home *** CD-ROM | disk | FTP | other *** search
Text File | 1993-11-24 | 160.0 KB | 3,925 lines |
-
- Part A
- Zen and the Art of the Internet
-
- Copyright (c) 1992 Brendan P. Kehoe
-
- Permission is granted to make and distribute verbatim copies of this
- guide provided the copyright notice and this permission notice are
- preserved on all copies.
-
- Permission is granted to copy and distribute modified versions of
- this booklet under the conditions for verbatim copying, provided that
- the entire resulting derived work is distributed under the terms of a
- permission notice identical to this one.
-
- Permission is granted to copy and distribute translations of this
- booklet into another language, under the above conditions for
- modified versions, except that this permission notice may be stated
- in a translation approved by the author.
-
- NOTE:
- This copy was ``decompiled'' from texinfo source, and is
- not properly formatted....
-
- If you can, consider using the postscript or .dvi form
- for printing, and this one for on-line reference
-
- --dave (davecb@nexus.yorku.ca)
-
- Zen and the Art of the Internet
- A Beginner's Guide to the Internet
- First Edition
- January 1992
-
- by Brendan P. Kehoe
-
- This is revision 1.0 of February 2, 1992.
- Copyright (c) 1992 Brendan P. Kehoe
-
- The composition of this booklet was originally started because the
- Computer Science department at Widener University was in desperate
- need of documentation describing the capabilities of this ``great new
- Internet link'' we obtained.
-
- It's since grown into an effort to acquaint the reader with much of
- what's currently available over the Internet. Aimed at the novice
- user, it attempts to remain operating system ``neutral''---little
- information herein is specific to Unix, VMS, or any other
- environment. This booklet will, hopefully, be usable by nearly
- anyone.
-
- A user's session is usually offset from the rest of the paragraph, as
- such:
-
- prompt> command
- The results are usually displayed here.
-
- The purpose of this booklet is two-fold: first, it's intended to
- serve as a reference piece, which someone can easily grab on the fly
- and look something up. Also, it forms a foundation from which people
- can explore the vast expanse of the Internet. Zen and the Art of the
- Internet doesn't spend a significant amount of time on any one point;
- rather, it provides enough for people to learn the specifics of what
- his or her local system offers.
-
- One warning is perhaps in order---this territory we are entering can
- become a fantastic time-sink. Hours can slip by, people can come and
- go, and you'll be locked into Cyberspace. Remember to do your work!
-
- With that, I welcome you, the new user, to The Net.
-
- brendan@cs.widener.edu
- Chester, PA
-
- Acknowledgements
-
- Certain sections in this booklet are not my original work---rather,
- they are derived from documents that were available on the Internet
- and already aptly stated their areas of concentration. The chapter
- on Usenet is, in large part, made up of what's posted monthly to
- news.announce.newusers, with some editing and rewriting. Also, the
- main section on archie was derived from whatis.archie by Peter
- Deutsch of the McGill University Computing Centre. It's available
- via anonymous FTP from archie.mcgill.ca. Much of what's in the
- telnet section came from an impressive introductory document put
- together by SuraNet. Some definitions in the one are from an
- excellent glossary put together by Colorado State University.
-
- This guide would not be the same without the aid of many people on The
- Net, and the providers of resources that are already out there. I'd
- like to thank the folks who gave this a read-through and returned some
- excellent comments, suggestions, and criticisms, and those who
- provided much-needed information on the fly. Glee Willis deserves
- particular mention for all of his work; this guide would have been
- considerably less polished without his help.
-
- Andy Blankenbiller <rablanke@crdec7.apgea.army.mil>
- Andy Blankenbiller, Army at Aberdeen
-
- bajan@cs.mcgill.ca
- Alan Emtage, McGill University Computer Science Department
-
- Brian Fitzgerald <fitz@mml0.meche.rpi.edu>
- Brian Fitzgerald, Rensselaer Polytechnic Institute
-
- John Goetsch <ccjg@hippo.ru.ac.za>
- John Goetsch, Rhodes University, South Africa
-
- composer@chem.bu.edu
- Jeff Kellem, Boston University's Chemistry Department
-
- kraussW@moravian.edu
- Bill Krauss, Moravian College
-
- Steve Lodin <deaes!swlodin@iuvax.cs.indiana.edu>
- Steve Lodin, Delco Electronics
-
- Mike Nesel <nesel@elxsi.dfrf.nasa.gov>
- Mike Nesel, NASA
-
- Bob <neveln@cs.widener.edu>
- Bob Neveln, Widener University Computer Science Department
-
- wamapi@dunkin.cc.mcgill.ca (Wanda Pierce)
- Wanda Pierce, McGill University Computing Centre
-
- Joshua.R.Poulson@cyber.widener.edu
- Joshua Poulson, Widener University Computing Services
-
- de5@ornl.gov
- Dave Sill, Oak Ridge National Laboratory
-
- bsmart@bsmart.tti.com
- Bob Smart, CitiCorp/TTI
-
- emv@msen.com
- Ed Vielmetti, Vice President of MSEN
-
- Craig E. Ward <cew@venera.isi.edu>
- Craig Ward, USC/Information Sciences Institute (ISI)
-
- Glee Willis <willis@unssun.nevada.edu>
- Glee Willis, University of Nevada, Reno
-
- Charles Yamasaki <chip@oshcomm.osha.gov>
- Chip Yamasaki, OSHA
-
- Network Basics
-
- We are truly in an information society. Now more than ever, moving
- vast amounts of information quickly across great distances is one of
- our most pressing needs. From small one-person entrepreneurial
- efforts, to the largest of corporations, more and more professional
- people are discovering that the only way to be successful in the '90s
- and beyond is to realize that technology is advancing at a break-neck
- pace---and they must somehow keep up. Likewise, researchers from all
- corners of the earth are finding that their work thrives in a
- networked environment. Immediate access to the work of colleagues
- and a ``virtual'' library of millions of volumes and thousands of
- papers affords them the ability to encorporate a body of knowledge
- heretofore unthinkable. Work groups can now conduct interactive
- conferences with each other, paying no heed to physical
- location---the possibilities are endless.
-
- You have at your fingertips the ability to talk in ``real-time'' with
- someone in Japan, send a 2,000-word short story to a group of people
- who will critique it for the sheer pleasure of doing so, see if a
- Macintosh sitting in a lab in Canada is turned on, and find out if
- someone happens to be sitting in front of their computer (logged on)
- in Australia, all inside of thirty minutes. No airline (or tardis,
- for that matter) could ever match that travel itinerary.
-
- The largest problem people face when first using a network is
- grasping all that's available. Even seasoned users find themselves
- surprised when they discover a new service or feature that they'd
- never known even existed. Once acquainted with the terminology and
- sufficiently comfortable with making occasional mistakes, the
- learning process will drastically speed up.
-
- Domains
-
- Getting where you want to go can often be one of the more difficult
- aspects of using networks. The variety of ways that places are named
- will probably leave a blank stare on your face at first. Don't fret;
- there is a method to this apparent madness.
-
- If someone were to ask for a home address, they would probably expect
- a street, apartment, city, state, and zip code. That's all the
- information the post office needs to deliver mail in a reasonably
- speedy fashion. Likewise, computer addresses have a structure to
- them. The general form is:
-
- a person's email address on a computer: user@somewhere.domain
- a computer's name: somewhere.domain
-
- The user portion is usually the person's account name on the
- system, though it doesn't have to be. somewhere.domain tells
- you the name of a system or location, and what kind of organization it
- is. The trailing domain is often one of the following:
-
- com
- Usually a company or other commercial institution or organization,
- like Convex Computers (convex.com).
-
- edu
- An educational institution, e.g. New York University, named nyu.edu.
-
- gov
- A government site; for example, NASA is nasa.gov.
