< draft-ietf-uswg-fyi4-00.txt   draft-ietf-uswg-fyi4-01.txt >
INTERNET-DRAFT R. Plzak INTERNET-DRAFT R. Plzak
draft-ietf-uswg-fyi4-00.txt SAIC draft-ietf-uswg-fyi4-01.txt SAIC
A. Wells A.T. Wells
UWisc-Mad UWisc-Mad
E. Krol E. Krol
Univ IL Univ IL
November 1998 May 1999
FYI on Questions and Answers FYI on Questions and Answers
Answers to Commonly asked New Internet User Questions Answers to Commonly AskedNew Internet User Questions
Status of this Memo Status of this Memo
This document is an Internet-Draft. Internet-Drafts are working This document is an Internet-Draft and is in full conformance with
documents of the Internet Engineering Task Force (IETF), its areas, all provisions of Section 10 of RFC2026.
and its working groups. Note that other groups may also distribute
working documents as Internet-Drafts. Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet-
Drafts.
Internet-Drafts are draft documents valid for a maximum of six months Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet- Drafts as reference time. It is inappropriate to use Internet- Drafts as reference
material or to cite them other than as "work in progress." material or to cite them other than as "work in progress."
To view the entire list of current Internet-Drafts, please check the The list of current Internet-Drafts can be accessed at
"1id-abstracts.txt" listing contained in the Internet-Drafts Shadow http://www.ietf.org/ietf/1id-abstracts.txt
Directories on ftp.is.co.za (Africa), ftp.nordu.net (Northern
Europe), ftp.nis.garr.it (Southern Europe), munnari.oz.au (Pacific
Rim), ftp.ietf.org (US East Coast), or ftp.isi.edu (US West Coast).
"Copyright(C) The Internet Society (1998). All Rights Reserved." The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
Abstract Abstract
This memo provides an overview to the new Internet User. The This memo provides an overview to the new Internet User. The
intended audience is the common Internet user of today, thus it intended audience is the common Internet user of today, thus it
attempts to provide a more consumer oriented approach to the Internet attempts to provide a more consumer oriented approach to the Internet
rather than going into any depth about a topic. Unlike its rather than going into any depth about a topic. Unlike its
predecessors, this edition seeks to answer the general questions that predecessors, this edition seeks to answer the general questions that
an unsophisticated consumer would ask as opposed to the more pointed an unsophisticated consumer would ask as opposed to the more pointed
questions of the more a technically sophisticated Internet user. questions of a more technically sophisticated Internet user. Those
Users desiring a more in-depth discussion are directed to FYI 7 that desiring a more in-depth discussion are directed to FYI 7 that deals
deals with intermediate and advanced Q/A topics. A conscious effort with intermediate and advanced Q/A topics. A conscious effort has
has been made to keep this memo brief but at the same time provide been made to keep this memo brief but at the same time provide the
the new user with enough information to generally understand the new user with enough information to generally understand the
Internet. Internet.
1. Acknowledgements 1. Acknowledgements
The following people deserve thanks for their help and contributions The following people deserve thanks for their help and contributions
to thei FYI Q/A: Albert Lunde (NWU). to this FYI Q/A: Chris Burke (Motorola), John Curran (BBN Planet),
Albert Lunde (NWU), and April Marine (Internet Engines, Inc.).
2. Questions About the Internet 2. Questions About the Internet
2.1. What is the Internet? 2.1. What is the Internet?
The Internet is the worldwide group of networks that are connected People use computers to perform a wide assortment of tasks. A
together. It consists of the computers used by users that are connected group of computers is known as a network. Because people
connected to these networks, the specialized computers (routers) that are connected via this network, they can use their computers to
are the interconnection points between these networks, and the exchange ideas and information. Some computers are connected
communications lines. Most home users connect to a network via a directly to the network while others (primarily those in homes) are
telephone line and a communication device (modem). A company known as connected via a telephone line and a communication device known as a
an Internet Service Provider (ISP) connects this network to the modem. By connecting networks together with specialized computers
Internet. The Internet was put together from normal telephone known as routers, people on one network can engage in activities with
communication products which are offered by telephone companies, but people on other networks. This INTER-connected group of NETworks is
they are used in a different way which allows everyone to share them known as the INTERNET.
which makes the whole thing cheaper.
