Index of available documents
mdavies@NRI.Reston.VA.US Wed, 24 October 1990 17:17 UTC
Received: from nri by NRI.NRI.Reston.VA.US id aa08646; 24 Oct 90 13:17 EDT
To: stevef@galadriel.bt.co.uk
cc: smds-request@NRI.Reston.VA.US
Subject: Index of available documents
Date: Wed, 24 Oct 1990 13:15:58 -0400
From: mdavies@NRI.Reston.VA.US
Message-ID: <9010241317.aa08646@NRI.NRI.Reston.VA.US>
Steve, Hope this answers your questions, and I apologize for the delay. Megan ---------- Current Internet Drafts This summary sheet provides a short synopsis of each Internet Draft available within the ``Internet-Drafts'' Directory at the NIC and NNSC. ``Assignment/Reservation of Internet Network Numbers for the PDN-Cluster'', Carl-Herbert Rokitansky, 06/01/1989 <draft-ietf-pdn-pdnclusternetassignm-00.txt> ``Application of the Cluster Addressing Scheme to X.25 Public Data Networks'', Carl-Herbert Rokitansky, 08/01/1989 <draft-ietf-pdn-pdncluster-00.txt> ``The Authentication of Internet Datagrams'', Jeff Schiller, 08/01/1989 <draft-ietf-auth-ipauthoption-00.txt> This draft RFC describes a protocol and IP option to allow two communicating Internet hosts to authenticate datagrams that travel from one to the other. This authentication is limited to source, destination IP address pair. It is up to host-based mechanisms to provide authentication between separate processes running on the same IP host. The protocol will provide for ``authentication'' of the datagram, not concealment from third party observers. By authentication, I mean that an IP host receiving a datagram claiming to be from some other IP host will be able (if both hosts are set up to authenticate datagrams between each other) to determine if in fact the datagram is from the host claimed, and that it has not been altered in transit. ``Internet Cluster Addressing Scheme'', Carl-Herbert Rokitansky, 11/01/1989 <draft-ietf-pdn-clusterscheme-00.txt> ``OSI Connectionless Transport Services on top of the UDP: Version 1'', C. Shue, W. Haggerty, K. Dobbins, 11/01/1989 <draft-osf-shue-osiudp-00.txt> This draft proposes a method for offering the OSI connectionless transport service (CLTS) in TCP/IP-based Internets by defining a mapping of the CLTS onto the User Datagram Protocol (UDP). If this draft becomes a standard, hosts on the Internet that choose to implement OSI connectionless transport services on top of the UDP would be expected to adopt and implement the methods specified in this draft. UDP port 102 is reserved for hosts which implement this draft. Distribution of this memo is unlimited. 1 ``The Knowbot Information Service'', Ralph Droms, 12/01/1989 <draft-nri-droms-kis-00.txt and .ps> Within the metanetwork of networks that exchange electronic mail, there are many directory services that provide partial coverage of network users; that is, directories with information about some subset of a particular network's user population. Searching the collection of available directories is time-consuming and requires knowledge of each directory's user interface. Although X.500 is currently under study as a basis for an Internet-wide directory service, it is unlikely that a universal user registry will be in place in the near future. The Knowbot Information Service provides a uniform interface to heterogeneous directory services that simplifies the task of locating users in the combined network. ``IP Routing Between U.S. Government Agency Backbones and Other Networks'', Scott Brim, 01/01/1990 <draft-fricc-brim-BackboneRouting-01.txt> This is an overview of how the agency backbones route IP (Internet Protocol) packets at this time, with any generalizations that can be made and statements of their differences. Also included are recommendations from the agency backbones about how other networks that connect to them can best set up their inter-administration routing. ``Implementation Agreements for Transport Service Bridges'', M.T. Rose, 01/01/1990 <draft-ietf-rose-tsbridge-00.txt> This draft reports implementation experience when building transport service bridges for OSI applications. ``A String Encoding of Presentation Address'', S.E. Kille, 01/31/1990 <draft-ucl-kille-presentationaddress-00.ps> There are a number of Environments where a simple string encoding of Presentation address is desirable. This specification defines such a representation. ``An Interim Approach to use of Network Addresses'', S.E. Kille, 01/31/1990 <draft-ucl-kille-networkaddresses-00.ps> 2 The OSI Directory specifies an encoding of Presentation Address, which utilizes