-
- mil
- A military site, like the Air Force (af.mil).
-
- net
- Gateways and other administrative hosts for a network (it does not
- mean all of the hosts in a network). {The Matrix, 111. One such
- gateway is near.net.}
-
- org
- This is a domain reserved for private organizations, who don't
- comfortably fit in the other classes of domains. One example is the
- Electronic Frontier Foundation named eff.org.
-
- Each country also has its own top-level domain. For example, the
- us domain includes each of the fifty states. Other countries
- represented with domains include:
-
- au Australia
- ca Canada
- fr France
- uk The United Kingdom. These also have sub-domains of things like
- ac.uk for academic sites and co.uk for commercial ones.
-
- FQDN (Fully Qualified Domain Name)
-
- The proper terminology for a site's domain name (somewhere.domain
- above) is its Fully Qualified Domain Name (FQDN). It is usually
- selected to give a clear indication of the site's organization or
- sponsoring agent. For example, the Massachusetts Institute of
- Technology's FQDN is mit.edu; similarly, Apple Computer's domain name
- is apple.com. While such obvious names are usually the norm, there
- are the occasional exceptions that are ambiguous enough to
- mislead---like vt.edu, which on first impulse one might surmise is an
- educational institution of some sort in Vermont; not so. It's
- actually the domain name for Virginia Tech. In most cases it's
- relatively easy to glean the meaning of a domain name---such
- confusion is far from the norm.
-
- Internet Numbers
-
- Every single machine on the Internet has a unique address, {At least
- one address, possibly two or even three---but we won't go into
- that.} called its Internet number or IP Address. It's actually a
- 32-bit number, but is most commonly represented as four numbers
- joined by periods (.), like 147.31.254.130. This is sometimes also
- called a dotted quad; there are literally thousands of different
- possible dotted quads. The ARPAnet (the mother to today's Internet)
- originally only had the capacity to have up to 256 systems on it
- because of the way each system was addressed. In the early eighties,
- it became clear that things would fast outgrow such a small limit;
- the 32-bit addressing method was born, freeing thousands of host
- numbers.
-
- Each piece of an Internet address (like 192) is called an ``octet,''
- representing one of four sets of eight bits. The first two or three
- pieces (e.g. 192.55.239) represent the network that a system is on,
- called its subnet. For example, all of the computers for Wesleyan
- University are in the subnet 129.133. They can have numbers like
- 129.133.10.10, 129.133.230.19, up to 65 thousand possible
- combinations (possible computers).
-
- IP addresses and domain names aren't assigned arbitrarily---that
- would lead to unbelievable confusion. An application must be filed
- with the Network Information Center (NIC), either electronically (to
- hostmaster@nic.ddn.mil) or via regular mail.
-
- Resolving Names and Numbers
-
- Ok, computers can be referred to by either their FQDN or their
- Internet address. How can one user be expected to remember them all?
-
- They aren't. The Internet is designed so that one can use either
- method. Since humans find it much more natural to deal with words
- than numbers in most cases, the FQDN for each host is mapped to its
- Internet number. Each domain is served by a computer within that
- domain, which provides all of the necessary information to go from a
- domain name to an IP address, and vice-versa. For example, when
- someone refers to foosun.bar.com, the resolver knows that it should
- ask the system foovax.bar.com about systems in bar.com. It asks what
- Internet address foosun.bar.com has; if the name foosun.bar.com
- really exists, foovax will send back its number. All of this
- ``magic'' happens behind the scenes.
-
- Rarely will a user have to remember the Internet number of a site
- (although often you'll catch yourself remembering an apparently
- obscure number, simply because you've accessed the system
- frequently). However, you will remember a substantial number of
- FQDNs. It will eventually reach a point when you are able to make a
- reasonably accurate guess at what domain name a certain college,
- university, or company might have, given just their name.
-
- The Networks
-
-
- Internet
- The Internet is a large ``network of networks.'' There is no
- one network known as The Internet; rather, regional nets like SuraNet,
- PrepNet, NearNet, et al., are all inter-connected
- (nay, ``inter-networked'') together into one great living thing,
- communicating at amazing speeds with the TCP/IP protocol. All
- activity takes place in ``real-time.''
-
- UUCP
- The UUCP network is a loose association of systems all communicating
- with the UUCP protocol. (UUCP stands for `Unix-to-Unix Copy
- Program'.) It's based on two systems connecting to each other at
- specified intervals, called polling, and executing any work
- scheduled for either of them. Historically most UUCP was done with
- Unix equipment, although the software's since been implemented on
- other platforms (e.g. VMS). For example, the system oregano
- polls the system basil once every two hours. If there's any
- mail waiting for oregano, basil will send it at that time;
- likewise, oregano will at that time send any jobs waiting for
- basil.
-
- BITNET
- BITNET (the ``Because It's Time Network'') is comprised of systems
- connected by point-to-point links, all running the NJE protocol.
- It's continued to grow, but has found itself suffering at the hands of
- the falling costs of Internet connections. Also, a number of mail
- gateways are in place to reach users on other networks.
-
- The Physical Connection
-
- The actual connections between the various networks take a variety of
- forms. The most prevalent for Internet links are 56k leased lines
- (dedicated telephone lines carrying 56kilobit-per-second connections)
- and T1 links (special phone lines with 1Mbps connections). Also
- installed are T3 links, acting as backbones between major locations
- to carry a massive 45Mbps load of traffic.
-
- These links are paid for by each institution to a local carrier (for
- example, Bell Atlantic owns PrepNet, the main provider in
- Pennsylvania). Also available are SLIP connections, which carry
- Internet traffic (packets) over high-speed modems.
-
- UUCP links are made with modems (for the most part), that run from
- 1200 baud all the way up to as high as 38.4Kbps. As was mentioned in
- The Networks, the connections are of the store-and-forward
- variety. Also in use are Internet-based UUCP links (as if things
- weren't already confusing enough!). The systems do their UUCP traffic
- over TCP/IP connections, which give the UUCP-based network some
- blindingly fast ``hops,'' resulting in better connectivity for the
- network as a whole. UUCP connections first became popular in the
- 1970's, and have remained in wide-spread use ever since. Only with
- UUCP can Joe Smith correspond with someone across the country or
- around the world, for the price of a local telephone call.
-
- BITNET links mostly take the form of 9600bps modems connected from site
- to site. Often places have three or more links going; the majority,
- however, look to ``upstream'' sites for their sole link to the network.
-
- ``The Glory and the Nothing of a Name''
- Byron, {Churchill's Grave}
-
- -----------
- Electronic Mail
-
- The desire to communicate is the essence of networking. People have
- always wanted to correspond with each other in the fastest way
- possible, short of normal conversation. Electronic mail (or
- email) is the most prevalent application of this in computer
- networking. It allows people to write back and forth without having
- to spend much time worrying about how the message actually gets
- delivered. As technology grows closer and closer to being a common
- part of daily life, the need to understand the many ways it can be
- utilized and how it works, at least to some level, is vital.
- part of daily life (as has been evidenced by the ISDN effort, the need
- to understand the many ways it can be utilized and how it works, at
- least to some level, is vital.
-
- Email Addresses
-
- Electronic mail is hinged around the concept of an address; the
- section on Networking Basics made some reference to it while
- introducing domains. Your email address provides all of the
- information required to get a message to you from anywhere in the
- world. An address doesn't necessarily have to go to a human being.
- It could be an archive server, {See Archive Servers, for a
- description.} a list of people, or even someone's pocket pager.
- These cases are the exception to the norm---mail to most addresses is
- read by human beings.
-
- %@!.: Symbolic Cacophony
-
- Email addresses usually appear in one of two forms---using the
- Internet format which contains @, an ``at''-sign, or using the
- UUCP format which contains !, an exclamation point, also called
- a ``bang.'' The latter of the two, UUCP ``bang'' paths, is more
- restrictive, yet more clearly dictates how the mail will travel.
