textfiles/bbs/FIDONET/FIDONEWS/fido0524.nws
2021-04-15 13:31:59 -05:00

2775 lines
122 KiB
Plaintext
Raw Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

Volume 5, Number 24 13 June 1988
+---------------------------------------------------------------+
| _ |
| / \ |
| /|oo \ |
| - FidoNews - (_| /_) |
| _`@/_ \ _ |
| International | | \ \\ |
| FidoNet Association | (*) | \ )) |
| Newsletter ______ |__U__| / \// |
| / FIDO \ _//|| _\ / |
| (________) (_/(_|(____/ |
| (jm) |
+---------------------------------------------------------------+
Editor in Chief Dale Lovell
Editor Emeritus: Thom Henderson
Chief Procrastinator Emeritus: Tom Jennings
Contributing Editors: Al Arango
FidoNews is published weekly by the International FidoNet
Association as its official newsletter. You are encouraged to
submit articles for publication in FidoNews. Article submission
standards are contained in the file ARTSPEC.DOC, available from
node 1:1/1.
Copyright 1988 by the International FidoNet Association. All
rights reserved. Duplication and/or distribution permitted for
noncommercial purposes only. For use in other circumstances,
please contact IFNA at (314) 576-4067. IFNA may also be contacted
at PO Box 41143, St. Louis, MO 63141.
Fido and FidoNet are registered trademarks of Tom Jennings of
Fido Software, 164 Shipley Avenue, San Francisco, CA 94107 and
are used with permission.
The contents of the articles contained here are not our
responsibility, nor do we necessarily agree with them.
Everything here is subject to debate. We publish EVERYTHING
received.
Table of Contents
1. ARTICLES ................................................. 1
Everything You Always Wanted to Know About the #CM: Fla .. 3
Indios (A Network Yarn) .................................. 7
A proposed International Policy .......................... 10
Kids & Computers ......................................... 13
A Sample Net Policy Document Neal Curtin 1:343/1 ......... 16
Proposed Zone 1 Policy ................................... 23
2. COLUMNS .................................................. 36
What is the Price of ECHOMAIL ............................ 36
Top Downloads 5/27/88 - 6/3/88 ........................... 39
3. NOTICES .................................................. 42
The Interrupt Stack ...................................... 42
Latest Software Versions ................................. 42
And more!
FidoNews 5-24 Page 1 13 Jun 1988
=================================================================
ARTICLES
=================================================================
IDEAS FOR A NEW -AND BETTER- FIDONET
(Let's make some changes...)
Time goes by, and FidoNet grows every day faster. I don't
think that, when creating the Fido Bulletin Board System, Tom
Jennings knew he was starting something this big.
I have lately read some articles, where sysops express
their discomformity regarding the way things are going right
now, specially with IFNA.
Some sysops chose to form another, parallel net (like
Ryugen Fisher, for example), some others just expressed their
disappointness, and/or moved away from the "BIG net".
Trhu this article, I want to give your my opinion, and to
present you a new idea, a new idea that also contains new
concepts.
From my point of view, DEMOCRACY (not a "new concept"!)
doesn't exist on FidoNet. And when one of the basic things
needed for a large group to survive is not present, it is likely
to fall in an anarchy, where everyone does what he/she wants, no
matter what.
When you live in a country that has a democratic
constitution since 1853, and that while democracy lasted was one
of the most rich and one of the TEN worldpowers and when it lost
democracy, went from being THE RICHEST in the world to one of
the poorest (yes, Argentina was *the richest* country in the
world after WW2, and please, don't ask how it is right now...),
you learn how important democracy is, for something to survive.
I think something MUST BE DONE in FidoNet, before it is
"too late".
The FidoNet nodelist has already 3000+ members, in all
the 5 continents of the world, on about 30 countries. FidoNet
has become a totally INTERNATIONAL network, rather than an
"American one with some nodes overseas".
One of the main purposes of this new concept is to
prevent the desintegration of FidoNet, as well as to make the
actual conditions (a lot) better.
In Latin America we are just starting with the net. There
is still a "familiar climate" within the net, and everybody
cooperates with each other, but as we read some echomail
conferences or FidoNews, we ask ourselves: "Is it gonna happen
the same way down here? Are we working so hard just to get to
that point?".
What I want to propose is the following:
One "FidoNet Association" is created for each of the 4
zones (I'm assuming Latin America as Zone 4).
Those associations may vary in their internal
organization, since each zone's requirements and neccesities are
very different.
When they are finally established, each designates 3
members to take part on the International FidoNet Council, that
is finally formed by those 12 representants of the 4 zones.
FidoNews 5-24 Page 2 13 Jun 1988
Each zone has the right to have the presidency of the
Council for 6 months a year (each has the right to preside the
council once every two years).
The Council's president must be one of the 4
representants sent by the zone who designates him/her, and has
the right to a double vote when a votation is tied.
The International Council is in charge of various things,
like designating the International Technical Coordinator,
setting the technical standards (either directly or by naming a
"technical comitee"), publishing the net's official newsletter,
and establishing the net's basic, international rules.
Comprehensive rules are established by each zone's
association.
The International Council also acts as a "supreme
tribunal" for interzonal disputes. Any disputes within a zone
are to be arbitrated by the zone's association.
The Zonal FidoNet Associations are to be TRANSPARENTLY
DEMOCRATIC, which ensures the democratic qualities of the
International FidoNet Council, as well as of the net itself.
The Zonal Associations have the right to name the
coordinators for all the networks, regions as well as the
zone's.
I personally think this idea has still to be shaped
up. Anyway, the "main idea", that puts a special emphasis in
democracy, as well as on each sysops' right to determine their
coordinators, authorities and delegates to the main,
International Council, is there.
I would like everybody to participate in the development
of this new idea, to ensure it's representability of all the
sysop's wishes.
Please, send mail to node 1200/1 with your opinions (in
North America, you can send it thru 135/14 which is the gateway
to Latin America).
If FidoNet's current authorities, as well as IFNA's
AND a large group of sysops consider the idea feasible, an
echomail conference could be created to ensure everybody's
participation on the development of this new idea.
Thank you for taking the time to read this article, and
thanks IFNA for maintaining a publication where everyone can
express oneself freely.
Pablo Kleinman (1:1200/1 aka 1:60/0)
Sysop's Elected Latin American RC
Buenos Aires, 28 de Mayo de 1988.
-----------------------------------------------------------------
FidoNews 5-24 Page 3 13 Jun 1988
and then Some.
Recently there has been a push to clean up the baud flags in the
nodelist. It seems they often get misused and it also seems
that sysops are not following any standard in their use or
nomenclature. Apparently there is a host of new software
becoming available that depends on the correct use and code for
the baud flags, and so an effort is underway to get these
nodelist flags cleaned up. Therefore, this seems like an
opportune time to talk about the use of the #CM: flag.
From my discussions with local sysops it would appear that the
#CM: flag is greatly misunderstood and often misused. To begin
with, the #CM: flag refers to "CONTINUOUS MAIL" capability, not
"CRASH MAIL" capability. There is a distinct and important
difference. Many sysops are running bulletin board and/or
mailer software that supports CRASH mail, but do not have their
systems available for incoming mail 24 hours per day. The #CM:
flag means that you are able to accept mail anytime day or
night, 365 days out of the year (barring unforeseen acts of God,
or nuclear holocaust). In other words, to qualify for the #CM:
flag, you have to have CRASH mail capability AND be running a
system that accepts incoming mail at all times.
The above description would probably get you past the FIDONET
boarder patrol in terms of qualifying you for the #CM: flag, but
there is more to consider. A #CM: "purest" would argue that to
REALLY qualify, you would have to be able to release any
outgoing mail destined for a system that happens to call your
system delivering mail. For example, lets say you are system
X/1 and have some mail to go out to system Y/1. Your outgoing
mail for Y/1 has not been labeled as CRASH mail. Your intent is
for the mail for Y/1 to go out during your next regularly
scheduled mail event (perhaps National Mail Hour). But prior to
your next mail event, system Y/1 happens to call your system to
deliver mail (completely unaware that you have mail for him).
The ideal #CM: system would release the mail to Y/1 at that
time, eliminating the need to wait until X/1's (your) next mail
event, and also preventing X/1 (you) from picking up the cost
for the mail intended for Y/1. Having this kind of continuous
mail capability requires a little more routing finesse. In
order to build a system with this "mail releasing" capability
requires you to have outgoing mail "bundled" at all times
because you cannot predict when a call will come in for which
you happen to have some outgoing mail. How do you do that? It
is really quite easy. The following description refers to how I
do it using SEAdog. I am sure there are other ways to
accomplish the same thing (perhaps even better ways, though I
doubt it). I do not know how this would be accomplished using
OPUS, or Binkley, or any of the myriad other mailer programs. I
only speak SEAdog, I've never learned OMMM (is that some
mystical East Indian mantra???). You'll have to suffer through
someone else's description of this stuff to learn how to do it
with other software.
FidoNews 5-24 Page 4 13 Jun 1988
The idea, as I said before, is to have all outgoing mail bundled
and to give SEAdog permission to release all outgoing mail at
all times. With this in mind, the routing commands are
straightforward:
Hold All
Send-to All
Give-to All
This combination of routing statements bundles all of your
outgoing mail with a "hold" flag on each parcel, and gives
SEAdog permission to release any parcel when the destination
system happens to call in. Now, all that remains is to give
this set of commands a routing tag and stuff that Schedule in
between all your other events. Lets say you give this set of
commands the Schedule J tag (that just happens to be the tag I
am using for this purpose). Now lets say a segment of your
CONFIG.DOG looks like this:
event X40 All 01:00 ;some external event
event C All 01:00 02:00 ;a 1-hour mail event
event D All 03:00 04:00 ;another mail event
You have an hour in there (from 2 until 3 in the AM) when you
are not in a mail event. You are going to want to stuff your
Schedule J in there so that, if a system for which you have
outgoing mail happens to call during that time period, your mail
to him will be released. The revised CONFIG.DOG segment would
look like this:
event X40 All 01:00 ;some external event
event C All 01:00 02:00 ;a 1-hour mail event
event J All 02:00 03:00 ;HERE'S THE BEEF
event D All 03:00 04:00 ;another mail event
As described in the preceding example, you would go through your
entire schedule of events in CONFIG.DOG and stuff "event J" in
between all of your other events such that you are running
"event J" at all times that you are not involved in some other
scheduled event.
There are a couple of other considerations: Most of you
probably are running a bulletin board as well as running a
mailer, and want the ability to have incoming "human" callers
(although I have heard more than one sysop say that they could
run a really neat BBS if people would just stop calling it...).
