textfiles/internet/internet.tour

6066 lines
212 KiB
Plaintext

The Internet is a worldwide collection of thousands of computer
networks that can intercommunicate. All of them speak the same
Òlanguage,Ó namely the TCP/IP protocol suite. Users of any of the
Internet networks can reach users on any of the other networks. The
Internet started with the ARPANET, but now includes such networks as
NSFNET, NEARNet, and others. Many other networks, such as BITNET, are
tied to the Internet but are not an integral part of it. Approximately
one million people use the Internet daily.
About the Internet
The Internet is a worldwide collection of thousands of computer
networks that can intercommunicate. All of them speak the same
Òlanguage,Ó namely the TCP/IP protocol suite. Users of any of the
Internet networks can reach users on any of the other networks. The
Internet started with the ARPANET, but now includes such networks as
NSFNET, NEARNet, and others. Many other networks, such as BITNET and
SPAN, are tied to the Internet, but are not an integral part of it.
Approximately one million people use the Internet daily.
The ancestry of the Internet is rooted in the ARPANET, a network
developed by the Advanced Research Projects Agency (ARPA, see
DARPA) to aid in the sharing of information and resources among
researchers. The ARPANET, which was made operational in 1969,
became an essential tool for remote login, file transfer, electronic
mail and the sharing of information by interest groups.
History of the Internet
The ancestry of the Internet is rooted in the ARPANET, a network
developed by the Advanced Research Projects Agency (ARPA, see
DARPA) to aid in the sharing of information and resources among
researchers. The ARPANET, which was made operational in 1969,
became an essential tool for remote login, file transfer, electronic
mail and the sharing of information by interest groups.
Development of TCP/IP
The ARPANET was growing in size while other networks were being
developed. Soon the architects of the ARPANET recognized the need to
communicate with other networks. They also realized that they needed
new protocols (the NCP protocol suite that they had developed wasnÕt
able to cope with the diverse characteristics of other networks).
Therefore they designed a new architecture and protocol suite called
the ARPA Internet; the protocol suite was called TCP/IP.
Start of the Internet
The Internet first became operational in 1983, when the ARPANET was
split into two separate networks, MILNET and ARPANET, which together
formed the Internet. Each was given a network number, and gateways
were installed to provide packet forwarding between them.
TCP/IP in the Internet
When the ARPANET was split to form the Internet, the Defense
Communications Agency (DCA) mandated the use of TCP/IP for all
ARPANET hosts, and enforced this by modifying the packet switching
software. As a result, all ARPANET hosts had to begin using TCP/IP
protocols and interacting with the Internet environment.
This meant that more networks and gateways could be added to the
Internet without any effect on the existing network.
Growth of the Internet
Since its creation in 1983, the Internet has grown exponentially in
terms of numbers of networks connected to it. By 1985, the number
was approxiately one hundred. By 1987, the number had grown to two
hundred; in 1989, it exceeded five hundred. According to tables kept at
the DDN Network Information Center (DDN NIC), there were 2,218
networks connected to the Internet as of January 1990.
As the Internet has grown, its underpinnings have changed. ARPANET
and MILNET continued to grow, and other backbone networks were added
to the Internet. One of these was CSNET, established in 1981 to
provide for collaboration between computer and engineering
researchers. CSNET provided Internet access from sites not served by
ARPANET and MILNET. Today, CSNET has expanded to include
institutions involved in science and engineering, and is one of several
midlevel networks that make up NSFNET.
Internet Backbone Networks
NSFNET
NSFNET began providing backbone Internet service in July 1986 to
permit supercomputer centers (see Computing Centers) to
communicate. NSFNET's scope has since expanded, and today it is the
U.S. national research network. It has extended to the academic and
commercial communities the TCP/IP services that were previously
available to government researchers. NSFNET links midlevel
networks, which in turn connect networks at universities and
commercial enterprises. Therefore, NSFNET, like the Internet of which
it forms a large part, is itself a network of networks.
Decommissioning the ARPANET
As NSFNET has grown to handle much of the interconnection load of the
Internet, other networks have outgrown their usefulness and been
eliminated. A milestone in this area was the decommissioning of the
ARPANET in June 1990. The Defense Communications Agency shut down
the ARPANET because its functions had been subsumed by the midlevel
networks and NSFNET. Perhaps the greatest testimony to the
architecture of the Internet is that when ARPANET, the network from
which the Internet grew, was turned off, no one but network staff was
aware of it.
Poems about the Internet
The Big Bang, or by Leonard
The Birth of the ARPANET Kleinrock
Requiem for the ARPANET by Vint Cerf
Rosencrantz and Ethernet by Vint Cerf
Untitled by Barry Boehm
The Big Bang
(or The Birth of the ARPANET)
by Leonard Kleinrock
It was back in '67 that the clan agreed to meet.
The gangsters and the planners were a breed
damned hard to beat.
The goal we set was honest and the need was clear
to all:
Connect those big old mainframes and the minis,
lest they fall.
The spec was set quite rigid: it must work without a
hitch.
It should stand a single failure with an unattended
switch.
Files at hefty throughput 'cross the ARPANET
must zip.
Send the interactive traffic on a quarter-second trip.
The spec went out to bidders and t'was BBN that
won.
They worked on soft and hardware and they all got
paid for fun.
We decided that the first node would be we who
are your hosts
And so today you're gathered here while UCLA
boasts.
I suspect you might be asking "What means first
node on the net?"
Well frankly, it meant trouble, 'specially since no
specs were set.
For you see the interface between the nascent
IMP and host
Was a confidential secret from us folks on the
West Coast.
BBN had promised that the IMP was running late.
We welcomed any slippage in the deadly
scheduled date.
But one day after Labor Day, it was plopped down
at our gate!
Those dirty rotten scoundrels sent the damned
thing out air freight!
As I recall that Tuesday, it makes me want to cry.
Everybody's brother came to blame the other guy!
Folks were there from ARPA, GTE, and Honeywell.
UCLA and ATT and all were scared as hell.
We cautiously connected and the bits began to flow.
The pieces really functionedÑjust why I still don't
know.
Messages were moving pretty well by Wednesday
morn.
All the rest is historyÑpacket switching had been
born!
Rosencrantz and Ethernet
by Vint Cerf
All the world's a net! And all the data in it merely
packets
Come to store-and-forward in the queues a while
and then are
Heard no more. 'Tis a network waiting to be
switched!
To switch or not to switch? That is the question.
Whether
'Tis wiser in the net to suffer the store and forward
of
Stochastic networks or to raise up circuits against a
sea
Of packets and, by dedication, serve them.
To net, to switch. To switch, perchance to slip!
Aye, there's the rub. For in that choice of switch,
What loops may lurk, when we have shuffled
through
This Banyan net? Puzzles the will, initiates
symposia,
Stirs endless debate and gives rise to uncontrolled
Flights of poetry beyond recompense!
Untitled
by Barry Boehm (stanzas 1 and 2)
Paul Baran came out of the wood
With a message first misunderstood
But despite dangers lurking
The IMP's were soon working
And ARPA did see it was good.
So in place of our early myopia
We now have a net cornucopia
With IMPs, TIPs, and LANs
Wideband VANs, MANs, and WANs
And prospects of World Net Utopia.
Requiem for the ARPANET
by Vint Cerf
Like distant islands sundered by the sea,
We had no sense of one community.
We lived and worked apart and rarely knew
That others searched with us for knowledge, too.
Distant ARPA spurred us in our quest
And for our part we worked and put to test
New thoughts and theories of computing art;
We deemed it science not, but made a start.
Each time a new machine was built and sold,
We'd add it to our list of needs and told
Our source of funds "Alas! Our knowledge loom
Will halt 'til it's in our computer room."
Even ARPA with its vast resources
Could not buy us all new teams of horses
Every year with which to run the race.
Not even ARPA could keep up that pace!
But, could these new resources not be shared?
Let links be built; machines and men be paired!
Let distance be no barrier! They set
That goal: design and built the ARPANET!
As so it was in nineteen sixty-nine,
A net arose of BBN design.
No circuit switches these, nor net complete
But something new: a packet switching fleet.
The first node occupied UCLA
Where protocols and measurement would play
A major role in shaping how the net
Would rise to meet the challenges unmet.
The second node, the NIC, was soon installed.
The Network Info Center, it was called.
Hosts and users, services were touted:
To the NIC was network knowledge routed.
Nodes three and four soon joined the other two:
UCSB and UTAH come on cue.
To monitor it all around the clock
At BBN, they built and ran the NOC.
A protocol was built for host-to-host
Communication. Running coast-to-coast,
Below the TELNET and the FTP,
We called this protocol the NCP.
The big surprise for most of us, although
Some said they guessed, was another
protocol
Used more than all the rest to shuttle
Mail in content flaming or most subtle.
When we convened the first I Triple C,
The ARPANET was shown for all to see.
A watershed in packet switching art,
this demo played an overwhelming part.
Within three years the net had grown so
large
We had to ask that DCA take charge
To operate a system guaranteed
For R&D and military need.
Exploring other packet switching modes,
we built the first spread spectrum mobile
nodes.
The Packet Radio, the mobile net,
worked on the ground and even in a jet.
Deployed at SAC and Eighteenth Airborne Corps,
The Packet Radio unlocked the door
to what we now know as the Internet.
The driver for it all was PRNET.
The Packet Satellite, another new
technique, was added to the net milieu.
And then to shed more light upon the dark,
there came the Ethernet from Xerox PARC.
To these we added yet another thing
from MIT: a local token ring.
We saw the local net techniques compound
until the list could easily confound.
The Internet foundation thus was laid.
Its protocols from many sources made.
And through it all the ARPANET grew more;
It was, for Internet, the central core.
The hardware of the net was changing, too.
The Honeywell was first, and then the SUE,
which forms the heart of Pluribus today
though where this platform sits one cannot say.
The next big change was called the MBB.
It emulated Honeywell, you see,
so one by one they modified each node,
by means of closely written microcode.
Now known as 30 prefixed with a C,
these nodes are everywhere from A to Z.
The European MINET too was full
of nodes like these from Mons to Istanbul.
The second Autodin was long desired
but once accepted instantly expired.
Then to the rescue rode the ARPANET!
And soon the MILNET by its side was set.
By nineteen-eighty DoD opened
its data networks soon must be aligned
with Internetwork protocols, to wit:
by eighty-three the TCP was IT!
Soon every host that sat on ARPANET
became a gateway to a local net.
By eighty-six new long-haul nets appeared
as ARPANET its second decade neared.
The NSFNET and its entourage
began a stately national dressage
and soon was galloping at T1 speed
outdistancing its aging peer indeed.
And so, at last, we knew its course had run,
our faithful servant, ARPANET, was done.
It was the first, and being first, was best,
but now we lay it down to ever rest.
Now pause with me a moment, shed some
tears.
For auld lang syne, for love, for years and years
of faithful service, duty done, I weep.
Lay down thy packet, now, O friend, and sleep.
(for ARPA, see DARPA; for the NIC, see DDN NIC; for TCP, see TCP/IP)
Internet Networks
CREN/CSNET (Computer and Science Network)
DDN (Defense Data Net )
ESNet (Energy Sciences Network)
NSFNET (National Science Foundation Network)
NASA Science Network
The Internet communicates via gateways with other networks such as
CompuServe, MCI Mail, BITNET, FIDONet, UUNET, and USENET. The
Internet has several component networks (which themselves include
other networks):
¥ CREN/CSNET
¥ DDN (Defense Data Net )
¥ ESNET (Energy Sciences Network)
¥ NASA Science Internet
¥ NSFNET (National Science Foundation
Network)
¥ Terrestrial Wideband Network
Internet Networks
The Internet communicates via gateways with networks outside the
Internet, such as CompuServe, MCI Mail, BITNET, FIDONet, UUNET, and
USENET. Within the Internet there are several smaller networks (which
themselves include other networks):
¥ CREN/CSNET (Computer and Science
Network)
¥ DDN (Defense Data Net )
¥ ESNET (Energy Sciences Network)
¥ NASA Science Network
¥ NSFNET (National Science Foundation
Network)
NSFNET Mid-Level Wide Area Networks
BARRNET (Bay Area Regional Research Network)
CERFNET (California Education & Research Federation Network)
CICNET (Committee on Institutional Cooperation Network)
JvNCNET (JvNCNet Northeast Research Regional Network)
LOS NETTOS (Greater Los Angeles Area Network)
MICHNET
MIDNET (Midwestern States Network)
MRNET (Minnesota Regional Network)
NCSANET (National Center for Supercomputing Applications Network)
NEARNET (New England Academic & Research Network)
NEVADANET
NORTHWESTNET (Northwestern States Network)
NYSERNET (New York State Education & Research Network)
OARNET (Ohio Academic Resources Network)
PREPNET (Pennsylvania Research and Economic Partnership Network)
PSCNET (Pittsburgh Supercomputing Center Network)
PSINET
SDSCNET (San Diego Supercomputer Center Network)
SESQUINET (Texas Sesquicentennial Network)
SURANET (Southeastern Universities Research Association Network)
THENET (The Texas Higher Education Network)
USAN (NCAR's University Satellite Network)
VERNET (Virginia Education and Research Network)
WESTNET (Southwestern States Network)
CREN/CSNET
CSNET: The Computer + Science Network
is an international data communications network that supports
research and education. Members of CSNET include universities,
colleges, government agencies, non-profit organizations, and industrial
research laboratories. CSNET is affiliated with twelve foreign
university networks.
CSNET and BITNET are merged into a single organization, CREN, the
Corporation for Research and Educational Networking.
Address:
CREN/CSNET Coordination and
Information Center
BBN Systems and Technologies
10 Moulton St.
Cambridge, MA 02138 USA
E-mail: cic@sh.cs.net
Phone: (617)873-2777 [CSNET hotline]
DDN
The Defense Data Network is a worldwide operational communications
network serving the US Department of Defense. Defense Data Network.
Address:
SRI International
Network Information Systems Center
Room EJ291
333 Ravenswood Avenue
Menlo Park, CA 94015
E-mail: nic@noc.ddn.mil
Phone: 1-800-235-3155 or (415) 859-3695
ESNET
The Energy Sciences Network is a computer data communications
network managed and funded by the Department of Energy Office of
Energy Research (DOE/OER). ESnet is intended for use by scientific
collaborators throughout ER programs.
ESnet is installed and operated by the National Energy Supercomputer
Center
(NERSC), formerly known as the National Magnetic Fusion Energy
Computer Center
(NMFECC), which is located at Lawrence Livermore National Laboratory
(LLNL) in
California. NERSC provides user
services for ESnet.
Address:
NERSC
L-561
Lawrence Livermore Labs
Livermore, Ca. 94550
E-mail: info@es.net
Phone: 1-800-33-ESNET
Contacts:
Jim Leighton, 415-422-4025, jfl@es.net, Network Manager
Tony Hain, 415-422-4200, hain@eagle.es.net, Associate Network
Manager
Bob Aiken, 415-422-4474, aiken@es.net, Network Information and
Services Group
NASA Science Internet
The NASA Science Internet (NSI) supports scientists and flight projects
funded by NASA's Office of Space Science and Applications (OSSA).
Users include NASA sites, and government facilities, research, and
academic sites conducting NASA-funded research. The NSI is a NASA-
wide network with hubs at several NASA centers.
Address:
Network Information Center
NASA Science Network
MS 233-18
NASA Ames Research Center
Moffett Field, CA 94035
E-mail: nsnnic@nsipo.nasa.gov
Phone: (415) 694-5859 or (FTS) 464-5859
TERRESTRIAL WIDEBAND NETWORK
The Terrestrial Wideband Network supports research in high-speed
networking, provides connectivity among academic and government
sites, and supports a testbed for Internet protocol development and
experimentation with applications. It supports a research environment
for multimedia conferencing and voice/video conferencing using
gateways which use a real-time connection-oriented protocol over a
connectionless network.
Address:
Terrestrial Wideband Network
c/o BBN Systems and Technologies
10 Moulton St.
Cambridge, Massachusetts 02138
Attn: Karen Seo
E-mail: wbhelp@bbn.com
Phone: (617) 873-3427 (Terrestrial Wideband Network hotline)
NSFNET
The National Science Foundation Network is the backbone network of
the U.S. National Science Foundation (NSF). It interconnects mid-level
networks and other resources throughout the United States. The
network may be used by researchers in general, according to NSF
guidelines.
Address:
Merit Computer Network
1075 Beal Avenue
Ann Arbor, Michigan 48109
E-mail: nsfnet-info@merit.edu
Phone: 1-800-66-MERIT
Contacts: For information about becoming a part of NSFNET, contact
the NSF Network Service Center (NNSC) at BBN:
NNSC
Bolt Beranek and Newman Inc.
10 Moulton St.
Cambridge, MA 02138
nnsc@nnsc.nsf.net
(617) 873-3400
For information about NSFNET contact NSF, MERIT, or the NNSC (above):
At NSF:
Steve Wolff DNCRI Director
(202) 357-9717 swolff@note.nsf.gov
Jane Caviness NSFNET Deputy Divison Director
(202) 357-9717 jcavines@note.nsf.gov
Dan van Belleghem NSFNET operations and general questions
At Merit:
Eric Aupperle Project Director (313) 763-4897 eaupperle@merit.edu
Hans-Werner Braun Principal Investigator (313) 763-4897 hwb@merit.edu
BARRNet
The Bay Area Regional Research Network is the Northern California
regional hub of the NSFNET. BARRNet members include universities,
government and private research laboratories, and corporate affiliates.
Address:
Pine Hall, Rm. 115
Stanford University
Stanford, CA 94305-4122
Email: info@nic.barrnet.net
Phone: (415) 725-1790
Contacts:
William H. Yundt, Executive Director
Pine Hall Rm. 115
Stanford University
Stanford, CA 94305-4122
gd.why@forsythe.stanford.edu
(415) 723-3104
Philip Almquist, Technical Comittee Chair
Pine Hall, Rm. 115
Stanford University
Stanford, CA 94305-4122
almquist@jessica.stanford.edu
(415) 723-2229
Ron Roberts, Network Operating Center Manager
Business hours: (415) 723-7360
After hours/weekends: (415) 723-1611
barrnet-noc@nic.barrnet.net
CERFNET
The California Education and Research Federation Network, CERFnet, is
a regional network that operates throughout California. CERFnet
membership includes universities, colleges, industrial and government
facilities, hospitals, and libraries.
Address:
CERFnet
c/o San Diego Supercomputer Center
P. O. Box 85608
San Diego, California 92186-9784
Email: help@cerf.net
Phone: (619) 534-5087
Contact:
Karen Armstrong McKelvey
mckelvey@sds.sdsc.edu
CICNet
CICNet is a regional network serving a seven-state region of the
midwestern United States. It connects the members of the Big Ten and
the University of Chicago, as well as corporate and nonprofit
organizations.
Address:
CICNet, Inc.
2901 Hubbard Drive, Pod G
Ann Arbor, MI 48105
E-mail: info@cic.net
Phone: (313) 998-6103
JvNCnet
JvNCnet, the North East Research Regional Network, connects research
organizations concentrated in the Northeastern United States, with
access to the NSFNET backbone and with international connections to
several Scandinavian countries (Norway, Finland, Iceland, Sweden and
Denmark), and the United Kingdom.
Address:
JvNCnet
P.O. Box 3717
Princeton, N.J. 08543
E-mail: nisc@nisc.jvnc.net
Phone: (609) 520-2000 [Sergio Heker]
Contact:
The JvNCnet Network Coordinator:
nisc@nisc.jvnc.net or (609) 520-2000.
Los Nettos
Los Nettos is a regional network in the Los Angeles area. It may be
used for any educational or research purpose. The member
organizations are universities and research laboratories. The
Information Sciences Institute (ISI) of the University of Southern
California (USC) acts as the agent for Los Nettos.
Address:
Los Nettos
c/o Ann Westine
USC/Information Sciences Institute
4676 Admiralty Way
Marina del Rey, California 90292
E-mail: los-nettos-request@isi.edu
Phone: (213) 822-1511 (Ann Westine)
MichNet
MichNet is a statewide network operated by Merit. The network plans
to reach out beyond Merit's traditional audience of four-year, publically
supported colleges and universities in Michigan.
E-mail: Merit_Computer_Network@um.cc.umich.edu
Phone: (412)268-7870
Contact: Eric Aupperle
(313) 764-9423
eaupperle@merit.edu
Midnet
MIDnet is a regional computer network for the seven midwestern
states. The network provides researchers access to supercomputers
and is a vehicle for exchanging information among researchers.
Contact: Dale Finkelson
Phone: (402) 472-5032
E-mail: dmf@westie.unl.edu
MRNet
The Minnesota Regional Network (MRNet) is an NSF regional network
which provides communications between the nationwide NSFNET and
researchers at the Minnesota Supercomputer Center, the University of
Minnesota, and other educational institutions. MRNet also provides
NSFNET access to several Minnesota organizations involved in high-
technology research.
Address:
MRNet
c/o Mahlon Stacy
Mayo Foundation
Medical Sciences 1-18
Rochester, MN 55905
Technical:
MRNet
c/o Jeff Wabik
Minnesota Supercomputer Center
1200 Washington Street
Minneapolis, MN 55415
E-mail: mrnet@nic.mr.net
Phone:
(507) 284-4558 (Mahlon Stacy)
(612) 626-1888 (Jeff Wabik)
NCSAnet
NCSAnet is a regional supercomputing network that connects university
and government research sites primarily located in Illinois, Wisconsin,
and Indiana. The NCSAnet private corporate network is national in
scale.
Address:
NCSAnet
attn: Charlie Catlett
National Center for Supercomputing
Applications
605 E. Springfield Ave.
Champaign, IL 61820
Email: network@ncsa.uiuc.edu
Phone: (217) 244-8297 [NCSA Networking Office]
NEARNET
The New England Academic and Research
Network, NEARnet, is a high-speed network of academic, industrial,
government, and nonprofit organizations in New England.