-
- To reach Jim Morrison on the system south.america.org, one would
- address the mail as jm@south.america.org. But if Jim's account was
- on a UUCP site named brazil, then his address would be brazil!jm. If
- it's possible (and one exists), try to use the Internet form of an
- address; bang paths can fail if an intermediate site in the path
- happens to be down. There is a growing trend for UUCP sites to
- register Internet domain names, to help alleviate the problem of path
- failures.
-
- Another symbol that enters the fray is %---it acts as an extra
- ``routing'' method. For example, if the UUCP site dream is connected
- to south.america.org, but doesn't have an Internet domain name of its
- own, a user debbie on dream can be reached by writing to the address
- not smallexample!
-
- debbie%dream@south.america.org
-
- The form is significant. This address says that the local system
- should first send the mail to south.america.org. There the address
- debbie%dream will turn into debbie@dream, which will hopefully be a
- valid address. Then south.america.org will handle getting the mail
- to the host dream, where it will be delivered locally to debbie.
-
- All of the intricacies of email addressing methods are fully covered
- in the book ``!%@@:: A Directory of Electronic Mail Addressing and
- Networks'' published by O'Reilly and Associates, as part of their
- Nutshell Handbook series. It is a must for any active email user.
- Write to nuts@ora.com for ordering information.
-
- Sending and Receiving Mail
-
- We'll make one quick diversion from being OS-neuter here, to show you
- what it will look like to send and receive a mail message on a Unix
- system. Check with your system administrator for specific
- instructions related to mail at your site.
-
- A person sending the author mail would probably do something like this:
-
- % mail brendan@cs.widener.edu
- Subject: print job's stuck
-
- I typed `print babe.gif' and it didn't work! Why??
-
- The next time the author checked his mail, he would see it listed in
- his mailbox as:
-
- % mail
- "/usr/spool/mail/brendan": 1 messages 1 new 1 unread
- U 1 joeuser@foo.widene Tue May 5 20:36 29/956 print job's stuck
- ?
-
- which gives information on the sender of the email, when it was sent,
- and the subject of the message. He would probably use the
- reply command of Unix mail to send this response:
-
- ? r
- To: joeuser@@foo.widener.edu
- Subject: Re: print job's stuck
-
- You shouldn't print binary files like GIFs to a printer!
-
- Brendan
-
- Try sending yourself mail a few times, to get used to your system's
- mailer. It'll save a lot of wasted aspirin for both you and your
- system administrator.
-
- Anatomy of a Mail Header
-
- An electronic mail message has a specific structure to it that's
- common across every type of computer system. {The standard is written
- down in RFC-822. See also RFCs for more info on how to get copies of
- the various RFCs.} A sample would be:
-
- >From bush@hq.mil Sat May 25 17:06:01 1991
- Received: from hq.mil by house.gov with SMTP id AA21901
- (4.1/SMI for dan@house.gov); Sat, 25 May 91 17:05:56 -0400
- Date: Sat, 25 May 91 17:05:56 -0400
- From: The President <bush@hq.mil>
- Message-Id: <9105252105.AA06631@hq.mil>
- To: dan@senate.gov
- Subject: Meeting
-
- Hi Dan .. we have a meeting at 9:30 a.m. with the Joint Chiefs. Please
- don't oversleep this time.
-
- The first line, with From and the two lines for Received: are usually
- not very interesting. They give the ``real'' address that the mail
- is coming from (as opposed to the address you should reply to, which
- may look much different), and what places the mail went through to
- get to you. Over the Internet, there is always at least one
- Received: header and usually no more than four or five. When a
- message is sent using UUCP, one Received: header is added for each
- system that the mail passes through. This can often result in more
- than a dozen Received: headers. While they help with dissecting
- problems in mail delivery, odds are the average user will never want
- to see them. Most mail programs will filter out this kind of
- ``cruft'' in a header.
-
- The Date: header contains the date and time the message was
- sent. Likewise, the ``good'' address (as opposed to ``real'' address)
- is laid out in the From: header. Sometimes it won't include
- the full name of the person (in this case The President), and
- may look different, but it should always contain an email address of
- some form.
-
- The Message-ID: of a message is intended mainly for tracing
- mail routing, and is rarely of interest to normal users. Every
- Message-ID: is guaranteed to be unique.
-
- To: lists the email address (or addresses) of the recipients of
- the message. There may be a Cc: header, listing additional
- addresses. Finally, a brief subject for the message goes in the
- Subject: header.
-
- The exact order of a message's headers may vary from system to system,
- but it will always include these fundamental headers that are vital to
- proper delivery.
-
- Bounced Mail
-
- When an email address is incorrect in some way (the system's name is
- wrong, the domain doesn't exist, whatever), the mail system will
- bounce the message back to the sender, much the same way that the
- Postal Service does when you send a letter to a bad street address.
- The message will include the reason for the bounce; a common error is
- addressing mail to an account name that doesn't exist. For example,
- writing to Lisa Simpson at Widener University's Computer Science
- department will fail, because she doesn't have an account. {Though if
- she asked, we'd certainly give her one.}
-
- From: Mail Delivery Subsystem <MAILER-DAEMON>
- Date: Sat, 25 May 91 16:45:14 -0400
- To: mg@gracie.com
- Cc: Postmaster@cs.widener.edu
- Subject: Returned mail: User unknown
-
- ----- Transcript of session follows -----
- While talking to cs.widener.edu:
- >>> RCPT To:<lsimpson@cs.widener.edu>
- <<< 550 <lsimpson@cs.widener.edu>... User unknown
- 550 lsimpson... User unknown
-
- As you can see, a carbon copy of the message (the Cc: header
- entry) was sent to the postmaster of Widener's CS department. The
- Postmaster is responsible for maintaining a reliable mail system
- on his system. Usually postmasters at sites will attempt to aid you
- in getting your mail where it's supposed to go. If a typing error was
- made, then try re-sending the message. If you're sure that the
- address is correct, contact the postmaster of the site directly and
- ask him how to properly address it.
-
- The message also includes the text of the mail, so you don't have to
- retype everything you wrote.
-
- ----- Unsent message follows -----
- Received: by cs.widener.edu id AA06528; Sat, 25 May 91 16:45:14 -0400
- Date: Sat, 25 May 91 16:45:14 -0400
- From: Matt Groening <mg@gracie.com>
- Message-Id: <9105252045.AA06528@gracie.com>
- To: lsimpson@cs.widener.edu
- Subject: Scripting your future episodes
- Reply-To: writing-group@gracie.com
-
- ... verbiage ...
-
- The full text of the message is returned intact, including any headers
- that were added. This can be cut out with an editor and fed right
- back into the mail system with a proper address, making redelivery a
- relatively painless process.
-
- Mailing Lists
-
- People that share common interests are inclined to discuss their
- hobby or interest at every available opportunity. One modern way to
- aid in this exchange of information is by using a mailing
- list---usually an email address that redistributes all mail sent to
- it back out to a list of addresses. For example, the Sun Managers
- mailing list (of interest to people that administer computers
- manufactured by Sun) has the address sun-managers@eecs.nwu.edu. Any
- mail sent to that address will ``explode'' out to each person named
- in a file maintained on a computer at Northwestern University.
-
- Administrative tasks (sometimes referred to as administrivia) are
- often handled through other addresses, typically with the suffix
- -request. To continue the above, a request to be added to or deleted
- from the Sun Managers list should be sent to
- sun-managers-request@eecs.nwu.edu.