The Internet is structured much like any other business. You buy 2.2. What Can I do on the Internet?
your service from a retail ISP. Your ISP takes its profit and buys
bulk services from a bigger provider who does the same thing. This
may happen a couple of times until there gets a point where there are
places where the big providers all connect together and communicate
with each other. There are only a few of these in each area of the
world and they pay a fee to connect at these points. The connection
points are connected together by international providers, so that if
you connect to the Internet at one point, you can get anywhere in the
world.
2.2. Who Runs the Internet? There is a large variety of activities that users can do on the
Internet. These activities include surfing, searching, sending mail,
transfering programs and documents, chatting, and playing games.
The Internet is operated as a cooperative effort among the ISPs, SURFING
software companies, volunteer organizations, and a few facilities
that tie the whole thing together. The ISPs and software companies
are completely independent and most of them compete with each other.
The ISPs agree to connect to each other and transmit information
following an established set of rules (protocols). The software
companies agree to manufacture programs (such as email or web
browsers) that also follow protocols. These protocols are developed
by a group of volunteers (Internet Engineering Task Force IETF) that
come together regularly and discuss how the Internet is running and
how to standardize new services.
But, there are things that must be unique in the Internet, just like Surfing is one of the most popular Internet activities. To surf, a
your phone number must be unique in the world. To keep these things user needs a program known as a web browser. The web browser enables
straight there are groups identified in the community which allocate the user to connect to a location that contains information. Many
addresses (IP Registries ARIN, RIPE, APNIC), allocate names (domain locations contain links to other sites that contain related
registries), and generally keep track of things (ICANN). This is information. These links are usually identified by underlined text
keeps the Internet working well, adding new services, and running on that is of a different color from the rest of the text in an article.
a wide variety of computers. By clicking on one of these links the user is then connected to that
information. This information may be at the same location or may be
at a different location. This new information may, in turn, have
links to other information. So just like a footnote or reference in
a print publication, links can be used to find related or non-related
information.
2.3. What Can I do on the Internet? SEARCHING
There are a variety of applications and activities on the Internet. Searching involves using a special program known as a seach engine.
These include the ability to surf, use search tools, send mail, There are several of these engines that are located at various search
transfer programs and documents, and chat. sites. The popular web browsers have location information about
these search sites. Searching is similar to using a card catalog in
a library. Just as a person would look up a topic in a card catalog
and find one or more references to that topic with library location
information, a search engine provides the user with a list of sites
that may contain relevant information. This list is actually a set
of links to these sites so that all the user has to do is click on
the link to go to the location. Just as different library card
catalogs will contain different reference cards, different search
engines will provide different reference lists.
Surfing is one of the two most popular activities. To surf, a user E-MAIL
uses a program known as a web browser. The web browser enables the
user to connect to a location that contains information. From one
location a user can follow various links by clicking on them to
explore the Internet. Like following a footnote or reference in a
print publication, links can be used to find related or non-related
information.
Typically surfing begins by connecting to a site that contains a E-mail is another very popular activity. It is very similar to
search engine. Since the Internet contains many, many different kinds sending letters through the post office or notes and memos around the
of material on a wide variety of topics, finding exactly what you are office. It is used to exchange messages between two or more people.
looking for can be challenging. This is where search engines come in Because email can be misunderstood or abused, users should be
since they can help you locate specific information. But, remember familiar with email netiquette. For more information see Netiquette
just as using a dictionary versus the yellow pages to locate Guidlines [FYI 28, RFC 1855].
information on automobiles will yield very different results, so too
will different search engines.