Address:
NEARnet
c/o BBN Systems and Technologies Corp.
10 Moulton St.
Cambridge, MA 02138
Attn: John Rugo
E-mail: nearnet-staff@bbn.com
Phone: (617) 873-8730 [NEARnet hotline]
NevadaNet
NevadaNet is a state-wide network and currently serves the Desert
Research Institute, the University of Nevada, Reno and the University of
Nevada, Las Vegas.
Address:
NevadaNet
University of Nevada System
Computing Services
4505 Maryland Parkway
Las Vegas, Nevada 89154
E-mail: info@nevada.edu
Phone: (702) 739-3557 [Jim Williams]
Contacts:
NOC Manager: Van Weddle
702-739-3883
weddle@uns-helios.nevada.edu
NIC Manager: Becky Seibert
702-784-4343
seibert@unssun.nevada.edu
NorthWestNet
NorthWestNet (NWNet) is a mid-level network of the National Science
Foundation Network (NSFNET). NWNet provides communication with
NSFNET for research centers throughout the Northwest, including sites
in Alaska, Idaho, Montana, North Dakota, Oregon, and Washington.
Address:
Administrative:
Richard Markwood
Western Interstate Commission on Higher
Education (WICHE)
P.O. Drawer P
Boulder, CO 80301-9752
Technical:
Dan Jordt
University Networks and Distributed
Computing
UW, HG-45
3737 Brooklyn Ave. NE
Seattle, WA 98105
E-mail:
Administrative: markwood@vaxf.colorado.edu
Technical: danj@cac.washington.edu
Phone:
Administrative: (303) 497-0220
Technical: (206) 543-7352
Contact:
The 24x7 NOC hotline number is (206) 543-5128, or noc@nwnet.net.
NYSERNet
NYSERNet is a midlevel network incorporating corporate, academic, and
government institutions.
Address:
NYSERNet Inc.
165 Jordan Rd
Troy, NY 12180
E-mail: info@nisc.nyser.net
Phone: (518) 283-8860
OARnet
The Ohio Academic Resources Network is the regional network for the
state of Ohio. It serves the entire higher education community.
E-mail: alison@maverick.osc.edu
Phone: (614) 292-9248
Contact: Alison Brown
PSCNet
PSCNET is an NSF-sponsored regional research and education network.
E-mail: hastings@morgul.psc.edu
Phone: (412) 268-4960
Contact: Eugene Hastings
PREPnet
Pennsylvania Research and Economic Partnership Network, PREPnet, is
a mid-level network serves Pennsylvania. Organizations operating
within Pennsylvania involved in education, research, technology
transfer, or the economic development of Pennsylvania participate.
Address:
PREPnet
530 N. Neville Street
Pittsburgh, PA 15213
E-mail: prepnet+@andrew.cmu.edu
Phone: (412)268-7870
Contacts:
Executive Director: Thomas W. Bajzek, twb+@andrew.cmu.edu
NIC Manager: Marsha L. Perrott, mlp+@andrew.cmu.edu
PSINet
PSINet is a US-based internetwork available throughout the continental
US and in Canada, Germany, and Israel. The PSINet operations center is
located in Albany NY (another office is located in Santa Clara,
California). PSINet provides internetworking services to the NYSERNet
user community.
Address:
Performance Systems International
11800 Sunrise Valley Drive - Suite 1100
Reston, VA 22091
E-mail: info@psi.com
Phone:
(+1-703) 620-6651
1-800-82psi82
SDSCnet
SDSCnet is a network linking academic, industrial, and government
affiliates with the San Diego Supercomputer Center (SDSC), which
administers the network, and, by extension, NSFNET.
Address:
Paul Love
San Diego Supercomputer Center
PO Box 85608
San Diego, CA 92186-9784
E-mail: loveep@sds.sdsc.edu
Phone: (619)534-5000
Sesquinet
Sesquinet is a regional network in Texas. Its
members include universities, research laboratories, and industrial
organizations
Address:
Guy Almes
Dept. of Computer Science
Rice University
Houston, Texas 77251-1892
E-mail:
almes@rice.edu [Guy Almes]
farrell@rice.edu [Farrell Gerbode]
Phone:
(713) 527-6038 [Almes],
(713) 527-4988 [Gerbode]
SURAnet
SURAnet is an NSFNET mid-level network. SURAnet's geographic area
includes the District of Columbia and thirteen states in the southeast
US: Alabama, Delaware, Florida, Georgia, Kentucky, Louisiana, Maryland,
Mississippi, North Carolina, South Carolina, Tennessee, Virginia and
West Virginia. While SURA, the parent organization, is a consortium of
academic organizations, SURAnet members comprise approximately
two-thirds academic institutions and one-third non-academic sites.
Address:
SURAnet
Computer Science Center
University of Maryland
College Park, MD 20742-2411
attn: Dr. Jack Hahn
E-mail:
hahn@umd5.umd.edu,
suranet-admin@noc.sura.net
Phone: (301)454-5434 [Hahn]
Contacts:
Network Operations Center (NOC)
Hours: 0800-1630 Manager: Mark Oros
Hotline: (301) 454-8055 oros@umd5.umd.edu
SURAnet Personnel: suranet-admin@noc.sura.net
NOC Personnel: noc-staff@noc.sura.net
User Problems: help@noc.sura.net
THEnet
The Texas Higher Education Network is an NSFNET regional network
that covers the state of Texas, with a link to the Instituto Tecnologico
y de Estudios Superiores de Monterrey in Monterrey, Mexico. Network
information and operations management are provided through the
University of Texas (UT) System Office of Telecommunication Services
(OTS).
Address:
Texas Higher Education Network
Information Center
Commons Building Room 1.156A
Balcones Research Center
10100 Burnet Road
Austin, TX 78758-4497
E-mail:
THEnet (DECnet):+THENIC::INFO
BITNET:+INFO@THENIC
Internet:+info@nic.the.net
SPAN:+UTSPAN::THENIC::INFO
Phone: (512) 471-2444
USAN
USAN (University Satellite Network) is a discipline-oriented network
serving organizations that do research in the atmospheric and
oceanographic sciences. Current members are the Universities of
Miami, Oregon State, Penn State, Maryland, Wisconsin, the Institute of
Naval Oceanography, the Naval Research Lab, and Woods Hole
Oceanographic Institute. The primary use of the network is for access
to supercomputer facilities at NCAR; secondary use is for access to the
Internet.
Address:
National Center for Atmospheric Research
USAN Network/Scientific Computing
Division
1850 Table Mesa Drive
P.O. Box 3000
Boulder, CO 80307
E-mail: morris@ncar.ucar.edu
Phone: (303) 497-1282 [Don Morris]
VERNet
The Virginia Education and Research Network
is the regional network for the state of Virginia.
E-mail: jaj@crash.virginia.edu
Phone: (804) 924-0616
Contacts: Jim Jokl
Westnet
Westnet is a regional network with nodes in the states of Arizona,
Colorado, southern Idaho, New Mexico, Utah and Wyoming. The member
organizations are universities, research laboratories, and commercial
organizations.
Addresses:
Administrative:
Westnet
c/o Patrick J. Burns
Department of Mechanical Engineering
Colorado State University
Fort Collins, CO 80523
Technical:
Westnet
c/o Carol Ward
3645 Marine Street
University of Colorado
Boulder, C0 80309-0455
E-mail: westnet@spot.colorado.edu
Phone:
(303) 491-1575 [Pat Burns]
(303) 492-5860 [Carol Ward]
Net Etiquette
"Etiquette" means "ticket" in French. On the Internet, "netiquette" is
your ticket to "travelling" (by FTP, TELNET, and electronic mail)
without annoying others.
Electronic mail messages can be informal, but thought should be given
before they are sent. Don't send a message until you have taken time to
review its contents and header. Make sure your message is correctly
addressed (that you aren't copying it to a group address unintentionally
or unwisely), that it is free of typos, and that you really mean what it
says. Especially when sending a message to a mailing list or bboard
(see Interest Groups), try to be clear and consise.
Addresses
When you send Internet electronic mail, make sure that the "From:"
field in the headers of your messages can be used to generate replies
from Internet hosts. The "From:" field should contain either a full
Internet address, for example,
From: socrates@agora.edu
or your "signature" name plus the Internet address enclosed in "angle
brackets":
From: "Socrates Jones" <socrates@agora.edu>
The following From: fields will prevent people on the Internet from
replying to your messages:
From: groucho@cs (No domain name!)
From: cs!groucho (uucp address)
From: cs!groucho@fredonia.edu
(This might work, but test it!)
DECNET, VAX/VMS, and BITNET addresses will also have problems.
Hopefully, your host gateways to the Internet through a host that
rewrites addresses so that Internet hosts can reply to them.
Check the address of the recipient of your message. If you are not sure
of an address, don't guess. Electronic mail addresses are very
unforgivingÑyou must get every character exactly right.
The quickest way to check an address is by telephone. If you can't do
that, try to find the domain for the organization, and send email to
postmaster@domain (using the domain name). Or send a U.S. postal
letter to the recipient and ask for a reply by electronic mail. If the
email address is wrong, you should get the message back eventually,
but it can take three days to a week to return.
Many mailing lists (see Interest Groups) are distributed by 'repeater'
programs. For example, when you send a message to unix-
pmdf@sh.cs.net, the message is automatically re-mailed to everyone on
the mailing list.
Be careful of thisÑthere is nothing in the name of a repeater list to
help you distinguish it from a non-repeating address. Inadvertently
sending a private message to a mailing list can be embarrassing, and
someone on the list might "flame" at you. Always assume a list
address is a 'repeater'. Check the header before you send a message to
make sure there is no extra address in the "To:" or "Cc." field.
Many lists (such as dip-people) have a special "-request" address (such
as dip-people-request@relay.cs.net). Be careful to send requests to be
added or dropped from the list to the moderator or the -request
address, and not to the whole list.
Netiquette for Groups
Check with your system administrator to see what newsgroups are
available to you and how to use them.
The following is based on The USENET Primer on How to Work With the
USENET Community by Gene Spafford
Never Forget that the Person on the Other Side is Human
Because your interaction with the network is through a computer, it is
easy to forget that there are people "out there." Situations arise
where emotions erupt into a verbal free-for-all that can lead to hurt
feelings. Strongly critical messages on the network are called
"flames." The following will help you to avoid sending or provoking
flames.
Try not to say anything to others that you would not say to them in
person in a room full of people. Please remember that when you send a
messsage to a bulletin board or mailing list, people all over the world
are reading your words.
Don't attack peopleÑtry to persuade them by presenting facts. Cursing
and abuse only make people less willing to help when you need it.
If you are upset at something or someone, wait until you have had a
chance to calm down and think about it. A cup of coffee or a good
night's sleep works wonders on your perspective. Hasty words create
more problems than they solve.
Be Careful What You Say About Others
Please rememberÑthousands of people may read your message. They
quite possibly include your boss, your friend's boss, your girlfriend's
brother's best friend, and one of your father's beer buddies.
Information posted on the net can come back to haunt you or the person
you are talking about.
Think twice before you post personal information about yourself or
others.
Be Brief
Say what you have to say succinctly and it will have a greater impact.
Remember that the longer you make your article, the fewer people will
bother to read it.
Your Postings Reflect Upon YouÑBe Proud of Them
Most people will know you only by what you say and how well you say
it. Take some time to make sure each posting won't embarrass you
later. Minimize your spelling errors and make sure that the article is
easy to read and to understand.
Use Descriptive Titles
The subject line of an article enables people to decide whether or not
to read your article. Tell people what the article is about before they
read it. A title like "Car for Sale" does not help as much as "66 MG
Midget for sale: Beaverton OR." Don't expect people to read your article
to find out what it's about Ñ many won't bother. Some sites truncate
the length of the subject line to forty characters, so keep your subjects
short and to the point.
Think About Your Audience
When you post an article, think about the people you are trying to reach.
Try to get the most appropriate audience for your message, not the
widest.
Avoid abbreviations and acronyms, if possible, and define the ones you
use.
If your message is of interest to a limited geographic area
(apartments, car sales, meetings, concerts, etc...), restrict the
distribution of the message to your local area. Some areas have special
newsgroups with geographical limitationsÑcheck with your system
administrator.
If you want to try a test of something, don't use a world-wide
newsgroup! There are
newsgroups that are local to your computer or area, which should be
used for this. Your system administrator can tell you what they are.
Be familiar with the group you are posting to before you post.
You shouldn't post to groups you don't read, or to groups you've only read
a few articles fromÑyou may not be familiar with the conventions and
themes of the group. One normally does not join a conversation by just
walking up and talking. Instead, you listen first and then join in if you
have something pertinent to contribute.
Be Careful with Humor and Sarcasm
Without the voice inflections and body language of personal
communications, it's easy for remarks meant to be funny to be
misinterpreted. Subtle humor tends to get lost. Take steps to make
sure that people realize you are trying to be funny. The net has
developed a symbol called the smiley face, which looks like this: :-) It
points out sections of articles with humorous intent. No matter how
broad the humor or satire, it is safer to remind people that you are
being funny.
But also be aware that frequently satire is posted without explicit
indications. If an article outrages you strongly, ask yourself if it may
have been unmarked satire. Several self-proclaimed connoisseurs
refuse to use smiley faces, so take heed or you may make a temporary
fool of yourself.
Only Post a Message Once
Avoid posting messages to more than one group unless you are sure it
is appropriate. If you do post to multiple groups, don't post to each
group separately. Instead, specify all the groups on a single message.
This reduces network overhead and lets people who subscribe to more
than one of those groups see the message once instead of having to
wade through each copy.
Please "Rotate" Messages With Questionable Content
Certain messages may be offensive to some people. To make sure that
these messages are not read unless they are explicitly requested, they
should be encrypted. The standard encryption method is to rotate each
letter by thirteen characters so that an "a" becomes an "n." This is
known on the network as "rot13"; when you rotate a message the word
"rot13" should be in the "Subject:" line.
Most of the software used to read network articles has some way of
encrypting and decrypting messages. Your system administrator can
tell you how the software on your system works, or you can use the
Unix command "tr [a-z][A-Z] [n-z][a-m][N-Z][A-M]". (Note that some
versions of Unix don't require the [] in the "tr" command. In fact, some
systems will
get upset if you use them in an unquoted manner. The following should
work for everyone, but may be shortened on some systems: tr '[a-m][n-
z][A-M][N-Z]'
'[n-z][a-m][N-Z][A-M]'ÑDon't forget the single quotes!)
Summarize What You are Following Up
When you are following up someone's article, please summarize the
parts of the article to which you are responding. This allows readers
to appreciate your comments rather than trying to remember what the
original article said. It is also possible for your response to reach
some sites before the original article does!
Summarization is best done by including appropriate quotes from the
original article. Don't include the entire article, since it will
irritate the people who have already seen it. Even if you are responding
to the entire article, summarize only the major points you are
discussing.
When Summarizing, Summarize!
When you request information from the network, it is common courtesy
to report your findings so that others can benefit as well. The best
way of doing this is to take all the responses that you received and edit
them into a single article that is posted to the places where you
originally posted your question. Take the time to strip headers,
combine duplicate information, and write a short summary. Try to
credit the information to the people that sent it to you, where possible.
Use Mail, Don't Post a Follow-up
One of the biggest problems we have on the network is that when
someone asks a question, many people send out identical answers.
When this happens, dozens of identical answers pour through the net.
Mail your answer to the person and suggest that they summarize to the
network. This way the net will only see a single copy of the answers,
no matter how many people answer the question.
If you post a question, please remind people to send you the answers by
mail and at least offer to summarize them to the network.
Read All Follow-ups and Don't Repeat What Has Already Been Said
Before you submit a follow-up to a message, read the rest of the
messages in the newsgroup to see whether someone has already said
what you want to say. If someone has, don't repeat it.
Check the Headers When Following Up
Some software has provisions to specify that follow-ups to an article
should go to a specific set of newsgroupsÑpossibly different from the
newsgroups to which the original article was posted. Sometimes the
groups chosen for follow-ups are inappropriate, especially as a thread
of discussion changes with repeated postings. You should carefully
check the groups and distributions given in the header and edit them as
appropriate. If you change the groups named in the header, or if you
direct follow-ups to a particular group, say so in the body of the
messageÑnot everyone reads the headers of postings.
Be Careful About Copyrights and Licenses
Once something is posted onto the network, it is *probably* in the
public domain unless you own the appropriate rights (for example, if
you wrote it yourself) and you post it with a valid copyright notice; a
court would have to decide the specifics and
there are arguments for both sides of the issue.
Now that the US has ratified the Berne convention, the issue is even
murkier. For all practical purposes, though, assume that you
effectively give up the copyright if you don't put in a notice. Of course,
the information becomes public, so you mustn't post trade secrets that
way.
Keep in mind that material that is UNIX-related may be restricted by
the license you or your company signed with AT&T, so be careful not to
violate it. You should also be aware that posting movie reviews, song
lyrics, or anything else published under a copyright could cause you,
your company, or members of the net community to be held liable for
damages, so we highly recommend caution in using this material.
Cite Appropriate References
If you are using facts to support a cause, state where they came from.
Don't take someone else's ideas and use them as your own. You don't
want someone pretending that your ideas are theirs; show them the
same respect.
Mark or Rotate Answers and Spoilers
When you post something (like a movie review that discusses a detail
of the plot) that might spoil a surprise for other people, please mark
your message with a warning so that they can skip the message.
Another alternative would be to use the "rot13" protocol to encrypt the
message so it cannot be read accidentally. When you post a message
with a spoiler in it make sure the word "spoiler" is part of the
"Subject:" line.
Spelling Flames Considered Harmful
Every few months a plague descends on the network called the spelling
flame. It starts out when someone posts an article correcting the
spelling or grammar in some article. The immediate result seems to be
for everyone on the net to turn into a sixth grade English teacher and
pick apart each other's posting. This is not productive and tends to
cause people to get angry with each other.
It is important to remember that we all make mistakes, and that there
are many users on the net who use English as a second language. There
are also a number of people who suffer from dyslexia and who have
difficulty noticing their spelling mistakes. If you feel that you must
make a comment on the quality of a posting, please do so by mail, not
on the network.
Don't Overdo Signatures
Many people can have a signature added to their postings automatically
by placing it in a file called "$HOME/.signature". Don't overdo it.
Signatures can tell the world something about you, but keep them short.
A signature that is longer than the message itself is considered to be
in bad taste. The main purpose of a signature is to help people locate
you, not to tell your life story. Every signature should include at least
your return
address relative to a major, known site on the network and a proper
domain-format address. Your system administrator can give this to
you. Some news posters attempt to enforce a four-line limit on
signature filesÑan amount that should be more than sufficient to
provide a return address and attribution.
Limit Line Length and Avoid Control Characters
Try to keep your text in a generic format. Many (if not most) of the
people reading Usenet do so from eighty-column terminals or from
workstations with eighty-column terminal windows. Try to keep your
lines of text to less than eighty-characters for optimal readability.
Also realize that there are many, many different forms of terminals in
use.
If you enter special control characters in your message, it may result
in your message being unreadable on some terminal types; a character
sequence that causes reverse video on your screen may result in a
keyboard lock and graphics mode on someone else's terminal. You
should try to avoid the use of tabs, too, since they may also be
interpreted differently on terminals other than your own.
Summary of Things to Remember
Never forget that the person on the other side is human
Be careful what you say about others
Be brief
Your postings reflect upon you; be proud of them
Use descriptive titles
Think about your audience
Be careful with humor and sarcasm
Only post a message once
Please rotate material with questionable content
Summarize what you are following up
Use e-mail, don't post a follow-up
Read all follow-ups and don't repeat what has already been said
Double-check follow-up newsgroups and distributions.
Be careful about copyrights and licenses
Cite appropriate references
When summarizing, summarize
Mark or rotate answers or spoilers
Spelling flames are considered harmful
Don't overdo signatures
Limit line length and avoid control characters
(*)UNIX is a registered trademark of AT&T.
Electronic Mail
Electronic mail allows you to exchange messages with other computer
users (or groups of users) via a communications network. Electronic
mail is one of the most popular uses of the Internet.
The Internet standard for naming computers is called the "domain
system."
Different computers use different software for electronic mail. UNIX
systems, for example, may use UNIX mail, mh, msg, or something else.
Different software uses different commands. Ask the Postmaster at
your site how to use electronic mail on your system.
Domain System
The Internet standard for naming computers is called the "domain
system." This hierarchical system references values such as country,
type of organization, organization name, division name, and computer
name. Below is an example:
joe@bitsy.mit.edu
The information in a mail address becomes more global as you read
from left to right. The user's name is always to the left of an @ sign.
Computer and organization names are always to the right. In the
example above, the person, Joe, receives his mail on a computer called
"bitsy" at MIT. Because MIT is an educational organization, it is
included in the top-level domain "edu". Other top-level domains are
listed below:
com commercial
gov government
mil military
org nonprofit organization
net network operation and info centers
Outside of the U.S., top-level domains are two-letter country codes
such as these:
au Australia
il Israel
jp Japan
uk United Kingdom
Finding Mail Addresses
You can learn the electronic mail address of another person by asking
him or by using one of the following resources:
¥ A postmaster at the recipient's organization can provide the correct
address when you know the the domain name of the organization. Send
a message requesting help to postmaster@domain.
¥ The DDN Network Information Center (DDN NIC) in Menlo Park,
California, maintains a "white pages" directory of computer users,
hosts, and domains on the Internet. You can use Telnet to access this
database on a computer called nic.ddn.mil. Many computers also have a
program called whois, which automatically accesses the DDN NIC
database. Ask your system administrator whether your computer has
whois.
