INTERNET-DRAFT R. Plzakdraft-ietf-uswg-fyi4-00.txtdraft-ietf-uswg-fyi4-01.txt SAICA.A.T. Wells UWisc-Mad E. Krol Univ ILNovember 1998May 1999 FYI on Questions and Answers Answers to Commonlyasked NewAskedNew Internet User Questions Status of this Memo This document is anInternet-Draft.Internet-Draft and is in full conformance with all provisions of Section 10 of RFC2026. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents asInternet-Drafts.Internet- Drafts. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet- Drafts as reference material or to cite them other than as "work in progress."To view the entireThe list of currentInternet-Drafts, please check the "1id-abstracts.txt" listing contained in theInternet-Drafts can be accessed at http://www.ietf.org/ietf/1id-abstracts.txt The list of Internet-Draft Shadow Directorieson ftp.is.co.za (Africa), ftp.nordu.net (Northern Europe), ftp.nis.garr.it (Southern Europe), munnari.oz.au (Pacific Rim), ftp.ietf.org (US East Coast), or ftp.isi.edu (US West Coast). "Copyright(C) The Internet Society (1998). All Rights Reserved."can be accessed at http://www.ietf.org/shadow.html. Abstract This memo provides an overview to the new Internet User. The intended audience is the common Internet user of today, thus it attempts to provide a more consumer oriented approach to the Internet rather than going into any depth about a topic. Unlike its predecessors, this edition seeks to answer the general questions that an unsophisticated consumer would ask as opposed to the more pointed questions ofthe morea more technically sophisticated Internet user.UsersThose desiring a more in-depth discussion are directed to FYI 7 that deals with intermediate and advanced Q/A topics. A conscious effort has been made to keep this memo brief but at the same time provide the new user with enough information to generally understand the Internet. 1. Acknowledgements The following people deserve thanks for their help and contributions totheithis FYI Q/A: Chris Burke (Motorola), John Curran (BBN Planet), Albert Lunde(NWU).(NWU), and April Marine (Internet Engines, Inc.). 2. Questions About the Internet 2.1. What is the Internet?The Internet is the worldwide groupPeople use computers to perform a wide assortment ofnetworks that aretasks. A connectedtogether. It consistsgroup ofthecomputersused by users thatis known as a network. Because people are connected via this network, they can use their computers tothese networks, the specializedexchange ideas and information. Some computers(routers) thatarethe interconnection points between these networks, and the communications lines. Most home users connectconnected directly toathe network while others (primarily those in homes) are connected via a telephone line and a communication device(modem). A companyknown asan Internet Service Provider (ISP) connects this network to the Internet. The Internet was put together from normal telephone communication products which are offered by telephone companies, but they are used in a different way which allows everyone to share them which makes the whole thing cheaper. The Internet is structured much like any other business. You buy your service from a retail ISP. Your ISP takes its profit and buys bulk services fromabigger provider who does the same thing. This may happen a couple of times until there gets a point where there are places where the big providers all connectmodem. By connecting networks togetherand communicatewitheach other. There are only a few of these in each area of the world and they pay a fee to connect at these points. The connection points are connected together by international providers, so that if you connect to the Internet atspecialized computers known as routers, people on onepoint, younetwork canget anywhereengage inthe world. 2.2. Who Runs the Internet? The Internet is operated as a cooperative effort among the ISPs, software companies, volunteer organizations, and a few facilities that tie the whole thing together. The ISPs and software companies are completely independent and most of them competeactivities witheach other. The ISPs agree to connect to eachpeople on otherand transmit information following an established set of rules (protocols). The software companies agree to manufacture programs (such as email or web browsers) that also follow protocols. These protocols are developed by anetworks. This INTER-connected group ofvolunteers (Internet Engineering Task Force IETF) that come together regularly and discuss how the InternetNETworks isrunning and how to standardize new services. But, there are things that must be unique in the Internet, just like your phone number must be unique in the world. To keep these things straight there are groups identified in the community which allocate addresses (IP Registries ARIN, RIPE, APNIC), allocate names (domain registries), and generally keep track of things (ICANN). This is keepsknown as theInternet working well, adding new services, and running on a wide variety of computers. 2.3.INTERNET. 