Remember to add the "BBS" statement in conjunction with each
"event J" so that SEAdog will know to relinquish control to your
BBS when a human calls in during one of those events.
event J All 02:00 03:00 BBS
^^^
Secondly, you are likely to have large blocks of time where you
have no other scheduled events and will want to be running
"event J". For example, I don't have any events to speak of on
FidoNews 5-24 Page 5 13 Jun 1988
my board between 6am and midnight the following day. It is
possible to put one "event J' in there to fill in that entire
block of time. However, that is not extremely desirable because
it limits your use of CRASH mail events. Let me give you an
example. Lets say it's noon and I'm on my lunch break (one of
the few times during the normal business day when I get to play
with my bulletin board). I decide to send some CRASH mail, so I
compose the messages and attach the CRASH flag, then go and eat
my day-old tunafish sandwich. The system will go about its
business attempting to send out my messages, but if the
destination system happens to be busy and the mail does not go
through, then "event J" would be re-installed and the system
would not attempt to send the CRASH mail again until the next
time I have a scheduled event, which in this fishy example, is
not for several more hours. The way around this problem is to
avoid an "event J" that covers multiple hours. Instead, start a
new schedule J every hour when you have large blocks of time in
the day without other scheduled events. Here is an example of
another segment of my CONFIG.DOG that demonstrates this:
event J All 12:00 13:00 BBS
event J All 13:00 14:00 BBS
event J All 14:00 15:00 BBS
...and so forth and so on
Oh...if that weren't enough... to bore you even further with
additional trivia about the #CM: flag, there is one more
consideration that comes to mind. We need to turn this thing
around and look at it from the opposite direction. Lets say you
are sending out CRASH mail and the destination system happens to
have mail waiting for you to pick up, and the sysop of that
destination node has read this silly article and has sprinkled
"event J's" throughout his CONFIG.DOG. His mail for you is
properly bundled and waiting for your call, and his SEAdog has
permission to release mail to you if you happen to call in.
Unfortunately, if you are using SEAdog's predefined "Schedule S"
for your CRASH mail event, you won't pick up your mail even if
the sysop of the destination node has gone to the trouble to set
it up this way, because SEAdog's Schedule S is defined as "Send-
only" (that's what the "S" in Schedule S stands for guys). So
your system will not look for mail addressed to you when it's
out delivering your CRASH mail. There is a quick fix to this
problem however. Simply define a "Schedule S" in your ROUTE.DOG
and give it one simple command:
Schedule S
Pickup All
If you follow the above suggestions, you will have a system that
truly qualifies you for the use of the #CM: flag. You will
accept incoming mail at all times, you will have outgoing mail
bundled and will release those mail packets if they are
addressed to incoming "mail" callers, and you will pick up mail
FidoNews 5-24 Page 6 13 Jun 1988
addressed to you when you are sending out CRASH mail.
Remember, the #CM: flag is preceded with the "#" sign. It is
one of a group of baud flags that indicate the time of day your
system is available for incoming mail. The other members of
this group reflect the beginning of an hour in Greenwich Mean
Time:
#09: Accepts incoming mail beginning 0900 GMT
#18: Accepts incoming mail beginning 1800 GMT
...and
#CM: Accepts incoming mail any ol' time
and lastly (as if that weren't enough), remember that the #CM:
flag is followed with a colon (:). All baud flags are followed
with a colon. If you have several baud flags assigned to your
system, they should be separated by a comma. For example, the
baud flags for my system are:
XP:,#CM:
Next month we'll talk about the XP: flag (gag! belch!...)
Dave Davidson
OPTOMETRY ONLINE
100/514
(Region 14 Coordinator)
-----------------------------------------------------------------
FidoNews 5-24 Page 7 13 Jun 1988
James Zachary 445/2
Indios (A Network Yarn)
(c) 1988
James Zachary
"JERKS!"
Ron jumped up from his desk and began pacing furiously.
"Stupid self-serving twits!" he bellowed at his computer
screen.
A shadow in the doorway startled him.
"Indios? Oh! I wasn't ... I mean ... sorry if I disturbed
you."
Indios was the caretaker and general handyman for the
condominium complex where Ron lived. Rarely did he pay much
attention to anything other than his duties.
"Your sink is fixed." he said with his deep, gravely voice.
"What upsets you?" the old Indian then asked through lips that
barely moved.
"Ahhhhh, I dunno! I am sick and tired of everyone treating me
like dirt!"
His dark, withered face frowning, Indios shuffled his large
frame to an overstuffed chair and sat down.
"How do they do this? I am not understanding."
Ron was surprised. In over 2 years he had never known Indios
to solicit a conversation.
"Well, some people are real idiots and think they know it all.
They like to lord over other people, pretending they are
smarter or better. All they really have are big mouths! I am
going to start defending myself! I am going to be more
assertive!"
"Tell to me the difference of you being 'assertive' and them
having 'big mouths'?" Indios asked without expression.
Ron did not answer.
"You sit in front of this for hours," Indios continued,
pointing to the computer on Ron's desk, "and it angers you.
How can this be?"
"It started off to be fun," Ron answered, "then everyone
started flaming at each other!"
Ron could see that he was only confusing Indios.
FidoNews 5-24 Page 8 13 Jun 1988
"See, with the computer, a bunch of people can leave messages
to each other. It's like a big hobby for computer buffs.
There is an amateur network that I belong to where we can leave
mail. It was fun until it became too crowded. Now everyone
just fights with each other. If someone misspells a word,
someone jumps on him. If someone asks a question or has an
idea that someone else thinks is stupid, then the name calling
starts. We call it 'flaming'."
Indios grunted and nodded that he understood.
"So, you meet people on your machine so you can get angry at
each other. You go to work and your clubs and get angry at
others. Driving your car makes you angry at others ..."
"Exactly!" Ron exclaimed. "Unless you stand up for yourself,
someone will walk all over you! Believe me, when someone
shoves it to me I am going to pay them back in spades!"
The Indian brushed his long, white hair back with his weathered
hands and looked sadly at Ron.
"So much anger ... This will make you better than them? Anger
can at times be a tool but, like a surgeons knife, it should
only be used when all else has failed and the cause is just ...
only then with great care and control. Most swing this blade
recklessly and wound themselves."
"I am sick and tired of reading this crap! I am sick and tired
of these pious bastards jumping on every little thing I do!"
"Maybe they have a fear ... maybe they have a need. The
smallest pups always growl the loudest. The others that are
secure will allow this because they know these pups have needs
that only can be provided for by their pretending dominance.
Even with wolves, the strongest and fastest in the pack will
allow the pretenders their moments, as they know it is their
need and all they can really achieve."
Now Ron was puzzled. "You mean I should just ignore these
twinks?! That I should let them say vile things about me and
others?!"
"Do they strip you of your honor? Are you denied all dignity?
Your family was not threatened, your ability to provide for
those that depend on you was not threatened ... your honor was
not taken."
"I have my pride!"
"Pride is not honor. You must know when NOT to fight before
you will ever know when it is proper TO fight. Your words of
anger are that of a child. Show me the burial sites of those
killed by mere words ..."
Ron knew he was losing the debate. This one was face to face
FidoNews 5-24 Page 9 13 Jun 1988
and the words had texture, tone and emphasis ... not like text
written on a flat monitor screen.
"Take what is good with this and all else in life and leave
behind what is bad." Indios continued, leaning forward, his
eyes fixed in a gaze at Ron. "I know enough about you to say
that you were granted neither the natural gift of a powerful
body nor a powerful mind at birth. You were granted a more
valuable gift, the gift to build whatever body and mind you
choose. There are no boundaries for this gift. All you do,
every day, in all walks, makes you what you are and what you
will be."
Indios then stood and walked to the doorway. Ron remained
silent.
"Will you build your body and soul of sound materials or will
you use the waste of the earth and become all that you
despise?" Indios asked with a hint of a smile as he departed.
Ron strolled slowly back to his desk and sat down in front of
the computer. He hit a key to awaken his blank screen and then
began rereading the message that had upset him earlier. After
a moment he moved on to the next message, leaving the hate
unanswered.
"We're just puppies ... " he mumbled under his breath. "I
guess Fido grew up and had a whole lot of puppies ..."
He then began a reply to a message from a friend in Puerto
Rico. "Take what is good ..."
-----------------------------------------------------------------
FidoNews 5-24 Page 10 13 Jun 1988
Neal Curtin
1:343/1
Proposed International Policy
Section I: FidoNet
1. What is FidoNet
FidoNet is the worldwide collection of Bulletin Boards that
operate under a protocol established by Tom Jennings called Fido.
The basic structure of the network is as follows, from the lowest
point to the highest.
POINT: A point is the lowest subdivision, and is a system
that is mail only and will only connect to a parent or BOSS node.
It is not listed in the nodelist.
NODE: A node is the lowest public position in the nodelist.
It is normally a fully functional system that can act as a
bulletin board and also send and receive mail and files.
HUB: A hub is a system which is set up to provide a service
to a small group of nodes that is a sub geographical group of a
net.
NET: A net is a geographical collection of Nodes that has
banded together in order to share common interests or reduce
costs.
REGION: This is a collection of nets and independent nodes
that are contained in a larger geographical or geopolitical
entity. The net may also be a special interest group.
ZONE: The zone is a larger collection of regions and nets.
Currently there are three zones, zone1 is North and South
America, zone2 is Europe and Africa, and zone3 is Australia and
the South Pacific area.
There are additional zones, but these are large networks that
do not want to directly participate in the FidoNet Nodelist. They
are zone7, AlterNet, and zone99, GoodEggNet. Communication can be
established with these zones either by means of zone gates or by
including them in your local nodelist.
SECTION II: LEVELS OF FIDONET
The FidoNet Network is broken down into many different
levels much as the hierarchy within any efficient
organization. Thru past history, the following hierarchy has
developed:
1. All System Operators (SysOps) taken collectively
(FidoNet). This is the highest level of the structure, and
represents the entirety of FidoNet.
FidoNews 5-24 Page 11 13 Jun 1988
2. International Coordinator (IC) This position is an
administrative position and is responsible for the publication of
the Nodelist. The IC is also the court of last resort in disputes
between zones.
3. Zone Coordinator (ZC). This position oversees one Zone
of FidoNet and is responsible for the smooth functioning of
FidoNet within that Zone. The ZC is the court of last resort
within his zone, unless the dispute is inter zonal in nature.
4. Regional Coordinator (RC). This position oversees
one Region within a Zone and is responsible for the smooth
functioning of FidoNet within that Region.
5. Network Coordinator (NC). This position oversees one
Network in one Region and is responsible for the smooth
functioning of FidoNet within that Network.
6. SysOp. This is the singular unit of FidoNet. The
SysOp runs his or her own FidoNet capable software such that their
system can function as part of FidoNet within the guidelines
imposed by the various levels of FidoNet above the SysOp level. Those
guidelines are formulated over time as defined in this document.
SECTION III: RESOLUTION OF DISPUTES
Disputes are bound to arise, and the solutions are
many. This document is cover only disputes which are between
zones. Each zone is to develop it's own policy statement for
disputes within it's own area, and each region/net is encouraged
to set up it's own policy, not to conflict with a higher policy.
1. A zone council will be set up comprised of three regional
coordinators from within each zone. In case of a dispute between
zones, a disinterested zone will be selected to act as a court.