E-mail is the second most popular activity and is very similar to Many people also participate in mailing lists. Usually mailing lists
sending letters through the post office. It is both an application are dedicated to a particular topic or interest. Some mailing lists
and an activity which allows for the exchange of messages between two are used to provide information to subscribers, such as product
or more people. Additionally, many people use e-mail to join and update information for something an individual may have purchased
participate in what are known as listserv discussions or mail lists. while others are used for discussion. In the latter instance people
A listserv is simply a forum wherein people exchange e-mail and is participate in the discussion by sending email to a "list" address
typically on a defined topic i.e. home buying, politics, or even which in turn distributes it to all members of a list. Abuse of mail
running the Internet. lists is probably the biggest source of junk email (also known as
"spam"). Everyone should take care that they aren't the source of
junk mail.
FILE TRANSFER
Programs and documents are transferred in several ways. The most Programs and documents are transferred in several ways. The most
common way this is done between individual users is to attach the common way this is done between individual users is to attach the
program or document to an e-mail message. Programs and documents are program or document to an e-mail message. Programs and documents are
usually transferred from sites to users using the save feature of a usually transferred from sites to users using the save feature of a
web browser or the file transfer protocol (FTP). This enables users web browser or the file transfer protocol (FTP). Such transfers
to obtain a variety of programs, documents, audio files, and video enable users to obtain a variety of programs, documents, audio files,
files. and video files.
Another application and activity known as chat takes place with CHAT
another person or persons who are also on the Internet. Chatting is
very similar to going to a party. Just as people congregate in small
groups and discuss things, chatters meet in chat rooms to discuss a
topic. Chat rooms are generally sponsored or operated by an
organization that has an interest in the topic area. For example, an
online news organization would have a chat room for chatters to
discuss current events. To chat one person writes a message which
can be read, as it is being written, by the others who can respond to
it in turn. Persons who enter a chat room but dont enter the
discussion are said to be lurking. Chatters come and go to chat
rooms the same way people move about groups at a party.
Some popular activities that have recently sprung up include Chat takes place between one or more persons who are on the Internet.
electronic shopping, banking, and investing. Major and specialty Chatting is very similar to going to a party. Just as people
retail stores around the nation and many around the world describe congregate in small groups and discuss things, chatters meet in chat
and display pictures of their products on the Internet for people to rooms to discuss a topic. Chat rooms are generally sponsored or
buy directly or indirectly. Shopping can also include purchasing operated by an organization that has an interest in the topic area.
services such as an airline ticket or ordering groceries. For example, an online news organization would have a chat room for
Additionally, many banks allow people to transfer funds, check chatters to discuss current events. To chat one person writes a
message which can be read, as it is being written, by the others who
can respond to it in turn. First time chatters should be aware that
just as at a party where some people never say anything, so there may
be people in the room who are just listening. Also, just like at a
party, some people may portray themselves to be someone different
than who they really are. Lastly, remember that chatters come and go
to chat rooms the same way people move about groups at a party.
GAMES
Some people use the Internet to play games. These games can be role
playing games, action/adventure games, or online versions of old
standbys like chess. Some games require the user to purchase a copy
of the game and install it on their computer, while others are played
by going to a game site. Just like other forms of game playing,
Internet game playing can be challenging, entertaining, and an
enjoyable social experience. Don't be afraid to have fun.
OTHER ACTIVITIES
Other popular activities include electronic shopping, banking, and
investing. Many retailers describe and display pictures of their
products on the Internet enabling people to buy on line. Shopping
also includes purchasing services such as an airline ticket or
ordering groceries. Many banks allow people to transfer funds, check
available funds, pay bills and other such activities while on the available funds, pay bills and other such activities while on the
Internet with an account number and ID. Lastly, many people invest Internet with an account number and ID. Lastly, many people invest
while on the Internet in everything from stocks and bonds to real while on the Internet in everything from stocks and bonds to real
estate. estate. One word of caution, if you are using a credit card, check
to see if there are security features in place to protect your credit
card information. Reputable sites should tell you how they are
protecting your information. If you are in doubt about how your
information will be protected, don't use your credit card at that
site.
