Dr. Longman`s News #03 |
|
Fido - the charter of an international network of Fido Net.
■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ Translation: Timur Tsyganko 2:461 / 1910 @ fidonet Charter FidoNet Version 6.4 May 5, 1989 This statute applies to discuss the structure of focal points (see Section 8), and has not yet entered into force. 1. Overview This document establishes the policy for sysops who are Members of the electronic "mailbox" (BBS) FidoNet. FidoNet network is determined by the NodeList (List nodes) published weekly by the International Coordinator (International Coordinator). Own charters may be issued at the zone level, region or network, discussed in more detail the local procedures. Usually, these statutes a lower level can not contradict this document. However, with the consent of the International Co-ordinator, a local policy document may reflect the differences that necessary because of local conditions. These local ordinances may not impose additional restrictions on members of FidoNet, but included in this document, except for strengthening local mail periods. 1.0 Language The official language of FidoNet - English. All documents must published in English. Encouraged to transfer to other languages. 1.1 Introduction FidoNet - is an amateur electronic mail system. So Thus, all the participants and the operators are working voluntarily and free. Combining the first of a few friends, exchanging Messaging (1984), now it includes more than 5000 systems six continents (1989). FidoNet is so high that could easily fall apart from the its own weight unless supported by some structure and control. This structure provides a multi-homed principle. Management provides a decentralized management system. This document describes the procedures developed for network management. 1.2 Organization FidoNet systems are grouped on several levels, and decentralized administration, respectively. This review provides an overview of the structure, as coordinator of various levels are provided later in this document. 1.2.1 Individual and system operators (SysOp'y) The smallest structural unit of FidoNet are individual systems, corresponding to a single item NodeList. SysOp formulates the principles of the system and the relationship with users. SysOp should be associated with the rest of the system FidoNet to send and receive mail, and a local charter should be coordinated with other levels of FidoNet. 1.2.1.1 Members SysOp'y responsible for all actions of users when they affect the rest of FidoNet. (If the user is not correct, SysOp is not valid.) Any traffic entering the FidoNet after a certain Node (node) if not coming from Sysop, considered to come from the user and thus SysOp responsible for it. (See section 2.1.3.) 1.2.1.2 Point'y Point - is compatible with the FidoNet system, which is not included in NodeList, but communicates with via FidoNet node, which for BossNode'om system (master node). Point in general is regarded as a user, for example, BossNode responsible for correspondence from Point'a. (See section 2.1.3.) Point addressed using the address on BossNode'a NodeList'u, for example, Point-system BossNode'om 114/15 may be known as 114/15.12. Correspondence intended for Point'a, sent BossNode'u, which then sends it Point'u. Supporting Point'y, BossNode uses a private network number, which should not be seen outside the context of BossNode-Point. Unfortunately, if the Point calls another system directly (for example, to file requests), a personal network number appears as a address of the caller. In this sense, Point'y differ from users, as they work with are compatible with FidoNet Mailer'ami able to communicate with systems other than BossNode'a. 1.2.3 Networks and Network Coordinator Network (Network) - an association of units of local geographic area, usually defined by the region with a convenient telephone service to each other. Network coordinate their correspondence in order to reduce costs. Network Coordinator (Network Coordinator) is responsible for maintaining the list of network nodes, as well as forwarding Netmail (network correspondence) sent by members network from other nodes FidoNet. Network Coordinator can handle coming out Netmail, but is not obligated to do so. Network Coordinator shall be appointed Regional Coordinator (Regional Coordinator). 1.2.3.1 Post buffers network (Network Routing Hubs). Routing Network Splitters exist only in some networks. They may be appointed Network Coordinator to help in managing a large network. His specific duties and procedures established by agreement between the Network Coordinator and splitters, and are not discussed in this document, except that the coordinator can not delegate responsibility mediated in the conflict. 1.2.4 Regions and Regional Coordinators Region (Region) - a defined geographic area includes sites that may be combined or not combined into a network. Typical region contains many sites, networked, and some independent sites that are not part of any network. Regional Coordinator (Regional Coordinator) maintains a list of independent nodes in the region and takes nodelists from Network Coordinators in the region. These lists are merged into a regional NodeList, which is then sent to the Zone Coordinator (Zone Coordinator). Regional Coordinator does not serve the forwarding of messages any node in the region. Regional coordinators are appointed by the Coordinator of the Zone. 1.2.5 Zones and Zone Coordinator Zone (Zone) - a large geographic area that includes many regions, and encompassing one or more countries and / or continents. Zone Coordinator (Zone Coordinator) combines nodelists from all regions of the zone, and creates the master file and the current NodeList changes, which are then distributed on FidoNet in the area. Zone Coordinator does not serve the forwarding of messages any node in the region. Zone Coordinators selected by the Regional Coordinators of the zone. 1.2.6 Zone Coordinator Council In some cases, Zone Coordinators work as a council under International coordinator. Their relationship is similar to the relations between the president and his advisers. In particular, this council examines the relationship between the zones. These issues included clarification of details in the release NodeList'a, mediation interzonal conflicts and other issues were not resolved at lower levels of FidoNet. 