in this section, along with suggestions about what to do if you see one.

The TAC sends two kinds of messages. The first deals with errors in the TAC login process; the second deals with difficulties in opening a connection to the destination host.

4.2.3.1 TAC Login Error Messages

You may see one of the following error messages if you have problems logging in to a TAC. Each message is accompanied by a brief explanation of its cause and suggestions for further action.

DRAFT [Page 22] DRAFT

NIC 60001, September 1991 DDN New User Guide

BAD LOGIN

    This message means that the combination of Userid and Access Code you
    entered is invalid.  Examine your TAC Access Card carefully to be sure
    you are typing the correct characters and that you are not using any of
    the characters that are invalid in an Access Code.  Note that Access
    Codes never contain a zero (0), a one (1), a Q (quebec), or a Z (zulu),
    since each of these characters may easily be mistaken for another.  If
    your Access Code appears to contain one of these characters, it may be
    the letter O (oscar), the letter L (lima), the letter G (golf), or the
    number 2 (two).
    This message is also displayed if you are using an expired or invalid
    TAC card.  If you are sure you are typing correctly and suspect you are
    using a bad card, contact the NIC at 1-800-365-DNIC, and we can
    determine the validity of your card.

BAD

    This message means you typed a string that is not a valid TAC command,
    and the TAC does not understand your input.  Either you typed something
    incorrectly or there was some interference on your connection. 
    Frequently, simply repeating the command corrects the problem.  However,
    if repeating your input causes another error message, check to make sure
    that you typed the correct command and that your input is in an 
    acceptable format.

NUM

    This message means that the TAC was expecting you to type a number, but
    you typed some other character.  The message is displayed if you type
    the letter O (oscar) as part of the address of the host you are trying
    to connect to, or if you omit the numeric host address after typing @o
    (for open).  Make sure that you are not typing letters in places you
    should be typing numbers; this will probably correct the problem.

WAIT

    The TAC displays this message while it is attempting to validate your
    Userid and Access Code.

DRAFT [Page 23] DRAFT

NIC 60001, September 1991 DDN New User Guide

NO CARRIER

    This message comes from your PC or modem.  If this message is displayed
    on your initial attempt to dial the TAC/Mini-TAC, it means that the
    TAC/Mini-TAC did not answer the phone.  This could be because of a power
    failure or other emergency at the site where the TAC/Mini-TAC is
    located, or it could be the result of a mis-dialed telephone number. 
    Try calling the number with a telephone that is not connected to your
    terminal and see if your get a busy signal or other recording from the
    telephone company.
    If this message appears after you have logged in and while you are
    working on the host, it means that something happened to disconnect your
    modem from the TAC/Mini-TAC.  Try dialing the TAC/Mini-TAC again.  If
    the problem persists, contact your site systems representative to check
    your modem, or call the Monitoring Center for your area to check the
    TAC/Mini-TAC.

4.2.3.2 Host Connection Errors

Host connection error messages are sent when you have successfully logged in to the TAC and while the TAC is trying to connect to the host you specified. You know that you have successfully logged in to the TAC when you see the "Login OK, TCP trying…" message.

DESTINATION HOST DEAD

    This message means that the remote host is physically powered off or 
    the cable to the network has been removed.  The host is "down."  Since
    host down-times are normally relatively short, wait a while and try to
    log in again.  If the host remains unavailable, call the Host
    Administrator for the destination host and ask when the system will be
    available again.  If you do not know the Host Administrator's phone
    number, the NIC can provide it or the name and number of the coordinator
    of the network the host is attached to.

DRAFT [Page 24] DRAFT

NIC 60001, September 1991 DDN New User Guide

DESTINATION HOST UNREACHABLE DESTINATION NET UNREACHABLE HOST NOT RESPONDING

    Several network conditions can cause these messages.  They may be
    displayed if the host or its PSN is down or if a gateway between the TAC
    and the host is down.  Also, check to ensure that you specified the
    correct host address.  Typing a nonexistent network address will cause
    such a message to be generated.  If the condition persists, call the NIC
    for assistance.

4.2.4 Changing the TAC Intercept Character

The "@" sign is the default TAC intercept character. The intercept character is the character that signals the TAC to interpret any character(s) that follow immediately as TAC commands rather than passing them through to the network.

However, once you have connected to your host, you may want to send an @ directly through to the network–for example, when you type a DDN mail address. To make the TAC pass the @ on to the host rather than intercepting it, you must type @ twice–i.e., @@. When you do this, the TAC intercepts the first "@", transmits the second "@" to the host, and echoes that one back to you. You will see @@@ on your screen. Remember, when you want to type an "@" for anything other than a TAC command, you must type it twice. For example, to send a message to auser@milhost, you would have to type

                      auser@@milhost      

and on your screen you would see

                      auser@@@milhost     

To change the TAC intercept character, you must type @i (for intercept) followed by the decimal value of the ASCII code of the character you wish to use in place of the @. The TAC Users' Guide contains a list of ASCII codes. For purposes of text file transfers, we recommend that you change the intercept to a non-printing character, such as a control character. For example, to change the intercept character to control-y (^y), type the following:

                      @i 25 <Return>      

DRAFT [Page 25] DRAFT

NIC 60001, September 1991 DDN New User Guide

(Be sure to insert a space between the @i and the ASCII code number.) After you change the intercept character, you must use the new character for all subsequent TAC commands. To return to the default TAC intercept character (the "@" sign) after changing it to ^y, type the following:

                      ^yi e <Return>      

where "i e" stands for intercept escape.

4.2.5 Using a TAC for File Transfer (FTP)

This section presents several TAC command procedures that may facilitate file transfers through a TAC. The procedures covered here are

  • Changing the TAC intercept character,
  • Setting flow control on the TAC,
  • Putting the TAC into binary mode.

4.2.5.1 Changing the Intercept Character

For executing file transfers, you may want to change the TAC intercept character to one that your file transfer program does not use. For example, the Kermit file transfer program uses the "@" (discussed in a subsequent section). To change the intercept character, follow the directions in Section 4.2.4 above.

4.2.5.2 Setting Flow Control on the TAC

Setting flow control on the TAC ensures that data will not be transferred at a rate that causes the TAC buffers to overflow. The example below assumes that you have changed the TAC intercept character to ^y. (The ^y characters are shown in the examples, but they will not display on your screen as you type them on your keyboard.)

                      ^yd c a <Return>      
                      ^yf i s <Return>      
                      ^yf o s <Return>      

DRAFT [Page 26] DRAFT

NIC 60001, September 1991 DDN New User Guide

where

    ^yd c a   =      device code ASCII, which clears any previously set
                     flow control as well as any padding and parity. 
                     Flow control is incompatible with padding and parity.
    ^yf i s   =      flow control input start, which enables flow control
                     so that the terminal sending data will not send it
                     faster than the TAC can handle it.
    ^yf o s   =      flow control output start, which disables flow control
                     from the TAC to the terminal.

4.2.5.3 Putting the TAC in Binary Mode

To transfer binary files over the network, you must first put the TAC into binary mode. Doing so disables the TAC intercept character. You must disable the intercept character because if the TAC receives what it considers to be an intercept character–even though the character is embedded in a file–it interrupts the transfer process and tries to interpret whatever follows the intercept as a command.

To put the TAC in binary mode, first open a connection to your host. After establishing the host connection, put the TAC in binary mode with the commands shown below. (Here again, the example assumes you have changed the intercept character to ^y.) The commands must be typed in the order shown, because if you start binary input before you initiate binary output, the TAC will ignore the "^yb o s command" and treat it simply as a character string to transmit over the network.

                      ^yb o s <Return>      
                      ^yb i s <Return>      

where

    ^yb o s   =       binary output start, which enables 8-bit binary 
                      output mode from the TAC.
    ^yb i s   =       binary input start, which enables 8-bit binary 
                      input mode to the TAC.

DRAFT [Page 27] DRAFT

NIC 60001, September 1991 DDN New User Guide

Logging out of your host returns the TAC to non-binary mode, re-enabling local control with @ commands. This is the only way to reset the TAC from binary to non-binary mode (short of hanging up or disconnecting from the TAC itself).

4.2.6 A Brief Word About Mini-TACs

Mini-TACS are new and improved DDN access controllers similar to the TACs currently in use. As with the original TACs, Mini-TACs provide DDN access to network users who are geographically distant from their host computers. When a user dials a local or toll-free phone number and types the required series of commands, it opens a long-distance connection to the user's host computer.

TACs support up to 63 asynchronous user ports. The smaller, more compact Mini-TAC can handle only 16 asynchronous terminal connections, but it has other capabilities (i.e., synchronous terminals, HFEP, etc.). Both TACs and Mini-TACs allow normally incompatible terminals and hosts to communicate with one another using the DDN as the go-between. While both types of access controllers serve similar roles, the Mini-TACs provide more advanced operational and security features.

Like a TAC, the Mini-TAC returns error messages to its users if it cannot understand a command. Currently, from a user standpoint, the Mini-TACs and the TACs are essentially the same. If you notice any difference in behavior between TACs and Mini-TACs and you need assistance, call the MILNET Monitoring Center or the NIC. At present, some TAC commands can be abbreviated to one character. However, in the future, Mini-TAC commands may need to be at least two characters long to ensure that they are differentiated from other commands starting with the same letters.

DRAFT [Page 28] DRAFT

NIC 60001, September 1991 DDN New User Guide

                      SECTION 5.  NETWORK USE

A computer attached to the DDN can reach a large community of users and access a wide variety of software. Research tools, documents, files, and mailing lists are all readily accessible through the DDN. This section describes the procedures for using these network tools, three of which are major network services: electronic mail (SMTP), file transfer (FTP), and remote login (TELNET). These services are integral to the DDN protocols and are offered by all hosts that have implemented the full set of network protocols.

Although the functionality of the services discussed here is the same on every host, what the user sees may differ from host to host because software is often customized to suit the host operating system. For this reason, it is important to read local online and hard-copy documentation and to consult online help files for specific details on using these services on your host. Check with your local Host Administrator or site systems representative if you need more information. The sections below provide a generic description of how to use electronic mail, FTP, and TELNET.

5.1 Electronic Mail

The DDN capability that is used more often than any other is electronic mail. Electronic mail lets users send messages to one another over the network. System programs accept and store mail messages from users on other hosts that are directed to local users. These programs automatically recognize the incoming traffic as electronic mail, translate it to a format compatible with the receiving mail program, and direct the messages to the correct recipients.

Most users have an online mail file where all messages addressed to them are stored.

You can print, read, or delete your mail using the local mail program. However, you should not edit or alter the structure of your mail file except through a mail program, as each message has unique characteristics that identify it as mail, such as a header, a character count, and a time stamp. Editing the mail file directly may alter these characteristics so that the mail program no longer recognizes the data as mail.

Host computers usually provide one or more programs for reading and sending mail. Most mail programs provide you with the following capabilities:

DRAFT [Page 29] DRAFT

NIC 60001, September 1991 DDN New User Guide

  • Reading messages
        All mail programs have a command that allows you to read messages
        received over the network.  Mail programs normally offer options 
        for selecting and displaying specific messages from those received
        and stored in your mailbox.
  • Printing, deleting, or moving messages
        With your local mail program, you can print your messages (if a
        printer is available), move them into other (editable) files, or
        delete them.  It is important that you learn how to delete or move
        messages after reading them; otherwise, your mail file may overflow
        and prevent additional mail from being delivered.
  • Sending messages
        You can send messages to other users on the same host or to anyone
        on the network that has a mail service.  No passwords are required
        to send mail, but it is necessary to know the network mailbox, or
        address, of the person to whom you are sending mail.  Network
        mailboxes usually take the form
                         USERNAME@HOSTNAME.DOMAIN
        e.g., SMITH@NIC.DDN.MIL.

Mail that is transmitted over the DDN normally requires a network address made up of a username and a hostname. Occasionally, you can omit the hostname. For example, if you are sending a message to a user on the same host as the one you are using (your local host), you need not include the hostname. This is similar to sending an interoffice memo, which rarely needs a full name and address to reach its destination. On the other hand, a message sent to "John Smith, U.S.A" has little chance of being delivered without more information. The same is true of electronic messages without a valid address. Any message with an incomplete or incorrect address is returned to the sender with an error message. If a mail message is undeliverable due to network or machine problems, most mail programs try to resend it several times before returning it to the sender.

DRAFT [Page 30] DRAFT

NIC 60001, September 1991 DDN New User Guide

Many mail programs allow you to use a local text editor to revise or correct the text of the message you are preparing. The mail programs themselves usually have simple editing features that allow you to delete a character, word, or line, or to make simple corrections. An entire file may be sent as the text of a message, assuming the file is not too large. Many mailers outside the DDN truncate or discard messages that are longer than 50,000 characters in size, envelope and header data included.

Following are examples of some typical procedures for sending and reading mail, and for getting help within a network mail program. These are general scenarios; your host may run a different program or implementation than the ones shown. Only the bare essentials for using these mail programs are included here. We urge you to read the manuals for your mail system and to explore the online help facilities to expand your knowledge of what your implementation has to offer.

In the examples that follow, note that the prompt character consistently indicates what operating system or program you are dealing with currently, and that the prompt character changes as you progress from one system/program to another.

    [NOTE:  Computer names, user names, electronic addresses, and other
    data used in examples throughout this manual are not intended to
    represent currently valid input/output--i.e., some of the data may 
    be "ficticious" but the format is accurate.]

DRAFT [Page 31] DRAFT

NIC 60001, September 1991 DDN New User Guide

5.1.1 UNIX MAIL Examples

Sending Mail Via UNIX

    [NOTE:  UNIX is case-sensitive.  Most UNIX systems require that
    commands be entered in lowercase.]
    % mail nic@nic.ddn.mil <Return>     (User asks to send mail to a well-
                                        known mailbox.  The percent sign (%)
                                        is a standard UNIX system prompt,
                                        while "mail" is the command that
                                        invokes the Mail program. User must
                                        insert a space before typing the
                                        message address on the same line.)
    Subject:  How to get RFCs <Return>
                                        (The Mail program prompts for a
                                        subject, and the user supplies it.)
    How do I retrieve RFCs using the electronic mail utility?
    Thanks for your help. <Return>
    ^d                                  (The user types the message text,
                                        ending with a control-d (^d) in the
                                        first character space of a line.)

% (UNIX prompt returns.)

Reading UNIX MAIL

    % mail <Return>                     (User invokes the Mail program at 
                                        the UNIX prompt.)
    You have mail.                      (The Mail program announces that
                                        there is mail waiting in the user's
                                        mailbox and prints the headers of
                                        messages received since user last
                                        checked his mail.)
    New mail: 1) 16/Dec SMITH@ISI.EDU (292)  Where is RFC 212?
              2) 17/Dec JONES@NIC.DDN.MIL  (145)  Re:  RFC 212
              3) Etc...         

DRAFT [Page 32] DRAFT

NIC 60001, September 1991 DDN New User Guide

Reading UNIX Mail, continued…

    & p 1 <Return>                      (Mail prompt [&] is presented, and
                                        user asks the Mail program to print
                                        message 1 [p 1].  The full message
                                        text will be printed on the user's
                                        screen.)

Getting Help for UNIX MAIL

Typing

    man mail        connects you to the online Mail manual from the UNIX
                    prompt.
    help            displays help for Mail users after program is invoked.
    ?               displays a list of Mail commands after program is
                    invoked.

DRAFT [Page 33] DRAFT

NIC 60001, September 1991 DDN New User Guide

5.1.2 InfoMail Examples

Sending a Message Via InfoMail

    [NOTE:  Since InfoMail runs under the UNIX operating system, and UNIX
    is case sensitive, InfoMail commands must normally be entered in
    lowercase.]
    DDN1-> infomail <Return>            (User invokes the InfoMail program 
                                        at his local system prompt.)
    InfoMail -- Version 0.3x
    Username: code123 <Return>
    Password: <no echo> <Return>        (The InfoMail banner is displayed,
                                        and user is asked to log in with his
                                        mail username and password.)
  1. → compose <Return> (At the InfoMail prompt, the user

asks to create a message –

                                        "compose".)
    To: command@ddn2.dca.mil <Return>
    From: CODE123@DDN1.DCA.MIL          (InfoMail prompts for address of
                                        recipient and automatically supplies
                                        user's address on "From" line.)
    Subject:  Dial-ups <Return>
    Date: 12 July 1992                  (InfoMail prompts for subject, and
                                        user enters the subject of the
                                        message.  InfoMail automatically
                                        supplies the current date.)
    