-
- When in doubt, try to write to the -request version of a mailing list
- address first; the other people on the list aren't interested in your
- desire to be added or deleted, and can certainly do nothing to
- expedite your request. Often if the administrator of a list is busy
- (remember, this is all peripheral to real jobs and real work), many
- users find it necessary to ask again and again, often with harsher
- and harsher language, to be removed from a list. This does nothing
- more than waste traffic and bother everyone else receiving the
- messages. If, after a reasonable amount of time, you still haven't
- succeeded to be removed from a mailing list, write to the postmaster
- at that site and see if they can help.
-
- Exercise caution when replying to a message sent by a mailing list. If
- you wish to respond to the author only, make sure that the only
- address you're replying to is that person, and not the entire list.
- Often messages of the sort ``Yes, I agree with you completely!'' will
- appear on a list, boring the daylights out of the other readers. Likewise,
- if you explicitly do want to send the message to the whole list,
- you'll save yourself some time by checking to make sure it's indeed
- headed to the whole list and not a single person.
-
- A list of the currently available mailing lists is available in at
- least two places; the first is in a file on ftp.nisc.sri.com called
- interest-groups under the netinfo/ directory. It's updated fairly
- regularly, but is large (presently around 700K), so only get it every
- once in a while. The other list is maintained by Gene Spafford
- (spaf@cs.purdue.edu), and is posted in parts to the newsgroup
- news.lists semi-regularly. (Usenet News, for info on how to read that
- and other newsgroups.)
-
- Listservs
-
- On BITNET there's an automated system for maintaining discussion lists
- called the listserv. Rather than have an already harried and
- overworked human take care of additions and removals from a list, a
- program performs these and other tasks by responding to a set of
- user-driven commands.
-
- Areas of interest are wide and varied---ETHICS-L deals with ethics in
- computing, while ADND-L has to do with a role-playing game. A full
- list of the available BITNET lists can be obtained by writing to
- LISTSERV@BITNIC.BITNET with a body containing the command
-
- list global
-
- However, be sparing in your use of this---see if it's already on your
- system somewhere. The reply is quite large.
-
- The most fundamental command is subscribe. It will tell the
- listserv to add the sender to a specific list. The usage is
-
- subscribe foo-l Your Real Name
-
- It will respond with a message either saying that you've been added to
- the list, or that the request has been passed on to the system on
- which the list is actually maintained.
-
- The mate to subscribe is, naturally, unsubscribe. It will remove a
- given address from a BITNET list. It, along with all other listserv
- commands, can be abbreviated---subscribe as sub, unsubscribe as
- unsub, etc. For a full list of the available listserv commands,
- write to LISTSERV@BITNIC.BITNET, giving it the command help.
-
- As an aside, there have been implementations of the listserv system
- for non-BITNET hosts (more specifically, Unix systems). One of the
- most complete is available on cs.bu.edu in the
- directory pub/listserv.
-
- ``I made this letter longer than usual because
- I lack the time to make it shorter.''
- Pascal, Provincial Letters XVI
-
- --------------
-
- Anonymous FTP
-
- FTP (File Transfer Protocol) is the primary method of transferring
- files over the Internet. On many systems, it's also the name of the
- program that implements the protocol. Given proper permission, it's
- possible to copy a file from a computer in South Africa to one in Los
- Angeles at very fast speeds (on the order of 5--10K per second).
- This normally requires either a user id on both systems or a special
- configuration set up by the system administrator(s).
-
- There is a good way around this restriction---the anonymous FTP
- service. It essentially will let anyone in the world have access to
- a certain area of disk space in a non-threatening way. With this,
- people can make files publicly available with little hassle. Some
- systems have dedicated entire disks or even entire computers to
- maintaining extensive archives of source code and information. They
- include gatekeeper.dec.com (Digital), wuarchive.wustl.edu (Washington
- University in Saint Louis), and archive.cis.ohio-state.edu (The Ohio
- State University).
-
- The process involves the ``foreign'' user (someone not on the system
- itself) creating an FTP connection and logging into the system as the
- user anonymous, with an arbitrary password:
-
- Name (foo.site.com:you): anonymous
- Password: jm@south.america.org
-
- Custom and netiquette dictate that people respond to the
- Password: query with an email address so that the sites can
- track the level of FTP usage, if they desire. (Addresses for
- information on email addresses).
-
- The speed of the transfer depends on the speed of the underlying
- link. A site that has a 9600bps SLIP connection will not get the same
- throughput as a system with a 56k leased line (The Physical
- Connection, for more on what kinds of connections can exist in a
- network). Also, the traffic of all other users on that link will
- affect performance. If there are thirty people all FTPing from one
- site simultaneously, the load on the system (in addition to the
- network connection) will degrade the overall throughput of the
- transfer.
-
- FTP Etiquette
-
- Lest we forget, the Internet is there for people to do work. People
- using the network and the systems on it are doing so for a purpose,
- whether it be research, development, whatever. Any heavy activity
- takes away from the overall performance of the network as a whole.
-
- The effects of an FTP connection on a site and its link can vary; the
- general rule of thumb is that any extra traffic created detracts from
- the ability of that site's users to perform their tasks. To help be
- considerate of this, it's highly recommended that FTP sessions
- be held only after normal business hours for that site, preferably
- late at night. The possible effects of a large transfer will be less
- destructive at 2 a.m. than 2 p.m. Also, remember that if it's past
- dinner time in Maine, it's still early afternoon in California---think
- in terms of the current time at the site that's being visited, not of
- local time.
-
- Basic Commands
-
- While there have been many extensions to the various FTP clients out
- there, there is a de facto ``standard'' set that everyone expects to
- work. For more specific information, read the manual for your
- specific FTP program. This section will only skim the bare minimum of
- commands needed to operate an FTP session.
-
- Creating the Connection
-
- The actual command to use FTP will vary among operating systems; for
- the sake of clarity, we'll use FTP here, since it's the most
- general form.
-
- There are two ways to connect to a system---using its hostname
- or its Internet number. Using the hostname is usually preferred.
- However, some sites aren't able to resolve hostnames properly,
- and have no alternative. We'll assume you're able to use hostnames
- for simplicity's sake. The form is
-
- ftp somewhere.domain
-
- Domains for help with reading and using domain names
- (in the example below, somewhere.domain is ftp.uu.net).
-
- You must first know the name of the system you want to connect to.
- We'll use ftp.uu.net as an example. On your system, type:
-
- ftp ftp.uu.net
-
- (the actual syntax will vary depending on the type of system the
- connection's being made from). It will pause momentarily then respond
- with the message
-
- Connected to ftp.uu.net.
-
- and an initial prompt will appear:
-
- 220 uunet FTP server (Version 5.100 Mon Feb 11 17:13:28 EST 1991) ready.
- Name (ftp.uu.net:jm):
-
- to which you should respond with anonymous:
-
- 220 uunet FTP server (Version 5.100 Mon Feb 11 17:13:28 EST 1991) ready.
- Name (ftp.uu.net:jm): anonymous
-
- The system will then prompt you for a password; as noted previously, a
- good response is your email address:
-
- 331 Guest login ok, send ident as password.
- Password: jm@south.america.org
- 230 Guest login ok, access restrictions apply.
- ftp>
-
- The password itself will not echo. This is to protect a user's
- security when he or she is using a real account to FTP files between
- machines. Once you reach the ftp> prompt, you know you're
- logged in and ready to go.
-
- Notice the ftp.uu.net:joe in the Name: prompt? That's
- another clue that anonymous FTP is special: FTP expects a normal user
- accounts to be used for transfers.
-
- dir
- At the ftp> prompt, you can type a number of commands to perform
- various functions. One example is dir---it will list the files
- in the current directory. Continuing the example from above:
-
- ftp> dir
-
- 200 PORT command successful.
- 150 Opening ASCII mode data connection for /bin/ls.