UNIX mail Manual
This is the UNIX (see BSD) manual entry for mail, a common electronic
mail system. Your site may use other electronic mail softwareÑ check
with your system administrator.
NAME
mail - send or read mail
SYNTAX
mail [-v] [-i] [-n] [-e] [-s subject] [user...]
mail [-v] [-i] [-n] -f [name]
mail [-v] [-i] [-n] -u user
mail nodename::username (If DECnet is installed.)
The mail utility is an intelligent mail processing system which has a
command syntax similar to ed. However, in mail lines are replaced by
messages. If DECnet is installed on your system, you can also send and
receive mail from other DECnet users.
Sending mail. To send a message to one or more persons, type mail and
the names of the people to receive your mail.
Press the return key. You are then prompted for a subject.
After entering a subject, and pressing the return key, type your
message. To send the message, type on a blank line.
You can use tilde (~) escape sequences to perform special functions
when composing mail messages. See the list of options for more on
tilde escape sequences.
Reading mail. In normal usage mail is given no arguments and checks
your mail out of the mail directory. Then it prints out a one line header
of each message there. The current message is initially the first
message and is numbered 1. It can be displayed using the print
command.
The -e option causes mail not to be printed. Instead, an exit value is
returned. For the exit status, see RETURN VALUES. You can move among
the messages by typing a plus sign (+) followed by a number to move
forward that many messages, or a minus sign (-) followed by a number
to move backward that many messages.
Disposing of mail. After reading a message you can delete (d) it or
reply (r) to it. Deleted messages can be undeleted, however, in one of
two ways: you can use the undelete (u) command and the number of the
message, or you can end the mail session with the exit (x) command.
Note that if you end a session with the quit (q) command, you cannot
retrieve deleted messages.
Specifying messages. Commands such as print and delete can be given a
list of message numbers as arguments. Thus, the command
delete 1 2
deletes messages 1 and 2, while the command
delete 1-5
deletes messages 1 through 5. The asterisk (*) addresses all
messages, and the dollar sign ($) addresses the last message. For
example, the top command, which prints the first few lines of a
message, can be used in the following manner to print the first few
lines of all messages:
top *
Replying to or originating mail. Use the reply command to respond to a
message.
Ending a mail processing session. End a mail session with the quit (q)
command. Unless they were deleted, messages that you have read go to
your mbox file. Unread messages go back to the mail directory. The -f
option causes mail to read in the contents of your mbox (or the
specified file) for processing. When you quit, the mail utility writes
undeleted messages back to this file. The -u flag is a short way of
specifying: mail -f /usr/spool/mail/user.
Personal and systemwide distribution lists. You can create a personal
distribution list that directs mail to a group of people. Such lists can
be defined by placing a line similar to the following in the .mailrc file
in your home directory:
alias cohorts bill ozalp jkf mark kridle@ucbcory
Cohorts is the name of the distribution list that consists of the
following users: bill, ozalp, jkf, mark, and kridle@ucbcory. A list of
current aliases can be displayed with the alias (a) command in mail.
System-wide distribution lists can be created by editing
/usr/lib/aliases. The syntax of system-wide lists differs from that of
personally defined aliases.
Personal aliases are expanded in mail you send. When a recipient on a
personally defined mailing list uses the reply (r) option, the entire
mailing list receives the response automatically. System-wide aliases
are not expanded when the mail is sent, but any reply returned to the
machine will have the system-wide alias expanded as all mail goes
through sendmail.
Options
-e Causes mail not to be printed. Instead, an exit value is returned.
-f Causes mail to read in the contents of your mbox file (or another
file you specify) for processing.
-i Causes tty interrupt signals to be ignored. This is useful when
using mail on noisy phone lines.
-n Inhibits the reading of /usr/lib/mail.rc.
-s Specifies a subject on the command line. Note that only the
first argument after the -s flag is used as a subject and that you must
enclose subjects containing spaces in quotes.
-u Specifies a short hand for expressing the following: mail -f
/usr/spool/mail/user
-v Prints the mail message. The details of delivery are displayed
on the user's terminal.
The following options can be set in the .mailrc file to alter the
behavior of the mail command. Each command is typed on a line by
itself and may take arguments following the command word and the
command abbreviation. For commands that take message lists as
arguments, if no message list is given, then the next message forward
which satisfies the command's requirements is used. If there are no
messages forward of the current message, the search proceeds
backwards. If there are no good messages at all, mail cancels the
command, displaying the message: No applicable messages.
- Prints out the previous message. If given a numeric argument n,
prints n-th previous message.
? Prints a brief summary of commands.
! Executes the ULTRIX shell command which follows.
alias (a) Prints out all currently defined aliases, if given without
arguments. With one argument, prints out that alias. With more than
one argument, creates a new or changes an old alias. These aliases are
in effect for the current mail session only.
alternates (alt) Informs mail that you have several valid addresses.
The alternates command is useful if you have accounts on more than
one machine. When you reply to messages, mail does not send a copy of
the message to any of the addresses listed on the alternates list. If
the alternates command is given with no argument, the current set of
alternate names is displayed.
chdir (ch) Changes the user's working directory to that specified. If
no directory is given, then the chdir command changes to the user's
login directory.
copy (co) Takes a message list and file name and appends each
message to the end of the file. The copy command functions in the
same way as the save command, except that it does not mark the
messages that you copy for deletion when you quit.
delete (d) Takes a list of messages as argument and marks them all
as deleted. Deleted messages are not saved in mbox, nor are they
available for most other commands.
dp (or dt) Deletes the current message and prints the next message.
If there is no next message, mail returns a message: at EOF.
edit (e) Takes a list of messages and points the text editor at each
one in turn. On return from the editor, the message is read back in.
exit (ex or x) Returns to the shell without modifying the user's
system mailbox, mbox file, or edit file in -f.
file (fi) Switches to a new mail file or folder. If no arguments are
given, it tells you which file you are currently reading. If you give it an
argument, it writes out changes (such as deletions) you have made in
the current file and reads in the new file. Some special conventions
are recognized for the name. A pound sign (#) indicates the previous
file, a percent sign (%) indicates your systemb mailbox, %user indicates
the user's system mailbox, an ampersand (&) indicates your ~/mbox
file, and +folder indicates a file in your folder directory.
folders List the names of the folders in your folder directory.
folder (fo) Switches to a new mail file or folder. The folder
command functions in the same way as the file command.
from (f) Takes a list of messages and prints their message headers
in the order that they appear in the mail directory, not in the order
given in the list.
headers (h) Lists the current range of headers, which is an eighteen-
message group. If a plus sign (+) is given as an argument, then the next
message group is printed. If a minus sign (-) is given as an argument,
the previous message group is printed.
help Prints a brief summary of commands. Synonymous with ?.
hold (ho, also preserve) Takes a message list and marks each
message in it to be saved in the user's system mailbox instead of in
mbox. The hold command does not override the delete command.
ignore Adds the list of header fields named to the ignored list.
Header fields in the ignore list are not printed on your terminal when
you print a message. This command is frequently used to suppress
certain machine-generated header fields. The Type and Print commands
are used to print a message in its entirety, including ignored fields. If
ignore is executed with no arguments, it lists the current set of
ignored fields.
mail(m) Takes login names and distribution group names as
arguments and sends mail to those people.
mbox Indicates that a list of messages should be sent to mbox in
your home directory when you quit. This is the default action for
messages if you did not set the hold option.
next (n, + or CR) Goes to the next message in sequence and types it.
With an argument list, it types the next matching message.
preserve (pre) Takes a message list and marks each message in it to
be saved in the user's system mailbox instead of in mbox . Synonymous
with the hold command.
print (p) Takes a message list and types out each message on the
user's terminal, without printing any specified ignored fields.
Print (P) Prints a message in its entirety, including specified
ignored fields.
quit (q) Terminates the session. All undeleted, unsaved messages
are saved in the user's mbox file in his login directory; all messages
marked with hold or preserve or that were never referenced are saved
in his system mailbox; and all other messages are removed from his
system mailbox.
If new mail arrives during the session, the user receives the message
"You have new mail." If given while editing a mailbox file with the -f
flag, then the edit file is rewritten. A return to the Shell is effected,
unless the rewrite of the edit file fails, in which case the user can
escape with the exit command.
reply (r) Takes a message list and sends mail to the sender and all
recipients of the specified message. The default message must not be
deleted.
Reply (R) Replies to originator of the message. Does notreply to
other recipients of the original message.
respond Takes a message list and sends mail to the sender and all
recipients of the specified message. Synonymous with reply.
save (s) Takes a message list and a file name and appends each
message to the end of the file. The messages are saved in the order in
which they appear in the mail directory, not in the order given in the
message list. The filename, which is enclosed in quotes, followed by
the line count and character count, is displayed on the user's terminal.
set (se) Prints all variable values when no arguments are given.
Otherwise, the set command sets the specified option. Arguments
either take the form: option=value or option.
shell (sh) Invokes an interactive version of the shell.
size Takes a message list and prints out the size (in characters) of
each message. The size of the messages are printed in the order that
they appear in the mail directory, not in the order given in the list.
source (so) Reads mail commands from a file.
top Takes a message list and prints the top few lines of each. The
number of lines printed is controlled by the variable toplines and
defaults to five.
type (t) Takes a message list and types out each message on the
user's terminal, without printing any specified ignored fields.
Synonymous with print.
Type (T) Prints a message in its entirety, including specified
ignored fields. Synonymous with Print.
unalias Takes a list of names defined by alias commands and
cancels the list of users. The group names no longer have any
significance.
undelete (u) Takes a message list and marks each one as not being
deleted.
unset Takes a list of option names and discards their remembered
values; the inverse of set.
visual (v) Takes a message list and invokes the display editor on
each message.
write (w) Takes a message list and a file name and appends each
message to the end of the file. Synonymous with save.
xit (x) Returns to the Shell without modifying the user's system
mailbox, mbox , or edit file in -f. Synonymous with exit.
z Presents message headers in windowfulls as described under the
headers command. You can move forward to the next window with the z
command. Also, you can move to the previous window by using z-.
The following is a summary of the tilde escape functions that you can
use when composing mail messages. Note that you can only invoke
these functions from within the body of a mail message and that the
sequences are only executed if they are placed at the beginning of lines.
~!command Executes the indicated shell command, then returns to
the message.
~? Prints a brief summary of tilde commands.
~: Executes the mail commands. (For example, the command ~:10
prints out message number 10 while ~:- prints out the previous
message.
~c name ... Adds the given names to the list of carbon copy
recipients.
~d Reads the file named dead.letter from your home directory into
the message.
~e Invokes the text editor on the message you are typing. After the
editing session is finished, you may continue appending text to the
message.
~f messages Reads the named messages into the message being
sent. If no messages are specified, reads in the current message.
~h Edits the message header fields by typing each one in turn and
allowing the user to append text to the end or to modify the field by
using the current terminal erase and kill characters.
~m messages Reads the named messages into the message being
sent, shifted one tab space to the right. If no messages are specified,
reads the current message.
~p Prints out the message on your terminal, prefaced by the
message header fields.
~q Aborts the message being sent, copying the message to
dead.letter in your home directory if the save option is set.
~r filename Reads the named file into the message.
~s string Causes the named string to become the current subject
field.
~t name ... Adds the given names to the direct recipient list.
~v Invokes an alternate editor (defined by the VISUAL option)
on the message. Usually, the alternate editor is a screen editor. After
you
quit the editor, you can resume appending text to the end of your
message.
~w filename Writes the message onto the named file.
~|command Pipes the message through the command as a filter. If
the command gives no output or terminates abnormally, retains the
original text of the message. The command fmt(1) is often used as
command to rejustify the message.
~~string Inserts the string of text in the message prefaced by a
single tilde (~). If you have changed the escape character, then you
should double that character in order to send it.
Options are controlled via the set and unset commands. Options may be
either binary or string. If they are binary you should see whether or not
they are set; if they are string it is the actual value that is of interest.
The binary options include the following:
append Causes messages saved in mbox to be appended rather than
prepended. (This is set in /usr/lib/Mail.rc on version 7 systems.)
ask Causes mail to prompt you for the subject of each message you
send. If you simply respond with a new line, no subject field is sent.
askcc Asks you at the end of each message whether you want to
send a carbon copy of the message to additional recipients. Responding
with a new line indicates your satisfaction with the current list.
autoprint Causes the delete command to behave like dp - thus,
after deleting a message, the next one is typed automatically.
debug Causes mail to output information useful for debugging mail.
Setting the binary option debug is the same as specifying -d on the
command line.
dot Causes mail to interpret a period alone on a line as the
terminator of a message you are sending.
hold Holds messages in the system mailbox by default.
ignore Causes interrupt signals from your terminal to be ignored
and echoed as at signs (@).
ignoreeof Causes mail to refuse to accept a control-d as the end of
a message.
msgprompt Prompts you for the message text and indicates how to
terminate the message.
metoo Includes the sender in the distribution group receiving a
mail message.
nosave Prevents mail from copying aborted messages into the
dead.letter file in your home directory.
quiet Suppresses the printing of the version when first invoked.
verbose Displays the details of each message's delivery on the
user's terminal. Setting the verbose option is the same as typing -v on
the command line.
The string options include the following:
EDITOR Pathname of the text editor to use in the edit command and
~e escape. If not defined, then a default editor is used.
SHELL Pathname of the shell to use in the ! command and the ~!
escape. A default shell is used if this option is not defined.
VISUAL Pathname of the text editor to use in the visual command
and ~v escape.
crt Threshold to determine how long a message must be before
more is used to read it.
escape The first character of this option gives the character to use
in the place of tilde (~) to denote escapes, if defined.
folder Directory name to use for storing folders of messages. If
this name begins with a backslash (/) mail considers it an absolute
pathname; otherwise, the folder directory is found relative to your
home directory.
record Pathname of the file used to record all out-going mail. If
it is not defined, then out-going mail is not so saved.
toplines The number of lines of a message that is printed out with
the top command; normally, the first five lines are printed.
RETURN VALUES
If mail is invoked with the -e option, the following exit values are
returned:
0 the user has mail
1 the user has no mail
FILES
/usr/spool/mail/* mail directory
~/mbox your read mail
~/.mailrc file giving initial mail
commands
/tmp/R# temporary for editor escape
/usr/lib/Mail.help* help files
/usr/lib/Mail.rc system initialization file
Message* temporary for editing messages
This is the manual entry for the mail utility on the VMS operating
system, a common electronic mail system. Your site may use other
electronic mail softwareÑ check with your system administrator.
The VMS Personal Mail Utility (MAIL), is used to send messages to
other users. For a complete description of the VMS Personal Mail
Utility, including information about the MAIL command and its
qualifiers, see the VMS Mail Utility Manual.
Format:
MAIL [file-spec] [recipient-name]
Additional information available:
Parameters Command_Qualifiers
/PERSONAL_NAME /SUBJECT /EDIT /SELF
Examples
MAIL Subtopic? /personal
MAIL
/PERSONAL_NAME
/PERSONAL_NAME=name
/NOPERSONAL_NAME
Specifies the personal name to be used when sending a message. This
qualifier does not override the default personal name; the personal
name is changed only for the current message. Specifying
/NOPERSONAL_NAME removes the default personal name for the current
message.
MAIL Subtopic? /subject
MAIL
/SUBJECT
/SUBJECT=text
Specifies the subject of the message for the heading. If the text
consists of more than one word, enclose the text in quotation marks
(").
You must include a file specification on the command line to enable
this qualifier.
If you omit this qualifier, the message is sent without a subject
notation.
MAIL Subtopic? /edit
MAIL
/EDIT
/EDIT=[(send,reply=extract,forward)]
Sets the default to /EDIT for the SEND, REPLY, and FORWARD commands.
MAIL Subtopic? /self
MAIL
/SELF
/SELF
Sends a copy of the message containing the file specification on the
command line back to you.
MAIL Subtopic? exam
MAIL
Examples
1. $ MAIL
MAIL>
This MAIL command invokes MAIL to process commands interactively.
2. $ MAIL/SUBJECT="New Project" PROJECT.DOC JONES,SMITH,ADAMS
This MAIL command specifies that the file named PROJECT.DOC is to be
sent to users JONES, SMITH, and ADAMS, with a subject description of
New Project in the heading.
3. $ MAIL/SUBJECT="Vacation Policy Change" NEWSLETTR "@USERS"
This MAIL command invokes MAIL to send the file NEWSLETTR.TXT to all
the users named in the file USERS.DIS. The subject description is
Vacation Policy Change.
RCCA> mail
You have 1 new message.
MAIL> dir
NEWMAIL
# From Date Subject
1 IN%"RBEAUPRE@ccr2.bb 22-AUG-1990 END OF SHIFT
MAIL> send
To: mlbanker
Subj: test
Enter your message below. Press CTRL/Z when complete, or CTRL/C to
quit:
this is a test message
MAIL> read
#1 22-AUG-1990 11:51:41.03 NEWMAIL
From: IN%"RBEAUPRE@ccr2.bbn.com" "Ray Beaupre"
To: TURNOVER@mikey.bbn.com
CC:
Subj: END OF SHIFT
From: Ray Beaupre <RBEAUPRE@ccr2.bbn.com>
Subject: END OF SHIFT
To: TURNOVER@mikey.bbn.com
X-VMS-To: TURNOVER
Worked in Building 20 with Max Stepp last night in the 7th Floor Lab. I
was trained on the following Building 20 systems.
MAIL> delete 1
MAIL> exit
%MAIL-I-RECLPLSWAIT, reclaiming deleted file space. Please wait...
VMS Mail Utility Manual
mail(1)
NAME
mail - send or read mail
SYNTAX
mail [-v] [-i] [-n] [-e] [-s subject] [user...]
mail [-v] [-i] [-n] -f [name]
mail [-v] [-i] [-n] -u user
mail nodename::username (If DECnet is installed.)
DESCRIPTION
The mail utility is an intelligent mail processing system which has
a command syntax similar to ed. However, in mail lines are replaced by
messages. If DECnet is installed on your system, you can also send and
receive mail from other DECnet users.
Sending mail. To send a message to one or more persons, type mail
and the names of the people to receive your mail.
Press the RETURN key. You are then prompted for a subject.
After entering a subject, and pressing the RETURN key, type your
message. To send the message, type on a blank line.
You can use tilde (~) escape sequences to perform special functions
when composing mail messages. See the list of options for more on
tilde escape sequences.
Reading mail. In normal usage mail is given no arguments and
checks your mail out of the mail directory. Then it prints out a one line
header of each message there. The current message is initially the
first message and is numbered 1. It can be displayed using the print
command.
The -e option causes mail not to be printed. Instead, an exit value is
returned. For the exit status, see RETURN VALUES. You can move among
the messages by typing a plus sign (+) followed by a number to move
forward that many messages, or a minus sign (-) followed by a number
to move backward that many messages.
Disposing of mail. After reading a message you can delete (d) it or
reply (r) to it. Deleted messages can be undeleted, however, in one of
two ways: you can use the undelete (u) command and the number of the
message, or you can end the mail session with the exit (x) command.
Note that if you end a session with the quit (q) command, you cannot
retrieve deleted messages.
Specifying messages. Commands such as print and delete can be
given a list of message numbers as arguments. Thus, the command
delete 1 2
deletes messages 1 and 2, while the command
delete 1-5
deletes messages 1 through 5. The asterisk (*) addresses all
messages, and the dollar sign ($) addresses the last message. For
example, the top command, which prints the first few lines of a
message, can be used in the following manner to print the first few
lines of all messages:
top *
Replying to or originating mail. Use the reply command to respond
to a message.
Ending a mail processing session. End a mail session with the quit
(q) command. Unless they were deleted, messages that you have read go
to your mbox file. Unread messages go back to the mail directory. The -
f option causes mail to read in the contents of your mbox (or the
specified file) for processing. When you quit, the mail utility writes
undeleted messages back to this file. The -u flag is a short way of
specifying: mail -f /usr/spool/mail/user.
Personal and systemwide distribution lists. You can create a
personal distribution list that directs mail to a group of people. Such
lists can be defined by placing a line similar to the following in the
.mailrc file in your home directory:
alias cohorts bill ozalp jkf mark kridle@ucbcory
Cohorts is the name of the distribution list that consists of the
following users: bill, ozalp, jkf, mark, and kridle@ucbcory. A list of
current aliases can be displayed with the alias (a) command in mail.
System-wide distribution lists can be created by editing
/usr/lib/aliases. The syntax of system-wide lists differs from that of
personally defined aliases.
Personal aliases are expanded in mail you send. When a recipient on
a personally defined mailing list uses the reply (r) option, the entire
mailing list receives the response automatically. System-wide aliases
are not expanded when the mail is sent, but any reply returned to the
machine will have the system-wide alias expanded as all mail goes
through sendmail.
OPTIONS
-e Causes mail not to be printed. Instead, an exit value is returned.
-f Causes mail to read in the contents of your mbox file (or another
file you specify) for processing.
-i Causes tty interrupt signals to be ignored. This is useful when
using mail on noisy phone lines.
-n Inhibits the reading of /usr/lib/mail.rc.
-s Specifies a subject on the command line. Note that only the
first argument after the -s flag is used as a subject and that you must
enclose subjects containing spaces in quotes.
-u Specifies a short hand for expressing the following:
mail -f /usr/spool/mail/user
-v Prints the mail message. The details of delivery are displayed
on the user's terminal.
The following options can be set in the .mailrc file to alter the
behavior of the mail command. Each command is typed on a line by
itself and may take arguments following the command word and the
command abbreviation. For commands that take message lists as
arguments, if no message list is given, then the next message forward
which satisfies the command's requirements is used. If there are no
messages forward of the current message, the search proceeds
backwards. If there are no good messages at all, mail cancels the
command, displaying the message: No applicable messages.
- Prints out the previous message. If given a numeric
argument n, prints n-th previous message.
? Prints a brief summary of commands.