    Text: Request dial-ups for our site.  Usage demand is up.
    . 
                                       (InfoMail prompts for text, and 
                                        user enters, terminating the text
                                        with a carriage return, a period in
                                        the first space of the next line,
                                        and another carriage return.)
    --> quit <Return>
    DDN1->                              (User types "quit" to exit from
                                        InfoMail.  The local system prompt
                                        returns.)

DRAFT [Page 34] DRAFT

NIC 60001, September 1991 DDN New User Guide

Reading Mail with InfoMail

    DDN2->infomail <Return>             (User invokes the InfoMail program 
                                        at his local system prompt.)
    InfoMail -- Version 0.3x
    Username: COMMAND <Return>
    Password: <no echo> <Return>        (The InfoMail banner is displayed,
                                        and user is asked to log in with his
                                        mail username and password.  These
                                        may be entered in either upper or
                                        lowercase. After a successful login,
                                        InfoMail notifies user of mail in
                                        his "Inbox.")
    INBOX.
       1  FROM:  CODEB999 / SUBJECT: DIAL-UPS / 13 Jul
       2  FROM:  AF@DDN.A / SUBJECT: SCHEDULE / 14 Jul
    --> next <Return>
                                        (At the InfoMail prompt, user issues
                                        a command to display the next
                                        message, and InfoMail does so.)
    To: COMMAND@DDN2.DCA.MIL
    From: CODE123@DDN1.DCA.MIL
    Subject:  Dial-ups
    Date: 13 July 1992
    Text:
    Request dial-ups for our site.  Usage demand is up.
  1. ——————-END OF DOCUMENT———————-
  2. → next <Return> (User types "next" to ask for the

next message.)

    To: COMMAND@DDN2.DCA.MIL
    From: AF@DDN1.DCA.MIL
    Subject:  SCHEDULE
    Date: 14 July 1992
    Text:
    What is the schedule for the next InfoMail demo?
  1. ——————-END OF DOCUMENT———————-
  2. → quit <Return> (User types "quit"to exit from the

InfoMail program.)

DRAFT [Page 35] DRAFT

NIC 60001, September 1991 DDN New User Guide

Getting Help for InfoMail

Typing

  1. →? Prints a list of all the commands that can be

issued at this stage of the Mail procedure.

  1. →<commandname> ? Lists possible input for completing the

specified command.

  1. →describe <commandname> Tells what the specified command does and how

to use it.

  1. →example <commandname> Prints an example of the specified command.

InfoMail manuals are available from

                BBN Communications Division
                10 Moulton St., Cambridge, MA 02238

5.2 File Transfer Protocol (FTP)

FTP is a protocol that enables you to move a file from one computer to another even if the computers have different operating systems and file storage formats. You can move data files, programs, text files, and/or anything that can be stored online.

To use FTP, you must know the hostname or the host address of the remote host.

You must also have an authorized username and password on the remote host system, and you must know the name of the file you want to retrieve from or send to that system. You can then copy files either to or from the remote system. Not every file, however, can be FTP'd. Only those files that have public "read access" (i.e., a file protection designation that permits transfers) can be transferred from one system to another.

Some hosts provide the username "anonymous" for FTP file retrieval from their systems; this is called the "anonymous login convention." Any character string is accepted as a password for an anonymous login.

DRAFT [Page 36] DRAFT

NIC 60001, September 1991 DDN New User Guide

An anonymous login account works only with FTP. It is not an account that can be accessed for general use. You cannot use the anonymous convention to send files to a remote host, as this requires a specific login account on that host; you may only use it to transfer files to your local workspace from a host on which you do not have a login account.

These are the general steps used for a file transfer procedure:

    1.  Log in to your local host and invoke the FTP program.
    2.  Provide the hostname or host address for the remote system.
    3.  When you have successfully established a connection to the remote
        host, log in with your authorized username and password on that
        system.
    4.  Issue commands to send or retrieve files.
    5.  When you are finished, log off the remote host and exit from the 
        FTP program.

Depending on the FTP implementations on your host and on the remote host, it may be possible to display a directory listing of the public files on the remote host and to request remote system status information.

As you will see from the examples, when you transfer a file with FTP, messages regarding the status of the action you have requested are displayed throughout the process. The FTP server on the remote host sends the File Transfer messages. These messages have the following characteristics:

  • Every FTP command generates at least one reply.
  • A reply consists of a three-digit return code, followed by a line of

text describing the response.

  • If a single line of text accompanies the return code, a single space

separates the code from the text.

  • If more than one line accompanies the return code, a hyphen (-)

separates the code from the text.

DRAFT [Page 37] DRAFT

NIC 60001, September 1991 DDN New User Guide

During a File Transfer session, you enter a command and then wait for a message indicating whether the command was accepted. Further system messages describe the outcome of any transfer you may request.

The text that accompanies the FTP return codes may differ slightly from server to server, but the general meaning of the numeric codes remains constant.

Programs based on the FTP protocol vary a great deal in implementation details. The examples provided here should be taken only as guidelines. Consult your local system representatives for assistance with the FTP implementation on your host.

Before you begin a File Transfer session, it is best to become familiar with the general command sequence.

An example of an FTP session conducted between two UNIX systems appears on the next page. In the example, a user carries out several standard FTP procedures, such as asking for a directory listing of the public files on the remote system and then changing to another directory. Remember that the commands to accomplish these tasks may vary from host to host, and not all host FTP servers implement all commands.

DRAFT [Page 38] DRAFT

NIC 60001, September 1991 DDN New User Guide

5.2.1 Transferring a File on a UNIX System

In the following example, both hosts are running UNIX.

abacus-1>ftp fs3.nisc.nic.com <Return> Connected to FS3.NISC.NIC.COM (User invokes the FTP program at his

                                        local system prompt, and the remote
                                        FTP server responds by displaying
                                        its banner and requesting a login,
                                        as shown below.)

220 fs3 FTP server (NIC Version x.xx … Wed July 17 16:20:33 EDT) ready. Name (fs3.nisc.nic.com:barbv): anonymous <Return> 331 Guest login ok, send ident as password. Password: guest <Return> (no echo) 230 Guest login ok, access restrictions apply. ftp>ls <Return> 200 PORT command successful. 150 Opening ASCII mode data connection for file list. etc pub netinfo INDEX ls-lR 226 Transfer complete. 47 bytes received in 0.02secs (2.3 Kbytes/sec)

                                        (After successfully logging in as
                                        "anonymous guest," the user asks for
                                        a directory listing of public files
                                        at the FTP prompt.  FTP responds,
                                        printing messages regarding the
                                        transfer.)

ftp>cd netinfo <Return> 250 CWD command successful. ftp>ls <Return> 200 PORT command successful. (At the FTP prompt, user issues a

                                        command to change to the netinfo
                                        directory, then asks for a listing
                                        of files in the new working
                                        directory--netinfo.)

DRAFT [Page 39] DRAFT

NIC 60001, September 1991 DDN New User Guide

UNIX File Transfer, continued…

150 Opening ASCII mode data connection for file list. interest-groups domains nsfnet.policy 226 Transfer complete. 125 bytes received in 0.04. seconds (3.1 Kbytes/s) ftp>get nsfnet.policy <Return> (User asks for a transfer of the

                                        specified file to his own file
                                        system.  Since he does not specify 
                                        a new filename, the file retains the
                                        same name on the local system.)

200 PORT command successful. 150 Opening ASCII mode data connection for nsfnet.policy (2790 bytes). 226 Transfer complete. local: nsfnet.policy remote: nsfnet.policy 2847 bytes received in 0.12 seconds (23 Kbytes/s) ftp> bye <Return> ftp> Goodbye. abacus-2> (User types "bye"to exit from the

                                        FTP program.  The local system
                                        prompt is displayed again.)

5.2.2 How to FTP a Directory Listing

The example that follows demonstrates how to retrieve a list of file names from a public directory. (Not all hosts provide this feature; check with the online help system or your local user support representative.) In the example, the user is logged on to a host running the UNIX operating system. He uses FTP to connect to the host NIC.DDN.MIL, then logs in under username "anonymous" and password "guest." He enters the "dir" (directory) command for the directory "RFC" to see the names of accessible files. (Because the actual directory list is long, only the first few files and the last file are shown in the example.)

DRAFT [Page 40] DRAFT

NIC 60001, September 1991 DDN New User Guide

After the directory listing is displayed, the user can copy a file or files from the remote host directory, but this procedure is not included in the example. He issues the FTP "quit" command to exit from the FTP program and close the connection to the remote host, which returns him to the local host operating system.

 % ftp <Return>
 FTP> nic.ddn.mil <Return>
 Assuming 36-bit connections, paged transfers)
              <NIC.DDN.MIL FTP Server Process...
 FTP> login anonymous <Return>
 Password: guest <Return>
 User ANONYMOUS logged in at Wed 7-Aug-91  14:14 EDT, job 31. 
 FTP> dir rfc <Return>
 <List started.
 PS:<RFC> 
 rfc-index.TXT.114 
 rfc189.TXT.1
 rfc407.TXT.1
 .
 .
 .
 rfc931.TXT.1
 226 Transfer complete.
 47 bytes received in 0.02secs (2.3 Kbytes/sec)
 FTP> quit <Return>
 QUIT command received. Goodbye. 
 % 

DRAFT [Page 41] DRAFT

NIC 60001, September 1991 DDN New User Guide

5.3 Using TELNET

Another valuable way to use the network is offered by the TELNET utility, which allows you to log in to a remote host from a local host (assuming that you have an authorized account on the remote host). Once you have established a TELNET connection and logged into the remote host, you can enter data, run programs, and otherwise operate just as though you were logged in directly. During a TELNET session, each transition to a different interactive program causes a shift to a different command level. With each level, the form of the prompt varies. Command formats also vary with each level. You can often tell which system/program you are using by the prompt symbol. The steps for running TELNET are very briefly summarized as follows:

  • Log in to your local host.
  • Invoke the TELNET program from that host.
  • Identify by hostname or host address the remote host that you want

access to.

  • When the TELNET connection is established, log in to the remote host

with the username and password that have been assigned to you on that

       host.
  • Perform whatever tasks you like on the remote machine, being careful

not to violate any remote operating system rules.

  • When finished working on the remote host, type the remote logout

command. Then close the TELNET connection if it is not automatically

       closed on logout.
  • You are once again operating in your local host system environment.

TELNET has other advanced features too numerous to discuss here. Check you local TELNET user program for online documentation, or talk to your local Host Administrator or user support representative for more information.

5.3.1 Invoking TELNET with the Hostname on the Command Line

In the following example, a user TELNETs from a local UNIX host to a remote SunOS host. Once the connection has been established, the prompts, commands,

DRAFT [Page 42] DRAFT

NIC 60001, September 1991 DDN New User Guide

and responses are those of the SunOS environment. To the user, it appears as though he/she were directly logged in to the SunOS computer.

After the user is done working on the remote host, he issues the SunOS logout command. This logout automatically returns him to the TELNET program on the local host, closes the TELNET session, and returns the local operating system prompt (%).

Note that instead of invoking the TELNET program and then issuing an "open" command to the remote host at a TELNET prompt, the user supplies the remote host address directly on the program invocation line. (Not all implementations recognize this form of connection.) In addition, note that the user would need an authorized account on the NIC host to log in with username and password as shown in the example.

% telnet nic.ddn.mil <Return>           (User issues the telnet command,
                                        giving the remote hostname as an
                                        argument on the command line.) 
trying...
connected to nic.ddn.mil
escape character is '^]'
NIC.DDN.MIL, SunOS UNIX (nic)           (TELNET prints messages during
                                        connection establishment, affirms
                                        the connection, and notifies the
                                        user of the escape character [see
                                        discussion of escape charaters in
                                        Chapter 4]. The Sun host prints its
                                        banner and prompt--@.)
@ login <userid> <Return>
Password:        <Return>               (User enters his remote system
                                        userid and password.  The password
                                        does not echo on screen.)
       ...USER SESSION...
@ logout <Return>                       (After completing his work on the
                                        SunOS host, user issues a logout
                                        command to exit from the remote
                                        system.  The connection is closed
                                        automatically and the local prompt
                                        reappears.)
Connection closed by remote host.
%

DRAFT [Page 43] DRAFT

NIC 60001, September 1991 DDN New User Guide

5.3.2 TELNET Using Host Address

Instead of invoking TELNET and specifying a hostname for the remote host, you may specify the remote address in dot notation format. Some hosts require the network address to be enclosed in brackets if it is supplied on the command line. (Many TELNET implementations prompt for a network hostname or address if you do not specify one, and they may allow you to open the connection after asking for help or issuing other TELNET commands.) To establish a TELNET connection using a host address, proceed as shown in the example below. The example presumes a user on a UNIX host connecting to the NIC's SunOS system via TELNET. After reaching the NIC host, the user looks up a name with the WHOIS program, exits from WHOIS, and then closes the connection. (Note the change from UNIX prompt symbol to the NIC prompt and back again.)

 % telnet 192.112.36.5 <Return>
 Trying 192.112.36.5 ...
 Connected to nic.ddn.mil.
 Escape character is '^]'.
 SunOS UNIX (nic)
  1. - DDN Network Information Center –
  • For TAC news, type: TACNEWS <return>
  • For user and host information, type: WHOIS <return>
  • For NIC information, type: NIC <return>
  • For user assistance call (800) 365-3642 or (800) 365-DNIC or

(703) 802-4535

  • Report system problems to ACTION@NIC.DDN.MIL
 NIC, SunOS Release 4.1.1 (NIC) #1: 
 Thu Sep 26 11:18:20 1991 EST
 @ whois varallob <Return>
 Connecting to id Database . . . . . .
 Connected to id Database
 Varallo, Barbara (BV36)         varallob@NIC.DDN.MIL
    Network Solutions, Inc.
    505 Huntmar Park Drive
    Herndon, VA 22070
    (703) 802-8461
    Record last updated on 08-Aug-91.

DRAFT [Page 44] DRAFT

NIC 60001, September 1991 DDN New User Guide

TELNET from UNIX to NIC, continued…

 Enter a handle, name, mailbox, or other field, optionally preceded
 by a keyword, like "host nic".  Type "?" for short, 2-page
 details, "HELP" for full documentation, or hit RETURN to exit.
 ---> Do ^E to show search progress, ^G to abort a search or output <---
 Whois: <Return>
 @ logout <Return>
 Thu Sep 26 11:19:28 1991 EST
 Connection closed by foreign host.
 %

DRAFT [Page 45] DRAFT

NIC 60001, September 1991 DDN New User Guide

          SECTION 6.  DDN NETWORK INFORMATION CENTER (NIC)

The DDN Network Information Center (NIC) is located at the DDN Installation and Integration Support (DIIS) program office in Chantilly, Virginia. The NIC is funded by the Defense Information Systems Agency (DISA), Defense Network Systems Organization (DNSO). The NIC is responsible for providing general reference services to DDN users via telephone, electronic mail, and U.S. mail.

The NIC also provides databases and information services of interest to network users, including the WHOIS registry of network users, the NIC/Query browsing system, TACNEWS, and the official DoD Host Name Service. The NIC maintains the RFC (Request for Comments) collection. Many of the online files are available through the NIC's automatic mail service, SERVICE@NIC.DDN.MIL.

Among its other duties, the NIC

  • registers hosts and domains,
  • assigns IP network numbers and Autonomous System Numbers (ASNs),
  • provides hostname translation tables and domain name system server

files to the DDN and the Internet,

  • registers network users,
  • issues MILNET TAC Access Cards.

These services are described in more detail in the "Current DDN NIC Services" booklet.

