ves@MITRE-BEDFORD.ARPA (Sovinsky) (04/01/88)
Introductory Note: The Standard System Center is preparing an Air Force-wide acquisition of LAN interface software (ULANA compatible) and PC security hardware/software. The equipment performance specification which follows this introductory note is provided for comments and suggestions. This is an informal medium, and the Standard Systems Center will not be held accountable for the disposition of the comments received. This is provided as a courtesy to the vendor community and provides them a chance to point out any errors we may have made. The Standard Systems Center in no way has to provide any response to the vendor about the comments received. The suspense date for comments is April 7, 1988. Your prompt action will be appreciated. You may direct your comments to the following two points of contact: Technical Issues: Lt Robinson, 205-279-4555 Contracting Issues: Dwynell Streeter 205-279-5520 You may also contact the following staff at MITRE: Stan Ames 617-271-3182 Vivian Sovinsky 617-271-7780 We apologize for attaching to this message the complete draft specification which is about ten pages in length. --------------------------------------------------------------------- HQ SSC/SSMC EPS-88-001 Gunter AFS, AL 36114 08 Mar 1988 DRAFT EQUIPMENT PERFORMANCE SPECIFICATION FOR LAN SOFTWARE AND SECURITY MODULE CONTRACT 1.0. SCOPE. 1.1. Intent. This aquisition is for disk operating system (DOS) hosts with integral ULANA host attachments. This Equipment Performance Specification (EPS) defines the requirement to obtain local area network (LAN) software and a microcomputer security module through an indefinite delivery, indefinite quantity requirements contract. This shall be a procurement of commercial off-the-shelf (COTS) products. In order to be considered COTS, not more than 10 percent of the original code may be changed or added. (For example, if the original program consisted of 10,000 lines of code, not more than 1,000 lines can be changed or added.) 1.2. Documents. Supporting documentation for the operation of the packages shall be delivered in accordance with paragraph 3.3. 2.0. APPLICABLE DOCUMENTS. 2.1. Government Documents. The following documents of the exact issue shown (or successors where indicated) form a part of this specification to the extent specified elsewhere in this specification. In the event of a conflict between the documents referenced below and the contents of this specification, the information in this document shall be considered superseding requirements. 2.1.1. Military Standards. MIL-STD-1777, 12 Aug 83, Internet Protocol (IP). MIL-STD-1778, 12 Aug 83, Transmission Control Protocol (TCP). MIL-STD-1780, 10 May 84, File Transfer Protocol (FTP). MIL-STD-1781, 10 May 84, Simple Mail Transfer Protocol (SMTP). MIL-STD-1782, 10 May 84, TELNET Protocol. MIL-STD-129J, 25 Nov 86, Marking for Shipment and Storage. 2.1.2. Requests for Comment (RFC). RFC 904 (or successor), Apr 87, Exterior Gateway Protocols. RFC 1001, 1002, Feb 87, NETBIOS. RFC 960 (or successor), Dec 85, Assigned Numbers. RFC 768, Aug 80, User Datagram Protocol. RFC 792, Sep 81, Internet Control Message Protocol. RFC 821, Aug 82, Simple Mail Transfer Protocol. 2.1.3. Government Specifications. System Specification for the Air Force Unified Local Area Network Architecture (ULANA I), 17 Apr 87. EPS-88-001 08 Mar 1988 System Specification for the Standard Multiuser Small Computer Requirements Contract (SMSCRC), 20 Feb 87. 2.1.4. Other Standards. Institute of Electrical and Electronics Engineers Standard 802.3 (IEEE 802.3), 1985. 2.2. Availability of Applicable Documents. The specifications, standards, and other documents cited herein that are not provided as a part of the solicitation and are not readily obtainable may be examined at HQ SSC/PKB, Bldg 1011, Gunter AFS AL 36114. 3.0. REQUIREMENTS. 3.1. General. The LAN software shall allow users in various locations to communicate with one another, share data and executable files, and share peripherals via the ULANA network. The security module shall prevent unauthorized access to workstations. The government shall have the right to make working backup copies of each software package purchased for its use. Copy protected software is not acceptable. The backup copies must execute in the same manner as the originally shipped disks. 3.2. Operational Concept. The contractor(s) shall provide software and documentation as described in the following paragraphs for use at worldwide government locations. The software shall be orderable on both 3 1/2-inch and 5 1/4-inch media. 