2.4. How Does the Internet Work? 2.3. What is an Address?
The Internet allows people to conduct activities, whether it is web Two commonly asked questions these days are "What's your e-mail
browsing, e-mail, a file transfer, or a chat session between two address?" and "What's the URL?" Generally, the first question is
computers (source and destination) that can be located anywhere. To asking where to send information, while the second is asking where to
make this happen several things occur. An activity is started, the get information. The answer to the first question is usually
address of the destination is identified, a path to the destination something like myname@company.com. The answer to the second question
is created, an activity session is started, and then the activity is usually something like "http://www.newspaper.com". What do these
takes place. This is done by a variety of programs that follow answers mean?
standards (protocols) of Internet activity. E-MAIL ADDRESS
Lets look at how this would happen for an e-mail session. The user As stated previously an e-mail address is something like
creates a message using an e-mail program. The user identifies the "myname@company.com", pronounced "MYNAME at COMPANY dot COM". An
destination by specifying an e-mail address. Since humans are more email address consists of two parts that are divided by an "@" sign.
comfortable with names the e-mail protocol specifies that this The portion to the left is like the name line on a letter, it
address is the name of the user at the destination. It looks like identifies a particular person and usually is composed of the
jones@ietf.org. However, the computers that move information about person's name. Typical names look like this:
the Internet use numeric addresses called Internet Protocol (IP)
addresses. IP addresses are used to move (route) the message along
the best path to the destination. Thus the name has to be translated
into an IP address. The name-to-address mapping system called the
Domain Name System (DNS) does this. Once the address has been
determined, a set of protocols called routing protocols find the best
path to the destination. Then an activity session is created between
the source and the destination computer. The e-mail protocol checks
the destination to make sure that it will accept the message.
Finally the message is transmitted. As it moves from the source to
the destination it may cross several networks that belong to several
ISPs. All of this activity takes place within the time it takes to
read this paragraph!
2.5. Are There Any Rules of Behavior? john_doe
john.doe
jdoe
doej
In general common sense, courtesy, and decency govern good Internet The name is assigned by the system or network adminstrator who is
managing the email system and follows rules that have been
established by the company providing the e-mail service. Sometimes
the name portion of the e-mail address is referred to as a mailbox.
The portion to the right of the "@" sign is the name of the computer
system that is providing the e-mail service. This name is usually
the name of the company that owns the computer system followed by a
"dot" and an abbreviation that represents the "domain" or group of
names which the organization falls under. Examples of these "top
level" domains are "edu", "com", and country codes such as "fr" for
France and "jp" for Japan. When an e-mail is sent the portion of the
address to the right of the "@" sign is used to find the destination
computer of the email.
URL
A Uniform Resource Locator (URL) is commonly used to identify a
computer that provides world wide web service. It usually looks
something like "http://www.newspaper.com". This address also
consists of two parts. In this case the two parts are separated by
the "//". The portion to the left means find the world wide web
service that is located at the computer identified to the right of
the "//". The portion to the right is the name of the computer that
is providing the world wide web service. Its name is composed of
parts that are similar to those described for the name of an email
computer. Sometines the portion of the right contains additional
information that identifies a particular document at the web site.
For example, http://www.newspaper.com/sports/article1.html would
identify a specific article in the sports section of the newspaper.
2.4. Are There Any Rules of Behavior on the Internet?
In general, common sense, courtesy, and decency govern good Internet
behavior. There is no single formal rulebook that governs behavior on behavior. There is no single formal rulebook that governs behavior on
the Internet. However many e-mail discussion lists and chat rooms the Internet. FYI 28 that was mentioned previously is a good guide.
have an Acceptable Use Policy (AUP). Before you join in one of these Many activities such as game sites, chat rooms, or e-mail lists may
activities check and see if there is an AUP, make sure you understand have rules of their own. What may be acceptable behavior in one chat
it, and then follow it. The IETF has published RFC 1855 (Netiquette room may be totally out of bounds in another. It never hurts to
Guidelines) and is publishing other RFCs that deal with subjects such check the water temperature before jumping in the pool. Users should
as advertising and Internet junk mail (spam). use the same precautions before joining in any online activity.