6.1 Contacting the NIC

6.1.1 NIC User Assistance Help Desk

The NIC provides user assistance in a number of ways. Our main Help Desk phone numbers are

       1-800-365-DNIC    (within the continental United States)
       1-703-802-4535    (outside the continental United States and in the
                         Washington, D.C. metropolitan area)
       1-703-802-8376    FAX Number

DRAFT [Page 46] DRAFT

NIC 60001, September 1991 DDN New User Guide

The first number is toll free, while the area code 703 numbers are toll free in the Washington area only.

The NIC provides Help Desk assistance to those who experience problems with using the network in general, and with terminal-to-TAC use in particular. Should you have a security problem or concern, the NIC can connect you with the Security Coordination Center. In addition, the NIC is happy to answer questions about any other service outlined in this section. The NIC Help Desk services are available from 7 a.m. to 7 p.m. (EST or EDT), Monday through Friday.

6.1.2 NIC Host

The NIC computer's hostname and network address are

                   NIC.DDN.MIL
                   192.112.36.5

NIC online services are available 24 hours a day, 7 days a week.

6.1.3 NIC Online Contacts

The NIC supports several online mailboxes to provide assistance in specific areas. This list is provided here for easy reference. The following sections provide more detailed information regarding the type of inquiries each mailbox handles.

   Type of Inquiry                             Network Mailbox
   General User Assistance                     NIC@NIC.DDN.MIL
   TAC and Non-TAC User Registration           REGISTRAR@NIC.DDN.MIL
   Urgent Security Matters                     NIC-ALERT@NIC.DDN.MIL
   Host, Domain, and Net Registration          HOSTMASTER@NIC.DDN.MIL
   NIC.DDN.MIL Computer Operations             ACTION@NIC.DDN.MIL
   Comments on NIC Publications, Services      SUGGESTIONS@NIC.DDN.MIL
   Security Concerns and Questions             SCC@NIC.DDN.MIL
   Usage-Sensitive Billing Questions           BILLING@NIC.DDN.MIL
   Automatic Mail Service                      SERVICE@NIC.DDN.MIL
   Reporting NIC Software Bugs                 BUG-SERVICE@NIC.DDN.MIL

DRAFT [Page 47] DRAFT

NIC 60001, September 1991 DDN New User Guide

6.1.4 NIC U.S. Mail Address

The current mailing address of the NIC is

                Network Information Center
                14200 Park Meadow Drive, Suite 200
                Chantilly, VA 22021

6.2 NIC Services

In addition to the user assistance Help Desk described in Section 6.1.1, the NIC provides registration, billing, and security support services.

6.2.1 Network and User Registration Services

The NIC registers the following network entities:

  • domains
  • IP network numbers
  • inverse addressing data
  • Autonomous System Numbers (ASNs)
  • hosts
  • TACs/Mini-TACs
  • gateways and PSNs
  • some network-related organizations.

MILNET host, TAC, gateway, and PSN registrations are coordinated with the MILNET Manager. If you wish to register an IP network, domain, or ASN, contact the NIC Help Desk for information regarding procedures. New users seldom need to register these entities.

Each individual who has TAC access to the DDN must be registered in the NIC WHOIS database. Host Administrators register individuals in the database as part of the process of authorizing TAC cards for them. However, any individual with a working Internet electronic mail address can be registered in the database. You will find it useful to be registered in this database because it serves as an electronic white pages for DDN users.

DRAFT [Page 48] DRAFT

NIC 60001, September 1991 DDN New User Guide

To be registered in the NIC WHOIS database, you will need to fill out a copy of the NIC registration template (Figure 6-1 below) and send it to the network mailbox REGISTRAR@NIC.DDN.MIL. You may obtain this template via file transfer (FTP) from the NIC.DDN.MIL machine (192.112.36.5 is the numeric host address) using the pathname

          NETINFO/USER-TEMPLATE.TXT

or you may enter the required information yourself. In addition to the template, this file contains detailed instructions and samples to help with completing the form. (Instructions for using FTP to copy/retrieve a file are presented in Section 5.1.2, or you may consult your local FTP documentation.)

FULL NAME:  Jones, James J.          Last name, first name, middle initials
                                     (no titles)
U.S. MAIL ADDRESS: NIC
   Room 38C, Suite 200
   14200 Park Meadow Drive
   Chantilly, VA 22021               Complete address, including codes, mail
                                     stops, etc.
PHONE: (703) 802-4535                Give both commercial and DSN, if
                                     available, e.g., (DSN) 123-4567
AUTHORIZING HOST: NIC.DDN.MIL        Host address of host on which you have
                                     your primary login account.
PRIMARY LOGIN NAME: jjjones          Name you log in with (username)
PRIMARY NETWORK MAILBOX:             
jjjones@NIC.DDN.MIL                  Network mailbox where your mail is
                                     normally delivered.
                 Figure 6-1.  User Registration Template

DRAFT [Page 49] DRAFT

NIC 60001, September 1991 DDN New User Guide

6.2.2 Usage-Sensitive Billing Service Desk

Since the advent of usage-sensitive billing on the DDN, the NIC has provided a service to answer queries about bills charging for use of the DDN. This support is aimed at those POCs who receive bills and have questions about them. If you have a bill for DDN usage and have any questions about it, you can contact the NIC Help Desk as described in Section 6.1.1 or send a message to BILLING@NIC.DDN.MIL.

6.2.3 Security Coordination Center (SCC)

The NIC is the site of the DDN Security Coordination Center (SCC). The SCC acts in conjunction with the DDN Network Security Officer (NSO) to coordinate actions related to security incidents and network vulnerabilities. The SCC relays security-related information to the Network Security Officer (NSO) and works with him/her in handling network security problems. In addition, the SCC issues DDN Security Bulletins to network users. You can contact the SCC in the following ways:

    By Electronic Mail:        SCC@NIC.DDN.MIL
    By Phone:                  1-800-365-DNIC (continental U.S.)
                               1-703-802-4535 (outside U.S. and in the
                                              D.C. metro area)
    By FAX:                    1-703-802-8376
    By U.S. Mail:              Network Information Center/SCC
                               14200 Park Meadow Drive, Suite 200
                               Chantilly, VA  22021

Phone hours are from 7 a.m. to 7 p.m., Eastern Standard or Eastern Daylight Time.

6.3 NIC User Programs

The NIC offers several online programs that DDN users may access to retrieve various kinds of information. The WHOIS, TACNEWS, NIC/Query, and SERVICE programs and their access procedures are described in this section. The NIC's Kermit server is also described.

DRAFT [Page 50] DRAFT

NIC 60001, September 1991 DDN New User Guide

6.3.1 WHOIS/NICNAME

WHOIS/NICNAME is the NIC program that looks up information in an electronic "white pages" directory of network users. You can also obtain information on hosts, TACs, domains, and other network entities from WHOIS. WHOIS lists the name, network mailbox, U.S. mail address, telephone number, and host for each user registered in its database. For other entities, it provides such information as the domain name, a list of domain servers, domain contacts, network numbers, network contacts, known hosts on a given network, Host Administrators, Node Site Coordinators, and phone numbers and network mailbox addresses for all contacts.

6.3.1.1 Accessing WHOIS

Here are some instructions for accessing the WHOIS program from different points of origin:

From a TAC

  • Type @n.
  • After being greeted by the TAC banner, press <Return> and enter

your TAC userid and TAC Access Code when prompted.

  • After the NIC host banner and greeting are displayed, type WHOIS

<Return>.

From a DDN Host

  • Log onto your local host and TELNET to the NIC, e.g.,
                telnet nic.ddn.mil <Return>     
       or
                telnet 192.112.36.5 <Return>    
  • After the NIC host banner and greeting is displayed, type WHOIS

<Return>.

DRAFT [Page 51] DRAFT

NIC 60001, September 1991 DDN New User Guide

Via Electronic Mail

  • From your login host, invoke the mail program and send a message to
                SERVICE@NIC.DDN.MIL
  • As the subject of the message (i.e., on the "Subject:" line), enter

WHOIS and the string you want the program to search on–e.g.,

                Subject: whois nic.ddn.mil
        Any valid WHOIS search input string can be sent to the SERVICE
        program.  However, if the response is large, it will be split into
        several return messages.  If it is very, very large, it may exceed
        the capacity of the Mail server, but most search outputs are well
        within its limits.

You may also run the WHOIS/NICNAME program from a local host if you have one of the several WHOIS/NICNAME user programs that are available for various operating systems. Contact the NIC if you are interested in obtaining such a program.

6.3.1.2 Using WHOIS

To use WHOIS, you can supply either the name or the NIC "handle" of the person or entity you are trying to identify. The handle is a unique identifier that the NIC assigns to each entity registered in its database. Partial searches on the first part of a name are also possible.

The WHOIS program accessible on the NIC host also recognizes certain keywords.

These keywords are inserted in the search string before the entity for which you want information. They tell WHOIS to limit its search to certain kinds of records–such as host records only, or domain records only. Such keywords can increase the speed of a search. Some of the keywords that the NIC host's WHOIS program recognizes are as follows:

          DOM      for domain records
          GA       for gateway records
          HO       for host records
          NET      for network records
          PSN      for PSN records
          TAC      for TAC records.

DRAFT [Page 52] DRAFT

NIC 60001, September 1991 DDN New User Guide

WHOIS is not case sensitive. Some of the examples that follow use keywords and some do not. Those that do use keywords assume that you have used TELNET to connect to the NIC.DDN.MIL for access to their WHOIS program. For a complete list of keywords and examples of how to use them, simply type help or a question mark (?) at the WHOIS prompt, e.g.,

        Whois: help <Return>    

WHOIS responds to your query in one of three ways:

    1.  If WHOIS finds a unique record for the individual/entity you have
        identified as the subject of the search, it immediately displays 
        the following information:
  • the name
  • the NIC handle
  • the organization (if applicable)
  • the mailing address
  • the phone number
  • the network mailbox.
    2.  If WHOIS finds several records that match the search input, it
        displays a brief list of the matching entries and asks you to choose
        the correct match by using the handle (a unique character string in
        parentheses following the name).  A search by handle produces the
        expanded output for the matching entity.
    3.  If no record matches the search input, WHOIS displays the message
        "No match for <username>," where username is the search string
        entered.

The following examples illustrate some of the WHOIS capabilities. For more information on using WHOIS, connect to the NIC host and type "whois help".

6.3.1.3 WHOIS Search Examples

    [NOTE:  The names, addresses, phone numbers, and other information 
    shown in the following examples are meant to be representative only;
    they are not necessarily actual or accurate data and should not be
    used for contacting any of the entities/persons so identified!]

DRAFT [Page 53] DRAFT

NIC 60001, September 1991 DDN New User Guide

WHOIS Search by Name

    SunOS UNIX (nic)
  1. - DDN Network Information Center –
  • For TAC news, type: TACNEWS <return>
  • For user and host information, type: WHOIS <return>
  • For NIC information, type: NIC <return>
  • For user assistance call (800) 365-3642 or (800) 365-DNIC or

(703) 802-4535

  • Report system problems to ACTION@NIC.DDN.MIL
    NIC, SunOS Release 4.1.1 (NIC) #1: 
    Thu Sep 26 14:11:08 1991 EST
    @ whois roscoe <Return>          (There is only one "Roscoe," so a
                                     complete entry is displayed for him.)
    Connecting to id Database . . . . . .
    Connected to id Database
       ROSCOE, Joe A. (JAR)          JROSCOE@HOST-1.DOMAIN.MIL
       Air Force Data Systems
       Design Center/SDTS
       Willits Air Force Base, W. Va.  12345
       Phone:  (123) 456-7890
       MILNET TAC User
       Record last updated on 31-Oct-90

DRAFT [Page 54] DRAFT

NIC 60001, September 1991 DDN New User Guide

WHOIS Search by Partial Name

You may search using only a partial name as the search string by entering the partial name followed by one to three dots (…). This search feature will work only if the dots follow the partial name without any intervening spaces. This kind of search is apt to produce multiple "hits" (hits are entries that match a given search string).

Note that the partial name search also finds any NIC handles that begin with the partial name input ("ros" in the example below).

    @ whois ros... <Return>
      Rosati, David (DR16)         Rosati@BAR.FOO            (234) 567-8901
      Rosales, Alphonso L. (ALR)   Rosales@NIC.DDN.MIL       (345) 678-9012
      Roscoe, Joe A. (JAR)         Roscoe@HOST-1.DOMAIN.MIL  (123) 456-7890
      .
      .
      .
      Schuman, Richard O. (ROS)    Schuman@FOO.BOO.Com       (456) 789-0123
      There are 25 more entries.  Show them?

To obtain all the information pertaining to any of the names identified by the search, do a WHOIS search on the handle (the text in parentheses immediately following the name); this will produce a full entry.

DRAFT [Page 55] DRAFT

NIC 60001, September 1991 DDN New User Guide

WHOIS Search by Handle

If a WHOIS search produces multiple hits on your query, search by the unique handle to get the full entry of the hit you want to display. Precede the handle with an exclamation point. Users on hosts running a UNIX operating system may need to precede the exclamation point with a backslash (\).

    @ whois !jar                        (Jar is the handle for ROSCOE.)
      ROSCOE, Joe A. (JAR)              JROSCOE@HOST-1.DOMAIN.MIL
      Air Force Data Systems
      Design Center/SDTS
      Willits Air Force Base, W. Va.  12345
      Phone:  (123) 456-7890
      MILNET TAC User
      Record last updated on 31-Oct-90

WHOIS Search by Hostname

If you know a hostname and need to obtain the host address, you may use WHOIS to look it up by typing your input as shown in the following example:

    NIC, SunOS Release 4.1.1 (NIC) #1: 
    Thu Sep 26 14:11:08 1991 EST
    @ whois ddn-conus.ddn.mil <Return>             (User enters known host-
    Connecting to id Database . . . . . .          name after connecting to
    Connected to id Database                       the NIC host and types a
    ^E 14:13:03 -- No matches yet in 0 searches.   ^E to see how the search
                                                   is progressing.)
    BBN INC. (DDN1)
       1300 North 17th Street
       Arlington, VA 22209
       Hostname: DDN-CONUS.DDN.MIL
       Nicknames: DDN1.DCA.MIL,DDN.DCA.MIL
       Address: 26.21.0.17
       System: BBN-C/70 running UNIX

DRAFT [Page 56] DRAFT

NIC 60001, September 1991 DDN New User Guide

WHOIS Search by Hostname, continued…

       Host Administrator:
          Bolden, Michelle L. (Shelly)  (MLS6)  Bolden@BBN.COM
          (703) 284-4600
       Record last updated on 05-Sep-91.
    Would you like to see the registered users of this host? y <Return>
       There are 202 registered users:
    Adams, Quentin (QAA1)           nsc-robins@DDN-CONUS.DDN.MIL
                                               (912) 926-6912 (DSN) 468-6912
    Agney, Violet (VA24)            NSCElmen@DDN-CONUS.DDN.MIL
                                           (907) 552-4919 (DSN) 317-552-4919
    Agnor, Robert J. (RJA25)        NAVTELCOM@DDN-CONUS.DDN.MIL
                                               (202) 282-0824 (DSN) 292-0824
    Atkinson, Barry K. (BKA)        DIA-RSE@DDN-CONUS.DDN.MIL
                                               (703) 284-0801 (DSN) 251-0801
    Bailey, Erich (EB68)            NSC-Presidio@DDN-CONUS.DDN.MIL
                                               (415) 561-2241 (DSN) 586-2241
    There are 197 more matches.  Show them? n <Return>
      Enter a handle, name, mailbox, or other field, optionally preceded
      by a keyword, like "host sri-nic".  Type "?" for short, 2-page
      details, "HELP" for full documentation, or hit RETURN to exit.
    ---> Do ^E to show search progress, ^G to abort a search or output <---

Note that this search produces the hostname, the host address, and the name and phone number of the Host Administrator. Pressing <Return> will produce a list of the people registered with the NIC as users of that host. You will find the same information if you know the host address or nickname and search on one of those instead of the official hostname.

DRAFT [Page 57] DRAFT

NIC 60001, September 1991 DDN New User Guide

WHOIS Search by TAC Name

You may use WHOIS to obtain a TAC telephone number if you know the name of the TAC. A search by TAC name will also show contact information on the Node Site Coordinator for the TAC. Follow the example below to do this type of search.