3.2.1. Overall Operational Criteria - LAN Software. The contractor provided LAN software shall fully support the following functionally described minimum characteristics and requirements: 3.2.1.1. The required software shall operate and be completely compatible with the Zenith Z-150, Zenith Z-200T, Zenith Z-248, Sperry PC, and IBM PC XT/AT or compatibles running MS-DOS 3.1 and later with ULANA host attachments. The LAN software shall not interfere with, degrade the performance of, or prevent the proper operation of the ULANA host attachments. 3.2.1.2. The software shall provide the functions necessary to support the following client-server architectures: 3.2.1.2.1 Non-dedicated LAN server - the software shall allow two or more PCs to function as servers in a non-dedicated mode. The software shall not use more than 256 KB of base memory. The software running in a client machine may use but not require extended memory which is available from Zenith Data Systems for the Zenith microcomputers. The available extended memory on the Zenith microcomputers is between 512 KB and 2.5 MB. The software shall be limited to the use of 256 KB of extended memory for server and slave operation. A PC shall have the capability to act as a server and a client on the network at the same time. EPS-88-001 08 Mar 1988 3.2.1.2.2. Dedicated LAN server - the software shall allow two or more PCs to function as servers in a dedicated mode. If the dedicated server requires a different operating system (other than DOS 3.1 and later) it must be included with the LAN software. 3.2.1.2.3. Client workstation - The software shall not use more than 128 KB of base memory when installed and configured as a client. The software running in the client machine may use but does not require extended memory which is available from Zenith Data Systems for the Zenith microcomputers. The available extended memory on the Zenith microcomputers is between 512 KB and 2.5 MB. The software shall be limited to the use of 256 KB of extended memory for server and slave operation. A PC shall have the capability to act as a server and a client on the network at the same time. 3.2.1.2.4. SMB Server Interoperability - The software shall interoperate with an SMB server that conforms with NETBIOS as per RFCs 1001 and 1002. 3.2.1.3. Each micro-computer listed in 3.2.1.1 that must run the local area network application software provided under this contract will be provided with an installed ULANA host attachment. A NETBIOS service level interface that conforms to RFCs 1001-1002 will be provided as part of this host attachment. The LAN Application software shall utilize this service level interface to communicate with other micro-computers across the LAN. While running the local area network software it shall be possible to execute TELNET, FTP, and other DOS-based applications provided under the ULANA contract. 3.2.1.4. The software shall be icon-driven, menu driven and command driven at the users option (2 out of the 3 options). 3.2.1.5. The software shall provide the capability of switching between the network and the operating system. It shall accomplish this through use of options available in 3.2.1.4.. 3.2.1.6. For all machines listed in 3.2.1.1., the software shall support a minimum of 16 concurrent users per server. 3.2.1.6.1 For all machines listed in 3.2.1.1., the software shall support a minimum of 100 users per server. 3.2.1.7. The software shall support the following input devices: Device Zenith Data Systems Part No ------ --------------------------- Z-150/200 Keyboard 181-6894 TEMPEST Kurta Tablet AFP-11-T EPS-88-001 08 Mar 1988 Z-248 Keyboard HE-163-24 Summagraphics Summasketch Input Device SI-1201 Logitech Mouse LG-7 Tempest Kurta Tablet AFP-11-T 3.2.1.8 The software shall allow the sharing of output devices, to include as a minimum: Device Zenith Data Systems Part No ------ --------------------------- Z-150/200 Z-150 CGA Color Monitor ZVM-133-T Z-150 Monochrome Monitor ZVM-122-T Dataproducts DP55Q Letter Quality Printer TT-5155 Dataproducts TCG200 Dot Matrix Color Printer AFP-4-T DMP-29T Plotter DMP-29-TM Z-248 Monochrome Monitor ZMM-1470-G EGA Color Monitor ZVM-1380 ALPS P2000G Dot Matrix AL-2000 Diablo TC150 Ink Jet Printer AFP-8-T Western Graphtec MP 2300 Plotter, 8 Pen Self Capping WG-2300 CTS 2424 Dial Up Modem ZM-2424 Zenith Modem (Hayes 2400 baud) ZM-2401 Xerox 4020 Ink Jet Printer DS-200 Asynchronous 9600 Baud Voice/Data Modem ZM-192 MPI Printmate 350 Dot Matrix Printer MPI-350-B1 Primage 90 Letter Quality Daisy Wheel Printer PP-252 Genicom 3184 Dot Matrix Printer AFP-6-TG Diablo 630 Daisy Wheel Printer Okidata 83A Dot Matrix Printer MPI Printmate 180 FT Dot Matrix Printer Diablo Advantage 80 Daisy Wheel Printer DMP-29 Plotter, 8 Pens HP HGL Output Devices Postscript Output Devices 3.2.1.9 The software shall provide a backup capability for shared network files utilizing the users choice of the following: Irwin 20 MB Tape Backup System Z-427-20 Interdyne 20 MB Tape Backup System ID-6025 Scorpion 60 MB Internal Tape Backup Drive ZD-60 Shall back up 20 MB in less than 20 minutes and have unlimited capacity. 