id sid tid token lemma pos 39 1 1 The the DT 39 1 2 Hitchhikers Hitchhikers NNPS 39 1 3 Guide Guide NNP 39 1 4 to to IN 39 1 5 the the DT 39 1 6 Internet internet NN 39 1 7 25 25 CD 39 1 8 August August NNP 39 1 9 1987 1987 CD 39 1 10 Ed Ed NNP 39 1 11 Krol Krol NNP 39 1 12 krol@uxc.cso.uiuc.edu krol@uxc.cso.uiuc.edu NNP 39 1 13 This this DT 39 1 14 document document NN 39 1 15 was be VBD 39 1 16 produced produce VBN 39 1 17 through through IN 39 1 18 funding funding NN 39 1 19 of of IN 39 1 20 the the DT 39 1 21 National National NNP 39 1 22 Science Science NNP 39 1 23 Foundation Foundation NNP 39 1 24 . . . 39 2 1 Copyright copyright NN 39 2 2 ( ( -LRB- 39 2 3 C c NN 39 2 4 ) ) -RRB- 39 2 5 1987 1987 CD 39 2 6 , , , 39 2 7 by by IN 39 2 8 the the DT 39 2 9 Board Board NNP 39 2 10 of of IN 39 2 11 Trustees Trustees NNPS 39 2 12 of of IN 39 2 13 The the DT 39 2 14 University University NNP 39 2 15 of of IN 39 2 16 Illinois Illinois NNP 39 2 17 . . . 39 3 1 Permission permission NN 39 3 2 to to TO 39 3 3 duplicate duplicate VB 39 3 4 this this DT 39 3 5 document document NN 39 3 6 , , , 39 3 7 in in IN 39 3 8 whole whole NN 39 3 9 or or CC 39 3 10 part part NN 39 3 11 , , , 39 3 12 is be VBZ 39 3 13 granted grant VBN 39 3 14 provided provide VBN 39 3 15 reference reference NN 39 3 16 is be VBZ 39 3 17 made make VBN 39 3 18 to to IN 39 3 19 the the DT 39 3 20 source source NN 39 3 21 and and CC 39 3 22 this this DT 39 3 23 copyright copyright NN 39 3 24 is be VBZ 39 3 25 included include VBN 39 3 26 in in IN 39 3 27 whole whole JJ 39 3 28 copies copy NNS 39 3 29 . . . 39 4 1 This this DT 39 4 2 document document NN 39 4 3 assumes assume VBZ 39 4 4 that that IN 39 4 5 one one CD 39 4 6 is be VBZ 39 4 7 familiar familiar JJ 39 4 8 with with IN 39 4 9 the the DT 39 4 10 workings working NNS 39 4 11 of of IN 39 4 12 a a DT 39 4 13 non non JJ 39 4 14 - - JJ 39 4 15 connected connected JJ 39 4 16 simple simple JJ 39 4 17 IP IP NNP 39 4 18 network network NN 39 4 19 ( ( -LRB- 39 4 20 e.g. e.g. RB 39 5 1 a a DT 39 5 2 few few JJ 39 5 3 4.2 4.2 CD 39 5 4 BSD BSD NNP 39 5 5 systems system NNS 39 5 6 on on IN 39 5 7 an an DT 39 5 8 Ethernet Ethernet NNP 39 5 9 not not RB 39 5 10 connected connect VBN 39 5 11 to to IN 39 5 12 anywhere anywhere RB 39 5 13 else else RB 39 5 14 ) ) -RRB- 39 5 15 . . . 39 6 1 Appendix Appendix NNP 39 6 2 A a DT 39 6 3 contains contain VBZ 39 6 4 remedial remedial JJ 39 6 5 information information NN 39 6 6 to to TO 39 6 7 get get VB 39 6 8 one one CD 39 6 9 to to IN 39 6 10 this this DT 39 6 11 point point NN 39 6 12 . . . 39 7 1 Its -PRON- PRP$ 39 7 2 purpose purpose NN 39 7 3 is be VBZ 39 7 4 to to TO 39 7 5 get get VB 39 7 6 that that DT 39 7 7 person person NN 39 7 8 , , , 39 7 9 familiar familiar JJ 39 7 10 with with IN 39 7 11 a a DT 39 7 12 simple simple JJ 39 7 13 net net NN 39 7 14 , , , 39 7 15 versed verse VBN 39 7 16 in in IN 39 7 17 the the DT 39 7 18 " " `` 39 7 19 oral oral JJ 39 7 20 tradition tradition NN 39 7 21 " " '' 39 7 22 of of IN 39 7 23 the the DT 39 7 24 Internet internet NN 39 7 25 to to IN 39 7 26 the the DT 39 7 27 point point NN 39 7 28 that that IN 39 7 29 that that DT 39 7 30 net net NN 39 7 31 can can MD 39 7 32 be be VB 39 7 33 connected connect VBN 39 7 34 to to IN 39 7 35 the the DT 39 7 36 Internet internet NN 39 7 37 with with IN 39 7 38 little little JJ 39 7 39 danger danger NN 39 7 40 to to IN 39 7 41 either either RB 39 7 42 . . . 39 8 1 It -PRON- PRP 39 8 2 is be VBZ 39 8 3 not not RB 39 8 4 a a DT 39 8 5 tutorial tutorial NN 39 8 6 , , , 39 8 7 it -PRON- PRP 39 8 8 consists consist VBZ 39 8 9 of of IN 39 8 10 pointers pointer NNS 39 8 11 to to IN 39 8 12 other other JJ 39 8 13 places place NNS 39 8 14 , , , 39 8 15 literature literature NN 39 8 16 , , , 39 8 17 and and CC 39 8 18 hints hint NNS 39 8 19 which which WDT 39 8 20 are be VBP 39 8 21 not not RB 39 8 22 normally normally RB 39 8 23 documented document VBN 39 8 24 . . . 39 9 1 Since since IN 39 9 2 the the DT 39 9 3 Internet internet NN 39 9 4 is be VBZ 39 9 5 a a DT 39 9 6 dynamic dynamic JJ 39 9 7 environment environment NN 39 9 8 , , , 39 9 9 changes change VBZ 39 9 10 to to IN 39 9 11 this this DT 39 9 12 document document NN 39 9 13 will will MD 39 9 14 be be VB 39 9 15 made make VBN 39 9 16 regularly regularly RB 39 9 17 . . . 39 10 1 The the DT 39 10 2 author author NN 39 10 3 welcomes welcome VBZ 39 10 4 comments comment NNS 39 10 5 and and CC 39 10 6 suggestions suggestion NNS 39 10 7 . . . 39 11 1 This this DT 39 11 2 is be VBZ 39 11 3 especially especially RB 39 11 4 true true JJ 39 11 5 of of IN 39 11 6 terms term NNS 39 11 7 for for IN 39 11 8 the the DT 39 11 9 glossary glossary NN 39 11 10 ( ( -LRB- 39 11 11 definitions definition NNS 39 11 12 are be VBP 39 11 13 not not RB 39 11 14 necessary necessary JJ 39 11 15 ) ) -RRB- 39 11 16 . . . 39 12 1 In in IN 39 12 2 the the DT 39 12 3 beginning beginning NN 39 12 4 there there EX 39 12 5 was be VBD 39 12 6 the the DT 39 12 7 ARPAnet arpanet NN 39 12 8 , , , 39 12 9 a a DT 39 12 10 wide wide JJ 39 12 11 area area NN 39 12 12 experimental experimental JJ 39 12 13 network network NN 39 12 14 connecting connect VBG 39 12 15 hosts host NNS 39 12 16 and and CC 39 12 17 terminal terminal NN 39 12 18 servers server NNS 39 12 19 together together RB 39 12 20 . . . 39 13 1 Procedures procedure NNS 39 13 2 were be VBD 39 13 3 set set VBN 39 13 4 up up RP 39 13 5 to to TO 39 13 6 regulate regulate VB 39 13 7 the the DT 39 13 8 allocation allocation NN 39 13 9 of of IN 39 13 10 addresses address NNS 39 13 11 and and CC 39 13 12 to to TO 39 13 13 create create VB 39 13 14 voluntary voluntary JJ 39 13 15 standards standard NNS 39 13 16 for for IN 39 13 17 the the DT 39 13 18 network network NN 39 13 19 . . . 39 14 1 As as IN 39 14 2 local local JJ 39 14 3 area area NN 39 14 4 networks network NNS 39 14 5 became become VBD 39 14 6 more more RBR 39 14 7 pervasive pervasive JJ 39 14 8 , , , 39 14 9 many many JJ 39 14 10 hosts host NNS 39 14 11 became become VBD 39 14 12 gateways gateway NNS 39 14 13 to to IN 39 14 14 local local JJ 39 14 15 networks network NNS 39 14 16 . . . 39 15 1 A a DT 39 15 2 network network NN 39 15 3 layer layer NN 39 15 4 to to TO 39 15 5 allow allow VB 39 15 6 the the DT 39 15 7 interoperation interoperation NN 39 15 8 of of IN 39 15 9 these these DT 39 15 10 networks network NNS 39 15 11 was be VBD 39 15 12 developed develop VBN 39 15 13 and and CC 39 15 14 called call VBN 39 15 15 IP IP NNP 39 15 16 ( ( -LRB- 39 15 17 Internet Internet NNP 39 15 18 Protocol Protocol NNP 39 15 19 ) ) -RRB- 39 15 20 . . . 39 16 1 Over over IN 39 16 2 time time NN 39 16 3 other other JJ 39 16 4 groups group NNS 39 16 5 created create VBD 39 16 6 long long JJ 39 16 7 haul haul NN 39 16 8 IP IP NNP 39 16 9 based base VBN 39 16 10 networks network NNS 39 16 11 ( ( -LRB- 39 16 12 NASA NASA NNP 39 16 13 , , , 39 16 14 NSF NSF NNP 39 16 15 , , , 39 16 16 states state NNS 39 16 17 ... ... NFP 39 16 18 ) ) -RRB- 39 16 19 . . . 39 17 1 These these DT 39 17 2 nets net NNS 39 17 3 , , , 39 17 4 too too RB 39 17 5 , , , 39 17 6 interoperate interoperate JJ 39 17 7 because because IN 39 17 8 of of IN 39 17 9 IP IP NNP 39 17 10 . . . 39 18 1 The the DT 39 18 2 collection collection NN 39 18 3 of of IN 39 18 4 all all DT 39 18 5 of of IN 39 18 6 these these DT 39 18 7 interoperating interoperate VBG 39 18 8 networks network NNS 39 18 9 is be VBZ 39 18 10 the the DT 39 18 11 Internet internet NN 39 18 12 . . . 39 19 1 Two two CD 39 19 2 groups group NNS 39 19 3 do do VBP 39 19 4 much much JJ 39 19 5 of of IN 39 19 6 the the DT 39 19 7 research research NN 39 19 8 and and CC 39 19 9 information information NN 39 19 10 work work NN 39 19 11 of of IN 39 19 12 the the DT 39 19 13 Internet internet NN 39 19 14 ( ( -LRB- 39 19 15 ISI ISI NNP 39 19 16 and and CC 39 19 17 SRI SRI NNP 39 19 18 ) ) -RRB- 39 19 19 . . . 39 20 1 ISI ISI NNP 39 20 2 ( ( -LRB- 39 20 3 the the DT 39 20 4 Informational Informational NNP 39 20 5 Sciences Sciences NNPS 39 20 6 Institute Institute NNP 39 20 7 ) ) -RRB- 39 20 8 does do VBZ 39 20 9 much much JJ 39 20 10 of of IN 39 20 11 the the DT 39 20 12 research research NN 39 20 13 , , , 39 20 14 standardization standardization NN 39 20 15 , , , 39 20 16 and and CC 39 20 17 allocation allocation NN 39 20 18 work work NN 39 20 19 of of IN 39 20 20 the the DT 39 20 21 Internet internet NN 39 20 22 . . . 39 21 1 SRI SRI NNP 39 21 2 International International NNP 39 21 3 provides provide VBZ 39 21 4 information information NN 39 21 5 services service NNS 39 21 6 for for IN 39 21 7 the the DT 39 21 8 Internet internet NN 39 21 9 . . . 39 22 1 In in IN 39 22 2 fact fact NN 39 22 3 , , , 39 22 4 after after IN 39 22 5 you -PRON- PRP 39 22 6 are be VBP 39 22 7 connected connected JJ 39 22 8 to to IN 39 22 9 the the DT 39 22 10 Internet internet NN 39 22 11 most most JJS 39 22 12 of of IN 39 22 13 the the DT 39 22 14 information information NN 39 22 15 in in IN 39 22 16 this this DT 39 22 17 document document NN 39 22 18 can can MD 39 22 19 be be VB 39 22 20 retrieved retrieve VBN 39 22 21 from from IN 39 22 22 the the DT 39 22 23 Network Network NNP 39 22 24 Information Information NNP 39 22 25 Center Center NNP 39 22 26 ( ( -LRB- 39 22 27 NIC NIC NNP 39 22 28 ) ) -RRB- 39 22 29 run run VBN 39 22 30 by by IN 39 22 31 SRI SRI NNP 39 22 32 . . . 39 23 1 Operating operate VBG 39 23 2 the the DT 39 23 3 Internet internet NN 39 23 4 Each each DT 39 23 5 network network NN 39 23 6 , , , 39 23 7 be be VB 39 23 8 it -PRON- PRP 39 23 9 the the DT 39 23 10 ARPAnet arpanet NN 39 23 11 , , , 39 23 12 NSFnet NSFnet NNP 39 23 13 or or CC 39 23 14 a a DT 39 23 15 regional regional JJ 39 23 16 network network NN 39 23 17 , , , 39 23 18 has have VBZ 39 23 19 its -PRON- PRP$ 39 23 20 own own JJ 39 23 21 operations operation NNS 39 23 22 center center NN 39 23 23 . . . 39 24 1 The the DT 39 24 2 ARPAnet arpanet NN 39 24 3 is be VBZ 39 24 4 run run VBN 39 24 5 by by IN 39 24 6 BBN BBN NNP 39 24 7 , , , 39 24 8 Inc. Inc. NNP 39 24 9 under under IN 39 24 10 contract contract NN 39 24 11 from from IN 39 24 12 DARPA DARPA NNP 39 24 13 . . . 39 25 1 Their -PRON- PRP$ 39 25 2 facility facility NN 39 25 3 is be VBZ 39 25 4 called call VBN 39 25 5 the the DT 39 25 6 Network Network NNP 39 25 7 Operations Operations NNPS 39 25 8 Center Center NNP 39 25 9 or or CC 39 25 10 NOC NOC NNP 39 25 11 . . . 39 26 1 Cornell Cornell NNP 39 26 2 University University NNP 39 26 3 temporarily temporarily RB 39 26 4 operates operate VBZ 39 26 5 NSFnet NSFnet NNP 39 26 6 ( ( -LRB- 39 26 7 called call VBN 39 26 8 the the DT 39 26 9 Network Network NNP 39 26 10 Information Information NNP 39 26 11 Service Service NNP 39 26 12 Center Center NNP 39 26 13 , , , 39 26 14 NISC NISC NNP 39 26 15 ) ) -RRB- 39 26 16 . . . 39 27 1 It -PRON- PRP 39 27 2 goes go VBZ 39 27 3 on on RP 39 27 4 to to IN 39 27 5 the the DT 39 27 6 -2- -2- : 39 27 7 regionals regional NNS 39 27 8 having have VBG 39 27 9 similar similar JJ 39 27 10 facilities facility NNS 39 27 11 to to TO 39 27 12 monitor monitor VB 39 27 13 and and CC 39 27 14 keep keep VB 39 27 15 watch watch NN 39 27 16 over over IN 39 27 17 the the DT 39 27 18 goings going NNS 39 27 19 on on RP 39 27 20 of of IN 39 27 21 their -PRON- PRP$ 39 27 22 portion portion NN 39 27 23 of of IN 39 27 24 the the DT 39 27 25 Internet internet NN 39 27 26 . . . 39 28 1 In in IN 39 28 2 addition addition NN 39 28 3 , , , 39 28 4 they -PRON- PRP 39 28 5 all all DT 39 28 6 should should MD 39 28 7 have have VB 39 28 8 some some DT 39 28 9 knowledge knowledge NN 39 28 10 of of IN 39 28 11 what what WP 39 28 12 is be VBZ 39 28 13 happening happen VBG 39 28 14 to to IN 39 28 15 the the DT 39 28 16 Internet internet NN 39 28 17 in in IN 39 28 18 total total NN 39 28 19 . . . 39 29 1 If if IN 39 29 2 a a DT 39 29 3 problem problem NN 39 29 4 comes come VBZ 39 29 5 up up RP 39 29 6 , , , 39 29 7 it -PRON- PRP 39 29 8 is be VBZ 39 29 9 suggested suggest VBN 39 29 10 that that IN 39 29 11 a a DT 39 29 12 campus campus NN 39 29 13 network network NN 39 29 14 liaison liaison NN 39 29 15 should should MD 39 29 16 contact contact VB 39 29 17 the the DT 39 29 18 network network NN 39 29 19 operator operator NN 39 29 20 to to TO 39 29 21 which which WDT 39 29 22 he -PRON- PRP 39 29 23 is be VBZ 39 29 24 directly directly RB 39 29 25 connected connect VBN 39 29 26 . . . 39 30 1 That that RB 39 30 2 is is RB 39 30 3 , , , 39 30 4 if if IN 39 30 5 you -PRON- PRP 39 30 6 are be VBP 39 30 7 connected connect VBN 39 30 8 to to IN 39 30 9 a a DT 39 30 10 regional regional JJ 39 30 11 network network NN 39 30 12 ( ( -LRB- 39 30 13 which which WDT 39 30 14 is be VBZ 39 30 15 gatewayed gatewaye VBN 39 30 16 to to IN 39 30 17 the the DT 39 30 18 NSFnet NSFnet NNP 39 30 19 , , , 39 30 20 which which WDT 39 30 21 is be VBZ 39 30 22 connected connect VBN 39 30 23 to to IN 39 30 24 the the DT 39 30 25 ARPAnet arpanet NN 39 30 26 ... ... . 39 30 27 ) ) -RRB- 39 30 28 and and CC 39 30 29 have have VB 39 30 30 a a DT 39 30 31 problem problem NN 39 30 32 , , , 39 30 33 you -PRON- PRP 39 30 34 should should MD 39 30 35 contact contact VB 39 30 36 your -PRON- PRP$ 39 30 37 regional regional JJ 39 30 38 network network NN 39 30 39 operations operation NNS 39 30 40 center center NN 39 30 41 . . . 39 31 1 RFCs RFCs NNP 39 31 2 The the DT 39 31 3 internal internal JJ 39 31 4 workings working NNS 39 31 5 of of IN 39 31 6 the the DT 39 31 7 Internet internet NN 39 31 8 are be VBP 39 31 9 defined define VBN 39 31 10 by by IN 39 31 11 a a DT 39 31 12 set set NN 39 31 13 of of IN 39 31 14 documents document NNS 39 31 15 called call VBN 39 31 16 RFCs RFCs NNP 39 31 17 ( ( -LRB- 39 31 18 Request request NN 39 31 19 for for IN 39 31 20 Comments comment NNS 39 31 21 ) ) -RRB- 39 31 22 . . . 39 32 1 The the DT 39 32 2 general general JJ 39 32 3 process process NN 39 32 4 for for IN 39 32 5 creating create VBG 39 32 6 an an DT 39 32 7 RFC RFC NNP 39 32 8 is be VBZ 39 32 9 for for IN 39 32 10 someone someone NN 39 32 11 wanting want VBG 39 32 12 something something NN 39 32 13 formalized formalize VBN 39 32 14 to to TO 39 32 15 write write VB 39 32 16 a a DT 39 32 17 document document NN 39 32 18 describing describe VBG 39 32 19 the the DT 39 32 20 issue issue NN 39 32 21 and and CC 39 32 22 mailing mail VBG 39 32 23 it -PRON- PRP 39 32 24 to to IN 39 32 25 Jon Jon NNP 39 32 26 Postel Postel NNP 39 32 27 ( ( -LRB- 39 32 28 postel@isi.edu postel@isi.edu NNP 39 32 29 ) ) -RRB- 39 32 30 . . . 39 33 1 He -PRON- PRP 39 33 2 acts act VBZ 39 33 3 as as IN 39 33 4 a a DT 39 33 5 referee referee NN 39 33 6 for for IN 39 33 7 the the DT 39 33 8 proposal proposal NN 39 33 9 . . . 39 34 1 It -PRON- PRP 39 34 2 is be VBZ 39 34 3 then then RB 39 34 4 commented comment VBN 39 34 5 upon upon IN 39 34 6 by by IN 39 34 7 all all PDT 39 34 8 those those DT 39 34 9 wishing wish VBG 39 34 10 to to TO 39 34 11 take take VB 39 34 12 part part NN 39 34 13 in in IN 39 34 14 the the DT 39 34 15 discussion discussion NN 39 34 16 ( ( -LRB- 39 34 17 electronically electronically RB 39 34 18 of of IN 39 34 19 course course NN 39 34 20 ) ) -RRB- 39 34 21 . . . 39 35 1 It -PRON- PRP 39 35 2 may may MD 39 35 3 go go VB 39 35 4 through through IN 39 35 5 multiple multiple JJ 39 35 6 revisions revision NNS 39 35 7 . . . 39 36 1 Should Should MD 39 36 2 it -PRON- PRP 39 36 3 be be VB 39 36 4 generally generally RB 39 36 5 accepted accept VBN 39 36 6 as as IN 39 36 7 a a DT 39 36 8 good good JJ 39 36 9 idea idea NN 39 36 10 , , , 39 36 11 it -PRON- PRP 39 36 12 will will MD 39 36 13 be be VB 39 36 14 assigned assign VBN 39 36 15 a a DT 39 36 16 number number NN 39 36 17 and and CC 39 36 18 filed file VBN 39 36 19 with with IN 39 36 20 the the DT 39 36 21 RFCs rfc NNS 39 36 22 . . . 39 37 1 The the DT 39 37 2 RFCs rfc NNS 39 37 3 can can MD 39 37 4 be be VB 39 37 5 divided divide VBN 39 37 6 into into IN 39 37 7 five five CD 39 37 8 groups group NNS 39 37 9 : : : 39 37 10 required require VBN 39 37 11 , , , 39 37 12 suggested suggest VBD 39 37 13 , , , 39 37 14 directional directional JJ 39 37 15 , , , 39 37 16 informational informational JJ 39 37 17 and and CC 39 37 18 obsolete obsolete JJ 39 37 19 . . . 39 38 1 Required require VBN 39 38 2 RFC RFC NNP 39 38 3 's 's POS 39 38 4 ( ( -LRB- 39 38 5 e.g. e.g. RB 39 39 1 RFC-791 rfc-791 UH 39 39 2 , , , 39 39 3 The the DT 39 39 4 Internet Internet NNP 39 39 5 Protocol Protocol NNP 39 39 6 ) ) -RRB- 39 39 7 must must MD 39 39 8 be be VB 39 39 9 implemented implement VBN 39 39 10 on on IN 39 39 11 any any DT 39 39 12 host host NN 39 39 13 connected connect VBN 39 39 14 to to IN 39 39 15 the the DT 39 39 16 Internet internet NN 39 39 17 . . . 39 40 1 Suggested suggest VBN 39 40 2 RFCs rfc NNS 39 40 3 are be VBP 39 40 4 generally generally RB 39 40 5 implemented implement VBN 39 40 6 by by IN 39 40 7 network network NN 39 40 8 hosts host NNS 39 40 9 . . . 39 41 1 Lack lack NN 39 41 2 of of IN 39 41 3 them -PRON- PRP 39 41 4 does do VBZ 39 41 5 not not RB 39 41 6 preclude preclude VB 39 41 7 access access NN 39 41 8 to to IN 39 41 9 the the DT 39 41 10 Internet internet NN 39 41 11 , , , 39 41 12 but but CC 39 41 13 may may MD 39 41 14 impact impact VB 39 41 15 its -PRON- PRP$ 39 41 16 usability usability NN 39 41 17 . . . 39 42 1 RFC-793 RFC-793 NNP 39 42 2 ( ( -LRB- 39 42 3 Transmission Transmission NNP 39 42 4 Control Control NNP 39 42 5 Protocol Protocol NNP 39 42 6 ) ) -RRB- 39 42 7 is be VBZ 39 42 8 a a DT 39 42 9 suggested suggest VBN 39 42 10 RFC RFC NNP 39 42 11 . . . 39 43 1 Directional directional JJ 39 43 2 RFCs rfc NNS 39 43 3 were be VBD 39 43 4 discussed discuss VBN 39 43 5 and and CC 39 43 6 agreed agree VBN 39 43 7 to to TO 39 43 8 , , , 39 43 9 but but CC 39 43 10 their -PRON- PRP$ 39 43 11 application application NN 39 43 12 has have VBZ 39 43 13 never never RB 39 43 14 come come VBN 39 43 15 into into IN 39 43 16 wide wide JJ 39 43 17 use use NN 39 43 18 . . . 39 44 1 This this DT 39 44 2 may may MD 39 44 3 be be VB 39 44 4 due due IN 39 44 5 to to IN 39 44 6 the the DT 39 44 7 lack lack NN 39 44 8 of of IN 39 44 9 wide wide JJ 39 44 10 need need NN 39 44 11 for for IN 39 44 12 the the DT 39 44 13 specific specific JJ 39 44 14 application application NN 39 44 15 ( ( -LRB- 39 44 16 RFC-937 rfc-937 $ 39 44 17 The the DT 39 44 18 Post Post NNP 39 44 19 Office Office NNP 39 44 20 Protocol Protocol NNP 39 44 21 ) ) -RRB- 39 44 22 or or CC 39 44 23 that that IN 39 44 24 , , , 39 44 25 although although IN 39 44 26 technically technically RB 39 44 27 superior superior JJ 39 44 28 , , , 39 44 29 ran run VBD 39 44 30 against against IN 39 44 31 other other JJ 39 44 32 pervasive pervasive JJ 39 44 33 approaches approach NNS 39 44 34 ( ( -LRB- 39 44 35 RFC-891 rfc-891 UH 39 44 36 Hello hello UH 39 44 37 ) ) -RRB- 39 44 38 . . . 39 45 1 It -PRON- PRP 39 45 2 is be VBZ 39 45 3 suggested suggest VBN 39 45 4 that that IN 39 45 5 should should MD 39 45 6 the the DT 39 45 7 facility facility NN 39 45 8 be be VB 39 45 9 required require VBN 39 45 10 by by IN 39 45 11 a a DT 39 45 12 particular particular JJ 39 45 13 site site NN 39 45 14 , , , 39 45 15 animplementation animplementation NN 39 45 16 be be VB 39 45 17 done do VBN 39 45 18 in in IN 39 45 19 accordance accordance NN 39 45 20 with with IN 39 45 21 the the DT 39 45 22 RFC RFC NNP 39 45 23 . . . 39 46 1 This this DT 39 46 2 insures insure VBZ 39 46 3 that that IN 39 46 4 , , , 39 46 5 should should MD 39 46 6 the the DT 39 46 7 idea idea NN 39 46 8 be be VB 39 46 9 one one CD 39 46 10 whose whose WP$ 39 46 11 time time NN 39 46 12 has have VBZ 39 46 13 come come VBN 39 46 14 , , , 39 46 15 the the DT 39 46 16 implementation implementation NN 39 46 17 will will MD 39 46 18 be be VB 39 46 19 in in IN 39 46 20 accordance accordance NN 39 46 21 with with IN 39 46 22 some some DT 39 46 23 standard standard NN 39 46 24 and and CC 39 46 25 will will MD 39 46 26 be be VB 39 46 27 generally generally RB 39 46 28 usable usable JJ 39 46 29 . . . 39 47 1 Informational informational JJ 39 47 2 RFCs rfc NNS 39 47 3 contain contain VBP 39 47 4 factual factual JJ 39 47 5 information information NN 39 47 6 about about IN 39 47 7 the the DT 39 47 8 Internet internet NN 39 47 9 and and CC 39 47 10 its -PRON- PRP$ 39 47 11 operation operation NN 39 47 12 ( ( -LRB- 39 47 13 RFC-990 rfc-990 UH 39 47 14 , , , 39 47 15 Assigned Assigned NNP 39 47 16 Numbers Numbers NNPS 39 47 17 ) ) -RRB- 39 47 18 . . . 39 48 1 Finally finally RB 39 48 2 , , , 39 48 3 as as IN 39 48 4 the the DT 39 48 5 Internet internet NN 39 48 6 and and CC 39 48 7 technology technology NN 39 48 8 have have VBP 39 48 9 grown grow VBN 39 48 10 , , , 39 48 11 some some DT 39 48 12 RFCs rfc NNS 39 48 13 have have VBP 39 48 14 become become VBN 39 48 15 unnecessary unnecessary JJ 39 48 16 . . . 39 49 1 These these DT 39 49 2 obsolete obsolete JJ 39 49 3 RFCs rfc NNS 39 49 4 can can MD 39 49 5 not not RB 39 49 6 be be VB 39 49 7 ignored ignore VBN 39 49 8 , , , 39 49 9 however however RB 39 49 10 . . . 39 50 1 Frequently frequently RB 39 50 2 when when WRB 39 50 3 a a DT 39 50 4 change change NN 39 50 5 is be VBZ 39 50 6 made make VBN 39 50 7 to to IN 39 50 8 some some DT 39 50 9 RFC RFC NNP 39 50 10 that that WDT 39 50 11 causes cause VBZ 39 50 12 a a DT 39 50 13 new new JJ 39 50 14 one one NN 39 50 15 to to TO 39 50 16 be be VB 39 50 17 issued issue VBN 39 50 18 obsoleting obsolete VBG 39 50 19 others other NNS 39 50 20 , , , 39 50 21 the the DT 39 50 22 new new JJ 39 50 23 RFC RFC NNP 39 50 24 only only RB 39 50 25 contains contain VBZ 39 50 26 explanations explanation NNS 39 50 27 and and CC 39 50 28 motivations motivation NNS 39 50 29 for for IN 39 50 30 the the DT 39 50 31 change change NN 39 50 32 . . . 39 51 1 Understanding understand VBG 39 51 2 the the DT 39 51 3 model model NN 39 51 4 on on IN 39 51 5 which which WDT 39 51 6 the the DT 39 51 7 whole whole JJ 39 51 8 facility facility NN 39 51 9 is be VBZ 39 51 10 based base VBN 39 51 11 may may MD 39 51 12 involve involve VB 39 51 13 reading read VBG 39 51 14 the the DT 39 51 15 original original JJ 39 51 16 and and CC 39 51 17 subsequent subsequent JJ 39 51 18 RFCs rfc NNS 39 51 19 on on IN 39 51 20 the the DT 39 51 21 topic topic NN 39 51 22 . . . 39 52 1 -3- -3- : 39 52 2 ( ( -LRB- 39 52 3 Appendix Appendix NNP 39 52 4 B B NNP 39 52 5 contains contain VBZ 39 52 6 a a DT 39 52 7 list list NN 39 52 8 of of IN 39 52 9 what what WP 39 52 10 are be VBP 39 52 11 considered consider VBN 39 52 12 to to TO 39 52 13 be be VB 39 52 14 the the DT 39 52 15 major major JJ 39 52 16 RFCs rfc NNS 39 52 17 necessary necessary JJ 39 52 18 for for IN 39 52 19 understanding understand VBG 39 52 20 the the DT 39 52 21 Internet internet NN 39 52 22 ) ) -RRB- 39 52 23 . . . 39 53 1 The the DT 39 53 2 Network Network NNP 39 53 3 Information Information NNP 39 53 4 Center Center NNP 39 53 5 The the DT 39 53 6 NIC NIC NNP 39 53 7 is be VBZ 39 53 8 a a DT 39 53 9 facility facility NN 39 53 10 available available JJ 39 53 11 to to IN 39 53 12 all all DT 39 53 13 Internet internet NN 39 53 14 users user NNS 39 53 15 which which WDT 39 53 16 provides provide VBZ 39 53 17 information information NN 39 53 18 to to IN 39 53 19 the the DT 39 53 20 community community NN 39 53 21 . . . 39 54 1 There there EX 39 54 2 are be VBP 39 54 3 three three CD 39 54 4 means mean NNS 39 54 5 of of IN 39 54 6 NIC NIC NNP 39 54 7 contact contact NN 39 54 8 : : : 39 54 9 network network NN 39 54 10 , , , 39 54 11 telephone telephone NN 39 54 12 , , , 39 54 13 and and CC 39 54 14 mail mail NN 39 54 15 . . . 39 55 1 The the DT 39 55 2 network network NN 39 55 3 accesses access NNS 39 55 4 are be VBP 39 55 5 the the DT 39 55 6 most most RBS 39 55 7 prevalent prevalent JJ 39 55 8 . . . 39 56 1 Interactive interactive JJ 39 56 2 access access NN 39 56 3 is be VBZ 39 56 4 frequently frequently RB 39 56 5 used use VBN 39 56 6 to to TO 39 56 7 do do VB 39 56 8 queries query NNS 39 56 9 of of IN 39 56 10 NIC NIC NNP 39 56 11 service service NN 39 56 12 overviews overviews NNP 39 56 13 , , , 39 56 14 look look VB 39 56 15 up up RP 39 56 16 user user NN 39 56 17 and and CC 39 56 18 host host NN 39 56 19 names name NNS 39 56 20 , , , 39 56 21 and and CC 39 56 22 scan scan JJ 39 56 23 lists list NNS 39 56 24 of of IN 39 56 25 NIC NIC NNP 39 56 26 documents document NNS 39 56 27 . . . 39 57 1 It -PRON- PRP 39 57 2 is be VBZ 39 57 3 available available JJ 39 57 4 by by IN 39 57 5 using use VBG 39 57 6 % % NN 39 57 7 telnet telnet NN 39 57 8 sri-nic.arpa sri-nic.arpa CD 39 57 9 on on IN 39 57 10 a a DT 39 57 11 BSD BSD NNP 39 57 12 system system NN 39 57 13 and and CC 39 57 14 following follow VBG 39 57 15 the the DT 39 57 16 directions direction NNS 39 57 17 provided provide VBN 39 57 18 by by IN 39 57 19 a a DT 39 57 20 user user NN 39 57 21 friendly friendly JJ 39 57 22 prompter prompter NN 39 57 23 . . . 