Volume 4, Number 12                                 30 March 1987
    +---------------------------------------------------------------+
    |                                                  _            |
    |                                                 /  \          |
    |                                                /|oo \         |
    |        - FidoNews -                           (_|  /_)        |
    |                                                _`@/_ \    _   |
    |        International                          |     | \   \\  |
    |     FidoNet Association                       | (*) |  \   )) |
    |         Newsletter               ______       |__U__| /  \//  |
    |                                 / FIDO \       _//|| _\   /   |
    |                                (________)     (_/(_|(____/    |
    |                                                     (jm)      |
    +---------------------------------------------------------------+
    Editor in Chief:                                   Thom Henderson
    Chief Procrastinator Emeritus:                       Tom Jennings

    FidoNews is the official newsletter of the International  FidoNet
    Association,  and is published weekly by SEAdog Leader, node 1/1.
    You  are  encouraged  to  submit  articles  for  publication   in
    FidoNews.  Article submission standards are contained in the file
    ARTSPEC.DOC,  available from  node  1/1.

    Copyright (C) 1987,  by the  International  FidoNet  Association.
    All  rights  reserved.  Duplication and/or distribution permitted
    for noncommercial purposes only.  For use in other circumstances,
    please contact IFNA.




                            Table of Contents

    1. EDITORIAL
       Thanks from TJ
    2. ARTICLES
       Allied Health Teleconference Network
       Proposed Bylaws for the Intergalactic Sysop Alliance
       PROPOSAL: Another Addressing Scheme for FIDONET
       Satellite Fido - Update
       Announcing a New Mensa Echo!
    3. COLUMNS
       Column Without a Name
       A Discussion on ASSEMBLER Language
    4. NOTICES
       The Interrupt Stack
       Packet Switching Networks




    Fidonews                     Page 2                   30 Mar 1987


    =================================================================
                                EDITORIAL
    =================================================================

    Tom Jennings
    0/0

            This is a long overdue letter of  thanks  to  the  people
    who've nominated me for the Andy Fleugelman award.  My long delay
    in writing this probably comes across as rude,  and  for  that  I
    apologize. I really do appreciate the nomination.

            The  timing  is pleasantly odd;  I'm suffering from plain
    old programmer burnout,  plus making major decisions as to what I
    want to do with myself,  etc not related to anything Fido.  Also,
    physical things like no computer (due to major  construction  for
    the  last  few  months  - we stopped last week) makes it tougher.
    Computers have lost all their fun for me,  so  it's  time  for  a
    *long*  break.  (skateboarding  is  much  more  interesting,  and
    everyone says it's foolish and a  waste  of  time,  enhancing  my
    enjoyment  that  much more.) It's nice to get this at a time when
    things are becoming un-fun.

            Rumor  killing  information:  v12  is  not  dead,  merely
    excruciatingly  late.  It  will be ready this summer (I think I'm
    nearly a YEAR late at this point ...),  the software  is  working
    fairly  well,  I'm  finishing  some  stuff in the Fido area,  the
    FidoNet stuff working fairly well.  I'm backing  out  some  major
    features for a future minor rev,  in the interests of getting out
    a reliable program that meets all needs.  Unlimited nodes  (32767
    cubed) much faster, etc.  Manual is coming out nice. Details at a
    later date.

            When it's nearly ready,  I'll announce to Fido Software's
    customers  by mail,  and IFNA members via this,  of what the full
    story is, with all the details.

            Anyways,  things have obviously changed a  lot  in  three
    years, the net is nearly unrecognizable to me (not a complaint!),
    and I'm glad to see things are changing and growing. One of these
    days  I'll  run  another  Fido/FidoNet in the net,  but not for a
    while ...

            And once again thanks to everyone for the nomination, and
    to everyone else who makes the net run smoothly!


                            Tom Jennings
                            San Francisco
                            20 Mar 87

    -----------------------------------------------------------------

    Fidonews                     Page 3                   30 Mar 1987


    =================================================================
                                ARTICLES
    =================================================================

    Bill Hliwa, Sysop
    The Med Tech FIDO (260/10)
    State University of New York at Buffalo


                 The Allied Health Teleconference Network
                 ========================================

         The Allied Health Teleconference Network (AHTN)  is  in  the
    planning  phase and participants are now being sought.  This will
    be a specialized EchoMail conference  covering  topics  including
    but not limited to:

              Medical Technology (Laboratory Science)
              Physical Therapy
              Exercise Science
              Occupational Therapy
              Health Education
              Biomedical Engineering

         We would like to see as many participants as possible "state
    side", but are also very interested in locating practitioners and
    educators in other parts of the world.  External funding is being
    secured for  this three  year study,  so that we plan to POLL all
    participants for their mail (anywhere in the world!).

         Discussions will be moderated and  we  hope  to  arrange for
    "guest speakers" who will answer user's questions and add insight
    to current topics.

         o    Is your  board  based  in  a  clinical health
              setting?

         o    Is your board at a university or college with
              a school of Allied Health or  programs in any
              of the above disciplines?

         o    Do  you  have  users  with  backgrounds in an
              Allied Health field?

         o    Do you know of a local university, college or
              hospital   that   might   be   interested  in
              participating through your board?

         If you can answer  `yes' to  any of  these questions, please
    contact me,  Bill Hliwa,  at The  Med Tech  FIDO (260/10) or land
    mail at:

              William R. Hliwa, Jr., Cl. Asst. Prof.
              State University of New York at Buffalo
              Dept. of Medical Technology, AA107
              462 Grider Street
    Fidonews                     Page 4                   30 Mar 1987


              Buffalo, NY  14215
              USA

    -----------------------------------------------------------------

    Fidonews                     Page 5                   30 Mar 1987


                            PROPOSED BYLAWS
                                for the
                      INTERGALACTIC SYSOP ALLIANCE


    This document contains the proposed bylaws of an organization  to
    be known as the Intergalactic Sysop Alliance,  herein referred to
    as ISA.

     1. ISA shall exist solely to serve the Knights of ISA,  and such
        others as the Knights shall desire served.

     2. The following orders of Knights are established:

        A. The  Order  of  the  Golden  Dawn.   To  be  eligible,  an
           applicant must be the system operator in good standing  of
           a  PUBLIC  ACCESS  node,  and  must  have  paid any tithes
           required.  A Knight of the Order of  the  Golden  Dawn  is
           entitled to one vote.