OSI Network Addresses as defined in the OSI Network Layer Standards. The OSI Directory, and any OSI application utilizing the OSI Directory must be able to deal with these Network Addresses. Currently, most environments cannot cope with them. It is not reasonable or desirable for groups wishing to investigate and use OSI Applications in conjunction with with the OSI Directory to have to wait for the lower layers to sort out. This note is a proposal for mechanisms to utilize Network Addresses. This document specifies an addressing convention to be used in conjunction with other protocols. ``X.500 and Domains'', S.E. Kille, 01/31/1990 <draft-ucl-kille-x500domains-00.ps> This document considers X.500 in relation to Internet/UK Domains. A basic model of X.500 providing a higher level and more descriptive naming structure is proposed, which gives a range of new management and user facilities over and above those currently available. ``An Architecture for Inter-Domain Policy Routing'', Marianne Lepp, Martha Steenstrup, 02/20/1990 <draft-ietf-orwg-architecture-01.ps> We present an architecture for policy routing among administrative domains within the Internet. The objective of inter-domain policy routing is to synthesize and maintain routes between source and destination administrative domains, providing user traffic with the requested service within the constraints stipulated by the administrative domains transited. The architecture is designed to accommodate an Internet with tens of thousands of administrative domains. ``Managing Asynchronously Generated Alerts'', Louis Steinberg, 03/28/1990 <draft-ietf-alertman-asyncalertman-02.txt> This draft defines mechanisms to prevent a remotely managed entity from burdening a manager or network with an unexpected amount of network management information, and to ensure delivery of ``important'' information. The focus is on controlling the flow of asynchronously generated information, and not how the information is generated. Mechanisms for generating and controlling the generation of asynchronous information may involve protocol specific issues. 3 There are two understood mechanisms for transferring network management information from a managed entity to a manager; request-response driven polling, and the unsolicited sending of ``alerts''. Alerts are defined as any management information delivered to a manager that is not the result of a specific query. Advantages and disadvantages exist within each method. This draft discusses these in detail. ``Telnet Encryption Option'', Dave Borman, 04/01/1990 <draft-ietf-telnet-encryption-00.txt> ``Definitions of Managed Objects for the T1 Carrier Interface Type'', C Kolb, Fred Baker, 09/26/1990 <draft-ietf-snmp-t1mib-01.txt> This memo defines an experimental portion of the Management Information Base (MIB) for use with network management protocols in TCP/IP-based internets. In particular, it defines objects for managing T1-carrier objects. ``Telnet Data Compression Option'', Dave Borman, 04/30/1990 <draft-ietf-telnet-compression-00.txt> ``A Proposed Standard for the Transmission of IP Datagrams over FDDI Networks'', Dave Katz, 05/05/1990 <draft-ietf-fddi-ipdatagrams-01.txt> The goal of this specification is to allow compatible and interoperable implementations for transmitting IP datagrams and ARP requests and replies over FDDI networks. ``Working Implementation Agreements On Network Management Functions, Services and Protocols'', Robert Aronoff, 05/24/1990 <draft-nist-nmsig-implagreements-00.txt> This is the Working Document of the Network Management Special Interest Group (NMSIG) of the OSI Implementors Workshop (OIW). The OSI Internet Management (OIM) Working Group agreements on CMIS/CMIP reference this document. ``The Common Management Information Services and Protocols for the Internet (CMOT and CMIP)'', U. Warrier, L. Besaw, B.D. Handspicker L. LaBarre, 05/30/1990 <draft-ietf-oim-cmot-00.txt> 4 This memo is the output of the OSI Internet Management Working Group. As directed by the IAB in RFC 1052, it addresses the need for a long-term network management system based on ISO CMIS/CMIP. This memo contains a set of protocol agreements for implementing a network management system based on these ISO Management standards. Now that CMIS/CMIP has been voted an International Standard (IS), it has become a stable basis for product development. This profile specifies how to apply CMIP to management of both IP-based and OSI-based Internet networks. Network management using ISO CMIP to manage