3.2.1.10 The software shall allow the user to run the following application programs when stored on the server from the standard small computer requirements contracts and their NETBIOS compatible LAN versions when they become available: EPS-88-001 08 Mar 1988 Package Version Contract ------- ------- -------- Wordstar Professional 3.31 and later Z-248 (F19630-86-D-0002) Multimate 3.3 and later Z-248 (F19630-86-D-0002) dBASE II 2.43 and later Z-248 (F19630-86-D-0002) dBASE III 1.1 and later Z-248 (F19630-86-D-0002) Condor III 2.11 and later Z-248 (F19639-86-D-0002) Microstat 4.0 and later Z-248 (F19630-86-D-0002) Supercalc 3 2.1 and later Z-248 (F19630-86-D-0002) Graftalk 3.27 and later Z-248 (F19630-86-D-0002) 4-Point Composition Graphics 1.57 and later Z-248 (F19630-84-D-0009) Cad Key 2.0 and later Z-248 (F19630-86-D-0002) Timeline 2.0 and later Z-248 (F19630-86-D-0002) Enable 1.15 and later Z-248 (F19630-86-D-0002) Microsoft Windows 1.01 and later Z-248 (F19630-86-D-0002) 3.2.1.11. The software shall provide windowing and multitasking capability. It shall allow the capability to create a minimum of eight windows allowing the concurrent viewing of eight tasks. One application selected by the user will execute, and the others will be suspended until selected. The tasks may consist of eight different applications or eight separate executions of a single application. 3.2.1.12. The software shall provide network administration functions to allow for installation and maintenance of the network software. These functions shall include adding users, deleting users, changing passwords, adding shared peripherals, and diagnostics and statistics tools to identify network load and problems. The information provided by the diagnostics and statistics tools shall be more than raw data--it shall help the user to interpret the data. This shall not be a separate software package. 3.2.1.13. The software shall allow a password for each user identification with different levels of access (i.e.: read only, read write, etc). Passwords shall be initially assigned by the network administrator. User shall have the ability to change their password. 3.2.1.14. The software shall provide full file sharing capabilities that allow the user to: 3.2.1.14.1. Grant, remove, and change access to their files on the LAN. 3.2.1.14.2. Grant file access to a single user, multiple users, and all users on the LAN using options available in 3.2.1.4. 3.2.1.14.3. Specify type of access granted to other users to include: none, read only, write only, execute, and read-write. 3.2.1.14.4. Grant access to a single file, a group of files, an entire subdirectory, and an entire drive. EPS-88-001 08 Mar 1988 3.2.1.14.5. Place a password on files to which the user has granted access to others so that the other user must use that password to access the files. 3.2.1.14.6. Display a listing of all files to which the user has granted access to other users and the type of access they have. 3.2.1.14.7. Display a listing of all the files to which others have granted the user access and the type of access they have. 3.2.1.15. While running the LAN software, the user shall be able to invoke all DOS application programs. 3.2.1.16. The software shall provide options available in 3.2.1.4 for the installation procedure. 3.2.1.17. The software shall allow workstations to link to any shared peripheral on the network. 3.2.1.18. The software shall provide print spooling with the capability to reorder print queues, delete print files and queues, and move print files and queues to other printers. 3.2.1.19. The software shall provide context sensitive help facility accessible from all workstations. 3.2.1.20. The software shall provide error messages that correctly identify the error and explain how to correct it. 3.2.1.21. The software shall provide remote dial-in capability that allows access to all network resources and capabilities. It shall support user selectable data transmission speeds ranging from 300 BPS to 19.2K BPS (300, 1200, 2400, 9600, 19,200). 3.2.1.22. As a late deliverable, the contractor shall provide a version of the software that will run with the SMSCRC operating system that is functionally conformable with the System V Interface Definition (SVID). This version shall provide a user interface as similar to that of the PC version as possible. 