        B. The  Order  of  Mercantile  Grammarie.  Any  entity  which
           profits by the existence or operation of the Intergalactic
           Sysop Alliance shall be eligible  to  join  the  Order  of
           Mercantile  Grammarie  by  paying the required tithes.  If
           said entity would otherwise be eligible for the  Order  of
           the Golden Dawn, then it shall be entitled to one vote.

        C. The Order of the Rose and Cross.  The Council of Lords may
           award membership in the Order of the Rose and Cross to any
           being which they feel worthy.  Knights of the Order of the
           Rose and Cross are exempt from paying tithes,  but are not
           permitted to vote.

        D. The Order of  the  Garter.  Any  being  wishing  to  be  a
           Knight,  but not qualifying for any other order,  may join
           the ranks of the Order of  the  Garter  by  submitting  an
           appropriate  contribution  to the Keeper of the Exchequer.
           A Knight of the Order of the Garter  is  not  entitled  to
           vote.

     3. Applications for knighthood shall be submitted to the Mundane
        Interface.  The  Mundane  Interface  shall  have the power to
        grant knighthood to all qualified applicants.

     4. The Council of Lords shall have the power to strip any knight
        of his knighthood if his character, reputation or conduct are
        such that he is deemed unsuitable to exercise the powers  and
        perogatives of knighthood.

     5. Tithes  shall be set by the Council of Lords,  and be payable
        in advance. For members outside the United States territorial
        zone of the planet Earth,  the Council of Lords shall  assess
        such additional costs as may be required.

     6. The  Mundane Interface shall notify all Knights of any tithes
        required to keep their peerage  not  less  than  thirty  days
    Fidonews                     Page 6                   30 Mar 1987


        prior  to  the  date the tithes are required.  Any Knight who
        submits his tithe within thirty days of  the  deadline  shall
        not be regarded as having lapsed.

     7. No  entity  shall  be a Lord of the Network or hold any other
        position within the Intergalactic Sysop Alliance unless  they
        qualify under all applicable statutes.

     8. The  Council  of Lords shall be five in number,  and shall be
        elected annually by the Knights.  Each Knight  may  cast  one
        vote, consisting of five choices for Council of Lords.

     9. The  Council  of  Lords  shall be elected by ballot cast at a
        time selected by the previous Council  of  Lords,  save  that
        they  may  not  wait  longer  than  eighteen  months  between
        ballots.

    10. The  Mundane  Interface  shall  notify  the  Knights  of   an
        impending ballot not less than three months before the ballot
        is scheduled to take place.  The Mundane Interface shall also
        take  nominations for Council of Lords up to one month before
        the ballot.  Any Knight may be  nominated  for  Lord  of  the
        Network  by  submitting  a  petition  endorsed  by  ten other
        Knights.

    11. The Mundane Interface shall close nominations  and  post  the
        list of candidates one month before the scheduled ballot.  If
        less than six Knights are nominated for the Council of Lords,
        then  the  Mundane  Interface  shall  consider  them  elected
        without a formal ballot.

    12. The Mundane Interface shall arrange for the counting  of  all
        votes received, and shall post the result.  Votes received by
        the  Mundane Interface after the close of balloting shall not
        be counted.

    13. At the first meeting of the Council of Lords each  year  they
        shall  elect  one  of  their  number to be the Emperor of the
        Network,  who will preside over all meetings of the Peers  of
        the Realm.  They shall also appoint the following officers:

        A. The Whipping Boy
        B. The Chief Executioner
        C. The Grand Wizard
        D. The Mundane Interface
        E. The Keeper of the Excequer

    14. The Council of Lords shall meet when and as they please,  and
        shall conduct their business as they see fit.

    15. A majority of the Council of Lords shall constitute a  quorum
        at any meeting.

    16. Questions  of order and procedure not otherwise determined by
        these By-Laws or by the parties involved shall be settled  by
        private duel, or by Trial by Combat.
    Fidonews                     Page 7                   30 Mar 1987


    17. The  Whipping  Boy  shall,  subject  to  instruction from the
        Council of  Lords  and  with  the  assistance  of  the  Chief
        Executioner,  represent  ISA  in  its  relationships with the
        public and the various governments, governmental agencies and
        officials with which ISA may be concerned and  shall  be  the
        official  spokesperson of ISA in regard to all matters of ISA
        policy.

    18. In the absence or disability of the Whipping Boy,  the  Chief
        Executioner shall assume the duties of the Whipping Boy.

    19. The Mundane Interface shall:
        A. Be responsible for the maintenance of the corporate status
           of ISA and the filing  of  all  reports  and  certificates
           which may be required of ISA under the corporation laws of
           the State of Missouri.
        B. Maintain the corporate membership and  voting  records  of
           ISA.
        C. Perform  other  duties as described in applicable By-Laws,
           of which there are plenty to keep any mortal occupied.

    20. The Keeper of the Exchequer shall:

        A. Be  the  recipient  of all monies of ISA and shall deposit
           the same in the  name  of  ISA  in  a  depository  of  his
           choosing.
        B. Sign  checks  drawn  by  the  Whipping  Boy  in payment of
           obligations known by him to be proper and authorized.
        C. Post an annual finance report in FidoNews.

    21. The Grand Wizard shall:
        A. Be responsible for maintenance of the master NODELIST, and
           the distribution of the weekly update file thereof.
        B. Ensure  the  smooth  operation  of  the  ISA  NETWORK   as
           prescribed by the Council of Lords.

    22. There shall be an official publication maintained by ISA,  in
        the form of a weekly journal,  the name  of  which  shall  be
        FidoNews. A copy of this journal shall be available each week
        to  every Knight in good standing.  The general management of
        this journal shall be in the hands of  the  Lord  Chancellor.
        The  policy of the journal shall be determined by the Council
        of Lords.

    23. These bylaws may be amended by a majority of the Knights  who
        are empowered to weild a vote.

    24. Without changing their import, the Mundane Interface may from
        time  to  time,  on notice to the Council of Lords,  renumber
        these By-Laws so as to serve the purpose of ready  reference.
        References  in  these By-Laws to Articles shall be corrected,
        when necessary,  by the Mundane Interface to conform  to  the
        renumbered Articles.

    -----------------------------------------------------------------

    Fidonews                     Page 8                   30 Mar 1987


    Steve Butler
    SEAdog/OPUS 138/0

                                PROPOSAL:
                  Another Addressing Scheme for FIDONET


    FidoNet has grown tremendously in the three  years  that  I  have
    been  a  FIDO  sysop.  If  the  recent growth in REGION 17 is any
    indication, the growth spurt isn't over yet.