39 58 1 From from IN 39 58 2 poking poke VBG 39 58 3 around around RB 39 58 4 in in IN 39 58 5 the the DT 39 58 6 databases database NNS 39 58 7 provided provide VBN 39 58 8 one one PRP 39 58 9 might may MD 39 58 10 decide decide VB 39 58 11 that that IN 39 58 12 a a DT 39 58 13 document document NN 39 58 14 named name VBN 39 58 15 NETINFO NETINFO NNP 39 58 16 : : : 39 58 17 NUG.DOC NUG.DOC . 39 58 18 ( ( -LRB- 39 58 19 The the DT 39 58 20 Users Users NNPS 39 58 21 Guide Guide NNP 39 58 22 to to IN 39 58 23 the the DT 39 58 24 ARPAnet arpanet NN 39 58 25 ) ) -RRB- 39 58 26 would would MD 39 58 27 be be VB 39 58 28 worth worth JJ 39 58 29 having have VBG 39 58 30 . . . 39 59 1 It -PRON- PRP 39 59 2 could could MD 39 59 3 be be VB 39 59 4 retrieved retrieve VBN 39 59 5 via via IN 39 59 6 an an DT 39 59 7 anonymous anonymous JJ 39 59 8 FTP FTP NNP 39 59 9 . . . 39 60 1 An an DT 39 60 2 anonymous anonymous JJ 39 60 3 FTP FTP NNP 39 60 4 would would MD 39 60 5 proceed proceed VB 39 60 6 something something NN 39 60 7 like like IN 39 60 8 the the DT 39 60 9 following following NN 39 60 10 . . . 39 61 1 ( ( -LRB- 39 61 2 The the DT 39 61 3 dialogue dialogue NN 39 61 4 may may MD 39 61 5 vary vary VB 39 61 6 slightly slightly RB 39 61 7 depending depend VBG 39 61 8 on on IN 39 61 9 the the DT 39 61 10 implementation implementation NN 39 61 11 of of IN 39 61 12 FTP FTP NNP 39 61 13 you -PRON- PRP 39 61 14 are be VBP 39 61 15 using use VBG 39 61 16 ) ) -RRB- 39 61 17 . . . 39 62 1 % % NN 39 62 2 ftp ftp NNP 39 62 3 sri-nic.arpa sri-nic.arpa CD 39 62 4 Connected connect VBN 39 62 5 to to IN 39 62 6 sri-nic.arpa sri-nic.arpa CD 39 62 7 . . . 39 63 1 220 220 CD 39 63 2 SRI_NIC.ARPA sri_nic.arpa SYM 39 63 3 FTP FTP NNP 39 63 4 Server Server NNP 39 63 5 Process Process NNP 39 63 6 5Z(47)-6 5z(47)-6 CD 39 63 7 at at IN 39 63 8 We -PRON- PRP 39 63 9 d d NNP 39 63 10 17-Jun-87 17-Jun-87 NNP 39 63 11 12:00 12:00 CD 39 63 12 PDT PDT NNP 39 63 13 Name Name NNP 39 63 14 ( ( -LRB- 39 63 15 sri sri NNP 39 63 16 - - HYPH 39 63 17 nic.arpa nic.arpa NNP 39 63 18 : : : 39 63 19 myname myname NN 39 63 20 ) ) -RRB- 39 63 21 : : : 39 63 22 anonymous anonymous JJ 39 63 23 331 331 CD 39 63 24 ANONYMOUS anonymous NN 39 63 25 user user NN 39 63 26 ok ok RB 39 63 27 , , , 39 63 28 send send VB 39 63 29 real real JJ 39 63 30 ident ident NN 39 63 31 as as IN 39 63 32 password password NN 39 63 33 . . . 39 64 1 Password Password NNP 39 64 2 : : : 39 64 3 myname myname NN 39 64 4 230 230 CD 39 64 5 User User NNP 39 64 6 ANONYMOUS ANONYMOUS NNP 39 64 7 logged log VBN 39 64 8 in in RP 39 64 9 at at IN 39 64 10 We -PRON- PRP 39 64 11 d d NNP 39 64 12 17-Jun-87 17-Jun-87 NNP 39 64 13 12:01 12:01 CD 39 64 14 PDT PDT NNP 39 64 15 , , , 39 64 16 job job NN 39 64 17 15 15 CD 39 64 18 . . . 39 64 19 ftp ftp NNP 39 64 20 > > XX 39 64 21 get get VBP 39 64 22 netinfo netinfo NN 39 64 23 : : : 39 64 24 nug.doc nug.doc ADD 39 64 25 200 200 CD 39 64 26 Port Port NNP 39 64 27 18.144 18.144 CD 39 64 28 at at IN 39 64 29 host host NN 39 64 30 128.174.5.50 128.174.5.50 CD 39 64 31 accepted accept VBD 39 64 32 . . . 39 65 1 150 150 CD 39 65 2 ASCII ASCII NNP 39 65 3 retrieve retrieve NN 39 65 4 of of IN 39 65 5 < < XX 39 65 6 NETINFO NETINFO NNP 39 65 7 > > NNP 39 65 8 NUG.DOC.11 NUG.DOC.11 NNP 39 65 9 started start VBD 39 65 10 . . . 39 66 1 226 226 CD 39 66 2 Transfer Transfer NNP 39 66 3 Completed complete VBD 39 66 4 157675 157675 CD 39 66 5 ( ( -LRB- 39 66 6 8) 8) CD 39 66 7 bytes byte NNS 39 66 8 transferred transfer VBD 39 66 9 local local JJ 39 66 10 : : : 39 66 11 netinfo netinfo NN 39 66 12 : : : 39 66 13 nug.doc nug.doc NNP 39 66 14 remote remote JJ 39 66 15 : : : 39 66 16 netinfo netinfo NN 39 66 17 : : : 39 66 18 nug.doc nug.doc NN 39 66 19 157675 157675 CD 39 66 20 bytes byte NNS 39 66 21 in in IN 39 66 22 4.5e+02 4.5e+02 CD 39 66 23 seconds second NNS 39 66 24 ( ( -LRB- 39 66 25 0.34 0.34 CD 39 66 26 Kbytes Kbytes NNPS 39 66 27 / / SYM 39 66 28 s s NN 39 66 29 ) ) -RRB- 39 66 30 ftp ftp NNP 39 66 31 > > XX 39 66 32 quit quit VBP 39 66 33 221 221 CD 39 66 34 QUIT QUIT NNP 39 66 35 command command NN 39 66 36 received receive VBD 39 66 37 . . . 39 67 1 Goodbye goodbye UH 39 67 2 . . . 39 68 1 ( ( -LRB- 39 68 2 Another another DT 39 68 3 good good JJ 39 68 4 initial initial JJ 39 68 5 document document NN 39 68 6 to to TO 39 68 7 fetch fetch VB 39 68 8 is be VBZ 39 68 9 NETINFO NETINFO NNP 39 68 10 : : : 39 68 11 WHAT what WDT 39 68 12 - - HYPH 39 68 13 THE the DT 39 68 14 - - HYPH 39 68 15 NIC NIC NNP 39 68 16 - - HYPH 39 68 17 DOES.TXT does.txt NN 39 68 18 ) ) -RRB- 39 68 19 ! ! . 39 69 1 Questions question NNS 39 69 2 of of IN 39 69 3 the the DT 39 69 4 NIC NIC NNP 39 69 5 or or CC 39 69 6 problems problem NNS 39 69 7 with with IN 39 69 8 services service NNS 39 69 9 can can MD 39 69 10 be be VB 39 69 11 asked ask VBN 39 69 12 of of IN 39 69 13 or or CC 39 69 14 reported report VBN 39 69 15 to to IN 39 69 16 using use VBG 39 69 17 electronic electronic JJ 39 69 18 mail mail NN 39 69 19 . . . 39 70 1 The the DT 39 70 2 following follow VBG 39 70 3 addresses address NNS 39 70 4 can can MD 39 70 5 be be VB 39 70 6 used use VBN 39 70 7 : : : 39 70 8 NIC@SRI NIC@SRI NNP 39 70 9 - - HYPH 39 70 10 NIC.ARPA nic.arpa CD 39 70 11 General general JJ 39 70 12 user user NN 39 70 13 assistance assistance NN 39 70 14 , , , 39 70 15 document document NN 39 70 16 requests request NNS 39 70 17 REGISTRAR@SRI REGISTRAR@SRI NNP 39 70 18 - - : 39 70 19 NIC.ARPA NIC.ARPA `` 39 70 20 User User NNP 39 70 21 registration registration NN 39 70 22 and and CC 39 70 23 WHOIS WHOIS NNP 39 70 24 updates update VBZ 39 70 25 HOSTMASTER@SRI HOSTMASTER@SRI NNP 39 70 26 - - , 39 70 27 NIC.ARPA NIC.ARPA NNP 39 70 28 Hostname Hostname NNP 39 70 29 and and CC 39 70 30 domain domain NN 39 70 31 changes change NNS 39 70 32 and and CC 39 70 33 updates update VBZ 39 70 34 ACTION@SRI ACTION@SRI NNP 39 70 35 - - HYPH 39 70 36 NIC.ARPA NIC.ARPA VBZ 39 70 37 SRI SRI NNP 39 70 38 - - HYPH 39 70 39 NIC NIC NNP 39 70 40 computer computer NN 39 70 41 operations operation NNS 39 70 42 SUGGESTIONS@SRI SUGGESTIONS@SRI NNP 39 70 43 - - HYPH 39 70 44 NIC.ARPA NIC.ARPA VBZ 39 70 45 Comments comment NNS 39 70 46 on on IN 39 70 47 NIC NIC NNP 39 70 48 publications publication NNS 39 70 49 and and CC 39 70 50 services service NNS 39 70 51 -4- -4- : 39 70 52 For for IN 39 70 53 people people NNS 39 70 54 without without IN 39 70 55 network network NN 39 70 56 access access NN 39 70 57 , , , 39 70 58 or or CC 39 70 59 if if IN 39 70 60 the the DT 39 70 61 number number NN 39 70 62 of of IN 39 70 63 documents document NNS 39 70 64 is be VBZ 39 70 65 large large JJ 39 70 66 , , , 39 70 67 many many JJ 39 70 68 of of IN 39 70 69 the the DT 39 70 70 NIC NIC NNP 39 70 71 documents document NNS 39 70 72 are be VBP 39 70 73 available available JJ 39 70 74 in in IN 39 70 75 printed print VBN 39 70 76 form form NN 39 70 77 for for IN 39 70 78 a a DT 39 70 79 small small JJ 39 70 80 charge charge NN 39 70 81 . . . 39 71 1 One one CD 39 71 2 frequently frequently RB 39 71 3 ordered order VBD 39 71 4 document document NN 39 71 5 for for IN 39 71 6 starting start VBG 39 71 7 sites site NNS 39 71 8 is be VBZ 39 71 9 a a DT 39 71 10 compendium compendium NN 39 71 11 of of IN 39 71 12 major major JJ 39 71 13 RFCs rfc NNS 39 71 14 . . . 39 72 1 Telephone telephone NN 39 72 2 access access NN 39 72 3 is be VBZ 39 72 4 used use VBN 39 72 5 primarily primarily RB 39 72 6 for for IN 39 72 7 questions question NNS 39 72 8 or or CC 39 72 9 problems problem NNS 39 72 10 with with IN 39 72 11 network network NN 39 72 12 access access NN 39 72 13 . . . 39 73 1 ( ( -LRB- 39 73 2 See see VB 39 73 3 appendix appendix NNP 39 73 4 B B NNP 39 73 5 for for IN 39 73 6 mail mail NN 39 73 7 / / SYM 39 73 8 telephone telephone NN 39 73 9 contact contact NN 39 73 10 numbers number NNS 39 73 11 ) ) -RRB- 39 73 12 . . . 39 74 1 The the DT 39 74 2 NSFnet NSFnet NNP 39 74 3 Network Network NNP 39 74 4 Service Service NNP 39 74 5 Center Center NNP 39 74 6 The the DT 39 74 7 NSFnet NSFnet NNP 39 74 8 Network Network NNP 39 74 9 Service Service NNP 39 74 10 Center Center NNP 39 74 11 ( ( -LRB- 39 74 12 NNSC NNSC NNP 39 74 13 ) ) -RRB- 39 74 14 is be VBZ 39 74 15 funded fund VBN 39 74 16 by by IN 39 74 17 NSF NSF NNP 39 74 18 to to TO 39 74 19 provide provide VB 39 74 20 a a DT 39 74 21 first first JJ 39 74 22 level level NN 39 74 23 of of IN 39 74 24 aid aid NN 39 74 25 to to IN 39 74 26 users user NNS 39 74 27 of of IN 39 74 28 NSFnet NSFnet NNP 39 74 29 should should MD 39 74 30 they -PRON- PRP 39 74 31 have have VB 39 74 32 questions question NNS 39 74 33 or or CC 39 74 34 encounter encounter VB 39 74 35 problems problem NNS 39 74 36 traversing traverse VBG 39 74 37 the the DT 39 74 38 network network NN 39 74 39 . . . 39 75 1 It -PRON- PRP 39 75 2 is be VBZ 39 75 3 run run VBN 39 75 4 by by IN 39 75 5 BBN BBN NNP 39 75 6 Inc. Inc. NNP 39 75 7 Karen Karen NNP 39 75 8 Roubicek Roubicek NNP 39 75 9 ( ( -LRB- 39 75 10 roubicek@nnsc.nsf.net roubicek@nnsc.nsf.net NNP 39 75 11 ) ) -RRB- 39 75 12 is be VBZ 39 75 13 the the DT 39 75 14 NNSC NNSC NNP 39 75 15 user user NN 39 75 16 liaison liaison NN 39 75 17 . . . 39 76 1 The the DT 39 76 2 NNSC NNSC NNP 39 76 3 , , , 39 76 4 which which WDT 39 76 5 currently currently RB 39 76 6 has have VBZ 39 76 7 information information NN 39 76 8 and and CC 39 76 9 documents document NNS 39 76 10 online online RB 39 76 11 and and CC 39 76 12 in in IN 39 76 13 printed print VBN 39 76 14 form form NN 39 76 15 , , , 39 76 16 plans plan VBZ 39 76 17 to to TO 39 76 18 distribute distribute VB 39 76 19 news news NN 39 76 20 through through IN 39 76 21 network network NN 39 76 22 mailing mailing NN 39 76 23 lists list NNS 39 76 24 , , , 39 76 25 bulletins bulletin NNS 39 76 26 , , , 39 76 27 newsletters newsletter NNS 39 76 28 , , , 39 76 29 and and CC 39 76 30 online online JJ 39 76 31 reports report NNS 39 76 32 . . . 39 77 1 The the DT 39 77 2 NNSC NNSC NNP 39 77 3 also also RB 39 77 4 maintains maintain VBZ 39 77 5 a a DT 39 77 6 database database NN 39 77 7 of of IN 39 77 8 contact contact NN 39 77 9 points point NNS 39 77 10 and and CC 39 77 11 sources source NNS 39 77 12 of of IN 39 77 13 additional additional JJ 39 77 14 information information NN 39 77 15 about about IN 39 77 16 NSFnet nsfnet JJ 39 77 17 component component NN 39 77 18 networks network NNS 39 77 19 and and CC 39 77 20 supercomputer supercomputer NN 39 77 21 centers center NNS 39 77 22 . . . 39 78 1 Prospective prospective JJ 39 78 2 or or CC 39 78 3 current current JJ 39 78 4 users user NNS 39 78 5 who who WP 39 78 6 do do VBP 39 78 7 not not RB 39 78 8 know know VB 39 78 9 whom whom WP 39 78 10 to to TO 39 78 11 call call VB 39 78 12 concerning concern VBG 39 78 13 questions question NNS 39 78 14 about about IN 39 78 15 NSFnet nsfnet JJ 39 78 16 use use NN 39 78 17 , , , 39 78 18 should should MD 39 78 19 contact contact VB 39 78 20 the the DT 39 78 21 NNSC NNSC NNP 39 78 22 . . . 39 79 1 The the DT 39 79 2 NNSC NNSC NNP 39 79 3 will will MD 39 79 4 answer answer VB 39 79 5 general general JJ 39 79 6 questions question NNS 39 79 7 , , , 39 79 8 and and CC 39 79 9 , , , 39 79 10 for for IN 39 79 11 detailed detailed JJ 39 79 12 information information NN 39 79 13 relating relate VBG 39 79 14 to to IN 39 79 15 specific specific JJ 39 79 16 components component NNS 39 79 17 of of IN 39 79 18 the the DT 39 79 19 Internet internet NN 39 79 20 , , , 39 79 21 will will MD 39 79 22 help help VB 39 79 23 users user NNS 39 79 24 find find VB 39 79 25 the the DT 39 79 26 appropriate appropriate JJ 39 79 27 contact contact NN 39 79 28 for for IN 39 79 29 further further JJ 39 79 30 assistance assistance NN 39 79 31 . . . 39 80 1 ( ( -LRB- 39 80 2 Appendix Appendix NNP 39 80 3 B B NNP 39 80 4 ) ) -RRB- 39 80 5 Mail Mail NNP 39 80 6 Reflectors reflector NNS 39 80 7 The the DT 39 80 8 way way NN 39 80 9 most most JJS 39 80 10 people people NNS 39 80 11 keep keep VBP 39 80 12 up up IN 39 80 13 to to IN 39 80 14 date date NN 39 80 15 on on IN 39 80 16 network network NN 39 80 17 news news NN 39 80 18 is be VBZ 39 80 19 through through IN 39 80 20 subscription subscription NN 39 80 21 to to IN 39 80 22 a a DT 39 80 23 number number NN 39 80 24 of of IN 39 80 25 mail mail NN 39 80 26 reflectors reflector NNS 39 80 27 . . . 39 81 1 Mail mail NN 39 81 2 reflectors reflector NNS 39 81 3 are be VBP 39 81 4 special special JJ 39 81 5 electronic electronic JJ 39 81 6 mailboxes mailbox NNS 39 81 7 which which WDT 39 81 8 , , , 39 81 9 when when WRB 39 81 10 they -PRON- PRP 39 81 11 receive receive VBP 39 81 12 a a DT 39 81 13 message message NN 39 81 14 , , , 39 81 15 resend resend VB 39 81 16 it -PRON- PRP 39 81 17 to to IN 39 81 18 a a DT 39 81 19 list list NN 39 81 20 of of IN 39 81 21 other other JJ 39 81 22 mailboxes mailbox NNS 39 81 23 . . . 39 82 1 This this DT 39 82 2 in in IN 39 82 3 effect effect NN 39 82 4 creates create VBZ 39 82 5 a a DT 39 82 6 discussion discussion NN 39 82 7 group group NN 39 82 8 on on IN 39 82 9 a a DT 39 82 10 particular particular JJ 39 82 11 topic topic NN 39 82 12 . . . 39 83 1 Each each DT 39 83 2 subscriber subscriber NN 39 83 3 sees see VBZ 39 83 4 all all PDT 39 83 5 the the DT 39 83 6 mail mail NN 39 83 7 forwarded forward VBN 39 83 8 by by IN 39 83 9 the the DT 39 83 10 reflector reflector NN 39 83 11 , , , 39 83 12 and and CC 39 83 13 if if IN 39 83 14 one one PRP 39 83 15 wants want VBZ 39 83 16 to to TO 39 83 17 put put VB 39 83 18 his -PRON- PRP$ 39 83 19 " " `` 39 83 20 two two CD 39 83 21 cents cent NNS 39 83 22 " " '' 39 83 23 in in IN 39 83 24 sends send VBZ 39 83 25 a a DT 39 83 26 message message NN 39 83 27 with with IN 39 83 28 the the DT 39 83 29 comments comment NNS 39 83 30 to to IN 39 83 31 the the DT 39 83 32 reflector reflector NN 39 83 33 .... .... . 39 84 1 The the DT 39 84 2 general general JJ 39 84 3 format format NN 39 84 4 to to TO 39 84 5 subscribe subscribe VB 39 84 6 to to IN 39 84 7 a a DT 39 84 8 mail mail NN 39 84 9 list list NN 39 84 10 is be VBZ 39 84 11 to to TO 39 84 12 find find VB 39 84 13 the the DT 39 84 14 address address NN 39 84 15 reflector reflector NN 39 84 16 and and CC 39 84 17 append append VB 39 84 18 the the DT 39 84 19 string string NN 39 84 20 -REQUEST -REQUEST : 39 84 21 to to IN 39 84 22 the the DT 39 84 23 mailbox mailbox NN 39 84 24 name name NN 39 84 25 ( ( -LRB- 39 84 26 not not RB 39 84 27 the the DT 39 84 28 host host NN 39 84 29 name name NN 39 84 30 ) ) -RRB- 39 84 31 . . . 39 85 1 For for IN 39 85 2 example example NN 39 85 3 , , , 39 85 4 if if IN 39 85 5 you -PRON- PRP 39 85 6 wanted want VBD 39 85 7 to to TO 39 85 8 take take VB 39 85 9 part part NN 39 85 10 in in IN 39 85 11 the the DT 39 85 12 mailing mailing NN 39 85 13 list list NN 39 85 14 for for IN 39 85 15 NSFnet NSFnet NNP 39 85 16 reflected reflect VBN 39 85 17 by by IN 39 85 18 NSFNET@NNSC.NSF.NET NSFNET@NNSC.NSF.NET NNP 39 85 19 , , , 39 85 20 one one PRP 39 85 21 sends send VBZ 39 85 22 a a DT 39 85 23 request request NN 39 85 24 to to TO 39 85 25 -5- -5- : 39 85 26 NSFNET NSFNET NNP 39 85 27 - - HYPH 39 85 28 REQUEST@NNSC.NSF.NET REQUEST@NNSC.NSF.NET NNP 39 85 29 . . . 39 86 1 This this DT 39 86 2 may may MD 39 86 3 be be VB 39 86 4 a a DT 39 86 5 wonderful wonderful JJ 39 86 6 scheme scheme NN 39 86 7 , , , 39 86 8 but but CC 39 86 9 the the DT 39 86 10 problem problem NN 39 86 11 is be VBZ 39 86 12 that that IN 39 86 13 you -PRON- PRP 39 86 14 must must MD 39 86 15 know know VB 39 86 16 the the DT 39 86 17 list list NN 39 86 18 exists exist VBZ 39 86 19 in in IN 39 86 20 the the DT 39 86 21 first first JJ 39 86 22 place place NN 39 86 23 . . . 39 87 1 It -PRON- PRP 39 87 2 is be VBZ 39 87 3 suggested suggest VBN 39 87 4 that that IN 39 87 5 , , , 39 87 6 if if IN 39 87 7 you -PRON- PRP 39 87 8 are be VBP 39 87 9 interested interested JJ 39 87 10 , , , 39 87 11 you -PRON- PRP 39 87 12 read read VBP 39 87 13 the the DT 39 87 14 mail mail NN 39 87 15 from from IN 39 87 16 one one CD 39 87 17 list list NN 39 87 18 ( ( -LRB- 39 87 19 like like IN 39 87 20 NSFNET NSFNET NNP 39 87 21 ) ) -RRB- 39 87 22 and and CC 39 87 23 you -PRON- PRP 39 87 24 will will MD 39 87 25 probably probably RB 39 87 26 become become VB 39 87 27 familiar familiar JJ 39 87 28 with with IN 39 87 29 the the DT 39 87 30 existence existence NN 39 87 31 of of IN 39 87 32 others other NNS 39 87 33 . . . 39 88 1 A a DT 39 88 2 registration registration NN 39 88 3 service service NN 39 88 4 for for IN 39 88 5 mail mail NN 39 88 6 reflectors reflector NNS 39 88 7 is be VBZ 39 88 8 provided provide VBN 39 88 9 by by IN 39 88 10 the the DT 39 88 11 NIC NIC NNP 39 88 12 in in IN 39 88 13 the the DT 39 88 14 files file NNS 39 88 15 NETINFO NETINFO NNP 39 88 16 : : : 39 88 17 INTEREST INTEREST NNP 39 88 18 - - HYPH 39 88 19 GROUPS-1.TXT GROUPS-1.TXT NNP 39 88 20 , , , 39 88 21 NETINFO NETINFO NNP 39 88 22 : : : 39 88 23 INTEREST INTEREST NNP 39 88 24 - - HYPH 39 88 25 GROUPS-2.TXT GROUPS-2.TXT NNP 39 88 26 , , , 39 88 27 and and CC 39 88 28 NETINFO NETINFO NNP 39 88 29 : : : 39 88 30 INTEREST INTEREST NNP 39 88 31 - - HYPH 39 88 32 GROUPS- GROUPS- NNP 39 88 33 3.TXT 3.txt CD 39 88 34 . . . 39 89 1 The the DT 39 89 2 NSFNET NSFNET NNP 39 89 3 mail mail NN 39 89 4 reflector reflector NN 39 89 5 is be VBZ 39 89 6 targeted target VBN 39 89 7 at at IN 39 89 8 those those DT 39 89 9 people people NNS 39 89 10 who who WP 39 89 11 have have VBP 39 89 12 a a DT 39 89 13 day day NN 39 89 14 to to IN 39 89 15 day day NN 39 89 16 interest interest NN 39 89 17 in in IN 39 89 18 the the DT 39 89 19 news news NN 39 89 20 of of IN 39 89 21 the the DT 39 89 22 NSFnet NSFnet NNP 39 89 23 ( ( -LRB- 39 89 24 the the DT 39 89 25 backbone backbone NN 39 89 26 , , , 39 89 27 regional regional JJ 39 89 28 network network NN 39 89 29 , , , 39 89 30 and and CC 39 89 31 Internet internet NN 39 89 32 inter inter JJ 39 89 33 - - JJ 39 89 34 connection connection JJ 39 89 35 site site NN 39 89 36 workers worker NNS 39 89 37 ) ) -RRB- 39 89 38 . . . 39 90 1 The the DT 39 90 2 messages message NNS 39 90 3 are be VBP 39 90 4 reflected reflect VBN 39 90 5 by by IN 39 90 6 a a DT 39 90 7 central central JJ 39 90 8 location location NN 39 90 9 and and CC 39 90 10 are be VBP 39 90 11 sent send VBN 39 90 12 as as IN 39 90 13 separate separate JJ 39 90 14 messages message NNS 39 90 15 to to IN 39 90 16 each each DT 39 90 17 subscriber subscriber NN 39 90 18 . . . 39 91 1 This this DT 39 91 2 creates create VBZ 39 91 3 hundreds hundred NNS 39 91 4 of of IN 39 91 5 messages message NNS 39 91 6 on on IN 39 91 7 the the DT 39 91 8 wide wide JJ 39 91 9 area area NN 39 91 10 networks network NNS 39 91 11 where where WRB 39 91 12 bandwidth bandwidth NN 39 91 13 is be VBZ 39 91 14 the the DT 39 91 15 scarcest scarce JJS 39 91 16 . . . 39 92 1 There there EX 39 92 2 are be VBP 39 92 3 two two CD 39 92 4 ways way NNS 39 92 5 in in IN 39 92 6 which which WDT 39 92 7 a a DT 39 92 8 campus campus NN 39 92 9 could could MD 39 92 10 spread spread VB 39 92 11 the the DT 39 92 12 news news NN 39 92 13 and and CC 39 92 14 not not RB 39 92 15 cause cause VB 39 92 16 these these DT 39 92 17 messages message NNS 39 92 18 to to TO 39 92 19 inundate inundate VB 39 92 20 the the DT 39 92 21 wide wide JJ 39 92 22 area area NN 39 92 23 networks network NNS 39 92 24 . . . 39 93 1 One one CD 39 93 2 is be VBZ 39 93 3 to to TO 39 93 4 re re VB 39 93 5 - - VB 39 93 6 reflect reflect VB 39 93 7 the the DT 39 93 8 message message NN 39 93 9 on on IN 39 93 10 the the DT 39 93 11 campus campus NN 39 93 12 . . . 39 94 1 That that RB 39 94 2 is is RB 39 94 3 , , , 39 94 4 set set VBN 39 94 5 up up RP 39 94 6 a a DT 39 94 7 reflector reflector NN 39 94 8 on on IN 39 94 9 a a DT 39 94 10 local local JJ 39 94 11 machine machine NN 39 94 12 which which WDT 39 94 13 forwards forward VBZ 39 94 14 the the DT 39 94 15 message message NN 39 94 16 to to IN 39 94 17 a a DT 39 94 18 campus campus NN 39 94 19 distribution distribution NN 39 94 20 list list NN 39 94 21 . . . 39 95 1 The the DT 39 95 2 other other JJ 39 95 3 is be VBZ 39 95 4 to to TO 39 95 5 create create VB 39 95 6 an an DT 39 95 7 alias alia NNS 39 95 8 on on IN 39 95 9 a a DT 39 95 10 campus campus NN 39 95 11 machine machine NN 39 95 12 which which WDT 39 95 13 places place VBZ 39 95 14 the the DT 39 95 15 messages message NNS 39 95 16 into into IN 39 95 17 a a DT 39 95 18 notesfile notesfile NN 39 95 19 on on IN 39 95 20 the the DT 39 95 21 topic topic NN 39 95 22 . . . 39 96 1 Campus campus NN 39 96 2 users user NNS 39 96 3 who who WP 39 96 4 want want VBP 39 96 5 the the DT 39 96 6 information information NN 39 96 7 could could MD 39 96 8 access access VB 39 96 9 the the DT 39 96 10 notesfile notesfile NN 39 96 11 and and CC 39 96 12 see see VB 39 96 13 the the DT 39 96 14 messages message NNS 39 96 15 that that WDT 39 96 16 have have VBP 39 96 17 been be VBN 39 96 18 sent send VBN 39 96 19 since since IN 39 96 20 their -PRON- PRP$ 39 96 21 last last JJ 39 96 22 access access NN 39 96 23 . . . 39 97 1 One one PRP 39 97 2 might may MD 39 97 3 also also RB 39 97 4 elect elect VB 39 97 5 to to TO 39 97 6 have have VB 39 97 7 the the DT 39 97 8 campus campus NN 39 97 9 wide wide JJ 39 97 10 area area NN 39 97 11 network network NN 39 97 12 liaison liaison NN 39 97 13 screen screen NN 39 97 14 the the DT 39 97 15 messages message NNS 39 97 16 in in IN 39 97 17 either either DT 39 97 18 case case NN 39 97 19 and and CC 39 97 20 only only RB 39 97 21 forward forward RB 39 97 22 those those DT 39 97 23 which which WDT 39 97 24 are be VBP 39 97 25 considered consider VBN 39 97 26 of of IN 39 97 27 merit merit NN 39 97 28 . . . 39 98 1 Either either CC 39 98 2 of of IN 39 98 3 these these DT 39 98 4 schemes scheme NNS 39 98 5 allows allow VBZ 39 98 6 one one CD 39 98 7 message message NN 39 98 8 to to TO 39 98 9 be be VB 39 98 10 sent send VBN 39 98 11 to to IN 39 98 12 the the DT 39 98 13 campus campus NN 39 98 14 , , , 39 98 15 while while IN 39 98 16 allowing allow VBG 39 98 17 wide wide JJ 39 98 18 distribution distribution NN 39 98 19 within within IN 39 98 20 . . . 39 99 1 Address Address NNP 39 99 2 Allocation Allocation NNP 39 99 3 Before before IN 39 99 4 a a DT 39 99 5 local local JJ 39 99 6 network network NN 39 99 7 can can MD 39 99 8 be be VB 39 99 9 connected connect VBN 39 99 10 to to IN 39 99 11 the the DT 39 99 12 Internet internet NN 39 99 13 it -PRON- PRP 39 99 14 must must MD 39 99 15 be be VB 39 99 16 allocated allocate VBN 39 99 17 a a DT 39 99 18 unique unique JJ 39 99 19 IP IP NNP 39 99 20 address address NN 39 99 21 . . . 39 100 1 These these DT 39 100 2 addresses address NNS 39 100 3 are be VBP 39 100 4 allocated allocate VBN 39 100 5 by by IN 39 100 6 ISI ISI NNP 39 100 7 . . . 39 101 1 The the DT 39 101 2 allocation allocation NN 39 101 3 process process NN 39 101 4 consists consist VBZ 39 101 5 of of IN 39 101 6 getting get VBG 39 101 7 an an DT 39 101 8 application application NN 39 101 9 form form NN 39 101 10 received receive VBN 39 101 11 from from IN 39 101 12 ISI ISI NNP 39 101 13 . . . 39 102 1 ( ( -LRB- 39 102 2 Send send VB 39 102 3 a a DT 39 102 4 message message NN 39 102 5 to to IN 39 102 6 hostmaster@sri-nic.arpa hostmaster@sri-nic.arpa NNP 39 102 7 and and CC 39 102 8 ask ask VB 39 102 9 for for IN 39 102 10 the the DT 39 102 11 template template NN 39 102 12 for for IN 39 102 13 a a DT 39 102 14 connected connected JJ 39 102 15 address address NN 39 102 16 ) ) -RRB- 39 102 17 . . . 39 103 1 This this DT 39 103 2 template template NN 39 103 3 is be VBZ 39 103 4 filled fill VBN 39 103 5 out out RP 39 103 6 and and CC 39 103 7 mailed mail VBN 39 103 8 back back RB 39 103 9 to to IN 39 103 10 hostmaster hostmaster NNP 39 103 11 . . . 39 104 1 An an DT 39 104 2 address address NN 39 104 3 is be VBZ 39 104 4 allocated allocate VBN 39 104 5 and and CC 39 104 6 e e NNP 39 104 7 - - VBN 39 104 8 mailed mail VBN 39 104 9 back back RB 39 104 10 to to IN 39 104 11 you -PRON- PRP 39 104 12 . . . 39 105 1 This this DT 39 105 2 can can MD 39 105 3 also also RB 39 105 4 be be VB 39 105 5 done do VBN 39 105 6 by by IN 39 105 7 postal postal JJ 39 105 8 mail mail NN 39 105 9 ( ( -LRB- 39 105 10 Appendix Appendix NNP 39 105 11 B B NNP 39 105 12 ) ) -RRB- 39 105 13 . . . 39 106 1 IP ip NN 39 106 2 addresses address NNS 39 106 3 are be VBP 39 106 4 32 32 CD 39 106 5 bits bit NNS 39 106 6 long long JJ 39 106 7 . . . 39 107 1 It -PRON- PRP 39 107 2 is be VBZ 39 107 3 usually usually RB 39 107 4 written write VBN 39 107 5 as as IN 39 107 6 four four CD 39 107 7 decimal decimal JJ 39 107 8 numbers number NNS 39 107 9 separated separate VBN 39 107 10 by by IN 39 107 11 periods period NNS 39 107 12 ( ( -LRB- 39 107 13 e.g. e.g. RB 39 107 14 , , , 39 107 15 192.17.5.100 192.17.5.100 CD 39 107 16 ) ) -RRB- 39 107 17 . . . 39 108 1 Each each DT 39 108 2 number number NN 39 108 3 is be VBZ 39 108 4 the the DT 39 108 5 value value NN 39 108 6 of of IN 39 108 7 an an DT 39 108 8 octet octet NN 39 108 9 of of IN 39 108 10 the the DT 39 108 11 32 32 CD 39 108 12 bits bit NNS 39 108 13 . . . 