2.2. What Can I do on the Internet? Thereareis a large variety ofapplications andactivities that users can do on the Internet. These activities includethe ability to surf, use search tools, sendsurfing, searching, sending mail,transfertransfering programs and documents, chatting, andchat.playing games. SURFING Surfing is one of thetwomost popular Internet activities. To surf, a userusesneeds a program known as a web browser. The web browser enables the user to connect to a location that contains information.From one location a user can follow variousMany locations contain links to other sites that contain related information. These links are usually identified by underlined text that is of a different color from the rest of the text in an article. By clicking onthemone of these links the user is then connected toexplorethat information. This information may be at theInternet. Like followingsame location or may be at a different location. This new information may, in turn, have links to other information. So just like a footnote or reference in a print publication, links can be used to find related or non-related information.Typically surfing begins by connectingSEARCHING Searching involves using a special program known as a seach engine. There are several of these engines that are located at various search sites. The popular web browsers have location information about these search sites. Searching is similar to using asitecard catalog in a library. Just as a person would look up a topic in a card catalog and find one or more references to thatcontainstopic with library location information, a searchengine. Sinceengine provides theInternet contains many, many different kinds of material onuser with awide varietylist oftopics, finding exactly what you are looking for can be challenging.sites that may contain relevant information. This list iswhere search engines come in since they can help you locate specific information. But, remember just as usingactually adictionary versusset of links to these sites so that all theyellow pagesuser has tolocate informationdo is click onautomobiles will yield verythe link to go to the location. Just as differentresults, so toolibrary card catalogs will contain different reference cards, different searchengines.engines will provide different reference lists. E-MAIL E-mail isthe second mostanother very popularactivity andactivity. It is very similar to sending letters through the post office or notes and memos around the office. It isboth an application and an activity which allows for theused to exchangeofmessages between two or more people.Additionally, manyBecause email can be misunderstood or abused, users should be familiar with email netiquette. For more information see Netiquette Guidlines [FYI 28, RFC 1855]. Many peopleuse e-mail to join andalso participate inwhat are known as listserv discussions or mailmailing lists.A listserv is simply a forum wherein people exchange e-mail and is typically onUsually mailing lists are dedicated to adefinedparticular topici.e. home buying, politics,oreven runninginterest. Some mailing lists are used to provide information to subscribers, such as product update information for something an individual may have purchased while others are used for discussion. In theInternet.latter instance people participate in the discussion by sending email to a "list" address which in turn distributes it to all members of a list. Abuse of mail lists is probably the biggest source of junk email (also known as "spam"). Everyone should take care that they aren't the source of junk mail. FILE TRANSFER Programs and documents are transferred in several ways. The most common way this is done between individual users is to attach the program or document to an e-mail message. Programs and documents are usually transferred from sites to users using the save feature of a web browser or the file transfer protocol (FTP).This enablesSuch transfers enable users to obtain a variety of programs, documents, audio files, and video files.Another application and activity known as chatCHAT Chat takes placewith another personbetween one or more persons who arealsoon the Internet. Chatting is very similar to going to a party. Just as people congregate in small groups and discuss things, chatters meet in chat rooms to discuss a topic. Chat rooms are generally sponsored or operated by an organization that has an interest in the topic area. For example, an online news organization would have a chat room for chatters to discuss current events. To chat one person writes a message which can be read, as it is being written, by the others who can respond to it in turn.Persons who enterFirst time chatters should be aware that just as at achat room but dont enterparty where some people never say anything, so there may be people in thediscussionroom who aresaidjust listening. Also, just like at a party, some people may portray themselves to belurking. Chatterssomeone different than who they really are. Lastly, remember that chatters come and go to chat rooms the same way people move about groups at a party. GAMES Some people use the Internet to play games. These games can be role playing games, action/adventure games, or online versions of old standbys like chess. Some games require