    With growth comes increased traffic which tends to  plug  up  the
    mail  hour.  The  next 10,000 nodes will certainly change the way
    we move messages through FidoNet.  In fact,  it should change the
    addressing  scheme  in like manner as the last 1000 nodes took us
    to a two layer address.

    There is effort underway to patch the current  scheme  with  ZONE
    gating and POINT mapping.  The mechanism should work, but it is a
    bandage  put  onto  an  existing  structure in an effort to allow
    current software to coexist.  The current methods  for  extending
    the  addressing scheme depend on two added pieces of information:
    1) ZONE,  and 2) POINT;  but these should become an integral part
    of the address.  Even so,  the two additions do not go far enough
    to solve some current or future problems.

    Since there are major programming efforts underway for nearly all
    the FidoNet software,  now is the time to  discuss  alternatives.
    This  should  be  done before any development group has committed
    themselves to a particular scheme.  This proposal is presented as
    a basis for such a discussion.  The ultimate  implementation  may
    take  several  years;  but having an identifiable long range goal
    that all authors are working toward will be much better than  the
    current  method  of patching the system when necessary to make it
    function for the next iteration.

    A multilayered network is needed with an addressing  scheme  that
    is  extendable on both ends.  In addition,  every level could act
    similar to today's HOST and HUB  designations  and  take  several
    features  of  the  proposed ZONE and POINT scheme.  This proposed
    scheme will use the  current  terms  including  ZONE  and  POINT.
    Please  look  beyond  the  current meanings and attempt to find a
    homogenous application for every term  and  substitute  your  own
    verbiage for those at variance with your usage.


    FUNCTIONAL PARTS

    The functional parts of this new addressing scheme are:

           term         value

         DIVISION       0-255
         ZONE           0-255
         NET            0-255
         HUB            0-255
    Fidonews                     Page 9                   30 Mar 1987


         NODE           0-255
         POINT          0-255

    This  gives  a  255 fan out factor at each level which may be too
    big!  When was  the  last  time  you  attempted  to  contact  255
    different nodes in one night?

    The  ZONE  could  become synonymous with our current REGION.  The
    DIVISION could initially be identified with  the  7  geographical
    continents;  there  could  be  lots of expansion at the top!  The
    current NODE (2 bytes) could be split to identify HUB and NODE.

    EXAMPLE:  Assume that REGION 17 becomes ZONE 17 in DIVISION 1,
              my address of 138/0  would be  1\17:138/0'0.0

    A shorthand method of entry  (similar  to  today's  NET  default)
    could  be  devised based on the unique delimiters.  Thereby other
    nodes in DIVISION 1,  ZONE 17 could address 138/ (or either  :138
    or  :138/).  The  software could default the left side to that of
    the current system and default the right side to zero.  In  fact,
    since  message  packets would never leave that address area,  the
    short form could be stored.

    This would make the  ZONE  (REGION)  and  HUB  identification  an
    integral  part  of  the  address.  Each level could have a second
    entry at the NODE level similar to today's method of HOST and HUB
    duplicate entries.  In fact, it would be constructive to restrict
    the usage of the 0 entry such that a 0 would never appear to  the
    left of a non-zero number.  This would facilitate the changing of
    HOSTs at any and all levels.


    DISTRIBUTED MANAGEMENT

    Since  the  addressing to each level would be unique,  each level
    would act as the HOST to those immediately beneath (descendants).
    This would include the assigning of address numbers  and  sending
    the  add,  change,  delete  information  to  the next higher HOST
    (ancestor) and delivering the incoming mail.

    This would decentralize the creation of  the  master  node  list.
    Each  level would simply send a DIFF file of his layer (including
    the descendants) up to the ancestor (up one level).  The DIVISION
    systems could exchange the divisional  DIFF  files  and  build  a
    master DIFF file for distribution down through the network to all
    the descendants.

    In  fact,  this  mechanism could be automated so that each system
    knew what changed about it during  the  past  x  period  of  time
    (maybe  daily  at the low levels).  It would send the appropriate
    DIFF information up.  This could start with the  POINT  informing
    the  NODE.   The  NODE's  machine  could  collect  all  the  DIFF
    information sent by the POINTs,  add the DIFF for  the  NODE  and
    send  the  package up to the HUB.  The HUB would collect what was
    delivered  by  the  various  NODEs  and  send   the   appropriate
    information  up to the HOST.  Each level would send the packet IF
    Fidonews                     Page 10                  30 Mar 1987


    AND ONLY IF there was something to report.  Finally,  the  master
    DIFF  would  be  created  and  distributed  back down through the
    layers.  An option would allow  each  layer  to  distribute  that
    layer's   DIFF   file.   This  is  on  the  assumption  that  the
    information within a given area is more critical than  that  from
    down under, up over, or across the way.

    The  systems  could detect the DIFF file and automatically update
    the local copy of the nodelist on the fly  rather  than  a  batch
    operation once a week.


    DEFAULT ROUTING

    Current routing principles could be extended to all levels.

    The  sender  would  route  traffic  to one level below the lowest
    common address.  Thus, traffic between POINTs of the same SPONSOR
    could go direct, ie, between siblings.  Traffic from a NODE would
    flow down to the POINT.

    Extend this concept up one level and include  transient  traffic.
    NODEs  within  the  same  HUB would go direct sibling to sibling.
    HUBs within a common NET,  etc.  Incoming traffic would flow down
    one  level to the NODE.  Likewise,  the NET,  ZONE,  and DIVISION
    levels would repeat the concept at their address layer.

    A system within a NET (say 1\17:138/) sending traffic to a system
    in another NET of the  same  ZONE  (say  105/)  would  route  the
    traffic to the INBOUND NET HOST (address 1\17:105/0'0.0 or 105/).
    Similar  action would happen at the ZONE level within a DIVISION.
    Inter-DIVISION traffic is routed between the  DIVISION  siblings.
    Thus,  today's  principle  of routing could be extended to multi-
    layer schemes.

    In short, the routing could say:

       1) Can  the  traffic  be  routed  through  one of my immediate
          descendants?  Otherwise,

       2) Can this be routed through a sibling of mine,  ie,  we have
          the same host?  Otherwise,

       3) Locate  the  lowest  common ancestor.  Go one address level
          down and send the traffic to that system.

          NOTE:  All  DIVISIONs  are  considered  to  have  a  common
                 ancestor (until the scheme is extended).


    OUTGATE ROUTING

    This  routing  could  take  place  if the ancestor (next level up
    host) has  indicated  a  willingness  to  serve  as  an  OUTGATE.
    Perhaps a flag in the NODELIST is needed or an indication of some
    sort  to  the software that the ancestor (or designee) is serving
    Fidonews                     Page 11                  30 Mar 1987


    as an OUTGATE.