! Executes the ULTRIX shell command which follows.
alias (a) Prints out all currently defined aliases, if given without
arguments. With one argument, prints out that alias. With more than
one argument, creates a new or changes an old alias. These aliases are
in effect for the current mail session only.
alternates (alt) Informs mail that you have several valid addresses.
The alternates command is useful if you have accounts on more than
one machine. When you reply to messages, mail does not send a copy of
the message to any of the addresses listed on the alternates list. If
the alternates command is given with no argument, the current set of
alternate names is displayed.
chdir (ch) Changes the user's working directory to that specified. If
no directory is given, then the chdir command changes to the user's
login directory.
copy (co) Takes a message list and file name and appends each
message to the end of the file. The copy command functions in the
same way as the save command, except that it does not mark the
messages that you copy for deletion when you quit.
delete (d) Takes a list of messages as argument and marks them all
as deleted. Deleted messages are not saved in mbox, nor are they
available for most other commands.
dp (or dt) Deletes the current message and prints the next message.
If there is no next message, mail returns a message: at EOF.
edit (e) Takes a list of messages and points the text editor at each
one in turn. On return from the editor, the message is read back in.
exit (ex or x) Returns to the shell without modifying the user's
system mailbox, mbox file, or edit file in -f.
file (fi) Switches to a new mail file or folder. If no arguments are
given, it tells you which file you are currently reading. If you give it an
argument, it writes out changes (such as deletions) you have made in
the current file and reads in the new file. Some special conventions
are recognized for the name. A pound sign (#) indicates the previous
file, a percent sign (%) indicates your systemb mailbox, %user indicates
the user's system mailbox, an ampersand (&) indicates your ~/mbox
file, and +folder indicates a file in your folder directory.
folders List the names of the folders in your folder directory.
folder (fo) Switches to a new mail file or folder. The folder
command functions in the same way as the file command.
from (f) Takes a list of messages and prints their message
headers in the order that they appear in the mail directory, not in the
order given in the list.
headers (h) Lists the current range of headers, which is an eighteen-
message group. If a plus sign (+) is given as an argument, then the next
message group is printed. If a minus sign (-) is given as an argument,
the previous message group is printed.
help Prints a brief summary of commands. Synonymous with ?.
hold (ho, also preserve) Takes a message list and marks each
message in it to be saved in the user's system mailbox instead of in
mbox. The hold command does not override the delete command.
ignore Adds the list of header fields named to the ignored list.
Header fields in the ignore list are not printed on your terminal when
you print a message. This command is frequently used to suppress
certain machine-generated header fields. The Type and Print commands
are used to print a message in its entirety, including
ignored fields. If ignore is executed with no
arguments, it lists the current set of ignored fields.
mail(m) Takes login names and distribution group names as
arguments and sends mail to those people.
mbox Indicates that a list of messages should be sent to mbox in
your home directory when you quit. This is the default action for
messages if you did not set the hold option.
next (n, + or CR) Goes to the next message in sequence and types it.
With an argument list, it types the next matching message.
preserve (pre) Takes a message list and marks each message in it to
be saved in the user's system mailbox instead of in mbox . Synonymous
with the hold command.
print (p) Takes a message list and types out each message on the
user's terminal, without printing any specified ignored fields.
Print (P) Prints a message in its entirety, including specified
ignored fields.
quit (q) Terminates the session. All undeleted, unsaved messages
are saved in the user's mbox file in his login directory; all messages
marked with hold or preserve or that were never referenced are saved
in his system mailbox; and all other messages are removed from his
system mailbox.
If new mail arrives during the session, the user receives the
message: You have new mail. If given while editing a mailbox file with
the -f flag, then the edit file is rewritten. A return to the Shell is
effected, unless the rewrite of the edit file fails, in which case the
user can escape with the exit command.
reply (r) Takes a message list and sends mail to the sender and all
recipients of the specified message. The default message must not be
deleted.
Reply (R) Replies to originator of the message. Does notreply to
other recipients of the original message.
respond Takes a message list and sends mail to the sender and all
recipients of the specified message. Synonymous with reply.
save (s) Takes a message list and a file name and appends each
message to the end of the file. The messages are saved in the order in
which they appear in the mail directory, not in the order given in the
message list. The filename, which is enclosed in quotes, followed by
the line count and character count, is displayed on the user's terminal.
set (se) Prints all variable values when no arguments are given.
Otherwise, the set command sets the specified option. Arguments
either take the form
option=value
or
option
shell (sh) Invokes an interactive version of the shell.
size Takes a message list and prints out the size (in characters) of
each message. The size of the messages are printed in the order that
they appear in the mail directory, not in the order given in the list.
source (so) Reads mail commands from a file.
top Takes a message list and prints the top few lines of each. The
number of lines printed is controlled by the variable toplines and
defaults to five.
type (t) Takes a message list and types out each message on the
user's terminal, without printing any specified ignored fields.
Synonymous with print.
Type (T) Prints a message in its entirety, including specified
ignored fields. Synonymous with Print.
unalias Takes a list of names defined by alias commands and
cancels the list of users. The group names no longer have any
significance.
undelete (u) Takes a message list and marks each one as not being
deleted.
unset Takes a list of option names and discards their remembered
values; the inverse of set.
visual (v) Takes a message list and invokes the display editor on
each message.
write (w) Takes a message list and a file name and appends each
message to the end of the file. Synonymous with save.
xit (x) Returns to the Shell without modifying the user's system
mailbox, mbox , or edit file in -f. Synonymous with exit.
z Presents message headers in windowfulls as described
under the headers command. You can move forward to the next window
with the z command. Also, you can move to the previous window by
using z-.
The following is a summary of the tilde escape functions that you
can use when composing mail messages. Note that you can only invoke
these functions from within the body of a mail message and that the
sequences are only executed if they are placed at the beginning of lines.
~!command Executes the indicated shell command, then returns to
the message.
~? Prints a brief summary of tilde commands.
~: Executes the mail commands. (For example, the command
~:10 prints out message number 10 while ~:- prints out the previous
message.
~c name ... Adds the given names to the list of carbon copy
recipients.
~d Reads the file named dead.letter from your home directory
into the message.
~e Invokes the text editor on the message you are typing.
After the editing session is finished, you may continue appending text
to the message.
~f messages Reads the named messages into the message being
sent. If no messages are specified, reads in the current message.
~h Edits the message header fields by typing each one in turn
and allowing the user to append text to the end or to modify the field by
using the current terminal erase and kill characters.
~m messages Reads the named messages into the message being
sent, shifted one tab space to the right. If no messages are specified,
reads the current message.
~p Prints out the message on your terminal, prefaced by the
message header fields.
~q Aborts the message being sent, copying the message to
dead.letter in your home directory if the save option is set.
~r filename Reads the named file into the message.
~s string Causes the named string to become the current subject
field.
~t name ... Adds the given names to the direct recipient list.
~v Invokes an alternate editor (defined by the VISUAL option)
on the message. Usually, the alternate editor is a screen editor. After
you
quit the editor, you can resume appending text
to the end of your message.
~w filename Writes the message onto the named file.
~|command Pipes the message through the command as a filter. If
the command gives no output or terminates abnormally, retains the
original text of the message. The command fmt(1) is often used as
command to rejustify the message.
~~string Inserts the string of text in the message prefaced by a
single tilde (~). If you have changed the escape character, then you
should double that character in order to send it.
Options are controlled via the set and unset commands. Options may
be either binary or string. If they are binary you should see whether or
not they are set; if they are string it is the actual value that is of
interest.
The binary options include the following:
append Causes messages saved in mbox to be appended rather
than prepended. (This is set in /usr/lib/Mail.rc on version 7 systems.)
ask Causes mail to prompt you for the subject of each
message you send. If you simply respond with a new line, no subject
field is sent.
askcc Asks you at the end of each message whether you want
to send a carbon copy of the message to additional recipients.
Responding with a new line indicates your satisfaction with the
current list.
autoprint Causes the delete command to behave like dp - thus,
after deleting a message, the next one is typed automatically.
debug Causes mail to output information useful for debugging
mail. Setting the binary option debug is the same as specifying -d on
the command line.
dot Causes mail to interpret a period alone on a line as the
terminator of a message you are sending.
hold Holds messages in the system mailbox by default.
ignore Causes interrupt signals from your terminal to be
ignored and echoed as at signs (@).
ignoreeof Causes mail to refuse to accept a control-d as the end
of a message.
msgprompt Prompts you for the message text and indicates how
to terminate the message.
metoo Includes the sender in the distribution group receiving a
mail message.
nosave Prevents mail from copying aborted messages into the
dead.letter file in your home directory.
quiet Suppresses the printing of the version when first
invoked.
verbose Displays the details of each message's delivery on the
user's terminal. Setting the verbose option is the same as typing -v on
the command line.
The string options include the following:
EDITOR Pathname of the text editor to use in the edit command
and ~e escape. If not defined, then a default editor is used.
SHELL Pathname of the shell to use in the ! command and the ~!
escape. A default shell is used if this option is not defined.
VISUAL Pathname of the text editor to use in the visual
command and ~v escape.
crt Threshold to determine how long a message must be
before more is used to read it.
escape The first character of this option gives the character to
use in the place of tilde (~) to denote escapes, if defined.
folder Directory name to use for storing folders of messages.
If this name begins with a backslash (/) mail considers it an absolute
pathname; otherwise, the folder directory is found relative to your
home directory.
record Pathname of the file used to record all out-going mail.
If it is not defined, then out-going mail is not so saved.
toplines The number of lines of a message that is printed out
with the top command; normally, the first five lines are printed.
RETURN VALUES
If mail is invoked with the -e option, the following exit values are
returned:
0 the user has mail
1 the user has no mail
FILES
/usr/spool/mail/* mail directory
~/mbox your read mail
~/.mailrc file giving initial mail commands
/tmp/R# temporary for editor escape
/usr/lib/Mail.help* help files
/usr/lib/Mail.rc system initialization file
Message* temporary for editing messages
To invoke the message program your system uses, you would type the
command's name (for this example, we are using mail, which is used on
UNIX BSD systems). Add the address(es) of the recipient(s). (This
example message is going to two people.) Then press return.
--> mail carver@herhost.org glynn@hishost.edu
You are then prompted to enter a subject.
After entering a subject, press return.
--> mail carver@herhost.org glynn@hishost.edu
Subject: Proposal
Then you can type a message.
--> mail carver@herhost.org glynn@hishost.edu
Subject: Proposal
Hi Sue and Ed,
Haven't heard from you two about the report
draft. Have you finished reviewing it yet?
Please pay particular attention to the sampling
strategy described in Chapter 3.
Thanks,
Ben
To send a message using this system, you would type a blank line.
-->
To read mail using mail on a UNIX system, type mail and press return.
You will see the sender and subject of each message you have received.
3 carver@herhost.org Re: Report
-->
To display a message on the screen, type print.
--> print 3
Received: from herhost.org by nnsc.nsf.net id
From: Susan Carver <carver@herhost.org>
Date: Weds, 10 Oct 90 10:41:37 EDT
Ben,
So far I have only minor changes--it looks
good! I should be finished tomorrow.
Sue
-->
You can reply to a message by typing r.
--> print 3
Received: from herhost.org by nnsc.nsf.net id
From: Susan Carver <carver@herhost.org>
Date: Weds, 10 Oct 90 10:41:37 EDT
Ben,
So far I have only minor changes--it looks
good! I should be finished tomorrow.
Sue
-->
To delete it, type d .
-->
You can move among your messages by typing a plus sign (+) followed
by a numberÑyou will move forward that many messages.
Or type a minus sign (-) followed by a number to move backward that
many messages.
Message 1
Received: from nnsc@nsf.net by labs.bbn.com id
From: Ed Glynn <glynn@hishost.edu>
Date: Weds, 10 Oct 90 12:51:39 EDT
Ben,
I think it's fine except that I think the
budget for film is too low by 20%.
Ed
-->
Commands such as print and delete can be given a list of message
numbers to act upon. In UNIX mail, the command delete 1 2 deletes
messages 1 and 2, while the command delete 1-5 deletes messages 1
through 5. (Click the arrow to continue.)
Received: from nnsc@nsf.net by labs.bbn.com id
From: Ed Glynn <glynn@hishost.edu>
Date: Weds, 10 Oct 90 12:51:39 EDT
Ben,
I think it's fine except that I think the
budget for film is too low by 20%.
Ed
-->
You can quit in two ways:
(1) by typing q. You will not be able to retrieve deleted messages.
Messages that you have read but not deleted will go to your "mbox" file.
(2) by typing x. This leaves your messages unchanged; deleted
messages can be retrieved.
(End of Sample Session)
Interest Groups
Network interest groups include
bulletin boards ("bboards") and mailing lists. Messages are distributed
to people who share an interest but may not know each other. Ask your
system administrator what groups are available to you.
Three important, organized sources of
interest groups are available to people who can exchange mail with the
Internet: Internet mailing lists, BITNET LISTSERV, and USENET news.
There is a lot of overlap between them.
See Net Etiquette for some guidelines for using interest groups
successfully.
Each Internet mailing list has a moderator or coordinator. You must ask
to be put on the list by sending an electronic mail message to the
moderator. Internet mailing lists are not highly automated. The only
problem is how to distinguish the moderator from the list.
A list of Internet mailing lists (about five hundred kilobytes in size) is
available by anonymous FTP from the Internet host nisc.sri.com at SRI
International, Menlo Park, California. Use these commands:
cd netinfo
get interest-groups
The interest-groups list is also available by
electronic mail from the CSNET Info-Server. (The file will be split into
messages of less than fifty kilobytes when sent to you.) Send a
message to info-server@sh.cs.net with the following text:
request: info
topic: interest-groups
BITNET LISTSERV is a highly automated program that automatically
sends electronic mail messages and subscribes and unsubscribes users
in response to formatted messages. LISTSERV programs run on many
BITNET hosts. A subscribe message can be sent to any LISTSERV
programÑit will be forwarded to the correct host. For a complete list
of LISTSERV lists, send the command list global to any LISTSERV.
Telnet is a program that allows a computer user at one site to work on
a computer at another site. It is the Internet standard protocol for
remote terminal connection service.
Telnet requires Internet access (that is, you must be on a network that
gateways to the Internet). Unlike FTP and electronic mail, telnet
exposes you to the commands and programs of the remote host.
For example, you can use the telnet command to run a program in your
directory on a supercomputer hundreds of miles away.
Remote LoginÑTelnet
Telnet is a program that allows a computer user at one site to work on
a computer at another site. It is the Internet standard protocol for
remote terminal connection service.
Telnet requires Internet access, that is, you must be on a TCP/IP
network that gateways to the Internet. Unlike FTP and electronic mail,
Telnet actually exposes you to the commands and programs of the
remote host.
For example, you can use the telnet command to run a program in your
directory on a supercomputer hundreds of miles away.
In most cases, the traveller must make arrangements beforehand to use
telnet on a remote host. Some interactive programs allow any network
traveller to log in with no password or a password that is advertised.
Sometimes the password is "anonymous" and the password can be
"guest." The type of activity allowed with anonymous telnet is
restricted.
Telnet Manual for UNIX
This is the UNIX (see BSD) manual entry for telnet.
telnet - user interface to the TELNET protocol
Syntax: telnet [host[port]]
The telnet interface is used to communicate with another host using
the TELNET protocol. If telnet is invoked without arguments, it enters
command mode, which is indicated by the prompt, telnet>. In this mode,
telnet accepts and executes the commands listed below. If it is
invoked with arguments, it performs an open command (see below) with
those arguments.
Once a connection is opened, telnet enters input mode. The input mode
is either character-at-a-time or line-by-line, depending on what the
remote system supports. In character-at-a-time mode, text is sent to
the remote host as it is typed. In line-by-line mode, text is echoed
locally and only completed lines are sent to the remote host. The
local-echo-character, initially ^E. turns the local echo on and off,
which is useful when you want to enter passwords without them
echoing to the screen.
In either mode, if the localchars toggle is true (the default in line
mode), then the user's quit, intr, and flush characters are trapped
locally and sent as TELNET protocol sequences to the remote side.
Options such as toggle autoflush and toggle autosynch flush previous
terminal input, as in quit and intr, in additon to flushing subsequent
output to the terminal until the remote host acknowledges the TELNET
sequence.
To issue telnet commands when in input mode, precede them with the
telnet escape character, initially the control character followed by a
right bracket (^]). When in command mode, use the normal terminal
editing conventions.
The following commands are available:
open host [ port ] Opens a connection to the named host. If the no port
number is specified, telnet attempts to contact a TELNET server at the
default port. The host specification may be either a host name or an
Internet address specified in the dot notation. For further information,
see hosts(5) and inet(3n).
close Closes a TELNET session and returns to command mode.
quit Closes any open TELNET session and exits telnet.
z Suspends TELNET. This command only works when the user is using
the csh(1).
mode type The type is either line, for line-by-line mode, or character,
for character-at-a-time mode. The local host asks the remote host for
permission to go into one or the other mode. The remote host enters the
requested mode if it is capable of it.
status Shows the current status of telnet. This includes the peer one
is connected to, as well as the state of debugging.
display [ argument... ] Displays all, or some, of the set and toggle
values (see below).
? [ command ] Accesses on-line help. With no arguments, telnet prints
a help summary. If a command is specified, TELNET prints the help
information for that command.
send argument(s) Sends one or more special character sequences to the
remote host. One or more of the following arguments can be specified:
escape Sends the current telnet escape character (initially the control
character followed by a right bracket, ^]).
synch Sends the TELNET SYNCH sequence. This sequence causes the
remote system to discard input that was previously entered but that it
has not yet read. This sequence is sent as TCP urgent data and may not
work if the remote system is a 4.2 BSD system. If it does not work, a
lower case r may be echoed on the terminal screen.
brk Sends the TELNET BRK (Break) sequence, which may have
significance to the remote system.
ip Sends the TELNET IP (Interrupt Process) sequence, which causes the
remote system to abort the currently running process.
ao Sends the TELNET AO (Abort Output)sequence, which causes the
remote system to flush all output from the remote system to the user's
terminal.
ayt Sends the TELNET AYT (Are You There) sequence. The remote
system may or may not respond.
ec Sends the TELNET EC (Erase Character) sequence, which causes the
remote system to erase the last character entered.
el Sends the TELNET EL (Erase Line) sequence, which causes the remote
system to erase the line currently being entered.
ga Sends the TELNET GA (Go Ahead) sequence. Often this sequence has
no significance to the remote system.
nop Sends the TELNET NOP (No OPeration) sequence.
? Prints out help information for the send command.
set argument value Sets a telnet variable to a specific value. The off
value turns off the function associated with the variable. The current
values of variables can be displayed with the display command. The
following variables that can be specified:
echo Toggles between local echoing of entered characters, and
suppressing echoing of entered characters when in line-by-line mode.
The value is initially ^E.
escape Enters the telnet command mode when you are connected to a
remote system. The value is initially the control character followed by
a left bracket (^[).
interrupt Sends a TELNET IP sequence (see send ip above) to the remote
host if telnet is in localchars mode (see toggle localchars below) and
the interrupt character is typed. The initial value for the interrupt
character is the terminal's intr character.
quit Sends a TELNET BRK sequence (see send brk above) to the remote
host if telnet is in localchars mode (see toggle localchars below) and
the quit character is yped. The initial value for the quit character is
the terminal's quit character.
flushoutput Sends a TELNET AO sequence (see send ao above) to the
remote host if telnet is in localchars mode (see toggle localchars
below) and the flushoutput character is typed. The initial value for the
flush character is the terminal's flush character.
erase Sends a TELNET EC sequence (see send ec above) to the remote
system if telnet is in localchars mode (see toggle localchars below),
and if telnet is operating in character-at-time mode. The initial value
for the erase character is the terminal's erase character.
kill Sends a TELNET EL sequence (see send el above) to the remote
system if telnet is in localchars mode (see toggle localchars below)
and if telnet is operating in character-at-a-time mode. The initial
value for the kill character is the terminal's kill character.
eof Sends this character to the remote system if telnet is operating in
line-by-line mode and this character is entered as the first character
on a line. The initial value of the eof character is the terminal's eof
character.
toggle arguments . . . Toggles (between true and false) flags that
control how telnet responds to events. More than one argument may be
specified and the current value of these flags can be displayed with the
display command. Valid arguments for the toggle command are the
following:
localchars Causes the flush, interrupt, quit, erase, and kill
characters to be recognized locally and transformed into appropriate
TELNET control sequences if this flag is set to true. (See set above).
The appropriate TELNET control sequences are: ao, ip, brk, ec, and el,
respectively. For more information see the send command. The initial
value for this toggle is true in line-by-line mode, and false in
character at-a-time mode.
autoflush Causes the telnet command to not display any data on the
user's terminal until the remote system acknowledges (via a TELNET
Timing Mark option) that it recognized and processed the following
TELNET sequences: ao, intr, or quit. Both autoflush and localchars must
be true for autoflush to work in this manner. The initial value for this
toggle is true if the terminal user did not specify stty noflsh.
Otherwise it is false. For further information, see stty(1).
autosynch Causes the TELNET SYNCH sequence to follow the TELNET
sequence that is initiated when either the intr or quit character is
typed. The autosynch flag works in this manner when both the
autosynch and localchars are true. This procedure should cause the
remote system to begin throwing away all previously typed input until
both of the TELNET sequences have been read and acted upon. The
initial value of this toggle is false.
crmod Toggles carriage return mode. When this mode is enabled, most
carriage return characters received from the remote host are mapped
into a carriage return followed by a line feed. It is useful only when
the remote host sends carriage returns but never line feeds. The initial
value for this toggle is False.
debug Toggles socket level debugging which is useful only to the
superuser. The initial value for this toggle is false.
options Toggles the display of internal telnet protocol processing that
deals with TELNET options. The initial value for this toggle is false.
netdata Toggles the display of all network data (in hexadecimal
format). The initial value for this toggle is false.