      Enter a handle, name, mailbox, or other field, optionally preceded
      by a keyword, like "host sri-nic".  Type "?" for short, 2-page
      details, "HELP" for full documentation, or hit RETURN to exit.
    ---> Do ^E to show search progress, ^G to abort a search or output <---
    Whois: tac belvoir.mt.ddn.mil <Return>
    Fort Belvoir (BELVOIR-MIL-TAC)
       Army Information Systems Command (USAISC)
       Building 246, Room 202, 2nd Floor
       Fairfax, VA 22060
 
     (703) 781-0050 (R8) [300/1200 bps] {B}
     (703) 781-0100 (R8) [300/1200 bps] {B}
       Hostname: BELVOIR.MT.DDN.MIL
       Address: 26.0.0.142
       TAC number: 162
       Hardware: C/30
       Coordinator:
          Jewell, Brenda K.  (BJ53)  NSCBelvoir@DDN-CONUS.DDN.MIL
          (703) 664-3458 (DSN) 354-3458
       Record last updated on 22-Jun-90.

DRAFT [Page 58] DRAFT

NIC 60001, September 1991 DDN New User Guide

WHOIS Search by PSN Number

You may use WHOIS to search by node (PSN) number. The output from this search will show the usual POC information as well as a list of the hosts connected to that node that are registered with the NIC.

    Whois: psn 202 <Return>
    GSI (CHANTILLY2-IMP)
       14200 Park Meadow Drive
       Chantilly, VA 22021
       CHANTILLY2 is PSN/IMP 202 on network 26
       Coordinator:
          Zalubski, John  (JZ7)  zalubskij@NIC.DDN.MIL
          (703) 802-8462
       Record last updated on 04-Sep-91.
       No hosts found on this PSN.
    Whois: psn 201 <Return>
    GSI (CHANTILLY-IMP)
       14200 Park Meadow Drive
       Chantilly, VA 22021
       CHANTILLY is PSN/IMP 201 on network 26
       Coordinator:
          Zalubski, John  (JZ7)  zalubskij@NIC.DDN.MIL
          (703) 802-8462
       Record last updated on 04-Sep-91.
       Hosts on this PSN:
       CHANTILLY1.MT.DDN.MIL        26.0.0.201
       NIC1.DDN.MIL                 26.1.0.201
       SUN1.DDN.MIL                 26.24.0.201
       GSI-GW1.DDN.MIL              26.25.0.201, 192.112.36.1, 
                                    192.112.37.1, 192.112.38.1

DRAFT [Page 59] DRAFT

NIC 60001, September 1991 DDN New User Guide

WHOIS Search by Network Number

You may use WHOIS to search by network number. To search for information about a Class C network, make sure the last octet in the network number is zero. To search for a Class B network, make sure that the last two octets are zero. See section 8.4 for a discussion of network addresses and classes.

    Whois: 192.112.36.0 <Return>
    Government Systems, Inc. (NET-LOCALNET)
       14200 Park Meadow Drive, Suite 200
       Chantilly, VA  22020
       Netname: LOCALNET
       Netnumber: 192.112.36.0
       Coordinator:
          McCollum, Robert  (RM584)  bobm@NIC.DDN.MIL
          (703) 802-8476
       Domain System inverse mapping provided by:
       NIC.DDN.MIL                 192.112.36.5
       NIC-DEV.DDN.MIL             192.112.38.89
       Record last updated on 14-Aug-91.
    Would you like to see the known hosts on this network? y <Return>
       There are 2 known hosts:
       NIC.DDN.MIL                  192.112.36.5
       GSI-GW1.DDN.MIL              26.25.0.201, 192.112.36.1,
                                    192.112.37.1, 192.112.38.1

The user can enter "y" for yes or simply press <Return> to see a list of hosts registered with the NIC as part of this network.

DRAFT [Page 60] DRAFT

NIC 60001, September 1991 DDN New User Guide

WHOIS Search by Domain Name

    Whois: dom dca.mil <Return>
    Defense Information Systems Agency (DCA-DOM)
       Domain Name: DCA.MIL
       Administrative Contact, Technical Contact, Zone Contact:
          Hostmaster  (HOSTMASTER)  HOSTMASTER@NIC.DDN.MIL
          (800) 365-DNIC (703) 802-4535
       Record last updated on 18-Sep-91.
       Domain servers in listed order:
       NS.NIC.DDN.MIL               192.67.67.53
       A.ISI.EDU                    26.3.0.103, 128.9.0.107
       C.NYSER.NET                  192.33.4.12
       TERP.UMD.EDU                 128.8.10.90
       NS.NASA.GOV                  128.102.16.10, 192.52.195.10
       AOS.BRL.MIL                  192.5.25.82
    Would you like to see the known hosts under this secondary domain? y
       There are 60 known hosts:
       ANTARES.DCA.MIL              128.19.0.14
       BELLATRIX.DCA.MIL            128.19.0.5
       C4SD.DCA.MIL                 26.8.0.76
       CMMC-BBN.DCA.MIL             26.18.0.70
       CMMC-IMW.DCA.MIL             26.29.0.76
    There are 55 more matches.  Show them? n <Return>
    Whois: 

As you can see, domain searches allow you to identify the hosts providing name service for the domain, as well as the names and phone numbers of the administrative and technical contacts for the domain (in this case, the NIC Hostmaster group).

DRAFT [Page 61] DRAFT

NIC 60001, September 1991 DDN New User Guide

6.3.2 NIC/QUERY

NIC/Query is a browsing service that allows you to page through general information about the Defense Data Network (DDN). Topics included under NIC/Query are presented in a numbered menu. All the services of the TACNEWS program are also available via NIC/Query for the sake of simpler user accessibility.

The program is largely self-explanatory, and online help is available if you need it. You do not need a login account on the NIC machine for access. To access NIC/Query, simply open a TELNET connection to NIC.DDN.MIL, and then type "nic" or "query", as shown below.

    @ nic <Return>
    NIC/Query Version: 1.4 Thu, 26 Sep 91 14:27:13 
    Stop output every 24 lines? ([Y]/N/# of lines) y <Return>
    ROOT
    Use NIC/Query to access a hierarchy of information about the Defense
    Data Network (DDN) and the Network Information Center (NIC) using simple
    menus.  Bugs to BUG-QUERY@NIC.DDN.MIL.
  • *
  • * Note that a carriage return is required after every command.
  • * Select menu item 1 for help using this program.
  • *
       1) HELP -- Introduction, changes, detailed help, help summary.
       2) WHOIS -- Directory of DDN users.
       3) HOSTS -- Describes DDN hosts.
       4) PROTOCOLS -- Describes DDN protocols.
       5) RFCS -- Requests For Comments technical notes.
       6) NIC DOCUMENTS -- Documents available from the NIC.
       7. TACNEWS -- TACnews program.
    ROOT: Enter a menu# (1 - 7), or a command ('?' to list).
    NIC/Query: 1 <Return>
    HELP -- Introduction, changes, detailed help, help summary.

DRAFT [Page 62] DRAFT

NIC 60001, September 1991 DDN New User Guide

NIC Query Example, continued…

       1. INTRODUCTION -- An introduction to the NIC/Query system.
       2. CHANGES -- Differences from the old version of NIC/Query.
       3) NOVICES -- Detailed help for new users.
       4. HELP SUMMARY -- Brief description of NIC/Query concepts and
          commands.
    HELP: Enter a menu# (1 - 4), or a command ('?' to list).
    NIC/Query: 1 <Return>

In the example above, the user asks for help at the "NIC/Query:" prompt. A submenu is presented so he can select the level or type of information he wishes to have displayed.

6.3.3 TACNEWS

TACNEWS is a NIC online service that offers login help to TAC users. It also offers access to the interactive TAC locator program that allows you to find the three TAC phone numbers closest to a phone number you enter. TACNEWS provides a mechanism for reading the DDN Newsletters, DDN Management Bulletins, and DDN Security Bulletins. Users should read these publications regularly to stay current on DDN policies, announcements, and network news items. Access TACNEWS by logging into a TAC and typing "tacnews", as shown in the example on the next page:

DRAFT [Page 63] DRAFT

NIC 60001, September 1991 DDN New User Guide

 @n <Return>
 TAC Userid: <Username> <Return>             Enter your TAC Username here.
 Access Code: <Access Code>                  Enter your TAC Access Code.  It
                                             will not echo on screen.
 Login OK
 TCP Trying...Open
 Trying 192.112.36.5 ...
 Connected to NIC.DDN.MIL.
 Escape character is '^]'.
  • – DDN Network Information Center –
  • For TAC news, type: TACNEWS <Return>
  • For user and host information, type: WHOIS <Return>
  • For NIC information, type: NIC <Return>
  • For user assistance call (800) 365-DNIC or (703) 802-4535
  • Report system problems to ACTION@NIC.DDN.MIL or call

(703) 802-4535

    @ tacnews <Return>
    TACnews Version: (xxxx.xxx) Thu, 26 Sep 91 14:30:14 
    Stop output every 24 lines? ([Y]/N/# of lines) y <Return>
      1. Announcements -- Updated 11-Jul-91
      2. TACs, List of U.S. TAC Dial-Ins, 23K
      3. Locator, Finds U.S. TAC Dial-Ins
      4. Eur/Pac, List of European/Pacific TAC Dial-Ins, 15K
      5. Login, Help with TAC login, 6K
      6. Newsletters, DDN -- Updated 16-Sep-91
      7. Bulletins, DDN Management -- Updated 16-Sep-91
      8. Bulletins, DDN Security -- Updated 16-Sep-91
    Type a menu number (1 - 8), ? for options, "HELP" for instructions.
    TACnews: 7 <Return>
    There are 30 Bulletins online.  The latest:
         .
        80  21-Dec-90   REGISTRATION OF IP NETWORK NUMBERS
        81   9-Apr-91   MTACs Operational with Limited Monitoring and
                        Control Capability
    --> 82  23-Apr-91   Corrected   MTACs Operational with Limited
                        Monitoring and Control Capability
    Type an issue number (22 - 82), ? for options, or "HELP" for full help.
    TACnews: 82 <Return>

DRAFT [Page 64] DRAFT

NIC 60001, September 1991 DDN New User Guide

Alternatively, you may open a TELNET connection to NIC.DDN.MIL from a local host to read TACNEWS, as shown in the following example:

    % telnet nic.ddn.mil <Return>
    Trying 192.112.36.5 ...
    Connected to nic.ddn.mil.
    Escape character is '^]'.
    SunOS UNIX (nic)
  1. - DDN Network Information Center –
  • For TAC news, type: TACNEWS <return>
  • For user and host information, type: WHOIS <return>
  • For NIC information, type: NIC <return>
  • For user assistance call (800) 365-3642 or (800) 365-DNIC or

(703) 802-4535

  • Report system problems to ACTION@NIC.DDN.MIL
    NIC, SunOS Release 4.1.1 (NIC) #1: 
    Thu Sep 26 14:11:08 1991 EST
    @ tacnews <Return>
    TACnews Version: (xxxx.xxx) Thu, 26 Sep 91 14:30:14 
    Stop output every 24 lines? ([Y]/N/# of lines) y <Return>
      1. Announcements -- Updated 11-Jul-91
      2. TACs, List of U.S. TAC Dial-Ins, 23K
      3. Locator, Finds U.S. TAC Dial-Ins
      4. Eur/Pac, List of European/Pacific TAC Dial-Ins, 15K
      5. Login, Help with TAC login, 6K
      6. Newsletters, DDN -- Updated 16-Sep-91
      7. Bulletins, DDN Management -- Updated 16-Sep-91
      8. Bulletins, DDN Security -- Updated 16-Sep-91
    Type a menu number (1 - 8), ? for options, "HELP" for instructions.
    TACnews:

DRAFT [Page 65] DRAFT

NIC 60001, September 1991 DDN New User Guide

TACNEWS services are also available via the NIC/Query program; this redundancy allows users connecting to the NIC via TELNET to take advantage of all services in a single connection session.

If you wish to have newsletters and bulletins delivered online to your network mailbox, send a message to REGISTRAR@NIC.DDN.MIL including your name and address and indicating that you wish to be on the online distribution for the newsletters and bulletins.

6.3.4 NIC Kermit Server

For PC users who cannot access FTP from their hosts, the NIC has an anonymous Kermit server available. (A server is a software module that provides a service to users or user programs that request it.) You should be familiar with the Kermit file transfer protocol and have a PC communications program that supports that protocol before you attempt to transfer documents with it.

To download a file from the NIC using the Kermit server, proceed as follows:

    1.  Set the receive packet size on your PC Kermit to 60.
    2.  Connect to NIC.DDN.MIL (192.112.36.5) through a TAC or Mini-TAC.
    3.  Once you get the NIC login prompt (@), change the TAC intercept
        character to a control-y (^y)  by issuing the following TAC command:
                @i 25 <Return>
        Notice that you must type the "@" symbol because it signals the TAC
        that you are issuing a command.
    4.  Press <Return> to get the NIC prompt (@ is now the NIC prompt
        symbol), then type 
                kermit <Return>
        This command activates the Kermit server on the NIC.
    5.  Drop back to your PC Kermit and get the file that you want from 
        the NIC.

DRAFT [Page 66] DRAFT

NIC 60001, September 1991 DDN New User Guide

    6.  When you are finished, type "bye" to end the Kermit session on 
        your PC.

For more information on using Kermit through a TAC, see the files KERMIT- TAC-INFO.TXT and KERMIT-NICSERVER.TXT in the NETINFO/ directory on the NIC.DDN.MIL host. These files are also available via the SERVICE mail server (see Section 6.3.5).

6.3.5 NIC Automated Mail Service

SERVICE is an automated electronic mail system provided by the DDN Network Information Center. It allows access to most online NIC documents and information via electronic mail.

To use the mail service, send a message to SERVICE@NIC.DDN.MIL. In the SUBJECT field, enter the type of service you are requesting, followed by any arguments needed to further define your request. The message body is normally ignored; however, if you leave the SUBJECT field empty, the first line of the message body is used as the request. If your request involves the transmission of large files, they are broken into smaller, separate messages; however, a few files are too large to be sent through the mail system. SERVICE requests are processed automatically once a day.

The following services are currently available. Each item on the list is followed by an example of a subject line for requesting that service:

    HELP             This message; a list of current services.
                     Subj:  HELP
    RFC nnnn         nnnn is the RFC number.
                     Subj:  RFC 822
    RFC Index        Retrieves the index of RFCs.
                     Subj:  RFC INDEX
    IEN nnn          nnn is the IEN number or the word INDEX.
                     Subj:  IEN 828

DRAFT [Page 67] DRAFT

NIC 60001, September 1991 DDN New User Guide

    NETINFO xxx      xxx is a file name or the word INDEX.
                     Subj:  NETINFO DOMAIN-TEMPLATE.TXT
    SEND xxx         xxx is a fully specified file name.
                     Subj:  SEND IETF/1WG-SUMMARY
                     Subj:  SEND INTERNET-DRAFTS/DRAFT-IETF-IWG-BGP-OO.TXT
    HOST xxx         Returns information about host xxx.
                     Subj:  HOST NIC.DDN.MIL
    INDEX            Returns the master list of available index files.
    FYI nnn          Returns the specified FYI document, where nnn is the
                     FYI number or the word INDEX.
                     Subj:  FYI 1
    WHOIS xxx        Returns information about xxx from the WHOIS service.
                     Use "WHOIS HELP" for information on using WHOIS.
                     Subj:  WHOIS MCCOLLUMB

6.4 Documents Published by the NIC

The NIC compiles, edits, and publishes the documents listed below, all of which are available online. The file NIC-PUBS.TXT in the NETINFO/ directory on NIC.DDN.MIL contains an expanded, annotated list of NIC publications that are currently available either online or in hardcopy. Many of these documents are deposited at the Defense Technical Information Center (DTIC), where they are available to military network users. Hardcopies of documents and RFCs are also available from the former NIC, SRI International in Menlo Park, CA. Contact SRI for prices and ordering information. (Ordering instructions are also provided in the online file NIC-PUBS.TXT.) You may contact the NIC to confirm document availability or to learn about newly available documents.