E-mail in particular can lead to misunderstandings between people.
Users should remember that the reader only has the text to determine
what is being said. Other conversation cues such as "tone of voice"
and body signals like winking are not present in the text. Because
of this, users of the Internet have developed cues to put in the
text. Text techniques such as capitalization and symbols known as
emoticons (also called "smilies") are used.
A typical smiley looks like this :-)
Additionally, acronyms have evolved over time (for example IMHO - In
My Humble Opinion). More information about this can be found by
searching. Use keywords like "netiquette" and "emoticon" with your
search engine to find more information.
Users should also be aware that their particular programs such as Users should also be aware that their particular programs such as
word processors or e-mail might produce documents and messages that word processors or e-mail might produce documents and messages that
are not readable by everyone. You should make sure that the intended are not readable by everyone. Very often, a reader must have the
recipient can read what you are sending them. same program in which a document was written in order to read it.
So, before sending an attached document, it is a good idea to make
sure that the intended receiver of your document has the capability
to read it. If in doubt, send a text (ascii) version of the
document.
As in any group, the users of the Internet have, over time, developed 2.5. How Does the Internet Work?
language short cuts. These primarily take the form of acronyms and
emoticons (smilies). Lists of these acronyms and emoticons can be Each of the activities mentioned in the section describing what one
found by surfing. can do on the Internet requires that computers exchange information.
Computers take turns sending and receiving information. When a
computer is sending information, it is known as the "source"; when it
is receiving information, it is known as the "destination." (The
same computer can be both a source and destination at different
times. This is especially clear when one thinks of sending and
receiving e-mail.)
Every computer on the Internet has a unique Internet "address" that
identifies it from among the millions of computers. The Internet has
specialized computers between the source and destination located at
network inter-connection points. These computers are known as
"routers." The routers understand how to use a computer's address to
appropriately point information from one computer to another over the
Internet.
In an exchange of information the following occurs:
* The source finds the address of the destination.
* The source contacts the destination and says "hello".
* The destination responds back with a "hello" of its own.
* The source tells the destination that it has information to
send.
* The destination tells the source that it is ready to receive the
information.
* The source breaks the information into small pieces called
packets and sends each packet on its way to the destination.
* The routers guide each packet to the destination.
* The destination takes the packets and puts them back together to
form the information.
* The destination tells the source that it has received the
information and asks the source if it has anything more to send.
* If the source says no, the destination will say "good bye"
unless it has something to send back. If it does, it will break
the information into packets and send them.
* Once both end users are done "talking" they say both say "good
bye".
Clearly our simplified introduction to this section did not explain
many steps in this process, such as how a computer discovers the
address of another computer or how packets are divided and
reassembled. Fortunately, these are specifics that people using the
Internet never really need to deal with!
2.6 Who Runs the Internet?
No one. The Internet is a cooperative effort among Internet Service
Providers (ISPs), software companines, volunteer organizations, and a
few facilities that tie the whole thing together. The ISPs and
software companies are completely independent and most of them
compete with each other. The ISPs provide internet service to people
much the same way that they obtain telephone service from a telephone
company. ISPs agree to connect their networks to each other and
transmit information following an established set of rules
(protocols). The software companies agree to manufacture programs
(such as email or web browsers) that also follow protocols. There
are other organizations that keep things straight. Some assign
Internet addresses in much the same manner as telephone numbers are
assigned, others keep track of names used by Internet users and
groups, and a large volunteer organization called the Internet
Engineering Task Force (IETF) develops the protocols computers follow
to make network communications succeed.