3.2.1.23. Additional consideration shall be given to those contractors who offer a version of the software to be installed and configured on the Zenith Z-100 computer to enable it to operate as a client node on a network. This version of the software must operate the same as and provide a user interface identical to that of the software for the machines cited in 3.2.1.1. 3.2.1.24. The software shall provide electronic mail facilities. It shall support a minimum of 100 mailboxes, which shall be established by the network administrator. It shall support both text and non-text (8-bit ASCII). The maximum size of electronic mail messages shall be limited only by the amount of storage space the user has available. EPS-88-001 08 Mar 1988 3.2.1.24.1. The capabilities shall include: 3.2.1.24.1.1. Choose and read a message. 3.2.1.24.1.2. Create a message with an editor supplied by the vendor. 3.2.1.24.1.3. Send a message. Retain a copy of the message if desired. 3.2.1.24.1.4. Reply to a message. 3.2.1.24.1.5. Forward a message and/or series of messages. 3.2.1.24.1.6. Delete a message and/or series of messages. 3.2.1.24.1.7. Send a courtesy copy (cc) of a message to addresses upon transmission. Shall allow for the creation, storage, and use of distribution lists. 3.2.1.24.1.8. Copy a message and/or series of messages into a file. 3.2.1.24.1.9. Insert files into the body of a message and include as attachments to a message. (minimum of 10 files) 3.2.1.24.1.10. Display headers including: Date, Subject, Return address, Read and unread, Answered and Unanswered, Flagged and Unflagged. 3.2.1.24.1.11. The user should be able to send and receive electronic mail using this electronic mail facility to and from other hosts on the network that only utilize the SMTP protocol for electronic mail exchange from a host supported by ULANA using SMTP protocol. 3.2.1.24.1.12. Shall provide positive confirmation of addressee receipt of message. 3.2.1.24.1.13. Notify user upon log-in that he has new mail. 3.2.1.24.1.14. Save mail to a file of user's choice. 3.2.1.24.2. The message shall include the following fields in data area: 3.2.1.24.2.1. Subject. EPS-88-001 08 Mar 1988 3.2.1.24.2.2. Comments (on forwarded or resent messages). 3.2.1.24.2.3. Return path (explicit series of forwarding hosts/gateways). 3.2.1.24.2.4. Return address. 3.2.1.24.2.5. Date. 3.2.1.25. The software shall have a network calendaring capability with the following functions: 3.2.1.25.1. It shall allow creation and use of a minimum of 100 calendars per server. 3.2.1.25.2. It shall provide for public and private calendars that shall cover a minimum of 12 previous months and 12 subsequent months to the current month. 3.2.1.25.3. It shall display a planning calendar by day, week, or month at the users option. As a minimum, the daily calendar shall allow 80 characters per entry; the weekly calendar 40 characters per entry; and the monthly calendar 20 characters per entry. 3.2.1.25.4. It shall allow the user to print a hard copy of daily, weekly, and monthly calendars. 3.2.1.25.5. It shall allow the user the capability to designate other users who will have access to view and modify his calendar. 3.2.1.25.6. It shall allow the user to input information to his own calendar and to calendars to which he has access. 3.2.1.25.7. It shall have appointment scheduling capabilities such that a user may specify individuals whose calendars should be checked for open time (during a specified day or week). When a common time is found, it shall reserve the time slot on each attendees calendar. It shall also check the availability of meeting rooms and equipment for the meeting and schedule them as well. In case of multiple openings, the utility shall query the user scheduling the appointment as to the desired time. 3.2.1.25.8. It shall allow the user to delete a scheduled event from multiple calendars with a single action. 3.2.1.25.9 It shall provide a calendar "scratch pad" function which allows any user to propose calendar updates to any other users' "scratch pad", plus a calendar update utility which allows each user to review his scratch entries off-net and accept or reject proposed updates to their actual calendar file. EPS-88-001 08 Mar 1988 3.2.2. Operational Concept - Security Module. The contractor-provided security module shall, through the use of a software and hardware combination and without affecting the normal operation of the PC, fully support the following functionally described minimum characteristics and requirements: 3.2.2.1. Shall be completely compatible with the Zenith Z-248 model computers manufactured by Zenith Data Systems running MS-DOS 3.1 or later. 