? Displays the legal toggle commands.
Restrictions In line-by-line mode, the terminal's EOF character is only
recognized and sent to the remote system when it is the first character
on a line.
Telnet
-->
Type telnet followed by the name of the host that you want to access.
If the connection is successful, you will see a message to that effect
from telnet, followed by the opening screen provided by the remote
host, in this case the Boston University library catalog.
WELCOME TO THE BOSTON
UNIVERSITY LIBRARIES
AND TO TOMUS
THE ONLINE CATALOG
-->
You are now connected to the remote host, so you must use commands
that are understood by that system.
--> find author twain
Your search:FIND AUTHOR TWAIN
Items found:197 at ALL BOSTON UNIVERSITY LIBRARIES
Press RETURN to see them, or type HELP, then press the key marked
RETURN.
->
Leave the remote host by using the host's quit command (in this case
that command happens to be quit), or by using your system's telnet
"escape" keys. You may have been told what this is when you first
entered telnet (control-] may work).
(End of sample session.)
File Transfer
¥ File Transfer Protocol (FTP)
¥ Downloading Macintosh Files
The File Transfer Protocol (FTP) is the Internet standard protocol for
moving files from one computer to another. You can use the ftp
command to copy computer files containing a variety of kinds of
information, such as software, documentation, or maps. FTP is the
name not only of the protocol, but usually also of the program the user
invokes to execute it (e.g., by typing ftp host.bbn.com). FTP is available
on several operating systems.
File Transfer Protocol (FTP)
Anonymous FTP, like Telnet, requires access to the Internet . Unlike
Telnet, anonymous FTP is widely available. Anyone can become an
Internet traveller by giving the command ftp host, for example, ftp
cs.fredonia.edu. When the remote host prompts with login: and
password: (or something similarÑdetails vary on different types of
computers) the traveller types "anonymous" for the login name and
"guest" for the password.
After logging in, the traveller remains in a program with a restricted
set of commands. Files on the remote host are usually protected so
that visitors cannot change or delete them.
Manual for FTP under UNIX
This is the UNIX (see BSD) manual entry for ftp.
ftp - file transfer program
Syntax: ftp [-v] [-d] [-i] [-n] [-g] [host]
The ftp command is the user interface to the ARPANET standard File
Transfer Protocol. The program allows a user to transfer files to and
from a remote network site.
The client host with which ftp is to communicate may be specified on
the command line. If the client host is specified on the command line,
ftp immediately attempts to establish a connection to an FTP server on
that host; otherwise, ftp enters its command interpreter and awaits
instructions from the user. While ftp is awaiting commands from the
user, it provides the user with the prompt: ftp>.
The following commands are recognized by ftp:
! Invokes a shell on the local machine.
$ macro-name [ args ] Executes the macro macro-name that was
defined with the macdef command. Arguments are passed to the macro
unglobbed.
account [ passwd ] Supplies a supplemental password required by a
remote system for access to resources once a login has been
successfully completed. If no argument is included, the user is
prompted for an account password in a non-echoing input mode.
append local-file [ remote-file ] Appends a local file to a file on the
remote machine. If remote-file is not specified, the local file name is
used in naming the remote file. File transfer uses the current settings
for type, format, mode, and structure.
ascii Sets the file transfer type to network ASCII. This is the default
type.
bell Arranges for a bell to sound after each file transfer command is
completed.
binary Sets the file transfer type to support binary image transfer.
bye Terminates the FTP session with the remote server and exits ftp.
case Toggles the remote computer's file name case mapping during
mget commands. When case is on (default is off), the remote
computer's file names are written in the local directory with all
letters in upper case mapped to lower case.
cd remote-directory Changes the working directory on the remote
machine to remote-directory.
cdup Changes the remote machine working directory to the parent of
the current remote machine working directory.
close Terminates the FTP session with the remote server and returns
to the command interpreter.
cr Toggles the carriage return stripping during ascii type file
retrieval. Records are denoted by a carriage return/linefeed sequence
during ascii type file transfer. When cr is on (the default), carriage
returns are stripped from this sequence to conform with the UNIX
single linefeed record delimiter. Records on non-UNIX remote systems
may contain single linefeeds; when an ascii type transfer is made,
these linefeeds may be distinguished from a record delimiter only when
cr is off.
delete remote-file Deletes the file remote-file on the remote machine.
debug [ debug-value ] Toggles the debugging mode. If an optional
debug-value is specified, it is used to set the debugging level. When
debugging is on, ftp prints each command sent to the remote machine,
preceded by the string q-->.
dir [ remote-directory ] [ local-file ] Prints a listing of the directory
contents in the directory, remote directory, and, optionally, places the
output in local file. If no directory is specified, the current working
directory on the remote machine is used. If no local file is specified,
output comes to the terminal.
disconnect A synonym for close.
form format Sets the file transfer form to format. The default
format is file.
get remote-file [ local-file ] Retrieves the remote-file and stores it
on the local machine. If the local filename is not specified, it is given
the same name it has on the remote machine. The current settings for
type, form, mode, and structure are used while transferring the file.
hash Toggles the hash-sign (#) printing for each data block
transferred. The size of a data block is 1024 bytes.
glob Toggles filename expansion for mdelete, mget, and mput. If
globbing is turned off with glob, the file name arguments are taken
literally and not expanded. Globbing for mput is done as in csh(1). For
mdelete and mget, each remote filename is expanded separately on the
remote machine and the lists are not merged. Expansion of a directory
name is likely to be different from expansion of the name of an
ordinary file. The exact result depends on the foreign operating system
and ftp server, and can be previewed by entering: mls remote files.
Neither mget nor mput is meant to transfer entire directory subtrees of
files. That can be done by transferring a tar(1) archive of the subtree
(in binary mode).
lcd [ directory ] Changes the working directory on the local machine.
If no directory is specified, the user's home directory is used.
ls [ remote-directory ] [ local-file ] Prints an abbreviated listing of
the contents of a directory on the remote machine. If remote-directory
is left unspecified, the current working directory is used. If no local
file is specified, the output is sent to the terminal.
macdef macro-name Defines a macro. Subsequent lines are stored as
the macro macro-name; a null line (consecutive newline characters in a
file or carriage returns from the teminal) terminates macro input
mode. There is a limit of 16 macros and 4096 total characters in all
defined macros. Macros remain defined until a close command is
executed.
The macro processor interprets dollar signs ($) and backslashes (\) as
special characters. A dollar sign ($) followed by a number (or numbers)
is replaced by the corresponding argument on the macro invocation
command line. A dollar sign ($) followed by an i signals the macro
processor that the executing macro is to be looped. On the first pass,
$i is replaced by the first argument on the macro invocation command
line. On the second pass it is replaced by the second argument, and so
on. A backslash (\) followed by any character is replaced by that
character. Use the backslash (\) to prevent special treatment of the
dollar sign ($).
mdelete remote-files Deletes the specified files on the remote
machine. If globbing is enabled, the specification of remote files will
first be expanded using ls.
mdir remote-files local-file Obtains a directory listing of multiple
files on the remote machine and places the result in local-file.
mget remote-files Retrieves the specified files from the remote
machine and places them in the current local directory. If globbing is
enabled, the specification of remote files will first be expanding using
ls.
mkdir directory-name Makes a directory on the remote machine.
mls remote-files local-file Obtains an abbreviated listing of multiple
files on the remote machine and places the result in local-file.
mode [ mode-name ] Sets the file transfer mode to mode name. The
default mode is the stream mode.
mput local-files Transfers multiple local files from the current local
directory to the current working directory on the remote machine.
nmap [ inpattern outpattern ] Sets or unsets the filename mapping
mechanism. If no arguments are specified, the filename mapping
mechanism is unset. If arguments are specified, remote filenames are
mapped during mput commands and put commands which are issued
without a specified remote target filename. If arguments are
specified, local filenames are mapped during mget commands and get
commands which are issued without a specified local target filename.
This command is useful when connecting to a non-UNIX remote
computer with different file naming conventions or practices. The
mapping follows the pattern set by inpattern and outpattern.
Inpattern is a template for incoming filenames (which may have
already been processed according to the ntrans and case settings).
Variable templating is accomplished by including the sequences $1, $2,
..., $9 in inpattern. Use a backslash (\) to prevent this special
treatment of the dollar sign ($) character. All other characters are
treated literally, and are used to determine the nmap inpattern variable
values. For example, given inpattern $1.$2 and the remote file name
mydata.data, $1 has the value mydata, and $2 has the value data.
The outpattern determines the resulting mapped filename. The
sequences $1, $2, ...., $9 are replaced by any value resulting from the
inpattern template.
The sequence $0 is replace by the origi nal filename. Additionally, the
sequence [seq1,seq2] is replaced by seq1 if seq1 is not a null string;
otherwise it is replaced by seq2. For example, the command nmap
$1.$2.$3 [$1,$2].[$2,file] yields the output filename myfile.data for
input filenames myfile.data and myfile.data.old, myfile.file for the
input filename myfile, and myfile.myfile for the input filename .myfile.
Spaces may be included in outpattern, as in the exam ple: nmap $1 |sed
"s/ *$//" > $1 . Use the backslash (\) to prevent special treatment of
the dollar sign ($), left bracket ([), right bracket (]), and comma (,).
ntrans [ inchars [ outchars ] ] Sets or unsets the filename character
translation mechanism. If no arguments are specified, the filename
character translation mechanism is unset. If arguments are specified,
characters in remote filenames are translated during mput commands
and put commands which are issued without a specified remote target
filename. If arguments are specified, characters in local filenames are
translated during mget commands and get commands which are issued
without a specified local target filename.
This command is useful when connecting to a non-UNIX remote
computer with different file naming conventions or prac tices.
Characters in a filename match ing a character in inchars are replaced
with the corresponding character in outchars. If the character's
position in inchars is longer than the length of outchars, the character
is deleted from the file name.
open host [ port ] Establishes a connection to the speci fied host FTP
server. If an optional port number is supplied, ftp attempts to contact
an FTP server at that port. If the auto-login option is on (default), ftp
automatically attempts to log the user in to the FTP server (see below).
prompt Toggles interactive prompting. Interactive prompting occurs
during multiple file transfers to allow the user to retrieve or store
files selectively. If prompting is turned off (default), any mget or
mput transfers all files.
proxy ftp-command Executes an ftp command on a secondary control
connection. This command allows simultaneous connection to two
remote ftp servers for transferring files between the two servers. The
first proxy command should be an open, to establish the secondary
control connection. Type the command proxy? to see other ftp
commands executable on the secondary connection. The following
commands behave differently when prefaced by proxy:
open will not define new macros during the auto-login process
close will not erase existing macro definitions
get and mget transfer files from the host on the primary control
connection to the host on the secondary control connection
put, mput, and append transfer files from the host on the secondary
control connection to the host on the primary control connection. Third
party file transfers depend upon support of the ftp protocol PASV
command by the server on the secondary control connection.
put local-file [ remote-file ] Stores a local file on the remote machine.
If remote-file is unspecified, the local file name is used in naming the
remote file. File transfer uses the current settings for type, format,
mode, and structure.
pwd Prints the name of the current working directory on the remote
machine.
quit A synonym for bye.
quote arg1 arg2 ... Sends the arguments that are specified, verbatim, to
the remote FTP server. A single FTP reply code is expected in return.
recv remote-file [ local-file ] A synonym for get.
remotehelp [ command-name ] Requests help from the remote FTP
server. If a command-name is specified it is supplied to the server as
well.
rename [ from ] [ to ] Renames the file from on the remote machine, to
the file to.
reset Clears the reply queue. This command re-synchronizes
command/reply sequencing with the remote ftp server. If the remote
server violates the ftp protocol, resynchronization may be neccesary.
rmdir directory-name Deletes a directory on the remote machine.
runique Toggles storing of files on the local system with unique
filenames. If a file already exists with a name equal to the target
local filename for a get or mget command, a .1 is appended to the name.
If the resulting name matches another existing file, a .2 is appended to
the original name. If this process contin ues up to .99, an error
message is printed, and the transfer does not take place. The generated
unique filename will be reported. Note that runique will not affect
local files generated from a shell command (see below). The default
value is off.
send local-file [ remote-file ] A synonym for put.
sendport Toggles the use of PORT commands. By default, ftp attempts
to use a PORT com mand when establishing a connection for each data
transfer. If the PORT command fails, ftp uses the default data port.
When the use of PORT commands is disabled, no attempt is made to use
PORT commands for each data transfer. This is useful for certain FTP
implementations which do ignore PORT commands but, incorrectly,
indicate that they have been accepted.
status Shows the current status of ftp.
struct [ struct-name ] Sets the file transfer structure to struct-name.
By default stream structure is used.
sunique Toggles storing of files on a remote machine under unique file
names. The remote ftp server must support the ftp protocol STOU
command for successful completion of this command. The remote
server reports the unique name. Default value is off.
tenex Sets the file transfer type to that needed to talk to TENEX
machines.
trace Toggles packet tracing.
type [ type-name ] Sets the file transfer type to type name. If no type
is specified, the current type is printed. The default type is network
ASCII.
user user-name [ password ] [ account ] Identifies the user to the
remote FTP server. If the password is not specified and the server
requires it, ftp disables the local echo and then prompts the user for it.
If an account field is not specified, and the FTP server requires it, the
user is prompted for it also. Unless ftp is invoked with auto login
disabled, this process is done automatically on initial connection to the
FTP server.
verbose Toggles the verbose mode. In verbose mode, all responses from
the FTP server are displayed to the user. In addition, if verbose is on,
statistics regarding the efficiency of a file transfer are reported when
the transfer is complete. By default, verbose is on.
? [ command ] A synonym for help.
Command arguments which have embedded spaces may be quoted with
quotation (") marks.
Aborting a file transfer To abort a file transfer, use the terminal
interrupt key (usually <CTRL/C>). Sending transfers are halted
immediately. Receiving transfers are halted by sending a ftp protocol
ABOR command to the remote server, and discarding any further data
received. The speed at which this is accomplished depends upon the
remote server's support for ABOR processing. If the remote server does
not support the ABOR command, an ftp> prompt appears when the
remote server has completed sending the requested file.
The terminal interrupt key sequence is ignored when ftp has completed
any local processing and is awaiting a reply from the remote server. A
long delay in this mode may result from ABOR processing, or from
unexpected behavior by the remote server, including violations of the
ftp protocol. If the delay results from unexpected remote server
behavior, the local ftp program must be killed by hand.
File-naming conventions Files specified as arguments to ftp commands
are processed according to the following rules:
1) Standard input is used for reading and standard output is used for
writing when the file name is specified by an en dash (-).
2) If the first character of the file name is a vertical line (|), the
remainder of the argument is interpreted as a shell command. The ftp
command then forks a shell, using popen(3) with the argument supplied,
and reads (writes) from the stdout (stdin). If the shell command
includes spaces, the argument must be quoted, as in ""| ls -lt"". A
particularly useful example of this mechan ism is: "dir |more".
3) If globbing is enabled, local file names are expanded according to
the rules used in the csh(1) (compare to the glob command). If the ftp
command expects a single local file, such as put, only the first
filename gen erated by the globbing operation is used.
4) For mget commands and get commands with unspecified local file
names, the local filename is the remote filename and can be altered by
a case, ntrans, or nmap setting. The resulting filename may then be
altered if runique is on.
5) For mput commands and put commands with unspecified remote file
names, the remote filename is the local filename and may be altered by
a ntrans or nmap setting. The resulting filename can then be altered by
the remote server if sunique is on.
File transfer parameters Many parameters can affect a file transfer.
The type can be ascii, image (binary), ebcdic, or local byte size (for
PDP10's and PDP-20's generally). The ftp command supports the ascii
and image types of file transfer and local byte size 8 for tenex mode
transfers.
The ftp command supports only the default values for the remaining
file transfer parameters: mode, form, and struct.
The .netrc file The .netrc file contains login and initialization
information used by the auto-login process. It resides in the user's
home directory. The following tokens are recognized; they may be
separated by spaces, tabs, or new-lines:
machine name Identifies a remote machine name. The auto-login
process searches the .netrc file for a machine token that matches the
remote machine specified on the ftp command line or as an open
command argu ment. Once a match is made, the subse quent .netrc
tokens are processed, stop ping when the end of file is reached or
another machine token is encountered.
login name Identifies a user on the remote machine. If this token is
present, the auto-login process initiates a login using the specified
name.
password string Supplies a password. If this token is present, the
auto-login process supplies the specified string if the remote server
requires a password as part of the login process. Note that if this
token is present in the .netrc file, and if the .netrc is readable by
anyone other than the user, ftp aborts the auto-login process.
account string Supplies an additional account password. When this
token is present, the auto login process supplies the the remote server
with an additional account pass word if the remote server requires it.
If it does not, the auto-login process initiates an ACCT command.
macdef name Defines a macro. This token functions like the ftp macdef
command. A macro is defined with a specified name; its con tents
begin with the next .netrc line and continue until a null line (consecu
tive new-line characters) is encoun tered. If a macro named init is
defined, it is automatically executed as the last step in the auto-login
process.
Options
-d Enables debugging.
-g Disables file name expansion.
-i Disables interactive prompting during multiple file transfers.
-n Disables autologin during an initial connection. If auto-login is
enabled, ftp will check the .netrc file in the user's home directory for
an entry describing an account on the remote machine. If no entry
exists, ftp will use the login name on the local machine as the user
identity on the remote machine, prompt for a password and, optionally,
an account with which to login.
-v Displays all responses from the remote server as well as all data
transfer statistics.
Restrictions Correct execution of many commands depends on proper
behavior by the remote server. An error in the treatment of carriage
returns in the 4.2BSD UNIX ascii-mode transfer code has been
corrected. This correction may result in incorrect transfers of binary
files to and from 4.2BSD servers using the ascii type. Avoid this
problem by using the binary image type.
FTP
-->
Type ftp followed by the address of the host you want to access. The
ftp program will respond with a message. If the connection
was successful, you will see a response like the one above.
(Click the arrow to continue.
--> ftp nic.near.net
Connected to nic.near.net.
220 nic.near.net FTP server ready.
Then you will normally be prompted to give a name and a password. If
the system allows anonymous ftp, the name will often be "anonymous"
and the password may be "guest" or you may be asked to use your
username as a password. Again you will get a response.
(Click the arrow to continue.)
The "list" command (ls) causes the remote computer to print a list of
available subdirectories and files. Below is an exercise that will show
you how to change directories and transfer a file from a subdirectory.
The commands you will type are printed in bold italics.
ftp>
After you are logged in, you can issue a few commands, such as ls to
list the contents of the current directory. (Click the arrow to
continue.)
The "list" command (ls) causes the remote computer to print a list of
available subdirectories and files. Below is an exercise that will show
you how to change directories and transfer a file from a subdirectory.
The commands you will type are printed in bold italics.
ftp>
To see the ftp commands available to you, type ? at the "ftp>" prompt.
(The list of commands shown here is incomplete.)
The "list" command (ls) causes the remote computer to print a list of
available subdirectories and files. Below is an exercise that will show
you how to change directories and transfer a file from a subdirectory.
The commands you will type are printed in bold italics.
ftp>
Type the "status" command to check your file type.
The "list" command (ls) causes the remote computer to print a list of
available subdirectories and files. Below is an exercise that will show
you how to change directories and transfer a file from a subdirectory.
The commands you will type are printed in bold italics.
ftp>
To ftp text files, including files that end in ".txt" or ".ps", your file type
should be ASCII. This is the default. (The ASCII setting is the same as
TEXT.) (Click the arrow to continue.)
The "list" command (ls) causes the remote computer to print a list of
available subdirectories and files. Below is an exercise that will show
you how to change directories and transfer a file from a subdirectory.
The commands you will type are printed in bold italics.
ftp>
If you intened to ftp non-ascii files, including compressed files that
end in ".Z" or object files, set your file type to binary. The "binary"
setting is the same as "image." (Click the arrow to continue.)
ftp>
The cd command is used to change directories on the remote host.
ftp> cd info-sources
250 CWD command successful.
The get command is used to copy a file from the remote host to your
system. Type get and the name of the file you want. You will be told
when the transfer is complete.
ftp> cd info-sources
250 CWD command successful.
ftp> get README
PORT command successful.
150 Opening ASCII mode data connection for README (1042 bytes).
226 Transfer complete.
1071 bytes received in 0.02 seconds (52 Kbytes/s).
ftp>
Leave ftp and close the connection by typing quit at the ftp prompt.
(End of sample session.)
Downloading
Over the Internet you can reach archives of Macintosh files. You can get
Macintosh files such as HyperCard stacks, tools, fonts, games, tips,
desk accessories, cdevs, inits, demos, and applications from these
archives. Before the files can be run on your Macintosh, you must ftp
them and then process them. Here is a general description of how to
get files from an archive to your Mac. See your system administrator
or ask a Macintosh user group for more information.
In summary, there are generally five steps to pulling files from
Macintosh archives:
1. Transfer to your computer with ftp
(using a text-only option).
2. If necessary, combine the parts.
3. Transfer to your Macintosh.
4. Run BinHex 4.0 and/or StuffIt to convert
the .hqx files into either Macintosh files
or compressed Macintosh files (or use a
Unix program such as mcvert or xbin
before transferring the file to your
Macintosh.)
5. If a file is compressed, use the
appropriate decompression program
(usually StuffIt, or UnStuffIt) to
decompress it.
Step 1, ftp
First, ftp to a site that has Macintosh files,
such as rascal.ics.utexas.edu or the info-mac directory at sumex-
aim.stanford.edu. (Note that sumex may not be available for anonymous
ftp during west coast business hours.) On sumex, use the account name
"anonymous" (lower-case) and enter any password. Type ls to see a list
of directories, and type cd to a directory of Macintosh files. (on sumex,
type cd info-mac). Type ls again to see a list of subdirectories, and
type cd with the name of a subdirectory that interests you. Type ls
again to see the filenames.