Each zone will submit their side of the dispute, not to exceed 10
pages, to the selected zone council. The zone council shall then
make their decision with 10 days of the submittal. The majority
rule applies. Appeals may be made to the IC, who may also form a
council. The IC decision will be final, and there will be no
further mediation.
2. The IC council will consist of at least 2 regional
coordinators from each zone. They will review the same submittal
as the zone council received, and will make their decision in 10
days.
SECTION IV: POLICIES
Each zone is responsible for setting up a zone policy.
This policy will detail the requirements for a Zone Mail Hour
(ZMH), the handling of echo mail, the responsibilities of the
various regional coordinators, and any special conditions which
may exist.
FidoNews 5-24 Page 12 13 Jun 1988
Section V: INTERNATIONAL COORDINATOR
Because of the high position of trust that the IC must
hold, the position must be filled by someone who has not only the
technical qualifications, but must also be free from political
constraints. For this reason, the IC must not hold any other
position with the entire FidoNet community. When the position
becomes vacant, the senior ZC will assume the position until a
new IC can be elected.
The election procedures are as follows:
1. The RC's will nominate a slate of potential
candidates from within their zone. These candidates will then be
proposed to all the NC's, RC's within the zone will elect one
candidate for a inter zonal election.
2. The candidates from the zone elections will then
submit their position in the FidoNews for reading by all the
members of the community. The election will then be held.
3. The time frame for the election of the IC must be
short, and should be accomplished within 30 days.
4. Voting will be done by nets, regions, and zones.
Each net will hold an election process, results to forwarded to
the Region. The Regional independents will vote through the RC.
The RC will forward the Region vote to the ZC. Only votes will be
counted. Abstensions will not count. A pure majority will decide
the outcome.
RECALL procedures.
1. A recall can be initiated at any level.
2. A majority in a net or a region or a zone is
required to start a recall election. The recall election will be
conducted in the same manor as the IC election, but will be a yay
or nay vote only. Upon completion, the IC must abide by the
decision.
3. Each operating area will only be able to start one
protest per year.
-----------------------------------------------------------------
FidoNews 5-24 Page 13 13 Jun 1988
Claude Witherspoon
Fido 100/525
KIDS ECHO CONFERENCE GUIDELINES
1. PURPOSE: The purpose of this document is to deleniate
responsibilities, guidlines, and proceedures for the users
of the KIDS Echo Conference.
2. SCOPE: The KIDS Echo Conference was established to allow
young people up to the age of 18 to have freedom of
information interchange in an environment that is directed
primarily toward an adult audiance. Allowing our children to
have an area of thier own is necessary to give our kids the
opportunity to expand their capabilities in the age of
electronics and home computing. Our children are our most
valued resources in the persuit of a future for a nation
with strong goals in computers. Our future belongs to them.
They are our destiny. The KIDS Echo Conference was designed
with them in mind. Therefore, each adult should encourage
its use and give it direction. Direction without
interferance except to insure that the echo is wholesome and
that it grows with common decency as viewed by the public as
a whole.
3. GENERAL: Teachers are encouraged to allow students to
send traffic such as Pen-Pal letters, history, trivia, and
anything that will encourage and assist in the growth of
their students. Utilize the echo as a training aid limited
only by your knowledge and immagination. Encourage the
exchange of information between students of different
geographical locations for computer science, history,
cultures, etc. Spread the knowledge of this echo to local
school boards and faculty for future projects in computer
science and as a aid in the students growth in a nation with
multiple goals in the arena of computer science.
Parents are encouraged to assist thier children in the
utilization of this echo. This will develope healthy
computing habits and keep the echo interesting for the
children. Parents are also encouraged to promote the echo at
school meetings like the Parent Teachers Accosiation (PTA),
open house funtions at the schools, and through any medium
that will assist the growth of thier children in this area.
Users are encouraged to submit suggestions, comments, and
ideas to help with the growth of this echo. The users are
the heart of the echo and its existance is dependant upon
your utilization of it. Promote a healthy environment which
is suitable for children. Use peer pressure as necessary to
stop any misuse of the echo. Remember the children of this
great nation are our future and they hold the key to the
advancement of a nation with strong goals in the computer
field.
4. RESPONSIBILITIES:
FidoNews 5-24 Page 14 13 Jun 1988
a. SYSTEM OPERATORS (Sysops): Sysops that request and allow
the KIDS Echo Conference on thier Bulletin Board System must
monitor the echo to insure thier users do not abuse other
users or the echo as a whole. This includes reporting any
misuse that the sysop cannot control to the Net Coordinator
or Echo Moderator as necessary. Sysops will not allow foul
language for any reason, missuse of the echo by adults and
children alike, and not allow what is commonly known as
"Flames". If a user utilizes the KIDS echo for message
traffic that is better served by another echo, then the
sysop will direct that user to the appropriate area/echo.
b. USERS: Users are responsible for the echo as a whole.
Therefore, misuse by the users can cause the termination of
the echo in part or as a whole. You must insure that foul
language is not tolerated and not used. Peer pressure is
your tool. Tell another user that he/she is incorrect in
using foul language and that this echo is directed toward
children under the age of 18. If the other user continues,
report it immediately to the System Operator. This can be
done in private as necessary. If the sysop does nothing in a
reasonable leangth of time, report the problem to the Net
Coordinator or to the Echo Moderator. You must utilize the
echo in the context of its design. Keep a healthy acceptable
attitude and enter messages that are suitable for the
children that use the echo. Promote the free exchange of
information and discourage misuse. Traffic such as love
letters, private messages, sexual remarks, racist remarks,
religous comments, and "Flames" are forbidden in this echo.
There are other echoes that allow that kind of abuse or
harrasement (Go there!). Wars are not allowed i.e. Johnny
picking on Joe, Grade 12 verses grade 6, Texas against Porta
Rico, country against country, unless they are in the
context of learning and then they must be from the text
book approved by the Educational Departments.
5. GENERAL INFORMATION: The following information is
submitted for your use as necessary:
a. KidsNews Newsletter: The kidsNews newsletter was created
by Brandy Witherspoon, age 13, of Edwardsville, Illinous,
Net/Node 100/525. She is the Editor and Chief of the
newsletter and has done an outstanding job in its content.
The newletter is maintained and utilized by the users of the
KIDS echo in sharing information, ideas, articles,
editorials, programs, trivia, etc. for the audiance which
the echo is designed for (kids 18 and below). Distribution
of the newsletter can be arranged through the Echo
Moderator or Echo Coordinator. If you would like to submit
articles in the newsletter, send it in the KIDS echo area or
through NetMail to Claude Witherspoon, 100/525. This will
ensure your article is included in the newsletter in a
timely manner.
b. Echo Coordinator: Paul Witherspoon, Net/Node 19/42, San
FidoNews 5-24 Page 15 13 Jun 1988
Angelo, Texas. Data-(915) 949-5645.
c. Echo Moderator: Claude Witherspoon, Net/Node 100/525,
Edwardsville, Illinois. Data-(618) 656-5447.
6. These guidelines are just that "Guidelines". The success
or failure of the KIDS echo is dependant upon your use or
misuse of the echo. Please give comments and thoughts of a
constructive nature to the Echo Coordinator and Echo
Moderator on any topic that has been covered here. You will
recieve a reply I assure you. Thank you for your time and
attention in reguards to the echo. I hope to be talking with
most of you in the future.
Claude Witherspoon
Net/Node 100/525
KIDS Echo Moderator
-----------------------------------------------------------------
FidoNews 5-24 Page 16 13 Jun 1988
F I D O N E T
Policy and Procedures Guide
Net 343 version
Version 1
Chapter 1
OVERVIEW
1.1 The Levels of the Net
The Net is grouped on several levels. These are as follows:
o Network; The network is a collection of nodes,
specifically the city and surrounding territory of Seattle,
reachable from the central area of Seattle by a no-charge fee
from Pacific Northwest Bell.
o Hub; Any Hub will be an extension of the network coordinator
so as to increase the calling capability, or to extend the
net into a new area, until such time as they may be able to
form their own net. Hubs will be established for Echomail,
and for other purposes as may arise.
o Node; A node is a single FidoNet address, and is the
smallest recognized unit of FidoNet.
o Points; A point is a node on a private network which is
accessible through a node on FidoNet.
1.2 Coordinator
o The Network Coordinator; A Network Coordinator maintains the
list of any nodes in his network that are not served by
a hub and accepts node lists from the Hub Coordinators in
his network. He compiles these lists to create a
network node list for his network, which he then sends
to his Regional Coordinator. A Network Coordinator is
also responsible for forwarding any mail addressed to nodes
in his network.
o The Hub Coordinator; A Hub Coordinator maintains the list of
nodes in his hub and sends it to his Network
Coordinator. A Hub Coordinator is also responsible for
forwarding any mail addressed to nodes in his hub.
o The Echo Coordinator; The node in the net that acts as a
FidoNews 5-24 Page 17 13 Jun 1988
gateway to the regional echo coordinator. The Sysop (or
system operator) of that node then acts as the coordinator
for the network. This Sysop will be responsible for the
coordination and distribution of all echo mail within the
net. Cooperation with the net coordinator is expected, but is
not required. The final decision on echo distribution will
reside with the echo coordinator.
o The Sysop; A Sysop formulates his own policy for running his
board and dealing with his users, so that will not be
discussed in this document. However, a Sysop must also
mesh with the rest of the FidoNet system if he is to send and
receive mail, and that will be discussed here.
The primary responsibility of any coordinator is technical
management of network operations. Management decisions should
be made strictly on technical grounds.
SYSOP Procedures
A sysop of an individual node can pretty much do as he
pleases, as long as he observes the mail events, is not
excessively annoying to other nodes on FidoNet, and does
not promote the distribution of pirated copyrighted software.
National Mail Hour is the heart of FidoNet, as this is when
network mail is passed between systems. Any system which wishes
to be a part of FidoNet must be able to receive mail at this
time. NMH is defined as 1 AM to 2 AM, pacific STANDARD time.
This does not vary with daylight savings time. Additional time
for mail within the net is from 2 AM to 2:30 AM PST. This is to
allow for any mail received by the host (Coordinator) to be
distributed. THIS TIME IS TO BE A RECEIVE ONLY TIME. Only the
host will be sending during this time. During NMH and the net
mail time, no users (callers) are allowed.
Failure to observe the proper mail events is sufficient
grounds for any node to be dropped from FidoNet without notice
(since notice is generally given by FidoNet mail).
2.1 How to get a node number
You must first obtain a current node list so that you can send
mail. You do not need a node number to send mail, but you must
have one in order for others to send mail to you.
Once you have a node list, you must then send Net mail to the
host, 343/0, during NMH. Your application for a node number must
be sent to the coordinator by FidoNet mail, and must include at
least the following:
1) Your name.
2) The name of your system.
3) The city and state where your system is located.
FidoNews 5-24 Page 18 13 Jun 1988
4) The phone number to be used when calling your system.