THE DDN NEW USER GUIDE

    The document you are reading.  A brief guide to DDN network tools and
    services designed to introduce users to the network.  The Guide is
    available online as NETINFO/NUG.DOC.

DRAFT [Page 68] DRAFT

NIC 60001, September 1991 DDN New User Guide

THE NETWORK PROTOCOL IMPLEMENTATIONS AND VENDORS GUIDE

    The Vendors Guide lists software and hardware implementations of the 
    DDN protocols, based upon information supplied by vendors.  This
    document is for informational purposes only.  Entry on this list does
    not imply endorsement.  Available online as NETINFO/VENDORS-GUIDE.DOC.

RFCs (Copies only via FTP)

    Requests for Comments, or RFCs, are network technical notes, each of
    which is identified by a unique number.  The RFCs are available online
    via anonymous FTP as RFC/RFCnnnn.txt (where nnnn is the RFC number). 
    RFCs are available in hardcopy from SRI International, Menlo Park, CA.

6.5 Online Reference Files at the NIC

Several public files on the NIC.DDN.MIL host are of special interest to network users. The pathnames and brief descriptions of some of these files are listed below. You may retrieve these files via FTP (using USERNAME anonymous, PASSWORD guest). See Section 5.1.2 for FTP instructions. You may also obtain the files by electronic mail using the NIC Mail SERVICE program (see Section 6.3.5) or via the NIC Kermit Server (see Section 6.3.4).

NETINFO/MIL-NSC.TXT

    Node Site Coordinators for each node or PSN on the MILNET.

NETINFO/HOSTS.TXT

    Official Internet DoD Hostname Table, which lists the names and numbers
    of domains, networks, gateways, and hosts on the DoD Internet.  It is
    designed to be machine readable.  From this file, two additional files
    are generated: 
    HOSTS.TXT-Z, a UNIX compressed version of the HOSTS.TXT file, and
    MIL-HOSTS.TXT, a complete listing of the MILNET hosts in HOSTS.TXT.

NETINFO/HOST-LOCATION.TXT

    Addresses of MILNET hosts locations, sorted geographically.

DRAFT [Page 69] DRAFT

NIC 60001, September 1991 DDN New User Guide

NETINFO/HOSTSERVER-INSTRUCTIONS.TXT

    Instructions for using the NIC's hostname server to transfer the host
    table.

NETINFO/MIL-HOST-ADMINISTRATORS-A-L.TXT

    Military Host Administrators "A" through "L," sorted by hostname.  

NETINFO/MIL-HOST-ADMINISTRATORS-M-Z.TXT

    Military Host Administrators "M" through "Z," sorted by hostname.

NETINFO/NIC-PUBS.TXT

    Information about publications available from the NIC.

NETINFO/NUG.DOC

    Online version of this document.

NETINFO/WHAT-THE-NIC-DOES.TXT

    General information regarding NIC services.

NETINFO/USER-TEMPLATE.TXT

    Template for users who want to be registered in the WHOIS database.

NETINFO/TAC-LOCATION.TXT

    Geographic location of each TAC.  This file is useful for locating the
    TAC closest to you.

NETINFO/USA-TAC-PHONES.TXT

    Phone numbers for TACS within the fifty states.

NETINFO/FOREIGN-TAC-PHONES.TXT

    Phone numbers for TACs outside the U.S.

DRAFT [Page 70] DRAFT

NIC 60001, September 1991 DDN New User Guide

NETINFO/DOMAIN-CONTACTS.TXT

    Name, mailbox, and phone number for each domain contact registered with
    the NIC.

NETINFO/NETWORK-CONTACTS.TXT

    Name, mailbox, and phone number for each network contact registered with
    the NIC.  The NIC registers all IP networks and designates a contact for
    each one.

NETINFO/00NETINFO-INDEX.TXT

    Name and a brief description of each file available in the publicly
    accessible NETINFO directory on the NIC host.

NETINFO/KERMIT-INFO.TXT

    General information on the Kermit program.

NETINFO/KERMIT-NICSERVER.TXT

    Specific information on the NIC Kermit server.

NETINFO/KERMIT-TAC-INFO.TXT

    Specific information on TAC usage with Kermit.

PROTOCOLS/GOSIP-V1.DOC

    Version 1 of the GOSIP document.

PROTOCOLS/GOSIP-ORDER-INFO.TXT

    Descriptions of GOSIP-related documents and information on how to obtain
    them.

RFC/RFCnnnn.TXT, where nnnn is the RFC number

    Network technical notes, known as Requests for Comments, or RFCs, are
    online in the directory RFC/ on the NIC.DDN.MIL host.  New RFCs are
    announced to network users via an online distribution list maintained 
    by the NIC.  Individuals who want to be added to the RFC notification
    list should send a message to RFC-REQUEST@NIC.DDN.MIL.

DRAFT [Page 71] DRAFT

NIC 60001, September 1991 DDN New User Guide

RFC/RFC-INDEX.TXT

    Lists all RFCs in reverse numerical order, with the most recent RFC at
    the top.  Includes author, title, date of issue, RFC number, number of
    hardcopy pages, number of online bytes, format (ASCII text), and
    information regarding other RFCs that make a given RFC obsolete or
    update it.  Notes whether an RFC is also an FYI.

FYI/FYInn.TXT, where nn is the FYI number

   (FYI = For Your Information)  General information technical notes issued
   as special RFCs.

FYI/FYI-INDEX.TXT

   Mirror of the RFC Index, but listing only FYIs.  Notes the corresponding
   RFC number for each FYI.

DRAFT [Page 72] DRAFT

NIC 60001, September 1991 DDN New User Guide

          SECTION 7.  SECURITY CONSIDERATIONS AND NETWORK CONDUCT

7.1 Requirements for Legitimate DDN Access

Only authorized users engaged in U.S. Government business or applicable research, or who are directly involved in providing operations or system support for Government-owned or Government-sponsored computer communications equipment, may use the DDN. The network is not available for use by the general public, nor is it intended to compete with comparable commercial network services. Users of the DDN must not violate privacy or other applicable laws and should not use the networks for advertising or recruiting purposes without the express permission of the Defense Information Systems Agency.

Unauthorized use of the DDN is illegal. Persons who break into Government networks or use Government computer resources without authorization will be prosecuted. Hosts that permit this type of access will be disconnected from the network.

    [NOTE: DISA reserves the right to discontinue DDN access to any 
    user(s) who are, in DISA's opinion, not conducting legitimate 
    Government business/activity.  DISA will send one letter of warning
    through command channels (via registered mail) to any user found to 
    be conducting illegitimate business.  Should the illegitimate activity
    continue, DISA will terminate the user's access without additional
    notice.]

7.2 Security Considerations and Guidelines for Network Conduct

Several levels of responsibility provide security for the DDN. At the most basic level, individual users should take precautions to minimize the chances that their accounts could be compromised. They bear the primary responsibility for the protection of their information. If more users were to take this responsibility seriously and act accordingly, the majority of computer security breaches would not occur.

DRAFT [Page 73] DRAFT

NIC 60001, September 1991 DDN New User Guide

You can best protect your own files via careful password management. Do not use an unmodified word from any language; this includes words spelled backward. Your Host Administrator should have suggestions as to proper password choices.

Follow these recommendations to reduce the possibility of compromise of your computer system or files:

  • Do not leave your terminal logged in and unattended.
  • Know your operating system's protection mechanisms and make sure

that all your files are set up with appropriate protection modes.

  • Choose a password that meets the guidelines of your site or, at

minimum, one that is not an unmodified word from any language. A

       simple modification involves prefixing a word with a numeral (or
       several numerals).
  • Change your password as required by your site or, at minimum, every

six months.

  • Do not write your password down on paper or record it in a file

stored on any computer disk, floppy disk, PC, or magnetic tape.

Users have the primary responsibility for protecting their own accounts, but several other people have roles in providing system and network security.

Host Administrators are generally responsible for ensuring that their host sites maintain a reasonable level of protection from the possibility of network compromise. They must act as liaisons with the DDN Network Security Officer (DDN NSO), the Security Coordination Center (SCC), vendors, law enforcement bodies, and other appropriate agencies to resolve any outstanding security problems and prevent their recurrence. They are responsible for the enforcement of all DDN policies at their site.

The NSO recommends security policy affecting the DDN and is responsible for its general enforcement. The NSO also works closely with Host Administrators to resolve network and related computer security problems and incidents affecting their sites.

DRAFT [Page 74] DRAFT

NIC 60001, September 1991 DDN New User Guide

The DDN Security Coordination Center is located at the NIC. The SCC acts as a liaison between Host Administrators and the NSO and between MILNET sites and Internet security response centers such as the Computer Emergency Response Team (CERT).

If you suspect that a computer break-in has occurred, you should contact your Host Administrator. The flow of security incident reporting should be from the end user to the Host Administrator or other appropriate individual, who then determines if the problem is local or network related. If the problem is network related, the Host Administrator should refer the problem to the appropriate site as noted in DDN Security Bulletin 9003 [7]. In such cases, the Host Administrator's first step is to call the MILNET Monitoring Center for your area. Phone numbers for the Monitoring Centers are found in Section 9.2.

7.3 Network Conduct

The network environment is somewhat different from the traditional workplace. Rules for proper conduct are gradually emerging to fit this new environment. The rules and guidelines presented here relate to four areas:

  • passwords
  • file protection
  • plagiarism
  • network mail.

7.3.1 Passwords

Since use of the network is restricted, passwords, access codes, and TAC cards should never be shared. Change your host login password regularly and report any unauthorized use of passwords to your Host Administrator. MILNET TAC cards and records of host Userids and Access Codes should be kept in a safe place. Users should be familiar with and follow local security guidelines.

7.3.2 File Protection

Most operating systems have a method of protecting files from network read and write access. The recommended file protection default for directories is "no

DRAFT [Page 75] DRAFT

NIC 60001, September 1991 DDN New User Guide

read and no write to outside users." If your files are protected in this way, you can still make them accessible to outside users over the network, but you must take action to reset file and directory protections to make this happen.

As a new user, you should find out what the protection default is on your host and ensure that files you don't want accessible to other users are protected. Ask you Host Administrator about default file and directory protection settings and for instructions on protecting/unprotecting files.

7.3.3 Plagiarism

Even if a file is unprotected, you are not free to copy or read it without first asking permission. It is as inappropriate to read online mail or browse through online files without permission as it would be to read a colleague's hardcopy mail or rummage around in his desk.

Electronic plagiarism of another's work is just as unethical as plagiarism by any other means. Be sure to credit users whose work you cite or whose ideas you express. Copyright laws must also be carefully observed and obeyed.

It is easy and convenient to exchange code and programming across the network.

Many code developers are extremely generous in sharing their work. Even so, before copying or using someone else's code, be sure to get permission from the developer or maintainer and credit the source in your documentation. Under no circumstances should programming or code from anywhere on the network be used (verbatim or edited) commercially without the owner's explicit permission.

7.3.4 Mail

Electronic mail is a powerful communication tool that must be used with care. The following guidelines will help you avoid offending other users and overloading the network.

It is easy to forward mail you receive; but the writer may never have intended that anyone else read the message. For this reason, it is wise to check with the sender before forwarding a private message of any significance.

DRAFT [Page 76] DRAFT

NIC 60001, September 1991 DDN New User Guide

The DDN is a business environment, so try to keep your messages short and to the point. It is easy to send off a quick message, only to realize a moment later that you needed to say more. To avoid this, organize your thoughts and send a single message rather than several incomplete ones. This will make your mail far more useful to the recipients, and minimize the load on the network.

Online mail tends to change a person's style of communication. Sending mail is so quick that it is tempting to send your immediate reaction to a message rather than a more considered, appropriate response. Do not use derogatory or inappropriate language in messages, especially those sent to discussion groups. Keep in mind that no one likes to be offended or embarrassed by careless comments.

Finally, if you regularly send mail to a large group, learn how to create a mailing list. Otherwise, each recipient must scroll through a list of the mailboxes of all other recipients as a part of the message header.

Remember, use of the network is a privilege. It is your duty to use the network responsibly as it was intended to be used and to obey general network policies. In return, the network gives you access to many tools and to an online community of other network users.

7.4 Additional Security Information

Host and system administrators are encouraged to order "DCAC 310-P115-1, DDN Security Management procedures for Host Administrators," May 1991. Copies may be obtained in the following manner:

    a.  Government agencies may request a publication by submitting a DCA
        Form 117, Publication of Blank Form Request, to the Director, DISA,
        ATTN: BIAR, Arlington, VA 22204-2199.
    b.  Other organizations may request a publication by submitting a letter
        with appropriate justification to the address given above.  The DCA
        Form 117 is used by Government agencies ONLY.

DRAFT [Page 77] DRAFT

NIC 60001, September 1991 DDN New User Guide

                   SECTION 8.  NETWORK CONCEPTS OVERVIEW

8.1 Introduction

In the following paragraphs, we provide some general information about topics such as usage-sensitive billing, network concentrators, network addresses, the Domain Name System, and GOSIP. Although most new DDN users will not be actively involved in any of the areas covered in this section, they do involve concepts you should become familiar with, since they are important to all DDN users.

8.2 Usage-Sensitive Billing

The usage-sensitive billing system was implemented on the DDN to distribute costs more equitably, based on actual use of network resources. The tariff structure is designed to support cost recovery so that the amount recovered from each subscriber is proportional to that subscriber's use of network resources.

Generally speaking, all hosts and dedicated terminals are charged a basic monthly rate. Users' network connections are charged on a per-minute basis. A charge is also levied for each kilopacket of traffic sent by each host or terminal user. Charges reflect peak-versus-nonpeak usage and precedence level.

Monthly bills are sent to designated representatives of the military branches as well as to other Government agencies. The bills are then distributed according to locally established policies. That is, a packet of several bills might be sent to a site and then distributed to other individuals by the billing Point of Contact (POC) at that site.

It is rare for an individual user to see a bill. However, you should be aware that your use of the DDN does affect costs charged back to your service and, perhaps, to your host site. Therefore, all users should be conscientious in conforming to host site usage policies.

DRAFT [Page 78] DRAFT

NIC 60001, September 1991 DDN New User Guide

The NIC provides a Usage Sensitive Billing (USB) Service Desk to help answer inquiries from DDN users or user organizations regarding the traffic and/or connection charges shown on their billing reports. USB Service Desk personnel are available by phone Monday through Friday from 7:00 a.m. to 3:00 p.m., Eastern time. Electronic mail is accepted 24 hours per day.

Service Desk personnel have access to many sources of DDN usage information. They are available to answer general questions as well as site- or user-specific questions. In the event a question or inquiry goes beyond the scope of the Service Desk, the caller can be referred to a more appropriate contact or agency.

Use the following information to contact the USB Service Desk:

By Electronic Mail: BILLING@NIC.DDN.MIL

By Phone: 1 (800) 365-DNIC (inside the U.S.)

                                   1 (703) 802-4535 (outside the U.S.)

By U.S. Mail: DDN Network Information Center

                                   ATTN: Usage-Sensitive Billing Desk
                                   14200 Park Meadow Drive, Suite 200
                                   Chantilly, VA  22021

8.3 Network Concentrators

Networks can be categorized according to size or geographic distribution, and they can be referred to as local area networks (LANs) or wide area networks (WANs). A LAN might serve a single office, a building, or an entire military site. WANs are typically cross-country networks employing technologies such as satellites or long distance land lines; they can serve large geographic areas such as military installations located throughout the world. The DDN is a WAN that reaches all major DoD installations worldwide.

To expand computer communications not only across geographical distances, but also across different networking technologies, gateways are used to connect networks together into internetworks or "internets." The DDN is part of an IP-based internetwork known to DDN users as "the Internet."

DRAFT [Page 79] DRAFT

NIC 60001, September 1991 DDN New User Guide

The use of gateway concentrators as a method of connecting to the DDN is a relatively new trend. Gateway concentrators enable LANs and hosts at military installations to connect to the DDN. Concentrators lessen the need for individual host connections without limiting local users' access to full DDN service.