the user to purchase a copy of the game and install it on their computer, while others are played by going to a game site. Just like other forms of game playing, Internet game playing can be challenging, entertaining, and an enjoyable social experience. Don't be afraid to have fun. OTHER ACTIVITIES Other popular activitiesthat have recently sprung upinclude electronic shopping, banking, and investing.Major and specialty retail stores around the nation and many around the worldMany retailers describe and display pictures of their products on the Internetforenabling people to buydirectly or indirectly.on line. Shoppingcanalsoincludeincludes purchasing services such as an airline ticket or ordering groceries.Additionally, manyMany banks allow people to transfer funds, check available funds, pay bills and other such activities while on the Internet with an account number and ID. Lastly, many people invest while on the Internet in everything from stocks and bonds to real estate.2.4. How Does the Internet Work? The Internet allows people to conduct activities, whether it is web browsing, e-mail, a file transfer, orOne word of caution, if you are using achat session between two computers (source and destination) that cancredit card, check to see if there are security features in place to protect your credit card information. Reputable sites should tell you how they are protecting your information. If you are in doubt about how your information will belocated anywhere. To make this happen several things occur. An activityprotected, don't use your credit card at that site. 2.3. What isstarted,an Address? Two commonly asked questions these days are "What's your e-mail address?" and "What's theaddress ofURL?" Generally, thedestinationfirst question isidentified, a pathasking where to send information, while thedestinationsecond iscreated, an activity sessionasking where to get information. The answer to the first question isstarted, and thenusually something like myname@company.com. The answer to theactivity takes place. Thissecond question isdone by a varietyusually something like "http://www.newspaper.com". What do these answers mean? E-MAIL ADDRESS As stated previously an e-mail address is something like "myname@company.com", pronounced "MYNAME at COMPANY dot COM". An email address consists ofprogramstwo parts thatfollow standards (protocols) of Internet activity. Lets look at how this would happen forare divided by ane-mail session."@" sign. Theuser createsportion to the left is like the name line on amessage using an e-mail program. The userletter, it identifies a particular person and usually is composed of thedestinationperson's name. Typical names look like this: john_doe john.doe jdoe doej The name is assigned byspecifying anthe system or network adminstrator who is managing the email system and follows rules that have been established by the company providing the e-mailaddress. Since humans are more comfortable with namesservice. Sometimes the name portion of the e-mailprotocol specifies that thisaddress is referred to as a mailbox. The portion to the right of the "@" sign is the name of theuser atcomputer system that is providing thedestination. It looks like jones@ietf.org. However,e-mail service. This name is usually thecomputersname of the company thatmove information aboutowns theInternet use numeric addresses called Internet Protocol (IP) addresses. IP addressescomputer system followed by a "dot" and an abbreviation that represents the "domain" or group of names which the organization falls under. Examples of these "top level" domains areused to move (route)"edu", "com", and country codes such as "fr" for France and "jp" for Japan. When an e-mail is sent themessage alongportion of thebest pathaddress to thedestination. Thusright of thename has"@" sign is used tobe translated into an IP address. The name-to-address mapping system calledfind theDomain Name System (DNS) does this. Oncedestination computer of theaddress has been determined,email. URL A Uniform Resource Locator (URL) is commonly used to identify asetcomputer that provides world wide web service. It usually looks something like "http://www.newspaper.com". This address also consists ofprotocols called routing protocols findtwo parts. In this case the two parts are separated by thebest path"//". The portion to thedestination. Then an activity sessionleft means find the world wide web service that iscreated betweenlocated at thesource andcomputer identified to thedestination computer. The e-mail protocol checksright of thedestination"//". The portion tomake sure that it will acceptthemessage. Finallyright is themessagename of the computer that istransmitted. As it moves fromproviding thesourceworld wide web service. Its name is composed of parts that are similar to those described for thedestination it may cross several networksname of an email computer. Sometines the portion of the right contains additional information thatbelong to several ISPs. Allidentifies a particular document at the web site. For example, http://www.newspaper.com/sports/article1.html would identify a specific article in the sports section ofthis activity takes place withinthetime it takes to read this paragraph! 