    The default routing would happen until such time as  the  traffic
    leaves  the domain of the immediate ancestor.  When that happens,
    the traffic would be routed to the parent rather than  one  below
    the lowest common ancestor.  Thus,  traffic going outside the NET
    would be routed to the NET HOST (serving as OUTGATE).  A  similar
    function  could take place at the ZONE and DIVISION level.  Since
    the DIVISIONs don't have an  explicit  ancestor,  they  would  by
    definition  be  in  the  same  "larger  address scheme" and would
    exchange packets as siblings.


    INTER-LEVEL MAIL HOURS

    The current NMH of 9:00 - 10:00 UCT for  EVERY  node  in  FidoNet
    (North  American)  will become plugged somewhere in the growth to
    10K nodes.  Certainly by the time there are 100K nodes  in  North
    America, the one hour sacred period will be a thing of history.

    To  facilitate  that  move  the  NODELIST  of  the future (next 5
    years?) will need to support the software developers  to  a  much
    higher degree.  Let us accept that the current authors will relax
    the  mail requirements and ask,  "What will be the implications?"
    This is one scenario.  This author invites everyone to  think  it
    through and discuss what changes would be needed to make it work.

    Taking  a  lead  from the current POLICY3 statement,  the HOST at
    each level could dictate  the  time  period  that  the  immediate
    descendants  MUST be in a MAIL ONLY slot.  That is,  the HOST has
    declared the time  period  during  which  traffic  will  be  sent
    DOWNWARD.  This  is  done  at  every level and would be different
    time frames.  We would assume that a  rippling  effect  would  be
    seen and that a HOST at any given level could build in a delay of
    a  few  hours  to bring his system into low cost time periods (if
    necessary).

    The NODELIST would carry this information for each system:

         1)  Times that incoming mail can be accepted.

         2)  Times that MAIL ONLY is taking place.

         3)  Times that outbound DOWNLINK will happen.

    Each system would observe the DOWNLINK period of the ancestor  as
    a MAIL ONLY period.

    SEAdog  4.0  allows the mixing of outgoing MAIL with incoming BBS
    callers.  There is indication in the MEADOW  echo  that  Wynn  is
    being  asked  to  do something analogous.  Again,  accepting that
    within the next five years the "standard" system will allow  this
    then  we see a mechanism for a system to decide if it can place a
    call to an intended recipient.

    As each system came into its allowed outgoing time frame a  check
    Fidonews                     Page 12                  30 Mar 1987


    is made to see who is flagged to:

         1)  accept mail.

         2)  be MAIL ONLY.

         3)  be almost ready for downlink.

    The system could then prioritize the outgoing packets:

         1)  Those  almost ready for downlink.  Try to get the bundle
             there before the downlink starts.

         2)  Grab MAIL ONLY slots.  (Why compete with BBS callers  if
             we don't have to?)

         3)  Whoever else can accept mail.

    In  this manner,  the NMH could become a ZONE MAIL HOUR or even a
    NET MAIL HALF-HOUR.  HUBs and NODEs would set their own  DOWNLINK
    schedules independent of the layers above them.


    LIMITING NODELIST SIZE

    As  FidoNet  grows  larger  SysOps  will  ask themselves if it is
    really necessary to carry all those phone numbers.  Just as  with
    the  phone  system  many  of  the  numbers  are never used by the
    majority of  systems.  The  current  POINT  talk  indicates  that
    POINTs  would  not  be  carried.  While  the proposal above would
    support the POINT entries  (certainly,  a  NODE  would  need  the
    descendent  POINTs),  the  general NODELIST could survive without
    them.  Perhaps an index file could indicate if  the  address  was
    valid  and  point to the entry in the NODELIST.  A zero value for
    the pointer would indicate that the local NODELIST did not  carry
    that entry.

    Similarly,  the  current  ZONE  GATING  would keep only the local
    "ZONE" in the NODELIST.  In the proposed scheme,  this  could  be
    correlated with the DIVISION level.  Therefore, addresses outside
    the  local  DIVISION  might not be in the NODELIST.  Albeit,  the
    structure would allow their presence.  Again,  a  separate  index
    could  indicate  the validity of an address without requiring the
    entry to be present.

    This opens up some "tricks" the could be played.  DIVISION  level
    entries  could be added with the phone number of a "local" system
    acting as a link to the specified  DIVISION.  Both  the  STANDARD
    and  OUTGATE  routing  would  automatically  send  traffic to the
    "link".  The "link" would have the  real  phone  number  in  it's
    DIVISION entry and would forward the traffic.

    This  mechanism  of substituting phone numbers would allow gating
    type functions to occur at any layer.


    Fidonews                     Page 13                  30 Mar 1987


    BENEFITS

    The benefits then:

      1)  Make routing implicit within the address.

      2)  Negate the need for special node numbers within a  DIVISION
          to handle gateway functions.

      3)  Every level acts as HOST/HUB to the immediate descendants.

      4)  NODELIST  preparation  and maintenance is decentralized and
          automated.

      5.  Mail Hour becomes a local item rather than an international
          incident.


    NODELIST ASSISTANCE

    Just as with the phone system, occasionally the need arises for a
    phone number not contained in  the  DIVISION  nodelist.  NODELIST
    ASSISTANCE  to  the  rescue.   An  additional  feature  could  be
    supplied whereby a system could send an ENTRY REQUEST and  obtain
    a NODELIST type entry in return.  This request would be routed to
    the  asked  about  system.  Any node along the path that knew the
    complete answer would  respond  to  the  request.  This  response
    would  automatically  be  added  to  the personal nodelist of the
    requesting system.

    This may not provide all the solutions now  being  looked  at  or
    for; but, we want to propose something that will bring all of the
    current  software  writers together and to foster the exchange of
    ideas throughout FidoNet.

    A few nodes in REGION  17  have  bounced  this  idea  around.  In
    addition,  certain  ideas of the ZONE and POINT concept now being
    explored by others were appropriated without giving  due  credit.
    We apologize in advance to Bob Hartman,  Thom Henderson and Randy
    Bush and wish to credit them for much of the current  exploratory
    effort underway.