39 109 1 It -PRON- PRP 39 109 2 was be VBD 39 109 3 seen see VBN 39 109 4 from from IN 39 109 5 the the DT 39 109 6 beginning beginning NN 39 109 7 that that IN 39 109 8 some some DT 39 109 9 networks network NNS 39 109 10 might may MD 39 109 11 choose choose VB 39 109 12 to to TO 39 109 13 organize organize VB 39 109 14 themselves -PRON- PRP 39 109 15 as as IN 39 109 16 very very RB 39 109 17 flat flat JJ 39 109 18 ( ( -LRB- 39 109 19 one one CD 39 109 20 net net NN 39 109 21 with with IN 39 109 22 a a DT 39 109 23 lot lot NN 39 109 24 of of IN 39 109 25 nodes node NNS 39 109 26 ) ) -RRB- 39 109 27 and and CC 39 109 28 some some DT 39 109 29 might may MD 39 109 30 organize organize VB 39 109 31 hierarchically hierarchically RB 39 109 32 -6- -6- NFP 39 109 33 ( ( -LRB- 39 109 34 many many JJ 39 109 35 interconnected interconnected JJ 39 109 36 nets net NNS 39 109 37 with with IN 39 109 38 fewer few JJR 39 109 39 nodes node NNS 39 109 40 each each DT 39 109 41 and and CC 39 109 42 a a DT 39 109 43 backbone backbone NN 39 109 44 ) ) -RRB- 39 109 45 . . . 39 110 1 To to TO 39 110 2 provide provide VB 39 110 3 for for IN 39 110 4 these these DT 39 110 5 cases case NNS 39 110 6 , , , 39 110 7 addresses address NNS 39 110 8 were be VBD 39 110 9 differentiated differentiate VBN 39 110 10 into into IN 39 110 11 class class NN 39 110 12 A a NN 39 110 13 , , , 39 110 14 B b NN 39 110 15 , , , 39 110 16 and and CC 39 110 17 C c NN 39 110 18 networks network NNS 39 110 19 . . . 39 111 1 This this DT 39 111 2 classification classification NN 39 111 3 had have VBD 39 111 4 to to IN 39 111 5 with with IN 39 111 6 the the DT 39 111 7 interpretation interpretation NN 39 111 8 of of IN 39 111 9 the the DT 39 111 10 octets octet NNS 39 111 11 . . . 39 112 1 Class class NN 39 112 2 A a NN 39 112 3 networks network NNS 39 112 4 have have VBP 39 112 5 the the DT 39 112 6 first first JJ 39 112 7 octet octet NN 39 112 8 as as IN 39 112 9 a a DT 39 112 10 network network NN 39 112 11 address address NN 39 112 12 and and CC 39 112 13 the the DT 39 112 14 remaining remain VBG 39 112 15 three three CD 39 112 16 as as IN 39 112 17 a a DT 39 112 18 host host NN 39 112 19 address address NN 39 112 20 on on IN 39 112 21 that that DT 39 112 22 network network NN 39 112 23 . . . 39 113 1 Class class NN 39 113 2 C C NNP 39 113 3 addresses address NNS 39 113 4 have have VBP 39 113 5 three three CD 39 113 6 octets octet NNS 39 113 7 of of IN 39 113 8 network network NN 39 113 9 address address NN 39 113 10 and and CC 39 113 11 one one CD 39 113 12 of of IN 39 113 13 host host NN 39 113 14 . . . 39 114 1 Class class NN 39 114 2 B B NNP 39 114 3 is be VBZ 39 114 4 split split VBN 39 114 5 two two CD 39 114 6 and and CC 39 114 7 two two CD 39 114 8 . . . 39 115 1 Therefore therefore RB 39 115 2 , , , 39 115 3 there there EX 39 115 4 is be VBZ 39 115 5 an an DT 39 115 6 address address NN 39 115 7 space space NN 39 115 8 for for IN 39 115 9 a a DT 39 115 10 few few JJ 39 115 11 large large JJ 39 115 12 nets net NNS 39 115 13 , , , 39 115 14 a a DT 39 115 15 reasonable reasonable JJ 39 115 16 number number NN 39 115 17 of of IN 39 115 18 medium medium JJ 39 115 19 nets net NNS 39 115 20 and and CC 39 115 21 a a DT 39 115 22 large large JJ 39 115 23 number number NN 39 115 24 of of IN 39 115 25 small small JJ 39 115 26 nets net NNS 39 115 27 . . . 39 116 1 The the DT 39 116 2 top top JJ 39 116 3 two two CD 39 116 4 bits bit NNS 39 116 5 in in IN 39 116 6 the the DT 39 116 7 first first JJ 39 116 8 octet octet NN 39 116 9 are be VBP 39 116 10 coded code VBN 39 116 11 to to TO 39 116 12 tell tell VB 39 116 13 the the DT 39 116 14 address address NN 39 116 15 format format NN 39 116 16 . . . 39 117 1 All all DT 39 117 2 of of IN 39 117 3 the the DT 39 117 4 class class NN 39 117 5 A a NN 39 117 6 nets net NNS 39 117 7 have have VBP 39 117 8 been be VBN 39 117 9 allocated allocate VBN 39 117 10 . . . 39 118 1 So so RB 39 118 2 one one PRP 39 118 3 has have VBZ 39 118 4 to to TO 39 118 5 choose choose VB 39 118 6 between between IN 39 118 7 Class Class NNP 39 118 8 B B NNP 39 118 9 and and CC 39 118 10 Class Class NNP 39 118 11 C C NNP 39 118 12 when when WRB 39 118 13 placing place VBG 39 118 14 an an DT 39 118 15 order order NN 39 118 16 . . . 39 119 1 ( ( -LRB- 39 119 2 There there EX 39 119 3 are be VBP 39 119 4 also also RB 39 119 5 class class NN 39 119 6 D d NN 39 119 7 ( ( -LRB- 39 119 8 Multicast Multicast NNP 39 119 9 ) ) -RRB- 39 119 10 and and CC 39 119 11 E e NN 39 119 12 ( ( -LRB- 39 119 13 Experimental Experimental NNP 39 119 14 ) ) -RRB- 39 119 15 formats format NNS 39 119 16 . . . 39 120 1 Multicast multicast JJ 39 120 2 addresses address NNS 39 120 3 will will MD 39 120 4 likely likely RB 39 120 5 come come VB 39 120 6 into into IN 39 120 7 greater great JJR 39 120 8 use use NN 39 120 9 in in IN 39 120 10 the the DT 39 120 11 near near JJ 39 120 12 future future NN 39 120 13 , , , 39 120 14 but but CC 39 120 15 are be VBP 39 120 16 not not RB 39 120 17 frequently frequently RB 39 120 18 used use VBN 39 120 19 now now RB 39 120 20 ) ) -RRB- 39 120 21 . . . 39 121 1 In in IN 39 121 2 the the DT 39 121 3 past past JJ 39 121 4 sites site NNS 39 121 5 requiring require VBG 39 121 6 multiple multiple JJ 39 121 7 network network NN 39 121 8 addresses address NNS 39 121 9 requested request VBD 39 121 10 multiple multiple JJ 39 121 11 discrete discrete JJ 39 121 12 addresses address NNS 39 121 13 ( ( -LRB- 39 121 14 usually usually RB 39 121 15 Class Class NNP 39 121 16 C C NNP 39 121 17 ) ) -RRB- 39 121 18 . . . 39 122 1 This this DT 39 122 2 was be VBD 39 122 3 done do VBN 39 122 4 because because IN 39 122 5 much much JJ 39 122 6 of of IN 39 122 7 the the DT 39 122 8 software software NN 39 122 9 available available JJ 39 122 10 ( ( -LRB- 39 122 11 not not RB 39 122 12 ably ably RB 39 122 13 4.2BSD 4.2bsd CD 39 122 14 ) ) -RRB- 39 122 15 could could MD 39 122 16 not not RB 39 122 17 deal deal VB 39 122 18 with with IN 39 122 19 subnetted subnette VBN 39 122 20 addresses address NNS 39 122 21 . . . 39 123 1 Information information NN 39 123 2 on on IN 39 123 3 how how WRB 39 123 4 to to TO 39 123 5 reach reach VB 39 123 6 a a DT 39 123 7 particular particular JJ 39 123 8 network network NN 39 123 9 ( ( -LRB- 39 123 10 routing route VBG 39 123 11 information information NN 39 123 12 ) ) -RRB- 39 123 13 must must MD 39 123 14 be be VB 39 123 15 stored store VBN 39 123 16 in in IN 39 123 17 Internet internet NN 39 123 18 gateways gateway NNS 39 123 19 and and CC 39 123 20 packet packet NN 39 123 21 switches switch NNS 39 123 22 . . . 39 124 1 Some some DT 39 124 2 of of IN 39 124 3 these these DT 39 124 4 nodes node NNS 39 124 5 have have VBP 39 124 6 a a DT 39 124 7 limited limit VBN 39 124 8 capability capability NN 39 124 9 to to TO 39 124 10 store store VB 39 124 11 and and CC 39 124 12 exchange exchange NN 39 124 13 routing routing NN 39 124 14 information information NN 39 124 15 ( ( -LRB- 39 124 16 limited limited JJ 39 124 17 to to IN 39 124 18 about about IN 39 124 19 300 300 CD 39 124 20 networks network NNS 39 124 21 ) ) -RRB- 39 124 22 . . . 39 125 1 Therefore therefore RB 39 125 2 , , , 39 125 3 it -PRON- PRP 39 125 4 is be VBZ 39 125 5 suggested suggest VBN 39 125 6 that that IN 39 125 7 any any DT 39 125 8 campus campus NN 39 125 9 announce announce NN 39 125 10 ( ( -LRB- 39 125 11 make make VBP 39 125 12 known know VBN 39 125 13 to to IN 39 125 14 the the DT 39 125 15 Internet internet NN 39 125 16 ) ) -RRB- 39 125 17 no no DT 39 125 18 more more JJR 39 125 19 than than IN 39 125 20 two two CD 39 125 21 discrete discrete JJ 39 125 22 network network NN 39 125 23 numbers number NNS 39 125 24 . . . 39 126 1 If if IN 39 126 2 a a DT 39 126 3 campus campus NN 39 126 4 expects expect VBZ 39 126 5 to to TO 39 126 6 be be VB 39 126 7 constrained constrain VBN 39 126 8 by by IN 39 126 9 this this DT 39 126 10 , , , 39 126 11 it -PRON- PRP 39 126 12 should should MD 39 126 13 consider consider VB 39 126 14 subnetting subnette VBG 39 126 15 . . . 39 127 1 Subnetting subnetting NN 39 127 2 ( ( -LRB- 39 127 3 RFC-932 rfc-932 RB 39 127 4 ) ) -RRB- 39 127 5 allows allow VBZ 39 127 6 one one PRP 39 127 7 to to TO 39 127 8 announce announce VB 39 127 9 one one CD 39 127 10 address address NN 39 127 11 to to IN 39 127 12 the the DT 39 127 13 Internet internet NN 39 127 14 and and CC 39 127 15 use use VB 39 127 16 a a DT 39 127 17 set set NN 39 127 18 of of IN 39 127 19 addresses address NNS 39 127 20 on on IN 39 127 21 the the DT 39 127 22 campus campus NN 39 127 23 . . . 39 128 1 Basically basically RB 39 128 2 , , , 39 128 3 one one NN 39 128 4 defines define VBZ 39 128 5 a a DT 39 128 6 mask mask NN 39 128 7 which which WDT 39 128 8 allows allow VBZ 39 128 9 the the DT 39 128 10 network network NN 39 128 11 to to TO 39 128 12 differentiate differentiate VB 39 128 13 between between IN 39 128 14 the the DT 39 128 15 network network NN 39 128 16 portion portion NN 39 128 17 and and CC 39 128 18 host host NN 39 128 19 portion portion NN 39 128 20 of of IN 39 128 21 the the DT 39 128 22 address address NN 39 128 23 . . . 39 129 1 By by IN 39 129 2 using use VBG 39 129 3 a a DT 39 129 4 different different JJ 39 129 5 mask mask NN 39 129 6 on on IN 39 129 7 the the DT 39 129 8 Internet internet NN 39 129 9 and and CC 39 129 10 the the DT 39 129 11 campus campus NN 39 129 12 , , , 39 129 13 the the DT 39 129 14 address address NN 39 129 15 can can MD 39 129 16 be be VB 39 129 17 interpreted interpret VBN 39 129 18 in in IN 39 129 19 multiple multiple JJ 39 129 20 ways way NNS 39 129 21 . . . 39 130 1 For for IN 39 130 2 example example NN 39 130 3 , , , 39 130 4 if if IN 39 130 5 a a DT 39 130 6 campus campus NN 39 130 7 requires require VBZ 39 130 8 two two CD 39 130 9 networks network NNS 39 130 10 internally internally RB 39 130 11 and and CC 39 130 12 has have VBZ 39 130 13 the the DT 39 130 14 32,000 32,000 CD 39 130 15 addresses address NNS 39 130 16 beginning begin VBG 39 130 17 128.174.X.X 128.174.x.x CD 39 130 18 ( ( -LRB- 39 130 19 a a DT 39 130 20 Class Class NNP 39 130 21 B B NNP 39 130 22 address address NN 39 130 23 ) ) -RRB- 39 130 24 allocated allocate VBD 39 130 25 to to IN 39 130 26 it -PRON- PRP 39 130 27 , , , 39 130 28 the the DT 39 130 29 campus campus NN 39 130 30 could could MD 39 130 31 allocate allocate VB 39 130 32 128.174.5.X 128.174.5.x CD 39 130 33 to to IN 39 130 34 one one CD 39 130 35 part part NN 39 130 36 of of IN 39 130 37 campus campus NN 39 130 38 and and CC 39 130 39 128.174.10.X 128.174.10.x CD 39 130 40 to to IN 39 130 41 another another DT 39 130 42 . . . 39 131 1 By by IN 39 131 2 advertising advertising NN 39 131 3 128.174 128.174 CD 39 131 4 to to IN 39 131 5 the the DT 39 131 6 Internet internet NN 39 131 7 with with IN 39 131 8 a a DT 39 131 9 subnet subnet NN 39 131 10 mask mask NN 39 131 11 of of IN 39 131 12 FF.FF.00.00 FF.FF.00.00 NNP 39 131 13 , , , 39 131 14 the the DT 39 131 15 Internet internet NN 39 131 16 would would MD 39 131 17 treat treat VB 39 131 18 these these DT 39 131 19 two two CD 39 131 20 addresses address NNS 39 131 21 as as IN 39 131 22 one one CD 39 131 23 . . . 39 132 1 Within within IN 39 132 2 the the DT 39 132 3 campus campus NN 39 132 4 a a DT 39 132 5 mask mask NN 39 132 6 of of IN 39 132 7 FF.FF.FF.00 FF.FF.FF.00 : 39 132 8 would would MD 39 132 9 be be VB 39 132 10 used use VBN 39 132 11 , , , 39 132 12 allowing allow VBG 39 132 13 the the DT 39 132 14 campus campus NN 39 132 15 to to TO 39 132 16 treat treat VB 39 132 17 the the DT 39 132 18 addresses address NNS 39 132 19 as as IN 39 132 20 separate separate JJ 39 132 21 entities entity NNS 39 132 22 . . . 39 133 1 ( ( -LRB- 39 133 2 In in IN 39 133 3 reality reality NN 39 133 4 you -PRON- PRP 39 133 5 do do VBP 39 133 6 n't not RB 39 133 7 pass pass VB 39 133 8 the the DT 39 133 9 subnet subnet NN 39 133 10 mask mask NN 39 133 11 of of IN 39 133 12 FF.FF.00.00 FF.FF.00.00 NNP 39 133 13 to to IN 39 133 14 the the DT 39 133 15 Internet internet NN 39 133 16 , , , 39 133 17 the the DT 39 133 18 octet octet JJ 39 133 19 meaning meaning NN 39 133 20 is be VBZ 39 133 21 implicit implicit JJ 39 133 22 in in IN 39 133 23 its -PRON- PRP$ 39 133 24 being be VBG 39 133 25 a a DT 39 133 26 class class NN 39 133 27 B b NN 39 133 28 address address NN 39 133 29 ) ) -RRB- 39 133 30 . . . 39 134 1 A a DT 39 134 2 word word NN 39 134 3 of of IN 39 134 4 warning warning NN 39 134 5 is be VBZ 39 134 6 necessary necessary JJ 39 134 7 . . . 39 135 1 Not not RB 39 135 2 all all DT 39 135 3 systems system NNS 39 135 4 know know VBP 39 135 5 how how WRB 39 135 6 to to TO 39 135 7 do do VB 39 135 8 subnetting subnetting NN 39 135 9 . . . 39 136 1 Some some DT 39 136 2 4.2BSD 4.2bsd CD 39 136 3 systems system NNS 39 136 4 require require VBP 39 136 5 additional additional JJ 39 136 6 software software NN 39 136 7 . . . 39 137 1 4.3BSD 4.3bsd CD 39 137 2 systems system NNS 39 137 3 subnet subnet VBP 39 137 4 as as IN 39 137 5 released release VBN 39 137 6 . . . 39 138 1 Other other JJ 39 138 2 devices device NNS 39 138 3 -7- -7- : 39 138 4 and and CC 39 138 5 operating operating NN 39 138 6 systems system NNS 39 138 7 vary vary VBP 39 138 8 in in IN 39 138 9 the the DT 39 138 10 problems problem NNS 39 138 11 they -PRON- PRP 39 138 12 have have VBP 39 138 13 dealing deal VBG 39 138 14 with with IN 39 138 15 subnets subnet NNS 39 138 16 . . . 39 139 1 Frequently frequently RB 39 139 2 these these DT 39 139 3 machines machine NNS 39 139 4 can can MD 39 139 5 be be VB 39 139 6 used use VBN 39 139 7 as as IN 39 139 8 a a DT 39 139 9 leaf leaf NN 39 139 10 on on IN 39 139 11 a a DT 39 139 12 network network NN 39 139 13 but but CC 39 139 14 not not RB 39 139 15 as as IN 39 139 16 a a DT 39 139 17 gateway gateway NN 39 139 18 within within IN 39 139 19 the the DT 39 139 20 subnetted subnette VBN 39 139 21 portion portion NN 39 139 22 of of IN 39 139 23 the the DT 39 139 24 network network NN 39 139 25 . . . 39 140 1 As as IN 39 140 2 time time NN 39 140 3 passes pass VBZ 39 140 4 and and CC 39 140 5 more more JJR 39 140 6 systems system NNS 39 140 7 become become VBP 39 140 8 4.3BSD 4.3bsd CD 39 140 9 based base VBN 39 140 10 , , , 39 140 11 these these DT 39 140 12 problems problem NNS 39 140 13 should should MD 39 140 14 disappear disappear VB 39 140 15 . . . 39 141 1 There there EX 39 141 2 has have VBZ 39 141 3 been be VBN 39 141 4 some some DT 39 141 5 confusion confusion NN 39 141 6 in in IN 39 141 7 the the DT 39 141 8 past past NN 39 141 9 over over IN 39 141 10 the the DT 39 141 11 format format NN 39 141 12 of of IN 39 141 13 an an DT 39 141 14 IP IP NNP 39 141 15 broadcast broadcast NN 39 141 16 address address NN 39 141 17 . . . 39 142 1 Some some DT 39 142 2 machines machine NNS 39 142 3 used use VBD 39 142 4 an an DT 39 142 5 address address NN 39 142 6 of of IN 39 142 7 all all DT 39 142 8 zeros zero NNS 39 142 9 to to TO 39 142 10 mean mean VB 39 142 11 broadcast broadcast NN 39 142 12 and and CC 39 142 13 some some DT 39 142 14 all all DT 39 142 15 ones one NNS 39 142 16 . . . 39 143 1 This this DT 39 143 2 was be VBD 39 143 3 confusing confusing JJ 39 143 4 when when WRB 39 143 5 machines machine NNS 39 143 6 of of IN 39 143 7 both both DT 39 143 8 type type NN 39 143 9 were be VBD 39 143 10 connected connect VBN 39 143 11 to to IN 39 143 12 the the DT 39 143 13 same same JJ 39 143 14 network network NN 39 143 15 . . . 39 144 1 The the DT 39 144 2 broadcast broadcast NN 39 144 3 address address NN 39 144 4 of of IN 39 144 5 all all DT 39 144 6 ones one NNS 39 144 7 has have VBZ 39 144 8 been be VBN 39 144 9 adopted adopt VBN 39 144 10 to to TO 39 144 11 end end VB 39 144 12 the the DT 39 144 13 grief grief NN 39 144 14 . . . 39 145 1 Some some DT 39 145 2 systems system NNS 39 145 3 ( ( -LRB- 39 145 4 e.g. e.g. RB 39 146 1 4.2 4.2 CD 39 146 2 BSD BSD NNP 39 146 3 ) ) -RRB- 39 146 4 allow allow VBP 39 146 5 one one PRP 39 146 6 to to TO 39 146 7 choose choose VB 39 146 8 the the DT 39 146 9 format format NN 39 146 10 of of IN 39 146 11 the the DT 39 146 12 broadcast broadcast NN 39 146 13 address address NN 39 146 14 . . . 39 147 1 If if IN 39 147 2 a a DT 39 147 3 system system NN 39 147 4 does do VBZ 39 147 5 allow allow VB 39 147 6 this this DT 39 147 7 choice choice NN 39 147 8 , , , 39 147 9 care care NN 39 147 10 should should MD 39 147 11 be be VB 39 147 12 taken take VBN 39 147 13 that that IN 39 147 14 the the DT 39 147 15 all all DT 39 147 16 ones one NNS 39 147 17 format format NN 39 147 18 is be VBZ 39 147 19 chosen choose VBN 39 147 20 . . . 39 148 1 ( ( -LRB- 39 148 2 This this DT 39 148 3 is be VBZ 39 148 4 explained explain VBN 39 148 5 in in IN 39 148 6 RFC-1009 RFC-1009 NNP 39 148 7 and and CC 39 148 8 RFC-1010 RFC-1010 NNP 39 148 9 ) ) -RRB- 39 148 10 . . . 39 149 1 Internet internet NN 39 149 2 Problems problem NNS 39 149 3 There there EX 39 149 4 are be VBP 39 149 5 a a DT 39 149 6 number number NN 39 149 7 of of IN 39 149 8 problems problem NNS 39 149 9 with with IN 39 149 10 the the DT 39 149 11 Internet internet NN 39 149 12 . . . 39 150 1 Solutions solution NNS 39 150 2 to to IN 39 150 3 the the DT 39 150 4 problems problem NNS 39 150 5 range range VBP 39 150 6 from from IN 39 150 7 software software NN 39 150 8 changes change NNS 39 150 9 to to IN 39 150 10 long long JJ 39 150 11 term term NN 39 150 12 research research NN 39 150 13 projects project NNS 39 150 14 . . . 39 151 1 Some some DT 39 151 2 of of IN 39 151 3 the the DT 39 151 4 major major JJ 39 151 5 ones one NNS 39 151 6 are be VBP 39 151 7 detailed detail VBN 39 151 8 below below IN 39 151 9 : : : 39 151 10 Number number NN 39 151 11 of of IN 39 151 12 Networks Networks NNP 39 151 13 When when WRB 39 151 14 the the DT 39 151 15 Internet internet NN 39 151 16 was be VBD 39 151 17 designed design VBN 39 151 18 it -PRON- PRP 39 151 19 was be VBD 39 151 20 to to TO 39 151 21 have have VB 39 151 22 about about RB 39 151 23 50 50 CD 39 151 24 connected connected JJ 39 151 25 networks network NNS 39 151 26 . . . 39 152 1 With with IN 39 152 2 the the DT 39 152 3 explosion explosion NN 39 152 4 of of IN 39 152 5 networking networking NN 39 152 6 , , , 39 152 7 the the DT 39 152 8 number number NN 39 152 9 is be VBZ 39 152 10 now now RB 39 152 11 approaching approach VBG 39 152 12 300 300 CD 39 152 13 . . . 39 153 1 The the DT 39 153 2 software software NN 39 153 3 in in IN 39 153 4 a a DT 39 153 5 group group NN 39 153 6 of of IN 39 153 7 critical critical JJ 39 153 8 gateways gateway NNS 39 153 9 ( ( -LRB- 39 153 10 called call VBN 39 153 11 the the DT 39 153 12 core core NN 39 153 13 gateways gateway NNS 39 153 14 of of IN 39 153 15 the the DT 39 153 16 ARPAnet arpanet NN 39 153 17 ) ) -RRB- 39 153 18 are be VBP 39 153 19 not not RB 39 153 20 able able JJ 39 153 21 to to TO 39 153 22 pass pass VB 39 153 23 or or CC 39 153 24 store store VB 39 153 25 much much RB 39 153 26 more more JJR 39 153 27 than than IN 39 153 28 that that DT 39 153 29 number number NN 39 153 30 . . . 39 154 1 In in IN 39 154 2 the the DT 39 154 3 short short JJ 39 154 4 term term NN 39 154 5 , , , 39 154 6 core core NN 39 154 7 reallocation reallocation NN 39 154 8 and and CC 39 154 9 recoding recoding NN 39 154 10 has have VBZ 39 154 11 raised raise VBN 39 154 12 the the DT 39 154 13 number number NN 39 154 14 slightly slightly RB 39 154 15 . . . 39 155 1 By by IN 39 155 2 the the DT 39 155 3 summer summer NN 39 155 4 of of IN 39 155 5 ' ' CD 39 155 6 88 88 CD 39 155 7 the the DT 39 155 8 current current JJ 39 155 9 PDP-11 pdp-11 JJ 39 155 10 core core NN 39 155 11 gateways gateway NNS 39 155 12 will will MD 39 155 13 be be VB 39 155 14 replaced replace VBN 39 155 15 with with IN 39 155 16 BBN BBN NNP 39 155 17 Butterfly Butterfly NNP 39 155 18 gateways gateway NNS 39 155 19 which which WDT 39 155 20 will will MD 39 155 21 solve solve VB 39 155 22 the the DT 39 155 23 problem problem NN 39 155 24 . . . 39 156 1 Routing route VBG 39 156 2 Issues issue NNS 39 156 3 Along along IN 39 156 4 with with IN 39 156 5 sheer sheer JJ 39 156 6 mass mass NN 39 156 7 of of IN 39 156 8 the the DT 39 156 9 data datum NNS 39 156 10 necessary necessary JJ 39 156 11 to to TO 39 156 12 route route VB 39 156 13 packets packet NNS 39 156 14 to to IN 39 156 15 a a DT 39 156 16 large large JJ 39 156 17 number number NN 39 156 18 of of IN 39 156 19 networks network NNS 39 156 20 , , , 39 156 21 there there EX 39 156 22 are be VBP 39 156 23 many many JJ 39 156 24 problems problem NNS 39 156 25 with with IN 39 156 26 the the DT 39 156 27 updating updating NN 39 156 28 , , , 39 156 29 stability stability NN 39 156 30 , , , 39 156 31 and and CC 39 156 32 optimality optimality NN 39 156 33 of of IN 39 156 34 the the DT 39 156 35 routing route VBG 39 156 36 algorithms algorithm NNS 39 156 37 . . . 39 157 1 Much much JJ 39 157 2 research research NN 39 157 3 is be VBZ 39 157 4 being be VBG 39 157 5 done do VBN 39 157 6 in in IN 39 157 7 the the DT 39 157 8 area area NN 39 157 9 , , , 39 157 10 but but CC 39 157 11 the the DT 39 157 12 optimal optimal JJ 39 157 13 solution solution NN 39 157 14 to to IN 39 157 15 these these DT 39 157 16 routing routing NN 39 157 17 problems problem NNS 39 157 18 is be VBZ 39 157 19 still still RB 39 157 20 years year NNS 39 157 21 away away RB 39 157 22 . . . 39 158 1 In in IN 39 158 2 most most JJS 39 158 3 cases case NNS 39 158 4 the the DT 39 158 5 the the DT 39 158 6 routing routing NN 39 158 7 we -PRON- PRP 39 158 8 have have VBP 39 158 9 today today NN 39 158 10 works work NNS 39 158 11 , , , 39 158 12 but but CC 39 158 13 sub sub NN 39 158 14 - - HYPH 39 158 15 optimally optimally RB 39 158 16 and and CC 39 158 17 sometimes sometimes RB 39 158 18 unpredictably unpredictably RB 39 158 19 . . . 39 159 1 -8- -8- NFP 39 159 2 Trust Trust NNP 39 159 3 Issues Issues NNPS 39 159 4 Gateways Gateways NNP 39 159 5 exchange exchange NN 39 159 6 network network NN 39 159 7 routing route VBG 39 159 8 information information NN 39 159 9 . . . 39 160 1 Currently currently RB 39 160 2 , , , 39 160 3 most most JJS 39 160 4 gateways gateway NNS 39 160 5 accept accept VBP 39 160 6 on on IN 39 160 7 faith faith NN 39 160 8 that that IN 39 160 9 the the DT 39 160 10 information information NN 39 160 11 provided provide VBD 39 160 12 about about IN 39 160 13 the the DT 39 160 14 state state NN 39 160 15 of of IN 39 160 16 the the DT 39 160 17 network network NN 39 160 18 is be VBZ 39 160 19 correct correct JJ 39 160 20 . . . 39 161 1 In in IN 39 161 2 the the DT 39 161 3 past past NN 39 161 4 this this DT 39 161 5 was be VBD 39 161 6 not not RB 39 161 7 a a DT 39 161 8 big big JJ 39 161 9 problem problem NN 39 161 10 since since IN 39 161 11 most most JJS 39 161 12 of of IN 39 161 13 the the DT 39 161 14 gateways gateway NNS 39 161 15 belonged belong VBD 39 161 16 to to IN 39 161 17 a a DT 39 161 18 single single JJ 39 161 19 administrative administrative JJ 39 161 20 entity entity NN 39 161 21 ( ( -LRB- 39 161 22 DARPA DARPA NNP 39 161 23 ) ) -RRB- 39 161 24 . . . 39 162 1 Now now RB 39 162 2 with with IN 39 162 3 multiple multiple JJ 39 162 4 wide wide JJ 39 162 5 area area NN 39 162 6 networks network NNS 39 162 7 under under IN 39 162 8 different different JJ 39 162 9 administrations administration NNS 39 162 10 , , , 39 162 11 a a DT 39 162 12 rogue rogue JJ 39 162 13 gateway gateway NN 39 162 14 somewhere somewhere RB 39 162 15 in in IN 39 162 16 the the DT 39 162 17 net net NN 39 162 18 could could MD 39 162 19 cripple cripple VB 39 162 20 the the DT 39 162 21 Internet internet NN 39 162 22 . . . 39 163 1 There there EX 39 163 2 is be VBZ 39 163 3 design design NN 39 163 4 work work NN 39 163 5 going go VBG 39 163 6 on on RP 39 163 7 to to TO 39 163 8 solve solve VB 39 163 9 both both CC 39 163 10 the the DT 39 163 11 problem problem NN 39 163 12 of of IN 39 163 13 a a DT 39 163 14 gateway gateway NN 39 163 15 doing do VBG 39 163 16 unreasonable unreasonable JJ 39 163 17 things thing NNS 39 163 18 and and CC 39 163 19 providing provide VBG 39 163 20 enough enough JJ 39 163 21 information information NN 39 163 22 to to TO 39 163 23 reasonably reasonably RB 39 163 24 route route VB 39 163 25 data datum NNS 39 163 26 between between IN 39 163 27 multiply multiply JJ 39 163 28 connected connect VBN 39 163 29 networks network NNS 39 163 30 ( ( -LRB- 39 163 31 multi multi JJ 39 163 32 - - JJ 39 163 33 homed homed JJ 39 163 34 networks network NNS 39 163 35 ) ) -RRB- 39 163 36 . . . 39 164 1 Capacity Capacity NNP 39 164 2 & & CC 39 164 3 Congestion Congestion NNP 39 164 4 Many many JJ 39 164 5 portions portion NNS 39 164 6 of of IN 39 164 7 the the DT 39 164 8 ARPAnet arpanet NN 39 164 9 are be VBP 39 164 10 very very RB 39 164 11 congested congested JJ 39 164 12 during during IN 39 164 13 the the DT 39 164 14 busy busy JJ 39 164 15 part part NN 39 164 16 of of IN 39 164 17 the the DT 39 164 18 day day NN 39 164 19 . . . 