2.5.newspaper. 2.4. Are There Any Rules ofBehavior?Behavior on the Internet? Ingeneralgeneral, common sense, courtesy, and decency govern good Internet behavior. There is no single formal rulebook that governs behavior on the Internet.However manyFYI 28 that was mentioned previously is a good guide. Many activities such as game sites, chat rooms, or e-maildiscussionlistsand chat roomsmay havean Acceptable Use Policy (AUP). Before you joinrules of their own. What may be acceptable behavior in one chat room may be totally out ofthese activitiesbounds in another. It never hurts to checkand see if there is an AUP, make sure you understand it, and then follow it. The IETFthe water temperature before jumping in the pool. Users should use the same precautions before joining in any online activity. E-mail in particular can lead to misunderstandings between people. Users should remember that the reader only haspublished RFC 1855 (Netiquette Guidelines) andthe text to determine what ispublishing other RFCs that deal with subjectsbeing said. Other conversation cues such asadvertising"tone of voice" and body signals like winking are not present in the text. Because of this, users of the Internetjunk mail (spam).have developed cues to put in the text. Text techniques such as capitalization and symbols known as emoticons (also called "smilies") are used. A typical smiley looks like this :-) Additionally, acronyms have evolved over time (for example IMHO - In My Humble Opinion). More information about this can be found by searching. Use keywords like "netiquette" and "emoticon" with your search engine to find more information. Users should also be aware that their particular programs such as word processors or e-mail might produce documents and messages that are not readable by everyone.You shouldVery often, a reader must have the same program in which a document was written in order to read it. So, before sending an attached document, it is a good idea to make sure that the intendedrecipient canreceiver of your document has the capability to read it. If in doubt, send a text (ascii) version of the document. 2.5. How Does the Internet Work? Each of the activities mentioned in the section describing whatyou areone can do on the Internet requires that computers exchange information. Computers take turns sendingthem. As in any group,and receiving information. When a computer is sending information, it is known as theusers"source"; when it is receiving information, it is known as the "destination." (The same computer can be both a source and destination at different times. This is especially clear when one thinks of sending and receiving e-mail.) Every computer on the Internethave, over time, developed language short cuts.has a unique Internet "address" that identifies it from among the millions of computers. The Internet has specialized computers between the source and destination located at network inter-connection points. Theseprimarily takecomputers are known as "routers." The routers understand how to use a computer's address to appropriately point information from one computer to another over theformInternet. In an exchange ofacronymsinformation the following occurs: * The source finds the address of the destination. * The source contacts the destination andemoticons (smilies). Listssays "hello". * The destination responds back with a "hello" of its own. * The source tells the destination that it has information to send. * The destination tells the source that it is ready to receive the information. * The source breaks the information into small pieces called packets and sends each packet on its way to the destination. * The routers guide each packet to the destination. * The destination takes the packets and puts them back together to form the information. * The destination tells the source that it has received the information and asks the source if it has anything more to send. * If the source says no, the destination will say "good bye" unless it has something to send back. If it does, it will break the information into packets and send them. * Once both end users are done "talking" they say both say "good bye". Clearly our simplified introduction to this section did not explain many steps in this process, such as how a computer discovers the address of another computer or how packets are divided and reassembled. Fortunately, theseacronymsare specifics that people using the Internet never really need to deal with! 2.6 Who Runs the Internet? No one. The Internet is a cooperative effort among Internet Service Providers (ISPs), software companines, volunteer organizations, andemoticons can be founda few facilities that tie the whole thing together. The ISPs and software companies are completely independent and most of them compete with each other. The ISPs provide internet service to people much the same way that they obtain telephone service from a telephone company. ISPs agree to connect their networks to each other and transmit information following an established set of rules (protocols). The software companies agree to manufacture programs (such as email or web browsers) that also follow protocols. There are other organizations that keep things straight. Some assign Internet addresses in much the same manner as telephone numbers are assigned, others keep track of names used bysurfing.Internet users and groups, and a large volunteer organization called the Internet Engineering Task Force (IETF) develops the protocols computers follow to make network communications succeed. 