    -----------------------------------------------------------------

    Fidonews                     Page 14                  30 Mar 1987


                    Equatorial Communications Company
                    Satellite  Transcription Services

                          Ken McVay, Opus 340/20
                      Home of the Old Frog's Almanac
                           (Data)  604-758-3072
                           (Voice) 604-758-4137


    The information which follows is the result of an article I wrote
    some time ago in FidoNews,  in which I discussed the  exploration
    of  satellite  tranceiver use for matrix mail.  This article will
    provide others interested in message tranceivers with as  bit  of
    information  about  one  company  that provides both hardware and
    services.

    The  company,  Equatorial  Communications,  is based  in  Silicon
    Valley.  In  Canada,  the  company's  services  are  provided  by
    Telesat,   a   50%  government-owned  monopoly.   Telesat's   use
    eliminated the need for Equitorial to operate under Canadian  law
    as  a  public utility,  with all the bureaucratic  nonsense  that
    would have entailed.

    Equatorial was founded to provide low-speed data links that would
    be  cheaper  than  telephone company wires,  and to  market  such
    network  services.  They did not wish to compete with  high-speed
    satellite  services,  such  as  those  which  transmit  voice  or
    television signals.

    The  following  information is taken from the San  Jose  Business
    Journal,  September  30,  1985,  and is a bit out  of  date.  The
    article was sent to me by the company.

    "Like  Bell  selling phones to use with its  network,  Equatorial
    also sells low cost satellit stations for its  customers,  giving
    it  wo distinct parts -- a group that makes hardware and one that
    provides network services."

    "Its customers are primarily large companies that spend  millions
    of  dollars a year on phone lines for computers.  Equatorial  has
    little  trouble  getting their attention with a way to  cut  that
    part of the phone bill by 20 percent to 50 percent."

    "Equatorial  sells two types of network services,  which use  two
    kinds  of satellite stations.  Its first service was distribution
    -- a central computer sending data to many sites that could  only
    receive  data,  not  transmit.  Its newer service can  connect  a
    number of sites interactively -- each computer or terminal hooked
    to the satellite can receive and send data to others."

    I did not request costing data from the company when I spoke with
    them  - I felt it would be irrelevant at this point.  The article
    quoted  above  mentions that the "average investment"  is  "about
    $10,000.00  per  site." As that was some time  ago,  as  computer
    technology  goes,  it should now be somewhat  lower....I  believe
    that  we  are not far from the day when such technology  will  be
    Fidonews                     Page 15                  30 Mar 1987


    well within the reach of matrix sysops.

    The  following  data  relates  to the  C200  Series  Micro  Earth
    Station, and was provided by the company upon request...

    The  system  uses a small parabolic antenna,  which permits  easy
    installation.

    C  Band  Satellite  performance "is  not  affected  by  different
    environmental changes such as rainfall."

    Receiving Rate: 19.2Kbps, with multiple protocol options.

                                Overview

    The   ECC   C-200   series  Micro  Earth  Station  is   a   small
    Transmit/Receive earth station,  suitable for installation on any
    premises,   to  provide  data  communications  between  a  remote
    computer,  terminal or personal work station and a host  computer
    or  another  remote facility.  It is configured as a part  of  an
    Equatorial  two way satellite data communications network,  which
    consists of a Master Earth Station,  the satellite,  and a number
    of   Micro  Earth  Stations.   This  networking   capability   is
    PARTICULARLY SUITED TO LARGE NETWORKS OF REMOTE STATIONS USED FOR
    INQUIRY/RESPONSE APPLICATIONS. (Emphasis mine)

    Data  Terminal  Equipment Interface:  The DTE interface  has  the
    following major attributes:

    * Two  interface   ports   are   provided.   Each   may   operate
      independently  using  the  same  data  communications protocol.
      Each can be used with either standard RS232 interfaces or  with
      RS422  signal levels.  Standard RS232 modem control signals are
      provided.

    * Port Data Interface.  Each port may be  independently  operated
      simplex,  half  duplex  or  full  duplex at any data rate up to
      19.2Kbps.

    * Port Protocol Interface.  The system supports a number of  data
      communication protocols.  The IBM 3270/SDLC family is supported
      in a device emulation mode,  in which the C-200  appears  as  a
      3705 communications port. Other protocols are also available.

    Network  Interface:  The C-200 receives data from the network  at
    the rate of 153.6Kbps.  This datastream contains packets destined
    for  all  stations  on the network through use  of  broadcast  or
    individual  station addressing....The return path from the  Micro
    Earth Station to the Master Eaarth Station operates at 1200 bps.

    Further technical information may be optained from the company:

    Equatorial Communications Company
    189 N. Bernardo Avenue
    Mountain View, California 94043
    (415) 969-9500
    Fidonews                     Page 16                  30 Mar 1987


    -----------------------------------------------------------------

    Fidonews                     Page 17                  30 Mar 1987


    Christopher Baker
    Metro-Fire Fido, 135/14(0), XP:

                           Another Mensa Echo:
                               MENSANS_ONLY

    I am beginning a New Mensa Echomail conference for *Mensa members
    only.  MENSANS_ONLY is available from  135/14.  Tie-ins  will  be
    provided to Mensa Sysops upon request to this Node.

    The  only  requirement  for  participation is verified membership
    (past or  present)  in  American  Mensa,  Ltd.,  or  any  of  the
    International Mensa organizations.

    This  Echo  should  not  be  confused with the General Mensa Echo
    coordinated by The Flying PC,  109/612,  and Jim Kay.  Metro-Fire
    also  participates  in  that  Echo.  MENSANS_ONLY  is provided to
    augment the services provided  in  the  General  Mensa  Echo  and
    differs in that Mensa membership is required for participation in
    the MENSANS_ONLY Echo.

    For  more  information  on Mensa and the General and MENSANS_ONLY
    Echos, SEAdog capable Nodes may GET the file, MENSA.ARC from this
    Node.  File requests by NetMail message will be  honored  by  the
    following NMW.

    Mensan  Sysops  requesting tie-in must provide their Name,  Mensa
    membership number,  date of qualification,  and their Node number
    for   Echo   routing.   The   AREAS.BBS  name  for  the  Echo  is
    MENSANS_ONLY.

    Metro-Fire Fido, 135/14, is available at 305-596-8611,  1200 bps,
    24  hrs.  Access  is  by  verification  only.  Weekend  access is
    available by on-line verification.

      * Mensa is an international  organization  of  individuals  who
        have  scored  in  the  top  2%  of  the general population on
        various standarized intelligence  tests.  Mensa  embraces  no
        political, religious, socio-economic, ethnic or racial views.