5) Your hours of operation.
6) The maximum baud rate you can support.
2.2 If you are going down
If your node will be down for an extended period (more than a
day or two), then you should inform your coordinator as soon as
possible. If you do not do this, then other systems will still
try to reach you while you are down, much to the annoyance
of everyone. Do not under any circumstances put an answering
machine or similar device on your phone line while you are down.
If you do, then calling systems will get the machine
repeatedly, racking up large phone bills, which is very
annoying. See the section on Resolution of Disputes for details
on what happens to annoying people.
If you will be leaving your system unattended for an extended
period of time (such as while you are on vacation), you should
notify your coordinator. Systems do have a tendency to "crash"
now and then, so you will probably want your coordinator to know
that it is a temporary condition if it happens while you are
away.
COORDINATOR PROCEDURES
This chapter describes the procedures followed by the
coordinator at the NET level.
The coordinator has four primary duties. In order of
decreasing importance, they are:
1) Administrative tasks.
2) Node list distribution.
3) Newsletter distribution.
4) Network mail distribution.
At first glance it would seem that network mail distribution
should be the highest priority, since after all that's why
we're running a network in the first place. But the first
three priorities are needed to ensure smooth operation of
the network, and hence must have a higher priority.
Administrative tasks
First and foremost, every coordinator is also the sysop of
his own node. It must be possible for others to reach you by
network mail. So in addition to the other tasks of a
coordinator, you must also observe all of the requirements for
being a node.
FidoNews 5-24 Page 19 13 Jun 1988
Maintaining the node list
A coordinator at any level must maintain his portion of the node
list. Almost any coordinator will have some nodes in his node
list which are not a part of any subgroup. For example, a
Zone Coordinator must maintain a list of administrative nodes
for his zone, and a Regional Coordinator must maintain a list of
independent nodes in his region. A Hub Coordinator (or the
Network Coordinator in a network without hubs) must maintain the
list of all nodes in his area.
A coordinator is responsible for seeing to it that his portion
of the node list is kept reasonably accurate. You should
attempt to implement name changes, phone number changes, and
so forth in this node list as soon as possible. You should also
check from time to time to ensure that all of the listed
nodes are in fact capable of accepting network mail. How best to
accomplish this is left to your discretion.
Assigning node numbers
A node number will not be assigned until a formal request from
that system has been received by FidoNet mail. This will ensure
that the system is at least minimally operational. Additionally,
that system will be checked to ensure that it can receive both
mail and files. Before accessing echomail, the system will have
to demonstrate that it can use the echomail system by using the
local NET343 echo. The strict maintenance of this policy has
been one of the great strengths of FidoNet.
Network mail will be used to inform a new node of his node
number, as this helps to insure that he is capable of receiving
network mail.
Problem resolution
If the problem is caused by a node within the net, then you will
contact the net coordinator, who will attempt to resolve the
problem. If the problem is outside of the net, then you should
contact the coordinator of the other net, but be sure that you
send a copy of the complaint to your own coordinator.
If the problem is with the region, send the complaint to the
network coordinators concerned, and to the regional coordinator.
Any complaints received by the network coordinator will be
forwarded to the regional coordinator for information purposes.
Formulating local policy
It is your responsibility to formulate any local policies
which are required for the smooth operation of your assigned
area. Any policies you establish must not conflict with any
policies established by a coordinator above you or with this
policy document.
FidoNews 5-24 Page 20 13 Jun 1988
Node list distribution
The node list is posted weekly on Saturday, along with a
"difference file" giving the changes for the week. The
nodediff will be distributed to each node as soon as possible.
It is recommended you make it available for download by the
general user, but this is not required.
3.3 Newsletter distribution
The newsletter, called FidoNews, is published weekly on Monday
and is distributed as an archive named FNEWSvnn.ARC, where "v"
is the volume number and "nn" is the issue number. It will be
distributed in the same manor as the nodelist. It is also
desirable that you make it available for download by the
general user in both archive an non archive form, but this is not
required.
Anything else
You should encourage sysops and users in your region to
contribute to FidoNews. If you receive any submissions, you
should forward them to the FidoNews publisher. Think of yourself
as being a regional bureau chief on the FidoNews editorial
staff.
FidoNews and the node list are the glue that holds us
together. Without them, we cease to be a community, and become
just another random collection of bulletin boards.
Specific coordinator procedures
A Network Coordinator is responsible for assigning node numbers
to any nodes within his network which are not managed by a Hub
Coordinator. A Network Coordinator is also responsible for
allocating any hubs within his network and for appointing a
Hub Coordinator for each hub. If a Network Coordinator assigns
any Hub Coordinators, then he also assigns a pool of numbers
to each Hub Coordinator for use in assigning node numbers.
It is the responsibility of a Network Coordinator to
receive all inbound mail for nodes in his network and to
forward it to its recipients. How to accomplish this is
left to the discretion of the Network Coordinator. However,
there are a few exceptions:
1) Once in awhile a node will try to make a "bombing run"
(sending one message to a great many nodes). Bombing runs are
considered to be annoying, and will be cause for a formal
complaint.
2) Occasionally a user will appear who receives a great
deal of traffic. If a single node is receiving enough mail to
interfere with mail delivery to the other nodes in his
FidoNews 5-24 Page 21 13 Jun 1988
network, then his Network Coordinator can refer him to his
Regional Coordinator for reassignment as an independent node.
A Network Coordinator is responsible for assigning any additional
mail events which may be required for operation of his network.
Any node in a network may be excommunicated for failing to
observe these additional mail events.
A Network Coordinator may appoint a node as the outbound
gateway for his network if he so desires and if one can be
found. In no case should a node be appointed as an outbound
gateway unless the sysop of that node is willing and able to
provide reasonably reliable service. Note that a Network
Coordinator is not required to appoint an outbound gateway. If
a Network Coordinator chooses to appoint an outbound gateway,
then it is left to the Network Coordinator to establish any
rules, policies, and procedures relating to its use.
Hub Coordinator procedures
A Hub Coordinator is responsible for assigning node numbers to
nodes in his area. Each Hub Coordinator will be assigned a pool
of numbers to use when assigning node numbers. A Hub
Coordinator should never assign a node number outside of this
pool, and should never assign the same number to more than one
node. If a Hub Coordinator assigns all of the numbers in his
pool, he should apply to his Network Coordinator for additional
numbers.
It is the responsibility of a Hub Coordinator to receive all
inbound mail for nodes in his hub and to forward it to its
recipients. How to accomplish this is left to the discretion
of the Hub Coordinator. However, the same exceptions apply
here as for a Network Coordinator.
A Hub Coordinator may have additional duties, as assigned
by his Network Coordinator.
RESOLUTION OF DISPUTES
The world not being perfect, sometimes troubles crop up.
Any organization larger than a cub scout pack needs some sort of
grievance procedure, and FidoNet is no exception.
The FidoNet judicial philosophy can be summed up in two rules:
1) Thou shalt not excessively annoy others.
2) Thou shalt not be too easily annoyed.
In other words, there are no hard and fast rules of conduct,
but reasonably polite behavior is expected. Also, in any
FidoNews 5-24 Page 22 13 Jun 1988
dispute both sides are examined, and action could be taken
against either or both parties. ("Judge not, lest ye be judged!")
In any case of annoying behavior the person to complain to
is the coordinator of the person who is annoying you. For
example, if you have a problem with a point or a user you would
complain to his sysop, or if you have a problem with a
Regional Coordinator you would complain to his Zone Coordinator,
and so on.
If the coordinator you complain to fails to resolve the problem,
then you can complain to his coordinator. For example, if
you had a problem with a Hub Coordinator, you would first
complain to his Network Coordinator. Then if the Network
Coordinator does not resolve the problem, you would complain to
his Regional Coordinator.
Do not ever skip over a coordinator when filing a complaint.
That in itself is annoying.
This net shall be the one noted for non-flames. No one in this
net shall flame another in the net. If you are thinking of
flaming someone outside the net, be forewarned, a complaint filed
against you by someone outside the net, will be taken seriously,
and steps will be taken. We are friendly, loyal, trustworthy, and
HONEST.
-----------------------------------------------------------------
FidoNews 5-24 Page 23 13 Jun 1988
Neal Curtin
1:343/1
F I D O N E T
Policy and Procedures Guide
Zone 1 version
Version 0.001
* * * P R O P O S A L * * *
Chapter 1
OVERVIEW
FidoNet is an amateur electronic mail system. As such, all of
its participants and operators are non-paid volunteers. From
its early beginnings as a few friends swapping messages back and
forth, it has now grown to (August 1987) over 2000
different systems on four continents.
FidoNet is large enough that it would quickly fall apart of
its own weight unless some sort of structure and control were
imposed on it. Multi net operation provides the structure.
Decentralized management provides the control. This document is
an attempt to describe the procedures which have been
developed to manage the network.
1.1 The Levels of FidoNet
FidoNet nodes are grouped on several levels. These are as
follows:
o FidoNet; This indicates the entire public amateur mail
network, as administered by the International FidoNet
Association, and as defined by the weekly node list.
o Zones; A zone is a large geographic area containing many
regions, and covering one or more countries and/or
continents.
o Regions; A region is a well defined geographic area
containing nodes which may or may not be combined into
networks. A typical region will contain many nodes in
networks, and a few independent nodes, which are not a part
of any network.
o Networks; A network is a collection of nodes, usually
in a relatively small geographic area. Networks coordinate
their mail activity to decrease cost and increase mail
throughput.
FidoNews 5-24 Page 24 13 Jun 1988
o Hubs; A hub is a subdivision of a network that assists in
network management by routing mail to, and by
coordinating for, a collection of nodes in that network.
In general only the larger networks will have hubs.
o Nodes; A node is a single FidoNet address, and is the
smallest recognized unit of FidoNet.
o Points; A point is a node on a private network which is
accessible through a node on FidoNet.
1.2 Coordinators
Each subdivision at each level is managed by a
coordinator. A coordinator is a person who coordinates the
technical aspects of network mail. This entails both
administrative and technical tasks, which will be described
later. The following levels of coordinators are currently
recognized:
o The International Coordinator; The International
Coordinator compiles all of the node lists from all of the
regions and creates the master node list, which is then
distributed over FidoNet.
o The Zone Coordinator; A Zone Coordinator maintains the
list of administrative nodes in his zone and accepts node lists
from the Regional Coordinators in his zone. He compiles
these lists to create a zone node list, which he then sends to
the International Coordinator for inclusion in the master
node list. A Zone Coordinator is also responsible for
overseeing any zone gateways in his zone.
o The Regional Coordinator; A Regional Coordinator maintains
the list of independent nodes in his region and accepts node
lists from the Network Coordinators in his region. He compiles
these lists to create a regional node list for his region, which
he then sends to his Zone Coordinator. A Regional Coordinator
does not perform routing services for any nodes in his region.
o The Network Coordinator; A Network Coordinator maintains the
list of any nodes in his network that are not served by a
hub and accepts node lists from the Hub Coordinators in his
network. He compiles these lists to create a network node
list for his network, which he then sends to his Regional
Coordinator. A Network Coordinator is also responsible for
forwarding any mail addressed to nodes in his network.
o The Hub Coordinator; A Hub Coordinator maintains the list of
nodes in his hub and sends it to his Network Coordinator.