IP-based networks will be refered to as ``CMIP Over TCP/IP'' (CMOT). Network management using ISO CMIP to manage OSI-based networks will be refered to as ``CMIP''. This memo specifies the protocol agreements necessary to implement CMIP and accompanying ISO protocols over OSI, TCP and UDP transport protocols. ``Management Information Base for LAN Manager Alerts'', Jim Greuel, Amatzia BenArtzi, 06/30/1990 <draft-ietf-lanman-alerts-00.txt> This memo is a product of the IETF Lan Manager MIB Working Group. It defines management objects to support the translation of LAN Manager alerts to SNMP traps. It is a companion document to Management Information Base for LAN Manager Management, which defines a base set of management objects for LAN Manager. ``Management Information Base for LAN Manager Management'', Jim Greuel, Amatzia BenArtzi, 06/30/1990 <draft-ietf-lanman-mib-00.txt> This memo provides a Management Information Base (MIB) for management of LAN Manager nodes with TCP/IP-based network management protocols. Together with documents describing the structure of management information (RFC 1155) and the Simple Network Management Protocol (RFC 1157) this document provides a specification for managing LAN Manager nodes in a TCP/IP environment. ``Authentication and Privacy in the SNMP'', James Galvin, Keith McCloghrie, James Davin, 07/05/1990 <draft-ietf-snmpauth-authsnmp-02.txt> The Simple Network Management Protocol (SNMP) specification allows for the authentication of network management operations by a variety of authentication algorithms. This memo specifies alternatives to the trivial authentication algorithm. It also describes an abstract Authentication Service Interface (ASI) by 5 which SNMP-based management applications or agents may--in a convenient and uniform way--benefit from the algorithms described here and a wide range of others. The terms of the ASI are used to describe three distinct algorithms, including one with support for privacy. ``Experimental Definitions of Managed Objects for Administration of SNMPCommunities'', Keith McCloghrie, James Davin, James Galvin, 07/05/1990 <draft-ietf-snmpauth-manageobject-02.txt> This memo defines an experimental portion of the Management Information Base (MIB) for use with network management protocols in TCP/IP-based internets. In particular, it describes a representation of the authentication communities defined in the companion memo: Authentication and Privacy in the SNMP as objects in the Internet Standard MIB. These definitions are consistent with the administrative strategies set forth in the companion memo: Administration of SNMP Communities. ``Administration of SNMP Communities'', James Davin, James Galvin, Keith McCloghrie, 07/05/1990 <draft-ietf-snmpauth-communities-01.txt> Simple Network Management Protocol (SNMP) specification allows for the authentication of management operations by a variety of authentication algorithms. This memo defines two strategies for administering SNMP communities based upon either the SNMP authentication algorithm or the SNMP authentication and privacy algorithm. Insofar as the administration of SNMP communities based upon the trivial authentication algorithm may be realized by straightforward application of familiar network management techniques, administration of such communities is not directly addressed in this memo. ``Gateway Congestion Control Policies'', A.J. Mankin, K.K. Ramakrishnan, 07/06/1990 <draft-ietf-pcc-gwcc-01.txt> The growth of network intensive Internet applications has made gateway congestion control a high priority. The IETF Performance and Congestion Control Working Group surveyed and reviewed gateway congestion control and avoidance approaches in a series of meetings during 1988 and 1989. The purpose of this paper is to present our review of the congestion control approaches, as a way of encouraging new discussion and experimentation. Included in the survey are Source Quench, 6 Random Drop, Congestion Indication (DEC Bit), and Fair Queueing. The task remains for Internet implementors to determine and agree on the most effective mechanisms for controlling gateway congestion. ``OSI NSAP Address Format For Use In The Internet'', R Colella, R Callon, 07/10/1990 <draft-ietf-osinsap-format-00.txt> This document provides alignment with U.S. GOSIP Version 2. GOSIP Version 2 has undergone the required public review and comment period prior to becoming a Federal Information Processing Standard (FIPS). It will be published as a FIPS by the end of Calendar Year 