39 165 1 Additional additional JJ 39 165 2 links link NNS 39 165 3 are be VBP 39 165 4 planned plan VBN 39 165 5 to to TO 39 165 6 alleviate alleviate VB 39 165 7 this this DT 39 165 8 congestion congestion NN 39 165 9 , , , 39 165 10 but but CC 39 165 11 the the DT 39 165 12 implementation implementation NN 39 165 13 will will MD 39 165 14 take take VB 39 165 15 a a DT 39 165 16 few few JJ 39 165 17 months month NNS 39 165 18 . . . 39 166 1 These these DT 39 166 2 problems problem NNS 39 166 3 and and CC 39 166 4 the the DT 39 166 5 future future JJ 39 166 6 direction direction NN 39 166 7 of of IN 39 166 8 the the DT 39 166 9 Internet internet NN 39 166 10 are be VBP 39 166 11 determined determine VBN 39 166 12 by by IN 39 166 13 the the DT 39 166 14 Internet internet NN 39 166 15 Architect Architect NNP 39 166 16 ( ( -LRB- 39 166 17 Dave Dave NNP 39 166 18 Clark Clark NNP 39 166 19 of of IN 39 166 20 MIT MIT NNP 39 166 21 ) ) -RRB- 39 166 22 being be VBG 39 166 23 advised advise VBN 39 166 24 by by IN 39 166 25 the the DT 39 166 26 Internet Internet NNP 39 166 27 Activities Activities NNPS 39 166 28 Board Board NNP 39 166 29 ( ( -LRB- 39 166 30 IAB IAB NNP 39 166 31 ) ) -RRB- 39 166 32 . . . 39 167 1 This this DT 39 167 2 board board NN 39 167 3 is be VBZ 39 167 4 composed compose VBN 39 167 5 of of IN 39 167 6 chairmen chairman NNS 39 167 7 of of IN 39 167 8 a a DT 39 167 9 number number NN 39 167 10 of of IN 39 167 11 committees committee NNS 39 167 12 with with IN 39 167 13 responsibility responsibility NN 39 167 14 for for IN 39 167 15 various various JJ 39 167 16 specialized specialized JJ 39 167 17 areas area NNS 39 167 18 of of IN 39 167 19 the the DT 39 167 20 Internet internet NN 39 167 21 . . . 39 168 1 The the DT 39 168 2 committees committee NNS 39 168 3 composing compose VBG 39 168 4 the the DT 39 168 5 IAB IAB NNP 39 168 6 and and CC 39 168 7 their -PRON- PRP$ 39 168 8 chairmen chairman NNS 39 168 9 are be VBP 39 168 10 : : : 39 168 11 Committee Committee NNP 39 168 12 Chair Chair NNP 39 168 13 Autonomous Autonomous NNP 39 168 14 Networks Networks NNPS 39 168 15 Deborah Deborah NNP 39 168 16 Estrin Estrin NNP 39 168 17 End end NN 39 168 18 - - HYPH 39 168 19 to to IN 39 168 20 - - HYPH 39 168 21 End end NN 39 168 22 Services Services NNPS 39 168 23 Bob Bob NNP 39 168 24 Braden Braden NNP 39 168 25 Internet Internet NNP 39 168 26 Architecture Architecture NNP 39 168 27 Dave Dave NNP 39 168 28 Mills Mills NNP 39 168 29 Internet Internet NNP 39 168 30 Engineering Engineering NNP 39 168 31 Phil Phil NNP 39 168 32 Gross Gross NNP 39 168 33 EGP2 EGP2 NNP 39 168 34 Mike Mike NNP 39 168 35 Petry Petry NNP 39 168 36 Name Name NNP 39 168 37 Domain Domain NNP 39 168 38 Planning Planning NNP 39 168 39 Doug Doug NNP 39 168 40 Kingston Kingston NNP 39 168 41 Gateway Gateway NNP 39 168 42 Monitoring Monitoring NNP 39 168 43 Craig Craig NNP 39 168 44 Partridge Partridge NNP 39 168 45 Internic Internic NNP 39 168 46 Jake Jake NNP 39 168 47 Feinler Feinler NNP 39 168 48 Performance Performance NNP 39 168 49 & & CC 39 168 50 Congestion Congestion NNP 39 168 51 ControlRobert ControlRobert NNP 39 168 52 Stine Stine NNP 39 168 53 NSF NSF NNP 39 168 54 Routing Routing NNP 39 168 55 Chuck Chuck NNP 39 168 56 Hedrick Hedrick NNP 39 168 57 Misc Misc NNP 39 168 58 . . . 39 169 1 MilSup MilSup NNP 39 169 2 Issues Issues NNPS 39 169 3 Mike Mike NNP 39 169 4 St. St. NNP 39 169 5 Johns Johns NNP 39 169 6 Privacy Privacy NNP 39 169 7 Steve Steve NNP 39 169 8 Kent Kent NNP 39 169 9 IRINET IRINET NNP 39 169 10 Requirements requirement NNS 39 169 11 Vint vint NN 39 169 12 Cerf Cerf NNP 39 169 13 Robustness Robustness NNP 39 169 14 & & CC 39 169 15 Survivability Survivability NNP 39 169 16 Jim Jim NNP 39 169 17 Mathis Mathis NNP 39 169 18 Scientific Scientific NNP 39 169 19 Requirements Requirements NNPS 39 169 20 Barry Barry NNP 39 169 21 Leiner Leiner NNP 39 169 22 Note note VB 39 169 23 that that IN 39 169 24 under under IN 39 169 25 Internet Internet NNP 39 169 26 Engineering Engineering NNP 39 169 27 , , , 39 169 28 there there EX 39 169 29 are be VBP 39 169 30 a a DT 39 169 31 set set NN 39 169 32 of of IN 39 169 33 task task NN 39 169 34 forces force NNS 39 169 35 and and CC 39 169 36 chairs chair NNS 39 169 37 to to TO 39 169 38 look look VB 39 169 39 at at IN 39 169 40 short short JJ 39 169 41 term term NN 39 169 42 concerns concern NNS 39 169 43 . . . 39 170 1 The the DT 39 170 2 chairs chair NNS 39 170 3 of of IN 39 170 4 these these DT 39 170 5 task task NN 39 170 6 forces force NNS 39 170 7 are be VBP 39 170 8 not not RB 39 170 9 part part NN 39 170 10 of of IN 39 170 11 the the DT 39 170 12 IAB IAB NNP 39 170 13 . . . 39 171 1 -9- -9- : 39 171 2 Routing route VBG 39 171 3 Routing Routing NNP 39 171 4 is be VBZ 39 171 5 the the DT 39 171 6 algorithm algorithm NN 39 171 7 by by IN 39 171 8 which which WDT 39 171 9 a a DT 39 171 10 network network NN 39 171 11 directs direct VBZ 39 171 12 a a DT 39 171 13 packet packet NN 39 171 14 from from IN 39 171 15 its -PRON- PRP$ 39 171 16 source source NN 39 171 17 to to IN 39 171 18 its -PRON- PRP$ 39 171 19 destination destination NN 39 171 20 . . . 39 172 1 To to TO 39 172 2 appreciate appreciate VB 39 172 3 the the DT 39 172 4 problem problem NN 39 172 5 , , , 39 172 6 watch watch VB 39 172 7 a a DT 39 172 8 small small JJ 39 172 9 child child NN 39 172 10 trying try VBG 39 172 11 to to TO 39 172 12 find find VB 39 172 13 a a DT 39 172 14 table table NN 39 172 15 in in IN 39 172 16 a a DT 39 172 17 restaurant restaurant NN 39 172 18 . . . 39 173 1 From from IN 39 173 2 the the DT 39 173 3 adult adult NN 39 173 4 point point NN 39 173 5 of of IN 39 173 6 view view NN 39 173 7 the the DT 39 173 8 structure structure NN 39 173 9 of of IN 39 173 10 the the DT 39 173 11 dining dining NN 39 173 12 room room NN 39 173 13 is be VBZ 39 173 14 seen see VBN 39 173 15 and and CC 39 173 16 an an DT 39 173 17 optimal optimal JJ 39 173 18 route route NN 39 173 19 easily easily RB 39 173 20 chosen choose VBN 39 173 21 . . . 39 174 1 The the DT 39 174 2 child child NN 39 174 3 , , , 39 174 4 however however RB 39 174 5 , , , 39 174 6 is be VBZ 39 174 7 presented present VBN 39 174 8 with with IN 39 174 9 a a DT 39 174 10 set set NN 39 174 11 of of IN 39 174 12 paths path NNS 39 174 13 between between IN 39 174 14 tables table NNS 39 174 15 where where WRB 39 174 16 a a DT 39 174 17 good good JJ 39 174 18 path path NN 39 174 19 , , , 39 174 20 let let VB 39 174 21 alone alone RB 39 174 22 the the DT 39 174 23 optimal optimal JJ 39 174 24 one one NN 39 174 25 to to IN 39 174 26 the the DT 39 174 27 goal goal NN 39 174 28 is be VBZ 39 174 29 not not RB 39 174 30 discernible discernible JJ 39 174 31 . . . 39 175 1 * * NFP 39 175 2 * * NFP 39 175 3 * * NFP 39 175 4 A a DT 39 175 5 little little RB 39 175 6 more more JJR 39 175 7 background background NN 39 175 8 might may MD 39 175 9 be be VB 39 175 10 appropriate appropriate JJ 39 175 11 . . . 39 176 1 IP IP NNP 39 176 2 gateways gateway NNS 39 176 3 ( ( -LRB- 39 176 4 more more RBR 39 176 5 correctly correctly RB 39 176 6 routers router NNS 39 176 7 ) ) -RRB- 39 176 8 are be VBP 39 176 9 boxes box NNS 39 176 10 which which WDT 39 176 11 have have VBP 39 176 12 connections connection NNS 39 176 13 to to IN 39 176 14 multiple multiple JJ 39 176 15 networks network NNS 39 176 16 and and CC 39 176 17 pass pass VB 39 176 18 traffic traffic NN 39 176 19 between between IN 39 176 20 these these DT 39 176 21 nets net NNS 39 176 22 . . . 39 177 1 They -PRON- PRP 39 177 2 decide decide VBP 39 177 3 how how WRB 39 177 4 the the DT 39 177 5 packet packet NN 39 177 6 is be VBZ 39 177 7 to to TO 39 177 8 be be VB 39 177 9 sent send VBN 39 177 10 based base VBN 39 177 11 on on IN 39 177 12 the the DT 39 177 13 information information NN 39 177 14 in in IN 39 177 15 the the DT 39 177 16 IP IP NNP 39 177 17 header header NN 39 177 18 of of IN 39 177 19 the the DT 39 177 20 packet packet NN 39 177 21 and and CC 39 177 22 the the DT 39 177 23 state state NN 39 177 24 of of IN 39 177 25 the the DT 39 177 26 network network NN 39 177 27 . . . 39 178 1 Each each DT 39 178 2 interface interface NN 39 178 3 on on IN 39 178 4 a a DT 39 178 5 router router NN 39 178 6 has have VBZ 39 178 7 an an DT 39 178 8 unique unique JJ 39 178 9 address address NN 39 178 10 appropriate appropriate JJ 39 178 11 to to IN 39 178 12 the the DT 39 178 13 network network NN 39 178 14 to to TO 39 178 15 which which WDT 39 178 16 it -PRON- PRP 39 178 17 is be VBZ 39 178 18 connected connect VBN 39 178 19 . . . 39 179 1 The the DT 39 179 2 information information NN 39 179 3 in in IN 39 179 4 the the DT 39 179 5 IP IP NNP 39 179 6 header header NN 39 179 7 which which WDT 39 179 8 is be VBZ 39 179 9 used use VBN 39 179 10 is be VBZ 39 179 11 primarily primarily RB 39 179 12 the the DT 39 179 13 destination destination NN 39 179 14 address address NN 39 179 15 . . . 39 180 1 Other other JJ 39 180 2 information information NN 39 180 3 ( ( -LRB- 39 180 4 e.g. e.g. RB 39 181 1 type type NN 39 181 2 of of IN 39 181 3 service service NN 39 181 4 ) ) -RRB- 39 181 5 is be VBZ 39 181 6 largely largely RB 39 181 7 ignored ignore VBN 39 181 8 at at IN 39 181 9 this this DT 39 181 10 time time NN 39 181 11 . . . 39 182 1 The the DT 39 182 2 state state NN 39 182 3 of of IN 39 182 4 the the DT 39 182 5 network network NN 39 182 6 is be VBZ 39 182 7 determined determine VBN 39 182 8 by by IN 39 182 9 the the DT 39 182 10 routers router NNS 39 182 11 passing pass VBG 39 182 12 information information NN 39 182 13 among among IN 39 182 14 themselves -PRON- PRP 39 182 15 . . . 39 183 1 The the DT 39 183 2 distribution distribution NN 39 183 3 of of IN 39 183 4 the the DT 39 183 5 database database NN 39 183 6 ( ( -LRB- 39 183 7 what what WP 39 183 8 each each DT 39 183 9 node node NN 39 183 10 knows know VBZ 39 183 11 ) ) -RRB- 39 183 12 , , , 39 183 13 the the DT 39 183 14 form form NN 39 183 15 of of IN 39 183 16 the the DT 39 183 17 updates update NNS 39 183 18 , , , 39 183 19 and and CC 39 183 20 metrics metric NNS 39 183 21 used use VBN 39 183 22 to to TO 39 183 23 measure measure VB 39 183 24 the the DT 39 183 25 value value NN 39 183 26 of of IN 39 183 27 a a DT 39 183 28 connection connection NN 39 183 29 , , , 39 183 30 are be VBP 39 183 31 the the DT 39 183 32 parameters parameter NNS 39 183 33 which which WDT 39 183 34 determine determine VBP 39 183 35 the the DT 39 183 36 characteristics characteristic NNS 39 183 37 of of IN 39 183 38 a a DT 39 183 39 routing route VBG 39 183 40 protocol protocol NN 39 183 41 . . . 39 184 1 Under under IN 39 184 2 some some DT 39 184 3 algorithms algorithm NNS 39 184 4 each each DT 39 184 5 node node NN 39 184 6 in in IN 39 184 7 the the DT 39 184 8 network network NN 39 184 9 has have VBZ 39 184 10 complete complete JJ 39 184 11 knowledge knowledge NN 39 184 12 of of IN 39 184 13 the the DT 39 184 14 state state NN 39 184 15 of of IN 39 184 16 the the DT 39 184 17 network network NN 39 184 18 ( ( -LRB- 39 184 19 the the DT 39 184 20 adult adult NN 39 184 21 algorithm algorithm NNP 39 184 22 ) ) -RRB- 39 184 23 . . . 39 185 1 This this DT 39 185 2 implies imply VBZ 39 185 3 the the DT 39 185 4 nodes node NNS 39 185 5 must must MD 39 185 6 have have VB 39 185 7 larger large JJR 39 185 8 amounts amount NNS 39 185 9 of of IN 39 185 10 local local JJ 39 185 11 storage storage NN 39 185 12 and and CC 39 185 13 enough enough JJ 39 185 14 CPU cpu NN 39 185 15 to to TO 39 185 16 search search VB 39 185 17 the the DT 39 185 18 large large JJ 39 185 19 tables table NNS 39 185 20 in in IN 39 185 21 a a DT 39 185 22 short short JJ 39 185 23 enough enough JJ 39 185 24 time time NN 39 185 25 ( ( -LRB- 39 185 26 remember remember VB 39 185 27 this this DT 39 185 28 must must MD 39 185 29 be be VB 39 185 30 done do VBN 39 185 31 for for IN 39 185 32 each each DT 39 185 33 packet packet NN 39 185 34 ) ) -RRB- 39 185 35 . . . 39 186 1 Also also RB 39 186 2 , , , 39 186 3 routing routing NN 39 186 4 updates update NNS 39 186 5 usually usually RB 39 186 6 contain contain VBP 39 186 7 only only RB 39 186 8 changes change NNS 39 186 9 to to IN 39 186 10 the the DT 39 186 11 existing exist VBG 39 186 12 information information NN 39 186 13 ( ( -LRB- 39 186 14 or or CC 39 186 15 you -PRON- PRP 39 186 16 spend spend VBP 39 186 17 a a DT 39 186 18 large large JJ 39 186 19 amount amount NN 39 186 20 of of IN 39 186 21 the the DT 39 186 22 network network NN 39 186 23 capacity capacity NN 39 186 24 passing pass VBG 39 186 25 around around RP 39 186 26 megabyte megabyte NN 39 186 27 routing routing NN 39 186 28 updates update NNS 39 186 29 ) ) -RRB- 39 186 30 . . . 39 187 1 This this DT 39 187 2 type type NN 39 187 3 of of IN 39 187 4 algorithm algorithm NNP 39 187 5 has have VBZ 39 187 6 several several JJ 39 187 7 problems problem NNS 39 187 8 . . . 39 188 1 Since since IN 39 188 2 the the DT 39 188 3 only only JJ 39 188 4 way way NN 39 188 5 the the DT 39 188 6 routing route VBG 39 188 7 information information NN 39 188 8 can can MD 39 188 9 be be VB 39 188 10 passed pass VBN 39 188 11 around around RB 39 188 12 is be VBZ 39 188 13 across across IN 39 188 14 the the DT 39 188 15 network network NN 39 188 16 and and CC 39 188 17 the the DT 39 188 18 propagation propagation NN 39 188 19 time time NN 39 188 20 is be VBZ 39 188 21 non non JJ 39 188 22 - - JJ 39 188 23 trivial trivial JJ 39 188 24 , , , 39 188 25 the the DT 39 188 26 view view NN 39 188 27 of of IN 39 188 28 the the DT 39 188 29 network network NN 39 188 30 at at IN 39 188 31 each each DT 39 188 32 node node NN 39 188 33 is be VBZ 39 188 34 a a DT 39 188 35 correct correct JJ 39 188 36 historical historical JJ 39 188 37 view view NN 39 188 38 of of IN 39 188 39 the the DT 39 188 40 network network NN 39 188 41 at at IN 39 188 42 varying vary VBG 39 188 43 times time NNS 39 188 44 in in IN 39 188 45 the the DT 39 188 46 past past NN 39 188 47 . . . 39 189 1 ( ( -LRB- 39 189 2 The the DT 39 189 3 adult adult NN 39 189 4 algorithm algorithm NN 39 189 5 , , , 39 189 6 but but CC 39 189 7 rather rather RB 39 189 8 than than IN 39 189 9 looking look VBG 39 189 10 directly directly RB 39 189 11 at at IN 39 189 12 the the DT 39 189 13 dining dining NN 39 189 14 area area NN 39 189 15 , , , 39 189 16 looking look VBG 39 189 17 at at IN 39 189 18 a a DT 39 189 19 photograph photograph NN 39 189 20 of of IN 39 189 21 the the DT 39 189 22 dining dining NN 39 189 23 room room NN 39 189 24 . . . 39 190 1 One one CD 39 190 2 is be VBZ 39 190 3 likely likely JJ 39 190 4 to to TO 39 190 5 pick pick VB 39 190 6 the the DT 39 190 7 optimal optimal JJ 39 190 8 route route NN 39 190 9 and and CC 39 190 10 find find VB 39 190 11 a a DT 39 190 12 bus bus NN 39 190 13 - - HYPH 39 190 14 cart cart NN 39 190 15 has have VBZ 39 190 16 moved move VBN 39 190 17 in in RB 39 190 18 to to TO 39 190 19 block block VB 39 190 20 the the DT 39 190 21 path path NN 39 190 22 after after IN 39 190 23 the the DT 39 190 24 photo photo NN 39 190 25 was be VBD 39 190 26 taken take VBN 39 190 27 ) ) -RRB- 39 190 28 . . . 39 191 1 These these DT 39 191 2 inconsistencies inconsistency NNS 39 191 3 can can MD 39 191 4 cause cause VB 39 191 5 circular circular JJ 39 191 6 routes route NNS 39 191 7 ( ( -LRB- 39 191 8 called call VBN 39 191 9 routing route VBG 39 191 10 loops loop NNS 39 191 11 ) ) -RRB- 39 191 12 where where WRB 39 191 13 once once IN 39 191 14 a a DT 39 191 15 packet packet NN 39 191 16 enters enter VBZ 39 191 17 it -PRON- PRP 39 191 18 is be VBZ 39 191 19 routed route VBN 39 191 20 in in IN 39 191 21 a a DT 39 191 22 closed closed JJ 39 191 23 path path NN 39 191 24 until until IN 39 191 25 its -PRON- PRP$ 39 191 26 time time NN 39 191 27 to to TO 39 191 28 live live VB 39 191 29 ( ( -LRB- 39 191 30 TTL TTL NNP 39 191 31 ) ) -RRB- 39 191 32 field field NN 39 191 33 expires expire VBZ 39 191 34 and and CC 39 191 35 it -PRON- PRP 39 191 36 is be VBZ 39 191 37 discarded discard VBN 39 191 38 . . . 39 192 1 Other other JJ 39 192 2 algorithms algorithm NNS 39 192 3 may may MD 39 192 4 know know VB 39 192 5 about about IN 39 192 6 only only RB 39 192 7 a a DT 39 192 8 subset subset NN 39 192 9 of of IN 39 192 10 the the DT 39 192 11 network network NN 39 192 12 . . . 39 193 1 To to TO 39 193 2 prevent prevent VB 39 193 3 loops loop NNS 39 193 4 in in IN 39 193 5 these these DT 39 193 6 protocols protocol NNS 39 193 7 , , , 39 193 8 they -PRON- PRP 39 193 9 are be VBP 39 193 10 usually usually RB 39 193 11 used use VBN 39 193 12 in in IN 39 193 13 a a DT 39 193 14 hierarchical hierarchical JJ 39 193 15 network network NN 39 193 16 . . . 39 194 1 They -PRON- PRP 39 194 2 know know VBP 39 194 3 completely completely RB 39 194 4 about about IN 39 194 5 their -PRON- PRP$ 39 194 6 own own JJ 39 194 7 area area NN 39 194 8 , , , 39 194 9 but but CC 39 194 10 to to TO 39 194 11 leave leave VB 39 194 12 that that DT 39 194 13 area area NN 39 194 14 they -PRON- PRP 39 194 15 go go VBP 39 194 16 to to IN 39 194 17 one one CD 39 194 18 particular particular JJ 39 194 19 place place NN 39 194 20 ( ( -LRB- 39 194 21 the the DT 39 194 22 default default NN 39 194 23 gateway gateway NN 39 194 24 ) ) -RRB- 39 194 25 . . . 39 195 1 Typically typically RB 39 195 2 these these DT 39 195 3 are be VBP 39 195 4 used use VBN 39 195 5 in in IN 39 195 6 smaller small JJR 39 195 7 networks network NNS 39 195 8 ( ( -LRB- 39 195 9 campus campus NN 39 195 10 , , , 39 195 11 regional regional JJ 39 195 12 ... ... NFP 39 195 13 ) ) -RRB- 39 195 14 . . . 39 196 1 -10- -10- : 39 196 2 Routing route VBG 39 196 3 protocols protocol NNS 39 196 4 in in IN 39 196 5 current current JJ 39 196 6 use use NN 39 196 7 : : : 39 196 8 Static static JJ 39 196 9 ( ( -LRB- 39 196 10 no no DT 39 196 11 protocol protocol NN 39 196 12 - - HYPH 39 196 13 table table NN 39 196 14 / / SYM 39 196 15 default default NN 39 196 16 routing routing NN 39 196 17 ) ) -RRB- 39 196 18 Do do VB 39 196 19 n't not RB 39 196 20 laugh laugh VB 39 196 21 . . . 39 197 1 It -PRON- PRP 39 197 2 is be VBZ 39 197 3 probably probably RB 39 197 4 the the DT 39 197 5 most most RBS 39 197 6 reliable reliable JJ 39 197 7 , , , 39 197 8 easiest easy JJS 39 197 9 to to TO 39 197 10 implement implement VB 39 197 11 , , , 39 197 12 and and CC 39 197 13 least least RBS 39 197 14 likely likely JJ 39 197 15 to to TO 39 197 16 get get VB 39 197 17 one one CD 39 197 18 into into IN 39 197 19 trouble trouble NN 39 197 20 for for IN 39 197 21 a a DT 39 197 22 small small JJ 39 197 23 network network NN 39 197 24 or or CC 39 197 25 a a DT 39 197 26 leaf leaf NN 39 197 27 on on IN 39 197 28 the the DT 39 197 29 Internet internet NN 39 197 30 . . . 39 198 1 This this DT 39 198 2 is be VBZ 39 198 3 , , , 39 198 4 also also RB 39 198 5 , , , 39 198 6 the the DT 39 198 7 only only JJ 39 198 8 method method NN 39 198 9 available available JJ 39 198 10 on on IN 39 198 11 some some DT 39 198 12 CPU cpu NN 39 198 13 - - HYPH 39 198 14 operating operate VBG 39 198 15 system system NN 39 198 16 combinations combination NNS 39 198 17 . . . 39 199 1 If if IN 39 199 2 a a DT 39 199 3 host host NN 39 199 4 is be VBZ 39 199 5 connected connect VBN 39 199 6 to to IN 39 199 7 an an DT 39 199 8 Ethernet Ethernet NNP 39 199 9 which which WDT 39 199 10 has have VBZ 39 199 11 only only RB 39 199 12 one one CD 39 199 13 gateway gateway NN 39 199 14 off off IN 39 199 15 of of IN 39 199 16 it -PRON- PRP 39 199 17 , , , 39 199 18 one one PRP 39 199 19 should should MD 39 199 20 make make VB 39 199 21 that that IN 39 199 22 the the DT 39 199 23 default default NN 39 199 24 gateway gateway NN 39 199 25 for for IN 39 199 26 the the DT 39 199 27 host host NN 39 199 28 and and CC 39 199 29 do do VBP 39 199 30 no no DT 39 199 31 other other JJ 39 199 32 routing routing NN 39 199 33 . . . 39 200 1 ( ( -LRB- 39 200 2 Of of RB 39 200 3 course course RB 39 200 4 that that DT 39 200 5 gateway gateway NN 39 200 6 may may MD 39 200 7 pass pass VB 39 200 8 the the DT 39 200 9 reachablity reachablity NN 39 200 10 information information NN 39 200 11 somehow somehow RB 39 200 12 on on IN 39 200 13 the the DT 39 200 14 other other JJ 39 200 15 side side NN 39 200 16 of of IN 39 200 17 itself -PRON- PRP 39 200 18 ) ) -RRB- 39 200 19 . . . 39 201 1 One one CD 39 201 2 word word NN 39 201 3 of of IN 39 201 4 warning warning NN 39 201 5 , , , 39 201 6 it -PRON- PRP 39 201 7 is be VBZ 39 201 8 only only RB 39 201 9 with with IN 39 201 10 extreme extreme JJ 39 201 11 caution caution NN 39 201 12 that that IN 39 201 13 one one PRP 39 201 14 should should MD 39 201 15 use use VB 39 201 16 static static JJ 39 201 17 routes route NNS 39 201 18 in in IN 39 201 19 the the DT 39 201 20 middle middle NN 39 201 21 of of IN 39 201 22 a a DT 39 201 23 network network NN 39 201 24 which which WDT 39 201 25 is be VBZ 39 201 26 also also RB 39 201 27 using use VBG 39 201 28 dynamic dynamic JJ 39 201 29 routing routing NN 39 201 30 . . . 39 202 1 The the DT 39 202 2 routers router NNS 39 202 3 passing pass VBG 39 202 4 dynamic dynamic JJ 39 202 5 information information NN 39 202 6 are be VBP 39 202 7 sometimes sometimes RB 39 202 8 confused confuse VBN 39 202 9 by by IN 39 202 10 conflicting conflict VBG 39 202 11 dynamic dynamic JJ 39 202 12 and and CC 39 202 13 static static JJ 39 202 14 routes route NNS 39 202 15 . . . 39 203 1 If if IN 39 203 2 your -PRON- PRP$ 39 203 3 host host NN 39 203 4 is be VBZ 39 203 5 on on IN 39 203 6 an an DT 39 203 7 ethernet ethernet NN 39 203 8 with with IN 39 203 9 multiple multiple JJ 39 203 10 routers router NNS 39 203 11 to to IN 39 203 12 other other JJ 39 203 13 networks network NNS 39 203 14 on on IN 39 203 15 it -PRON- PRP 39 203 16 and and CC 39 203 17 the the DT 39 203 18 routers router NNS 39 203 19 are be VBP 39 203 20 doing do VBG 39 203 21 dynamic dynamic JJ 39 203 22 routing routing NN 39 203 23 among among IN 39 203 24 themselves -PRON- PRP 39 203 25 , , , 39 203 26 it -PRON- PRP 39 203 27 is be VBZ 39 203 28 usually usually RB 39 203 29 better well JJR 39 203 30 to to TO 39 203 31 take take VB 39 203 32 part part NN 39 203 33 in in IN 39 203 34 the the DT 39 203 35 dynamic dynamic JJ 39 203 36 routing routing NN 39 203 37 than than IN 39 203 38 to to TO 39 203 39 use use VB 39 203 40 static static JJ 39 203 41 routes route NNS 39 203 42 . . . 39 204 1 RIP RIP NNP 39 204 2 RIP RIP NNP 39 204 3 is be VBZ 39 204 4 a a DT 39 204 5 routing route VBG 39 204 6 protocol protocol NN 39 204 7 based base VBN 39 204 8 on on IN 39 204 9 XNS XNS NNP 39 204 10 ( ( -LRB- 39 204 11 Xerox Xerox NNP 39 204 12 Network Network NNP 39 204 13 System System NNP 39 204 14 ) ) -RRB- 39 204 15 adapted adapt VBD 39 204 16 for for IN 39 204 17 IP IP NNP 39 204 18 networks network NNS 39 204 19 . . . 39 205 1 It -PRON- PRP 39 205 2 is be VBZ 39 205 3 used use VBN 39 205 4 by by IN 39 205 5 many many JJ 39 205 6 routers router NNS 39 205 7 ( ( -LRB- 39 205 8 Proteon Proteon NNP 39 205 9 , , , 39 205 10 cisco cisco NN 39 205 11 , , , 39 205 12 UB UB NNP 39 205 13 ... ... : 39 205 14 ) ) -RRB- 39 205 15 and and CC 39 205 16 many many JJ 39 205 17 BSD BSD NNP 39 205 18 Unix Unix NNP 39 205 19 systems system NNS 39 205 20 BSD BSD NNP 39 205 21 systems system NNS 39 205 22 typically typically RB 39 205 23 run run VBP 39 205 24 a a DT 39 205 25 program program NN 39 205 26 called call VBN 39 205 27 " " `` 39 205 28 routed route VBN 39 205 29 " " '' 39 205 30 to to TO 39 205 31 exchange exchange VB 39 205 32 information information NN 39 205 33 with with IN 39 205 34 other other JJ 39 205 35 systems system NNS 39 205 36 running run VBG 39 205 37 RIP RIP NNP 39 205 38 . . . 39 206 1 RIP RIP NNP 39 206 2 works work VBZ 39 206 3 best best RB 39 206 4 for for IN 39 206 5 nets net NNS 39 206 6 of of IN 39 206 7 small small JJ 39 206 8 diameter diameter NN 39 206 9 where where WRB 39 206 10 the the DT 39 206 11 links link NNS 39 206 12 are be VBP 39 206 13 of of IN 39 206 14 equal equal JJ 39 206 15 speed speed NN 39 206 16 . . . 39 207 1 The the DT 39 207 2 reason reason NN 39 207 3 for for IN 39 207 4 this this DT 39 207 5 is be VBZ 39 207 6 that that IN 39 207 7 the the DT 39 207 8 metric metric NN 39 207 9 used use VBN 39 207 10 to to TO 39 207 11 determine determine VB 39 207 12 which which WDT 39 207 13 path path NN 39 207 14 is be VBZ 39 207 15 best good JJS 39 207 16 is be VBZ 39 207 17 the the DT 39 207 18 hop hop NN 39 207 19 - - HYPH 39 207 20 count count NN 39 207 21 . . . 39 208 1 A a DT 39 208 2 hop hop NN 39 208 3 is be VBZ 39 208 4 a a DT 39 208 5 traversal traversal NN 39 208 6 across across IN 39 208 7 a a DT 39 208 8 gateway gateway NN 39 208 9 . . . 39 209 1 So so RB 39 209 2 , , , 39 209 3 all all DT 39 209 4 machines machine NNS 39 209 5 on on IN 39 209 6 the the DT 39 209 7 same same JJ 39 209 8 Ethernet Ethernet NNP 39 209 9 are be VBP 39 209 10 zero zero CD 39 209 11 hops hop VBZ 39 209 12 away away RB 39 209 13 . . . 