A Hub Coordinator is also responsible for forwarding any mail
addressed to nodes in his hub.
o The Point Coordinator; Any node in FidoNet can act as a
gateway to a point network. The Sysop (or system operator) of
FidoNews 5-24 Page 25 13 Jun 1988
that node then acts as the coordinator for his point network.
o The Sysop; A Sysop formulates his own policy for running his
board and dealing with his users, so that will not be discussed
in this document. However, a Sysop must also mesh with the
rest of the FidoNet system if he is to send and receive mail, and
that will be discussed here.
These levels act to distribute the administration and
control of FidoNet to the lowest possible level, while
still allowing for coordinated action over the entire mail
system. Administration is made possible by operating in a
strict top-down manner. That is, a coordinator at any given
level is responsible to the coordinator immediately above
him, and responsible for everyone below him.
For example, a Regional Coordinator is solely responsible to his
Zone Coordinator for anything that may or may not happen in
his region. From the point of view of the Zone
Coordinator, the Regional Coordinator is totally and
completely responsible for the smooth operation of his
region. Likewise, from the point of view of the Regional
Coordinator, the Network Coordinators are totally and
completely responsible for the smooth operation of their
networks.
If a coordinator at any level above sysop is unable for any
reason to properly perform his duties, he can be replaced by his
coordinator at the next level up. For example, if a Regional
Coordinator is failing to perform his duties, then his Zone
Coordinator can appoint a new Regional Coordinator to replace
him.
The primary responsibility of any coordinator is technical
management of network operations. Management decisions should
be made strictly on technical grounds.
Chapter 2
SYSOP PROCEDURES
A sysop of an individual node can pretty much do as he
pleases, as long as he observes the mail events, is not
excessively annoying to other nodes on FidoNet, and does
not promote the distribution of pirated copyrighted software.
National Mail Hour is the heart of FidoNet, as this is when
network mail is passed between systems. Any system which wishes
to be a part of FidoNet must be able to receive mail at this
time. A system which is a member of a network may also be
required to observe additional mail events, as defined by his
Network Coordinator.
FidoNews 5-24 Page 26 13 Jun 1988
Failure to observe the proper mail events is sufficient
grounds for any node to be dropped from FidoNet without notice
(since notice is generally given by FidoNet mail).
Network mail systems generally operate unattended and place
calls at odd hours of the night. If a system tries to call an
incorrect or out of date number, it could cause some poor
citizen's phone to ring in the wee hours of the morning, much
to the annoyance of innocent bystanders and civil
authorities. For this reason, a sysop who sends mail is
obligated to obtain and use the most recent edition of the
node list as is practical.
A system which has been dropped from the network is said
to be excommunicated (i.e. unable to communicate). A node
which has been excommunicated may or may not be listed for a
time in the "dog house", which is included in the comments at the
end of the node list. If you find that you have been
excommunicated without warning, then that means that your
coordinator was unable to contact you. You should rectify
the problem and report back.
The exact timing of National Mail Hour is set for each zone
by the Zone Coordinator. In zone 2 National Mail Hour is
observed from 0900 to 1000 GMT every day, weekends included.
FidoNet does not observe daylight savings time. In areas
which observe daylight savings time the FidoNet mail
schedules must be adjusted in the same direction as the
clock change. Alternatively, you can simply leave your system on
standard time.
2.1 How to get a node number
You must first obtain a current node list so that you can send
mail. You do not need a node number to send mail, but you must
have one in order for others to send mail to you.
The first step in obtaining a current node list is to locate a
FidoNet bulletin board. No help there; you're on your own.
Most bulletin board lists include at least a few FidoNet
systems, and usually identify them as such, so this shouldn't
be too hard.
If the sysop of any FidoNet system does not have a node list
available for downloading, then he can probably tell you where to
get one.
Once you have a node list, you must determine which
coordinator to apply to. The coordinator of any network or
region is always node zero of that network or region. A
Hub Coordinator will always be indicated in the node list by a
"HUB" prefix.
You should apply to the lowest-level coordinator that covers
FidoNews 5-24 Page 27 13 Jun 1988
your area. For example, if you are located within the hub of
a network, then you would apply to the Hub Coordinator. If there
is no network that covers your area, then you would
apply to the Regional Coordinator for your region.
Your application for a node number must be sent to the
coordinator by FidoNet mail, and must include at least the
following:
1) Your name.
2) The name of your system.
3) The city and state where your system is located.
4) The phone number to be used when calling your system.
5) Your hours of operation.
6) The maximum baud rate you can support.
Your coordinator may want additional information. If so, he
will contact you. Please allow at least two to three weeks
for a node number request to be processed.
2.2 If you are going down
If your node will be down for an extended period (more than a
day or two), then you should inform your coordinator as soon as
possible. If you do not do this, then other systems will still
try to reach you while you are down, much to the annoyance
of everyone. Do not under any circumstances put an answering
machine or similar device on your phone line while you are down.
If you do, then calling systems will get the machine
repeatedly, racking up large phone bills, which is very
annoying. See the section on Resolution of Disputes for details
on what happens to annoying people.
If you will be leaving your system unattended for an extended
period of time (such as while you are on vacation), you should
notify your coordinator. Systems do have a tendency to "crash"
now and then, so you will probably want your coordinator to know
that it is a temporary condition if it happens while you are
away.
2.3 How to form a network
If there are several nodes in your area, but no network, then
you may wish to form your own. You may also be requested to form
a network by your Regional Coordinator.
Your first step is to contact the other sysops in your area. You
must decide which nodes will comprise the network, and which of
those nodes is going to be the Network Coordinator. Your next
step is to inform your Regional Coordinator. You must send him a
FidoNet message with the following information:
1) The region number(s), or network number(s) if a
network is splitting up, that are affected by the formation of
FidoNews 5-24 Page 28 13 Jun 1988
your network. The Regional Coordinator will inform the
coordinators of any affected networks that a new network is in
formation.
2) The name that you wish to call your network. Please try to
select a name that relates to your grouping. For example,
SoCalNet for nodes in the Southern California Area and
MassNet for Massachusetts Area. Remember if you call
yourself DOGNET it doesn't help others know what area of the
country (or even what country) your group is in.
3) A copy of the proposed network's nodelist. The nodelist
file should be named Frrr-nnn.NET where rrr is the
proposed host's current region or network number and nnn
is his current node number. For example, if the proposed host
is currently listed as node 5 in region 13, then you would
name the file F013-005.NET. This file should be sent attached to
the message of Application for a Network Number.
Granting of a network number is not automatic. Your
Regional Coordinator will review your application and
inform you of his decision.
Do not send a network number request to the Zone Coordinator. All
network number requests must be processed by the Regional
Coordinator.
Chapter 3
COORDINATOR PROCEDURES
This chapter describes the procedures followed by all
coordinators at all levels. Later we will go into more detail
on those procedures which are specific to any given type of
coordinator.
All coordinators have four primary duties. In order of
decreasing importance, they are:
1) Administrative tasks.
2) Node list distribution.
3) Newsletter distribution.
4) Network mail distribution.
At first glance it would seem that network mail distribution
should be the highest priority, since after all that's why
we're running a network in the first place. But the first
three priorities are needed to ensure smooth operation of
the network, and hence must have a higher priority.
FidoNews 5-24 Page 29 13 Jun 1988
3.1 Administrative tasks
First and foremost, every coordinator is also the sysop of
his own node. It must be possible for others to reach you by
network mail. So in addition to the other tasks of a
coordinator, you must also observe all of the requirements for
being a node.
3.1.1 Maintaining the node list
A coordinator at any level must maintain his portion of the node
list. Almost any coordinator will have some nodes in his node
list which are not a part of any subgroup. For example, a
Zone Coordinator must maintain a list of administrative nodes
for his zone, and a Regional Coordinator must maintain a list of
independent nodes in his region. A Hub Coordinator (or the
Network Coordinator in a network without hubs) must maintain the
list of all nodes in his area.
A coordinator is responsible for seeing to it that his portion
of the node list is kept reasonably accurate. You should
attempt to implement name changes, phone number changes, and
so forth in this node list as soon as possible. You should also
check from time to time to ensure that all of the listed
nodes are in fact capable of accepting network mail. How best to
accomplish this is left to your discretion.
3.1.2 Assigning node numbers
You may assign node numbers to new nodes in your list, but keep
in mind the following:
1) It is your responsibility to ensure that the node number you
assign is unique within that region or network.
2) You should try to avoid assigning node numbers when an
existing subdivision of your area already covers the location
of the new node. For example, a Regional Coordinator should
try to avoid assigning independent nodes in a city that has
its own network.
You may also change the numbers of existing nodes in your area,
though you should check with the respective nodes before doing
so.
You should not under any circumstances assign a node number to
any system until you have received a formal request from that
system by FidoNet mail. This will ensure that the system is at
least minimally operational. The strict maintenance of this
policy has been one of the great strengths of FidoNet.
It is also recommended, though not required, that you call a
board which is applying for a node number before assigning it a
node number.
FidoNews 5-24 Page 30 13 Jun 1988
You should use network mail to inform a new node of his node
number, as this helps to insure that he is capable of receiving
network mail.
3.1.3 Problem resolution
From time to time you may be called on to resolve a problem in
your area. This could be a technical problem relating to the
four primary duties of a coordinator, or it could be related to
annoying behaviour on the part of someone in your area.
If the problem is caused by a node or a coordinator immediately
under you, then it is your responsibility to resolve the problem
in whatever manner you deem fit. If the problem is in a
subdivision of your area, then you should first refer it to
the appropriate coordinator. If that coordinator does not
resolve the problem satisfactorily, then you can appoint a
replacement.
3.1.4 Formulating local policy
It is your responsibility to formulate any local policies
which are required for the smooth operation of your assigned
area. Any policies you establish must not conflict with any
policies established by a coordinator above you or with this
policy document.
3.2 Node list distribution
The node list is posted weekly on Saturday, along with a
"difference file" giving the changes for the week. It is your
responsibility to obtain the difference file from your
coordinator every week and to distribute it to the
coordinators below you. The method of distribution is left
to your discretion. It is also desirable that you make it
available for downloading by the general user, but this is not
required.
3.3 Newsletter distribution
The newsletter, called FidoNews, is published weekly on Monday
and is distributed as an archive named FNEWSvnn.ARC, where "v"
is the volume number and "nn" is the issue number. It is your
responsibility to obtain this archive from your coordinator
every week and to distribute it to the coordinators below you.
The method of distribution is left to your discretion. It is
also desirable that you make it available for downloading by
the general user in both archived an unarchived form, but this
is not required.