- total 3116
- drwxr-xr-x 2 7 21 512 Nov 21 1988 .forward
- -rw-rw-r-- 1 7 11 0 Jun 23 1988 .hushlogin
- drwxrwxr-x 2 0 21 512 Jun 4 1990 Census
- drwxrwxr-x 2 0 120 512 Jan 8 09:36 ClariNet
- ... etc etc ...
- -rw-rw-r-- 1 7 14 42390 May 20 02:24 newthisweek.Z
- ... etc etc ...
- -rw-rw-r-- 1 7 14 2018887 May 21 01:01 uumap.tar.Z
- drwxrwxr-x 2 7 6 1024 May 11 10:58 uunet-info
-
- 226 Transfer complete.
- 5414 bytes received in 1.1 seconds (4.9 Kbytes/s)
- ftp>
-
- The file newthisweek.Z was specifically included because we'll
- be using it later. Just for general information, it happens to be a
- listing of all of the files added to UUNET's archives during the past
- week.
-
- The directory shown is on a machine running the Unix operating
- system---the dir command will produce different results on other
- operating systems (e.g. TOPS, VMS, et al.). Learning to recognize
- different formats will take some time. After a few weeks of
- traversing the Internet, it proves easier to see, for example, how
- large a file is on an operating system you're otherwise not acquainted
- with.
-
- With many FTP implementations, it's also possible to take the output
- of dir and put it into a file on the local system with
-
- ftp> dir n* outfilename
-
- the contents of which can then be read outside of the live FTP
- connection; this is particularly useful for systems with very long
- directories (like ftp.uu.net). The above example would put the
- names of every file that begins with an n into the local file
- outfilename.
-
- cd
-
- At the beginning of an FTP session, the user is in a ``top-level''
- directory. Most things are in directories below it (e.g. /pub). To
- change the current directory, one uses the cd command. To change to
- the directory pub, for example, one would type
-
- ftp> cd pub
-
- which would elicit the response
-
- 250 CWD command successful.
-
- Meaning the ``Change Working Directory'' command (cd) worked
- properly. Moving ``up'' a directory is more system-specific---in Unix
- use the command cd .., and in VMS, cd [-].
-
- get and put
-
- The actual transfer is performed with the get and put
- commands. To get a file from the remote computer to the local
- system, the command takes the form:
-
- ftp> get filename
-
- where filename is the file on the remote system. Again using
- ftp.uu.net as an example, the file newthisweek.Z can be
- retrieved with
-
- ftp> get newthisweek.Z
- 200 PORT command successful.
- 150 Opening ASCII mode data connection for newthisweek.Z (42390 bytes).
- 226 Transfer complete.
- local: newthisweek.Z remote: newthisweek.Z
- 42553 bytes received in 6.9 seconds (6 Kbytes/s)
- ftp>
-
- The section below on using binary mode instead of ASCII will describe
- why this particular choice will result in a corrupt and subsequently
- unusable file.
-
- If, for some reason, you want to save a file under a different name
- (e.g. your system can only have 14-character filenames, or can only
- have one dot in the name), you can specify what the local filename
- should be by providing get with an additional argument
-
- ftp> get newthisweek.Z uunet-new
-
- which will place the contents of the file newthisweek.Z in
- uunet-new on the local system.
-
- The transfer works the other way, too. The put command will
- transfer a file from the local system to the remote system. If the
- permissions are set up for an FTP session to write to a remote
- directory, a file can be sent with
-
- ftp> put filename
-
- As with get, put will take a third argument, letting you
- specify a different name for the file on the remote system.
-
- ASCII vs Binary
-
- In the example above, the file newthisweek.Z was transferred, but
- supposedly not correctly. The reason is this: in a normal ASCII
- transfer (the default), certain characters are translated between
- systems, to help make text files more readable. However, when binary
- files (those containing non-ASCII characters) are transferred, this
- translation should not take place. One example is a binary
- program---a few changed characters can render it completely useless.
-
- To avoid this problem, it's possible to be in one of two modes---ASCII
- or binary. In binary mode, the file isn't translated in any way.
- What's on the remote system is precisely what's received. The
- commands to go between the two modes are:
-
- ftp> ascii
- 200 Type set to A. (Note the A, which signifies ASCII mode.)
-
- ftp> binary
- 200 Type set to I. (Set to Image format, for pure binary transfers.)
-
-
- Note that each command need only be done once to take effect; if the
- user types binary, all transfers in that session are done in
- binary mode (that is, unless ascii is typed later).
-
- The transfer of newthisweek.Z will work if done as:
-
- ftp> binary
- 200 Type set to I.
- ftp> get newthisweek.Z
- 200 PORT command successful.
- 150 Opening BINARY mode data connection for newthisweek.Z (42390 bytes).
- 226 Transfer complete.
- local: newthisweek.Z remote: newthisweek.Z
- 42390 bytes received in 7.2 seconds (5.8 Kbytes/s)
-
-
- Note: The file size (42390) is different from that done
- in ASCII mode (42553) bytes; and the number 42390 matches the one
- in the listing of UUNET's top directory. We can be relatively sure
- that we've received the file without any problems.
-
- mget and mput
-
- The commands mget and mput allow for multiple file
- transfers using wildcards to get several files, or a whole set of
- files at once, rather than having to do it manually one by one. For
- example, to get all files that begin with the letter f, one
- would type
-
- ftp> mget f*
-
- Similarly, to put all of the local files that end with .c:
-
- ftp> mput *.c
-
- Rather than reiterate what's been written a hundred times before,
- consult a local manual for more information on wildcard matching
- (every DOS manual, for example, has a section on it).
-
- Normally, FTP assumes a user wants to be prompted for every file in a
- mget or mput operation. You'll often need to get a whole set of
- files and not have each of them confirmed---you know they're all
- right. In that case, use the prompt command to turn the queries off.
-
- ftp> prompt
- Interactive mode off.
-
- Likewise, to turn it back on, the prompt command should simply
- be issued again.
-
- Joe Granrose's List
- Monthly, Joe Granrose (odin@pilot.njin.net) posts to Usenet
- (Usenet News) an extensive list of sites offering anonymous FTP
- service. It's available in a number of ways:
-
- The Usenet groups comp.misc and comp.sources.wanted
-
- Anonymous FTP from pilot.njin.net [128.6.7.38], in
- /pub/ftp-list.
-
- Write to odin@pilot.njin.net with a Subject: line of listserv-request
- and a message body of send help. Please don't bother Joe with your
- requests---the server will provide you with the list.
-
- The archie Server
- archie is always in lowercase
-
- A group of people at McGill University in Canada got together and created a
- query system called archie. It was originally formed to be a
- quick and easy way to scan the offerings of the many anonymous FTP
- sites that are maintained around the world. As time progressed,
- archie grew to include other valuable services as well.
-
- The archie service is accessible through an interactive telnet
- session, email queries, and command-line and X-window clients. The
- email responses can be used along with FTPmail servers for those not
- on the Internet. (FTP-by-Mail Servers, for info on using FTPmail
- servers.)
-
- Using archie Today
-
- Currently, archie tracks the contents of over 800 anonymous FTP
- archive sites containing over a million files stored across the
- Internet. Collectively, these files represent well over 50 gigabytes
- of information, with new entries being added daily.
-
- The archie server automatically updates the listing information from
- each site about once a month. This avoids constantly updating the
- databases, which could waste network resources, yet ensures that the
- information on each site's holdings is reasonably up to date.
-
- To access archie interactively, telnet to one of the existing
- servers. {See Telnet, for notes on using the telnet program.} They
- include
-
- archie.ans.net (New York, USA)
- archie.rutgers.edu (New Jersey, USA)
- archie.sura.net (Maryland, USA)
- archie.unl.edu (Nebraska, USA)
- archie.mcgill.ca (the first Archie server, in Canada)
- archie.funet.fi (Finland)
- archie.au (Australia)
- archie.doc.ic.ac.uk (Great Britain)
-
- At the login: prompt of one of the servers, enter archie to log in.