Gateway concentrator use increased when DISA limited the number of PSN ports that would be available to connect hosts directly to the DDN. This limitation, coupled with the long lead time required for direct host connections, lent impetus to the establishment of gateway concentrator programs for the military. Currently, the Air Force and the Army have concentrator programs to fulfill their long-haul data communication requirements. These programs have become their primary method of connecting unclassified computer systems to the DDN.

Gateway concentrators provide a number of advantages for connecting installations to the DDN:

  • Greater Connection Capacity.

With the installation of a gateway concentrator at a local site, the

       number of hosts that can be connected to the DDN is no longer limited
       by the number of ports available on a PSN.  Instead, many hosts can
       be connected to a concentrator, and the total amount of traffic they
       pass to the DDN is accommodated by the connection between the gateway
       concentrator and the MILNET PSN to which it is attached.
  • Quick Connection.

The gateway concentrator program was designed to allow multiple hosts

       to access a single DDN port simultaneously.  Computers at an
       installation that requires unclassified worldwide communication will
       be connected to the Internet automatically because their local
       networks are attached to the Internet via the concentrator.  Thus,
       these hosts will not require direct connections to DDN ports.  This
       configuration enables the various military services (e.g., Air Force,
       Army) to manage their host connections directly, and to avoid the
       long wait for individual host connections to DDN ports.
  • Lower Cost Per Host.

Because of the DDN usage-sensitive billing system structure, the

       gateway concentrator programs reduce costs for DDN connection.  With
       the installation of a gateway concentrator, the charges for initial

DRAFT [Page 80] DRAFT

NIC 60001, September 1991 DDN New User Guide

       host connections are reduced, as the service is charged only once for
       the initial connection of the concentrator itself, rather than for
       each individual host connection.  In addition, traffic between local
       hosts on the network behind a gateway concentrator will not be billed
       because such traffic will not travel across DDN facilities.

The Air Force has a help desk at the Internet Control Center (INCC) to aid concentrator users in accessing the DDN:

        AFINCC@SERVER.AF.MIL
        Headquarters Standard Systems Center/AQFC
        Building 857, Room 200A
        Gunter Air Force Base, AL 36114-6343
        (205) 416-5771, (205) 416-5861; (DSN) 596-5771, 596-5861

8.4 Network Addressing

The network address is the official numeric address of a host, TAC, or gateway (as opposed to the official name by which these entities are addressed). Network addresses take the format "nnn.nnn.nnn.nnn" (dotted decimal format), where nnn represents an up to 3-digit decimal identifier from 0 through 255, and each numeric component is separated from the next with a period. Each decimal part represents one octet of a 32-bit network address. The standard Internet address is divided into two parts: a network part and a local host part. Based on this two-part division, three classes of Internet addresses have been defined: Class A, Class B, and Class C.

CLASS A Network Addresses

Class A network addresses have the following characteristics:

  • Composed of a 1-byte network address and a 3-byte local address.
  • The highest-order bit of the (1-byte) network address is set to 0.
  • Therefore, the first (or network address) byte of a CLASS A address

must be in the range from 0 to 127.

  • Consequently, CLASS A could have as many as 128 networks with 2 to

the 24th power (16,777,216) hosts on each of these networks.

DRAFT [Page 81] DRAFT

NIC 60001, September 1991 DDN New User Guide

All directly connected MILNET hosts are on network 26, which is a Class A network.

For MILNET hosts,

  • The first part of the address is the network number (26).
  • The second part is the physical port number on the host's PSN.
  • The third part is the logical port number (currently 0 (zero) for

MILNET hosts).

  • The fourth part is the number of the PSN to which the host is

connected.

Therefore, a host with the address 26.31.0.73 is on network 26 (the number assigned to the MILNET) and is attached to port 31 on PSN 73.

CLASS B Network Addresses

Class B network addresses have the following characteristics:

  • The two high-order bytes of the Internet address contain the network

number, while the two low-order bytes contain the local host number.

  • The highest order bits are set to 10, which means that the first byte

must be a number in the range 128 to 191.

  • Consequently, CLASS B could have as many as 16,384 networks with 2 to

the 16th power (65,536) hosts on each of these networks.

CLASS C Network Addresses

Class C network addresses have the following characteristics:

  • The network number is contained in the three high-order bytes of the

Internet address, while the local host address is represented in the

       single low-order byte.
    *  The three highest-order bits of the network address are set to 110.
    *  Therefore, the first byte must be in the range 192 to 233.
    *  Consequently, CLASS C could have as many as 2,097,152 networks with
       2 to the 8th power (256) hosts on each of these networks.

DRAFT [Page 82] DRAFT

NIC 60001, September 1991 DDN New User Guide

The Internet Registry (IR) at the DDN NIC assigns the network portion of an address to a network. The local network coordinator for a specific host assigns the local portion of that host's network address.

Here are some examples of how each type of network number looks:

                Class A:  26.31.0.73
                Class B:  128.18.1.1
                Class C:  192.67.67.20
   [NOTE:  A network address is different from a user's address.  The 
   term "user address" refers to a person's electronic mailbox, such as
   henry@nic.ddn.mil.]

In addition to the three classes defined above, a class of addresses whose three highest order bits are 111 has been defined. It is currently in limited use. This class is sometimes referred to as "CLASS D." Figure 8-1 on the next page graphically represents the three major Internet address classes.

DRAFT [Page 83] DRAFT

NIC 60001, September 1991 DDN New User Guide

CLASS A Internet Address:

   Byte:       1             2            3            4
          <-----------><-----------><-----------><----------->
   Bit:    0          07           15           23          31
          +--------------------------------------------------+
          | | Network |                                      |
          |0| Address |      Local Address                   |
          +--------------------------------------------------+

CLASS B Internet Address:

   Byte:       1             2            3            4
          <-----------><-----------><-----------><----------->
   Bit:    0          07           15           23          31
          +--------------------------------------------------+
          |1|0|   Network Address   |    Local Address       |
          +--------------------------------------------------+

CLASS C Internet Address:

   Byte:       1             2            3            4
          <-----------><-----------><-----------><----------->
   Bit:    0          07           15           23         31
          +--------------------------------------------------+
          | | | |                                |  Local    |
          |1|1|0|       Network Address          | Address   |
          +--------------------------------------------------+
                  Figure 8-1.  Internet Address Classes

DRAFT [Page 84] DRAFT

NIC 60001, September 1991 DDN New User Guide

8.4.1 Finding Network Address Information

The WHOIS database at the NIC contains POC information for every network the IR (Internet Registry) assigns; however, it may not contain information for every host on a network. Therefore, remember to search on the network portion of the address rather than the complete address when you are using the WHOIS program to obtain information on a host.

For example, the Class C address

                192.112.36.70

is not in the database, but searching on

                192.112.36.0 

shows you information for LOCALNET. When using WHOIS to find the POC information for a network, set the local portion(s) of the address to zero. (See Section 6.3.1.3 for an example of using WHOIS to search for a network address.)

8.4.2 Obtaining Network Addresses

DISA assigns all MILNET network addresses (Class A, network 26), and the MILNET Manager must approve any changes to or deletions of MILNET network addresses.

The NIC assigns all other Class A, B, and C network addresses. Requests to obtain an official Class B or C number or to make changes to hosts registered with these addresses should be directed online to HOSTMASTER@NIC.DDN.MIL. To arrange for a hardcopy application, call the NIC at 1 (800) 365-DNIC. Applications can also be requested through the SERVICE mail server (see Section 6.3.5).

8.4.3 Knowing Your Network Address

Each user should know the network address of his/her host. It is especially important to know your host's address if you use a TAC or Mini-TAC because you will have to enter the address as part of the TAC login sequence. Your host

DRAFT [Page 85] DRAFT

NIC 60001, September 1991 DDN New User Guide

address is often–but not always–the address printed on your TAC card by the label AUTHORIZING HOST. Even if you have a script file or program that enters this information for you as you log in, learn your address so you can tell it to the NIC or the MILNET Monitoring Center when you call them about a login problem.

8.5 The Domain Name System

Until the mid-1980s, a DDN host could find data on hostname-to-network-address translation solely through the use of a file called the host table, which was generated at the NIC.

The host table contained the name and network address of every host that was registered with the NIC. Individual host sites had to transfer and install new copies of the host table regularly in order to have correct host addressing information. The host table had to be updated frequently to enable mail and other data to be sent back and forth across the Internet.

As time went on, however, the number of hosts listed in the host table became so large that the file was difficult to maintain efficiently, as well as difficult and time-consuming for sites to transfer. As an alternative to the host table file, the Domain Name System (DNS) was developed. Currently, the NIC maintains data for both the host table and the DNS. The host table listing is an extremely restricted subset of the hosts registered in the Domain Name System.

In a nutshell, the DNS is a way of administratively grouping hosts into a hierarchy of authority. The DNS allows addressing information to be widely distributed and updated locally, which results in more efficient data retrieval and maintenance. Complete conversion to the DNS will eliminate the need for one site to maintain a centralized table of names and addresses.

Under the DNS, host name and address information, along with other data, is distributed throughout the network in a hierarchical scheme. At the top of the hierarchy are the root servers that contain information about the top-level and second-level domains. At the bottom of the hierarchy are the individual hosts.

DRAFT [Page 86] DRAFT

NIC 60001, September 1991 DDN New User Guide

Each domain within the DNS must have two hosts that provide name service for it, which means that these hosts must run programs called name servers. When queried by programs known as resolvers (located on individual hosts), these name servers provide name and address information to/for the particular hosts within their domain. (The hosts themselves are called servers, even though, technically, a server is a program.) Each server contains a subset of Internet domain information. If a query arrives at a server that does not have address information for a particular host, it will be able to direct the query to the server where the information resides.

Queries regarding specific hostnames usually begin by asking a server that knows about the top-level domain under which that host falls. Currently, most domains on the Internet are registered within one of the following top-level domains:

  • COM for commercial institutions
  • EDU for educational institutions
  • GOV for non-military government agencies and organizations
  • MIL for military agencies and organizations
  • NET for backbone networking entities
  • ORG for non-profit institutions.

Top-level domains are also registered for countries–e.g., BE for Belgium and FI for Finland. The NIC registers information for only the top level of these country domains. Lower-level domains are registered within the country.

Hosts registered on the Internet must have names that reflect the domains under which they are registered. Such names are called Fully Qualified Domain Names (FQDNs) and include all domains of which the host is a part. For example, NIC.DDN.MIL is the name of the NIC's main host. The hostname NIC.DDN.MIL, when taken piece by piece, gives information about the host itself. A hostname ending in MIL signifies sponsorship from a military-related organization. The second-level domain, DDN, indicates that the host is used by an organization within the DDN. The third-level domain, NIC, indicates the host is used by the NIC.

Between the root servers and the individual hosts are other hosts that act as servers and contain part of the information within the DNS hierarchy. For example, a program looking for the address of NIC.DDN.MIL might first send a query to a root server.

DRAFT [Page 87] DRAFT

NIC 60001, September 1991 DDN New User Guide

The root server would not know the address of NIC.DDN.MIL in particular, but would direct the query to another server that had information about the DDN.MIL domain. The second server would know which hosts provide name service about NIC.DDN.MIL and direct the query to those hosts. Finally, the query would arrive at the specific host providing name service for NIC.DDN.MIL. That host would return the network address information via the DNS to the host that initiated the query. All of this happens very quickly–usually in less than a minute.

Mail programs must know the address of each host to which they send mail. Users normally include a hostname in the headers of their messages. The mail program queries either the DNS or a host table to translate that hostname to a network address. This enables the mail message to be delivered across the network.

For example, if a user named Sam wants to send mail to his friend Joe at the host EXAMPLE.SAMPLE.COM, he can do so in one of two ways.

    1.  Via the Host Table--
  • The host EXAMPLE.SAMPLE.COM is registered in the host table

along with its netaddress.

  • The mail program finds the correct netaddress from the host

table on the sender's local host and sends the mail to Joe.

        In this method of transmission, every host that Sam wants to
        communicate with must be listed in the host table file on his own
        host.  Sam may not be able to reply to messages sent to him if his
        host does not recognize the hostname in the sender's return address.
    2.  Via the Domain Name System--
  • The mail program trying to deliver a message addressed to

JOE@EXAMPLE.SAMPLE.COM sends a tracker called a query to one of

           seven root servers.
  • The root server has information on the COM top-level domain and

knows which two domain servers hold further information on the

           SAMPLE.COM domain.  

DRAFT [Page 88] DRAFT

NIC 60001, September 1991 DDN New User Guide

  • The root server points the query to those domain servers.
  • When the query arrives at the ultimate destination server, it

learns the netaddress of the host EXAMPLE.SAMPLE.COM, and the

           mail program obtains the information necessary to establish a
           path from the sender's host to Joe's host.
  • The query directs the mail down that path to Joe's mail account

on the EXAMPLE.SAMPLE.COM host.

8.6 Government Open Systems Interconnection Profile (GOSIP)

The Government Open Systems Interconnection Profile (GOSIP) is a document that describes the Government's plans to transition its networks from the TCP/IP-based protocols to international protocols based on the Open Systems Interconnection (OSI) Reference Model. The goal is to add OSI-based functions to the Internet without sacrificing services now available to Internet users.

Several documents pertain to GOSIP or its implementation; however, we will mention only one resource that will point you toward the most current information available.

RFC 1169, "Explaining the Role of GOSIP," [6] discusses how GOSIP should be applied to near-term network planning and explains the role and applicability of the GOSIP document. In addition, it has an appendix that describes other GOSIP documents and tells how to obtain them. The appendix also lists contacts for further information regarding the documents. This RFC will probably be updated as the status of GOSIP changes, so check the RFC Index, available at the NIC, to ensure that you have the most current information.

DRAFT [Page 89] DRAFT

NIC 60001, September 1991 DDN New User Guide

            SECTION 9.  NETWORK SERVICE CENTERS AND CONTACTS

The three main service centers on the DDN are:

  • The DDN Network Information Center (NIC)
  • The DDN Network Monitoring Centers (NMC) for the United States,

Pacific, and European areas

  • The Defense Information Systems Agency's Defense Network Systems

Organization (DISA DNSO).

This section of the Guide describes the services provided by these organizations and gives a list of key contacts for each.

This section also tells you how to obtain the names of other key network contacts, including the following:

  • Host Administrators
  • Node Site Coordinators
  • Military Communications and Operations Command Contacts.

These people and places are sources of network-related information and help, so it is important for you to familiarize yourself with them.

9.1 The DDN Network Information Center (NIC)

The DDN Network Information Center (NIC) is located at Government Systems, Inc. (GSI) headquarters in Chantilly, Virginia. The NIC is funded by the Defense Information Systems Agency's Defense Network Systems Organization (DISA DNSO). Its mission is to provide general reference services to DDN users via telephone, electronic mail, and U.S. mail. The NIC is the first place to turn to if you are not sure who provides the service you need or who is the right person to contact. Section 6 describes the NIC services in detail.

DRAFT [Page 90] DRAFT

NIC 60001, September 1991 DDN New User Guide

9.1.1 General Reference Service Provided by the NIC

The NIC provides several kinds of user assistance. Our main Help Desk phone numbers are

     1 (800) 365-DNIC (inside the U.S.)
    +1 (703) 802-4535 (outside the U.S.)

The first number is toll-free. Service is available Monday through Friday, from 7 a.m. to 7 p.m., Eastern time.

The NIC Help Desk assists those who experience problems with the network and with terminal-to-TAC use. In addition, the NIC is happy to answer questions about any other service outlined in this section.

The NIC host computer's hostname and its network address are:

            NIC.DDN.MIL     192.112.36.5

NIC online services are available 24 hours a day, 7 days a week.

9.1.2 NIC Online Contacts

The NIC supports several online mailboxes to provide assistance in specific areas.