    -----------------------------------------------------------------

    Fidonews                     Page 18                  30 Mar 1987


    =================================================================
                                 COLUMNS
    =================================================================

         Well this  column has  been going on for about a month now,
    and I  think it's  going to  be more  regular than  I  initially
    thought. It's  is much  easier to  write a  few pages every week
    than I  had originally  thought, try  it yourself  if you  don't
    believe me!  I would  love to  see someone  else do  some fairly
    regular writing  for FidoNews,  and I'm sure the editor wouldn't
    mind seeing some more contributions either. I had some time this
    past week  to go  through some of the backlog that's been piling
    up, so here goes.

         First off,  I've had  a chance to look over some new (to me
    at least)  modems from  US Robotics. The first of these is their
    2400 baud  internal (Microlink)  in the  VAR modem package. From
    what I  understand, this  modem is  meant for  dealers  who  are
    putting together  complete packages  for a specific application,
    however you  can usually  find a few dealers who will sell it to
    you separate.  All you get is the internal modem, a registration
    card, a FCC ID sticker/card, and one card summarizing the switch
    settings and  modem commands.  This is  definitely not the modem
    for someone  brand new to PCs and telecommunications, however it
    may work  out well  if installing  cards and  using a  modem  is
    nothing new  to you.  I  paid  $240  for  mine,  and  it's  been
    performing beautifully for the past week. I put the Phonegate on
    the shelf  as a  spare since it did have a few problems (speaker
    was never  fully off  and it  sometimes didn't  take a command).
    Since the  modem can  be configured  for COM1  through COM4, you
    should be able to squeeze it in somewhere. I have also been told
    that it will work in an AT, many internal modems won't, although
    I don't  know how fast an AT can be before it stops working, but
    it is probably over 8 megahertz. It doesn't have much in the way
    of volume  control, only  a switch  for high  or  low,  but  the
    command set  is very  nice. One  of the  better additions to the
    Hayes command  set is  ATI4, which  displays the modem's current
    settings. This  could be very useful if you were having problems
    with a  program and  thought  it  might  be  an  improper  modem
    setting. It  also has  a few internal help screens for a command
    summary, a  dial command  summary, and a S-register functions in
    case you  lose the card and need some help. US Robotics has also
    added a  new (to  me at  least) option  on the  speaker commands
    (ATMx) which turns the speaker on after the last digit is dialed
    and off  when the  carrier is  detected, no  longer do I have to
    listen to  the modem  dial, yet  I can  still hear  if a  person
    answers the phone or if the line has been disconnected. It seems
    to be working very well, and I am pleased with it's performance.

         Another new  modem from  US Robotics is the Sportster 1200,
    an external  300/1200 modem.  It's missing  most of  the  status
    light that  I've come to expect from an external modem, although
    it does have the most necessary ones. A power/carrier detect and
    a send  data/receive data  light are  just to  the right  of the
    power switch which is on the front of the modem. I haven't given
    it as  thorough a  workout as  the VAR modem, but it worked very
    Fidonews                     Page 19                  30 Mar 1987


    well on  the occasions  I did  use it.  One of  the nicer things
    about the  modem is  a quick  reference to  commands and  switch
    settings on  the bottom of the modem, I've had too many problems
    with other  modems just because someone can't find the book that
    came with the modem to not enjoy extra touches like this! To old
    timers, the  modem will  look strange since it's turned sideways
    to the  way a  Hayes is  oriented, but  as it  works well and is
    reasonably priced  (I believe  the list  price  is  $149)  I  am
    satisfied with  it and would recommend it to someone looking for
    a 300/1200 baud external modem.

         I've finally  gotten around  to looking  at TELIX,  which I
    mentioned a few weeks ago when I reviewed OPUS. I don't think it
    will replace  ProComm as  my communication  program, although it
    does have  the SEAlink  protocol which  is nice  for downloading
    from an  OPUS board.  I just  received the  latest version  this
    morning (I  was using  version 2.10),  so I  know the  version I
    looked at is a little out of date, but I everything should still
    apply to  the new  version. The  only reason  I'll probably stay
    with ProComm  is because I am used to it, I can still access the
    SEAlink protocol  (I've got  a straight  SEAlink program  that I
    call through  the independent  editor feature of ProComm), but I
    will admit  it's easier to use TELIX when I need to use SEAlink.
    I'll probably  end up  using TELIX whenever I call an OPUS, much
    the same  way as I use KERMIT when I call a UNIX system. Some of
    the nice  features in TELIX include multiple dialing directories
    (each holding  up to  150 phone  numbers), all  my favorite file
    transfer protocols  (Kermit, SEAlink, Telink, and YMODEM to name
    a few),  script files, and an automatic redial queue. TELIX only
    needs 128K  of free  memory,  which  is  less  than  many  other
    programs, so  it may  become quite  popular with  those  of  you
    running a multitasker such a DoubleDos.

         It run's very quickly, and if you're starting it up for the
    first time  it "guides"  you through  the  initial  installation
    (which com  port, what  baud rate,  monitor type, etc.) which is
    very nice.  One feature that may have me switch over to TELIX is
    it's support  of keyboard  macros, which I used for my passwords
    on different  systems (you should NEVER use the same password on
    all the systems you use). The manual is fairly easy to read, and
    hackers will  like  the  section  describing  the  configuration
    file's format.  It's a nice program that works well, and I would
    recommend it to anyone looking to change communication programs.
    The latest  version is available from The ASCII Exchange (148/1)
    416/622-8254 (SEAdog  file requests accepted) and The PC Pub BBS
    416/487-2889 and  416/487-4134, both  of which also have message
    sections dedicated  to TELIX.  My net  host who  mailed  me  the
    program is also trying to get the TELIX message section into our
    net via  echomail, so you may be able to read some more about on
    boards in your own net.

         As a  side note,  if you  are running  TELIX from something
    other than  it's home  directory you  must have  an  environment
    variable set  to tell  it where  to find it's support files (SET
    TELIX=C:\BIN\TELIX\ in  my case).  Make sure  however  that  you
    include a  backslash at  the end  of the pathname, I've seen too
    Fidonews                     Page 20                  30 Mar 1987


    many messages  in the  TECH echomail  area on  ProComm, we don't
    need repeat this bit of history with TELIX, do we?