39 210 1 If if IN 39 210 2 a a DT 39 210 3 router router NN 39 210 4 connects connect VBZ 39 210 5 connects connect VBZ 39 210 6 two two CD 39 210 7 net- net- JJ 39 210 8 works work NNS 39 210 9 directly directly RB 39 210 10 , , , 39 210 11 a a DT 39 210 12 machine machine NN 39 210 13 on on IN 39 210 14 the the DT 39 210 15 other other JJ 39 210 16 side side NN 39 210 17 of of IN 39 210 18 the the DT 39 210 19 router router NN 39 210 20 is be VBZ 39 210 21 one one CD 39 210 22 hop hop NN 39 210 23 away away RB 39 210 24 .... .... . 39 210 25 As as IN 39 210 26 the the DT 39 210 27 routing route VBG 39 210 28 information information NN 39 210 29 is be VBZ 39 210 30 passed pass VBN 39 210 31 through through IN 39 210 32 a a DT 39 210 33 gateway gateway NN 39 210 34 , , , 39 210 35 the the DT 39 210 36 gateway gateway NN 39 210 37 adds add VBZ 39 210 38 one one CD 39 210 39 to to IN 39 210 40 the the DT 39 210 41 hop hop NN 39 210 42 counts count NNS 39 210 43 to to TO 39 210 44 keep keep VB 39 210 45 them -PRON- PRP 39 210 46 consistent consistent JJ 39 210 47 across across IN 39 210 48 the the DT 39 210 49 net- net- NN 39 210 50 work work NN 39 210 51 . . . 39 211 1 The the DT 39 211 2 diameter diameter NN 39 211 3 of of IN 39 211 4 a a DT 39 211 5 network network NN 39 211 6 is be VBZ 39 211 7 defined define VBN 39 211 8 as as IN 39 211 9 the the DT 39 211 10 largest large JJS 39 211 11 hop hop NN 39 211 12 - - HYPH 39 211 13 count count NN 39 211 14 possible possible JJ 39 211 15 within within IN 39 211 16 a a DT 39 211 17 network network NN 39 211 18 . . . 39 212 1 Unfor- Unfor- NNP 39 212 2 tunately tunately RB 39 212 3 , , , 39 212 4 a a DT 39 212 5 hop hop NN 39 212 6 count count NN 39 212 7 of of IN 39 212 8 16 16 CD 39 212 9 is be VBZ 39 212 10 defined define VBN 39 212 11 as as IN 39 212 12 infinity infinity NN 39 212 13 in in IN 39 212 14 RIP RIP NNP 39 212 15 meaning mean VBG 39 212 16 the the DT 39 212 17 link link NN 39 212 18 is be VBZ 39 212 19 down down RB 39 212 20 . . . 39 213 1 Therefore therefore RB 39 213 2 , , , 39 213 3 RIP RIP NNP 39 213 4 will will MD 39 213 5 not not RB 39 213 6 allow allow VB 39 213 7 hosts host NNS 39 213 8 separated separate VBN 39 213 9 by by IN 39 213 10 more more JJR 39 213 11 than than IN 39 213 12 15 15 CD 39 213 13 gateways gateway NNS 39 213 14 in in IN 39 213 15 the the DT 39 213 16 RIP RIP NNP 39 213 17 space space NN 39 213 18 to to TO 39 213 19 communicate communicate VB 39 213 20 . . . 39 214 1 The the DT 39 214 2 other other JJ 39 214 3 problem problem NN 39 214 4 with with IN 39 214 5 hop hop NN 39 214 6 - - HYPH 39 214 7 count count JJ 39 214 8 metrics metric NNS 39 214 9 is be VBZ 39 214 10 that that IN 39 214 11 if if IN 39 214 12 links link NNS 39 214 13 have have VBP 39 214 14 different different JJ 39 214 15 speeds speed NNS 39 214 16 , , , 39 214 17 that that DT 39 214 18 difference difference NN 39 214 19 is be VBZ 39 214 20 not not RB 39 214 21 -11- -11- : 39 214 22 reflected reflect VBN 39 214 23 in in IN 39 214 24 the the DT 39 214 25 hop hop NN 39 214 26 - - HYPH 39 214 27 count count NN 39 214 28 . . . 39 215 1 So so RB 39 215 2 a a DT 39 215 3 one one CD 39 215 4 hop hop NN 39 215 5 satellite satellite NN 39 215 6 link link NN 39 215 7 ( ( -LRB- 39 215 8 with with IN 39 215 9 a a DT 39 215 10 .5 .5 NN 39 215 11 sec sec NNP 39 215 12 delay delay NNP 39 215 13 ) ) -RRB- 39 215 14 at at IN 39 215 15 56 56 CD 39 215 16 kb kb PRP 39 215 17 would would MD 39 215 18 be be VB 39 215 19 used use VBN 39 215 20 instead instead RB 39 215 21 of of IN 39 215 22 a a DT 39 215 23 two two CD 39 215 24 hop hop NN 39 215 25 T1 t1 NN 39 215 26 connection connection NN 39 215 27 . . . 39 216 1 Congestion congestion NN 39 216 2 can can MD 39 216 3 be be VB 39 216 4 viewed view VBN 39 216 5 as as IN 39 216 6 a a DT 39 216 7 decrease decrease NN 39 216 8 in in IN 39 216 9 the the DT 39 216 10 efficacy efficacy NN 39 216 11 of of IN 39 216 12 a a DT 39 216 13 link link NN 39 216 14 . . . 39 217 1 So so RB 39 217 2 , , , 39 217 3 as as IN 39 217 4 a a DT 39 217 5 link link NN 39 217 6 gets get VBZ 39 217 7 more more RBR 39 217 8 congested congested JJ 39 217 9 , , , 39 217 10 RIP RIP NNP 39 217 11 will will MD 39 217 12 still still RB 39 217 13 know know VB 39 217 14 it -PRON- PRP 39 217 15 is be VBZ 39 217 16 the the DT 39 217 17 best good JJS 39 217 18 hop hop NN 39 217 19 - - HYPH 39 217 20 count count JJ 39 217 21 route route NN 39 217 22 and and CC 39 217 23 congest congest VB 39 217 24 it -PRON- PRP 39 217 25 even even RB 39 217 26 more more RBR 39 217 27 by by IN 39 217 28 throwing throw VBG 39 217 29 more more JJR 39 217 30 packets packet NNS 39 217 31 on on IN 39 217 32 the the DT 39 217 33 queue queue NN 39 217 34 for for IN 39 217 35 that that DT 39 217 36 link link NN 39 217 37 . . . 39 218 1 The the DT 39 218 2 protocol protocol NN 39 218 3 is be VBZ 39 218 4 not not RB 39 218 5 well well RB 39 218 6 documented document VBN 39 218 7 . . . 39 219 1 A a DT 39 219 2 group group NN 39 219 3 of of IN 39 219 4 people people NNS 39 219 5 are be VBP 39 219 6 working work VBG 39 219 7 on on IN 39 219 8 producing produce VBG 39 219 9 an an DT 39 219 10 RFC RFC NNP 39 219 11 to to TO 39 219 12 both both DT 39 219 13 define define VB 39 219 14 the the DT 39 219 15 current current JJ 39 219 16 RIP RIP NNP 39 219 17 and and CC 39 219 18 to to TO 39 219 19 do do VB 39 219 20 some some DT 39 219 21 extensions extension NNS 39 219 22 to to IN 39 219 23 it -PRON- PRP 39 219 24 to to TO 39 219 25 allow allow VB 39 219 26 it -PRON- PRP 39 219 27 to to TO 39 219 28 better well RBR 39 219 29 cope cope VB 39 219 30 with with IN 39 219 31 larger large JJR 39 219 32 networks network NNS 39 219 33 . . . 39 220 1 Currently currently RB 39 220 2 , , , 39 220 3 the the DT 39 220 4 best good JJS 39 220 5 documentation documentation NN 39 220 6 for for IN 39 220 7 RIP RIP NNP 39 220 8 appears appear VBZ 39 220 9 to to TO 39 220 10 be be VB 39 220 11 the the DT 39 220 12 code code NN 39 220 13 to to IN 39 220 14 BSD BSD NNP 39 220 15 " " `` 39 220 16 routed routed JJ 39 220 17 " " '' 39 220 18 . . . 39 221 1 Routed Routed NNP 39 221 2 The the DT 39 221 3 ROUTED ROUTED NNP 39 221 4 program program NN 39 221 5 , , , 39 221 6 which which WDT 39 221 7 does do VBZ 39 221 8 RIP RIP NNP 39 221 9 for for IN 39 221 10 4.2BSD 4.2bsd CD 39 221 11 systems system NNS 39 221 12 , , , 39 221 13 has have VBZ 39 221 14 many many JJ 39 221 15 options option NNS 39 221 16 . . . 39 222 1 One one CD 39 222 2 of of IN 39 222 3 the the DT 39 222 4 most most RBS 39 222 5 frequently frequently RB 39 222 6 used use VBN 39 222 7 is be VBZ 39 222 8 : : : 39 222 9 " " `` 39 222 10 routed route VBN 39 222 11 -q -q : 39 222 12 " " '' 39 222 13 ( ( -LRB- 39 222 14 quiet quiet JJ 39 222 15 mode mode NN 39 222 16 ) ) -RRB- 39 222 17 which which WDT 39 222 18 means mean VBZ 39 222 19 listen listen VB 39 222 20 to to IN 39 222 21 RIP RIP NNP 39 222 22 infor- infor- JJ 39 222 23 mation mation NN 39 222 24 but but CC 39 222 25 never never RB 39 222 26 broadcast broadcast VBD 39 222 27 it -PRON- PRP 39 222 28 . . . 39 223 1 This this DT 39 223 2 would would MD 39 223 3 be be VB 39 223 4 used use VBN 39 223 5 by by IN 39 223 6 a a DT 39 223 7 machine machine NN 39 223 8 on on IN 39 223 9 a a DT 39 223 10 network network NN 39 223 11 with with IN 39 223 12 multiple multiple JJ 39 223 13 RIP RIP NNP 39 223 14 speaking speak VBG 39 223 15 gate- gate- NN 39 223 16 ways way NNS 39 223 17 . . . 39 224 1 It -PRON- PRP 39 224 2 allows allow VBZ 39 224 3 the the DT 39 224 4 host host NN 39 224 5 to to TO 39 224 6 determine determine VB 39 224 7 which which WDT 39 224 8 gateway gateway NN 39 224 9 is be VBZ 39 224 10 best good JJS 39 224 11 ( ( -LRB- 39 224 12 hopwise hopwise NN 39 224 13 ) ) -RRB- 39 224 14 to to TO 39 224 15 use use VB 39 224 16 to to TO 39 224 17 reach reach VB 39 224 18 a a DT 39 224 19 distant distant JJ 39 224 20 network network NN 39 224 21 . . . 39 225 1 ( ( -LRB- 39 225 2 Of of RB 39 225 3 course course RB 39 225 4 you -PRON- PRP 39 225 5 might may MD 39 225 6 want want VB 39 225 7 to to TO 39 225 8 have have VB 39 225 9 a a DT 39 225 10 default default NN 39 225 11 gateway gateway NN 39 225 12 to to TO 39 225 13 prevent prevent VB 39 225 14 having have VBG 39 225 15 to to TO 39 225 16 pass pass VB 39 225 17 all all PDT 39 225 18 the the DT 39 225 19 addresses address NNS 39 225 20 known know VBN 39 225 21 to to IN 39 225 22 the the DT 39 225 23 Internet internet NN 39 225 24 around around RB 39 225 25 with with IN 39 225 26 RIP RIP NNP 39 225 27 ) ) -RRB- 39 225 28 . . . 39 226 1 There there EX 39 226 2 are be VBP 39 226 3 two two CD 39 226 4 ways way NNS 39 226 5 to to TO 39 226 6 insert insert VB 39 226 7 static static JJ 39 226 8 routes route NNS 39 226 9 into into IN 39 226 10 " " `` 39 226 11 routed route VBN 39 226 12 " " '' 39 226 13 , , , 39 226 14 the the DT 39 226 15 " " `` 39 226 16 /etc /etc NNP 39 226 17 / / SYM 39 226 18 gateways gateway NNS 39 226 19 " " `` 39 226 20 file file NN 39 226 21 and and CC 39 226 22 the the DT 39 226 23 " " `` 39 226 24 route route NN 39 226 25 add add NNP 39 226 26 " " '' 39 226 27 command command NN 39 226 28 . . . 39 227 1 Static static JJ 39 227 2 routes route NNS 39 227 3 are be VBP 39 227 4 useful useful JJ 39 227 5 if if IN 39 227 6 you -PRON- PRP 39 227 7 know know VBP 39 227 8 how how WRB 39 227 9 to to TO 39 227 10 reach reach VB 39 227 11 a a DT 39 227 12 distant distant JJ 39 227 13 network network NN 39 227 14 , , , 39 227 15 but but CC 39 227 16 you -PRON- PRP 39 227 17 are be VBP 39 227 18 not not RB 39 227 19 receiving receive VBG 39 227 20 that that DT 39 227 21 route route NN 39 227 22 using use VBG 39 227 23 RIP RIP NNP 39 227 24 . . . 39 228 1 For for IN 39 228 2 the the DT 39 228 3 most most JJS 39 228 4 part part NN 39 228 5 the the DT 39 228 6 " " `` 39 228 7 route route NN 39 228 8 add add NNP 39 228 9 " " '' 39 228 10 command command NN 39 228 11 is be VBZ 39 228 12 preferable preferable JJ 39 228 13 to to TO 39 228 14 use use VB 39 228 15 . . . 39 229 1 The the DT 39 229 2 reason reason NN 39 229 3 for for IN 39 229 4 this this DT 39 229 5 is be VBZ 39 229 6 that that IN 39 229 7 the the DT 39 229 8 command command NN 39 229 9 adds add VBZ 39 229 10 the the DT 39 229 11 route route NN 39 229 12 to to IN 39 229 13 that that DT 39 229 14 machine machine NN 39 229 15 's 's POS 39 229 16 routing routing NN 39 229 17 table table NN 39 229 18 but but CC 39 229 19 does do VBZ 39 229 20 not not RB 39 229 21 export export VB 39 229 22 it -PRON- PRP 39 229 23 through through IN 39 229 24 RIP RIP NNP 39 229 25 . . . 39 230 1 The the DT 39 230 2 " " `` 39 230 3 /etc /etc NNP 39 230 4 / / SYM 39 230 5 gateways gateway NNS 39 230 6 " " `` 39 230 7 file file NN 39 230 8 takes take VBZ 39 230 9 precedence precedence NN 39 230 10 over over IN 39 230 11 any any DT 39 230 12 routing route VBG 39 230 13 information information NN 39 230 14 received receive VBD 39 230 15 through through IN 39 230 16 a a DT 39 230 17 RIP RIP NNP 39 230 18 update update NN 39 230 19 . . . 39 231 1 It -PRON- PRP 39 231 2 is be VBZ 39 231 3 also also RB 39 231 4 broadcast broadcast VBN 39 231 5 as as IN 39 231 6 fact fact NN 39 231 7 in in IN 39 231 8 RIP RIP NNP 39 231 9 updates update NNS 39 231 10 produced produce VBN 39 231 11 by by IN 39 231 12 the the DT 39 231 13 host host NN 39 231 14 without without IN 39 231 15 question question NN 39 231 16 , , , 39 231 17 so so CC 39 231 18 if if IN 39 231 19 a a DT 39 231 20 mistake mistake NN 39 231 21 is be VBZ 39 231 22 made make VBN 39 231 23 in in IN 39 231 24 the the DT 39 231 25 " " `` 39 231 26 /etc /etc NNP 39 231 27 / / SYM 39 231 28 gateways gateway NNS 39 231 29 " " `` 39 231 30 file file NN 39 231 31 , , , 39 231 32 that that IN 39 231 33 mistake mistake NN 39 231 34 will will MD 39 231 35 soon soon RB 39 231 36 permeate permeate VB 39 231 37 the the DT 39 231 38 RIP RIP NNP 39 231 39 space space NN 39 231 40 and and CC 39 231 41 may may MD 39 231 42 bring bring VB 39 231 43 the the DT 39 231 44 network network NN 39 231 45 to to IN 39 231 46 its -PRON- PRP$ 39 231 47 knees knee NNS 39 231 48 . . . 39 232 1 One one CD 39 232 2 of of IN 39 232 3 the the DT 39 232 4 problems problem NNS 39 232 5 with with IN 39 232 6 " " `` 39 232 7 routed routed JJ 39 232 8 " " '' 39 232 9 is be VBZ 39 232 10 that that IN 39 232 11 you -PRON- PRP 39 232 12 have have VBP 39 232 13 very very RB 39 232 14 little little JJ 39 232 15 control control NN 39 232 16 over over IN 39 232 17 what what WP 39 232 18 gets get VBZ 39 232 19 broadcast broadcast VBN 39 232 20 and and CC 39 232 21 what what WP 39 232 22 does do VBZ 39 232 23 n't not RB 39 232 24 . . . 39 233 1 Many many JJ 39 233 2 times time NNS 39 233 3 in in IN 39 233 4 larger large JJR 39 233 5 networks network NNS 39 233 6 where where WRB 39 233 7 various various JJ 39 233 8 parts part NNS 39 233 9 of of IN 39 233 10 the the DT 39 233 11 network network NN 39 233 12 are be VBP 39 233 13 under under IN 39 233 14 different different JJ 39 233 15 administrative administrative JJ 39 233 16 controls control NNS 39 233 17 , , , 39 233 18 you -PRON- PRP 39 233 19 would would MD 39 233 20 like like VB 39 233 21 to to TO 39 233 22 pass pass VB 39 233 23 on on RP 39 233 24 through through IN 39 233 25 RIP RIP NNP 39 233 26 only only RB 39 233 27 nets net VBZ 39 233 28 which which WDT 39 233 29 you -PRON- PRP 39 233 30 receive receive VBP 39 233 31 from from IN 39 233 32 RIP RIP NNP 39 233 33 and and CC 39 233 34 you -PRON- PRP 39 233 35 know know VBP 39 233 36 are be VBP 39 233 37 reasonable reasonable JJ 39 233 38 . . . 39 234 1 This this DT 39 234 2 prevents prevent VBZ 39 234 3 people people NNS 39 234 4 from from IN 39 234 5 adding add VBG 39 234 6 IP IP NNP 39 234 7 addresses address NNS 39 234 8 to to IN 39 234 9 the the DT 39 234 10 network network NN 39 234 11 which which WDT 39 234 12 may may MD 39 234 13 be be VB 39 234 14 illegal illegal JJ 39 234 15 and and CC 39 234 16 you -PRON- PRP 39 234 17 being be VBG 39 234 18 responsible responsible JJ 39 234 19 for for IN 39 234 20 passing pass VBG 39 234 21 them -PRON- PRP 39 234 22 on on RP 39 234 23 to to IN 39 234 24 the the DT 39 234 25 Internet internet NN 39 234 26 . . . 39 235 1 This this DT 39 235 2 -12- -12- : 39 235 3 type type NN 39 235 4 of of IN 39 235 5 reasonability reasonability NN 39 235 6 checks check NNS 39 235 7 are be VBP 39 235 8 not not RB 39 235 9 available available JJ 39 235 10 with with IN 39 235 11 " " `` 39 235 12 routed routed JJ 39 235 13 " " '' 39 235 14 and and CC 39 235 15 leave leave VB 39 235 16 it -PRON- PRP 39 235 17 usable usable JJ 39 235 18 , , , 39 235 19 but but CC 39 235 20 inadequate inadequate JJ 39 235 21 for for IN 39 235 22 large large JJ 39 235 23 networks network NNS 39 235 24 . . . 39 236 1 Hello hello UH 39 236 2 ( ( -LRB- 39 236 3 RFC-891 rfc-891 UH 39 236 4 ) ) -RRB- 39 236 5 Hello hello UH 39 236 6 is be VBZ 39 236 7 a a DT 39 236 8 routing route VBG 39 236 9 protocol protocol NN 39 236 10 which which WDT 39 236 11 was be VBD 39 236 12 designed design VBN 39 236 13 and and CC 39 236 14 implemented implement VBN 39 236 15 in in IN 39 236 16 a a DT 39 236 17 experimental experimental JJ 39 236 18 software software NN 39 236 19 router router NN 39 236 20 called call VBD 39 236 21 a a DT 39 236 22 " " `` 39 236 23 Fuzzball Fuzzball NNP 39 236 24 " " '' 39 236 25 which which WDT 39 236 26 runs run VBZ 39 236 27 on on IN 39 236 28 a a DT 39 236 29 PDP-11 pdp-11 NN 39 236 30 . . . 39 237 1 It -PRON- PRP 39 237 2 does do VBZ 39 237 3 not not RB 39 237 4 have have VB 39 237 5 wide wide JJ 39 237 6 usage usage NN 39 237 7 , , , 39 237 8 but but CC 39 237 9 is be VBZ 39 237 10 the the DT 39 237 11 routing route VBG 39 237 12 protocol protocol NN 39 237 13 currently currently RB 39 237 14 used use VBN 39 237 15 on on IN 39 237 16 the the DT 39 237 17 NSFnet NSFnet NNP 39 237 18 backbone backbone NN 39 237 19 . . . 39 238 1 The the DT 39 238 2 data datum NNS 39 238 3 transferred transfer VBN 39 238 4 between between IN 39 238 5 nodes node NNS 39 238 6 is be VBZ 39 238 7 similar similar JJ 39 238 8 to to IN 39 238 9 RIP RIP NNP 39 238 10 ( ( -LRB- 39 238 11 a a DT 39 238 12 list list NN 39 238 13 of of IN 39 238 14 networks network NNS 39 238 15 and and CC 39 238 16 their -PRON- PRP$ 39 238 17 metrics metric NNS 39 238 18 ) ) -RRB- 39 238 19 . . . 39 239 1 The the DT 39 239 2 metric metric JJ 39 239 3 , , , 39 239 4 however however RB 39 239 5 , , , 39 239 6 is be VBZ 39 239 7 milliseconds millisecond NNS 39 239 8 of of IN 39 239 9 delay delay NN 39 239 10 . . . 39 240 1 This this DT 39 240 2 allows allow VBZ 39 240 3 Hello hello UH 39 240 4 to to TO 39 240 5 be be VB 39 240 6 used use VBN 39 240 7 over over IN 39 240 8 nets net NNS 39 240 9 of of IN 39 240 10 various various JJ 39 240 11 link link NN 39 240 12 speeds speed NNS 39 240 13 and and CC 39 240 14 performs perform VBZ 39 240 15 better well JJR 39 240 16 in in IN 39 240 17 congestive congestive JJ 39 240 18 situations situation NNS 39 240 19 . . . 39 241 1 One one CD 39 241 2 of of IN 39 241 3 the the DT 39 241 4 most most RBS 39 241 5 interesting interesting JJ 39 241 6 side side NN 39 241 7 effects effect NNS 39 241 8 of of IN 39 241 9 Hello hello UH 39 241 10 based base VBN 39 241 11 networks network NNS 39 241 12 is be VBZ 39 241 13 their -PRON- PRP$ 39 241 14 great great JJ 39 241 15 timekeeping timekeeping NN 39 241 16 ability ability NN 39 241 17 . . . 39 242 1 If if IN 39 242 2 you -PRON- PRP 39 242 3 consider consider VBP 39 242 4 the the DT 39 242 5 problem problem NN 39 242 6 of of IN 39 242 7 measuring measure VBG 39 242 8 delay delay NN 39 242 9 on on IN 39 242 10 a a DT 39 242 11 link link NN 39 242 12 for for IN 39 242 13 the the DT 39 242 14 metric metric JJ 39 242 15 , , , 39 242 16 you -PRON- PRP 39 242 17 find find VBP 39 242 18 that that IN 39 242 19 it -PRON- PRP 39 242 20 is be VBZ 39 242 21 not not RB 39 242 22 an an DT 39 242 23 easy easy JJ 39 242 24 thing thing NN 39 242 25 to to TO 39 242 26 do do VB 39 242 27 . . . 39 243 1 You -PRON- PRP 39 243 2 can can MD 39 243 3 not not RB 39 243 4 measure measure VB 39 243 5 round round JJ 39 243 6 trip trip NN 39 243 7 time time NN 39 243 8 since since IN 39 243 9 the the DT 39 243 10 return return NN 39 243 11 link link NN 39 243 12 may may MD 39 243 13 be be VB 39 243 14 more more RBR 39 243 15 congested congested JJ 39 243 16 , , , 39 243 17 of of IN 39 243 18 a a DT 39 243 19 different different JJ 39 243 20 speed speed NN 39 243 21 , , , 39 243 22 or or CC 39 243 23 even even RB 39 243 24 not not RB 39 243 25 there there RB 39 243 26 . . . 39 244 1 It -PRON- PRP 39 244 2 is be VBZ 39 244 3 not not RB 39 244 4 really really RB 39 244 5 feasible feasible JJ 39 244 6 for for IN 39 244 7 each each DT 39 244 8 node node NN 39 244 9 on on IN 39 244 10 the the DT 39 244 11 network network NN 39 244 12 to to TO 39 244 13 have have VB 39 244 14 a a DT 39 244 15 builtin builtin JJ 39 244 16 WWV WWV NNP 39 244 17 ( ( -LRB- 39 244 18 nationwide nationwide JJ 39 244 19 radio radio NN 39 244 20 time time NN 39 244 21 standard standard NN 39 244 22 ) ) -RRB- 39 244 23 receiver receiver NN 39 244 24 . . . 39 245 1 So so CC 39 245 2 , , , 39 245 3 you -PRON- PRP 39 245 4 must must MD 39 245 5 design design VB 39 245 6 an an DT 39 245 7 algorithm algorithm NN 39 245 8 to to TO 39 245 9 pass pass VB 39 245 10 around around RP 39 245 11 time time NN 39 245 12 between between IN 39 245 13 nodes node NNS 39 245 14 over over IN 39 245 15 the the DT 39 245 16 network network NN 39 245 17 links link NNS 39 245 18 where where WRB 39 245 19 the the DT 39 245 20 delay delay NN 39 245 21 in in IN 39 245 22 transmission transmission NN 39 245 23 can can MD 39 245 24 only only RB 39 245 25 be be VB 39 245 26 approximated approximate VBN 39 245 27 . . . 39 246 1 Hello hello UH 39 246 2 routers router NNS 39 246 3 do do VBP 39 246 4 this this DT 39 246 5 and and CC 39 246 6 in in IN 39 246 7 a a DT 39 246 8 nationwide nationwide JJ 39 246 9 network network NN 39 246 10 maintain maintain VB 39 246 11 synchronized synchronize VBN 39 246 12 time time NN 39 246 13 within within IN 39 246 14 milliseconds millisecond NNS 39 246 15 . . . 39 247 1 Exterior Exterior NNP 39 247 2 Gateway Gateway NNP 39 247 3 Protocol Protocol NNP 39 247 4 ( ( -LRB- 39 247 5 EGP EGP NNP 39 247 6 RFC-904 rfc-904 NN 39 247 7 ) ) -RRB- 39 247 8 EGP EGP NNP 39 247 9 is be VBZ 39 247 10 not not RB 39 247 11 strictly strictly RB 39 247 12 a a DT 39 247 13 routing route VBG 39 247 14 protocol protocol NN 39 247 15 , , , 39 247 16 it -PRON- PRP 39 247 17 is be VBZ 39 247 18 a a DT 39 247 19 reacha- reacha- JJ 39 247 20 bility bility NN 39 247 21 protocol protocol NN 39 247 22 . . . 39 248 1 It -PRON- PRP 39 248 2 tells tell VBZ 39 248 3 only only RB 39 248 4 if if IN 39 248 5 nets net NNS 39 248 6 can can MD 39 248 7 be be VB 39 248 8 reached reach VBN 39 248 9 through through IN 39 248 10 a a DT 39 248 11 particular particular JJ 39 248 12 gateway gateway NN 39 248 13 , , , 39 248 14 not not RB 39 248 15 how how WRB 39 248 16 good good JJ 39 248 17 the the DT 39 248 18 connec- connec- NN 39 248 19 tion tion NN 39 248 20 is be VBZ 39 248 21 . . . 39 249 1 It -PRON- PRP 39 249 2 is be VBZ 39 249 3 the the DT 39 249 4 standard standard NN 39 249 5 by by IN 39 249 6 which which WDT 39 249 7 gateways gateway NNS 39 249 8 to to IN 39 249 9 local local JJ 39 249 10 nets net NNS 39 249 11 inform inform VB 39 249 12 the the DT 39 249 13 ARPAnet arpanet NN 39 249 14 of of IN 39 249 15 the the DT 39 249 16 nets net NNS 39 249 17 they -PRON- PRP 39 249 18 can can MD 39 249 19 reach reach VB 39 249 20 . . . 39 250 1 There there EX 39 250 2 is be VBZ 39 250 3 a a DT 39 250 4 metric metric JJ 39 250 5 passed pass VBN 39 250 6 around around RP 39 250 7 by by IN 39 250 8 EGP EGP NNP 39 250 9 but but CC 39 250 10 its -PRON- PRP$ 39 250 11 usage usage NN 39 250 12 is be VBZ 39 250 13 not not RB 39 250 14 standardized standardize VBN 39 250 15 formally formally RB 39 250 16 . . . 39 251 1 Its -PRON- PRP$ 39 251 2 typical typical JJ 39 251 3 value value NN 39 251 4 is be VBZ 39 251 5 value value NN 39 251 6 is be VBZ 39 251 7 1 1 CD 39 251 8 to to TO 39 251 9 8 8 CD 39 251 10 which which WDT 39 251 11 are be VBP 39 251 12 arbitrary arbitrary JJ 39 251 13 goodness goodness NN 39 251 14 of of IN 39 251 15 link link NN 39 251 16 values value NNS 39 251 17 understood understand VBN 39 251 18 by by IN 39 251 19 the the DT 39 251 20 internal internal JJ 39 251 21 DDN DDN NNP 39 251 22 gateways gateway NNS 39 251 23 . . . 39 252 1 The the DT 39 252 2 smaller small JJR 39 252 3 the the DT 39 252 4 value value NN 39 252 5 the the DT 39 252 6 better well JJR 39 252 7 and and CC 39 252 8 a a DT 39 252 9 value value NN 39 252 10 of of IN 39 252 11 8 8 CD 39 252 12 being be VBG 39 252 13 unreach- unreach- JJ 39 252 14 able able JJ 39 252 15 . . . 39 253 1 A a DT 39 253 2 quirk quirk NN 39 253 3 of of IN 39 253 4 the the DT 39 253 5 protocol protocol NN 39 253 6 prevents prevent NNS 39 253 7 distinguishing distinguish VBG 39 253 8 between between IN 39 253 9 1 1 CD 39 253 10 and and CC 39 253 11 2 2 CD 39 253 12 , , , 39 253 13 3 3 CD 39 253 14 and and CC 39 253 15 4 4 CD 39 253 16 ... ... NFP 39 253 17 , , , 39 253 18 so so CC 39 253 19 the the DT 39 253 20 usablity usablity NN 39 253 21 of of IN 39 253 22 this this DT 39 253 23 as as IN 39 253 24 a a DT 39 253 25 metric metric NN 39 253 26 is be VBZ 39 253 27 as as IN 39 253 28 three three CD 39 253 29 values value NNS 39 253 30 and and CC 39 253 31 unreachable unreachable JJ 39 253 32 . . . 39 254 1 Within within IN 39 254 2 NSFnet NSFnet NNP 39 254 3 the the DT 39 254 4 values value NNS 39 254 5 used use VBN 39 254 6 are be VBP 39 254 7 1 1 CD 39 254 8 , , , 39 254 9 3 3 CD 39 254 10 , , , 39 254 11 and and CC 39 254 12 unreachable unreachable JJ 39 254 13 . . . 39 255 1 Many many JJ 39 255 2 routers router NNS 39 255 3 talk talk VBP 39 255 4 EGP egp RB 39 255 5 so so IN 39 255 6 they -PRON- PRP 39 255 7 can can MD 39 255 8 be be VB 39 255 9 used use VBN 39 255 10 for for IN 39 255 11 ARPAnet arpanet JJ 39 255 12 gateways gateway NNS 39 255 13 . . . 39 256 1 -13- -13- : 39 256 2 Gated Gated NNP 39 256 3 So so IN 39 256 4 we -PRON- PRP 39 256 5 have have VBP 39 256 6 regional regional JJ 39 256 7 and and CC 39 256 8 campus campus NN 39 256 9 networks network NNS 39 256 10 talking talk VBG 39 256 11 RIP RIP NNP 39 256 12 among among IN 39 256 13 themselves -PRON- PRP 39 256 14 , , , 39 256 15 the the DT 39 256 16 NSFnet NSFnet NNP 39 256 17 backbone backbone NN 39 256 18 talking talk VBG 39 256 19 Hello hello UH 39 256 20 , , , 39 256 21 and and CC 39 256 22 the the DT 39 256 23 DDN DDN NNP 39 256 24 speaking speak VBG 39 256 25 EGP EGP NNP 39 256 26 . . . 