1990. ``Benchmarking Terminology'', Scott Bradner, 07/13/1990 <draft-ietf-bmwg-terms-00.txt> This memo discusses and defines a number of terms that are used in describing performance benchmarking tests and the results of such tests. The terms defined in this memo will be used in additional memos to define specific benchmarking tests and the suggested format to be used in reporting the results of each of the tests. ``Management Services Interface'', Oscar Newkerk, 07/13/1990 <draft-ietf-msi-api-02.txt and .ps> The Management Services API defines Application Programming Interfaces which provide a set of services for the management of the objects in a heterogeneous, multivendor distributed computing environment. The Management Services API is designed to allow for the development of portable management applications. The Management Services API insulate management application developers from the details of the management protocol and from the transport services used to route the management directives to the managed objects. It provides facilities to manage both local and remote objects in a seamless fashion. ``Experimental Definitions of Managed Objects for the Border Gateway Protocol (Version 2)'', Steven Willis, John Burruss, 09/21/1990 <draft-ietf-iwg-bgp-mib-01.txt> 7 This memo defines an experimental portion of the Management Information Base (MIB) for use with network management protocols in TCP/IP-based internets. In particular, it defines objects for managing the Border Gateway Protocol. ``A Proposed Standard for the Transmission of IP Datagrams over SMDS'', Joe Lawrence, Dave Piscitello, 07/18/1990 <draft-ietf-smds-ipdatagrams-00.txt> This memo describes an initial use of IP and ARP in an SMDS environment configured as a logical IP subnet, LIS (described below). The encapsulation method used is described, as well as various service-specific issues. This memo does not preclude subsequent treatment of SMDS in configurations other than LIS; specifically, public or inter-company, inter-enterprise configurations may be treated differently and will be described in future documents. ``INTERNET OSI INTEGRATION, COEXISTENCE AND INTEROPERABILITY ISSUES'', Robert Hagens, Rebecca Nitzan, 07/24/1990 <draft-fopg-ositransition-00.txt> The intent of this document is to provide technical descriptions of the issues involved in the integration of the Open Systems Interconnect (OSI) protocols into the operational networks which interconnect and comprise the ``Internet''. The issues raised and solutions discussed are a result of the Federal Networking Council (FNC) OSI Planning Group (FOPG). The members of the FOPG represent several Federal Government agencies such as the Department of Energy (DOE), the National Science Foundation (NSF) the National Aeronautics and Space Administration (NASA), the National Institute of Standards and Technology (NIST) under the Department of Commerce, as well as University experts. ``The OSPF Specification, Version 2'', John Moy, 07/24/1990 <draft-ietf-ospf-ospf2-00.txt> This document is a specification of the Open Shortest Path First (OSPF) internet routing protocol. OSPF is classified as an Internal Gateway Protocol (IGP). This means that it distributes routing information between routers belonging to a single Autonomous System. The OSPF protocol is based on SPF or link-state technology. This is a departure from the Bellman-Ford base used by traditional internet routing protocols. 8 ``X.25 Call Setup and Charging Determination Protocol (XCDP)'', Carl-H Rokitansky, 07/27/1990 <draft-ietf-pdnrout-x25call-00.txt> Therefore, the X.25 Call Setup and Charging Determination Protocol (XCDP)", described in this document, has been developed, to support global Internet connectivity via the system of X.25 Public Data Networks PDN (even via VAN-gateways preventing local charges), by providing a pseudo-reverse charging option, which is indicated in the Call User Data (CUD) field of the call request. In addition, information about the source and destination address of the Internet datagram to be transmitted, can also be indicated in the user data field of the call request. ``X.121 Address Resolution for IP Datagram Transmission Over X.25 Networks'', Carl-Herbert Rokitansky, 07/27/1990 <draft-ietf-pdn-xarp-01.txt> ``Telnet Authentication Option'', Dave Borman, 08/08/1990 <draft-ietf-telnet-authentication-01.txt> ``Telnet Environment Option'', Dave Borman, 08/08/1990 <draft-ietf-telnet-environment-01.txt> ``Telnet Linemode Option'', Dave Borman, 08/08/1990 <draft-ietf-telnet-linemodeoption-02.txt> Linemode Telnet is a way of doing terminal character processing on the client side of a Telnet connection. While in Linemode with editing enabled for the local side, network traffic is reduced to a couple of packets per command line, rather than a couple of packets per character typed. This is very useful for long delay networks, because the user has local response time while typing the command line, and only incurs the network delays after the command is typed. It is also useful to reduce costs on networks that charge on a per packet basis. ``Privacy Enhancement for Internet Electronic Mail: Part IV -- Certifying Authority and Organizational Notary Services'', Burt Kaliski, 08/14/1990 <draft-rsadsi-kaliski-privacymail-01.txt> This document describes two services that vendors may provide in support of Internet privacy-enhanced mail: certifying authority services on behalf of organizations, and organizational notary services for users. It also specifies 9 the forms for interacting with vendors providing those services. This document is intended as a reference for vendors and for implementors of privacy-enhanced mail software; it is not at the appropriate level for users. The document also lists vendors. ``OSI Internet Management: Management Information Base'', Lee LaBarre, 08/17/1990 <draft-ietf-oim-mib2-02.txt> This draft defines the Management Information Base (MIB) for use with the OSI network management protocol in TCP/IP based internets. It formats the Management Information Base (MIB-II) in OSI templates and adds variables necessary for use with the OSI management protocol. ``Asynchronous Discovery of an Effective Maximum Transmission Unit for IP Datagram Delivery [MTU Discovery]'', James Sawyer, 08/17/1990 <draft-csc-sawyer-mtudisc-00.txt> A case against IP layer fragmentation has been made, and various methods for avoiding it proposed. This memo revisits the effect of fragmentation on network performance, and recounts the present methods of avoidance. A protocol is presented which adapts to the varying circumstances encountered, sending large datagrams whenever possible, and reducing fragmentation when necessary to avoid retransmission problems. A hybrid approach to MTU discovery, it utilizes one new IP header option and four new ICMP messages. It is a simple mechanism that discovers path MTUs without wasting resources and that works well before all hosts and routers are modified. ``Use of OSI IS-IS for Routing in TCP/IP and Dual Environments'', Ross Callon, 08/27/1990 <draft-ietf-isis-spec-01.ps> This Internet Draft specifies an integrated routing protocol, based on the OSI Intra-Domain IS-IS Routing Protocol, which may be used as an interior gateway protocol (IGP) to support TCP/IP as well as OSI. This allows a single routing protocol to be used to support pure IP environments, pure OSI environments and dual environments. This specification was developed by the IS-IS Working Group of the Internet Engineering Task Force. Comments should be sent to isis@merit.edu. ``SNMP Over IPX'', Raymond Wormley, 08/27/1990 <draft-ietf-snmp-snmpoveripx-00.txt> 10 The SNMP protocol has been specified as the official network management protocol of the Internet. Its widespread acceptance and implementation by developers, both inside and outside the Internet community, is fostering synergetic growth to a variety of protocols and platforms. This memo addresses the use of SNMP over Novell's proprietary IPX protocol. Roughly equivalent to UDP in function, IPX provides connectionless, unacknowledged datagram service over a variety of physical media and protocols. ``The Finger User Information Protocol'', David Zimmerman, 09/04/1990 <draft-zimmerman-finger-03.txt> The predecessor to this memo was RFC742, a description of the original Finger protocol. Currently, the development and use of the protocol has deviated from the imprecise RFC742 specifications, and the examples in RFC742 are woefully out of date. ``Internet Stream Protocol'', C Topolcic, 09/04/1990 <draft-ietf-cip-st2-00.txt> This memo defines the Internet Stream Protocol, Version 2 (ST-II), an IP-layer protocol which provides end-to-end guaranteed service across an internet. This specification obsoletes IEN 119 "ST - A Proposed Internet Stream Protocol" written by Jim Forgie in 1979, the previous specification of ST. ST-II represents some relatively minor changes to Version 1 of the protocol and is intended to fill in some of the areas left unaddressed, to make it easier to implement, and