Choose a file and ftp it (using ftp's get [filename] commandÑwith a
statement like get disinfectant.hqx). An ftp transfer using a text-only
option should work, since the files are normally in text format.
Step 2
Some files are large and have been split into smaller pieces so that
they can be more easily mailed. You must join them together. hqx files
can be edited as text; therefore, you can use any word processor or the
append command on your host to stitch the pieces together. There are
some files in the info-mac/util directory on sumex that do this step
for you (unity and united).
Step 3 or 4, decode binhex file
Most files are stored in BinHex 4.0 (text) format. The common practice
is to label such files with .hqx extensions. To take these files and use
them on your Macintosh, you must first run them through a program that
will convert them from .hqx format. On Unix systems, you can use the
mcvert program, stored as /unix/mcvert.shar. You can also do the
conversion on your Macintosh after you transfer the file. On the Mac,
use either BinHex 4.0 or StuffIt. In Stuffit, choose "Decode Binhex file"
from the "Other" menu. Ask your system administrator what is the best
method to use on your system.
Step 3 or 4, transfer the file to your Macintosh
Ask your system adminstrator what method you should use to do thisÑ
such as kermit or ftp.
Step 5, unstuffing
Many files have been compressed to save space. You will know they
have been compressed when the filename (after converting to Macintosh
format) ends with a .sit, .cpt, .sea, or .pit extension. You should use
StuffIt (or Unstuffit) to convert .sit and .pit compressed files into
uncompressed Macintosh files. (With .pit files you need to set a special
StuffIt option to decompress them, since they are not in the usual
StuffIt format.) The other types, .cpt and .sea, are becoming
increasingly common as Compactor gains in popularity. Both Compactor
and Stuffit are in the /util directory on info/mac.
In Stuffit, the name of the file you clicked on will appear in a window.
Select it and then click extract at the bottom of the screen. Then
select the new file(s) that appear in the window, and click the Save All
button on the right. Stuffit will create the new file(s) (while
preserving the stuffed .sit file).
These are some of the kinds of resources available on the Internet.
¥ INTERNET RESOURCE GUIDE
¥ COMPUTING CENTERS
¥ LIBRARY CATALOGS
¥ DATA ARCHIVES
¥ WHITE PAGES
¥ MISCELLANEOUS
Internet Resources
These are some of the kinds of resources available on the Internet.
¥ INTERNET RESOURCE GUIDE
¥ COMPUTING CENTERS
¥ LIBRARY CATALOGS
¥ DATA ARCHIVES
¥ WHITE PAGES
¥ MISCELLANEOUS
Internet Resource Guide
The Internet Resource Guide is an online
book that describes many services available on the Internet. You can
transfer the resource guide via ftp from the
subdirectory info-sources on the machine nnsc.nsf.net (see the next
card). The IRG is also distributed electronically by the NSF Network
Service Center (NNSC). If you wish to receive additions to the IRG in
electronic mail messages, send a note to resource-guide-
request@nnsc.nsf.net, and specify whether you would like them in
PostScript format, text format, or whether you want to receive notices
that additions are available for ftp.
Internet Resource Guide
How to Get and Use the
Internet Resource Guide
To get The Internet Resource Guide over the Internet, use the command
ftp nnsc.nsf.net and then cd resource-guide.
The resource-guide directory hierarchy is organized by chapter and
section. Each chapter has its own subdirectory (resource-
guide/chapter.#), and each section has two files in that directory, one
for PostScript (section#-#.ps) and one for plain text (section#-#.txt).
So, to retrieve section 1 of chapter 1, you should ftp the files:
resource-guide/chapter.1/section1-1.ps (Postscript)
resource-guide/chapter.1/section1-1.txt (Text)
To simplify retrieval of entire chapters and chapter updates, or of the
entire IRG, you can ftp compressed tar files. These include a the entire
guide in text format (resource-guide-txt.tar.Z), in PostScript format
(resource-guide-ps.tar.Z), or as a plain text file (wholeguide.txt).
There are also files of individual chapters in both formats. The most
recent changes to a chapter are in a file named
chapter#-changes.tar.Z. These include Postscript and text versions of
the most recently updated sections.
resource-guide/chapter1-changes.tar.Z
Nitty-Gritty Information about PostScript, ftp, Compress, and tar files.
A Note about PostScript Documents
PostScript is a formatting language used to prepare documents for
printing on advanced printers such as Apple LaserWriters.
PostScript files contain ASCII characters only, but are virtually
unreadable because the text of the document is interspersed with
numerous formatting commands and numeric symbols for printers'
characters that are not part of the ASCII character set.
Do not attempt to print PostScript files unless you have a printer that
is specifically designed for PostScript.
How to Use the ftp Command
You can ftp the resource guide files from nnsc.nsf.net with a standard
anonymous ftp connection:
ftp nnsc.nsf.net
You will see a "banner" and be promted for your login:
Connected to nnsc.nsf.net.
220 nnsc.nsf.net FTP server (Version 5.59 Mon May 14 13:48:21
EDT 1990) ready.
Name (nnsc.nsf.net:yourname):
You should type anonymous, and then use the password guest. The
password will not be displayed on your terminal.
Name (nnsc.nsf.net:name): anonymous
Password (nnsc.nsf.net:anonymous):
331 Guest login ok, send ident as password.
230 Guest login ok, access restrictions apply.
ftp>
3) Change directory to the "resource-guide" directory:
ftp> cd resource-guide
4) To get a listing of the files in the resource-guide directory, give
the "dir" command (usually equivlent to the "ls" command on Unix
systems).
ftp> dir *
...
chapter.1/section1-1.ps
etc.
section1-1.ps is in the chapter.1 directory. Use the "cd"
command again.
ftp> cd chapter.1
How to Uncompress and Extract the tar.Z Files
Do not attempt to use the tar.Z files unless you have the Unix
"compress" and "uncompress" commands and the "tar" command on your
host computer, and your operating system is compatible with Berkeley
Unix.
1) Use the "uncompress" command to
replace the compressed "Z" file
with a copy of the file as it was before
"compress" was used:
uncompress -v chapter1-ps.tar.Z
chapter1-ps.tar.Z: -- replaced with chapter1.tar
The result is "chapter1-ps.tar".
2) Use tar -xvf to replace the tar
file with the set of directories and files
in the original file.
tar -xvf chapter1.tar
x copyright.ps, 5931 bytes, 12 tape blocks
x copyright.txt, 945 bytes, 2 tape blocks
etc. ...
This creates a new directory, chapter.1, with the files:
copyright.ps
copyright.txt
intro.ps
intro.txt
section1-1.ps
section1-1.txt
etc. ...
Then you throw away the files you don't wantÑeither the ".ps" files or
the ".txt" files Ñand print the files that remain.
For more information about the action of these commands, consult the
manual for your Unix system, or give the commands "man compress" and
"man tar" for online documentation.
Computational resources are centers or machines that serve users who
have special computing requirements. A good example of such a
resource is a supercomputer center.
Air Force Supercomputer Center at Kirtland AFB
Arizona: University of Arizona Supercomputing Center
BRL: US Army Ballistic Research Laboratory
Berkeley: University of California Information Systems and Technology
Calgary: SuperComputing Services, The University of Calgary
CERPASS: Center for Experimental Research in Parallel Algorithms,
Software and Systems
Cornell National Supercomputer Facility: Center for Theory and
Simulation in Science and Engineering
NCAR: National Center for Atmospheric Research
NCSA: National Center for Supercomputing Applications
NCSC: North Carolina Supercomputing Center
NERSC: National Energy Research Supercomputer Center
NPAC: Northeast Parallel Architectures Center
OSC: Ohio Supercomputer Center
PSC: Pittsburgh Supercomputing Center
SDSC: San Diego Supercomputer Center
Texas: University of Texas System Center for High Performance
Computing
UCLA Office of Academic Computing
Air Force: consulting@ddnvx1.afwl.af.mil
Cornell: psfy@cornellf.tn.cornell.edu
NCAR: scdinfo@ncar.ucar.edu
UCLA: calloac@oac.ucla.edu
Arizona: kgrmc@asuacad.bitnet or kgbat@asuacad.bitnet
NCSC: info@flyer.ncsc.edu
Texas: g.smith@chpc.utexas.edu
CERPASS: cerpass@isi.edu
Calgary: super@uncacdc.bitnet
Berkeley: consult@cmsa.berkeley.edu (CMS) or
consult@lynx.berkeley.edu (Cray)
BRL: crimmins@brl.mil
SDSC: consultant@sdsc.edu
NCSA: consult@ncsaa.ncsa.uiuc.edu
NERSC: consultant@nersc.gov
NPAC: npac@nova.npac.syr.edu
OSC: oschelp@osc.edu
PSC: consult@a.psc.edu
Computing Centers
Many libraries allow access to their catalogs via the Internet. Such
catalogs can be useful for finding books not available at a local library
or to check citations or references. Some catalogs also support more
extended reference facilities.
Please note that online catalogs often have a limited number of ports;
users are asked not to abuse their access.
ARLO, The Library Catalog for the University of Colorado at Colorado
Springs
Boston University (TOMUS)
Univ. California and California St. (MELVYL)
Cleveland Public Library Catalog
Colorado Alliance of Research Libraries
Emory University Libraries Online Public Access Catalog
Florida Center for Library Automation
HOLLIS: Harvard Online Library Automation System
U. Illinois at Chicago NOTIS/LUIS
Info-Lib
InfoTrax
MAGICÑMichigan State University Libraries
MIRLYN, The University of Michigan's Online Catalog
Northwestern University LUIS Online Catalog
Research Libraries Information Network (RLIN)
U. New Mexico Gateway
Penn State University Library Information and Access System (LIAS)
U. Pennsylvania Libraries
URSUS, University of Maine System Library Catalog
U. Utah Library Card Catalog System
U. Wisconsin Madison and Milwaukee Campuses Network Library System
(NLS)
Boston University (TOMUS)
library.bu.edu (128.197.4.200)
California (MELVYL)
melvyl.ucop.edu (31.1.0.1)
RLIN rlg.stanford.edu (36.54.0.18)
Colorado
pac.carl.org (192.54.81.128)
Florida
nervm.nerdcufl.edu
MIRLYN, U. Michigan
cts.merit.edu (35.1.1.6)
New Mexico
bootes.unm.edu (129.24.8.2)
Emory University Libraries
emuvm1.cc.emory.edu (128.140.1.4)
MAGIC: merit.msu.edu (35.8.2.56) or magic.msu.edu (35.8.2.99)
Info-Lib: umd5.umd.edu
InfoTrax: infotrax.rpi.edu (128.113.1.31)
ARLO: arlo.colorado.edu (128.198.26.129)
Pennsylvania: pennlib.upenn.edu
Wisconsin: nls.adp.wisc.edu (128.104.198.20)
U. Utah: lib.utah.edu
NW: pacx.acns.nwu.edu (129.105.49.2)
URSUS: ursus.maine.edu (130.111.64.1)
Cleveland: clevxe.cpl.org
U. Illinois: uicvm.uic.edu (128.248.2.50)
Penn State: lias.psu.edu (128.118.25.13)
HOLLIS: hollis.harvard.edu (128.103.60.31)
Data Archives
The Internet is home to a wide variety of data archives. In this section
we try to list the more important and the more uncommon archives. In
particular, we do not list archives of mailing lists, other than those
that do software distributions. Such archives can be located by asking
the maintainers of the mailing lists.
Archie Archive Server Listing Service
COSMIC
Dartmouth Dante Database
Gene-Server
IBM Supercomputing Program Data Base
INFO-SOUTH Latin American Information System
IuBio Archive for Molecular and General Biology
LiMB (Listing of Molecular Biology Databases)
Matrix of Biological Knowledge Archive-Server
MBCRR: The Molecular Biology Computer Research Resource
MEMDB: Medieval and Early Modern Data Bank
University of North Carolina at Chapel Hill INFO Service
NED (NASA/IPAC Extragalactic Database)
NETLIB Mathematical Software Distribution System
PENpages
SDDAS: Southwest Research Data Display & Analysis System
SERVICE Mail ServerÑDDN NIC
SIMBAD
SIMTEL20 Software Archives
Unidata weather data program
VxWorks Users Group Archive
Washington University Public Domain Archives
Gene Server: email "SEND HELP" to: genbank-server@uhnix2.uh.edu,
Molecular Biology Databases: limb@lanl.gov
SIMBAD: simbad@cfa.harvard.edu
SIMTEL20 : 26.2.0.74
SDDAS: espsun.space.swri.edu
Wash.: wuarchive.wustl.edu (128.252.135.4)
Matrix: email "SEND HELP" to: genbank-server@uhnix2.uh.edu,
COSMIC: e-mail to: cosnic@uga.bitnet or
service@cossack.cosmic.uga.edu
IUBIO Biology Archive: iubio.bio.indiana.edu
PENpages: psupen.psu.edu (128.118.36.5)
Dante: eleazar.dartmouth.edu (129.170.16.2)
MEMDB: 4212001@rutmvs1.rutgers.edu
NETLIB: netlib@mcs.anl.gov
VxWorks: thor.atd.ucar.edu (128.117.81.51)
IBM: send mail to: listserv@uicvm.cc.uic.edu,
containing "get supersft help"
SERVICE: e-mail to service@nic.ddn.mil
with "HELP" in subject line
Unidata: unidata.ucar.edu
Archie: quiche.cs.mcgill.ca (132.206.3.30) login as archie.
MBCRR: mbcrr.harvard.edu
NED: ipac.caltech.edu
Chapel Hill INFO: info.acs.unc.edu
username: info
INFO-SOUTH: sabio.ir.miami.edu (129.171.32.26)
White Pages
The Internet supports several databases that contain basic information
about users, such as e-mail addresses, telephone numbers, and postal
addresses. These databases can be searched to get information about
particular individuals. Because they serve a function akin to the
telephone book, these databases are often referred to as "white pages."
(The names of the resources are followed by the addresses to use for
remote login.)
NASA Ames Research Center Electronic Phone Book
DDN Network Information Center WHOIS Service
NYSERNet/PSI White Pages Pilot Project
CREN/CSNET User Name Server "ns"
Knowbot Information Service
This section lists diverse Internet resources that defy better
categorization.
Chiron: Linotype Postscript Typesetter
CIAC (Department of Energy Computer Incident Advisory Capability)
FASTÑA Computer Network Broker for Standard Electronic Parts
Geographic Name Server
MOSIS Chip Fabrication Server
Nest - A Network Simulation Testbed
PROPHET
Vax Book
Chiron: joe@wjh12.harvard.edu
CIAC: email to ciac@tiger.llnl.gov or ciac@lll-crg.llnl.gov
Geographic:
martini.eecs.umich.edu
Nest: columbia.edu (10.3.0.89)
PROPHET: e-mail to prophet-help@bbn.com
FAST: e-mail "REQUEST: INFORMATION
TOPIC: INTRODUCTION
REQUEST: END" to fast@isi.edu
Vax Book
decoy.uoregon.edu (128.223.32.19)
MOSIS: e-mail to: mosis@mosis.edu
Miscellaneous Resources
This section lists diverse Internet resources that defied better
categorization.
Chiron: Linotype Postscript Typesetter
Department of Energy Computer Incident Advisory Capability (CIAC)
Geographic Name Server
port 3000 on martini.eecs.umich.edu
MOSIS Chip Fabrication Server
Nest - A Network Simulation Testbed
columbia.edu (10.3.0.89)
PROPHET
FAST - A Computer Network Broker for Standard Electronic Parts
Vax Book
DECOY.UOREGON.EDU (128.223.32.19)
These are information centers (NICs) for networks in the Internet and
outside it.
¥ BITNET NIC
¥ CREN/CSNET CIC
¥ DDN NIC (Defense Data Net NIC)
¥ NNSC (NSF Network Service Center)
¥ OCEANIC
¥ SPAN NIC
Geographic:
martini.eecs.umich.edu
Nest: columbia.edu (10.3.0.89)
Vax Book
decoy.uoregon.edu (128.223.32.19)
Network Information Centers
Miscellaneous Resources
This section lists diverse Internet resources that defied better
categorization.
Chiron: Linotype Postscript Typesetter
Department of Energy Computer Incident Advisory Capability (CIAC)
Geographic Name Server
port 3000 on martini.eecs.umich.edu
MOSIS Chip Fabrication Server
Nest - A Network Simulation Testbed
columbia.edu (10.3.0.89)
PROPHET
FAST - A Computer Network Broker for Standard Electronic Parts
Vax Book
DECOY.UOREGON.EDU (128.223.32.19)
BITNET Information Center
BITNIC provides and coordinates user
support, information, and administrative services for BITNET,
including:
¥ BITNEWS, an electronically distributed
newsletter.
¥ On-line BITNET documentation
accessible via LIST-SERV and
NETSERV server.
¥ On-line and telephone assistance for
campus BITNET support staff and
organizations seeking BITNET
membership.
Network Access:
Subscribe to BITNEWS by sending electronic mail to LISTSERV@BITNIC
(on BITNET) with any subject and the text: SUBSCRIBE BITNEWS your-
name
Obtain a list of files available by sending mail with any subject and the
text: SENDME NETINFO INDEX
Order a file by sending mail with any subject and the text SENDME
filename filetype using the filename and filetype of the file as shown
in NETINFO INDEX.
Address:
BITNET Network Information Center
EDUCOM
Suite 600
1112 Sixteenth Street, NW
Washington, DC 20036
Email:
bitnet@bitnic (on BITNET)
bitnet%bitnic@cunyvm.cuny.edu
(on Internet)
Phone: (202) 872-4200
Who Can Use the BITNET
The BITNIC services are supported by dues from the BITNET member
organizations,
and their primary purpose is to assist BITNET members. The on-line
newsletter and files are, however, available to all who can access
BITNET with electronic mail.
CREN/CSNET CIC
The CREN/CSNET Coordination and Information Center provides
technical and information support for members of CREN/CSNET.
The CIC staff also maintains the following automated services, which
can be accessed by electronic mail from CSNET hosts, and also from all
other hosts that can exchange mail with the Internet.
The Info-Server: info-server@sh.cs.net
This automatic program distributes documents in response to specially
formatted messages. Info documents are also available to Internet
users through standard anonymous ftp login.
For instructions about this and other services, send a message to info-
server@sh.cs.net with "HELP" in the body of the message.
Email/ftp: info-server@sh.cs.net
Provides file transfer service to hosts that do not have access to the
Internet. (In beta test.)
Status: info-server@sh.cs.net
The status report on the availability of exceptional CSNET systems can
be retrieved from the Info-Server.
The User Name Server: registrar@sh.cs.net
This is a central database containing information about CSNET sites
and users, which is maintained on the CIC Service Host, sh.cs.net.
Users on other sites may send specially formatted messages by
electronic mail, or may access the User Name Server by dial-up modem
on (617) 491-2777. Internet users may telnet to sh.cs.net and log on as
ns, no password required.
Fixaddr: fixaddr@relay.cs.net (or fixaddr@sh.cs.net)
This program is a helpful first step in converting mailing lists to up-
to-date domain-style addresses. Send a message with a mailing list in
the body of the message.
The list should contain one address per line, in the form "user@domain",
for example, "groucho@cs.fredonia.edu". Fixaddr will convert nicknames
into official names. It checks both the DDN NIC host table, and the
Internet domain servers, using the MX option for off-Internet hosts. It
knows about non-domain-style names that have disappeared from the
NIC table.
Nslookup: nslookup@sh.cs.net
For hosts that do not have access to domain servers. Send a message
with domain names or IP addresses, one per line, in the body of the
message. The nslookup program sends back a message containing all
the domain nameserver records (not just the MX ones) for the named
domains.
Network Access
Unlimited
Address:
CREN/CSNET Coordination and Information Center (CIC)
BBN
10 Moulton Street
Cambridge MA 02138
Email: cic@sh.cs.net
Phone: (617) 873-2777
Who Can Use the Resource/Restrictions
Open to all Internet users.
Miscellaneous Information
Karen Roubicek, Manager
Charlotte Mooers, User Services
DDN Information Center
The DDN Network Information Center (NIC) assists Defense Data
Network (DDN) users and potential subscribers in obtaining information
about the DDN and the Internet.
The NIC provides the following databases and information servers:
¥ WHOIS registry of users, hosts, domains, and networks
¥ NIC/QUERY browsing system
¥ TACNEWS server
¥ SERVICE electronic mail server
The NIC provides host name translation tables, maintains domain
system server files, assigns IP network numbers and autonomous
system numbers, registers network users, and issues MILNET TAC
access cards. The NIC is the site of the DDN Security Coordination
Center (SCC). The NIC is also the source of DDN documents and the
complete Internet Request For Comments (RFC) series and index.
The NIC maintains a toll-free hotline from 6:00 a.m. to 5:00 p.m.
(Pacific time) at 1-800-235-3155 or (415) 859-3695. Users
experiencing problems with TAC login, or who have requests for NIC
services, are encouraged to call.
The NIC has numerous publicly accessible information files available in
the following public directories:
¥ NETINFO:
¥ RFC: PROTOCOLS:
¥ SCC:
¥ IEN:
¥ DDN-NEWS:
Each directory has an index. Files are available for anonymous ftp
and, in most cases, are accessible via the automatic mail server
SERVICE@NIC.DDN.MIL.
The NIC shadows IETF information in the publicly accessible IETF: and
INTERNET-DRAFTS: directories.
Network Access
¥ FTP to nic.ddn.mil (192.67.67.20) to
retrieve NIC files.
¥ Telnet to nic.ddn.mil to use servers or
run WHOIS program.