         That about ties it up for this week. Instead of a best book
    I'm going  to describe  "Learning  DOS"  from  Microsoft  ($50).
    Learning DOS is a disk based tutorial on MS-DOS (or PC-DOS) that
    also includes  a disk  based DOS reference. If you are still new
    to your  MS-DOS machine  or know of someone who is, this program
    was written  for you.  It has  2 versions,  one for  people on a
    floppy based  system  and  another  for  hard  disk  users.  The
    tutorials  are   complete  and  include  practice  sessions  and
    summaries. It  can also  provide a hint while you're practicing.
    Some of the topics covered include preparing a floppy disk, mode
    settings for hardware, fixed settings (autoexec.bat, config.sys,
    etc.), and  organizing files  with directories. It is one of the
    best tutorial  programs I've  seen, and almost completely covers
    the topics new users need most.

         I'm still  trying  to  beat  StarFlight,  and  have  almost
    completed Leather  Goddesses of Phobos. Hopefully next week I'll
    have gotten  around  to  looking  at  some  new  games.  In  the
    meantime, I'd  like to hear from anyone who has some comments on
    anything I've  written, so  at the least send me some mail. Even
    better then  sending me  some mail is to write something of your
    own for  FidoNews. My US mail, FidoNet, and USENET addresses are
    listed below. If you are a user of a BBS, please mention to your
    sysop that  mail to me must be routed through 157/0, 157/502, or
    157/1. Sysops  who send  me mail,  just make  note of  the  last
    sentence. All  of those  systems are  running  SEAdog  and  will
    accept a  file  to  forward  to  me  as  well.  Until  the  next
    column.....


    Dale Lovell
    3266 Vezber Drive
    Seven Hills, OH  44131

    FidoNet:  157/504
    USENET: ..!ncoast!lovell

    -----------------------------------------------------------------

    Fidonews                     Page 21                  30 Mar 1987


                           TALKING   ASSEMBLER
                                    by
                               Ned  Sturzer
                    OpusNODE 362/1 -  Chattanooga, TN.

      Assembler language has the reputation  of  being  difficult  to
    learn  and  use.  This is for the most part an unjustified label.
    What is true is that a considerable  knowledge  of  the  computer
    architecture  is  necessary  - more so than in BASIC.  It is also
    true that I/O is a pain in assembler and it is  often  useful  to
    write assembler subroutines and leave the I/O to BASIC.  In these
    articles I will try to  combine  the  necessary  background  with
    specific programming examples without being too tedious.

      As  I  have  to  start somewhere I will assume you already know
    hexidecimal (hex) notation.  It can be mastered in a short  time.
    Now  --  the  PC  can be thought of as a magic box which performs
    logical and arithmatic calculations. The input to and output from
    this magic box are stored or pass through three types of  waiting
    areas: registers, memory locations, and ports. Best known are the
    memory  locations.  Each  location  is assigned a name,the lowest
    being 0 and the highest (in 8088 machines such as the Tandy 1000)
    being FFFFF.  Thus there are 1 meg  of  memory  locations.  Don't
    worry about extended or expanded memory for the present.  In each
    location is to be found 1 byte=8 bits.  The standard labeling  of
    the bits in a byte is

                      B   B   B   B   B   B   B   B
              bit #   7   6   5   4   3   2   1   0

      You can see that it would require 2 1/2 bytes to store the name
    of a location. Instead of worrying about half bytes the following
    clever though clumsy ruse is used.  A pair of two byte numbers is
    used, XXXX:YYYY and this represents the address XXXX0+0YYYY.  For
    example,   address   1A35E   may  be  represented  by  1A35:000E,
    0C0D:E28E,  and many other pairs  besides.  XXXX  is  called  the
    segment  and YYYY the offset.  In most cases when referring to an
    address the segment will already have beeen established and  only
    the offset will be stored in a memory location. In this situation
    the  convention  is  to use the format LSB/MSB (least significant
    byte/most significant byte).  An offset of 4A87 would  appear  at
    memory  locations  of  say 1339F and 133A0 as 874A.  Should it be
    necessary to store a full segment:offset type address in  a  four
    byte sequence of memory, the convention is

        Offset     Offset     Segment     Segment
         LSB        LSB         MSB         MSB

      Thus  the address 200F3 could appear stored somewhere in memory
    as 0F200300, i.e.  200F:0003.  In a later article we will discuss
    what appears in memory where, that is, the memory map.

      While  the  idea  of memory locations will not be unfamiliar to
    BASIC programmers,  the concept of registers may.  Registers  are
    simply   special   memory  locations  distinct  from  the  memory
    presented above.  The  8088  has  14  such  registers  each  with
    Fidonews                     Page 22                  30 Mar 1987


    distinct though somewhat overlapping functions.  The names of the
    registers  are  AX,BX,CX,DX,CS,DS,ES,SS,SI,DI,BP,SP,IP,  and  the
    last register which does not have a name but is  referred  to  as
    the flag register.  All 14 registers are 2 bytes (= 1 word) long.
    The high and low order bytes of AX,BX,CX, and DX may be addressed
    independently and  in  this  case  are  denoted  AH,AL,BH,BL,etc.
    Unlike memory,  when memory locations are stored in resisters the
    MSB/LSB convention is used.  The reader should not  dispair  over
    these  complexities  since  the assembler instructions do all the
    flipping and shifting themselves.

      The details on the use of the registers will come later  but  a
    quick overview is appropriate.  The "S" registers are usually set
    to contain the segment component of the location of the assembler
    program in memory or the segment component of data areas used  by
    the  program.  The  SS,SP  pair usually point to the active stack
    location.  More on the stack later.  The ES register is  used  in
    certain  instructions  which  loop  through  data  areas.  The IP
    (instruction pointer) register is the  offset  component  of  the
    next  instruction  to be executed.  The "X" registers are general
    notepads for data and are the workhorses  of  most  programs.  CX
    also  functions  as a loop counter.  The so-called base and index
    resisters, BP,SP,SI, and DI, are used to access tables.  The flag
    register  is  a set of 9 one-bit switches which represent various
    machine states. The remaining 7 bits are not used.

      To be useful the computer must be able to read and/or write  to
    devices external to itself such as a keyboard or printer. This is
    effected  through the use of ports.  There are 64K possible ports
    on the 8088 labled 0 to FFFF.  It is in the meaning of  the  port
    assignments  that  the  various IBM compatible computers show the
    greatest distinctions.

      I have covered a large canvas of topics in  a  short  space  of
    time and have still not covered all the requisite background.  If
    these concepts are new to you do not be discouraged if  they  are
    unclear in your mind. At this stage it is only important that you
    be aware of these ideas, not that you be their master.