39 257 1 How how WRB 39 257 2 do do VBP 39 257 3 they -PRON- PRP 39 257 4 interoperate interoperate VB 39 257 5 ? ? . 39 258 1 In in IN 39 258 2 the the DT 39 258 3 beginning beginning NN 39 258 4 there there EX 39 258 5 was be VBD 39 258 6 static static JJ 39 258 7 routing routing NN 39 258 8 , , , 39 258 9 assembled assemble VBN 39 258 10 into into IN 39 258 11 the the DT 39 258 12 Fuzzball Fuzzball NNP 39 258 13 software software NN 39 258 14 configured configure VBN 39 258 15 for for IN 39 258 16 each each DT 39 258 17 site site NN 39 258 18 . . . 39 259 1 The the DT 39 259 2 problem problem NN 39 259 3 with with IN 39 259 4 doing do VBG 39 259 5 static static JJ 39 259 6 routing routing NN 39 259 7 in in IN 39 259 8 the the DT 39 259 9 middle middle NN 39 259 10 of of IN 39 259 11 the the DT 39 259 12 network network NN 39 259 13 is be VBZ 39 259 14 that that IN 39 259 15 it -PRON- PRP 39 259 16 is be VBZ 39 259 17 broadcast broadcast VBN 39 259 18 to to IN 39 259 19 the the DT 39 259 20 Internet internet NN 39 259 21 whether whether IN 39 259 22 it -PRON- PRP 39 259 23 is be VBZ 39 259 24 usable usable JJ 39 259 25 or or CC 39 259 26 not not RB 39 259 27 . . . 39 260 1 Therefore therefore RB 39 260 2 , , , 39 260 3 if if IN 39 260 4 a a DT 39 260 5 net net NN 39 260 6 becomes become VBZ 39 260 7 unreachable unreachable JJ 39 260 8 and and CC 39 260 9 you -PRON- PRP 39 260 10 try try VBP 39 260 11 to to TO 39 260 12 get get VB 39 260 13 there there RB 39 260 14 , , , 39 260 15 dynamic dynamic JJ 39 260 16 routing routing NN 39 260 17 will will MD 39 260 18 immediately immediately RB 39 260 19 issue issue VB 39 260 20 a a DT 39 260 21 net net NN 39 260 22 unreachable unreachable JJ 39 260 23 to to IN 39 260 24 you -PRON- PRP 39 260 25 . . . 39 261 1 Under under IN 39 261 2 static static NN 39 261 3 routing route VBG 39 261 4 the the DT 39 261 5 routers router NNS 39 261 6 would would MD 39 261 7 think think VB 39 261 8 the the DT 39 261 9 net net NN 39 261 10 could could MD 39 261 11 be be VB 39 261 12 reached reach VBN 39 261 13 and and CC 39 261 14 would would MD 39 261 15 continue continue VB 39 261 16 trying try VBG 39 261 17 until until IN 39 261 18 the the DT 39 261 19 application application NN 39 261 20 gave give VBD 39 261 21 up up RP 39 261 22 ( ( -LRB- 39 261 23 in in IN 39 261 24 2 2 CD 39 261 25 or or CC 39 261 26 more more JJR 39 261 27 minutes minute NNS 39 261 28 ) ) -RRB- 39 261 29 . . . 39 262 1 Mark Mark NNP 39 262 2 Fedor Fedor NNP 39 262 3 of of IN 39 262 4 Cornell Cornell NNP 39 262 5 ( ( -LRB- 39 262 6 fedor@devvax.tn.cornell.edu fedor@devvax.tn.cornell.edu NNPS 39 262 7 ) ) -RRB- 39 262 8 attempted attempt VBD 39 262 9 to to TO 39 262 10 solve solve VB 39 262 11 these these DT 39 262 12 problems problem NNS 39 262 13 with with IN 39 262 14 a a DT 39 262 15 replacement replacement NN 39 262 16 for for IN 39 262 17 " " `` 39 262 18 routed route VBN 39 262 19 " " '' 39 262 20 called call VBN 39 262 21 " " `` 39 262 22 gated gate VBN 39 262 23 " " '' 39 262 24 . . . 39 263 1 " " `` 39 263 2 Gated Gated NNP 39 263 3 " " '' 39 263 4 talks talk VBZ 39 263 5 RIP RIP NNP 39 263 6 to to IN 39 263 7 RIP RIP NNP 39 263 8 speaking speak VBG 39 263 9 hosts host NNS 39 263 10 , , , 39 263 11 EGP EGP NNP 39 263 12 to to IN 39 263 13 EGP EGP NNP 39 263 14 speakers speaker NNS 39 263 15 , , , 39 263 16 and and CC 39 263 17 Hello hello UH 39 263 18 to to IN 39 263 19 Hello'ers hello'er NNS 39 263 20 . . . 39 264 1 These these DT 39 264 2 speakers speaker NNS 39 264 3 frequently frequently RB 39 264 4 all all DT 39 264 5 live live VBP 39 264 6 on on IN 39 264 7 one one CD 39 264 8 Ethernet ethernet NN 39 264 9 , , , 39 264 10 but but CC 39 264 11 luckily luckily RB 39 264 12 ( ( -LRB- 39 264 13 or or CC 39 264 14 unluckily unluckily RB 39 264 15 ) ) -RRB- 39 264 16 can can MD 39 264 17 not not RB 39 264 18 understand understand VB 39 264 19 each each DT 39 264 20 others other NNS 39 264 21 ruminations rumination NNS 39 264 22 . . . 39 265 1 In in IN 39 265 2 addition addition NN 39 265 3 , , , 39 265 4 under under IN 39 265 5 configuration configuration NN 39 265 6 file file NN 39 265 7 control control NN 39 265 8 it -PRON- PRP 39 265 9 can can MD 39 265 10 filter filter VB 39 265 11 the the DT 39 265 12 conversion conversion NN 39 265 13 . . . 39 266 1 For for IN 39 266 2 example example NN 39 266 3 , , , 39 266 4 one one PRP 39 266 5 can can MD 39 266 6 produce produce VB 39 266 7 a a DT 39 266 8 configuration configuration NN 39 266 9 saying say VBG 39 266 10 announce announce VB 39 266 11 RIP RIP NNP 39 266 12 nets net NNS 39 266 13 via via IN 39 266 14 Hello hello UH 39 266 15 only only RB 39 266 16 if if IN 39 266 17 they -PRON- PRP 39 266 18 are be VBP 39 266 19 specified specify VBN 39 266 20 in in IN 39 266 21 a a DT 39 266 22 list list NN 39 266 23 and and CC 39 266 24 are be VBP 39 266 25 reachable reachable JJ 39 266 26 by by IN 39 266 27 way way NN 39 266 28 of of IN 39 266 29 a a DT 39 266 30 RIP RIP NNP 39 266 31 broadcast broadcast NN 39 266 32 as as RB 39 266 33 well well RB 39 266 34 . . . 39 267 1 This this DT 39 267 2 means mean VBZ 39 267 3 that that IN 39 267 4 if if IN 39 267 5 a a DT 39 267 6 rogue rogue JJ 39 267 7 network network NN 39 267 8 appears appear VBZ 39 267 9 in in IN 39 267 10 your -PRON- PRP$ 39 267 11 local local JJ 39 267 12 site site NN 39 267 13 's 's POS 39 267 14 RIP RIP NNP 39 267 15 space space NN 39 267 16 , , , 39 267 17 it -PRON- PRP 39 267 18 wo will MD 39 267 19 n't not RB 39 267 20 be be VB 39 267 21 passed pass VBN 39 267 22 through through RP 39 267 23 to to IN 39 267 24 the the DT 39 267 25 Hello Hello NNP 39 267 26 side side NN 39 267 27 of of IN 39 267 28 the the DT 39 267 29 world world NN 39 267 30 . . . 39 268 1 There there EX 39 268 2 are be VBP 39 268 3 also also RB 39 268 4 configuration configuration NN 39 268 5 options option NNS 39 268 6 to to TO 39 268 7 do do VB 39 268 8 static static JJ 39 268 9 routing routing NN 39 268 10 and and CC 39 268 11 name name NN 39 268 12 trusted trust VBD 39 268 13 gateways gateway NNS 39 268 14 . . . 39 269 1 This this DT 39 269 2 may may MD 39 269 3 sound sound VB 39 269 4 like like IN 39 269 5 the the DT 39 269 6 greatest great JJS 39 269 7 thing thing NN 39 269 8 since since IN 39 269 9 sliced sliced JJ 39 269 10 bread bread NN 39 269 11 , , , 39 269 12 but but CC 39 269 13 there there EX 39 269 14 is be VBZ 39 269 15 a a DT 39 269 16 catch catch NN 39 269 17 called call VBN 39 269 18 metric metric JJ 39 269 19 conversion conversion NN 39 269 20 . . . 39 270 1 You -PRON- PRP 39 270 2 have have VBP 39 270 3 RIP RIP NNP 39 270 4 measuring measure VBG 39 270 5 in in IN 39 270 6 hops hop NNS 39 270 7 , , , 39 270 8 Hello hello UH 39 270 9 measuring measure VBG 39 270 10 in in IN 39 270 11 milliseconds millisecond NNS 39 270 12 , , , 39 270 13 and and CC 39 270 14 EGP EGP NNP 39 270 15 using use VBG 39 270 16 arbitrary arbitrary JJ 39 270 17 small small JJ 39 270 18 numbers number NNS 39 270 19 . . . 39 271 1 The the DT 39 271 2 big big JJ 39 271 3 questions question NNS 39 271 4 is be VBZ 39 271 5 how how WRB 39 271 6 many many JJ 39 271 7 hops hop NNS 39 271 8 to to IN 39 271 9 a a DT 39 271 10 millisecond millisecond NN 39 271 11 , , , 39 271 12 how how WRB 39 271 13 many many JJ 39 271 14 milliseconds millisecond NNS 39 271 15 in in IN 39 271 16 the the DT 39 271 17 EGP EGP NNP 39 271 18 number number NN 39 271 19 3 3 CD 39 271 20 .... .... NFP 39 271 21 Also also RB 39 271 22 , , , 39 271 23 remember remember VB 39 271 24 that that IN 39 271 25 infinity infinity NN 39 271 26 ( ( -LRB- 39 271 27 unreachability unreachability NN 39 271 28 ) ) -RRB- 39 271 29 is be VBZ 39 271 30 16 16 CD 39 271 31 to to IN 39 271 32 RIP RIP NNP 39 271 33 , , , 39 271 34 30000 30000 CD 39 271 35 or or CC 39 271 36 so so RB 39 271 37 to to IN 39 271 38 Hello hello UH 39 271 39 , , , 39 271 40 and and CC 39 271 41 8 8 CD 39 271 42 to to IN 39 271 43 the the DT 39 271 44 DDN DDN NNP 39 271 45 with with IN 39 271 46 EGP EGP NNP 39 271 47 . . . 39 272 1 Getting get VBG 39 272 2 all all PDT 39 272 3 these these DT 39 272 4 metrics metric NNS 39 272 5 to to TO 39 272 6 work work VB 39 272 7 well well RB 39 272 8 together together RB 39 272 9 is be VBZ 39 272 10 no no DT 39 272 11 small small JJ 39 272 12 feat feat NN 39 272 13 . . . 39 273 1 If if IN 39 273 2 done do VBN 39 273 3 incorrectly incorrectly RB 39 273 4 and and CC 39 273 5 you -PRON- PRP 39 273 6 translate translate VBP 39 273 7 an an DT 39 273 8 RIP rip NN 39 273 9 of of IN 39 273 10 16 16 CD 39 273 11 into into IN 39 273 12 an an DT 39 273 13 EGP EGP NNP 39 273 14 of of IN 39 273 15 6 6 CD 39 273 16 , , , 39 273 17 everyone everyone NN 39 273 18 in in IN 39 273 19 the the DT 39 273 20 ARPAnet arpanet NN 39 273 21 will will MD 39 273 22 still still RB 39 273 23 think think VB 39 273 24 your -PRON- PRP$ 39 273 25 gateway gateway NN 39 273 26 can can MD 39 273 27 reach reach VB 39 273 28 the the DT 39 273 29 unreachable unreachable JJ 39 273 30 and and CC 39 273 31 will will MD 39 273 32 send send VB 39 273 33 every every DT 39 273 34 packet packet NN 39 273 35 in in IN 39 273 36 the the DT 39 273 37 world world NN 39 273 38 your -PRON- PRP$ 39 273 39 way way NN 39 273 40 . . . 39 274 1 For for IN 39 274 2 these these DT 39 274 3 reasons reason NNS 39 274 4 , , , 39 274 5 Mark Mark NNP 39 274 6 requests request NNS 39 274 7 that that IN 39 274 8 you -PRON- PRP 39 274 9 consult consult VBP 39 274 10 closely closely RB 39 274 11 with with IN 39 274 12 him -PRON- PRP 39 274 13 when when WRB 39 274 14 configuring configure VBG 39 274 15 and and CC 39 274 16 using use VBG 39 274 17 " " `` 39 274 18 gated gate VBN 39 274 19 " " '' 39 274 20 . . . 39 275 1 -14- -14- : 39 275 2 " " `` 39 275 3 Names name NNS 39 275 4 " " '' 39 275 5 All all DT 39 275 6 routing route VBG 39 275 7 across across IN 39 275 8 the the DT 39 275 9 network network NN 39 275 10 is be VBZ 39 275 11 done do VBN 39 275 12 by by IN 39 275 13 means mean NNS 39 275 14 of of IN 39 275 15 the the DT 39 275 16 IP IP NNP 39 275 17 address address NN 39 275 18 associated associate VBN 39 275 19 with with IN 39 275 20 a a DT 39 275 21 packet packet NN 39 275 22 . . . 39 276 1 Since since IN 39 276 2 humans human NNS 39 276 3 find find VBP 39 276 4 it -PRON- PRP 39 276 5 difficult difficult JJ 39 276 6 to to TO 39 276 7 remember remember VB 39 276 8 addresses address NNS 39 276 9 like like IN 39 276 10 128.174.5.50 128.174.5.50 CD 39 276 11 , , , 39 276 12 a a DT 39 276 13 symbolic symbolic JJ 39 276 14 name name NN 39 276 15 register register NN 39 276 16 was be VBD 39 276 17 set set VBN 39 276 18 up up RP 39 276 19 at at IN 39 276 20 the the DT 39 276 21 NIC NIC NNP 39 276 22 where where WRB 39 276 23 people people NNS 39 276 24 would would MD 39 276 25 say say VB 39 276 26 " " `` 39 276 27 I -PRON- PRP 39 276 28 would would MD 39 276 29 like like VB 39 276 30 my -PRON- PRP$ 39 276 31 host host NN 39 276 32 to to TO 39 276 33 be be VB 39 276 34 named name VBN 39 276 35 ' ' `` 39 276 36 uiucuxc uiucuxc NN 39 276 37 ' ' '' 39 276 38 " " '' 39 276 39 . . . 39 277 1 Machines machine NNS 39 277 2 connected connect VBN 39 277 3 to to IN 39 277 4 the the DT 39 277 5 Internet internet NN 39 277 6 across across IN 39 277 7 the the DT 39 277 8 nation nation NN 39 277 9 would would MD 39 277 10 connect connect VB 39 277 11 to to IN 39 277 12 the the DT 39 277 13 NIC NIC NNP 39 277 14 in in IN 39 277 15 the the DT 39 277 16 middle middle NN 39 277 17 of of IN 39 277 18 the the DT 39 277 19 night night NN 39 277 20 , , , 39 277 21 check check VB 39 277 22 modification modification NN 39 277 23 dates date VBZ 39 277 24 on on IN 39 277 25 the the DT 39 277 26 hosts host NNS 39 277 27 file file NN 39 277 28 , , , 39 277 29 and and CC 39 277 30 if if IN 39 277 31 modified modify VBN 39 277 32 move move VBP 39 277 33 it -PRON- PRP 39 277 34 to to IN 39 277 35 their -PRON- PRP$ 39 277 36 local local JJ 39 277 37 machine machine NN 39 277 38 . . . 39 278 1 With with IN 39 278 2 the the DT 39 278 3 advent advent NN 39 278 4 of of IN 39 278 5 workstations workstation NNS 39 278 6 and and CC 39 278 7 micros micros NNP 39 278 8 , , , 39 278 9 changes change VBZ 39 278 10 to to IN 39 278 11 the the DT 39 278 12 host host NN 39 278 13 file file NN 39 278 14 would would MD 39 278 15 have have VB 39 278 16 to to TO 39 278 17 be be VB 39 278 18 made make VBN 39 278 19 nightly nightly RB 39 278 20 . . . 39 279 1 It -PRON- PRP 39 279 2 would would MD 39 279 3 also also RB 39 279 4 be be VB 39 279 5 very very RB 39 279 6 labor labor NN 39 279 7 intensive intensive JJ 39 279 8 and and CC 39 279 9 consume consume VB 39 279 10 a a DT 39 279 11 lot lot NN 39 279 12 of of IN 39 279 13 network network NN 39 279 14 bandwidth bandwidth NN 39 279 15 . . . 39 280 1 RFC-882 rfc-882 UH 39 280 2 and and CC 39 280 3 a a DT 39 280 4 number number NN 39 280 5 of of IN 39 280 6 others other NNS 39 280 7 describe describe VBP 39 280 8 domain domain NN 39 280 9 name name NN 39 280 10 service service NNP 39 280 11 , , , 39 280 12 a a DT 39 280 13 distributed distribute VBN 39 280 14 data data NN 39 280 15 base base NN 39 280 16 system system NN 39 280 17 for for IN 39 280 18 mapping map VBG 39 280 19 names name NNS 39 280 20 into into IN 39 280 21 addresses address NNS 39 280 22 . . . 39 281 1 We -PRON- PRP 39 281 2 must must MD 39 281 3 look look VB 39 281 4 a a DT 39 281 5 little little RB 39 281 6 more more RBR 39 281 7 closely closely RB 39 281 8 into into IN 39 281 9 what what WP 39 281 10 's be VBZ 39 281 11 in in IN 39 281 12 a a DT 39 281 13 name name NN 39 281 14 . . . 39 282 1 First first RB 39 282 2 , , , 39 282 3 note note VB 39 282 4 that that IN 39 282 5 an an DT 39 282 6 address address NN 39 282 7 specifies specify VBZ 39 282 8 a a DT 39 282 9 particular particular JJ 39 282 10 connec- connec- NN 39 282 11 tion tion NN 39 282 12 on on IN 39 282 13 a a DT 39 282 14 specific specific JJ 39 282 15 network network NN 39 282 16 . . . 39 283 1 If if IN 39 283 2 the the DT 39 283 3 machine machine NN 39 283 4 moves move VBZ 39 283 5 , , , 39 283 6 the the DT 39 283 7 address address NN 39 283 8 changes change VBZ 39 283 9 . . . 39 284 1 Second second RB 39 284 2 , , , 39 284 3 a a DT 39 284 4 machine machine NN 39 284 5 can can MD 39 284 6 have have VB 39 284 7 one one CD 39 284 8 or or CC 39 284 9 more more JJR 39 284 10 names name NNS 39 284 11 and and CC 39 284 12 one one CD 39 284 13 or or CC 39 284 14 more more JJR 39 284 15 network network NN 39 284 16 addresses address NNS 39 284 17 ( ( -LRB- 39 284 18 connections connection NNS 39 284 19 ) ) -RRB- 39 284 20 to to IN 39 284 21 different different JJ 39 284 22 networks network NNS 39 284 23 . . . 39 285 1 Names name NNS 39 285 2 point point NN 39 285 3 to to IN 39 285 4 a a DT 39 285 5 something something NN 39 285 6 which which WDT 39 285 7 does do VBZ 39 285 8 useful useful JJ 39 285 9 work work NN 39 285 10 ( ( -LRB- 39 285 11 i.e. i.e. FW 39 286 1 the the DT 39 286 2 machine machine NN 39 286 3 ) ) -RRB- 39 286 4 and and CC 39 286 5 IP IP NNP 39 286 6 addresses address VBZ 39 286 7 point point VBP 39 286 8 to to IN 39 286 9 an an DT 39 286 10 interface interface NN 39 286 11 on on IN 39 286 12 that that DT 39 286 13 provider provider NN 39 286 14 . . . 39 287 1 A a DT 39 287 2 name name NN 39 287 3 is be VBZ 39 287 4 a a DT 39 287 5 purely purely RB 39 287 6 symbolic symbolic JJ 39 287 7 representation representation NN 39 287 8 of of IN 39 287 9 a a DT 39 287 10 list list NN 39 287 11 of of IN 39 287 12 addresses address NNS 39 287 13 on on IN 39 287 14 the the DT 39 287 15 network network NN 39 287 16 . . . 39 288 1 If if IN 39 288 2 a a DT 39 288 3 machine machine NN 39 288 4 moves move VBZ 39 288 5 to to IN 39 288 6 a a DT 39 288 7 different different JJ 39 288 8 network network NN 39 288 9 , , , 39 288 10 the the DT 39 288 11 addresses address NNS 39 288 12 will will MD 39 288 13 change change VB 39 288 14 but but CC 39 288 15 the the DT 39 288 16 name name NN 39 288 17 could could MD 39 288 18 remain remain VB 39 288 19 the the DT 39 288 20 same same JJ 39 288 21 . . . 39 289 1 Domain domain NN 39 289 2 names name NNS 39 289 3 are be VBP 39 289 4 tree tree NN 39 289 5 structured structure VBN 39 289 6 names name NNS 39 289 7 with with IN 39 289 8 the the DT 39 289 9 root root NN 39 289 10 of of IN 39 289 11 the the DT 39 289 12 tree tree NN 39 289 13 at at IN 39 289 14 the the DT 39 289 15 right right NN 39 289 16 . . . 39 290 1 For for IN 39 290 2 example example NN 39 290 3 : : : 39 290 4 uxc.cso.uiuc.edu uxc.cso.uiuc.edu NNS 39 290 5 is be VBZ 39 290 6 a a DT 39 290 7 machine machine NN 39 290 8 called call VBN 39 290 9 ' ' `` 39 290 10 uxc uxc NNP 39 290 11 ' ' '' 39 290 12 ( ( -LRB- 39 290 13 purely purely RB 39 290 14 arbitrary arbitrary JJ 39 290 15 ) ) -RRB- 39 290 16 , , , 39 290 17 within within IN 39 290 18 the the DT 39 290 19 subdomains subdomain NNS 39 290 20 method method NN 39 290 21 of of IN 39 290 22 allocation allocation NN 39 290 23 of of IN 39 290 24 the the DT 39 290 25 U u NN 39 290 26 of of IN 39 290 27 I I NNP 39 290 28 ) ) -RRB- 39 290 29 and and CC 39 290 30 ' ' `` 39 290 31 uiuc uiuc NN 39 290 32 ' ' '' 39 290 33 ( ( -LRB- 39 290 34 the the DT 39 290 35 University University NNP 39 290 36 of of IN 39 290 37 Illinois Illinois NNP 39 290 38 at at IN 39 290 39 Urbana Urbana NNP 39 290 40 ) ) -RRB- 39 290 41 , , , 39 290 42 registered register VBN 39 290 43 with with IN 39 290 44 ' ' `` 39 290 45 edu edu NN 39 290 46 ' ' '' 39 290 47 ( ( -LRB- 39 290 48 the the DT 39 290 49 set set NN 39 290 50 of of IN 39 290 51 educational educational JJ 39 290 52 institutions institution NNS 39 290 53 ) ) -RRB- 39 290 54 . . . 39 291 1 A a DT 39 291 2 simplified simplified JJ 39 291 3 model model NN 39 291 4 of of IN 39 291 5 how how WRB 39 291 6 a a DT 39 291 7 name name NN 39 291 8 is be VBZ 39 291 9 resolved resolve VBN 39 291 10 is be VBZ 39 291 11 that that DT 39 291 12 on on IN 39 291 13 the the DT 39 291 14 user user NN 39 291 15 's 's POS 39 291 16 machine machine NN 39 291 17 there there EX 39 291 18 is be VBZ 39 291 19 a a DT 39 291 20 resolver resolver NN 39 291 21 . . . 39 292 1 The the DT 39 292 2 resolver resolver NN 39 292 3 knows know VBZ 39 292 4 how how WRB 39 292 5 to to TO 39 292 6 contact contact VB 39 292 7 across across IN 39 292 8 the the DT 39 292 9 network network NN 39 292 10 a a DT 39 292 11 root root NN 39 292 12 name name NN 39 292 13 server server NN 39 292 14 . . . 39 293 1 Root root NN 39 293 2 servers server NNS 39 293 3 are be VBP 39 293 4 the the DT 39 293 5 base base NN 39 293 6 of of IN 39 293 7 the the DT 39 293 8 tree tree NN 39 293 9 structured structure VBN 39 293 10 data data NNP 39 293 11 retrieval retrieval NN 39 293 12 system system NN 39 293 13 . . . 39 294 1 They -PRON- PRP 39 294 2 know know VBP 39 294 3 who who WP 39 294 4 is be VBZ 39 294 5 responsible responsible JJ 39 294 6 for for IN 39 294 7 handling handle VBG 39 294 8 first first JJ 39 294 9 level level NN 39 294 10 domains domain NNS 39 294 11 ( ( -LRB- 39 294 12 e.g. e.g. RB 39 295 1 ' ' `` 39 295 2 edu edu NNP 39 295 3 ' ' '' 39 295 4 ) ) -RRB- 39 295 5 . . . 39 296 1 What what WDT 39 296 2 root root NN 39 296 3 servers server NNS 39 296 4 to to TO 39 296 5 use use VB 39 296 6 is be VBZ 39 296 7 an an DT 39 296 8 installation installation NN 39 296 9 parameter parameter NN 39 296 10 . . . 39 297 1 From from IN 39 297 2 the the DT 39 297 3 root root NN 39 297 4 server server NN 39 297 5 the the DT 39 297 6 resolver resolver NN 39 297 7 finds find VBZ 39 297 8 out out RP 39 297 9 who who WP 39 297 10 provides provide VBZ 39 297 11 ' ' `` 39 297 12 edu edu NN 39 297 13 ' ' '' 39 297 14 service service NN 39 297 15 . . . 39 298 1 It -PRON- PRP 39 298 2 contacts contact VBZ 39 298 3 the the DT 39 298 4 ' ' `` 39 298 5 edu edu NN 39 298 6 ' ' POS 39 298 7 name name NN 39 298 8 server server NN 39 298 9 which which WDT 39 298 10 supplies supply VBZ 39 298 11 it -PRON- PRP 39 298 12 with with IN 39 298 13 a a DT 39 298 14 list list NN 39 298 15 of of IN 39 298 16 addresses address NNS 39 298 17 of of IN 39 298 18 servers server NNS 39 298 19 for for IN 39 298 20 the the DT 39 298 21 subdomains subdomains NNPS 39 298 22 ( ( -LRB- 39 298 23 like like UH 39 298 24 ' ' `` 39 298 25 uiuc uiuc NN 39 298 26 ' ' '' 39 298 27 ) ) -RRB- 39 298 28 . . . 39 299 1 This this DT 39 299 2 action action NN 39 299 3 is be VBZ 39 299 4 repeated repeat VBN 39 299 5 with with IN 39 299 6 the the DT 39 299 7 subdomain subdomain NN 39 299 8 servers server NNS 39 299 9 until until IN 39 299 10 the the DT 39 299 11 final final JJ 39 299 12 sub- sub- JJ 39 299 13 domain domain NN 39 299 14 returns return VBZ 39 299 15 a a DT 39 299 16 list list NN 39 299 17 of of IN 39 299 18 addresses address NNS 39 299 19 of of IN 39 299 20 interfaces interface NNS 39 299 21 on on IN 39 299 22 the the DT 39 299 23 host host NN 39 299 24 in in IN 39 299 25 question question NN 39 299 26 . . . 39 300 1 The the DT 39 300 2 user user NN 39 300 3 's 's POS 39 300 4 machine machine NN 39 300 5 then then RB 39 300 6 has have VBZ 39 300 7 its -PRON- PRP$ 39 300 8 choice choice NN 39 300 9 of of IN 39 300 10 which which WDT 39 300 11 of of IN 39 300 12 these these DT 39 300 13 addresses address NNS 39 300 14 to to TO 39 300 15 use use VB 39 300 16 for for IN 39 300 17 communication communication NN 39 300 18 . . . 39 301 1 -15- -15- : 39 301 2 A a DT 39 301 3 group group NN 39 301 4 may may MD 39 301 5 apply apply VB 39 301 6 for for IN 39 301 7 its -PRON- PRP$ 39 301 8 own own JJ 39 301 9 domain domain NN 39 301 10 name name NN 39 301 11 ( ( -LRB- 39 301 12 like like UH 39 301 13 ' ' `` 39 301 14 uiuc uiuc NN 39 301 15 ' ' '' 39 301 16 above above RB 39 301 17 ) ) -RRB- 39 301 18 . . . 39 302 1 This this DT 39 302 2 is be VBZ 39 302 3 done do VBN 39 302 4 in in IN 39 302 5 a a DT 39 302 6 manner manner NN 39 302 7 similar similar JJ 39 302 8 to to IN 39 302 9 the the DT 39 302 10 IP IP NNP 39 302 11 address address NN 39 302 12 allocation allocation NN 39 302 13 . . . 39 303 1 The the DT 39 303 2 only only JJ 39 303 3 requirements requirement NNS 39 303 4 are be VBP 39 303 5 that that IN 39 303 6 the the DT 39 303 7 requestor requestor NN 39 303 8 have have VBP 39 303 9 two two CD 39 303 10 machines machine NNS 39 303 11 reachable reachable JJ 39 303 12 from from IN 39 303 13 the the DT 39 303 14 Internet internet NN 39 303 15 , , , 39 303 16 which which WDT 39 303 17 will will MD 39 303 18 act act VB 39 303 19 as as IN 39 303 20 name name NN 39 303 21 servers server NNS 39 303 22 for for IN 39 303 23 that that DT 39 303 24 domain domain NN 39 303 25 . . . 39 304 1 Those those DT 39 304 2 servers server NNS 39 304 3 could could MD 39 304 4 also also RB 39 304 5 act act VB 39 304 6 as as IN 39 304 7 servers server NNS 39 304 8 for for IN 39 304 9 subdomains subdomain NNS 39 304 10 or or CC 39 304 11 other other JJ 39 304 12 servers server NNS 39 304 13 could could MD 39 304 14 be be VB 39 304 15 designated designate VBN 39 304 16 as as IN 39 304 17 such such JJ 39 304 18 . . . 39 305 1 Note note VB 39 305 2 that that IN 39 305 3 the the DT 39 305 4 servers server NNS 39 305 5 need nee MD 39 305 6 not not RB 39 305 7 be be VB 39 305 8 located locate VBN 39 305 9 in in IN 39 305 10 any any DT 39 305 11 particular particular JJ 39 305 12 place place NN 39 305 13 , , , 39 305 14 as as RB 39 305 15 long long RB 39 305 16 as as IN 39 305 17 they -PRON- PRP 39 305 18 are be VBP 39 305 19 reach- reach- VBN 39 305 20 able able JJ 39 305 21 for for IN 39 305 22 name name NN 39 305 23 resolution resolution NN 39 305 24 . . . 39 306 1 ( ( -LRB- 39 306 2 U u NN 39 306 3 of of IN 39 306 4 I -PRON- PRP 39 306 5 could could MD 39 306 6 ask ask VB 39 306 7 Michigan Michigan NNP 39 306 8 State State NNP 39 306 9 to to TO 39 306 10 act act VB 39 306 11 on on IN 39 306 12 its -PRON- PRP$ 39 306 13 behalf behalf NN 39 306 14 and and CC 39 306 15 that that DT 39 306 16 would would MD 39 306 17 be be VB 39 306 18 fine fine JJ 39 306 19 ) ) -RRB- 39 306 20 . . . 39 307 1 The the DT 39 307 2 biggest big JJS 39 307 3 problem problem NN 39 307 4 is be VBZ 39 307 5 that that IN 39 307 6 someone someone NN 39 307 7 must must MD 39 307 8 do do VB 39 307 9 maintenance maintenance NN 39 307 10 on on IN 39 307 11 the the DT 39 307 12 database database NN 39 307 13 . . . 39 308 1 If if IN 39 308 2 the the DT 39 308 3 machine machine NN 39 308 4 is be VBZ 39 308 5 not not RB 39 308 6 convenient convenient JJ 39 308 7 , , , 39 308 8 that that DT 39 308 9 might may MD 39 308 10 not not RB 39 308 11 be be VB 39 308 12 done do VBN 39 308 13 in in IN 39 308 14 a a DT 39 308 15 timely timely JJ 39 308 16 fashion fashion NN 39 308 17 . . . 