3. Security ConsiderationsItThe question "is the Internet secure?" can be a confusing one for people, who will hear many assurances that it is secure and many scary stories saying it isimportantnot secure. There are a few basic rules of thumb torealizeremember thatnot Internet user iswill address most concerns. First, make it agood netizen. Therefore, users should learnrule never toprotect themselves. The IETF has published several RFCsshare account passwords with anyone. Learning a password is the easiest way for someone to break into a system. Most people feel thatprovidetheir files are not that interesting to anyone, but someone may be able to get a foothold from one innocuous account to other places in the same computer system. Many good security practices can be found in the Users Security Handbook [FYI 34, RFC 2504]. Second, understand that there are means for people to track the information a user sends via email, the files one downloads, andguidance. Additionally, users can protect themselves fromthe sites visited on the web. The system administrators anddocumentsnetwork engineers who oversee a sites' computers require access to information that an individual may think is secret. In practice, no responsible system administrator or network engineer will violate a person's privacy out of personal curiousity. However, if someone less legitimate attains illegal access to a system, they also will haveunwanted content by using baby sitting software. 4. References Referencesaccess to this information. This situation is not a problem for most people, but it should beinserted here.understood that things like email sent a year ago or a log of users web pages browsed may still exist in some system's backup archive tape and can be easily resurrected and published widely. Third, before giving personal information over the Internet, such as filling in a form on a Web page, users should realize that there is no assurance of confidentiality or privacy. It could be compared to faxing such information to a party that you've never dealt with before. While many organizations on the Internet are responsible with information received via the web and email, this cannot always be determined in advance. 4. References [1] Guttman, E., Leong, G., and Malkin, G., "Users' Security Handbook", RFC 2504, FYI 34, Sun Microsystems, COLT, Bay Networks, February 1999. [2] Hambridge, S., "Netiquette Guidelines", RFC 1855, FYI 28, Intel Corporation, October 1995. 5. Authors' Address Raymond Plzak SAIC 1710 Goodridge Drive McLean, Virginia 22102 Phone: (703) 821-6535 EMail: plzakr@saic.com Amy Tracy Wells Internet Scout Project University of Wisconsin-Madison Computer Sciences Department 1210 W. Dayton St. Madison, WI 53706 Phone: (608)263-2611 Email: awel@cs.wisc.edu Ed Krol University of Illinois 1120 DCL 1304 Springfield Urbana IL 61801 Phone (217)333-7886 Email: krol@uiuc.edu 6. "Full Copyright Statement". "Copyright (C) The Internet Society (date). All Rights Reserved. This document and translations of it may be copied and furnished to others, and derivative works that comment on or otherwise explain it or assist in its implmentation may be prepared, copied, published and distributed, in whole or in part, without restriction of any kind, provided that the above copyright notice and this paragraph are included on all such copies and derivative works. However, this document itself may not be modified in any way, such as by removing the copyright notice or references to the Internet Society or other Internet organizations, except as needed for the purpose of developing Internet standards in which case the procedures for copyrights defined in the Internet Standards process must be followed, or as required to translate it into languages other than English. The limited permissions granted above are perpetual and will not be revoked by the Internet Society or its successors or assigns. This document and the information contained herein is provided on an "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Appendix A Glossary of Terms Emoticon Combination of punctuation marks used to provide sense of the senders tone of voice in an e-mail message IETF Internet Engineering Task Force [see text for a description] Internet An interconnected group of networks ISP Internet Service Provider [see text for a description] Network A connected group of computers Router A specialized computer that connects networks together and guides information packets to their destination Spam A slang term for junk e-mail URL Uniform Resource Locator [see text for a description] Web Browser A program that provides the capablility to read information that is located at a world wide web site