to support a wider range of applications. However, ST-II is not compatible with the previous version of ST. ``Towards Concise MIB Definitions'', Marshall Rose, Keith McCloghrie, 09/26/1990 <draft-ietf-snmp-mibdefinitions-01.txt> This memo describes a straight-forward approach toward producing concise, yet descriptive, MIB modules. Use of this approach is in every way fully consistent with the Internet-standard network management framework. ``A Convention for Defining Traps for use with the SNMP'', Marshall Rose, 09/26/1990 <draft-ietf-snmp-traps-01.txt> 11 This memo describes a straight-forward approach toward defining traps used with the SNMP. It is specifically intended for use by the authors of experimental MIBs, and emphasizes a concise descriptive approach. Use of this approach is fully consistent with the Internet-standard network management framework. ``Experimental Definitions of Managed Objects for the Point-to-Point Protocol'', Frank Kastenholz, 09/11/1990 <draft-ietf-ppp-pppmib-01.txt> This memo defines an experimental portion of the Management Information Base (MIB) for use with network management protocols in TCP/IP-based internets. In particular, it describes managed objects used for managing subnetworks using the Point-to-Point Protocol. ``Extensions to the Generic-Interface MIB'', Keith McCloghrie, 09/12/1990 <draft-ietf-snmp-interfacemibext-00.txt> This memo defines an experimental portion of the Management Information Base (MIB) for use with network management protocols in TCP/IP-based internets. In particular, it defines managed object types as experimental extensions to the generic interfaces structure of MIB-II. This memo does not specify a standard for the Internet community. However, after experimentation, if sufficient consensus is reached in the Internet community, then a subsequent revision of this document may be incorporated into the Internet-standard MIB. ``Transmission of IP Datagrams and ARP Packets over ARCNET Networks'', Don Provan, 09/17/1990 <draft-provan-iparcnet-00.txt> This draft document specifies a standard method of encapsulating Internet Protocol (IP) and Address Resolution Protocol (ARP) datagrams using the ARCNET Packet Header Definition Standard. This draft should obsolete RFC-1051. RFC-1051 used a different ARCNET packet header which is incompatible with most modern ARCNET software. ``Requirements for Internet IP Routers'', Philip Almquist, 09/17/1990 <draft-ietf-rreq-iprouters-00.txt> This draft attempts to define and discuss requirements for devices which perform the network layer forwarding function of 12 the Internet protocol suite. The Internet community usually refers to such devices as "routers". This document is intended to provide guidance for vendors, implementors, and purchasers of IP routers. ``IEEE 802.4 Token Bus MIB'', Keith McCloghrie, Richard Fox, 09/26/1990 <draft-ietf-snmp-tokenbusmib-00.txt> This memo defines an experimental portion of the Management Information Base (MIB) for use with network management protocols in TCP/IP-based internets. In particular, it defines managed objects used for managing subnetworks which use the IEEE 802.4 Token Bus technology. ``Definitions of Managed Objects for the Ethernet-like Interface Types'', John Cook, 09/26/1990 <draft-ietf-snmp-ethernetmib-00.txt> This memo defines an experimental portion of the Management Information Base (MIB) for use with network management protocols in TCP/IP-based internets. In particular, it defines objects for managing ethernet-like objects. ``IEEE 802.5 Token Ring MIB'', Keith McCloghrie, Richard Fox, Eric Decker, 09/26/1990 <draft-ietf-snmp-tokenringmib-00.txt> This memo defines an experimental portion of the Management Information Base (MIB) for use with network management protocols in TCP/IP-based internets. In particular, it defines managed objects used for managing subnetworks which use the IEEE 802.5 Token Ring technology. ----------------- On Line IETF Information The Internet Engineering Task Force maintains up-to-date on-line information on all its activities. There is a directory containing Internet-Draft documents and a directory containing IETF working group information. All this information is available for public access at several locations. (See section 3 of this document) The ``IETF'' directory contains a general description of the IETF, summaries of ongoing working group activities and provides information on past and upcoming meetings. The directory generally reflects information contained in the most recent IETF Proceedings and Working Group Reports. The ``Internet-Drafts'' directory has been installed to make available, for review and comment, draft documents that will be submitted ultimately to the IAB and the RFC Editor to be considered for publishing as an RFC. Comments are welcome and should be addressed to the responsible person whose name and email addresses are listed on the first page of the respective draft. 