1.2.7 International Co-ordinator (International Coordinator). International Coordinator - is the "first among equals" Zone Coordinator, who coordinates the joint issue of the Main Zone Coordinators NodeList'a. International Coordinator acts as Chairman of the Board Zone Coordinator and as chairman of the Electoral Commission in the election - he announced the referendum, collects and counts the ballots and announce the result of voting on matters regarding FidoNet as a whole. The international coordinator is elected Zone Coordinators. 1.2.8 Submissions from the top down. Checks and balances. These levels are to distribute the control on FidoNet lowest possible level, while allowing to perform a coordinated activity system-wide electronic "Mail." Management becomes possible as a result of the subordination of the lower level of the upper. This means that the officer at this level is accountable to the level which is above him, and is responsible for the levels below it. For example, the Regional Coordinator is responsible to the Zone Coordinator for everything that happens in the region. From the perspective of the Zone Coordinator, Regional Coordinator fulfills for conflict-free activities in the region. Similarly, in terms of the Regional Coordinator, Network Coordinator is fully responsible for conflict-free operation in its network. If a public official at any level above the Sysop can not well to perform their duties, an official at the top level can replace him. For example, if The Regional Coordinator does not perform its duties, the Coordinator of the Zone can replace it. To provide checks and balances at the highest level FidoNet, of the rules of the organization from top to bottom, there are two exceptions. Zone Coordinators and the International Coordinator shall be elected majority of coordinators at lower levels. Similarly, decisions made by the International Coordinator may be revoked by the Board of the Zone Coordinator and the decisions taken Zone Coordinators can be lifted regional coordinators. More details are described in sections 6 and 7. Decisions taken by the coordinators of the other levels can not be revoked by voting at the lower levels, but may be appealed. This process is described in section 9.5. 1.3 Definitions 1.3.1 FidoNews FidoNews - a weekly newsletter distributed on the network in electronic form. This is an important means of communication between Sysops FidoNet. FidoNews allows you to feel part of a community of people with common interests. Thus, encourages user participation and the release of sysops FidoNews. Correspondence sent to the address of the node 1:1 / 1; file describing the format used can be obtained from 1:1 / 1 and many other systems. 1.3.2 Geography Each level of FidoNet geographically contained in a level, located directly above it. Defined geographical point is covered by one area and one region of the zone, and or part of one of the networks either do not fit into any. If the node is in the network area, it must be invoked to list of nodes of the network, rather than as an independent in the region. (The primary exception to this rule - the node that receives a disproportionate number of "mail" sent to the address Host (cartridge), see Section 4.2). Edge of the network based on telephone regions, designated by the local telephone companies. Even in areas where the density of nodes so high that the maintenance of the telephone in the region requires more than one network, the geographical principle is decisive on the question of what nodes belong to a network belong. Membership is determined based on geographic or other purely technical factors. It is not based on personal or social factors. In some cases, the border regions of the telephone lead to situations where logic dictates that a site that is in one region of FidoNet, should be assigned to another. In these cases, with the consent of the Coordinators of Regions and the Zone Coordinator interested in this matter, may be approved exemption from membership in the region. Such procedures are described in section 5.6. 1.3.3 Zone Mail Hour ("Zip" Hour of the Zone) Zone Mail Hour (ZMH) - a set time during which all nodes in the zone should be able to Netmail. Each zone FidoNet determines ZMH and tells time ZMH its rest areas FidoNet. See sections 2.1.8 and 10.2. Zone Mail Hour formerly known as National Mail Hour and Network Mail Hour. The term Zone Mail Hour is more accurate. 1.3.4 NodeList NodeList - a weekly update file that contains the addresses all recognized sites FidoNet. This file should be prepared by the Zone Coordinator no later than ZMH in every Saturday, and available for download or file request without charge. System to be included in the NodeList, it must meet the requirements defined in this document. ikakie other requirements may not be nominated. Partial nodelists (for one zone, for example) can be prepared at various levels of FidoNet. Full list published by International Coordinator, is the official nodelist FidoNet, and is used in circumstances such as the definition of the right to vote. All components of the full NodeList'a available in each system for each Zone Coordinator and Regional Coordinator. 