    Type of Inquiry                           Network Mailbox

General User Assistance NIC@NIC.DDN.MIL

    TAC and Non-TAC User Registration         REGISTRAR@NIC.DDN.MIL
    Urgent Security Matters                   NIC-ALERT@NIC.DDN.MIL
    Host, Domain, and Net Registration        HOSTMASTER@NIC.DDN.MIL
    NIC.DDN.MIL Computer Operations           ACTION@NIC.DDN.MIL
    Comments on NIC Publications, Services    SUGGESTIONS@NIC.DDN.MIL
    Security Concerns and Questions           SCC@NIC.DDN.MIL
    Usage-Sensitive Billing Questions         BILLING@NIC.DDN.MIL
    Automatic Mail Service                    SERVICE@NIC.DDN.MIL
    Reporting NIC Software Bugs               BUG-SERVICE@NIC.DDN.MIL

DRAFT [Page 91] DRAFT

NIC 60001, September 1991 DDN New User Guide

9.1.3 NIC U.S. Mail Address

          Network Information Center
          14200 Park Meadow Drive, Suite 200
          Chantilly, VA  22021

9.2 Network Monitoring Centers (NMCs)

The three Network Monitoring Centers are:.

  • The CONUS MILNET Monitoring Center (CMMC) located at DISA

headquarters in Washington, DC; the CMMC provides a toll-free hotline

       Trouble Desk phone number for quick reporting of network problems.
  • The Pacific MILNET Monitoring Center (PMMC) located at Wheeler AFB

in Hawaii.

  • The European MILNET Monitoring Center (EMMC) located in Patch

Barracks, Vaihingen, Germany.

All NMCs provide operations support for several DoD packet-switching networks.

The NMCs concentrate on real-time network management, with the primary objective of maximizing each network's operating efficiency. In addition, they receive the first DDN security incident reports.

Bolt Beranek and Newman, Inc., Communications Division (BBNCD) provides DDN with operations and technical support, configuration management, software maintenance and enhancement, hardware maintenance, and required hardware.

9.2.1 NMC Services

NMC services include remote status monitoring, coordination of network outage troubleshooting efforts, and 24-hours-per-day, 7-days-per-week technical assistance to users. The NMCs typically work on backbone-related outages consisting of node and circuit problems; they provide help in determining whether host connectivity problems are network related.

Your Host Administrator contacts the appropriate NMC for all network hardware problems, hardware field service, problems with host interfaces, suspected node software problems, or DDN security problems.

DRAFT [Page 92] DRAFT

NIC 60001, September 1991 DDN New User Guide

9.2.2 NMC Contacts

  Title                Telephone               Network Mailbox
  CONUS MMC            1 (800) 451-7413        DCA-MMC@DCA-EMS.DCA.MIL
                       1 (703) 692-2268     
  European MMC         011 49 711 687 7766     STT-CONTROL@FRG.BBN.COM
  Pacific MMC          1 (808) 656-1472        PMMC@PAC-MILNET-MC.DCA.MIL

MILNET Trouble Desk 1 (703) 692-5726

9.2.3 NMC U.S. Mail Addresses

CONUS MILNET Monitoring Center Pacific MILNET Monitoring Center DCA Headquarters Defense Communications Agency, Pacific 701 South Courthouse Rd. Wheeler AFB, HI 96854-5000 Arlington, VA 22204-2199 Attn: P-600 Attn: MILNET Manager

                European MILNET Monitoring Center
                BBNCD
                DCA-Europe
                Box 1000 Att: DED
                APO NY 09131-4103

9.3 Host Administrators and Node Site Coordinators

Each host has a representative who serves as its technical and administrative contact–the Host Administrator. The Host Administrator provides important host-related services such as the following:

  • Collaborates with the DDN PMO on security matters involving hosts,
  • Interprets network policies as they apply to his/her host,
  • Decides which users may access the network (within the guidelines

set by the DDN PMO),

DRAFT [Page 93] DRAFT

NIC 60001, September 1991 DDN New User Guide

  • Authorizes user access to the MILNET Terminal Access Controllers

(TACs) and Mini-TACs,

  • Helps network users with technical problems involving hosts, and
  • Works with the Network Information Center and the Network Monitoring

Centers to provide information and technical assistance.

Each network node, or PSN, has a Node Site Coordinator (NSC). The Node Site Coordinator is the local site representative who has access control, accountability, and coordination responsibility for the DDN-owned network hardware, software, and circuits located at the node site.

Occasionally, one person serves both roles. A Host Administrator or Node Site Coordinator may also designate an alternate who can assist with the administrative or technical demands of the position.

To find the names, addresses, telephone numbers, and network mailboxes for these contacts, see Section 6.3.

9.4 Military Communications and Operations Command Contacts

Each military department has designated an organization to serve as the primary DDN Point of Contact. Requests for information or assistance should be directed to the following organizations:

Service Address Telephone DSN

Air Force AFDDN PMO 1 (205) 279-4075/3290 446-4075

          Gunter AFS, AL 36224-6340

Army OSAISC, AS-PLN-RF 1 (602) 538-6915 879-6915

          Fort Huachuca, AZ 85613-5000

Navy COMNAVTELCOM, Code N521 1 (202) 282-0381/2 292-0381

          Washington, DC 20390-5290

DRAFT [Page 94] DRAFT

NIC 60001, September 1991 DDN New User Guide

9.5 Defense Information Systems Agency, Defense Network Systems

   Organization (DISA DNSO)
    [NOTE:  The Defense Communications Agency, DCA, became the DISA in 1991;
    in the same year, the Defense Communications System Organization became
    the DNSO.]

The Defense Information Systems Agency, Defense Network Systems Organization (DISA DNSO) is responsible for overall management of the Defense Data Network (DDN). DDN Newsletter 58, available online as DDN-NEWS/DDN-NEWS-58.TXT from the NIC.DDN.MIL host, contains the most current listing of DISA DNSO personnel and their areas of responsibility. Contact the NIC to ensure that this newsletter still reflects the most current information on DNSO staff contacts.

9.6 If You Have a Network Use Problem

For Questions on: Contact:

Terminal settings Host Administrator or User Representative Host login Host Administrator or User Representative MILNET TAC access Host Administrator for your primary MILNET host TAC login procedure Network Information Center TAC line problems TAC Node Site Coordinator or the Monitoring

                            Center

TAC phone numbers NIC TACNEWS program General DDN information Network Information Center Host line problems Respective Network Monitoring Center

DRAFT [Page 95] DRAFT

NIC 60001, September 1991 DDN New User Guide

                          SECTION 10.  BIBLIOGRAPHY

Many of the manuals and documents listed below are cited in this Guide; others provide information that should be helpful to you as users of the DDN. When available, ordering numbers are given for items that can be ordered from the Defense Technical Information Center (DTIC) or from DISA. Hardcopies of some of these documents can be ordered from SRI International, Menlo Park, CA.

If the NIC offers online versions, the filenames are shown in brackets.

Cited References

1. TAC Users' Guide. DCAC 310-P70-74. 1988 June.

2. DDN Subscriber Interface Guide. Defense Data Network, Program Management

  Office, Defense Information Systems Agency, 701 S. Courthouse Rd,
  Arlington, VA 22204-2199.  1983.  (AD-A132 877/2).

3. DeLauer, R.D., DoD Policy on Standardization of Host-to-Host Protocols for

  Data Communications Networks.  Office of the Secretary of Defense,
  Washington, D.C., 1982 March.  [IEN/IEN-207.TXT]

4. Carlucci, F. C., "Autodin II Termination," Memorandum for Secretaries of

  the Military Departments, Deputy Secretary of Defense, Washington, D.C.,
  1982 April.

5. Defense Information Systems Agency, DDN Network Systems Organization.

  Defense Data Network Management Bulletin 76: "TAC User Registration
  Clarification."  Menlo Park, CA.  SRI International, 1990 August 24; DDN
  Mgt. Bul. 76, 1 p.  [DDN-NEWS/DDN-MGT-BULLETIN-76.TXT]

6. RFC 1169, Explaining the Role of GOSIP. 1990 August. 15 p.

  [RFC/RFC1169.TXT.]

7. Defense Information Systems Agency, Defense Network Systems Organization.

  Defense Data Network Security Bulletin 9003:  "Security Violation
  Reporting."  Menlo Park, CA: SRI International, DDN Security Coordination
  Center; 1990 February 15; DDN Security Bul. 9003. 2 p.  
  [SCC/DDN-SECURITY-9003]

DRAFT [Page 96] DRAFT

NIC 60001, September 1991 DDN New User Guide

8. RFC 1177, FYI on Questions and Answers: Answers to commonly asked "new

  internet user" questions. 1990 August. 24 p.  (Also FYI 4) 
  [RFC/RFC1177.TXT]

Auxiliary User Documentation

DEC-20 User's Manual. Digital Equipment Corporation, Maynard, MA, 1982.

InfoMail Primer. DCAC 310-P70-70. 1986 May.

InfoMail Reference Manual. DCAC 310-P70-71. 1986 June.

InfoMail User Guide. Bolt Beranek and Newman Inc., Cambridge, MA, 1982.

Mooers, Charlotte. The HERMES Guide. Bolt Beranek and Newman Inc., Cambridge, MA, 1982.

General References

Bolt Beranek and Newman Inc. A History of the ARPANET: the First Decade.

                               Report No. 4799, Defense Advanced Research
                               Agency, Arlington, VA, 1981. [AD-A1115 440]

Cerf, V. and Lyons, R. "Military Requirements for Packet-Switched

                               Networks and Their Implications for Protocol
                               Standardization."  Computer Networks. 7(5):
                               293-306; 1983 October.

Chou, W. (Ed.). Computer Communications: Principles.

                               Englewood Cliffs, NJ: Prentice-Hall, Inc.;
                               1983.

Comer, D.E. Internetworking with TCP/IP: Principles,

                               Protocols, and Architecture. Englewood
                               Cliffs, NJ: Prentice-Hall, Inc.; 1988. 
                               382 p. 

DRAFT [Page 97] DRAFT

NIC 60001, September 1991 DDN New User Guide

DDN Defense Data Network Brochure. Defense Information Systems Agency, Defense Network Systems Organization, Washington, DC, 1984.

DDN Protocol Handbook, 4 Volumes. SRI International (former DDN NIC), Menlo Park, CA. 1985.

DDN Subscriber Security Guide. Defense Data Network, Program Management Office, Defense Information Systems Agency, Washington, D.C. 1983. [AD-A152 524]

Frey, D.; Adams, R. !%@:: A Directory of Electronic Mail

                               Addressing and Networks.  Newton, MA:
                               O'Reilly and Associates; 1989 August. 284 p. 

FYI 2; FYI on a network management tool catalog: Tools for monitoring and debugging TCP/IP internets and interconnected devices. 1990 April. 126 p. (Also RFC 1147) [FYI/FYI2.TXT]

FYI 3; FYI on where to start: A bibliography of internetworking information. 1990 August. 42 p. (Also RFC 1175) [FYI/FYI3.TXT]

Hinden, R., Haverty, J. and Sheltzer, A. "The DARPA Internet: Interconnecting

                               Heterogenous Computer Networks with
                               Gateways."  Computer. 16(9): 38-48; 
                               1983 September.

Jennings, D.M., et al "Computer Networking for Scientists."

                               Science.  Vol 231: 943-950; 1986 February.

LaQuey, T.L. (Ed.) Users' Directory of Computer Networks.

                               Bedford, MA: Digital Press; 1990.  630 p.

Network Protocol Implementations and Vendors Guide. SRI International (Former Network Information Center), Menlo Park, CA. 1990. [NETINFO/VENDORS-GUIDE.DOC]

Partridge, C. (Ed.) Innovations in Internetworking. Norwood, MA:

                               Artech House; 1988.

Perry, D.G., et al The ARPANET and the DARPA Internet. Library

                               Hi Tech.  6(2): 51-62; 1988 April.

DRAFT [Page 98] DRAFT

NIC 60001, September 1991 DDN New User Guide

Quarterman, J.S. Matrix: Computer Networks and Conferencing

                               Systems Worldwide. Bedford, MA: Digital
                               Press; 1989. 719 p.

Ubois, J. "Defense Data Network." National Defense.

                               Vol.74:  33-35; 1990 February.

DRAFT [Page 99] DRAFT

NIC 60001, September 1991 DDN New User Guide

                         SECTION 11.  GLOSSARY

acoustic coupler

    A type of modem that converts digital signals into sound for trans-
    mission through telephone lines and performs the reverse operation when
    receiving such signals.  Acoustic couplers generally have cups into
    which the telephone handset is placed to make the connection.

anonymous login convention

    Standard username (anonymous) and password (guest) that allows a user to
    log in within FTP for the purpose of retrieving an unprotected public
    access file.

ARPANET

    Packet-switched network developed by the Defense Advanced Research
    Projects Agency.

ASN Autonomous System Number. A number assigned by the NIC to an autonomous

    network that request connection to the Internet.

backbone

    The nodes (PSNs), the TACs, and the telephone lines connecting them that
    form the core of the DDN.

BBNCD

    Bolt Beranek and Newman, Inc., Communications Division; a major hardware
    and software developer for the DDN.

bps Bits per second. The unit used for measuring line speed, i.e., the

    number of information units transmitted per second.

case sensitive

    Software differentiation between uppercase and lowercase characters.

CERT

    Computer Emergency Response Team, the DARPA-sponsored group responsible
    for coordinating many security incident response efforts.

DRAFT [Page 100] DRAFT

NIC 60001, September 1991 DDN New User Guide

circuit-switched

    A type of network connection.  A circuit-switched connection is a
    continuous electrical connection established between sending and
    receiving users for their exclusive use.  The connection remains active
    until it is closed by the using parties.

concentrator

    A gateway; that is, a computer that interconnects networks.

connection

    An access path between two ports on a network, established for data
    transmission between the ports.

CONUS

    Military acronym for the Continental United States.

DARPA

    Defense Advanced Research Project Agency.  The agency that created and
    administered the ARPANET.

DCA DCSO

    Defense Communications Agency, Defense Communications System
    Organization; the group responsible for administering the DDN. (Now
    known as the Defense Information Systems Agency, Defense Network Systems
    Organization³DISA DNSO.)

DDN Defense Data Network. The DoD long-haul, packet-switched computer

    communications network that includes the MILNET as one of its
    subnetworks.

DIIS

    The DDN Installation Integration and Support task, which encompasses the
    NIC and its services.

DISA DNSO

    Defense Information Systems Agency, Defense Network Systems
    Organization.  Formerly the DCA DCSO (see above).

DNS Domain Name System. The hierarchical, distributed database used for

    host name and address resolution that has replaced the need for a
    centralized host table.

DRAFT [Page 101] DRAFT

NIC 60001, September 1991 DDN New User Guide

DoD Department of Defense.

DRI Defense Research Internet. A network that will provide state-of-the-art

    internetworking services for the DoD.  It is still in the planning
    stages.

DSN Defense Switched Network. A proprietary Government telephone network.

DTIC

    Defense Technical Information Center, Cameron Station, Alexandria, 
    VA 22314.  A depository for many DoD technical reports.

FQDN

    Fully Qualified Domain Name.  The complete hostname that reflects the
    domains of which the host is a part.

FTP File Transfer Protocol. A network utility for copying files across the

    network; defined in RFC 959.

FYI A "For Your Information" document, issued also as an RFC, that contains

    information of general interest to the Internet community.

gateway

    A computer that interconnects networks.

GOSIP

    Government Open Systems Interconnection Profile.  A document that
    addresses the DDN's planned transition from TCP/IP protocols to OSI
    protocols.

handle

    Unique character string identifier assigned to each entry in the NIC
    WHOIS database.

host

    A computer connected to a PSN on the DDN.

hostname

    A name that officially identifies each computer attached to the DDN.

IMP Interface Message Processor; see PSN.

DRAFT [Page 102] DRAFT

NIC 60001, September 1991 DDN New User Guide

INCC

    The Internet Control Center.  The service center that provides help to
    Air Force concentrator users.

InfoMail

    The electronic mail program developed by BBNCD.

Internet

    The specific IP-based internetwork of which the DDN is a part.

internetwork

    A network, such as the DDN, that consists of many interconnected
    networks.

IP Internet Protocol. A DoD standard protocol that allows dissimilar

    hosts to connect to each other through the DDN, defined in RFC 791.

IR Internet Registry. The function at the NIC that assigns official IP

    network numbers.

Kermit

    An error-checking file-transfer protocol used to copy files from one
    computer to another. Also the name given to the public domain software,
    distributed by Columbia University, that supports this protocol.