FidoNews 5-24 Page 31 13 Jun 1988
3.4 Network mail distribution
It is your responsibility to ensure that network mail in your
area is operating in an acceptable manner. Exactly what this
involves will depend on what level you are at, and will be
discussed in more detail below.
3.5 Anything else
You should encourage sysops and users in your region to
contribute to FidoNews. If you receive any submissions, you
should forward them to the FidoNews publisher. Think of yourself
as being a regional bureau chief on the FidoNews editorial
staff.
FidoNews and the node list are the glue that holds us
together. Without them, we cease to be a community, and become
just another random collection of bulletin boards.
3.6 Specific coordinator procedures
The above outlines the procedures which are followed by
all coordinators. We will now discuss additional procedures
followed by specific types of coordinators.
3.6.1 International Coordinator procedures
The International Coordinator is elected by all regional
coordinators in all zones. In case of a vacancy, the senior zone
coordinator will assume the position until such time as a new
coordinator can be elected.
The International Coordinator is responsible for format of the
node-list and the update files.
The International Coordinator is responsible for allocating
zones, assigning zone numbers, and for appointing the Zone
Coordinator for each zone.
3.6.2 Zone Coordinator procedures
A Zone Coordinator is responsible for dividing his zone into
regions, assigning region numbers, and for appointing the
Regional Coordinator for each region. A Zone Coordinator also
assigns a pool of numbers to each Regional Coordinator for use in
assigning network numbers.
A Zone Coordinator is responsible for locating nodes willing to
act as zone gates for passing mail between his zone and the other
zones, if at all possible. A Zone Coordinator should not
appoint any node as a zone gate unless the sysop of that node is
willing and able to provide reasonably reliable interzone mail.
FidoNews 5-24 Page 32 13 Jun 1988
Zone gates are highly desirable, but if provided they must be
reasonably reliable.
A Zone Coordinator maintains the list of administrative nodes
within his zone. The administrative nodes will always have a
region number the same as the zone number. For example, the
administrative nodes for Zone 3 will always be in Region 3.
A Zone Coordinator may use administrative node addresses for
whatever he likes, except that any node number which is the
same as another zone number is reserved for the zone gate to that
zone. For example, in Zone 3 the network address "3/2" is
reserved for use by the zone gate that passes mail from Zone 3 to
Zone 2.
A Zone Coordinator may not assign a region number that is the
same as any other zone number. This is because administrative
regions are, by definition, present in all zones.
A zone coordinator is responsible for the weekly zone and world
nodelist to be published in his zone on Saturdays.
3.6.3 Regional Coordinator procedures
A Regional Coordinator is responsible for approving new
networks, assigning network numbers, and for appointing a
Network Coordinator for each network.
Each Regional Coordinator will be assigned a pool of numbers
to use when assigning network numbers. A Regional Coordinator
should never assign a network number outside of this pool, and
should never assign the same number to more than one network. If
a Regional Coordinator assigns all of the numbers in his
pool, he should apply to his Zone Coordinator for additional
numbers.
A Regional Coordinator should try to avoid the needless
proliferation of networks. Networks should not be allocated on
any basis other than technical and practical considerations
relating to network mail operations. For example, persons
wishing to establish networks on the basis of special interests
or for company mail should be encouraged to investigate the
alternatives, such as echomail conferences and point networks.
A Regional Coordinator is responsible for maintaining the
list of independent nodes within his region. This will consist
primarily of those nodes which are not within the coverage
area of any network. There are, however, certain cases where a
node should not be a member of a network, such as a
commercial system with a large volume of traffic which would clog
the network. The resolution of such special cases is left to
your own discretion.
If several independent nodes in a region are in a "clump",
then the Regional Coordinator should encourage or require
FidoNews 5-24 Page 33 13 Jun 1988
them to form a network. Refer to the sysop procedure on
forming a network for more details.
Note that this does not mean that a Regional Coordinator
should encourage the formation of trivial networks. Obviously,
one node does not make a network. The exact number of
nodes required for an effective network must be judged according
to the circumstances of the situation, and is left to the
discretion of the Regional Coordinator.
It is the responsibility of a Regional Coordinator to ensure that
the networks within his region are operating in an
acceptable manner. This does not mean that he is required to
operate those networks; that is the responsibility of the Network
Coordinators. It means that he is responsible for seeing to
it that the Network Coordinators within his region are acting
responsibly.
A Regional Coordinator is obligated to maintain direct and
reasonably frequent contact with the networks in his region. The
exact method of accomplishing this is left to the
discretion of the Regional Coordinator.
3.6.4 Network Coordinator procedures
A Network Coordinator is responsible for assigning node numbers
to any nodes within his network which are not managed by a Hub
Coordinator. A Network Coordinator is also responsible for
allocating any hubs within his network and for appointing a
Hub Coordinator for each hub. If a Network Coordinator assigns
any Hub Coordinators, then he also assigns a pool of numbers
to each Hub Coordinator for use in assigning node numbers.
It is the responsibility of a Network Coordinator to
receive all inbound mail for nodes in his network and to
forward it to its recipients. How to accomplish this is
left to the discretion of the Network Coordinator. However,
there are a few exceptions:
1) Once in awhile a node will try to make a "bombing run"
(sending one message to a great many nodes). Bombing runs are
considered to be annoying, and may be dealt with accordingly.
2) Occasionally a user will appear who receives a great
deal of traffic. If a single node is receiving enough mail to
interfere with mail delivery to the other nodes in his
network, then his Network Coordinator can refer him to his
Regional Coordinator for reassignment as an independent node.
3) The most common source of routing overload is echomail.
Echomail is a nice invention, and offers great benefits, but
it cannot be allowed to degrade the ability of FidoNet to handle
normal message traffic. If a node in a network is
routing large volumes of echomail, the sysop can be asked to
either limit the amount of echomail, or even to stop
routing his echomail completely. The design of echomail is such
FidoNews 5-24 Page 34 13 Jun 1988
that it is a simple matter to do either of these.
A Network Coordinator is responsible for assigning any additional
mail events which may be required for operation of his network.
Any node in a network may be excommunicated for failing to
observe these additional mail events.
A Network Coordinator may appoint a node as the outbound
gateway for his network if he so desires and if one can be
found. In no case should a node be appointed as an outbound
gateway unless the sysop of that node is willing and able to
provide reasonably reliable service. Note that a Network
Coordinator is not required to appoint an outbound gateway. If
a Network Coordinator chooses to appoint an outbound gateway,
then it is left to the Network Coordinator to establish any
rules, policies, and procedures relating to its use.
3.6.5 Hub Coordinator procedures
A Hub Coordinator is responsible for assigning node numbers to
nodes in his area. Each Hub Coordinator will be assigned a pool
of numbers to use when assigning node numbers. A Hub
Coordinator should never assign a node number outside of this
pool, and should never assign the same number to more than one
node. If a Hub Coordinator assigns all of the numbers in his
pool, he should apply to his Network Coordinator for additional
numbers.
It is the responsibility of a Hub Coordinator to receive all
inbound mail for nodes in his hub and to forward it to its
recipients. How to accomplish this is left to the discretion
of the Hub Coordinator. However, the same exceptions apply
here as for a Network Coordinator.
A Hub Coordinator may have additional duties, as assigned
by his Network Coordinator.
Chapter 4
RESOLUTION OF DISPUTES
The world not being perfect, sometimes troubles crop up.
Any organization larger than a cub scout pack needs some sort of
grievance procedure, and FidoNet is no exception.
The FidoNet judicial philosophy can be summed up in two rules:
1) Thou shalt not excessively annoy others.
2) Thou shalt not be too easily annoyed.
In other words, there are no hard and fast rules of conduct,
but reasonably polite behavior is expected. Also, in any
dispute both sides are examined, and action could be taken
FidoNews 5-24 Page 35 13 Jun 1988
against either or both parties. ("Judge not, lest ye be judged!")
In any case of annoying behavior the person to complain to
is the coordinator of the person who is annoying you. For
example, if you have a problem with a point or a user you would
complain to his sysop, or if you have a problem with a
Regional Coordinator you would complain to his Zone Coordinator,
and so on.
If the coordinator you complain to fails to resolve the problem,
then you can complain to his coordinator. For example, if
you had a problem with a Hub Coordinator, you would first
complain to his Network Coordinator. Then if the Network
Coordinator does not resolve the problem, you would complain to
his Regional Coordinator.
Do not ever skip over a coordinator when filing a complaint.
That in itself is annoying.
(many thanks to Henk Wevers, who did most of this policy doc.
Minor editing is all that was needed to bring it into conformance
with the changed IFNA doc and the companion IPOLICY.TXT)
-----------------------------------------------------------------
FidoNews 5-24 Page 36 13 Jun 1988
=================================================================
COLUMNS
=================================================================
Jake Hargrove
Fido 301/1
High Mesa Ranger's
What Price Echo Mail
This article is going to deal with a subject which is getting
very close to my pocket book and many others as well. In recent
months it seems echomail has not only become popular with SySop's
but users as well. An the question has arisen who should pay for
echomail. This question like most others is fair, and deserves
an answer. Even if it may not be what most folks want to hear.
In recent weeks the feed for most of this region (15) has been
down. I find out by reading echomail, the feed is running six
(6), 9600 baud HST modems (wish I just had one). An he is
getting flamed left and right in almost every echomail area I
read. Then I am politely reminded by a little bird on my
shoulder. I do not know this guy from Adam, he is providing a
service to me and many of the other nodes in the western United
States, and his so called fellow sysops are Flaming him.
So I ask the QUESTION.
"WHAT IS THE PRICE OF ECHOMAIL?"
Like most everyone else except for a few I started picking up
echomail when it really got started. Presently I use two feeds,
one here in Region 15, and one from Region 19. Both are long
distance calls and presently average 10-15 minutes each. It just
so happens both feeds have been affected by the loss of the
western feed. So for a couple of weeks now, messages have been
sporadic to say the least.
I now carry 23 echo areas, some of which are used solely for
myself, and most which are forwarded to other nodes locally. But
I read every single message that comes into this board.
Basically since I have very few users, because I have not
advertised the BBS very much. The BBS is largely a message base,
in fact recently when my internal clock was reset to the year
1990 by a game my son plays. I lost or rather had killed over 7
megs of messages because they were over 15 days old. Yes, I had
read all of them but it makes you wonder. If I am a small system
and have over 7 megs of messages what do some of the other larger
systems have.
Recently purchasing a 2400 Baud Ven-Tel modem I hope to cut my
cost, I do not expect it to be cut in half or anything like that,
even a 50 dollar cut off of 137.00 will help. An if I figure it
right, a 50 dollar cut would pay for my new modem in about 8
months.
FidoNews 5-24 Page 37 13 Jun 1988
I now turn the topic of this article to the real subject. Just
who should pay for echomail? I say this cost MUST be shared by
all of us. If it cost my feeds $80.00 each a month to pickup
their echo mail, and they use a 9600 baud modem. You can figure
the cost of your echo mail using the following formula.