3.2.2.2. Shall have a password for each user identification with different types of access (disk, directory, and files). This password shall be user modifiable. 3.2.2.3. Shall keep an audit trail of user accesses both successful and unsuccessful. After a given number of unsuccessful log-on attempts (as determined by the network administrator), shall record the access attempts and the time in the audit trail and shall lock out the unauthorized user by disabling the keyboard or CPU. 3.2.2.4. When a successful access is completed, shall provide an audit trail report showing all access attempts made and what functions were done during each access. This report shall cover the previous 24, 48, or 72 hours at the users option. At the end of the user specified period, the audit trail data will be deleted. (For example, if the user specifies a 24 hour audit trail, at the end of the 24th hour, the data for hour 1 is deleted to make room for the data for hour 25.) 3.2.2.5. Shall prevent unauthorized users from booting system (including booting from the floppy drive). 3.2.2.6. Additional consideration shall be given to those contractors who offer a security module package to be installed and configured on the Zenith Z-100 computer. This version of the security module must operate the same as and provide a user interface identical to that of the software for the Z-248. Note: If meeting these requirements requires the use of an internal board, that board shall fit into an available PC slot in the Z-248 and an available slot in the Z-100 (if offered). Different boards will be permitted for each model of computer. This board, if offered, shall not interfere with the normal operation of the system in which it is installed. 3.3. Documentation. 3.3.1. Contractor(s) shall provide comprehensive documentation to accompany each software package. Proposals should be made for documentation as a separately orderable item and as bundled with the software. When bundled with the software, the price of the documentation will be included in the price of the software. This documentation shall contain EPS-88-001 08 Mar 1988 explanations of each capability and how to perform it, an error message key to provide further explanations of error messages described in 3.2.1.19., and a glossary of applicable terms. It shall be aimed at the novice user so that even a beginner can use the software with minimal assistance. 3.3.2. The contractor(s) shall furnish the government any changes to documentation within 60 days after notification of errors in the original documentation or of discrepancies in the software that render the documentation incorrect. 3.3.3. The contractor(s) shall furnish an installation manual with each file server package. This volume shall describe, in detail, the software installation process and procedures, and how to set up the network. 3.4. Delivery of Orders. 3.4.1. The first delivery of each CLIN/SLIN shall be delivered to Gunter AFS Alabama 6 work days after receipt by contractor of a delivery order. Subsequent deliveries shall be made to the "ship to" address indicated on each delivery order. 3.4.2. The contractor(s) shall ship orders within 21 days of arrival of the delivery order at the contractor's location. 3.5. Warranties. 3.5.1. All software and hardware components purchased through this contract shall be warranted against all defects and failures for a period of 1 year. All defective items that fail during the warranty period will be returned to the contractor via a common carrier at government expense. Replacements of defective items shall be made free of charge within 4 working days of contractor's receipt of the returned defective item. Contractor shall pay the cost of shipping the replacement items. 3.5.2. For CONUS deliveries, the warranty period for a given delivery order shall not begin until delivery of the items to the specified destination or 15 days after government acceptance of the delivery, whichever occurs first. 3.5.3. For OCONUS deliveries, the warranty period for a given delivery order shall not begin until delivery of the order to the specified location or 30 days after government acceptance of the delivery, whichever occurs first. 3.6. Updates and Upgrades. 3.6.1. Updates. 