1.3.5 Excessive misconduct This statute makes reference to "excessively annoying behavior, particularly in Section 9 (Conflict Resolution). This term is difficult to define because it is based on the views of the structure of the coordinators. In general terms, incorrect behavior annoys, disturbs or harms someone else. Not necessarily break the rules, to behave properly in relation to others. There is a difference between excessively annoying behavior and just annoying behavior. For example, each new SysOp must receive a minimum of knowledge in both technical issues (software installation), and in social (how to talk to FidoNet). Rare sysop can not behave properly. Only after This behavior continues after it was pointed Sysop, it becomes extremely annoying. This does not mean that you behave properly only after repeated any action (such as deliberate falsification Correspondence flawed from the very first attempt), but shows that some tolerance should be shown. For more information on this subject, see Section 9, and illustrative examples (Section 10.3). 1.3.6 Commercial Use FidoNet is an amateur network. Participants spend their own money and time that she worked for of all its users. It is not intended to certain commercial enterprises to take these voluntary efforts in their own business interests. C On the other hand, FidoNet provides companies and users convenient and efficient means for mutually beneficial exchange of information. Network Coordinators may be forced to subsidize the commercial operations and forwarding to the Netmail Host, and may even be involved in a lawsuit if the transmittal of correspondence it was suggested some kind of reward. Thus, the policy FidoNet is that the commercial correspondence should not be sent. "Commercial correspondence" includes correspondence, pursuing specific business interests, without contributing to the network as a whole. Examples include internal correspondence of companies, the correspondence between corporations, the specific demands of the product (eg, price lists), purchase orders, etc., as well as all other areas related to business activity. 2 Procedures Sysop 2.1 General 2.1.1 Main How SysOp individual uzlaa, in general, you can do want if you follow the rules of correspondence, does not behave too ill to other sites and FidoNet help or not in the software distribution software in violation of the rights to: copy, and do not perform other illicit activities through the FidoNet. 2.1.2 Introduction to the Charter In order to understand the meaning of "misconduct", all SysOp'y required from time to time to reread Charter FidoNet. New SysOp'y should familiarize themselves with the Charter to how to ask for her number uzla. 2.1.3 The responsibility for traffic entering through a FidoNet node SysOp, whose address is given in paragraph NodeList'a, is responsible for traffic entering FidoNet via its system. This includes (but is not limited to) traffic, input from users Point'ov, and any other networks, which the system can serve as a gateway. If SysOp allows "External" message is part of FidoNet through the system, gateway system must be clearly identified by the number uzla in FidoNet as the starting point of the message, and should act as a gateway and in the opposite direction. If such traffic leads to disruption Charter, SysOp must rectify this situation. 2.1.4 Coding and Image correspondence FidoNet is an amateur system. Our technology is such that the privacy of messages can not be guaranteed. As SysOp, you are entitled to see the traffic flowing through your system, though to be sure that system is not used for illegal or commercial purposes. Obviously, the coding makes it impossible to view mended. Thus, coded and / or commercial traffic that is sent without the permission of all the links in the system forward, admits molesting behavior. Definition of commercial traffic is given in Section 1.3.6. 2.1.5 Changes to the forwarded e-mail You may not modify, except those necessary for shipment or other technical purposes, in any message Netmail or Echomail (echo correspondence) passing through system from one uzla FidoNet to another. If you are offended content of the message should be performed procedure described in Section 2.1.7. 2.1.6 Private Netmail The word "private" should be used with great caution, particularly speaking about the users BBS. In some countries there are laws about "private correspondence", and should make clear that the word "private" does not mean that no one else, except the recipient can read the messages. SysOp, which can not establish this distinction should not offer users such service as "private correspondence". If a user sends a "private communication", the user can not control the amount of the mediation system, through which the message is sent. SysOp, sending a message to another sysop, can control this aspect by sending a message directly into the recipient, and thus way can be sure that only the recipient or any other person who has permission to Sysop may read this message. Therefore, Sysop and regular user may have different notions of "privacy". 2.1.6.1 Disclosure of correspondence passing Disclosure or use of any form of information contained in the private network traffic, not targeting you or not written by you, is annoying behavior when traffic had not been distributed by the author or the recipient as part of a formal complaint in accordance with the Charter. This does not apply to Echomail, which by definition is a means of broadcasting and where the private correspondence often used to limit access only to sysops. 2.1.6.2 Personal correspondence addressed to you The question of private mail addressed to you, is more complex than the question of passing the correspondence, described in the previous section. It is generally accepted that when you get a message, it becomes your property and you are legally entitled to do with it what you want. However, your legal right does not excuse you if you behave properly towards others. In general, the materials are sensitive about the properties should not be sent to FidoNet. This principle is not always observed, as FidoNet is our primary means of communication. If the sender of the message separately indicates in the message that the content must remain confidential, the proliferation of communications for public comment may be incorrect. There can be exceptions. If someone says one thing publicly and the opposite in private correspondence, the recipient of private correspondence should not be condemned just because the sender insists that the message did not apply. In this issue should be guided by common sense, as As in other aspects of behavior in FidoNet. 