      At  least  we  may  now  begin  to consider our main interest -
    Assembler Language. The computer understands various sequences of
    bits to represent operations to be carried out on the contents of
    the several memory locations, registers,  and ports.  Needless to
    say  a  programmer  would  quickly  go bananas trying to write or
    interrupt a sequence  such  as  binary  101000111001011000101011.
    Even  if  this  sequence is represented by hex A3962B it is still
    difficult to think  in  these  terms.  Writing  in  8088  Machine
    Language  is  obviously tedious and prone to error.  Much of this
    difficulty is overcome through  the  use  of  Assembler  Language
    which  closely  mimics  Machine  Language but is easier to grasp.
    Just as important Assembler Language is  functionally  equivalent
    to Machine Language.  Consider the Assembler Language instruction
    represented by mov [2B96],AX. This instruction tells the computer
    to put into memory,  starting at the location  whose  segment  is
    whatever  is  contained  in  the  DS register and whose offset is
    2B96,  the same value as in the AX register.  This is exactly the
    Fidonews                     Page 23                  30 Mar 1987


    function  performed  by Machine Language A3962B as above.  Indeed
    the Assembler translates  mov  [2B96],AX  into  A3962B.  However,
    Machine  Language  8906962B performs exactly the same function as
    A3962B yet both are disassembled to  our  friend  mov  [2B96],AX.
    Assemblers  follow  the rule that if two or more Machine Language
    instructions  perform  the  function  intended  by  an  Assembler
    Language  instruction  then the Assembler will chose the shortest
    instruction.

    In the next  article  we  will  begin  discussing  the  Assembler
    instructions  in  detail.  There also remain numerous side topics
    which should be explored  such  as  the  stack,  interrupts,  the
    memory and port maps, BIOS and DOS.

    I'll conclude with a review of the tools you will want to acquire
    if  intend  to write programs in Assembler.  Naturally,  you will
    need an assembler and disassembler.  The assembler converts  your
    Assembly   Language   program   into  Machine  Language  while  a
    disassembler converts a Machine Language program  into  Assembler
    Language. In these articles I will always use the Microsoft Macro
    Assembler   3.01.   This  package  includes  both  assembler  and
    disassembler and  the  manual  is  complete  though  obtuse.  The
    disassembler  provided  by DEBUG in DOS 3.0 or higher is adequate
    but DEBUG's assembler is not.  As far  as  I  know  a  linker  is
    included  with  all  assembler  packages.   The  Microsoft  Macro
    Assembler sold by Radio Shack is a low version number. Don't drop
    below version 3.0.

    A  book  detailing  all  the  Machine  Language  instructions  is
    required.  R.  Rector and G. Alexy, The 8086 Book, Osborne, 1980,
    is  a  standard.   Two  books  all  PC  programmers  should  have
    regardless of the language they write in are R.  Davies,  Mapping
    the IBM PC and PCjr, COMPUTE!, 1985, and P.  Norton, Programmer's
    Giude to the IBM PC,  Microsoft Press,  1985.  There are a number
    of books which assist in teaching you Assembler Language.  By way
    of example I mention P.Abel,  Assembler for the IBM PC and PC-XT,
    Reston, 1984. Somewhat more advanced is R. Jourdain, Programmer's
    Problem Solver for the IBM PC, XT & AT, Brady,  1986.  One of the
    best  sources  for  programming  technique are the examples in PC
    Magazine.  Finally, every Assembler Language programmer will need
    a  DOS  Technical  Reference Manual (or equivalent).  A Technical
    Reference Manual for your computer is also useful.

        OpusNODE 362/1 - (615) 892-7773 - The Last Resort
                 Chattanooga, Tennessee - 1200/2400

    -----------------------------------------------------------------

    Fidonews                     Page 24                  30 Mar 1987


    =================================================================
                                 NOTICES
    =================================================================

                         The Interrupt Stack


    27 Apr 1987
       Start of the Semi-Annual DECUS (Digital Equipment Corp. Users
       Society) symposium, to be held in Nashville, Tennessee.

    17 May 1987
       Metro-Fire Fido's Second Birthday BlowOut and Floppy Disk
       Throwing Tournament!  All Fido Sysops and Families Invited!
       Contact Christopher Baker at 135/14 for more information.

    21 Aug 1987
       Start of the Fourth International FidoNet Conference, to be
       held at the Radisson Mark Plaza Hotel in Alexandria, VA.
       Details to follow.

    24 Aug 1989
       Voyager 2 passes Neptune.


    If you have something which you would like to see on this
    calendar, please send a message to FidoNet node 1/1.

    -----------------------------------------------------------------

    Bill Allbritten, 11/301

    I just spoke with a Mr.  Mayer of the FCC-(14:30,  26MAR87) about
    the  decision on re-regulating packet switching networks known as
    proposal computer III.  He said  that  today's  decision  was  to
    leave  things  alone,  that  is  to  leave  the  enhanced  packet
    switcher's deregulated.

    -----------------------------------------------------------------

    Fidonews                     Page 25                  30 Mar 1987


                                     __
                The World's First   /  \
                   BBS Network     /|oo \
                   * FidoNet *    (_|  /_)
                                   _`@/_ \    _
                                  |     | \   \\
                                  | (*) |  \   ))
                     ______       |__U__| /  \//
                    / Fido \       _//|| _\   /
                   (________)     (_/(_|(____/ (jm)

           Membership for the International FidoNet Association

    Membership in IFNA is open to any individual or organization that
    pays  an  annual  specified  membership  fee.   IFNA  serves  the
    international  FidoNet-compatible  electronic  mail  community to
    increase worldwide communications. **

         Name _________________________________    Date ________
         Address ______________________________
         City & State _________________________
         Country_______________________________
         Phone (Voice) ________________________

         Net/Node Number ______________________
         Board Name____________________________
         Phone (Data) _________________________
         Baud Rate Supported___________________
         Board Restrictions____________________
         Special Interests_____________________
         ______________________________________
         ______________________________________
         Is there some area where you would be
         willing to help out in FidoNet?_______
         ______________________________________
         ______________________________________

    Send your membership form and a check or money order for $25 to:

              International FidoNet Association
              P. O. Box 41143
              St Louis, Missouri 63141
              USA

    Thank you for your membership!  Your participation will  help  to
    insure the future of FidoNet.

    ** Please NOTE that IFNA is a general not-for-profit organization
    in formation and Articles of Association and By-Laws were adopted
    by  the  membership  in January 1987.  An Elections Committee has
    been established to fill positions outlined in  the  By-Laws  for
    the  Board  of  Directors.  An  IFNA Echomail Conference has been
    established on FidoNet to  assist  the  Elections  Committee.  We
    welcome your input on this Conference.

    -----------------------------------------------------------------