9600 100% 75% 50% 25%
9600/9600 = 1 80.00 60.00 40.00 20.00
9600/2400 = 4 320.00 240.00 120.00 80.00
9600/1200 = 8 640.00 480.00 320.00 120.00
9600/300 = 32 2560.00 1920.00 1280.00 512.00
2400 100% 75% 50% 25%
2400/2400 = 1 320.00 240.00 120.00 80.00
2400/1200 = 2 640.00 480.00 320.00 120.00
2400/300 = 8 2560.00 1920.00 1280.00 512.00
1200 100% 75% 50% 25%
1200/1200 = 1 640.00 480.00 320.00 120.00
1200/300 = 4 2560.00 1920.00 1280.00 512.00
I am most certainly willing to support my feed in any way I can
but if I were to pickup all the echomail he received in a months
time frame, I would have already paid 4 times what he paid just
to get mail from him. But since I do my planning a little bit
ahead I am only picking up those areas I want to read. So my
cost is is not going to be the full cost of echomail to him.
An it would not matter to Ma Bell who gives them the money. If
my feed decided he was no longer going to allow me to poll him
for mail. If he was going to make all the calls and then charge
me a rate comparable to his phone cost. He would in fact, be
doing me a favor, except it would still cost me XX dollars per
month. It is now up to me to decide what I am willing to pay for
my end of echomail.
So what I am going to PRESUME IS:
1. It will cost me to call my feed.
2. Or it will cost me to have him call.
Either way, I will be paying out of my pocket.
I now ask, which is easier? Of course, I call him. I do it at
my own time, when he allows me to do so, normally between 0200
and 0500 in the morning. The cheapest time to call. So
basically it means: ECHOMAIL is going to cost me exactly what I
am willing to pay for it.
As the local and Net 301 feed, I am making several proposals to
those who I distribute mail to on how WE can solve this problem
which will soon face us. They are the only ways I know of US
maintaining our connection.
FidoNews 5-24 Page 38 13 Jun 1988
So it all comes down to these few simple FACTS.
What Price of EchoMail is what you and I are going to be willing
to pay for it. I personally want it as cheap as I can get it.
My wife wants it cheaper. Even if as she put it, it means
cutting back in the number of areas I receive, or telling those
nodes who I make distribution to locally presently at no cost,
except to one who has already agreed to pay his fair share, they
will have to find other means of obtaining the echos they want.
But then if I was a distribution point I would not want 3 or 4
nodes from the same area making pickup. So one way or the other,
MY price for EchoMail will be my monthly PHONE Bill.
-----------------------------------------------------------------
FidoNews 5-24 Page 39 13 Jun 1988
Top Downloads: 5/27/8 - 6/3/88
A weekly report of the most popular downloads
from contributing FidoNet systems. Report created
on June 9.
Contributing systems:
135/1
(380/2 - I guess you couldn't get through because of our disk
problems).
Because I'm getting ready to install, format and copy 170
floppies worth of files onto a new hard drive as well as change
some of the look of RAM-SOFT, I'm just presenting you with a
higly edited (not all files are listed) version of the system
report from LogRpt. For those seeing this column for the
first time, this is NOT the way it usually looks.
Although we managed to be up for all but 3 national mail slots in
the past two weeks, we have been down during the day quite often
and the stats look sick compared to previous weeks. Hopefully in
the 6/20 issue we'll be back to normal. (Our other sysop picked
a great week to take a vacation!)
Report for the days 27 May through 02 Jun for a total of 7 days
Percentage of use per hour
%
.... ...
55| * * * * |
50| * * * * * * |
45| * * * * * * * |
40| * * * * * * * * * * |
35| * * * * * * * * * * * |
30| * * * * * * * * * * * * * * |
25| * * * * * * * * * * * * * * |
20| * * * * * * * * * * * * * * * |
15| * * * * * * * * * * * * * * * |
10| * * * * * * * * * * * * * * * * |
5| * * * * * * * * * * * * * * * * * * * * * |
+------------------------------------------------------------+
0 1 2 3 ... 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23
Statistics based on the board being available for 22.0 hours per
day with a total of 50.0 calls possible per hour.
Total number of calls: 185
Total minutes BBS was in use: 2501 Min.
Average call duration : 13.52 Min.
Utilization of the BBS : 32.48 %
File transactions Average per day
---------------------------------------
Downloads: 137 19.57
Uploads : 11 1.57
Number of new calls: 96 (starting from 0 users, that isn't bad)
Busiest hour was : 0000
FidoNews 5-24 Page 40 13 Jun 1988
File Name # DL's
------------------------------------------
d:\opus\files\misc\arc-set.arc 9
d:\opus\files\info\oliomac.arc 3
e:\opus\files\comm\fixpcp11.arc 3
d:\opus\files\bbsp\colossus.arc 2
d:\opus\files\info\macpics2.arc 2
d:\opus\files\misc\firework.arc 2
d:\opus\files\misc\say.arc 2
d:\opus\files\util\clean.arc 2
d:\opus\files\util\faskbak.arc 2
e:\opus\files\comm\pcplus11.arc 2
d:\opus\files\bbsp\newsysop.arc 1
d:\opus\files\bbsp\renum40.arc 1
d:\opus\files\bbsp\xlatlist.arc 1
d:\opus\files\lang\a86a.arc 1
d:\opus\files\lang\csrturbo.arc 1
d:\opus\files\lang\cxmodem.arc 1
d:\opus\files\lang\d86a.arc 1
d:\opus\files\lang\edipage.arc 1
d:\opus\files\lang\f-m2doc.arc 1
d:\opus\files\lang\f-m2util.arc 1
d:\opus\files\lang\scrn-c.arc 1
d:\opus\files\lang\sort-bas.arc 1
d:\opus\files\lang\sorts.arc 1
d:\opus\files\lang\tccmisc.arc 1
d:\opus\files\util\bacopy.arc 1
d:\opus\files\util\colblnk1.arc 1
d:\opus\files\util\cpu1b.arc 1
d:\opus\files\util\dog101a.arc 1
d:\opus\files\util\emcach.arc 1
d:\opus\files\util\reboot.arc 1
d:\opus\files\util\rmap.arc 1
d:\opus\files\util\saytime.arc 1
d:\opus\files\util\sdir1.arc 1
d:\opus\files\util\show.arc 1
d:\opus\files\util\sortdir.pas 1
d:\opus\files\util\sst.arc 1
d:\opus\files\util\tt.arc 1
e:\opus\files\comm\dtpall.arc 1
e:\opus\files\comm\gt1400-3.arc 1
e:\opus\files\comm\gt1400-4.arc 1
e:\opus\files\comm\gt1400-5.arc 1
e:\opus\files\comm\ibmaux20.arc 1
e:\opus\files\comm\pcplusrt.arc 1
e:\opus\files\comm\ultra3.arc 1
e:\opus\files\comm\updload.arc 1
e:\opus\files\comm\xfer121.arc 1
Transfer methods total
-----------------------------
SEAlink download/upload: 21
Telink download/upload: 8
Xmodem download/upload: 77
Ymodem download/upload: 11
Zmodem download/upload: 31
FidoNews 5-24 Page 41 13 Jun 1988
External download/upload: 0
If there are any other systems interested in having your
download stats included in this weekly column, please send me
your system via net-mail at 135/1. The complete system report
from LogRpt so I can include utilization stats would be ideal
but is not required. If there are filenames that may not fully
indicate what the file is, please let me know. If there is a
file you particularly want me to list, let me know. I need
to have the information by Monday's Net-mail time in order to
get the stats compiled. Please keep your reports at 7 or 8 days,
Friday to Friday if possible and no longer than 10 days. (We
can accept net-mail anytime of the day [when our HD works] and
are PC-Pursuitable).
James Gilbert
RAM-SOFT Archive Library (9600HST)
1:135/1
-----------------------------------------------------------------
FidoNews 5-24 Page 42 13 Jun 1988
=================================================================
NOTICES
=================================================================
Once you thought it was safe to go back into the water...
BEACH : Beach and Resort Echomail returns!
run by Randy Kobetich, the Pervert under the BoardWalk
available directly from 150/199 or through appropiate channels.
Mike J
The Grey Sysop...
-----------------------------------------------------------------
The Interrupt Stack
18 Jun 1988
Area Code 407 takes effect in East/Central Florida. All Sysops
should adjust their Nodelist entries immediately.
25 Jun 1988
EuroCon II starts in Tiel, Holland. Sponsored by the Dutch
Hobby Computer Club. Will run for 2 days. Contact Hans
Lichthelm at 2:2/999 for information.
16 Jul 1988
A new areacode, 508, will form in eastern Massachusetts and
will be effective on this date. The new area code will be
formed from the current areacode 617. Greater Boston will
remain areacode 617 while the rest of eastern Massachusetts
will form the new areacode 508.
25 Aug 1988
Start of the Fifth International FidoNet Conference, to be
held at the Drawbridge Inn in Cincinnati, OH. Contact Tim
Sullivan at 108/62 for more information. This is FidoNet's big
annual get-together, and is your chance to meet all the people
you've been talking with all this time. We're hoping to see
you there!
24 Aug 1989
Voyager 2 passes Neptune.
If you have something which you would like to see on this
calendar, please send a message to FidoNet node 1:1/1.
-----------------------------------------------------------------
Latest Software Versions
BBS Systems Node List Other
FidoNews 5-24 Page 43 13 Jun 1988
& Mailers Version Utilities Version Utilities Version
Dutchie 2.81 EditNL 4.00* ARC 5.21
Fido 12h* MakeNL 2.10* ARCmail 1.1
Opus 1.03b Prune 1.40 ConfMail 3.31
SEAdog 4.10 XlatList 2.86 EchoMail 1.31
TBBS 2.0M XlaxNode 1.02 MGM 1.1
BinkleyTerm 1.50* XlaxDiff 1.02
QuickBBS 2.01* ParseList 1.10
* Recently changed
Utility authors: Please help keep this list up to date by
reporting new versions to 1:1/1. It is not our intent to list
all utilities here, only those which verge on necessity.
-----------------------------------------------------------------
FidoNews 5-24 Page 44 13 Jun 1988
=================================================================
COMMITTEE REPORTS
=================================================================
Don Daniels, President
International FidoNet Association
FidoNet 1:107/210
IFNA Status Report for June 1988
PROGRESS DURING THIS PERIOD
General
First of all, I'd like to report that FIDOCON '88 preparation is
still charging ahead. There is a great deal of preparation and
additional effort being expended to make this the biggest and
best FIDOCON ever.
From what I hear, there is an exciting key-note speaker lined-up:
one of the innovators and "mavericks" of the industry. I'll let
the Conference Organizing Committee give you the details when
they're positive that everything is finalized, but it looks like
this will be another highlight. The Committee seems to be going
all out to provide a wide-range of topics, from the very
technical to the important political issues that need to be
resolved. If you hurry, I think you may still have a chance at
the drawing for the U.S. Robotics 9600 HST modem, so get your
registration in now!