2.1.7 Dispatch You are not required to forward traffic if you do not agree to do so. You are not required to forward traffic to all, making it for someone, if you have not served on a Network Coordinator Coordinator or splitter. Shipping traffic through a node not obliged to forward, without the permission of the uzla, can be regarded as misconduct. This includes a unsolicited Echomail. If you do not forward the message, after agreeing to perform such forwarding, the message should be returned Sysop uzla from which it came into FidoNet, with an explanation why it was not forwarded. (You do not have to return messages, addressed to the node that is not part of the current NodeList.) Deliberate delay in passing messages without performing the described procedure is incorrect behavior. In case of failure in forwarding traffic because of technical problems, it is not considered incorrect behavior, if not continued after It was stated sysop. 2.1.8 Exclusivity Zone Mail Hour Zone Mail Hour - is the heart of FidoNet, because this time, Netmail when sent between systems. Any system that wants to be a part of FidoNet, should be able to receive correspondence at this time, using the protocol defined in the current publication of the Committee FidoNet Technical Standards (FTS-0001 during the preparation of this document). Allowed to have more opportunities (for example, to support additional protocols or extended "post" hours) but the minimum requirement - the possibility of FTS-0001 during this one hour a day. This time is reserved exclusively for Netmail. Many telephone systems require a fee for each call, regardless on the established link was not installed, or the line was busy. Proceeding from this, any activity other than normal processing Netmail, which occupies the system during ZMH, is incorrect behavior. Echomail not be transferred during ZMH. User access (BBS) to the system is prohibited in time ZMH. The system, which is a member of the local network may be made requirements to comply with additional "post" hours, defined by the Coordinator of the Network. Restrictions on access during local network periods established at the discretion of the Coordinator of the Network. 2.1.9 Private Sites A rare exception in the implementation of ZMH are private nodes. The person requesting the private sites where possible, should be maintained as Point'y. Depositing private uzla the list is justified when the system needs to interact with many others, such as dispenser Echomail. In these cases, the exact time and mode of transmission of correspondence is established by agreement between the private node and other systems. Such agreement between the private system, and postal buffer does not oblige him to make any change. Private node must be part of the network (they can not be independent in the region). Depositing private site on the list affects the interests of each member of FidoNet, as it takes place in NodeList'e each. Depositing private site on the list that is convenient for one SysOp'a (Due to all the other sysops FidoNet) - a luxury that can no longer be tolerated. An entry in an optional extra lists (more than one list on a phone number, except allowed standards FTSC) also fall into this category. SysOp'y requesting entry into private or extra lists must justify them in a statement, explaining how it can be useful for the local network or FidoNet as a whole. Network Coordinator or Regional Coordinator may review this application at any time, and unnecessary to make the lists will be eliminated. 02/01/1910 Compliance "post" procedures Failure of the "post" procedures is basis for excluding any uzla of FidoNet without notice (since prevention is usually transmitted from Netmail). 02/01/1911 Use of this NodeList'a Network "postal" system usually work without supervision, and make calls at night. If the system tries to call incorrect or outdated number, it can lead to the fact that early in the morning from someone at some apartment The phone rang, much to the displeasure of those present and civil authorities. For this reason, SysOp, sending mail, required to receive and use the most recent edition NodeList'a, which is almost there. 01/02/1912 excommunication Exclusion of the network is called excommunication (ie, system denied communication). If you find that you refused to communicate without warning, it means that your coordinator is not able to contact you. You must decide problem and contact your coordinator. Systems may also be excluded from NodeList'a for any another reason. See section 9 and sections 4.3 and 5.2. Help system, which was denied Communion in encircled the exclusion of NodeList'a, is incorrect behavior. For example, if you decide to transfer echomail his friend who was denied communion, it is very likely that you also will be excluded from the list. 02/01/1913 Time Zone Mail Hour The exact time of Zone Mail Hour is set for each zone Coordinator of the Zone. See Section 10.2. 02/01/1914 Failure to summer time FidoNet does not observe daylight savings time. In areas where daylight saving time is observed, "postal" FidoNet schedule should be adjusted in a clockwise direction. Or, you can leave your system on standard time. ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ Whew! And ahead of four other such tekstuhi! Be brave friends ... No comments did not give all the considerations will be teleconference. See you soon! Sincerly yours: Dr. Longman E-Mail: DrLongman@ics.msk.ru
Other articles:
Entry - the contents of rooms. |
Fido - the charter of an international network of Fido Net. |
Similar articles:
В этот день... 24 November