¥ Send electronic mail to
service@nic.ddn.mil to receive
information via the mail server.
¥ By user Kermit server to retrieve NIC files
Address:
SRI International
Network Information Systems Center
Room EJ291
333 Ravenswood Avenue
Menlo Park, CA 94015
E-mail: nic@noc.ddn.mil (for general user questions or document
requests)
Phone: 1-800-235-3155 or (415) 859-3695
Who Can Use the DDN NIC
All services are available to users of the DDN. Many services are
available to Internet users. Some services are available via electronic
mail to users of networks that gateway to the Internet.
Miscellaneous Information
NIC role mailboxes for further assistance:
NIC@NIC.DDN.MIL
General user assistance and document requests
REGISTRAR@NIC.DDN.MIL
User registration and WHOIS updates
HOSTMASTER@NIC.DDN.MIL
Host, domain, network changes and updates
SCC@NIC.DDN.MIL
DDN network security information
ACTION@NIC.DDN.MIL
NIC computer operations
SUGGESTIONS@NIC.DDN.MIL
Comments on NIC services and publications
SERVICE@NIC.DDN.MIL
Automatic mail service
Who Can Use the DDN NIC
All services are available to users of the DDN. Many services are
available to Internet users. Some services are available via electronic
mail to users of networks that gateway to the Internet.
Miscellaneous Information
NIC role mailboxes for further assistance:
nic@nic.ddn.mil
General user assistance and document requests
registrar@nic.ddn.mil
User registration and WHOIS updates
hostmaster@nic.ddn.mil
Host, domain, network changes and updates
scc@nic.ddn.mil
DDN network security information
action@nic.ddn.mil
NIC computer operations
suggestions@nic.ddn.mil
Comments on NIC services and publications
service@nic.ddn.mil
Automatic mail service
NNSC
The NSF Network Service Center provides information services and
technical assistance to NSFNET end-users. Information and documents
(available online or printed) cover topics such as resources (the
Internet Resource Guide), contacts at the midlevel networks and at
local campuses and institutions (the Internet Managers' Phone Book),
and network status reports. When prospective or current users do not
know whom to call concerning their questions about NSFNET use, they
should contact the NNSC by electronic mail at nnsc@nnsc.nsf.net or by
telephone at (617) 873-3400.
Online information is available via ftp and from the Info-Server, an
automated program which distributes documents in response to
specially formatted messages. For instructions about the info-server,
send a message to info-server@nnsc.nsf.net with "HELP" in the body of
the message.
Address:
NNSC
BBN Systems & Technologies
10 Moulton Street
Cambridge, MA 02138
Email: nnsc@nnsc.nsf.net
Phone: (617) 873-3400
Who Can Use the NNSC
NNSC services are geared toward users of NSFNET, however the staff
will provide assistance, either directly or by referring questions to a
more appropriate source for information, to users with general
Internet-related questions or problems.
Miscellaneous Information
To receive copies of the NNSC newsletter (the NSF Network News) or
other publications, please send a message to nnsc@nnsc.nsf.net.
OCEANIC
OCEANIC, the Ocean Network Information Center primarily supports the
World Ocean Circulation Experiment (WOCE) research program. Examples
of OCEANIC content are:
¥ WOCE program information
¡ Summaries of research projects with
emphasis on data collection
¡ WOCE Field Program plans,
resources and maps
¡ WOCE administrative information
¥ Directories of oceanographic datasets:
¡ Holdings of major data centers
¡ Directories of datasets of special
interest to WOCE
¥ A WOCE data-tracking system:
¡ Datasets planned, being collected,
being analyzed, and in data centers.
¥ A library of data products.
OCEANIC also includes:
¥ A searchable directory of oceanographers on Internet, SPAN,
Telemail (Omnet and Kosmos), and Bitnet.
¥ A searchable international oceanographic
research ship schedules.
OCEANIC is self-explanatory and menu-driven. Though intended to work
with simple terminals, to view graphical material, you must use a
terminal-emulation program compatible with the Tektronix 4010
standard.
Network Access:
Internet: telnet to host delocn.udel.edu (128.175.24.1) and login with
username INFO. No password is required.
SPAN: use SET HOST DELOCN, and login with username INFO. No
password is required.
TELEMAIL/ OMNET (Domestic USA): Use command GOTO SONIC.
Users in Alaska should use Telenet/Omnet network address 909014
and follow the instructions above.
International direct: The preferred method is via the international
packet-switched network address:
311030200612Ñif your national system requires a twelve-digit
address
31103020061200Ñif your national system requires a fourteen-digit
address
Some national systems require two zeroes in front of the address.
You may need to experiment.
You will connect directly into OCEANIC. No password is required.
International TELEMAIL/Omnet: You may connect via
Telemail/Omnet at one of these addresses:
311090900003Ñif your local network requires a twelve-digit address
31109090000300Ñif your local network requires a fourteen-digit
address
(NOTE: Users in Canada should use Datapac network address
1311090900014.)
You will get a Telenet "@" prompt after entering this address.
@ MAIL
Username? your username
Password? your password
Once you are signed on to TELEMAIL:
Command? GOTO SONIC
Direct Dial-up: You may access OCEANIC directly using a modem (up to
2400 baud, set at 7,1,N). Dial (302) 645-4204. Login with user name
INFO. No password is required.
Address:
University of Delaware
College of Marine Studies
Lewes, DE 19958
Attention: Katherine A. Bouton
Email:
Internet - bouton@delocn.udel.edu,
SPAN - DELOCN::BOUTON,
Telemail - K.BOUTON/Omnet
Phone: (302) 645-4278
Who Can Use OCEANIC
No restrictions. All oceanographers and meteorologists are welcome.
Miscellaneous Information
Telefax: (302) 645-4007
Telex: 7407728 WDIU UC
System Manager: Walt Dabell
(302) 645-4225
Internet: walt@delocn.udel.edu
Span: DELOCN::WALT
SPAN_NIC
The Space Physics Analysis Network (SPAN) Information Center
supports an interactive database system which can be accessed by
logging in to the SPAN NIC host. The information in the database is
grouped into six categories:
(1) SPAN information section: General Information about SPAN,
Administration structure of SPAN, History of SPAN
(2) Query SPAN database of NODEs: Complete information about a
particular node, Listing of nodes by a particular field, Complete listing
of all nodes in the database
(3) INTERmail syntaxes: How to send mail from SPAN to other users on
other Networks and vice versa including SPAN to X.25 hosts; SPAN to
NASAmail; GSFCmail; Telemail; OMNET; SPAN to Internet; SPAN to
BITNET & EARN; SPAN to NSFNET; SPAN to JANET; SPAN to MFEnet;
JUNET; UUCP; ACSnet
(4) Important NEWS briefs: This section changes periodically to
broadcast to the general SPAN public things that are happening on
SPAN.
(5) Access SPAN Library of documents: Have document e-mailed to
you; Request document be postal mailed to you
(6) How to access other Network Information Centers (NICs)
Network Access
Host Information
Internet:
6.132 (6276)
NSSDC
128.183.10.59
NSSDC.GSFC.NASA.GOV
6.133 (6277)
NSSDCA
128.183.10.4
NSSDCA.GSFC.NASA.GOV
NSSDC is a VAX 11/780. NSSDC is a VAX 8650.
To connect to the SPAN NIC via DECNET, type:
SET HOST NSSDCA <CR> and log in as user SPAN_NIC. You can also set
host to NSSDC.
To connect to the SPAN NIC via the Internet, telnet to either system
and log in as SPAN_NIC.
Dial-in and Telenet access are also availalble. Contact the SPAN NIC
for details.
Address:
SPAN Network Information Center
SPAN Operations Center
NASA/Goddard Space Flight Center
Code 630.2
Greenbelt, Maryland 20771
Email: NETMGR@NSSDCA.GSFC.NASA.GOV
[Internet]
NSSDCA::NETMGR [SPAN]
Phone: 301-286-7251 or FTS 888-7251
Who Can Use the SPAN NIC
All services are available to users of SPAN and the DECnet Internet.
Users who are part of the Internet are also welcome to use this
service.
Miscellaneous Information
For further assistance:
Linda Porter, Acting SPAN Operations ManagerÑ for SPAN policy issues.
SSL::PORTERL or
PORTERL@SSL.MSFC.NASA.GOV
Pat Sisson, SPAN Security ManagerÑfor security related matters.
NSSDCA::SISSON or SISSON@NSSDCA.GSFC.NASA.GOV
Dave Peters SPAN Internetwork ManagerÑfor interworking issues.
NSSDCA::PETERS or PETERS@NSSDCA.GSFC.NASA.GOV
To receive hardcopy of SPAN documents. NSSDCA::REQUEST or
REQUEST@NSSDCA.GSFC.NASA.GOV
Books about the Internet
Douglas E. Comer. Internetworking with TCP/IP: Principles, Protocols
and Architecture. Prentice Hall: Englewood Cliffs, New Jersey. 1988.
Donnalyn Frey and Rick Adams. !%@:: A Directory of Electronic Mail
Addressing and Networks. Second Edition, O'Reilly and Associates:
Sebastopol, California., 1990.
Charles Hedrick. "Introduction to the Internet Protocols" Rutgers
University Computer Science Facilities Group, Piscataway, New Jersey.
1988.
Ed Krol. Hitchhiker's Guide to the Internet (RFC 1118). University of
Illinois, Urbana: Urbana-Champaign, Illinois. 1989.
Tracy L. LaQuey. Users' Directory of Computer Networks. Digital Press:
Bedford, Massachusetts. 1990.
John S. Quarterman. The Matrix: Computer Networks and Conference
Systems Worldwide. Digital Press: Bedford, Massachusetts. 1990.
Andrew S. Tanenbaum. Computer Networks, Second Edition. 1988
Book Review
by Craig Partridge
Douglas E. Comer. Internetworking with TCP/IP: Principles, Protocols
and Architecture. Prentice Hall: Englewood Cliffs, NJ, 1988.
This book is designed to be a comprehensive introduction to the TCP/IP
protocol suite used on NSFNET and numerous other networks. Comer
successfully manages to explain almost every aspect of TCP-IP
networking, from how packets are routed to how hostnames get looked
up.
The book is intended both as an introduction for the advanced
undergraduate and as a reference for professionals. Often that
constitutes an unhappy mix of readers: the undergraduate gets buried by
technical details while the professional finds little intellectual
substance amidst the introductory text.
Comer, however, manages to make this mix work. The text is easy to
read and avoids the mathematics and heavy technical jargon that
frustrates the beginner; at the same time, it offers the professional a
useful reference that at least touches on all aspects of TCP-IP
networking. The bibliography is quite good and at the end of each
chapter Comer points the reader towards additional reading.
Book Review
by Craig Partridge
Donnalyn Frey and Rick Adams. !%@:: A Directory of Electronic Mail
Addressing and Networks. Second Edition, O'Reilly and Associates:
Sebastopol, Calif., 1990.
Imagine this scenario: Your colleague at Prairie View A&M says she has
an electronic mail account but doesn't know what network it is on. You
want to figure out if you can send mail to her. This useful book is
designed to help answer your questions.
The book is organized into several parts. One section is a listing of
networks, such as NSFNET, JUNET, and SPAN, showing the area each
network serves, and the services it supports. Another section indexes
companies by name and by their domain names (Prairie View A&M is
pvamu.edu). A third section indexes geographic regions along with their
affiliated networks. Other sections try to help users figure out what
those e-mail error messages mean.
All this information is packed into 285 easy-to-read pages. The
directory is a
convenient reference to have in your office.
Book Review
by Karen Roubicek
Tracy L. LaQuey. The Users' Directory of Computer Networks. Digital
Press: Bedford, Mass, 1990.
Today's widespread analogy that likens computer networking to the
highway system logically leads to the observation, made by Tracy
LaQuey, that the network traveler needs a roadmap to get around.
LaQuey intends theUser's Directory of Computer Networks to be the
tool that helps network users understand the communications paths,
see how they connect, locate resources (machines, services, or people)
that they need, and understand some basic networking concepts.
The Directory is a descendant of a 1987 volume of the same title
published by the University of Texas, and edited by Carol Englehardt
Kroll, which was subsequently revised by LaQuey. The current directory
is divided into chapters that discuss specific networks, such as the
DECnet Internet and the Internet, essays on the Domain Name System,
the OSI Directory Service (X.500), Electronic Mail, and an organizational
index. In this volume, LaQuey includes several more networks and has
expanded the narrative about each network.
Network Overviews
This book successfully pulls together a lot of information in a
consistent and coherent presentation. Most chapters (several of which
have subchapters that describe component networks of an internet)
provide descriptions that answer the same key questions about each
network: What is the topology? What protocols are supported? What
services are provided? What are the membership requirements? How
is the network administered? What are the usage guidelines? The
descriptions don't go into great technical depth, but that's not the
editor's goal. LaQuey provides maps and extensive lists of hosts,
contacts, and network numbers for reference purposes, but the reader
comes away from a chapter chiefly with a useful overview of each
network and a basic understanding of where each fits into the big
picture.
The essays in the final chapters are particularly helpful for users who
have a limited amount of networking experience. John Quartermann
presents a good summary of the complex issues of electronic mail, and
provides a bibliography
for those readers who want a more extensive treatment of email. Mic
Kaczmarczik includes a useful set of tables designed to help users
construct and send messages between many of the networks described
in the directory.
Paul Mockapetris contributed the chapter on domains. In a succint
three and a half pages,
he does a neat job of summarizing the important concepts of the
domain name system and describing why the reader should care about
them. A list of domain names is included.
The OSI X.500 chapter contains more detail than the other essays and is
less conversational in tone. The focus here is more on the technical
specifics of the OSI Directory and is aimed at a more technically
sophisticated audience.
The final chapter, List of Organizations, is a valuable cross-reference
that gives the reader a picture of the connectivity of over five thousand
organizations.
A shortcoming of theDirectory is one that is typical of all books
dealing with an area that is developing as quickly as networkingÑsome
percentage of the data is automatically outdated as soon as the text is
given to the publisher. However, even if specifics change over time,
such as contact names, the information that remains serves as a
starting for finding the most current information.
The User's Directory is impressive for several reasons. It presents a
huge quantity of information in a straightforward and comprehensible
way. LaQuey has done an excellent job of editing that doesn't make the
user feel overwhelmed by a subject that can actually be quite
overwhelming to those not immersed in network technology. LaQuey's
efforts at collecting and verifying information are apparent, and her
diligence proves worthwhile. This reference guide will occupy a
prominent place on the bookshelves of the masses of network users
who need the information that LaQuey has compiled.
Book Review
by Craig Partridge
John S. Quarterman. The Matrix: Computer Networks and Conference
Systems Worldwide. Digital Press: Bedford, Mass. 1990.
This book chronicles the existing worldwide networks and discusses
the history of networking. It is an indispensable reference,
representing the networking community's first complete look at itself.
The first part of the book is an extended introduction. It presents the
basic concepts in networking, the history of many of the protocol
suites, how networks are used, and who's-who listing of standards and
bodies. The second half of the book lists all known computer networks,
from the United States and Europe (with dozens of networks) to
Thailand (TSCnet) and Costa Rica (CATIENET). The coverage is
extraordinarily thorough. Much of the information comes from private
communication, and many of the networks are very small (a dozen nodes
or less).
Book Review
by Craig Partridge
Andrew S. Tanenbaum. Computer Networks, Second Edition, 1988.
Please note: This is a review of the first edition of this book.
Andrew S. Tanenbaum.Computer Networks, Prentice-Hall, Inc. (1981)
This book is . . . the introductory text most often recommended by
specialists in the computer networking field. One of its great merits
is its comparative approach. Using examples from SNA and DECnet, as
well as TCP/IP and OSI, Tanenbaum offers a breadth of coverage that
few writers can match.
Nonetheless, the book shows its age. It takes a more favorable view of
protocol layering than is currently in vogue and, because it was written
while many transport protocols, such as TCP, were still being
developed, it contains little about what has been learned in the past
several years concerning transport-level problems. The book also
offers no discussion of the problems of external data representations
such as ASN.1. Despite these shortcomings, Computer Networks is
still a good general reference book. Rumor has it that a second edition
is due out this year.
Click on an underlined word to see a definition.
1822
ACK
Acknowledgement
ANSI
AppleTalk
ARP
ARPANET
Authority Zone
Autonomous Confederation
Autonomous System
Backbone
Bandwidth
Baseband
Baud
BBN Bolt Beranek and Newman Inc.
BITNET
Broadband
Broadcast
BSD
Catenet
CCITT
Checksum
Client
Connection
COS Corporation for Open Systems
CREN Corporation for Research and Educational Networking
CSMA/CD Carrier Sense Multiple Access with Collision Detection
CSNET
DARPA Defense Advanced Research Projects Agency
Datagram
DDN Defense Data Network
EARN
EGP Exterior Gateway Protocol
Electronic Mail
Ethernet
email
FDDI Fiber Distribution Data Interface
Field
File Server
Fragment
Frame
FTAM File Transfer, Access, and Management
FTP File Transfer Protocol
Gateway
GOSIP Government OSI Profile
Header
HELLO
Host
ICMP Internet Control Message Protocol
IEEE 802
IEN Internet Engineering Notes
IMP Interface Message Processor
Internet Address
Internet
ISDN Integrated Services Digital Network
ISO International Standards Organization
Layer
LAN Local Area Network
LocalTalk
Mail Bridge
Mail Gateway
MAN
MAP
Message
MILNET MILitary Network
MTU
NBS National Bureau of Standards.
Network
Network Address
NFS Network File System
NIST National Institute for Standards
NIC Network Information Center
NOC Network Operations Center
NNSC NSF Network Service Center
NSF National Science Foundation
NSFNET National Science Foundation Network
NTP Network Time Protocol
ODA Office Document Architecture
OSI Open Systems Interconnect
OSI Reference Model
Packet
Packet Switch
PAD
PING
Protocol
PSN Packet Switch Node
RDP Reliable Datagram Protocol
RFC-733
RFC-822
RFC Request for Comment
RIP Routing Information Protocol
Route
rcp Remote copy
rlogin Remote login
Server
SMTP Simple Mail Transfer Protocol
SNA Systems Network Architecture
SNMP
Source Address
SPAG
Switch
T1
TCP/IP
TELENET
Telnet
TOP Technical/Office Protocol
TP-4/IP
TTL Time To Live
UDP User Datagram Protocol
UUCP UNIX-to-UNIX-CoPy
X.25
X.400
X.500
XNS Xerox Network Services
1822
A hardware protocol used to connect an
Internet host to a packet switch on the
ARPANET and MILNET. This protocol is
also called AHIP (Asynchronous Host Interface Protocol). The number
1822 comes from the BBN (Bolt Beranek and Newman) report that
defined the interface for the original ARPANET.
ACK
Short for acknowledgement.
Acknowledgement
A type of message sent to indicate that a block of data arrived at its
destination without error. A negative acknowledgement (NACK)
indicates that the block of data was not correctly received.
ANSI
American National Standards Institute. This organization is
responsible for approving U.S. standards in many areas, including
computers and communications. Standards approved by this
organization are often called ANSI standards (e.g., ANSI C is the version
of the C language approved by ANSI). ANSI is a member of the
International Standards Organization (ISO).
AppleTalk
A networking protocol developed by Apple Computer for communication
between Apple Computer products and other computers. This protocol
is independent of what network it is layered on. Current
implementations exist on Localtalk (a 235-kilobit/second local area
network (LAN)), and Ethertalk (a 10-megabit/second local area
network).
ARP
Address Resolution Protocol. This protocol is used to dynamically bind
an Internet address to a low-level physical network address. It is
often used on local area networks (LANs) such as Ethernet.
ARPANET
One of the first heterogeneous-host packet switching networks
developed for the Advanced Research Projects Agency of the
Department of Defense (see DARPA). The ARPANET became operational
in 1968; it was the proving ground for many of the protocols and
concepts in todayÕs Internet.
Authority Zone
The part of a domain name that a single name server resolves. For
example, if the server spooler .bbn.com is responsible for resolving all
machine addresses in the domain bbn.com, then its authority zone is
*.bbn.com (where * means anything is allowed). On the other hand,
george.random.com would not be in its authority zone.
Autonomous Confederation
A group of independent computer systems that trust each other
regarding routing (see route) and reachability information. Members of
an autonomous confederation will believe information provided by other
members of the confederation in preference to information received
from systems that are not part of the confederation.
Autonomous System
A collection of networks controlled by one administrative authority.
The gateways within this system are expected to trust one another and
to share and update routing information (see route) among themselves
by any mutually agreeable protocol. A core gateway must also be
designated to share routing information with other autonomous
systems via EGP.
Backbone
A central high-speed network connecting independent subnetworks.
Today, the NSFNET provides a backbone network for regional networks
such as NEARnet, CSNET, and BARRNet.
Bandwidth
The frequency width of a communications channel, usually measured in
hertz, kilohertz, or megahertz. For example, one channel on a satellite
transponder might have a bandwidth of six megahertz, thereby enabling
it to carry a television signal. Sometimes, this term is applied to how
much digital information a channel can carry, usually in conjunction
with fully digital communications lines. For example, a T1 line might
be said to have a bandwidth of 1.544 megabits/second; however, it
would be more correct to say that a T1 line can carry or transmit 1.544
megabits/second.
Baseband
A transmission medium where digital signals are sent without
complicated frequency shifting. In general, only one communication
channel is provided at a time on a baseband system. Ethernet is a
baseband network.
Baud
The number of symbols that may be sent over a communications channel
per second. Each symbol may be an arbitrary analog signal, and it may
represent more than one bit of information. For example, a
communications channel transmitting at 2400 baud, with each symbol
containing four bits, is capable of sending 9600 bits per second (this is
in fact the way V.32 9600-baud modems work).