39 309 1 The the DT 39 309 2 other other JJ 39 309 3 thing thing NN 39 309 4 to to TO 39 309 5 note note VB 39 309 6 is be VBZ 39 309 7 that that IN 39 309 8 once once RB 39 309 9 the the DT 39 309 10 domain domain NN 39 309 11 is be VBZ 39 309 12 allocated allocate VBN 39 309 13 to to IN 39 309 14 an an DT 39 309 15 administrative administrative JJ 39 309 16 entity entity NN 39 309 17 , , , 39 309 18 that that DT 39 309 19 entity entity NN 39 309 20 can can MD 39 309 21 freely freely RB 39 309 22 allocate allocate VB 39 309 23 subdomains subdomain NNS 39 309 24 using use VBG 39 309 25 what what WP 39 309 26 ever ever RB 39 309 27 manner manner NN 39 309 28 it -PRON- PRP 39 309 29 sees see VBZ 39 309 30 fit fit JJ 39 309 31 . . . 39 310 1 The the DT 39 310 2 Berkeley Berkeley NNP 39 310 3 Internet Internet NNP 39 310 4 Name name NN 39 310 5 Domain Domain NNP 39 310 6 ( ( -LRB- 39 310 7 BIND BIND NNP 39 310 8 ) ) -RRB- 39 310 9 Server server NN 39 310 10 implements implement VBZ 39 310 11 the the DT 39 310 12 Internet internet NN 39 310 13 name name NN 39 310 14 server server NN 39 310 15 for for IN 39 310 16 UNIX UNIX NNP 39 310 17 systems system NNS 39 310 18 . . . 39 311 1 The the DT 39 311 2 name name NN 39 311 3 server server NN 39 311 4 is be VBZ 39 311 5 a a DT 39 311 6 distributed distribute VBN 39 311 7 data data NN 39 311 8 base base NN 39 311 9 system system NN 39 311 10 that that WDT 39 311 11 allows allow VBZ 39 311 12 clients client NNS 39 311 13 to to TO 39 311 14 name name VB 39 311 15 resources resource NNS 39 311 16 and and CC 39 311 17 to to TO 39 311 18 share share VB 39 311 19 that that DT 39 311 20 information information NN 39 311 21 with with IN 39 311 22 other other JJ 39 311 23 net- net- NN 39 311 24 work work NN 39 311 25 hosts host NNS 39 311 26 . . . 39 312 1 BIND BIND NNP 39 312 2 is be VBZ 39 312 3 integrated integrate VBN 39 312 4 with with IN 39 312 5 4.3BSD 4.3bsd CD 39 312 6 and and CC 39 312 7 is be VBZ 39 312 8 used use VBN 39 312 9 to to IN 39 312 10 lookup lookup VB 39 312 11 and and CC 39 312 12 store store VB 39 312 13 host host NN 39 312 14 names name NNS 39 312 15 , , , 39 312 16 addresses address NNS 39 312 17 , , , 39 312 18 mail mail NN 39 312 19 agents agent NNS 39 312 20 , , , 39 312 21 host host NN 39 312 22 information information NN 39 312 23 , , , 39 312 24 and and CC 39 312 25 more more JJR 39 312 26 . . . 39 313 1 It -PRON- PRP 39 313 2 replaces replace VBZ 39 313 3 the the DT 39 313 4 " " `` 39 313 5 /etc /etc NNS 39 313 6 / / SYM 39 313 7 hosts host NNS 39 313 8 " " `` 39 313 9 file file NN 39 313 10 for for IN 39 313 11 host host NN 39 313 12 name name NN 39 313 13 lookup lookup NN 39 313 14 . . . 39 314 1 BIND BIND NNP 39 314 2 is be VBZ 39 314 3 still still RB 39 314 4 an an DT 39 314 5 evolving evolve VBG 39 314 6 program program NN 39 314 7 . . . 39 315 1 To to TO 39 315 2 keep keep VB 39 315 3 up up RP 39 315 4 with with IN 39 315 5 reports report NNS 39 315 6 on on IN 39 315 7 operational operational JJ 39 315 8 problems problem NNS 39 315 9 , , , 39 315 10 future future JJ 39 315 11 design design NN 39 315 12 decisions decision NNS 39 315 13 , , , 39 315 14 etc etc FW 39 315 15 , , , 39 315 16 join join VBP 39 315 17 the the DT 39 315 18 BIND BIND NNP 39 315 19 mailing mailing NN 39 315 20 list list NN 39 315 21 by by IN 39 315 22 sending send VBG 39 315 23 a a DT 39 315 24 request request NN 39 315 25 to to TO 39 315 26 " " `` 39 315 27 bind bind VB 39 315 28 - - HYPH 39 315 29 request@ucbarp request@ucbarp CD 39 315 30 . . . 39 315 31 Berkeley Berkeley NNP 39 315 32 . . . 39 315 33 EDU EDU NNP 39 315 34 " " '' 39 315 35 . . . 39 316 1 BIND BIND NNP 39 316 2 can can MD 39 316 3 also also RB 39 316 4 be be VB 39 316 5 obtained obtain VBN 39 316 6 via via IN 39 316 7 anonymous anonymous JJ 39 316 8 FTP FTP NNP 39 316 9 from from IN 39 316 10 ucbarpa.berkley.edu ucbarpa.berkley.edu NNS 39 316 11 . . . 39 317 1 There there EX 39 317 2 are be VBP 39 317 3 several several JJ 39 317 4 advantages advantage NNS 39 317 5 in in IN 39 317 6 using use VBG 39 317 7 BIND BIND NNP 39 317 8 . . . 39 318 1 One one CD 39 318 2 of of IN 39 318 3 the the DT 39 318 4 most most RBS 39 318 5 important important JJ 39 318 6 is be VBZ 39 318 7 that that IN 39 318 8 it -PRON- PRP 39 318 9 frees free VBZ 39 318 10 a a DT 39 318 11 host host NN 39 318 12 from from IN 39 318 13 relying rely VBG 39 318 14 on on IN 39 318 15 " " `` 39 318 16 /etc /etc NNS 39 318 17 / / SYM 39 318 18 hosts host NNS 39 318 19 " " `` 39 318 20 being be VBG 39 318 21 up up IN 39 318 22 to to IN 39 318 23 date date NN 39 318 24 and and CC 39 318 25 complete complete JJ 39 318 26 . . . 39 319 1 Within within IN 39 319 2 the the DT 39 319 3 .uiuc.edu .uiuc.edu NN 39 319 4 domain domain NN 39 319 5 , , , 39 319 6 only only RB 39 319 7 a a DT 39 319 8 few few JJ 39 319 9 hosts host NNS 39 319 10 are be VBP 39 319 11 included include VBN 39 319 12 in in IN 39 319 13 the the DT 39 319 14 host host NN 39 319 15 table table NN 39 319 16 distributed distribute VBN 39 319 17 by by IN 39 319 18 SRI SRI NNP 39 319 19 . . . 39 320 1 The the DT 39 320 2 remainder remainder NN 39 320 3 are be VBP 39 320 4 listed list VBN 39 320 5 locally locally RB 39 320 6 within within IN 39 320 7 the the DT 39 320 8 BIND BIND NNP 39 320 9 tables table NNS 39 320 10 on on IN 39 320 11 uxc.cso.uiuc.edu uxc.cso.uiuc.edu NNP 39 320 12 ( ( -LRB- 39 320 13 the the DT 39 320 14 server server NN 39 320 15 machine machine NN 39 320 16 for for IN 39 320 17 most most JJS 39 320 18 of of IN 39 320 19 the the DT 39 320 20 .uiuc.edu .uiuc.edu NN 39 320 21 domain domain NN 39 320 22 ) ) -RRB- 39 320 23 . . . 39 321 1 All all DT 39 321 2 are be VBP 39 321 3 equally equally RB 39 321 4 reachable reachable JJ 39 321 5 from from IN 39 321 6 any any DT 39 321 7 other other JJ 39 321 8 Internet internet NN 39 321 9 host host NN 39 321 10 running run VBG 39 321 11 BIND BIND NNP 39 321 12 . . . 39 322 1 BIND BIND NNP 39 322 2 can can MD 39 322 3 also also RB 39 322 4 provide provide VB 39 322 5 mail mail NN 39 322 6 forwarding forward VBG 39 322 7 information information NN 39 322 8 for for IN 39 322 9 inte- inte- NNP 39 322 10 rior rior NNP 39 322 11 hosts host NNS 39 322 12 not not RB 39 322 13 directly directly RB 39 322 14 reachable reachable JJ 39 322 15 from from IN 39 322 16 the the DT 39 322 17 Internet internet NN 39 322 18 . . . 39 323 1 These these DT 39 323 2 hosts host NNS 39 323 3 can can MD 39 323 4 either either CC 39 323 5 be be VB 39 323 6 on on IN 39 323 7 non non JJ 39 323 8 - - JJ 39 323 9 advertised advertised JJ 39 323 10 networks network NNS 39 323 11 , , , 39 323 12 or or CC 39 323 13 not not RB 39 323 14 con- con- NN 39 323 15 nected necte VBN 39 323 16 to to IN 39 323 17 a a DT 39 323 18 network network NN 39 323 19 at at RB 39 323 20 all all RB 39 323 21 , , , 39 323 22 as as IN 39 323 23 in in IN 39 323 24 the the DT 39 323 25 case case NN 39 323 26 of of IN 39 323 27 UUCP UUCP NNP 39 323 28 - - HYPH 39 323 29 reachable reachable JJ 39 323 30 hosts host NNS 39 323 31 . . . 39 324 1 More More JJR 39 324 2 information information NN 39 324 3 on on IN 39 324 4 BIND BIND NNP 39 324 5 is be VBZ 39 324 6 available available JJ 39 324 7 in in IN 39 324 8 the the DT 39 324 9 " " `` 39 324 10 Name Name NNP 39 324 11 Server Server NNP 39 324 12 Operations operation NNS 39 324 13 Guide Guide NNP 39 324 14 for for IN 39 324 15 BIND BIND NNP 39 324 16 " " '' 39 324 17 in in IN 39 324 18 " " `` 39 324 19 UNIX UNIX NNP 39 324 20 System System NNP 39 324 21 Manager Manager NNP 39 324 22 's 's POS 39 324 23 Manual Manual NNP 39 324 24 " " '' 39 324 25 , , , 39 324 26 4.3BSD 4.3bsd CD 39 324 27 release release NN 39 324 28 . . . 39 325 1 There there EX 39 325 2 are be VBP 39 325 3 a a DT 39 325 4 few few JJ 39 325 5 special special JJ 39 325 6 domains domain NNS 39 325 7 on on IN 39 325 8 the the DT 39 325 9 network network NN 39 325 10 , , , 39 325 11 like like IN 39 325 12 SRI- SRI- NNP 39 325 13 NIC.ARPA NIC.ARPA NNS 39 325 14 . . . 39 326 1 The the DT 39 326 2 ' ' `` 39 326 3 arpa arpa NN 39 326 4 ' ' '' 39 326 5 domain domain NN 39 326 6 is be VBZ 39 326 7 historical historical JJ 39 326 8 , , , 39 326 9 referring refer VBG 39 326 10 to to IN 39 326 11 hosts host NNS 39 326 12 registered register VBN 39 326 13 in in IN 39 326 14 the the DT 39 326 15 old old JJ 39 326 16 hosts host NNS 39 326 17 database database NN 39 326 18 at at IN 39 326 19 the the DT 39 326 20 NIC NIC NNP 39 326 21 . . . 39 327 1 There there EX 39 327 2 are be VBP 39 327 3 others other NNS 39 327 4 of of IN 39 327 5 the the DT 39 327 6 form form NN 39 327 7 NNSC.NSF.NET NNSC.NSF.NET NNP 39 327 8 . . . 39 328 1 These these DT 39 328 2 special special JJ 39 328 3 domains domain NNS 39 328 4 are be VBP 39 328 5 used use VBN 39 328 6 sparingly sparingly RB 39 328 7 and and CC 39 328 8 require require VB 39 328 9 ample ample JJ 39 328 10 justification justification NN 39 328 11 . . . 39 329 1 They -PRON- PRP 39 329 2 refer refer VBP 39 329 3 to to IN 39 329 4 servers server NNS 39 329 5 under under IN 39 329 6 the the DT 39 329 7 administrative administrative JJ 39 329 8 control control NN 39 329 9 of of IN 39 329 10 -16- -16- : 39 329 11 the the DT 39 329 12 network network NN 39 329 13 rather rather RB 39 329 14 than than IN 39 329 15 any any DT 39 329 16 single single JJ 39 329 17 organization organization NN 39 329 18 . . . 39 330 1 This this DT 39 330 2 allows allow VBZ 39 330 3 for for IN 39 330 4 the the DT 39 330 5 actual actual JJ 39 330 6 server server NN 39 330 7 to to TO 39 330 8 be be VB 39 330 9 moved move VBN 39 330 10 around around IN 39 330 11 the the DT 39 330 12 net net NN 39 330 13 while while IN 39 330 14 the the DT 39 330 15 user user NN 39 330 16 interface interface NN 39 330 17 to to IN 39 330 18 that that DT 39 330 19 machine machine NN 39 330 20 remains remain VBZ 39 330 21 constant constant JJ 39 330 22 . . . 39 331 1 That that RB 39 331 2 is is RB 39 331 3 , , , 39 331 4 should should MD 39 331 5 BBN BBN NNP 39 331 6 relinquish relinquish VB 39 331 7 control control NN 39 331 8 of of IN 39 331 9 the the DT 39 331 10 NNSC NNSC NNP 39 331 11 , , , 39 331 12 the the DT 39 331 13 new new JJ 39 331 14 provider provider NN 39 331 15 would would MD 39 331 16 be be VB 39 331 17 pointed point VBN 39 331 18 to to IN 39 331 19 by by IN 39 331 20 that that DT 39 331 21 name name NN 39 331 22 . . . 39 332 1 In in IN 39 332 2 actuality actuality NN 39 332 3 , , , 39 332 4 the the DT 39 332 5 domain domain NN 39 332 6 system system NN 39 332 7 is be VBZ 39 332 8 a a DT 39 332 9 much much RB 39 332 10 more more RBR 39 332 11 general general JJ 39 332 12 and and CC 39 332 13 complex complex JJ 39 332 14 system system NN 39 332 15 than than IN 39 332 16 has have VBZ 39 332 17 been be VBN 39 332 18 described describe VBN 39 332 19 . . . 39 333 1 Resolvers resolver NNS 39 333 2 and and CC 39 333 3 some some DT 39 333 4 servers server NNS 39 333 5 cache cache VBP 39 333 6 information information NN 39 333 7 to to TO 39 333 8 allow allow VB 39 333 9 steps step NNS 39 333 10 in in IN 39 333 11 the the DT 39 333 12 resolution resolution NN 39 333 13 to to TO 39 333 14 be be VB 39 333 15 skipped skip VBN 39 333 16 . . . 39 334 1 Information information NN 39 334 2 provided provide VBN 39 334 3 by by IN 39 334 4 the the DT 39 334 5 servers server NNS 39 334 6 can can MD 39 334 7 be be VB 39 334 8 arbitrary arbitrary JJ 39 334 9 , , , 39 334 10 not not RB 39 334 11 merely merely RB 39 334 12 IP IP NNP 39 334 13 addresses address NNS 39 334 14 . . . 39 335 1 This this DT 39 335 2 allows allow VBZ 39 335 3 the the DT 39 335 4 system system NN 39 335 5 to to TO 39 335 6 be be VB 39 335 7 used use VBN 39 335 8 both both CC 39 335 9 by by IN 39 335 10 non non JJ 39 335 11 - - JJ 39 335 12 IP ip JJ 39 335 13 networks network NNS 39 335 14 and and CC 39 335 15 for for IN 39 335 16 mail mail NN 39 335 17 , , , 39 335 18 where where WRB 39 335 19 it -PRON- PRP 39 335 20 may may MD 39 335 21 be be VB 39 335 22 necessary necessary JJ 39 335 23 to to TO 39 335 24 give give VB 39 335 25 information information NN 39 335 26 on on IN 39 335 27 intermediate intermediate JJ 39 335 28 mail mail NN 39 335 29 bridges bridge NNS 39 335 30 . . . 39 336 1 What what WP 39 336 2 's be VBZ 39 336 3 wrong wrong JJ 39 336 4 with with IN 39 336 5 Berkeley Berkeley NNP 39 336 6 Unix Unix NNP 39 336 7 University University NNP 39 336 8 of of IN 39 336 9 California California NNP 39 336 10 at at IN 39 336 11 Berkeley Berkeley NNP 39 336 12 has have VBZ 39 336 13 been be VBN 39 336 14 funded fund VBN 39 336 15 by by IN 39 336 16 DARPA DARPA NNP 39 336 17 to to TO 39 336 18 modify modify VB 39 336 19 the the DT 39 336 20 Unix Unix NNP 39 336 21 system system NN 39 336 22 in in IN 39 336 23 a a DT 39 336 24 number number NN 39 336 25 of of IN 39 336 26 ways way NNS 39 336 27 . . . 39 337 1 Included include VBN 39 337 2 in in IN 39 337 3 these these DT 39 337 4 modifications modification NNS 39 337 5 is be VBZ 39 337 6 support support NN 39 337 7 for for IN 39 337 8 the the DT 39 337 9 Internet internet NN 39 337 10 protocols protocol NNS 39 337 11 . . . 39 338 1 In in IN 39 338 2 earlier early JJR 39 338 3 versions version NNS 39 338 4 ( ( -LRB- 39 338 5 e.g. e.g. RB 39 339 1 BSD BSD NNP 39 339 2 4.2 4.2 CD 39 339 3 ) ) -RRB- 39 339 4 there there EX 39 339 5 was be VBD 39 339 6 good good JJ 39 339 7 support support NN 39 339 8 for for IN 39 339 9 the the DT 39 339 10 basic basic JJ 39 339 11 Internet internet NN 39 339 12 protocols protocol NNS 39 339 13 ( ( -LRB- 39 339 14 TCP TCP NNP 39 339 15 , , , 39 339 16 IP IP NNP 39 339 17 , , , 39 339 18 SMTP SMTP NNP 39 339 19 , , , 39 339 20 ARP ARP NNP 39 339 21 ) ) -RRB- 39 339 22 which which WDT 39 339 23 allowed allow VBD 39 339 24 it -PRON- PRP 39 339 25 to to TO 39 339 26 perform perform VB 39 339 27 nicely nicely RB 39 339 28 on on IN 39 339 29 IP IP NNP 39 339 30 ether- ether- NN 39 339 31 nets net NNS 39 339 32 and and CC 39 339 33 smaller small JJR 39 339 34 Internets internet NNS 39 339 35 . . . 39 340 1 There there EX 39 340 2 were be VBD 39 340 3 deficiencies deficiency NNS 39 340 4 , , , 39 340 5 how- how- RB 39 340 6 ever ever RB 39 340 7 , , , 39 340 8 when when WRB 39 340 9 it -PRON- PRP 39 340 10 was be VBD 39 340 11 connected connect VBN 39 340 12 to to IN 39 340 13 complicated complicated JJ 39 340 14 networks network NNS 39 340 15 . . . 39 341 1 Most Most JJS 39 341 2 of of IN 39 341 3 these these DT 39 341 4 problems problem NNS 39 341 5 have have VBP 39 341 6 been be VBN 39 341 7 resolved resolve VBN 39 341 8 under under IN 39 341 9 the the DT 39 341 10 newest new JJS 39 341 11 release release NN 39 341 12 ( ( -LRB- 39 341 13 BSD BSD NNP 39 341 14 4.3 4.3 CD 39 341 15 ) ) -RRB- 39 341 16 . . . 39 342 1 Since since IN 39 342 2 it -PRON- PRP 39 342 3 is be VBZ 39 342 4 the the DT 39 342 5 springboard springboard NN 39 342 6 from from IN 39 342 7 which which WDT 39 342 8 many many JJ 39 342 9 vendors vendor NNS 39 342 10 have have VBP 39 342 11 launched launch VBN 39 342 12 Unix Unix NNP 39 342 13 implementations implementation NNS 39 342 14 ( ( -LRB- 39 342 15 either either CC 39 342 16 by by IN 39 342 17 porting port VBG 39 342 18 the the DT 39 342 19 existing exist VBG 39 342 20 code code NN 39 342 21 or or CC 39 342 22 by by IN 39 342 23 using use VBG 39 342 24 it -PRON- PRP 39 342 25 as as IN 39 342 26 a a DT 39 342 27 model model NN 39 342 28 ) ) -RRB- 39 342 29 , , , 39 342 30 many many JJ 39 342 31 implementations implementation NNS 39 342 32 ( ( -LRB- 39 342 33 e.g. e.g. RB 39 343 1 Ultrix Ultrix NNP 39 343 2 ) ) -RRB- 39 343 3 are be VBP 39 343 4 still still RB 39 343 5 based base VBN 39 343 6 on on IN 39 343 7 BSD BSD NNP 39 343 8 4.2 4.2 CD 39 343 9 . . . 39 344 1 Therefore therefore RB 39 344 2 , , , 39 344 3 many many JJ 39 344 4 implementations implementation NNS 39 344 5 still still RB 39 344 6 exist exist VBP 39 344 7 with with IN 39 344 8 the the DT 39 344 9 BSD BSD NNP 39 344 10 4.2 4.2 CD 39 344 11 problems problem NNS 39 344 12 . . . 39 345 1 As as IN 39 345 2 time time NN 39 345 3 goes go VBZ 39 345 4 on on RP 39 345 5 , , , 39 345 6 when when WRB 39 345 7 BSD BSD NNP 39 345 8 4.3 4.3 CD 39 345 9 trickles trickle NNS 39 345 10 through through IN 39 345 11 vendors vendor NNS 39 345 12 as as IN 39 345 13 new new JJ 39 345 14 release release NN 39 345 15 , , , 39 345 16 many many JJ 39 345 17 of of IN 39 345 18 the the DT 39 345 19 problems problem NNS 39 345 20 will will MD 39 345 21 be be VB 39 345 22 resolved resolve VBN 39 345 23 . . . 39 346 1 Following follow VBG 39 346 2 is be VBZ 39 346 3 a a DT 39 346 4 list list NN 39 346 5 of of IN 39 346 6 some some DT 39 346 7 problem problem NN 39 346 8 scenarios scenario NNS 39 346 9 and and CC 39 346 10 their -PRON- PRP$ 39 346 11 handling handling NN 39 346 12 under under IN 39 346 13 each each DT 39 346 14 of of IN 39 346 15 these these DT 39 346 16 releases release NNS 39 346 17 . . . 39 347 1 ICMP ICMP NNP 39 347 2 redirects redirect VBZ 39 347 3 Under under IN 39 347 4 the the DT 39 347 5 Internet internet NN 39 347 6 model model NN 39 347 7 , , , 39 347 8 all all PDT 39 347 9 a a DT 39 347 10 system system NN 39 347 11 needs need VBZ 39 347 12 to to TO 39 347 13 know know VB 39 347 14 to to TO 39 347 15 get get VB 39 347 16 anywhere anywhere RB 39 347 17 in in IN 39 347 18 the the DT 39 347 19 Internet internet NN 39 347 20 is be VBZ 39 347 21 its -PRON- PRP$ 39 347 22 own own JJ 39 347 23 address address NN 39 347 24 , , , 39 347 25 the the DT 39 347 26 address address NN 39 347 27 of of IN 39 347 28 where where WRB 39 347 29 it -PRON- PRP 39 347 30 wants want VBZ 39 347 31 to to TO 39 347 32 go go VB 39 347 33 , , , 39 347 34 and and CC 39 347 35 how how WRB 39 347 36 to to TO 39 347 37 reach reach VB 39 347 38 a a DT 39 347 39 gateway gateway NN 39 347 40 which which WDT 39 347 41 knows know VBZ 39 347 42 about about IN 39 347 43 the the DT 39 347 44 Internet internet NN 39 347 45 . . . 39 348 1 It -PRON- PRP 39 348 2 does do VBZ 39 348 3 n't not RB 39 348 4 have have VB 39 348 5 to to TO 39 348 6 be be VB 39 348 7 the the DT 39 348 8 best good JJS 39 348 9 gateway gateway NN 39 348 10 . . . 39 349 1 If if IN 39 349 2 the the DT 39 349 3 system system NN 39 349 4 is be VBZ 39 349 5 on on IN 39 349 6 a a DT 39 349 7 network network NN 39 349 8 with with IN 39 349 9 multiple multiple JJ 39 349 10 gateways gateway NNS 39 349 11 , , , 39 349 12 and and CC 39 349 13 a a DT 39 349 14 host host NN 39 349 15 sends send VBZ 39 349 16 a a DT 39 349 17 packet packet NN 39 349 18 for for IN 39 349 19 delivery delivery NN 39 349 20 to to IN 39 349 21 a a DT 39 349 22 gateway gateway NN 39 349 23 which which WDT 39 349 24 feels feel VBZ 39 349 25 another another DT 39 349 26 directly directly RB 39 349 27 connected connect VBN 39 349 28 gateway gateway NN 39 349 29 is be VBZ 39 349 30 more more RBR 39 349 31 appropriate appropriate JJ 39 349 32 , , , 39 349 33 the the DT 39 349 34 gateway gateway NN 39 349 35 sends send VBZ 39 349 36 the the DT 39 349 37 sender sender NN 39 349 38 a a DT 39 349 39 message message NN 39 349 40 . . . 39 350 1 This this DT 39 350 2 message message NN 39 350 3 is be VBZ 39 350 4 an an DT 39 350 5 ICMP icmp NN 39 350 6 redirect redirect NN 39 350 7 , , , 39 350 8 which which WDT 39 350 9 politely politely RB 39 350 10 says say VBZ 39 350 11 " " `` 39 350 12 I -PRON- PRP 39 350 13 'll will MD 39 350 14 deliver deliver VB 39 350 15 this this DT 39 350 16 message message NN 39 350 17 for for IN 39 350 18 you -PRON- PRP 39 350 19 , , , 39 350 20 but but CC 39 350 21 you -PRON- PRP 39 350 22 really really RB 39 350 23 ought ought MD 39 350 24 to to TO 39 350 25 use use VB 39 350 26 that that DT 39 350 27 gate- gate- NN 39 350 28 way way NN 39 350 29 over over IN 39 350 30 there there RB 39 350 31 to to TO 39 350 32 reach reach VB 39 350 33 this this DT 39 350 34 host host NN 39 350 35 " " '' 39 350 36 . . . 39 351 1 BSD BSD NNP 39 351 2 4.2 4.2 CD 39 351 3 ignores ignore VBZ 39 351 4 these these DT 39 351 5 messages message NNS 39 351 6 . . . 39 352 1 This this DT 39 352 2 creates create VBZ 39 352 3 more more JJR 39 352 4 stress stress NN 39 352 5 on on IN 39 352 6 the the DT 39 352 7 gate- gate- NN 39 352 8 ways way NNS 39 352 9 and and CC 39 352 10 the the DT 39 352 11 local local JJ 39 352 12 network network NN 39 352 13 , , , 39 352 14 since since IN 39 352 15 for for IN 39 352 16 every every DT 39 352 17 packet packet NN 39 352 18 -17- -17- NN 39 352 19 sent send VBN 39 352 20 , , , 39 352 21 the the DT 39 352 22 gateway gateway NN 39 352 23 sends send VBZ 39 352 24 a a DT 39 352 25 packet packet NN 39 352 26 to to IN 39 352 27 the the DT 39 352 28 originator originator NN 39 352 29 . . . 39 353 1 BSD BSD NNP 39 353 2 4.3 4.3 CD 39 353 3 uses use VBZ 39 353 4 the the DT 39 353 5 redirect redirect NN 39 353 6 to to TO 39 353 7 update update VB 39 353 8 its -PRON- PRP$ 39 353 9 routing routing NN 39 353 10 tables table NNS 39 353 11 , , , 39 353 12 will will MD 39 353 13 use use VB 39 353 14 the the DT 39 353 15 route route NN 39 353 16 until until IN 39 353 17 it -PRON- PRP 39 353 18 times time VBZ 39 353 19 out out RP 39 353 20 , , , 39 353 21 then then RB 39 353 22 revert revert VB 39 353 23 to to IN 39 353 24 the the DT 39 353 25 use use NN 39 353 26 of of IN 39 353 27 the the DT 39 353 28 route route NN 39 353 29 it -PRON- PRP 39 353 30 thinks think VBZ 39 353 31 is be VBZ 39 353 32 should should MD 39 353 33 use use VB 39 353 34 . . . 39 354 1 The the DT 39 354 2 whole whole JJ 39 354 3 process process NN 39 354 4 then then RB 39 354 5 repeats repeat VBZ 39 354 6 , , , 39 354 7 but but CC 39 354 8 it -PRON- PRP 39 354 9 is be VBZ 39 354 10 far far RB 39 354 11 better well JJR 39 354 12 than than IN 39 354 13 one one CD 39 354 14 per per IN 39 354 15 packet packet NN 39 354 16 . . . 39 355 1 Trailers trailer NNS 39 355 2 An an DT 39 355 3 application application NN 39 355 4 ( ( -LRB- 39 355 5 like like IN 39 355 6 FTP FTP NNP 39 355 7 ) ) -RRB- 39 355 8 sends send VBZ 39 355 9 a a DT 39 355 10 string string NN 39 355 11 of of IN 39 355 12 octets octet NNS 39 355 13 to to IN 39 355 14 TCP TCP NNP 39 355 15 which which WDT 39 355 16 breaks break VBZ 39 355 17 it -PRON- PRP 39 355 18 into into IN 39 355 19 chunks chunk NNS 39 355 20 , , , 39 355 21 and and CC 39 355 22 adds add VBZ 39 355 23 a a DT 39 355 24 TCP TCP NNP 39 355 25 header header NN 39 355 26 . . . 39 356 1 TCP TCP NNP 39 356 2 then then RB 39 356 3 sends send VBZ 39 356 4 blocks block NNS 39 356 5 of of IN 39 356 6 data datum NNS 39 356 7 to to IN 39 356 8 IP IP NNP 39 356 9 which which WDT 39 356 10 adds add VBZ 39 356 11 its -PRON- PRP$ 39 356 12 own own JJ 39 356 13 headers header NNS 39 356 14 and and CC 39 356 15 ships ship NNS 39 356 16 the the DT 39 356 17 packets packet NNS 39 356 18 over over IN 39 356 19 the the DT 39 356 20 network network NN 39 356 21 . . . 39 357 1 All all PDT 39 357 2 this this DT 39 357 3 prepending prepending NN 39 357 4 of of IN 39 357 5 the the DT 39 357 6 data datum NNS 39 357 7 with with IN 39 357 8 headers header NNS 39 357 9 causes cause VBZ 39 357 10 memory memory NN 39 357 11 moves move NNS 39 357 12 in in IN 39 357 13 both both CC 39 357 14 the the DT 39 357 15 sending sending NN 39 357 16 and and CC 39 357 17 the the DT 39 357 18 receiving receive VBG 39 357 19 machines machine NNS 39 357 20 . . . 39 358 1 Someone someone NN 39 358 2 got get VBD 39 358 3 the the DT 39 358 4 bright bright JJ 39 358 5 idea idea NN 39 358 6 that that IN 39 358 7 if if IN 39 358 8 packets packet NNS 39 358 9 were be VBD 39 358 10 long long JJ 39 358 11 and and CC 39 358 12 they -PRON- PRP 39 358 13 stuck stick VBD 39 358 14 the the DT 39 358 15 headers header NNS 39 358 16 on on IN 39 358 17 the the DT 39 358 18 end end NN 39 358 19 ( ( -LRB- 39 358 20 they -PRON- PRP 39 358 21 became become VBD 39 358 22 trailers trailer NNS 39 358 23 ) ) -RRB- 39 358 24 , , , 39 358 25 the the DT 39 358 26 receiving receive VBG 39 358 27 machine machine NN 39 358 28 could could MD 39 358 29 put put VB 39 358 30 the the DT 39 358 31 packet packet NN 39 358 32 on on IN 39 358 33 the the DT 39 358 34 beginning beginning NN 39 358 35 of of IN 39 358 36 a a DT 39 358 37 page page NN 39 358 38 boundary boundary JJ 39 358 39 and and CC 39 358 40 if if IN 39 358 41 the the DT 39 358 42 trailer trailer NN 39 358 43 was be VBD 39 358 44 OK ok JJ 39 358 45 merely merely RB 39 358 46 delete delete VBP 39 358 47 it -PRON- PRP 39 358 48 and and CC 39 358 49 transfer transfer VB 39 358 50 control control NN 39 358 51 of of IN 39 358 52 the the DT 39 358 53 page page NN 39 358 54 with with IN 39 358 55 no no DT 39 358 56 memory memory NN 39 358 57 moves move NNS 39 358 58 involved involve VBN 39 358 59 . . . 