1 The IETF Directory Below is a list of the files available in the IETF directory and a short synopsis of what each file contains. Files prefixed with a 0 contain information about upcoming meetings. Files prefixed with a 1 contain general information about the IETF, the working groups, and the internet-drafts. FILE NAME 0mtg-agenda the current agenda for the upcoming quarterly IETF plenary, which contains what Working Groups will be meeting and at what times, and the technical presentations and network status reports to be given. 0mtg-logistics the announcement for the upcoming quarterly IETF plenary, which contains specific information on the date/location of the meeting, hotel/airline arrangements, meeting site accommodations and travel directions. 0mtg-rsvp a standardized RSVP form to be used to notify the support staff of your plans to attend the upcoming IETF meeting. 0mtg-schedule current and future meeting dates and sites for IETF plenaries. 1id-abstracts the internet drafts current on-line in the internet-drafts directory. 1id-guidelines instructions for authors of internet drafts. 1ietf-overview a short description of the IETF, the IESG and how to participate. 1wg-summary a listing of all current Working Groups, the working group chairmen and their email addresses, working group mailing list addresses, and, where applicable, documentation produced. This file also contains the standard acronym for the working groups by which the IETF and Internet-Drafts directories are keyed. Finally, Working Groups have individual files dedicated to their particular activities which contain their respective Charters and Meeting Reports. Each Working Group file is named in this fashion: <standard wg abbreviation>-charter.txt <standard wg abbreviation>-minutes-date.txt 2 The ``dir'' or ``ls'' command will permit you to review what Working Group files are available and the specific naming scheme to use for a successful anonymous ftp action. The Internet-Drafts Directory The Internet-Drafts directory contains the current working documents of the IETF. These documents are indexed in the file 1id-abstracts.txt in the Internet-Drafts directory. The documents are named according to the following conventions. If the document was generated in an IETF working group, the filename is: draft-ietf-<std wg abrev>-<docname>-<rev>.txt , or .ps where <std wg abrev> is the working group acronym, <docname> is a very short name, and <rev> is the revision number. If the document was submitted for comment by a non-ietf group or author, the filename is: draft-<org>-<author>-<docname>-<rev>.txt, or .ps where <org> is the organization sponsoring the work and <author> is the author's name. For more information on writing and installing an Internet-Draft, see the file 1id-guidelines, ``Guidelines to Authors of Internet-Drafts''. 3 Directory Locations The directories are maintained primarily at the NSFnet Service Center (NNSC). There are several ``shadow'' machines which contain the IETF and INTERNET-DRAFTS directories. These machines may be more convenient that nnsc.nsf.nsf. To access these directories, use FTP. After establishing a connection, Login with username ANONYMOUS and password GUEST. When logged in, change to the directory of your choice with the following commands: cd internet-drafts cd ietf Individual files can then be retrieved using the GET command: get <remote filename> <local filename> e.g., get 00README readme.my.copy NSF Network Service Center Address: nnsc.nsf.net The Defense Data Network NIC Address: nic.ddn.mil Internet-drafts are also available by mail server from this machine. For more information mail a request: To: service@nic.ddn.mil Subject: Help NIC staff are happy to assist users with any problems that they may encounter in the process of obtaining files by FTP or ``SERVICE''. For assistance, phone the NIC hotline at 1-800-235-3155 between 6 am and 5 pm Pacific time. Pacific Rim Address: munnari.oz.au The Internet-drafts on this machine are stored in Unix compressed form (.Z). Europe Address: nic.nordu.net (192.36.148.17) 4 13
- Index of available documents mdavies