3. Security Considerations 3. Security Considerations
It is important to realize that not Internet user is a good netizen. The question "is the Internet secure?" can be a confusing one for
Therefore, users should learn to protect themselves. The IETF has people, who will hear many assurances that it is secure and many
published several RFCs that provide security information and scary stories saying it is not secure. There are a few basic rules
guidance. Additionally, users can protect themselves from sites and of thumb to remember that will address most concerns.
documents that have unwanted content by using baby sitting software.
First, make it a rule never to share account passwords with anyone.
Learning a password is the easiest way for someone to break into a
system. Most people feel that their files are not that interesting
to anyone, but someone may be able to get a foothold from one
innocuous account to other places in the same computer system. Many
good security practices can be found in the Users Security Handbook
[FYI 34, RFC 2504].
Second, understand that there are means for people to track the
information a user sends via email, the files one downloads, and the
sites visited on the web. The system administrators and network
engineers who oversee a sites' computers require access to
information that an individual may think is secret. In practice, no
responsible system administrator or network engineer will violate a
person's privacy out of personal curiousity. However, if someone
less legitimate attains illegal access to a system, they also will
have access to this information. This situation is not a problem for
most people, but it should be understood that things like email sent
a year ago or a log of users web pages browsed may still exist in
some system's backup archive tape and can be easily resurrected and
published widely.
Third, before giving personal information over the Internet, such as
filling in a form on a Web page, users should realize that there is
no assurance of confidentiality or privacy. It could be compared to
faxing such information to a party that you've never dealt with
before. While many organizations on the Internet are responsible
with information received via the web and email, this cannot always
be determined in advance.
4. References 4. References
References to be inserted here. [1] Guttman, E., Leong, G., and Malkin, G., "Users' Security
Handbook", RFC 2504, FYI 34, Sun Microsystems, COLT, Bay Networks,
February 1999.
[2] Hambridge, S., "Netiquette Guidelines", RFC 1855, FYI 28, Intel
Corporation, October 1995.
5. Authors' Address 5. Authors' Address
Raymond Plzak Raymond Plzak
SAIC SAIC
1710 Goodridge Drive 1710 Goodridge Drive
McLean, Virginia 22102 McLean, Virginia 22102
Phone: (703) 821-6535 Phone: (703) 821-6535
EMail: plzakr@saic.com EMail: plzakr@saic.com
Amy Tracy Wells Amy Tracy Wells
Internet Scout Project Internet Scout Project
University of Wisconsin-Madison University of Wisconsin-Madison
Computer Sciences Department Computer Sciences Department
1210 W. Dayton St. 1210 W. Dayton St.
Madison, WI 53706 Madison, WI 53706
Phone: (608)263-2611 Phone: (608)263-2611
skipping to change at line 287 skipping to change at page 11, line 4
The limited permissions granted above are perpetual and will not be revoked The limited permissions granted above are perpetual and will not be revoked
by the Internet Society or its successors or assigns. by the Internet Society or its successors or assigns.
This document and the information contained herein is provided on an "AS IS" This document and the information contained herein is provided on an "AS IS"
basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING TASK FORCE basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING TASK FORCE
DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO
ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY
RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A
PARTICULAR PURPOSE. PARTICULAR PURPOSE.
Appendix A
Glossary of Terms
Emoticon Combination of punctuation marks used to provide sense of
the senders tone of voice in an e-mail message
IETF Internet Engineering Task Force [see text for a description]
Internet An interconnected group of networks
ISP Internet Service Provider [see text for a description]
Network A connected group of computers
Router A specialized computer that connects networks together and
guides information packets to their destination
Spam A slang term for junk e-mail
URL Uniform Resource Locator [see text for a description]
Web Browser A program that provides the capablility to read
information that is located at a world wide web site
 End of changes. 35 change blocks. 
160 lines changed or deleted 318 lines changed or added

This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/