- A greeting will be displayed, detailing information about ongoing
- work in the archie project; the user will be left at a archie>
- prompt, at which he may enter commands. Using help will yield
- instructions on using the prog command to make queries, set to
- control various aspects of the server's operation, et al. Type quit
- at the prompt to leave archie. Typing the query prog vine.tar.Z will
- yield a list of the systems that offer the source to the X-windows
- program vine; a piece of the information returned looks like:
-
- Host ftp.uu.net (137.39.1.9)
- Last updated 10:30 7 Jan 1992
-
- Location: /packages/X/contrib
- FILE rw-r--r-- 15548 Oct 8 20:29 vine.tar.Z
-
- Host nic.funet.fi (128.214.6.100)
- Last updated 05:07 4 Jan 1992
-
- Location: /pub/X11/contrib
- FILE rw-rw-r-- 15548 Nov 8 03:25 vine.tar.Z
-
- archie Clients
-
- There are two main-stream archie clients, one called (naturally
- enough) archie, the other xarchie (for X-Windows). They query the
- archie databases and yield a list of systems that have the requested
- file(s) available for anonymous FTP, without requiring an interactive
- session to the server. For example, to find the same information you
- tried with the server command prog, you could type
-
- % archie vine.tar.Z
- Host athene.uni-paderborn.de
- Location: /local/X11/more_contrib
- FILE -rw-r--r-- 18854 Nov 15 1990 vine.tar.Z
-
- Host emx.utexas.edu
- Location: /pub/mnt/source/games
- FILE -rw-r--r-- 12019 May 7 1988 vine.tar.Z
-
- Host export.lcs.mit.edu
- Location: /contrib
- FILE -rw-r--r-- 15548 Oct 9 00:29 vine.tar.Z
-
- Note that your system administrator may not have installed the archie
- clients yet; the source is available on each of the archie servers, in
- the directory archie/clients.
-
- Using the X-windows client is much more intuitive---if it's installed,
- just read its man page and give it a whirl. It's essential for the
- networked desktop.
-
- Mailing archie
-
- Users limited to email connectivity to the Internet should send a
- message to the address archie@archie.mcgill.ca with the single word
- help in the body of the message. An email message will be returned
- explaining how to use the email archie server, along with the details
- of using FTPmail. Most of the commands offered by the telnet
- interface can be used with the mail server.
-
- The whatis database
-
- In addition to offering access to anonymous FTP listings, archie also
- permits access to the whatis description database. It includes
- the names and brief synopses for over 3,500 public domain software
- packages, datasets and informational documents located on the
- Internet.
-
- Additional whatis databases are scheduled to be added in the
- future. Planned offerings include listings for the names and locations
- of online library catalog programs, the names of publicly accessible
- electronic mailing lists, compilations of Frequently Asked Questions
- lists, and archive sites for the most popular Usenet newsgroups.
- Suggestions for additional descriptions or locations databases are
- welcomed and should be sent to the archie developers at
- archie-l@cs.mcgill.ca.
-
- ``Was f@"ur pl@"undern!''
- (``What a place to plunder!'')
- Gebhard Leberecht Bl@"ucher
-
- ------
- Usenet News
-
- Original from: chip@count.tct.com (Chip Salzenberg)
- [Most recent change: 19 May 1991 by spaf@cs.purdue.edu (Gene Spafford)]
-
- The first thing to understand about Usenet is that it is widely
- misunderstood. Every day on Usenet the ``blind men and the
- elephant'' phenomenon appears, in spades. In the opinion of the
- author, more flame wars (rabid arguments) arise because of a
- lack of understanding of the nature of Usenet than from any other
- source. And consider that such flame wars arise, of necessity, among
- people who are on Usenet. Imagine, then, how poorly understood Usenet
- must be by those outside!
-
- No essay on the nature of Usenet can ignore the erroneous impressions
- held by many Usenet users. Therefore, this section will treat
- falsehoods first. Keep reading for truth. (Beauty, alas, is not
- relevant to Usenet.)
-
- What Usenet Is
-
- Usenet is the set of machines that exchange articles tagged with one
- or more universally-recognized labels, called newsgroups (or
- ``groups'' for short). (Note that the term newsgroup is correct,
- while area, base, board, bboard, conference, round table, SIG, etc.
- are incorrect. If you want to be understood, be accurate.)
-
- The Diversity of Usenet
-
- If the above definition of Usenet sounds vague, that's because it is.
- It is almost impossible to generalize over all Usenet sites in any
- non-trivial way. Usenet encompasses government agencies, large
- universities, high schools, businesses of all sizes, home computers of
- all descriptions, etc.
-
- Every administrator controls his own site. No one has any real
- control over any site but his own. The administrator gets his power
- from the owner of the system he administers. As long as the owner is
- happy with the job the administrator is doing, he can do whatever he
- pleases, up to and including cutting off Usenet entirely. C'est
- la vie.
-
- What Usenet Is Not
-
- Usenet is not an organization.
- Usenet has no central authority. In fact, it has no central anything.
- There is a vague notion of ``upstream'' and ``downstream'' related to
- the direction of high-volume news flow. It follows that, to the
- extent that ``upstream'' sites decide what traffic they will carry for
- their ``downstream'' neighbors, that ``upstream'' sites have some
- influence on their neighbors. But such influence is usually easy to
- circumvent, and heavy-handed manipulation typically results in a
- backlash of resentment.
-
- Usenet is not a democracy.
- A democracy can be loosely defined as ``government of the people, by
- the people, for the people.'' However, as explained above, Usenet is
- not an organization, and only an organization can be run as a
- democracy. Even a democracy must be organized, for if it lacks a
- means of enforcing the peoples' wishes, then it may as well not exist.
-
- Some people wish that Usenet were a democracy. Many people pretend
- that it is. Both groups are sadly deluded.
-
- Usenet is not fair.
- After all, who shall decide what's fair? For that matter, if someone
- is behaving unfairly, who's going to stop him? Neither you nor I,
- that's certain.
-
- Usenet is not a right.
- Some people misunderstand their local right of ``freedom of speech''
- to mean that they have a legal right to use others' computers to say
- what they wish in whatever way they wish, and the owners of said
- computers have no right to stop them.
-
- Those people are wrong. Freedom of speech also means freedom not to
- speak; if I choose not to use my computer to aid your speech, that is
- my right. Freedom of the press belongs to those who own one.
-
- Usenet is not a public utility.
- Some Usenet sites are publicly funded or subsidized. Most of them,
- by plain count, are not. There is no government monopoly on Usenet,
- and little or no control.
-
- Usenet is not a commercial network.
- Many Usenet sites are academic or government organizations; in fact,
- Usenet originated in academia. Therefore, there is a Usenet custom of
- keeping commercial traffic to a minimum. If such commercial traffic
- is generally considered worth carrying, then it may be grudgingly
- tolerated. Even so, it is usually separated somehow from
- non-commercial traffic; see comp.newprod.
-
- Usenet is not the Internet.
- The Internet is a wide-ranging network, parts of which are subsidized
- by various governments. The Internet carries many kinds of traffic;
- Usenet is only one of them. And the Internet is only one of the
- various networks carrying Usenet traffic.
-
- Usenet is not a Unix network, nor even an ASCII network.
-
- Don't assume that everyone is using ``rn'' on a Unix machine. There
- are Vaxen running VMS, IBM mainframes, Amigas, and MS-DOS PCs reading
- and posting to Usenet. And, yes, some of them use (shudder) EBCDIC.
- Ignore them if you like, but they're out there.
-
- Usenet is not software.