Meanwhile, quite a few other activities are underway that sound
very exciting. Should they continue in the direction they appear
headed, it looks like we will have a lot of work to do, but will
stand a very good chance of bringing real distinction to FidoNet
through IFNA.
The first of these, headed up by David Drexler, involves support
for the younger set. There already is a KID'S NET which was
started by the Witherspoon family, I believe. They've given us
some ideas and help and Dave has been able to make several
contacts in related areas. In one such undertaking, several
hundred schools in the U.S. and Australia are already linked
through a commercial network supported as a pilot project by one
of the major carriers. It looks like that support may not
continue into the fall and there may well be a chance for us to
step in and provide some real cost-effective assistance to the
schools that wish to continue.
In another project led by IFNA Vice-President Mark Grennan, a
specially modified mailer is being developed that can be used by
the blind. Several institutions that support the blind are very
interested in the potential of this approach and have indicated
various levels of support. There are still a few problems to be
worked out, but hope is high that we can make quite a
FidoNews 5-24 Page 45 13 Jun 1988
contribution to this segment of our population.
Still another project deals with support for the deaf. Due to
manning problems, we've had difficulty in getting this one
underway. We could use help on all these areas, but particulary
this one which has initial contacts in the D.C. area.
These and other activities going on behind the scenes hold a
great deal of promise for FidoNet to make even a far greater
influence than it already has. But with this potential comes
considerable responsibility and it it very necessary for us all
to settle some of the political and technical issues that
separate us, thereby making it possible for those that wish to
and can support such beneficial endeavors to do so.
Please, if you believe in such activities, make a real attempt to
come to FIDOCON. We need your support and energy to clear some
of the obstacles between us and some really worthwhile
contributions to the public.
ADMINISTRATION AND FINANCE
Unfortunately, Greg Small, who filled the empty Chair of this
committee, has been beset by some overpowering personal
considerations and has had to drop out. This leaves us again,
without a leader for this important area. Certain aspects are
proceeding along regardless, such as the financial work by
Leonard Mednick and various projects by Steve Bonine. But we do
need someone who can organize a great many administrative
services and requirements to make us all more efficient.
BOARD OF DIRECTORS
The BoD has resolved the technical difficulties encountered with
its recent management changeovers. Voting reports appear weekly
in IFNA, so I'll not repeat them here.
BY-LAWS AND RULES
No formal report was received from Steve Jordan. However, we
have been involved in several discussions regarding some
much-needed amendments to the By-laws. Steve's committee is
finalizing the rules for this summer's vote on the suggested
amendments.
EXECUTIVE COMMITTEE
As most of the members of the Executive Committee are forced to
do double duty on other matters, the efforts involved in
replacing Tom Marshall who resigned as Secretary due to personal
and professional concerns, have taken up most of the available
time.
FidoNews 5-24 Page 46 13 Jun 1988
My personal thanks to Tom who has contributed a great deal of
service to FidoNet.
INTERNATIONAL AFFAIRS
No official report was received from Henk Wevers, but he has told
me that they are expecting 120 or more for EuroCon II. Those of
us that will be attending are looking forward to this event - in
my case, I expect it to provide additional input towards our
preparation for FIDOCON.
MEMBERSHIP SERVICES
Phil Ardussi informs me that the tapes from last FIDOCON are
finally ready and will be available at this year's conference.
Plans are already underway for next year's conference. They are
putting the finishing touches on the forms and processes for
evaluating bids for FIDOCON '89. It is expected that bids will
be requested and received in time to make the decision and
announcement at this year's conference.
NOMINATIONS AND ELECTIONS
The chairmanship of this committee was just changed from David
Garrett to Rob Barker on the request of the BoD. Although the
By-laws don't specifically say so, it appears that their intent
was to maintain separation between the IFNA Secretary and the
functions of this committee. Therefore, as David Garrett has
just been elected the new Secretary of IFNA, he was asked to
relinquish the chair. Our thanks to David for his recent efforts
in handling the nominations and working toward the establishment
of the rules for the upcoming election.
PUBLICATIONS
No report was received on this matter from Tim Sullivan (who
is presently concentrating his efforts on FIDOCON!).
TECHNICAL STANDARDS
No report was received from Randy Bush.
ETHICS COMMITTEE
No specific report was received from Bill Allbritten, but I did
get a copy of a draft of a Standard of Ethics for the leadership
of IFNA. I was very impressed with this document, as it appears,
in addition to spelling out various standards of performance and
conduct, to really provide the membership with an independent
mechanism for monitoring the officers and directors of IFNA.
FidoNews 5-24 Page 47 13 Jun 1988
There are still some details to be cleaned up, but I'm confident
everyone will be impressed at the reasonable scope of this
document.
VP-TC
Dave Dodell did not provide a report.
FIDOCON LIAISON
Tim Sullivan's report was summarized above.
PROBLEMS
As can be seen from the above, the extra burdens and lures of the
encroaching summertime have cut into the remaining time available
for FidoNet. This demonstrates that there are plenty of
opportunities for others to get involved and take on some of the
load. In fact, I would really like to call for a maximum limit
on the number of "hats" an individual can wear, due to the
difficulty so many have trying to meet the many other requirments
of life and sysoping.
PROGNOSIS FOR NEXT PERIOD
We are really looking forward to some of the various projects
currently underway coming to fruition.
And of course, FIDOCON should be a marvelous opportunity for us
to get together and continue the new understanding and desire to
work towards solutions that seems to have started to take hold
throughout the Net.
-----------------------------------------------------------------
FidoNews 5-24 Page 48 13 Jun 1988
OFFICERS OF THE INTERNATIONAL FIDONET ASSOCIATION
Ken Kaplan 100/22 Chairman of the Board
Don Daniels 107/210 President
Mark Grennan 147/1 Vice President
Dave Dodell 114/15 Vice President - Technical Coordinator
Tom Marshall 107/524 Secretary
Leonard Mednick 12/1 Treasurer
IFNA BOARD OF DIRECTORS
DIVISION AT-LARGE
10 Steve Jordan 102/2871 Don Daniels 107/210
11 Bill Allbritten 11/301 Hal DuPrie 101/106
12 Leonard Mednick 12/1 Mark Grennan 147/1
13 Rick Siegel 107/27 Brad Hicks 100/523
14 Ken Kaplan 100/22 Ted Polczyinski 154/5
15 Jim Cannell 128/13 Kurt Reisler 109/74
16 Vince Perriello 141/491 Robert Rudolph 261/628
17 Rob Barker 138/34 Greg Small 148/122
18 Christopher Baker 135/14 Bob Swift 140/24
19 Vernon Six 19/0 Larry Wall 15/18
2 Henk Wevers 2:500/1 Gee Wong 107/312
-----------------------------------------------------------------
FidoNews 5-24 Page 49 13 Jun 1988
FidoCon '88 - Cincinnati, Ohio
At The Drawbridge Inn and Convention Center
August 25-28, 1988
Attendee Registration Form
Name: ____________________________________________________
Address: ____________________________________________________
Address: ____________________________________________________
City: _______________________ State: ____ Zip: ___________
Country: ____________________________________________________
Phone Numbers:
Day: ____________________________________________________
Evening: ____________________________________________________
Data: ____________________________________________________
Zone:Net/
Node.Point: _______________________________________________
Your BBS Name: _______________________________________________
BBS Software: _____________________ Mailer: _________________
Modem Brand: _____________________ Speed: _________________
What Hotel will you be Staying at: ____________________________
Do you want to share a room? ______
Are you a non-smoker? ______
Do you want an in room point? ______
(Tower rooms at Drawbridge only)
Do you need special accommodations? ______
(If so, please explain) ____________________________
____________________________
FidoNews 5-24 Page 50 13 Jun 1988
Are you a non-Sysop? ______
Are you an IFNA Member? ______
If so, will you be attending the
Sunday IFNA brunch/BoD meeting? ______
Additional Guests: ______
(not attending conferences)
Comments: ____________________________________________________
____________________________________________________
____________________________________________________
Costs How Many? Cost
--------------------------- -------- -------
Conference fee $60..................... ________ _______
($75.00 after 7/31)
Thursday Lunch $10.95 .............. ________ _______
Thursday Dinner $18.95 .............. ________ _______
Friday Lunch $10.95 .............. ________ _______
Friday Banquet $24.95 .............. ________ _______
Saturday Lunch $10.95 .............. ________ _______
======== =======
Totals ................................ ________ _______
You may pay by Check, Money Order or Visa/MC
Please send no cash. All monies must be in U.S. Funds.
Checks should be made out to: "FidoCon '88"
This form should be completed and mailed to:
FidoCon '88 Registration
P.O. Box 9294
Cincinnati, OH 45209
If you pay by Credit Card you may also register by Netmailing
this completed form to 108/62 or 1/88 for processing. Please
complete the information below and be sure to include a voice
phone number above so that we can contact you for Credit Card
FidoNews 5-24 Page 51 13 Jun 1988
verification. Rename this file ZNNNXXXX.REG where Z is your Zone
number, N is your Net number, and X is your Node number.
[ ] Visa [ ] MasterCard
Name as it appears
on credit card: ___________________________________________
Credit Card Number: ___________________________________________
Expiration Date: ___________________________________________
Signature: ___________________________________________
(If you mail in registration)
-----------------------------------------------------------------
FidoNews 5-24 Page 52 13 Jun 1988
INTERNATIONAL FIDONET ASSOCIATION
ORDER FORM
Publications
The IFNA publications can be obtained by downloading from Fido
1:1/10 or other FidoNet compatible systems, or by purchasing
them directly from IFNA. We ask that all our IFNA Committee
Chairmen provide us with the latest versions of each
publication, but we can make no written guarantees.
Hardcopy prices as of October 1, 1986
IFNA Fido BBS listing $15.00 _____
IFNA Administrative Policy DOCs $10.00 _____
IFNA FidoNet Standards Committee DOCs $10.00 _____
SUBTOTAL _____
IFNA Member ONLY Special Offers
System Enhancement Associates SEAdog $60.00 _____
SEAdog price as of March 1, 1987
ONLY 1 copy SEAdog per IFNA Member
Fido Software's Fido/FidoNet $100.00 _____
Fido/FidoNet price as of November 1, 1987
ONLY 1 copy Fido/FidoNet per IFNA Member
International orders include $10.00 for
surface shipping or $20.00 for air shipping _____
SUBTOTAL _____
HI. Residents add 4.0 % Sales tax _____
TOTAL _____
SEND CHECK OR MONEY ORDER IN US FUNDS:
International FidoNet Association
c/o Leonard Mednick, MBA, CPA
700 Bishop Street, #1014
Honolulu, HI. 96813-4112
USA
Name________________________________
Zone:Net/Node____:____/____
Company_____________________________
Address_____________________________
City____________________ State____________ Zip_____
Voice Phone_________________________
Signature___________________________
-----------------------------------------------------------------