3.6.1.1. An update shall be defined as: Corrections and/or additions to existing versions of a product that cause the product to operate as specified in this solicitation. EPS-88-001 08 Mar 1988 3.6.1.2. Free updates and corrected documentation shall be made available to Air Force users not more than 60 days after the contractor(s) receives official notification by the government of a problem, or within 30 days after commercial availability of the update. When an update is necessary, users will send the contractor a letter stating the serial numbers from their originally purchased packages and the address to which the update should be mailed. The contractor shall send updates on diskette and corrections to documentation in hardcopy form. These items must be mailed to the user within 7 work days after contractor received the letter from the user. 3.6.2. Upgrades. 3.6.2.1. An upgrade shall be defined as: A new version of the product with corrections and enhancements not available in previous versions. 3.6.2.2. If, after the contract is awarded, the contractor(s) markets a new commercial version of the product, the added features and enhancements of the new commercial version and updated documentation shall be proposed to the government in the form of an upgrade to the government version of the package. This proposal shall be made within 30 days of the availability of the new commercial version. The government may elect to modify the contract and, at its option, may have the new version delivered in lieu of the originally specified package. Upgrades shall be listed as a separate contract line item. 3.6.2.3. Method of distribution is negotiable prior to contract award. Suggested method is to notify government users of the update and have them send their original diskettes to the contractor who in turn will return the upgraded version to the user. The user shall receive the upgraded versions within 7 working days of contractor receipt of the original diskettes. 3.6.2.4. The price of the upgrade will be proportional to the price of the originally offered package. For instance, if the original package was offered to the Air Force at 50 percent of its commercial price, then the upgrade must also be offered to the Air Force at 50 percent of its commercial price. 3.7. Support. 3.7.1. The contractor(s) shall furnish a point of contact for questions/problems. This individual or individuals must be identified by name, address, and toll-free telephone number. The toll-free number shall be manned between 0800 and 1700 Central Time, Monday through Friday (except Federal Holidays) for the life of the contract. 3.7.2. The contractor(s) shall be required to maintain a data base providing the following information on one screen: 3.7.2.1. order acceptance date (date order received by contractor) 3.7.2.2. ship date (expected and actual) EPS-88-001 08 Mar 1988 3.7.2.3. ship-to address 3.7.2.4. list of items on order Note: The government shall have access to this data base at any time through the use of the contractor-supplied toll-free phone line described in 3.7.1. above and a standard asynchronous telecommunications package (such as HyperAccess or Enable). The data base shall be accessible by delivery order number or by ship-to address at the users option. 3.8. Monthly Reports. 3.8.1. The contractor(s) shall provide monthly production and delivery reports on the fifth work day of each month. These reports shall contain the ordering status for the previous month (number ordered, number delivered, number returned with defects) and the dollar amount associated with these orders. In addition, the ordering status and dollar figures for the total period of the contract up to the end of the previous month are also required (number ordered-to-date, number delivered-to-date, number returned-to-date, explanation of backorders). 3.8.2. The contractor(s) shall also furnish the Small Computer Office Automation/Service Organization (SCOASO) at Gunter AFS a monthly report synopsizing the calls received over the toll-free line described in 3.7.1. above. This report shall specify the problem calls received and the solutions given. 3.9. Training. The offered packages shall provide a computer aided instruction module and interactive tutorial to provide an overview of the products and aid the user in learning the capabilities of the products. 3.10. Preparation for Delivery. 3.10.1. Packaging. 3.10.1.1. The contractor(s) is responsible for the preservation, packaging, and packing of all items to be delivered under the terms of this contract in such a manner that adequate protection is provided against corrosion, deterioration, and physical damage during shipment and handling from source of supply to final destination. The contractor's commercial packaging practice is acceptable in the event these practices provide the required protection. The contractor(s) is fully liable for any damage, deterioration, and losses incurred during shipment and handling unless the damage, deterioration, and losses are the fault or negligence of the government. Marking shall be in accordance with MIL-STD-129J, 25 Sep 84, Marking for Shipment and Storage. 