- There are dozens of software packages used at various sites to
- transport and read Usenet articles. So no one program or package can
- be called ``the Usenet software.''
-
- Software designed to support Usenet traffic can be (and is) used for
- other kinds of communication, usually without risk of mixing the two.
- Such private communication networks are typically kept distinct from
- Usenet by the invention of newsgroup names different from the
- universally-recognized ones.
-
- Usenet is not a UUCP network.
-
- UUCP is a protocol (some might say protocol suite, but that's a
- technical point) for sending data over point-to-point connections,
- typically using dialup modems. Usenet is only one of the various
- kinds of traffic carried via UUCP, and UUCP is only one of the various
- transports carrying Usenet traffic.
-
- Well, enough negativity.
-
- Propagation of News
-
- In the old days, when UUCP over long-distance dialup lines was the
- dominant means of article transmission, a few well-connected sites
- had real influence in determining which newsgroups would be carried
- where. Those sites called themselves ``the backbone.''
-
- But things have changed. Nowadays, even the smallest Internet site
- has connectivity the likes of which the backbone admin of yesteryear
- could only dream. In addition, in the U.S., the advent of cheaper
- long-distance calls and high-speed modems has made long-distance
- Usenet feeds thinkable for smaller companies. There is only one
- pre-eminent UUCP transport site today in the U.S., namely UUNET. But
- UUNET isn't a player in the propagation wars, because it never
- refuses any traffic---it gets paid by the minute, after all; to
- refuse based on content would jeopardize its legal status as an
- enhanced service provider.
-
- All of the above applies to the U.S. In Europe, different cost
- structures favored the creation of strictly controlled hierarchical
- organizations with central registries. This is all very unlike the
- traditional mode of U.S. sites (pick a name, get the software, get a
- feed, you're on). Europe's ``benign monopolies'', long uncontested,
- now face competition from looser organizations patterned after the
- U.S. model.
-
- Group Creation
-
- As discussed above, Usenet is not a democracy. Nevertheless,
- currently the most popular way to create a new newsgroup involves a
- ``vote'' to determine popular support for (and opposition to) a
- proposed newsgroup. Newsgroup Creation, for detailed instructions and
- guidelines on the process involved in making a newsgroup.
-
- If you follow the guidelines, it is probable that your group will be
- created and will be widely propagated. However, due to the nature of
- Usenet, there is no way for any user to enforce the results of a
- newsgroup vote (or any other decision, for that matter). Therefore,
- for your new newsgroup to be propagated widely, you must not only
- follow the letter of the guidelines; you must also follow its spirit.
- And you must not allow even a whiff of shady dealings or dirty tricks
- to mar the vote.
-
- So, you may ask: How is a new user supposed to know anything about the
- ``spirit'' of the guidelines? Obviously, she can't. This fact leads
- inexorably to the following recommendation:
-
- If you're a new user, don't try to create a new newsgroup alone.
-
- If you have a good newsgroup idea, then read the news.groups
- newsgroup for a while (six months, at least) to find out how things
- work. If you're too impatient to wait six months, then you really
- need to learn; read news.groups for a year instead. If you just
- can't wait, find a Usenet old hand to run the vote for you.
-
- Readers may think this advice unnecessarily strict. Ignore it at your
- peril. It is embarrassing to speak before learning. It is foolish to
- jump into a society you don't understand with your mouth open. And it
- is futile to try to force your will on people who can tune you out
- with the press of a key.
-
- If You're Unhappy...
- Property rights being what they are, there is no higher authority on
- Usenet than the people who own the machines on which Usenet traffic is
- carried. If the owner of the machine you use says, ``We will not
- carry alt.sex on this machine,'' and you are not happy with
- that order, you have no Usenet recourse. What can we outsiders do,
- after all?
-
- That doesn't mean you are without options. Depending on the nature
- of your site, you may have some internal political recourse. Or you
- might find external pressure helpful. Or, with a minimal investment,
- you can get a feed of your own from somewhere else. Computers capable
- of taking Usenet feeds are down in the $500 range now, Unix-capable
- boxes are going for under $2000, and there are at least two Unix
- lookalikes in the $100 price range.
-
- No matter what, appealing to ``Usenet'' won't help. Even if those who
- read such an appeal regarding system administration are sympathetic to
- your cause, they will almost certainly have even less influence at
- your site than you do.
-
- By the same token, if you don't like what some user at another site is
- doing, only the administrator and/or owner of that site have any
- authority to do anything about it. Persuade them that the user in
- question is a problem for them, and they might do something (if they
- feel like it). If the user in question is the administrator or owner
- of the site from which he or she posts, forget it; you can't win.
- Arrange for your newsreading software to ignore articles from him or
- her if you can, and chalk one up to experience.
-
- The History of Usenet (The ABCs)
-
- In the beginning, there were conversations, and they were good. Then
- came Usenet in 1979, shortly after the release of V7 Unix with UUCP;
- and it was better. Two Duke University grad students in North
- Carolina, Tom Truscott and Jim Ellis, thought of hooking computers
- together to exchange information with the Unix community. Steve
- Bellovin, a grad student at the University of North Carolina, put
- together the first version of the news software using shell scripts
- and installed it on the first two sites: unc and duke. At the
- beginning of 1980 the network consisted of those two sites and phs
- (another machine at Duke), and was described at the January 1980
- Usenix conference in Boulder, CO. {The Usenix conferences are
- semi-annual meetings where members of the Usenix Association, a
- group of Unix enthusiasts, meet and trade notes.} Steve Bellovin
- later rewrote the scripts into C programs, but they were never
- released beyond unc and duke. Shortly thereafter, Steve Daniel did
- another implementation in the C programming language for public
- distribution. Tom Truscott made further modifications, and this
- became the ``A'' news release.
-
- In 1981 at the University of California at Berkeley, grad student Mark
- Horton and high school student Matt Glickman rewrote the news software
- to add functionality and to cope with the ever increasing volume of
- news---``A'' news was intended for only a few articles per group per
- day. This rewrite was the ``B'' news version. The first public
- release was version 2.1 in 1982; all versions before 2.1 were
- considered in beta test. As The Net grew, the news software was
- expanded and modified. The last version maintained and released
- primarily by Mark was 2.10.1.
-
- Rick Adams, then at the Center for Seismic Studies, took over
- coordination of the maintenance and enhancement of the news software
- with the 2.10.2 release in 1984. By this time, the increasing volume
- of news was becoming a concern, and the mechanism for moderated groups
- was added to the software at 2.10.2. Moderated groups were inspired
- by ARPA mailing lists and experience with other bulletin board
- systems. In late 1986, version 2.11 of news was released, including a
- number of changes to support a new naming structure for newsgroups,
- enhanced batching and compression, enhanced ihave/sendme control
- messages, and other features. The current release of news is 2.11,
- patchlevel 19.
-
- A new version of news, becoming known as ``C'' news, has been
- developed at the University of Toronto by Geoff Collyer and Henry
- Spencer. This version is a rewrite of the lowest levels of news to
- increase article processing speed, decrease article expiration
- processing and improve the reliability of the news system through
- better locking, etc. The package was released to The Net in the
- autumn of 1987. For more information, see the paper News Need Not Be
- Slow, published in the Winter 1987 Usenix Technical Conference
- proceedings.
-
- Usenet software has also been ported to a number of platforms, from
- the Amiga and IBM PCs all the way to minicomputers and mainframes.
-
- Hierarchies
- Newsgroups are organized according to their specific areas of
- concentration. Since the groups are in a tree structure, the
- various areas are called hierarchies. There are seven major categories:
-
-
- comp
- Topics of interest to both computer professionals and
- hobbyists, including topics in computer science, software sources, and
- information on hardware and software systems.