LAN Local Area Network. A network of directly connected machines usually

    located within 10 miles of one another.

long-haul net

    A network spanning long geographic distances, usually connected by
    telephone lines or satellite radio links.

mailbridge

    A gateway between the MILNET and the Internet, through which mail and
    other data passes.

MIL STD

    Military Standard.  The official military version of a specification.

MILNET

    The DDN unclassified operational military network.

DRAFT [Page 103] DRAFT

NIC 60001, September 1991 DDN New User Guide

modem

    A device that converts digital signals into analog signals (and back)
    for transmission over telephone lines (modulator/demodulator).

MTAC

    Or Mini-TAC.  A new, improved machine that allows remote network access
    in essentially the same manner as a TAC, but accommodates a wider
    variety of operating systems.

NETINFO

    The name of the publicly accessible directory on the NIC.DDN.MIL host
    that stores many files of interest to users of the network.

network

    The hardware, software, and connections needed to distribute the
    processing of data in a reliable and efficient manner and to enable
    users to exchange and share that data.

NIC DDN Network Information Center, located at GSI headquarters in

    Chantilly, VA.

NIC.DDN.MIL

    The hostname of the NIC host.  Its network address is 192.112.36.5.

NICNAME

    See WHOIS.

NIC/Query

    A general information program on NIC.DDN.MIL.

NMC Network Monitoring Center. The CONUS MILNET NMC is located at 701 S.

    Courthouse Rd., Arlington, VA 22204-2199.  Others are located in Europe
    and Hawaii.

NNSC

    The National Science Foundation's Network Service Center.  The center
    that provides support for the NSFNet backbone.  The NNSC also publishes
    the Internet Resource Guide.

node

    On the DDN, a packet switch or PSN.  A computer that handles network
    message traffic.

DRAFT [Page 104] DRAFT

NIC 60001, September 1991 DDN New User Guide

NREN

    The National Research and Education Network, the planned high-speed
    national network that will provide a platform for research and
    educational networking efforts.

NSC Node Site Coordinator. The local DDN contact responsible for node or

    TAC equipment.

NSFNet

    The packet-switched network that is the backbone of much of the
    Internet.

NSO Network Security Officer. The NSO is responsible for setting DDN

    security policy and overseeing its implementation.

NTIS

    National Technical Information Service, U.S. Department of Commerce,
    Springfield, VA 22151, (703) 487-4650.  A national depository for
    unclassified technical documents.

OCONUS

    A military acronym for "Outside the Continental U.S."

operating system

    Software that supervises and controls tasks on a computer.

OSD Office of the Secretary of Defense.

packet switching

    A data transmission system that uses addressed packets, and in which a
    communications channel is occupied only for the duration of the packet
    transmission.

pathname

    A character string that fully identifies a file.  Pathnames normally
    contain (or imply) device and/or directory names and a filename
    specification.  FTP, TELNET, and electronic mail do not specify a
    standard pathname convention.  Each user must follow the file naming
    conventions of the file systems he wishes to use.

DRAFT [Page 105] DRAFT

NIC 60001, September 1991 DDN New User Guide

packet

    The basic unit of data transmitted over the DDN.  Each packet contains
    a header, which consists of addressing and other control information
    and, optionally, any associated data destined for a network user
    process.

POC Point of Contact.

protocol

    Technical specifications governing the format and timing of information
    exchange between two communicating software processes.

PSN Packet Switch Node. A store-and-forward packet switch (formerly called

    an IMP).

RFC Request For Comment. A series of technical notes describing DARPA and

    DDN research and development, particularly in the areas of protocol
    design and internetworking. Available for anonymous FTP at NIC.DDN.MIL
    in directory RFC.

SCC The Security Coordination Center, located at the NIC, that is

    responsible for collecting security-related information, cooperating
    with the NSO in security incident response, and issuing DDN Security
    Bulletins.

server

    A process providing a generalized service to subscribing user processes.
    Server processes normally "listen" on a network address, ready to
    respond to an incoming service request.  The FTP Server is such a
    process; it responds to file transfer requests from FTP users.

SERVICE

    The name of the NIC's automatic mail server, SERVICE@NIC.DDN.MIL.  
    Send a message to SERVICE@NIC.DDN.MIL with "Subject: HELP" for more
    information.

session

    The time during which a connection remains open between a user and
    server port on a network.  For example, in an FTP session, the end-user
    invokes FTP, names the server host he wishes to connect with, issues FTP
    commands, and logs off.

DRAFT [Page 106] DRAFT

NIC 60001, September 1991 DDN New User Guide

SIG Special Interest Group. An online mailing group whose members exchange

    information on a particular topic.

site Organization or facility where a host is located.

SMTP

    Simple Mail Transfer Protocol.  Defined in RFC 821.

socket

    Logical address of a communications access point to a specific device or
    program on a host.

SRI SRI International, Menlo Park, CA, former location of the DDN Network

    Information Center and early contributor to the development of the DDN.

SunOS

    Sun Microcomputer Systems' proprietary UNIX-based operating system.  
    The operating system used by the NIC host.

TAC Terminal Access Controller. A special type of computer attached to a

    PSN.  It allows direct terminal access to the DDN backbone.

TAC Access Code

    Password assigned to MILNET TAC users for TAC login.

TAC Userid

    Alphanumeric character string that identifies a TAC user upon TAC login.

TACACS

    TAC Access Control System.  A password system that limits use of TACs 
    to authorized users.

TACNEWS

    NIC program for reading DDN Newsletters, Bulletins, and other items of
    interest to TAC users.

TCP/IP

    Transmission Control Protocol/Internet Protocol.  DoD standard network
    protocols defined in RFC 793 (TCP) and RFC 791 (IP).

DRAFT [Page 107] DRAFT

NIC 60001, September 1991 DDN New User Guide

TELNET

    A protocol for opening a transparent connection to a distant host;
    defined in RFC 854.

terminal

    A communication device that lets a user send information to a computer
    by typing on a keyboard.  It prints responses from the computer on paper
    or a screen.

TIP Terminal Interface Processor. A predecessor of the TAC, serving a

    similar function.  See TAC.

UNIX

    An AT&T Bell Laboratories proprietary operating system that runs on
    large and small computers.  It has become widely used in the scientific
    research and development community.

user

    A human end-user or an automated user process authorized to access
    network services.

WHOIS

    NIC program used to access the NIC electronic white pages database.

DRAFT [Page 108] DRAFT

NIC 60001, September 1991 DDN New User Guide

                   APPENDIX A.  NETWORK RESOURCES

One of the questions new users frequently ask when they finally get access to the network is, "Now what? What's out there?" This section lists a few places you can look for more information about what is available to Internet users.

Special Interest Groups

An important part of the Internet are its many online Special Interest Groups (SIGs), which discuss topics ranging from artificial intelligence to Zenith PCs. A SIG is an electronic mailing list dedicated to the discussion of a particular topic. SIGs are a good way for a new user to learn more about the network. Anyone can contribute to a SIG by simply sending mail, and most SIGs are open for anyone to join. Information on network SIGs can be found in a file nicknamed the List-of-Lists, a master list of SIGs with a brief description of each group and how to join it.

For users who have never done a file transfer before, this is a perfect first opportunity. You can use FTP to copy the List-of-Lists from the FTP.NISC.SRI.COM host by logging in with "USERID anonymous" and "PASSWORD guest" and using the pathname netinfo:interest-groups.

Note that many individual hosts redistribute mail for their users–that is, mailing list messages or digests are delivered once to a single local mailbox, and then they are announced or forwarded to a list of interested local users. Mail redistribution eliminates the need for the local mailer to process myriad copies of the same message directed to different users and so conserves local computer resources. Before adding your name to a SIG distribution list, ask your Host Administrator or User Representative if SIG or digest mail is redistributed on your host or posted in a centralized place to be read by all local users.

In addition, all traffic on the MILNET is subject to usage-sensitive billing, so before adding your name to a SIG, be sure that the mail traffic you would generate is consistent with the usage policies of your host.

DRAFT [Page 109] DRAFT

NIC 60001, September 1991 DDN New User Guide

NNSC Internet Resource Guide

The NSF Network Service Center (NNSC) compiles and makes available an Internet Resource Guide. The goal of the guide is to increase the visibility of various Internet resources that might help users do their work better. While not yet an exhaustive list, the guide is a useful compendium of many resources and can be very helpful to a new user.

In the NNSC guide, resources are grouped into sections by type. Current sections include descriptions of online library catalogs, data archives, online white pages directory services, networks, network information centers, and computational resources such as supercomputers. Each entry contains the following information:

  • a description of the resource,
  • an identification of who can use the resource,
  • an explanation of how to reach the resource network via the Internet,
  • a list of contacts for more information.

The NNSC distributes the list electronically. To receive a guide, or to get on a mailing list that alerts you when it is updated, send a message to RESOURCE-GUIDE-REQUEST@NNSC.NSF.NET.

FYI Documents

"FYIs" are a series of special RFCs. The FYI documents address information that is of general interest to the Internet user community. They do not define standards or contain protocol specifications. Rather, they address more general topics, provide insight into Internet conventions, answer commonly asked questions, contain background or historical information, or provide resource information such as bibliographies or descriptions of software. Some FYIs are addressed specifically to new users.

Because FYIs are also RFCs, they are listed along with all the other RFCs in the RFC Index. However, the file FYI/FYI-INDEX.TXT on the NIC host lists only the FYIs. Each index notes both the FYI number and the RFC number of each FYI. You can obtain the FYI Index online by FTPing it or by requesting it through the SERVICE@NIC.DDN.MIL mail service. See Section 5.1.2 for FTP guidelines and Section 6.3.5 for directions on retrieving information via SERVICE. Hardcopies of RFCs are available from SRI International, Menlo Park, CA (the former NIC).

DRAFT [Page 110] DRAFT

NIC 60001, September 1991 DDN New User Guide

NIC Contacts Files

Often users need to communicate with the official Point of Contact (POC) responsible for a specific network or domain. While this information is available via the WHOIS program on the NIC host, as described in Section 6.3.1, the NIC also provides files that contain compilations of the contacts for domains and networks. These files are updated weekly and provide a central resource for useful domain and network POC information.

  • NETINFO/NETWORK-CONTACTS.TXT lists all assigned networks by number

and lists the name of the network, plus the name, phone number, and

       electronic mailbox for each POC.
  • NETINFO/DOMAIN-CONTACTS.TXT is organized by domain name and lists the

name, phone number, and electronic mailbox for each domain POC.

With the network information sources and contacts just outlined and the tools introduced in the previous section, you are now ready to explore the network on your own.

DRAFT [Page 111] DRAFT

NIC 60001, September 1991 DDN New User Guide

                  APPENDIX B.  COMMONLY ASKED QUESTIONS

Here are answers to some of the questions most commonly asked by users. The selections were made from questions addressed to the DDN Network Information Center. (See Section 6.1 for NIC network and U.S. mail addresses.)

1. I want to send mail to my colleague, John Smith. What is his network

   mailbox?
   Answer:
   The NIC provides an online program called WHOIS (or NICNAME) that
   contains the names, addresses, phone numbers, and online mailboxes of
   many network users.  Since some Host Administrators install this program
   on their host, you should ask him/her if it is available locally.
   Alternatively, you may make a TELNET connection to NIC.DDN.MIL and use
   the WHOIS program running on the NIC host.  (Login to NIC.DDN.MIL is not
   required.)  The WHOIS program may also be accessed via electronic mail. 
   Send a message to SERVICE@NIC.DDN.MIL and include the word WHOIS and the
   item you wish to search for in the subject line of your message.  You
   will receive an answer overnight. For more information on using SERVICE,
   see Section 6.3.5.

2. This TAC phone number doesn't work. What should I do?

   Answer:
   The Network Information Center can test the TAC from our site to
   determine if the problem is in the TAC or if it relates to your equipment
   or the procedure you are using.  If the problem is the TAC, we can give
   you phone numbers for other TACs.  We can help you coordinate with the
   MILNET Monitoring Center to report the TAC problem.

3. I will be traveling and need to log in to read my mail. How can I find

   a TAC phone number to use while I'm on the road?
   Answer:
   You can locate TAC phone numbers in several ways.  The back of your TAC
   card lists many of them.  The TACNEWS program available on the

DRAFT [Page 112] DRAFT

NIC 60001, September 1991 DDN New User Guide

   NIC.DDN.MIL host has a menu option that will show you the three TACs
   closest to a phone number you provide.  TACNEWS also provides lists of
   phone numbers for TACs both within and outside the U.S.  See Section
   6.3.3 for an example of TACNEWS usage.  In addition, if you call the NIC
   Help Desk, we will be happy to provide you with phone numbers of TACs.

4. What is the difference between the MILNET and the DDN?

   Answer:
   The MILNET is a wide area network that constitutes one subnetwork of the
   DDN.  The MILNET carries unclassified operational data.  It is the
   segment of the DDN that is connected to the Internet.  The other
   subnetworks of the DDN carry classified information and are standalone
   networks.

5. What is the difference between the MILNET and the Internet?

   Answer:
   The Internet is a collection of TCP/IP-based wide area and local area
   networks that are interconnected by various gateways so that users on one
   network can communicate to users on any of the other networks.  (In
   addition, some non-TCP/IP-based networks, such as BITNET, are accessible
   to Internet users via electronic mail.  These networks are usually not
   strictly considered a part of "the Internet.")  The MILNET is a wide area
   network that is connected to the Internet via several gateways called
   mailbridges.

6. I see a connection on my host from a network number I don't recognize.

   How can I find the number of someone to contact on that network to check
   on this connection?
   Answer:
   Every IP network number assigned by the Internet Registry at the NIC has
   a registered Point of Contact (POC) who is responsible for that network. 
   To find a particular POC, you can look up the number of the network via
   the NIC's WHOIS program.  Search only on the network portion of the 
   number and type the local portions as zeroes.  (See Section 8.4 for a
   brief explanation of network addressing.  See Section 6.3.1 for how to

DRAFT [Page 113] DRAFT

NIC 60001, September 1991 DDN New User Guide

   use WHOIS.)  In addition, the NIC provides a publicly accessible,
   regularly updated file that lists all the POCs for each network number
   assigned.  The file is NETINFO/NETWORK-CONTACTS.TXT.  The POC information
   is listed by network number.

7. How do I get a TAC card?

   Answer:
   Before you can get a TAC card, you must have an account on a host.  Then
   the Host Administrator of a MILNET host (that is, a host whose address is
   on network 26) must approve a TAC card for you.  See Section 4 for a more
   complete explanation of TAC cards and TAC usage.

8. What is an RFC?

   Answer:
   As RFC 1177 [8] explains, the Request for Comments documents (RFCs) are
   working notes of the Internet research and development community.  A
   document in this series may be on essentially any topic related to
   computer communication, and may consist of anything from a meeting report
   to the specification of a standard.  Most RFCs are descriptions of
   network protocols or services, often giving detailed procedures and
   formats.  These RFCs generally provide information in sufficient
   technical detail to enable developers to create implementations.  Other
   RFCs report on the results of policy studies or summarize the work of
   technical committees or workshops.  Currently, all Internet standards
   are published as RFCs, but not all RFCs are standards.  RFCs are publicly
   available on the NIC.DDN.MIL host.  Indexes of RFCs organized by number
   (in reverse order with the most current RFC at the top), by author, or by
   title are available from the NIC as well.

9. May I be registered in the WHOIS database?

   Answer:
   Any TAC user must be registered with the NIC.  In addition, any other
   network user can be added to the WHOIS database if he has a working
   network mailbox.  Information regarding a registered user, such as his
   address and network mailbox, is visible via the WHOIS program.  Thus,
   WHOIS acts as a "white pages" directory of network users, enabling other
   users to ascertain where to send mail to them.  To register in the
   database, fill out the template provided in Section 6.2.1 and return it
   online to REGISTRAR@NIC.DDN.MIL.  The NIC depends on users to send
   updated information whenever their addresses or mailboxes change.

DRAFT [Page 114] DRAFT

/data/webs/external/dokuwiki/data/pages/archive/internet/nug.txt · Last modified: 2002/06/30 18:55 by 127.0.0.1

Donate Powered by PHP Valid HTML5 Valid CSS Driven by DokuWiki