BBN
Bolt Beranek and Newman Inc., a
diversified high-technology company
in Cambridge, Massachusetts, was awarded the original contract to
build the ARPANET and has been extensively involved in Internet
development. Today, BBN is responsible for managing the NNSC, CSNET,
and NEARnet among others. This stack is brought to you by the NNSC
staff at BBN (Hi Mom!).
BITNET
Because ItÕs Time Network. An academic and research network
connecting approximately 2500 computers in thirty-two countries.
This network provides interactive electronic mail, and file transfer
services via a store-and-forward methodology based on IBM NJE
protocols. BITNET traffic and Internet traffic are exchanged via
several gateway hosts. This network is now part of the Corporation for
Research and Educational Networking (CREN).
Broadband
A transmission medium where multiple digital channels are frequency
multiplexed onto a single cable. This type of network requires
relatively complicated electronics, but is capable of carrying voice,
data, and video all on the same medium. Cable television systems are
examples of broadband networks.
Broadcast
A technique used to send packets to all hosts on a network. Broadcasts
are often used in conjunction with ARP and RARP protocols on local
area networks.
BSD
Berkeley Source Distribution. This acronym is used to describe the
versions of the UNIX operating system and its utilities developed and
distributed by the University of California at Berkeley. "BSD" is usually
preceded by the version number of the distribution, e.g., "4.3 BSD" is
version 4.3 of the Berkeley UNIX distribution. Many Internet hosts run
BSD software, and it has been the ancestor of many commercial UNIX
implementations such Sun OS and SequentÕs Dynix.
Catenet
A term coined to describe the communications structure created when
packet switched networks are connected by gateways. The term
internet without a capital I is now more commonly used.
CCITT
ComitŽ Consultatif International de TŽlŽgraphique et TŽlŽphonique
(International Consultative Committee on Telephone and Telegraph).
This organization is part of the United Nations International
Telecommunications Union (ITU) and is responsible for making
technical recommendations about telephone and data communication
systems. X.25 is an example of a CCITT recommendation. Every four
years CCITT holds plenary sessions where they adopt new standards; a
session is planned for 1992.
Checksum
A computed symbol whose value is dependent upon the entire contents
of a message or packet. This value is usually
sent along with the message when it is transmitted. The receiving
system computes a new checksum based upon the received data and
compares this value with the one sent with the packet. If the
two values are the same, the receiver has a high degree of confidence
that the data was received correctly.
Client
A computer system or process that requests a service of another
computer system or process. A workstation requesting the contents of
a file from a file server is a client of the file server.
Connection
An agreement between two processes or hosts to pass information
along a specified protocol path without further exchanges of addressing
information.
COS
Corporation for Open Systems. An international non-profit organization
made up of computer users and vendors. This organizationÕs mission is
to provide ways of testing OSI implementations.
CREN
Corporation for Research and Educational Networking. This
organization was formed in October, 1989, when BITNET and CSNET
were combined under one administrative authority. CREN is now
responsible for providing networking service to both BITNET and CSNET
users.
CSMA/CD
Carrier Sense Multiple Access with Collision Detection (phew!). This is
a characteristic of a local area network (LAN). When multiple users
have access to the network for transmitting data, the network avoids
transmitting data from more than one user at a time, so that they avoid
running into each other. Ethernet works this way.
CSNET
Computers and Science Network. A network that was established to
provide mail forwarding and Internet connectivity to computer (and
now other) science researchers. This network primarily provides
electronic mail service via dial-up lines, although X.25 and Internet
services are available from sites that are suitably connected. This
network is now part of the Corporation for Research and Educational
Networking (CREN).
DARPA
Defense Advanced Research Projects Agency. An agency of the U.S.
Department of Defense responsible for the development of new
technology for use by the military. DARPA (formerly known as ARPA)
was responsible for funding much of the development of the Internet
we know today. The New York Times business section called DARPA
"AmericaÕs answer to JapanÕs MITI."
Datagram
A packet whose routing (see route) and interpretation is independent of
other packets being sent by that host. Every datagram must contain a
destination address, since it cannot rely on addressing information
sent by previous packets. Datagrams are a connectionless form of
communication, and are the basic building blocks of the internet
protocol (IPÑsee TCP/IP).
DDN
Defense Data Network. A worldwide operational communications
network serving the US Department of Defense composed of ARPANET,
MILNET, and other portions of the Internet, used to connect military
installations. It is run by the Defense Communications Agency (DCA).
EARN
European Academic Research Network. A network connecting European
university and research institutions providing electronic mail and
remote job entry facilities. This network uses BITNET protocols and
connects to BITNET in the U.S.
EGP
Exterior Gateway Protocol. This protocol is used by a gateway
representing an autonomous system to export to other gateways
information concerning networks and gateways contained within that
system.
Electronic Mail
A system whereby a computer user can exchange messages with other
computer users (or groups of users) via a communications network.
Electronic mail is one of the most popular uses of the Internet.
Ethernet
A 10-megabit/second standard for local area networks (LANs), initially
developed by Xerox, and later refined by Xerox, DEC, and Intel. All hosts
are connected to a coaxial cable where they contend for network access
according to the CSMA/CD protocol.
Email (or E-mail)
Shortspeak for electronic mail (q.v.).
FDDI
Fiber Distribution Data Interface. A newly emerging standard for a
fiber-optic local area network (LAN) running at 100 megabits/second.
Field
In computer messages, data files, and programs, a field is a group of
characters that is treated as a unit. For example, each TCP/IP packet
contains fields for addressing and routing information (see route).
Internet users may encounter fields in the header of an electronic mail
message. The fields are lines that begin with a field-name followed by
a colon and a space. To: and From: are the only required header fields,
but there are optional standard fields for the user, and fields that are
added by the mail delivery system. The format of email messages is
defined in RFC-822.
File Server
A computer whose principal purpose is to store files and provide
network access to those files.
Fragment
A piece of a packet. When a gateway is forwarding a maximum size IP
(see TCP/IP) packet to a network that has a smaller maximum packet
size, it is forced to break up that packet into multiple fragments for
transport on the new network. These fragments will be reassembled
by the IP layer at the destination host (or possibly by an intermediate
gateway under some circumstances).
Frame
An assembly of bits at the Data Link layer of the ISO protocol stack.
This collection of bits begins with some bits used for header
information, and ends with some checksum bits used for error
detection and/or correction. All bits between the header and the
checksum are data.
FTAM
File Transfer, Access, and Management. An application layer protocol
for moving and manipulating files.
FTP
File Transfer Protocol. A protocol permitting a user on one Internet
host to access and transfer files to another host over a network, such
as the Internet. FTP is usually the name not only of the protocol, but
also of the program the user invokes to execute the protocol (e.g., ftp
host.bbn.com). This protocol is usually layered on top of TCP and IP
(see TCP/IP). FTP is available on several operating systems. You can
use the ftp command to copy computer files that contain a variety of
information, such as software, documentation, or maps.
Gateway
A computer used to connect together one or more networks. This
computer is seen as a host by the networks to which it is connected,
but is capable of forwarding packets from one network to another.
Gateways are also responsible for providing and receiving routing
information to other gateways in the Internet so that they will know
the best routes for sending packets between networks. One may think
of a gateway as a packet switch with whole computer networks as its
communication links.
GOSIP
Government OSI Profile. GOSIP is a collection of ISO specifications for
mixed-vendor networks for use by the government. Government
networks are mandated to support GOSIP in the not-too-distant future.
Header
The header is information that appears at the top of an electronic mail
message. See field.
HELLO
An inter-packet switch protocol used in the NSFNET to determine
shortest delay routing (see route). This protocol is only used among
packet switches that trust each other.
Host
A computer that allows users to communicate with other host
computers on a network. Individual users communicate by using
application programs, such as electronic mail, TELNET, and FTP.
ICMP
Internet Control Message Protocol. This protocol is an integral part of
the Internet Protocol (IPÑsee TCP/IP). The protocol is used to exchange
error and control information among IP hosts. For example, a gateway
that is sent an IP datagram for which it is not the best route would
send an ICMP redirect packet back to the originating host to inform it
of the best route. ICMP implementations also provide fault isolation
capabilities such as packet echo.
IEEE 802
The IEEE standards for local and metropolitan area networks (see LAN
and MAN). This class of standards is further broken down by type of
network, each of which is specified by digits after a decimal point. For
example, the Ethernet standard is 802.3; IBM Token Ring is IEEE 802.5.
IEN
This stands for Internet Engineering Notes.
IMP
Interface Message Processor. This was the name for the original
packet switches used in the ARPANET and MILNET. Today, the term
Packet Switch Node or PSN is in more common usage.
Internet Address
A thirty-two-bit number that uniquely identifies an Internet host. This
address is typically represented in eight-bit numbers (octets)
separated by dots, e.g., 128.89.1.132. An Internet address consists of a
network number and a host number, and may be a class A, B, or C
address. A class A network address is formatted as N.H.H.H, providing
seven bits of network number and twenty-four bits of host number (e.g.,
26.0.0.117 indicates host 117 on net 26). A Class B network address is
formatted as N.N.H.H, providing fourteen bits of network number and
sixteen bits of host number (e.g.,128.89.1.132 indicates host 1.132 on
net number 128.89). A Class C network address is formatted as N.N.N.H,
providing twenty-two bits of network number and eight bits of host
address (e.g.,192.1.14.28 indicates host 28 on network number
192.1.14).
The Internet is the interconnection of many networks throughout the
world that speak the same language, namely the TCP/IP protocol suite.
Internet with a capital I refers specifically to that internet that
contains NSFNET, MILNET, and DDN.
You may see "internet" with a small "i." This can refer to any network
built out of the TCP/IP protocol suite, or it might refer to networks
using other protocol families that are composites of smaller networks.
Internet
ISDN
Integrated Services Digital Network. A public digital network designed
to integrate voice and non-voice traffic. This system is intended to be
a replacement for our current analog telephone systems, and as such is
being standardized by the CCITT.
ISO
International Standards Organization. The international body
responsible for establishing multivendor networking standards.
Layer
Communication networks for computers may be organized as a set of
more
or less independent protocols, each in a different layer (also called
level). The lowest layer governs direct host-to-host communication
between the hardware at different hosts; the highest consists of user
applications. Each layer builds on the layer beneath it. For each layer,
programs at different hosts use protocols appropriate to the layer to
communicate with each other.
TCP/IP has five layers of protocols, and OSI
has seven. The advantage of different layers of protocols is that the
methods of passing information from one layer to another is specified
clearly as part of the protocol suite, and changes within a protocol
layer are prevented from affecting the other layers. This greatly
simplifies the task of designing and maintaining communication
programs.
LAN
Local Area Network. A data network intended to serve an area of only a
few square kilometers or less. Because the network is known to cover
only a small area, optimizations can be made in the network signal
protocols that permit data rates in the 10-megabyte-per-second to
100-megabytes-per-second range today. Wide-area communication is
accomplished by connecting LANs together via metropolitan area
networks (MANs) or wide-area networks (WANs). Both Ethernet and
FDDI are local area networks.
LocalTalk
A local area network (LAN) protocol developed by Apple Computer. This
network is designed to run over twisted pairs of telephone wire and has
a data rate of 235 kilobits/second. All Macintosh computers contain a
LocalTalk interface.
Mail Bridge
A mail gateway that forwards electronic mail between two or more
networks while ensuring that the messages it forwards meet certain
administrative criteria. A mail bridge is simply a specialized form of
mail gateway that enforces an administrative policy with regard to
what mail it forwards.
Mail Gateway
A network host that forwards electronic mail between two or more
possibly dissimilar networks. In the process of forwarding the mail,
the gateway may have to reformat addresses and mail headers to
conform with the electronic mail standards of the destination network.
MAN
Metropolitan Area Network. A data network intended to serve an area
approximating that of a large city. Such networks are being
implemented by innovative techniques such as running fiber cables
through subway tunnels.
MAP
Manufacturing Automation Protocol. A protocol stack developed by
General Motors following the OSI model that guarantees access to each
host within a certain maximum time. At the upper layers, it includes
many of the OSI standards. At the lower layers, it is based upon Token
Bus (IEEE 802.4).
Message
"Message" has multiple meanings:
1) A user-defined collection of data sent
over a network.
2) A piece of text displayed on a terminal
screen that was sent by a user or a
program.
3) A collection of data sent from one
computer programming entity to
another.
MILNET
MILitary NETwork. This network was created in 1984 from parts of the
original ARPANET. The military users wished to have an operational
production network, while the research community wished to have a
network on which to continue experimenting in networking. Therefore,
the military users were placed on MILNET, the research users were
placed on ARPANET, and the two networks were connected with mail
bridges and gateways. Today, MILNET is one of the class A networks in
the Internet.
MTU
Maximum Transmission Unit. The largest number of bits that a
network permits to be transmitted as one packet.
NBS
National Bureau of Standards. This organization, which was part of the
U.S. Department of Commerce, was responsible for establishing
standards in the United States. It has since become the NIST.
Network
A computer network is a group of computers that can communicate
electronically. Networks can be composed of computers in a single
building (Local Area Networks or LANs), or computers thousands of
miles apart (Wide Area Networks or WANs). The Internet is a
worldwide collection of computer networks that can intercommunicate.
The system manager and computer center staff at your site can provide
information about your local network.
Network Address
A number or group of numbers that uniquely specifies a host on a
network. For example, 128.89.1.178 is the network address for
nnsc.nsf.net. Also, informally, an electronic mail address. For
example, nnsc@nnsc.nsf.net is the network address for the NSF
Network Service Center (NNSC).
NFS
Network File System. This acronym describes a protocol developed by
Sun Microsystems to allow a computer system to access files over a
network as if they were on its local disks. This protocol has been
incorporated in products by more than two hundred companies, and is
now a de facto Internet standard.
NIST
This stands for the National Institute for Standards and Technology
(see NBS).
NOC
Network Operations Center. A location from which the operation of a
network or internet is monitored. This center also usually serves as a
clearinghouse for problems and efforts to resolve those problems.
NSF
National Science Foundation. A government agency whose purpose is to
promote the advancement of science. NSF funds science researchers,
scientific projects, and infrastructure to improve the quality of
scientific research. The NSFNET, funded by NSF, is an essential part of
academic and research communications.
NTP
Network Time Protocol. A protocol built on top of TCP (see TCP/IP)
that assures accurate local time-keeping with reference to radio and
atomic clocks located on the Internet. This protocol is capable of
synchronizing distributed clocks within milliseconds over long time
periods.
ODA
Office Document Architecture. This emerging standard defines ways in
which text, graphics, and facsimile documents can be moved over a
multivendor network.
OSI
Open Systems Interconnect. Usually used as shorthand for the Open
Systems Interconnection Reference Model (OSI Reference Model).
OSI Reference Model
A seven-layer structure designed to describe computer network
architectures and the way that data passes through them. This model
was developed by the ISO in 1978 to clearly define the interfaces in
multivendor networks, and to provide users of those networks with
conceptual guidelines in the construction of such networks.
Packet
A collection of data sent as a unit along a packet network. Packets are
self-contained; each packet has its own source address and destination
address and cannot exceed a maximum size. Long messages are broken
up into multiple packets for transmission over the network.
Packet Switch
See PSN.
PAD
Packet Assembler/Disassembler. A network host designed to interface
terminals to a packet network.
PING
Packet Internet Groper. A program that sends packets to a remote host
on the Internet and looks for replies. This program works via the
echoing facility provided by the ICMP protocol and is a way to
determine if an Internet host is reachable from your host.
Protocol
A mutually agreed procedure for communicating information between
two parties. Standard protocols are the basis for all computer
communication.
PSN
Packet Switch Node. A dedicated computer whose purpose is to accept,
route, and forward packets in a packet switched network.
RDP
Reliable Datagram Protocol. An Internet standard protocol for reliably
sending datagrams between user programs. This protocol is like UDP,
but guarantees delivery and does retransmission as necessary. This
protocol is built on top of IP (see TCP/IP) and uses IP for datagram
delivery.
RFC-733
An obsolete version of the Request for Comments (Standard for the
format of ARPA Internet Test Messages, August 16, 1982) that
specifies the format of electronic mail messages. See RFC-822.
RFC-822
The current version of the Request for Comments that specifies the
format of electronic mail messages.
RFC
Request for Comments. RFCs are the principal documents used on the
Internet to propose new protocols and services. These documents are
published as electronic documents on nic.ddn.mil by the DDN NIC.
RIP
Routing Information Protocol. A routing (see route) protocol provided
in the Berkeley UNIX (see BSD) operating system, that permits a group
of hosts located on a local network to share routing information. This
function is provided by the program routed.
Route
A path from one Internet host to another.
rcp
Remote copy. A program and protocol provided in the Berkeley UNIX
operating system (see BSD) that permits files to be copied from one
computer to another by an extension to the syntax of the UNIX cp (copy)
command. This protocol is largely implemented among UNIX machines,
but the protocol is general enough that non-UNIX machines may use it.
However, rcp does not provide the word-length adaptability and
flexibility that the FTP protocol does.
rlogin
Remote login. A program and protocol provided in Berkeley UNIX (see
BSD) that permits a user on one computer to log in to another computer.
This protocol is largely implemented among UNIX machines, but the
protocol is general enough that non-UNIX machines may use it. For
example, Excelan ANNEX terminal concentrators permit users on dumb
terminals to use the rlogin protocol to communicate with Internet
computers.
Router
A device that chooses routings for packets. This is a generic term and
applies to such diverse devices as bridges (which pass packets from
one physical LAN to another with almost no interpretation) and WAN
gateways (which pass packets from one wide area network to another,
doing fragmentation and reassembly as necessary).
Server
A computer system or process that provides a service for other
computer systems or processes to access. A supercomputer can be
thought of as a computation server. A program that provides Internet
File Transfer Protocol (FTP) access to local files is usually called an
FTP server.
SMTP
Simple Mail Transfer Protocol. This Internet standard network protocol
is used to move electronic mail messages from one host to another.
SNA
Systems Network Architecture. A proprietary networking architecture
used by IBM and IBM-compatible mainframe computers. Because of its
widespread use, SNA is a de facto standard. While it can use packet
switched networks for transport, SNA is largely a circuit-switching
rather than a packet-switching technology.
SNMP
Simple Network Monitoring Protocol. This Internet standard protocol is
used by a network monitoring center to gather information regarding
the status of hosts on its network or on the Internet.
Source Address
The network address of the host that originates a packet.
SPAG
Standards Promotion and Applications Group. This European
organization collaborates with COS to promote testing procedures and
techniques for OSI products.
Switch
A computer responsible for routing (see route) packets in a packet
switched network.
T1
A communications service over leased lines and microwave links that
runs at 1.544 megabytes per second. The major links of the NSFNET are
T1. Faster services such as T3 (45 megabytes per second) are
available, although they are not yet off-the-shelf products. The
NSFNET is in the process of upgrading to T3, and plans much higher
transmission rates for the future.
TCP/IP
Transmission Control Protocol/Internet Protocol. A Department of
Defense standard protocol suite encompassing both network and
transport level protocols. While the terms TCP and IP specify two
protocols, common usage of the two terms together has come to
represent the entire DoD protocol suite based upon these protocols,
including Telnet, FTP, UDP, and RDP. Technically, this is incorrect
usage, because other protocol stacks can be layered on top of TCP and
IP that provide similar services, but are not part of the DoD standard
protocols (e.g., TP-4/IP, FTAM on TCP, etc.). Ideally, one should only
use TCP/IP to mean the TCP protocol layered on top of the IP protocol.
TELENET
A commercial wide-area packet switching X.25 network.
TELNET
Telnet is a program that allows a computer user at one site to work on
a computer at another site. It is the Internet standard protocol for
remote terminal connection service.
Telnet requires Internet access, that is, you must be on a TCP/IP
network that gateways to the Internet. Unlike FTP and electronic mail,
Telnet actually exposes you to the commands and programs of the
remote host.
For example, you can use the telnet command to run a program in your
directory on a supercomputer hundreds of miles away.
TOP
Technical/Office Protocol. A protocol stack for office automation
developed by Boeing following the OSI model. This protocol is very
similar to MAP except at the lowest levels, where it uses Ethernet
(IEEE 802.3) rather than Token Bus (IEEE 802.4).
TP-4/IP
The ISO protocol suite that performs the same functions as TCP/IP.
TP-4 provides reliable, connection-oriented data streams using
datagrams. This protocol also handles error detection, synchronization,
and retransmission, just as TCP does.
TTL
Time To Live. A field in a datagram designed to prevent packets from
looping indefinitely in the Internet. Because routing information
changes dynamically, two or more gateways may occasionally forward
packets to each other in a loop, since each believes the other is the
best route to the destination. A packet is initially sent with a nonzero
TTL field, and each gateway that forwards that packet decrements the
value in that field. Once the value reaches zero, a loop is assumed and
the packet is discarded.
UDP
User Datagram Protocol. The Internet standard protocol for sending
datagrams between user programs. This protocol neither guarantees
delivery nor does it require a connection. As a result it is lightweight
and efficient, but requires the application to do all error processing
and retransmissions. This protocol is built on top of IP and uses IP for
datagram delivery (see TCP/IP).
UUCP
UNIX-to-UNIX-CoPy. This was initially a program run under the UNIX
operating system (see BSD) that permitted one UNIX system to send
files to another UNIX system via dial-up phone lines. Today, the term is
more commonly used to describe the large international network made
up of these machines using the UUCP protocol to pass netnews and
electronic mail.
X.25
A standard networking protocol suite approved by the CCITT and ISO.
This protocol suite defines standard physical, link, and networking
layers only (layers 1 through 3). X.25 networks are in use throughout
the world.
X.400
The CCITT standard for electronic mail. X.400 systems are in use in
Europe, Canada, and several U.S. commercial installations.
X.500
The CCITT standard for electronic mail directory services.
XNS
Xerox Network Services. A proprietary networking architecture
developed by Xerox.