39 359 1 The the DT 39 359 2 problem problem NN 39 359 3 is be VBZ 39 359 4 that that IN 39 359 5 trailers trailer NNS 39 359 6 were be VBD 39 359 7 never never RB 39 359 8 standardized standardize VBN 39 359 9 and and CC 39 359 10 most most JJS 39 359 11 gateways gateway NNS 39 359 12 do do VBP 39 359 13 n't not RB 39 359 14 know know VB 39 359 15 to to TO 39 359 16 look look VB 39 359 17 for for IN 39 359 18 the the DT 39 359 19 routing route VBG 39 359 20 information information NN 39 359 21 at at IN 39 359 22 the the DT 39 359 23 end end NN 39 359 24 of of IN 39 359 25 the the DT 39 359 26 block block NN 39 359 27 . . . 39 360 1 When when WRB 39 360 2 trailers trailer NNS 39 360 3 are be VBP 39 360 4 used use VBN 39 360 5 , , , 39 360 6 the the DT 39 360 7 machine machine NN 39 360 8 typically typically RB 39 360 9 works work VBZ 39 360 10 fine fine RB 39 360 11 on on IN 39 360 12 the the DT 39 360 13 local local JJ 39 360 14 network network NN 39 360 15 ( ( -LRB- 39 360 16 no no DT 39 360 17 gateways gateway NNS 39 360 18 involved involve VBN 39 360 19 ) ) -RRB- 39 360 20 and and CC 39 360 21 for for IN 39 360 22 short short JJ 39 360 23 blocks block NNS 39 360 24 through through IN 39 360 25 gateways gateway NNS 39 360 26 ( ( -LRB- 39 360 27 on on IN 39 360 28 which which WDT 39 360 29 trailers trailer NNS 39 360 30 are be VBP 39 360 31 n't not RB 39 360 32 used use VBN 39 360 33 ) ) -RRB- 39 360 34 . . . 39 361 1 So so RB 39 361 2 TELNET TELNET NNP 39 361 3 and and CC 39 361 4 FTP FTP NNP 39 361 5 's 's POS 39 361 6 of of IN 39 361 7 very very RB 39 361 8 short short JJ 39 361 9 files file NNS 39 361 10 work work VBP 39 361 11 just just RB 39 361 12 fine fine RB 39 361 13 and and CC 39 361 14 FTP FTP NNP 39 361 15 's 's POS 39 361 16 of of IN 39 361 17 long long JJ 39 361 18 files file NNS 39 361 19 seem seem VBP 39 361 20 to to TO 39 361 21 hang hang VB 39 361 22 . . . 39 362 1 On on IN 39 362 2 BSD BSD NNP 39 362 3 4.2 4.2 CD 39 362 4 trailers trailer NNS 39 362 5 are be VBP 39 362 6 a a DT 39 362 7 boot boot NN 39 362 8 option option NN 39 362 9 and and CC 39 362 10 one one PRP 39 362 11 should should MD 39 362 12 make make VB 39 362 13 sure sure JJ 39 362 14 they -PRON- PRP 39 362 15 are be VBP 39 362 16 off off RB 39 362 17 when when WRB 39 362 18 using use VBG 39 362 19 the the DT 39 362 20 Internet internet NN 39 362 21 . . . 39 363 1 BSD BSD NNP 39 363 2 4.3 4.3 CD 39 363 3 negotiates negotiate NNS 39 363 4 trailers trailer NNS 39 363 5 , , , 39 363 6 so so IN 39 363 7 it -PRON- PRP 39 363 8 uses use VBZ 39 363 9 them -PRON- PRP 39 363 10 on on IN 39 363 11 its -PRON- PRP$ 39 363 12 local local JJ 39 363 13 net net NN 39 363 14 and and CC 39 363 15 does do VBZ 39 363 16 n't not RB 39 363 17 use use VB 39 363 18 them -PRON- PRP 39 363 19 when when WRB 39 363 20 going go VBG 39 363 21 across across IN 39 363 22 the the DT 39 363 23 network network NN 39 363 24 . . . 39 364 1 Retransmissions retransmission NNS 39 364 2 TCP TCP NNP 39 364 3 fires fire NNS 39 364 4 off off IN 39 364 5 blocks block NNS 39 364 6 to to IN 39 364 7 its -PRON- PRP$ 39 364 8 partner partner NN 39 364 9 at at IN 39 364 10 the the DT 39 364 11 far far JJ 39 364 12 end end NN 39 364 13 of of IN 39 364 14 the the DT 39 364 15 connection connection NN 39 364 16 . . . 39 365 1 If if IN 39 365 2 it -PRON- PRP 39 365 3 does do VBZ 39 365 4 n't not RB 39 365 5 receive receive VB 39 365 6 an an DT 39 365 7 acknowledge- acknowledge- JJ 39 365 8 ment ment NN 39 365 9 in in IN 39 365 10 a a DT 39 365 11 reasonable reasonable JJ 39 365 12 amount amount NN 39 365 13 of of IN 39 365 14 time time NN 39 365 15 it -PRON- PRP 39 365 16 retransmits retransmit VBZ 39 365 17 the the DT 39 365 18 blocks block NNS 39 365 19 . . . 39 366 1 The the DT 39 366 2 determination determination NN 39 366 3 of of IN 39 366 4 what what WP 39 366 5 is be VBZ 39 366 6 reasonable reasonable JJ 39 366 7 is be VBZ 39 366 8 done do VBN 39 366 9 by by IN 39 366 10 TCP TCP NNP 39 366 11 's 's POS 39 366 12 retransmission retransmission NN 39 366 13 algorithm algorithm NN 39 366 14 . . . 39 367 1 There there EX 39 367 2 is be VBZ 39 367 3 no no DT 39 367 4 correct correct JJ 39 367 5 algorithm algorithm NN 39 367 6 but but CC 39 367 7 some some DT 39 367 8 are be VBP 39 367 9 better well JJR 39 367 10 than than IN 39 367 11 others other NNS 39 367 12 , , , 39 367 13 where where WRB 39 367 14 better well JJR 39 367 15 is be VBZ 39 367 16 measured measure VBN 39 367 17 by by IN 39 367 18 the the DT 39 367 19 number number NN 39 367 20 of of IN 39 367 21 retransmis- retransmis- NN 39 367 22 sions sion NNS 39 367 23 done do VBN 39 367 24 unnecessarily unnecessarily RB 39 367 25 . . . 39 368 1 BSD BSD NNP 39 368 2 4.2 4.2 CD 39 368 3 had have VBD 39 368 4 a a DT 39 368 5 retransmission retransmission NN 39 368 6 algorithm algorithm NN 39 368 7 which which WDT 39 368 8 retransmitted retransmit VBD 39 368 9 quickly quickly RB 39 368 10 and and CC 39 368 11 often often RB 39 368 12 . . . 39 369 1 This this DT 39 369 2 is be VBZ 39 369 3 exactly exactly RB 39 369 4 what what WP 39 369 5 you -PRON- PRP 39 369 6 would would MD 39 369 7 want want VB 39 369 8 if if IN 39 369 9 you -PRON- PRP 39 369 10 had have VBD 39 369 11 a a DT 39 369 12 bunch bunch NN 39 369 13 of of IN 39 369 14 machines machine NNS 39 369 15 on on IN 39 369 16 an an DT 39 369 17 ethernet ethernet NN 39 369 18 ( ( -LRB- 39 369 19 a a DT 39 369 20 low low JJ 39 369 21 delay delay NN 39 369 22 network network NN 39 369 23 of of IN 39 369 24 large large JJ 39 369 25 bandwidth bandwidth NN 39 369 26 ) ) -RRB- 39 369 27 . . . 39 370 1 If if IN 39 370 2 you -PRON- PRP 39 370 3 have have VBP 39 370 4 a a DT 39 370 5 network network NN 39 370 6 of of IN 39 370 7 relatively relatively RB 39 370 8 longer long JJR 39 370 9 delay delay NN 39 370 10 and and CC 39 370 11 scarce scarce JJ 39 370 12 bandwidth bandwidth NNP 39 370 13 ( ( -LRB- 39 370 14 e.g. e.g. RB 39 371 1 56 56 CD 39 371 2 kb kb NN 39 371 3 lines line NNS 39 371 4 ) ) -RRB- 39 371 5 , , , 39 371 6 it -PRON- PRP 39 371 7 tends tend VBZ 39 371 8 to to TO 39 371 9 retransmit retransmit VB 39 371 10 too too RB 39 371 11 aggressively aggressively RB 39 371 12 . . . 39 372 1 Therefore therefore RB 39 372 2 , , , 39 372 3 it -PRON- PRP 39 372 4 makes make VBZ 39 372 5 the the DT 39 372 6 networks network NNS 39 372 7 and and CC 39 372 8 gateways gateway NNS 39 372 9 pass pass VBP 39 372 10 more more JJR 39 372 11 traffic traffic NN 39 372 12 than than IN 39 372 13 is be VBZ 39 372 14 really really RB 39 372 15 necessary necessary JJ 39 372 16 for for IN 39 372 17 a a DT 39 372 18 given give VBN 39 372 19 conversation conversation NN 39 372 20 . . . 39 373 1 Retransmis- Retransmis- NNP 39 373 2 sion sion NN 39 373 3 algorithms algorithm NNS 39 373 4 do do VBP 39 373 5 adapt adapt VB 39 373 6 to to IN 39 373 7 the the DT 39 373 8 delay delay NN 39 373 9 of of IN 39 373 10 the the DT 39 373 11 network network NN 39 373 12 -18- -18- : 39 373 13 after after IN 39 373 14 a a DT 39 373 15 few few JJ 39 373 16 packets packet NNS 39 373 17 , , , 39 373 18 but but CC 39 373 19 4.2 4.2 CD 39 373 20 's 's POS 39 373 21 adapts adapt NNS 39 373 22 slowly slowly RB 39 373 23 in in IN 39 373 24 delay delay NN 39 373 25 situations situation NNS 39 373 26 . . . 39 374 1 BSD BSD NNP 39 374 2 4.3 4.3 CD 39 374 3 does do VBZ 39 374 4 a a DT 39 374 5 lot lot NN 39 374 6 better well JJR 39 374 7 and and CC 39 374 8 tries try VBZ 39 374 9 to to TO 39 374 10 do do VB 39 374 11 the the DT 39 374 12 best good JJS 39 374 13 for for IN 39 374 14 both both DT 39 374 15 worlds world NNS 39 374 16 . . . 39 375 1 It -PRON- PRP 39 375 2 fires fire VBZ 39 375 3 off off RP 39 375 4 a a DT 39 375 5 few few JJ 39 375 6 retransmissions retransmission NNS 39 375 7 really really RB 39 375 8 quickly quickly RB 39 375 9 assuming assume VBG 39 375 10 it -PRON- PRP 39 375 11 is be VBZ 39 375 12 on on IN 39 375 13 a a DT 39 375 14 low low JJ 39 375 15 delay delay NN 39 375 16 network network NN 39 375 17 , , , 39 375 18 and and CC 39 375 19 then then RB 39 375 20 backs back VBZ 39 375 21 off off RP 39 375 22 very very RB 39 375 23 quickly quickly RB 39 375 24 . . . 39 376 1 It -PRON- PRP 39 376 2 also also RB 39 376 3 allows allow VBZ 39 376 4 the the DT 39 376 5 delay delay NN 39 376 6 to to TO 39 376 7 be be VB 39 376 8 about about RB 39 376 9 4 4 CD 39 376 10 minutes minute NNS 39 376 11 before before IN 39 376 12 it -PRON- PRP 39 376 13 gives give VBZ 39 376 14 up up RP 39 376 15 and and CC 39 376 16 declares declare VBZ 39 376 17 the the DT 39 376 18 connection connection NN 39 376 19 broken break VBN 39 376 20 . . . 39 377 1 -19- -19- : 39 377 2 Appendix Appendix NNP 39 377 3 A a DT 39 377 4 References References NNPS 39 377 5 to to IN 39 377 6 Remedial Remedial NNP 39 377 7 Information Information NNP 39 377 8 Quaterman Quaterman NNP 39 377 9 and and CC 39 377 10 Hoskins Hoskins NNP 39 377 11 , , , 39 377 12 " " `` 39 377 13 Notable notable JJ 39 377 14 Computer Computer NNP 39 377 15 Networks Networks NNPS 39 377 16 " " '' 39 377 17 , , , 39 377 18 Communications Communications NNPS 39 377 19 of of IN 39 377 20 the the DT 39 377 21 ACM ACM NNP 39 377 22 , , , 39 377 23 Vol Vol NNP 39 377 24 29 29 CD 39 377 25 , , , 39 377 26 # # $ 39 377 27 10 10 CD 39 377 28 , , , 39 377 29 pp pp NNP 39 377 30 . . . 39 378 1 932 932 CD 39 378 2 - - HYPH 39 378 3 971 971 CD 39 378 4 ( ( -LRB- 39 378 5 October October NNP 39 378 6 , , , 39 378 7 1986 1986 CD 39 378 8 ) ) -RRB- 39 378 9 . . . 39 379 1 Tannenbaum Tannenbaum NNP 39 379 2 , , , 39 379 3 Andrew Andrew NNP 39 379 4 S. S. NNP 39 379 5 , , , 39 379 6 Computer Computer NNP 39 379 7 Networks Networks NNPS 39 379 8 , , , 39 379 9 Prentice Prentice NNP 39 379 10 Hall Hall NNP 39 379 11 , , , 39 379 12 1981 1981 CD 39 379 13 . . . 39 380 1 Hedrick Hedrick NNP 39 380 2 , , , 39 380 3 Chuck Chuck NNP 39 380 4 , , , 39 380 5 Introduction introduction NN 39 380 6 to to IN 39 380 7 the the DT 39 380 8 Internet Internet NNP 39 380 9 Protocols Protocols NNP 39 380 10 , , , 39 380 11 Anonymous Anonymous NNP 39 380 12 FTP FTP NNP 39 380 13 from from IN 39 380 14 topaz.rutgers.edu topaz.rutgers.edu NNS 39 380 15 , , , 39 380 16 directory directory NN 39 380 17 pub pub NN 39 380 18 / / SYM 39 380 19 tcp tcp JJ 39 380 20 - - HYPH 39 380 21 ip ip NN 39 380 22 - - HYPH 39 380 23 docs doc NNS 39 380 24 , , , 39 380 25 file file NN 39 380 26 tcp-ip-intro.doc tcp-ip-intro.doc NNP 39 380 27 . . . 39 381 1 -20- -20- : 39 381 2 Appendix Appendix NNP 39 381 3 B B NNP 39 381 4 List List NNP 39 381 5 of of IN 39 381 6 Major major JJ 39 381 7 RFCs RFCs NNPS 39 381 8 RFC-768 RFC-768 NNP 39 381 9 User User NNP 39 381 10 Datagram Datagram NNP 39 381 11 Protocol Protocol NNP 39 381 12 ( ( -LRB- 39 381 13 UDP UDP NNP 39 381 14 ) ) -RRB- 39 381 15 RFC-791 rfc-791 VBP 39 381 16 Internet Internet NNP 39 381 17 Protocol Protocol NNP 39 381 18 ( ( -LRB- 39 381 19 IP IP NNP 39 381 20 ) ) -RRB- 39 381 21 RFC-792 RFC-792 VBD 39 381 22 Internet Internet NNP 39 381 23 Control Control NNP 39 381 24 Message Message NNP 39 381 25 Protocol Protocol NNP 39 381 26 ( ( -LRB- 39 381 27 ICMP ICMP NNP 39 381 28 ) ) -RRB- 39 381 29 RFC-793 RFC-793 NNP 39 381 30 Transmission Transmission NNP 39 381 31 Control Control NNP 39 381 32 Protocol Protocol NNP 39 381 33 ( ( -LRB- 39 381 34 TCP TCP NNP 39 381 35 ) ) -RRB- 39 381 36 RFC-821 RFC-821 NNP 39 381 37 Simple Simple NNP 39 381 38 Mail Mail NNP 39 381 39 Transfer Transfer NNP 39 381 40 Protocol Protocol NNP 39 381 41 ( ( -LRB- 39 381 42 SMTP SMTP NNP 39 381 43 ) ) -RRB- 39 381 44 RFC-822 rfc-822 VBP 39 381 45 Standard standard NN 39 381 46 for for IN 39 381 47 the the DT 39 381 48 Format format NN 39 381 49 of of IN 39 381 50 ARPA ARPA NNP 39 381 51 Internet Internet NNP 39 381 52 Text text NN 39 381 53 Messages message NNS 39 381 54 RFC-854 rfc-854 VBP 39 381 55 Telnet Telnet NNP 39 381 56 Protocol Protocol NNP 39 381 57 RFC-917 rfc-917 VB 39 381 58 * * NFP 39 381 59 Internet internet NN 39 381 60 Subnets subnet NNS 39 381 61 RFC-919 rfc-919 NN 39 381 62 * * NFP 39 381 63 Broadcasting Broadcasting NNP 39 381 64 Internet internet NN 39 381 65 Datagrams datagram NNS 39 381 66 RFC-922 rfc-922 RB 39 381 67 * * NFP 39 381 68 Broadcasting Broadcasting NNP 39 381 69 Internet Internet NNP 39 381 70 Datagrams datagram NNS 39 381 71 in in IN 39 381 72 the the DT 39 381 73 Presence Presence NNP 39 381 74 of of IN 39 381 75 Subnets Subnets NNPS 39 381 76 RFC-940 rfc-940 XX 39 381 77 * * NFP 39 381 78 Toward toward IN 39 381 79 an an DT 39 381 80 Internet internet NN 39 381 81 Standard Standard NNP 39 381 82 Scheme Scheme NNP 39 381 83 for for IN 39 381 84 Subnetting subnette VBG 39 381 85 RFC-947 rfc-947 PRP 39 381 86 * * NFP 39 381 87 Multi multi JJ 39 381 88 - - NN 39 381 89 network network NN 39 381 90 Broadcasting Broadcasting NNP 39 381 91 within within IN 39 381 92 the the DT 39 381 93 Internet internet NN 39 381 94 RFC-950 rfc-950 NN 39 381 95 * * NFP 39 381 96 Internet internet NN 39 381 97 Standard Standard NNP 39 381 98 Subnetting Subnetting NNP 39 381 99 Procedure Procedure NNP 39 381 100 RFC-959 RFC-959 NNP 39 381 101 File File NNP 39 381 102 Transfer Transfer NNP 39 381 103 Protocol Protocol NNP 39 381 104 ( ( -LRB- 39 381 105 FTP FTP NNP 39 381 106 ) ) -RRB- 39 381 107 RFC-966 rfc-966 UH 39 381 108 * * NFP 39 381 109 Host Host NNP 39 381 110 Groups Groups NNPS 39 381 111 : : : 39 381 112 A a DT 39 381 113 Multicast Multicast NNP 39 381 114 Extension extension NN 39 381 115 to to IN 39 381 116 the the DT 39 381 117 Internet Internet NNP 39 381 118 Protocol Protocol NNP 39 381 119 RFC-988 rfc-988 VB 39 381 120 * * NFP 39 381 121 Host host NN 39 381 122 Extensions Extensions NNPS 39 381 123 for for IN 39 381 124 IP IP NNP 39 381 125 Multicasting Multicasting NNP 39 381 126 RFC-997 rfc-997 NN 39 381 127 * * NFP 39 381 128 Internet internet NN 39 381 129 Numbers Numbers NNPS 39 381 130 RFC-1010 RFC-1010 NNP 39 381 131 * * NFP 39 381 132 Assigned Assigned NNP 39 381 133 Numbers Numbers NNPS 39 381 134 RFC-1011 RFC-1011 NNP 39 381 135 * * NFP 39 381 136 Official official JJ 39 381 137 ARPA arpa JJ 39 381 138 - - HYPH 39 381 139 Internet Internet NNP 39 381 140 Protocols Protocols NNP 39 381 141 RFC RFC NNP 39 381 142 's 's POS 39 381 143 marked mark VBN 39 381 144 with with IN 39 381 145 the the DT 39 381 146 asterisk asterisk NN 39 381 147 ( ( -LRB- 39 381 148 * * NFP 39 381 149 ) ) -RRB- 39 381 150 are be VBP 39 381 151 not not RB 39 381 152 included include VBN 39 381 153 in in IN 39 381 154 the the DT 39 381 155 1985 1985 CD 39 381 156 DDN DDN NNP 39 381 157 Protocol Protocol NNP 39 381 158 Handbook Handbook NNP 39 381 159 . . . 39 382 1 Note note VB 39 382 2 : : : 39 382 3 This this DT 39 382 4 list list NN 39 382 5 is be VBZ 39 382 6 a a DT 39 382 7 portion portion NN 39 382 8 of of IN 39 382 9 a a DT 39 382 10 list list NN 39 382 11 of of IN 39 382 12 RFC RFC NNP 39 382 13 's 's POS 39 382 14 by by IN 39 382 15 topic topic NN 39 382 16 retrieved retrieve VBD 39 382 17 from from IN 39 382 18 the the DT 39 382 19 NIC NIC NNP 39 382 20 under under IN 39 382 21 NETINFO NETINFO NNP 39 382 22 : : : 39 382 23 RFC RFC NNP 39 382 24 - - HYPH 39 382 25 SETS.TXT SETS.TXT NNP 39 382 26 ( ( -LRB- 39 382 27 anonymous anonymous JJ 39 382 28 FTP FTP NNP 39 382 29 of of IN 39 382 30 course course NN 39 382 31 ) ) -RRB- 39 382 32 . . . 39 383 1 The the DT 39 383 2 following following JJ 39 383 3 list list NN 39 383 4 is be VBZ 39 383 5 not not RB 39 383 6 necessary necessary JJ 39 383 7 for for IN 39 383 8 connection connection NN 39 383 9 to to IN 39 383 10 the the DT 39 383 11 Internet internet NN 39 383 12 , , , 39 383 13 but but CC 39 383 14 is be VBZ 39 383 15 useful useful JJ 39 383 16 in in IN 39 383 17 understanding understand VBG 39 383 18 the the DT 39 383 19 domain domain NN 39 383 20 system system NN 39 383 21 , , , 39 383 22 mail mail NN 39 383 23 system system NN 39 383 24 , , , 39 383 25 and and CC 39 383 26 gateways gateway NNS 39 383 27 : : : 39 383 28 RFC-882 RFC-882 NNP 39 383 29 Domain Domain NNP 39 383 30 Names Names NNPS 39 383 31 - - HYPH 39 383 32 Concepts Concepts NNPS 39 383 33 and and CC 39 383 34 Facilities Facilities NNPS 39 383 35 RFC-883 rfc-883 VBP 39 383 36 Domain Domain NNP 39 383 37 Names Names NNPS 39 383 38 - - HYPH 39 383 39 Implementation implementation NN 39 383 40 RFC-973 RFC-973 NNP 39 383 41 Domain Domain NNP 39 383 42 System System NNP 39 383 43 Changes Changes NNPS 39 383 44 and and CC 39 383 45 Observations observation NNS 39 383 46 RFC-974 RFC-974 NNP 39 383 47 Mail Mail NNP 39 383 48 Routing Routing NNP 39 383 49 and and CC 39 383 50 the the DT 39 383 51 Domain Domain NNP 39 383 52 System System NNP 39 383 53 RFC-1009 RFC-1009 NNP 39 383 54 Requirements Requirements NNPS 39 383 55 for for IN 39 383 56 Internet Internet NNP 39 383 57 Gateways Gateways NNP 39 383 58 -21- -21- : 39 383 59 Appendix Appendix NNP 39 383 60 C C NNP 39 383 61 Contact Contact NNP 39 383 62 Points Points NNPS 39 383 63 for for IN 39 383 64 Network Network NNP 39 383 65 Information Information NNP 39 383 66 Network Network NNP 39 383 67 Information Information NNP 39 383 68 Center Center NNP 39 383 69 ( ( -LRB- 39 383 70 NIC NIC NNP 39 383 71 ) ) -RRB- 39 383 72 DDN DDN NNP 39 383 73 Network Network NNP 39 383 74 Information Information NNP 39 383 75 Center Center NNP 39 383 76 SRI SRI NNP 39 383 77 International International NNP 39 383 78 , , , 39 383 79 Room Room NNP 39 383 80 EJ291 EJ291 NNP 39 383 81 333 333 CD 39 383 82 Ravenswood Ravenswood NNP 39 383 83 Avenue Avenue NNP 39 383 84 Menlo Menlo NNP 39 383 85 Park Park NNP 39 383 86 , , , 39 383 87 CA CA NNP 39 383 88 94025 94025 CD 39 383 89 ( ( -LRB- 39 383 90 800 800 CD 39 383 91 ) ) -RRB- 39 383 92 235 235 CD 39 383 93 - - SYM 39 383 94 3155 3155 CD 39 383 95 or or CC 39 383 96 ( ( -LRB- 39 383 97 415 415 CD 39 383 98 ) ) -RRB- 39 383 99 859 859 CD 39 383 100 - - HYPH 39 383 101 3695 3695 CD 39 383 102 NIC@SRI NIC@SRI NNP 39 383 103 - - HYPH 39 383 104 NIC.ARPA nic.arpa CD 39 383 105 NSF NSF NNP 39 383 106 Network Network NNP 39 383 107 Service Service NNP 39 383 108 Center Center NNP 39 383 109 ( ( -LRB- 39 383 110 NNSC NNSC NNP 39 383 111 ) ) -RRB- 39 383 112 NNSC NNSC NNP 39 383 113 BBN BBN NNP 39 383 114 Laboratories Laboratories NNPS 39 383 115 Inc. Inc. NNP 39 383 116 10 10 CD 39 383 117 Moulton Moulton NNP 39 383 118 St. St. NNP 39 383 119 Cambridge Cambridge NNP 39 383 120 , , , 39 383 121 MA MA NNP 39 383 122 02238 02238 CD 39 383 123 ( ( -LRB- 39 383 124 617 617 CD 39 383 125 ) ) -RRB- 39 383 126 497 497 CD 39 383 127 - - HYPH 39 383 128 3400 3400 CD 39 383 129 NNSC@NNSC.NSF.NET NNSC@NNSC.NSF.NET NNP 39 383 130 -22- -22- , 39 383 131 Glossary glossary JJ 39 383 132 core core NN 39 383 133 gateway gateway RB 39 383 134 The the DT 39 383 135 innermost innermost JJS 39 383 136 gateways gateway NNS 39 383 137 of of IN 39 383 138 the the DT 39 383 139 ARPAnet arpanet NN 39 383 140 . . . 39 384 1 These these DT 39 384 2 gateways gateway NNS 39 384 3 have have VBP 39 384 4 a a DT 39 384 5 total total JJ 39 384 6 picture picture NN 39 384 7 of of IN 39 384 8 the the DT 39 384 9 reacha- reacha- JJ 39 384 10 bility bility NN 39 384 11 to to IN 39 384 12 all all DT 39 384 13 networks network NNS 39 384 14 known know VBN 39 384 15 to to IN 39 384 16 the the DT 39 384 17 ARPAnet arpanet NN 39 384 18 with with IN 39 384 19 EGP EGP NNP 39 384 20 . . . 39 385 1 They -PRON- PRP 39 385 2 then then RB 39 385 3 redistribute redistribute VBP 39 385 4 reachabil- reachabil- VB 39 385 5 ity ity NN 39 385 6 information information NN 39 385 7 to to IN 39 385 8 all all PDT 39 385 9 those those DT 39 385 10 gateways gateway NNS 39 385 11 speak- speak- NN 39 385 12 ing ing NNP 39 385 13 EGP EGP NNP 39 385 14 . . . 39 386 1 It -PRON- PRP 39 386 2 is be VBZ 39 386 3 from from IN 39 386 4 them -PRON- PRP 39 386 5 your -PRON- PRP$ 39 386 6 EGP EGP NNP 39 386 7 agent agent NN 39 386 8 ( ( -LRB- 39 386 9 there there EX 39 386 10 is be VBZ 39 386 11 one one CD 39 386 12 acting act VBG 39 386 13 for for IN 39 386 14 you -PRON- PRP 39 386 15 somewhere somewhere RB 39 386 16 if if IN 39 386 17 you -PRON- PRP 39 386 18 can can MD 39 386 19 reach reach VB 39 386 20 the the DT 39 386 21 ARPAnet arpanet NN 39 386 22 ) ) -RRB- 39 386 23 finds find VBZ 39 386 24 out out RP 39 386 25 it -PRON- PRP 39 386 26 can can MD 39 386 27 reach reach VB 39 386 28 all all PDT 39 386 29 the the DT 39 386 30 nets net NNS 39 386 31 on on IN 39 386 32 the the DT 39 386 33 ARPAnet arpanet NN 39 386 34 . . . 39 387 1 Which which WDT 39 387 2 is be VBZ 39 387 3 then then RB 39 387 4 passed pass VBN 39 387 5 to to IN 39 387 6 you -PRON- PRP 39 387 7 via via IN 39 387 8 Hello hello UH 39 387 9 , , , 39 387 10 gated gate VBD 39 387 11 , , , 39 387 12 RIP RIP NNP 39 387 13 .... .... NFP 39 387 14 count count NN 39 387 15 to to IN 39 387 16 infinity infinity NN 39 387 17 The the DT 39 387 18 symptom symptom NN 39 387 19 of of IN 39 387 20 a a DT 39 387 21 routing route VBG 39 387 22 problem problem NN 39 387 23 where where WRB 39 387 24 routing route VBG 39 387 25 information information NN 39 387 26 is be VBZ 39 387 27 passed pass VBN 39 387 28 in in IN 39 387 29 a a DT 39 387 30 circular circular JJ 39 387 31 manner manner NN 39 387 32 through through IN 39 387 33 multiple multiple JJ 39 387 34 gateways gateway NNS 39 387 35 . . . 39 388 1 Each each DT 39 388 2 gate- gate- NN 39 388 3 way way NN 39 388 4 increments increment VBZ 39 388 5 the the DT 39 388 6 metric metric NN 39 388 7 appropriately appropriately RB 39 388 8 and and CC 39 388 9 passes pass VBZ 39 388 10 it -PRON- PRP 39 388 11 on on RP 39 388 12 . . . 39 389 1 As as IN 39 389 2 the the DT 39 389 3 metric metric NN 39 389 4 is be VBZ 39 389 5 passed pass VBN 39 389 6 around around IN 39 389 7 the the DT 39 389 8 loop loop NN 39 389 9 , , , 39 389 10 it -PRON- PRP 39 389 11 increments increment VBZ 39 389 12 to to TO 39 389 13 ever ever RB 39 389 14 increasing increase VBG 39 389 15 values value NNS 39 389 16 til til IN 39 389 17 it -PRON- PRP 39 389 18 reaches reach VBZ 39 389 19 the the DT 39 389 20 maximum maximum NN 39 389 21 for for IN 39 389 22 the the DT 39 389 23 routing route VBG 39 389 24 protocol protocol NN 39 389 25 being be VBG 39 389 26 used use VBN 39 389 27 , , , 39 389 28 which which WDT 39 389 29 typically typically RB 39 389 30 denotes denote VBZ 39 389 31 a a DT 39 389 32 link link NN 39 389 33 outage outage NN 39 389 34 . . . 39 390 1 hold hold VB 39 390 2 down down RP 39 390 3 When when WRB 39 390 4 a a DT 39 390 5 router router NN 39 390 6 discovers discover VBZ 39 390 7 a a DT 39 390 8 path path NN 39 390 9 in in IN 39 390 10 the the DT 39 390 11 network network NN 39 390 12 has have VBZ 39 390 13 gone go VBN 39 390 14 down down RP 39 390 15 announcing announce VBG 39 390 16 that that IN 39 390 17 that that DT 39 390 18 path path NN 39 390 19 is be VBZ 39 390 20 down down RB 39 390 21 for for IN 39 390 22 a a DT 39 390 23 minimum minimum JJ 39 390 24 amount amount NN 39 390 25 of of IN 39 390 26 time time NN 39 390 27 ( ( -LRB- 39 390 28 usually usually RB 39 390 29 at at RB 39 390 30 least least RBS 39 390 31 two two CD 39 390 32 minutes minute NNS 39 390 33 ) ) -RRB- 39 390 34 . . . 39 391 1 This this DT 39 391 2 allows allow VBZ 39 391 3 for for IN 39 391 4 the the DT 39 391 5 pro- pro- NN 39 391 6 pagation pagation NN 39 391 7 of of IN 39 391 8 the the DT 39 391 9 routing route VBG 39 391 10 information information NN 39 391 11 across across IN 39 391 12 the the DT 39 391 13 network network NN 39 391 14 and and CC 39 391 15 prevents prevent VBZ 39 391 16 the the DT 39 391 17 formation formation NN 39 391 18 of of IN 39 391 19 routing route VBG 39 391 20 loops loop NNS 39 391 21 . . . 39 392 1 split split NN 39 392 2 horizon horizon NN 39 392 3 When when WRB 39 392 4 a a DT 39 392 5 router router NN 39 392 6 ( ( -LRB- 39 392 7 or or CC 39 392 8 group group NN 39 392 9 of of IN 39 392 10 routers router NNS 39 392 11 working work VBG 39 392 12 in in IN 39 392 13 consort consort NN 39 392 14 ) ) -RRB- 39 392 15 accept accept VB 39 392 16 routing route VBG 39 392 17 information information NN 39 392 18 from from IN 39 392 19 mul- mul- NNP 39 392 20 tiple tiple JJ 39 392 21 external external JJ 39 392 22 networks network NNS 39 392 23 , , , 39 392 24 but but CC 39 392 25 do do VBP 39 392 26 not not RB 39 392 27 pass pass VB 39 392 28 on on IN 39 392 29 information information NN 39 392 30 learned learn VBN 39 392 31 from from IN 39 392 32 one one CD 39 392 33 external external JJ 39 392 34 network network NN 39 392 35 to to IN 39 392 36 any any DT 39 392 37 others other NNS 39 392 38 . . . 39 393 1 This this DT 39 393 2 is be VBZ 39 393 3 an an DT 39 393 4 attempt attempt NN 39 393 5 to to TO 39 393 6 prevent prevent VB 39 393 7 bogus bogus JJ 39 393 8 routes route NNS 39 393 9 to to IN 39 393 10 a a DT 39 393 11 network network NN 39 393 12 from from IN 39 393 13 being be VBG 39 393 14 propagated propagate VBN 39 393 15 because because IN 39 393 16 of of IN 39 393 17 gossip gossip NN 39 393 18 or or CC 39 393 19 counting counting NN 39 393 20 to to IN 39 393 21 infinity infinity NN 39 393 22 . . . 39 394 1 -23- -23- XX