3.10.1.2. The government shall be responsible for the preservation, packaging, and packing to the above standards of all items returned to the contractor(s) for warranty service. EPS-88-001 08 Mar 1988 3.10.2. Delivery. For deliveries to CONUS, Alaska and Hawaii locations, deliverable items shall be F.O.B. destination. For overseas deliveries, deliverable items shall be F.O.B. point of exportation (POE). Examples of initial delivery points for POE shipments are as follows: McChord AFB, WA (Japan and Korea) Travis AFB, CA (Philippines and Guam) Dover AFB, DE (Europe) Charleston AFB, SC (Panama) Patrick AFB, FL (Puerto Rico)
JBVB@AI.AI.MIT.EDU ("James B. VanBokkelen") (04/01/88)
1. Why no mention of RFCs 963 and 964, detailing the ways in which the descriptions of IP and TCP in MIL-STD 1777 and 1778 are wrong? The 1983 dates on the MIL-STDs lead me to believe that they haven't been revised to correct these problems. 2. Why no mention of RFC-950, "Internet Standard Subnetting Procedure"? This brings up another issue that has been on my mind recently: Is anyone working on a "Requirements for Internet Hosts" RFC, in the vein of RFC1009? I have recently encountered a number of very literal readings of the MIL-STDs into government procurement specifications, such that a PC is required to: a. Support 'Page Mode' in its FTP. b. Generate ICMP Time Exceeded messages, even though it has only one interface, and this represents discarding an otherwise perfectly acceptable packet (albeit one which barely got to me). c. Reply to ICMP Information Request messages, which appear to me to be intended for DDN use, and not for a broadcast LAN. I can't guess exactly why they might want this, but BOOTP seems to be much better suited. There is also the issue of whether a workstation should reply to this sort of thing at all (particularly if the request is broadcast). d. Support the IP option "Satnet stream ID", which I am informed is not relevant to any of the standard upper layer protocols (TCP, UDP, etc.). I can ignore it just fine, but I don't know if this is 'support'. I would be interested in working with anyone who is working on a host- oriented equivalent to RFC1009. I might even have time to start one myself. Of course, if I'm entirely wrong in my criticism above, I'm not the right person... James VanBokkelen FTP Software Inc.
CERF@A.ISI.EDU (04/01/88)
Ves and Stan, Two thoughts after a first pass scan of the performance specs: 1. Will the windows lawsuits between Apple and HP/Microsoft create problems for vendors trying to respond to the ULANA specs? 2. Should the electronic mail requirements include anything about interoperability with Internet Mail (perhaps it does so by inclusion of reference to SMTP ?), with any public mail service?, with name server capabilities? Vint
braden@VENERA.ISI.EDU (04/02/88)
Yes, there is a WG of the IETF doing exactly that. Your friend and mine JNC is supposedly holed up writing Good Words about the IP layer, even as I type. (Go, Go, Noel!). By the way, I seem to be the chair of this WG. If you want to devote time & energy to it, let me know. Bob Braden
braden@VENERA.ISI.EDU (04/02/88)
This brings up another issue that has been on my mind recently: Is anyone working on a "Requirements for Internet Hosts" RFC, in the vein of RFC1009? Yes, there is a WG of the IETF doing exactly that. Your friend and mine JNC is supposedly holed up writing Good Words about the IP layer, even as I type. (Go, Go, Noel!). By the way, I seem to be the chair of this WG. If you can put time and energy to it, let me know! Bob Braden PS: To those who got an earlier, garbaged, copy of this message, I apologize on behalf of a well-known Bay-Area university and a well-known Bay Area workstation mfr, who were responsible for the mailer software I use. RTB
braden@VENERA.ISI.EDU (04/02/88)
This brings up another issue that has been on my mind recently: Is anyone working on a "Requirements for Internet Hosts" RFC, in the vein of RFC1009? Yes, there is a WG of the IETF doing exactly that. Your friend and mine JNC is supposedly holed up writing Good Words about the IP layer, even as I type. (Go, Go, Noel!). By the way, I seem to be the chair of this WG. If you can put time and energy to it, let me know! Bob Braden PS: To those who got an earlier, garbaged, copy of this message, I apologize on behalf of a well-known Bay-Area university and a well-known Bay Area workstation mfr, who were responsible for the mailer software I use. RT