-
- misc
- Group addressing themes not easily classified into any of the other
- headings or which incorporate themes from multiple categories.
- Subjects include fitness, job-hunting, law, and investments.
-
- sci
- Discussions marked by special knowledge relating to research in or
- application of the established sciences.
-
- soc
- Groups primarily addressing social issues and socializing. Included
- are discussions related to many different world cultures.
-
- talk
- Groups largely debate-oriented and tending to feature long
- discussions without resolution and without appreciable amounts of
- generally useful information.
-
- news
- Groups concerned with the news network, group maintenance, and software.
-
- rec
- Groups oriented towards hobbies and recreational activities
-
- These ``world'' newsgroups are (usually) circulated around the entire
- Usenet---this implies world-wide distribution. Not all groups
- actually enjoy such wide distribution, however. The European Usenet
- and Eunet sites take only a selected subset of the more ``technical''
- groups, and controversial ``noise'' groups are often not carried by many
- sites in the U.S. and Canada (these groups are primarily under the talk
- and soc classifications). Many sites do not carry some or all of
- the comp.binaries groups because of the typically large size of
- the posts in them (being actual executable programs).
-
- Also available are a number of ``alternative'' hierarchies:
-
-
- alt
- True anarchy; anything and everything can and does appear;
- subjects include sex, the Simpsons, and privacy.
-
- gnu
- Groups concentrating on interests and software with the GNU
- Project of the Free Software Foundation. For further info on what the
- FSF is, FSF.
-
- biz
- Business-related groups.
-
- Moderated vs Unmoderated
-
- Some newsgroups insist that the discussion remain focused and
- on-target; to serve this need, moderated groups came to be. All
- articles posted to a moderated group get mailed to the group's
- moderator. He or she periodically (hopefully sooner than later)
- reviews the posts, and then either posts them individually to Usenet,
- or posts a composite digest of the articles for the past day or
- two. This is how many mailing list gateways work (for example, the
- Risks Digest).
-
- news.groups & news.announce.newgroups
-
- Being a good net.citizen includes being involved in the continuing
- growth and evolution of the Usenet system. One part of this
- involvement includes following the discussion in the groups
- news.groups and the notes in news.announce.newgroups. It is there
- that discussion goes on about the creation of new groups and
- destruction of inactive ones. Every person on Usenet is allowed and
- encouraged to vote on the creation of a newsgroup.
-
- How Usenet Works
-
- The transmission of Usenet news is entirely cooperative. Feeds are
- generally provided out of good will and the desire to distribute news
- everywhere. There are places which provide feeds for a fee (e.g.
- UUNET), but for the large part no exchange of money is involved.
-
- There are two major transport methods, UUCP and NNTP. The first is
- mainly modem-based and involves the normal charges for telephone
- calls. The second, NNTP, is the primary method for distributing news
- over the Internet.
-
- With UUCP, news is stored in batches on a site until the
- neighbor calls to receive the articles, or the feed site happens to
- call. A list of groups which the neighbor wishes to receive is
- maintained on the feed site. The Cnews system compresses its batches,
- which can dramatically reduce the transmission time necessary for a
- relatively heavy newsfeed.
-
- NNTP, on the other hand, offers a little more latitude with how news
- is sent. The traditional store-and-forward method is, of course,
- available. Given the ``real-time'' nature of the Internet, though,
- other methods have been devised. Programs now keep constant
- connections with their news neighbors, sending news nearly
- instantaneously, and can handle dozens of simultaneous feeds, both
- incoming and outgoing.
-
- The transmission of a Usenet article is centered around the unique
- Message-ID: header. When an NNTP site offers an article to a
- neighbor, it says it has that specific Message ID. If the neighbor
- finds it hasn't received the article yet, it tells the feed to send it
- through; this is repeated for each and every article that's waiting
- for the neighbor. Using unique IDs helps prevent a system from
- receiving five copies of an article from each of its five news
- neighbors, for example.
-
- Further information on how Usenet works with relation to the various
- transports is available in the documentation for the Cnews and NNTP
- packages, as well as in RFC-1036, the Standard for Interchange of
- USENET Messages and RFC-977, Network News Transfer Protocol: A
- Proposed Standard for the Stream-Based Transmission of News. The
- RFCs do tend to be rather dry reading, particularly to the new user.
-
-
- Mail Gateways
-
- A natural progression is for Usenet news and electronic mailing lists
- to somehow become merged---which they have, in the form of news
- gateways. Many mailing lists are set up to ``reflect'' messages not
- only to the readership of the list, but also into a newsgroup.
- Likewise, posts to a newsgroup can be sent to the moderator of the
- mailing list, or to the entire mailing list. Some examples of this in
- action are comp.risks (the Risks Digest) and
- comp.dcom.telecom (the Telecom Digest).
-
- This method of propagating mailing list traffic has helped solve the
- problem of a single message being delivered to a number of people at
- the same site---instead, anyone can just subscribe to the group.
- Also, mailing list maintenance is lowered substantially, since the
- moderators don't have to be constantly removing and adding users to
- and from the list. Instead, the people can read and not read the
- newsgroup at their leisure.
-
- from ``Dear Emily Postnews'' by Brad Templeton
- Usenet ``Netiquette''
-
- There are many traditions with Usenet, not the least of which is
- dubbed netiquette---being polite and considerate of others. If
- you follow a few basic guidelines, you, and everyone that reads your
- posts, will be much happier in the long run.
-
- Signatures
-
- At the end of most articles is a small blurb called a person's
- signature. In Unix this file is named .signature in the
- person's login directory---it will vary for other operating systems.
- It exists to provide information about how to get in touch with the
- person posting the article, including their email address, phone
- number, address, or where they're located. Even so, signatures have
- become the graffiti of computers. People put song lyrics, pictures,
- philosophical quotes, even advertisements in their ``.sigs''.
- (Note, however, that advertising in your signature will more often
- than not get you flamed until you take it out.)
-
- Four lines will suffice---more is just extra garbage for Usenet sites
- to carry along with your article, which is supposed to be the intended
- focus of the reader. Netiquette dictates limiting oneself to this
- ``quota'' of four---some people make signatures that are ten lines or
- even more, including elaborate ASCII drawings of their hand-written
- signature or faces or even the space shuttle. This is not
- cute, and will bother people to no end.
-
- Similarly, it's not necessary to include your signature---if you
- forget to append it to an article, don't worry about it. The
- article's just as good as it ever would be, and contains everything
- you should want to say. Don't re-post the article just to include the
- signature.
-
- Posting Personal Messages
-
- If mail to a person doesn't make it through, avoid posting the message
- to a newsgroup. Even if the likelihood of that person reading the
- group is very high, all of the other people reading the articles don't
- give a whit what you have to say to Jim Morrison. Simply wait for the
- person to post again and double-check the address, or get in touch
- with your system administrator and see if it's a problem with local
- email delivery. It may also turn out that their site is down or is
- having problems, in which case it's just necessary to wait until
- things return to normal before contacting Jim.
-
- Posting Mail
-
- In the interests of privacy, it's considered extremely bad taste to post
- any email that someone may have sent, unless they explicitly give you
- permission to redistribute it. While the legal issues can be heavily
- debated, most everyone agrees that email should be treated as anything
- one would receive via normal snailmail, {The slang for the normal land and air
- postal service.} , with all of the assumed rights that are carried with it.
-
- Test Messages
-
- Many people, particularly new users, want to try out posting before
- actually taking part in discussions. Often the mechanics of getting
- messages out is the most difficult part of Usenet. To this end,
- many, many users find it necessary to post their tests to ``normal''
- groups (for example, news.admin or comp.mail.misc). This is
- considered a major netiquette faux pas in the Usenet world. There are
- a number of groups available, called test groups, that exist solely
- for the purpose of trying out a news system, reader, or even new
- signature. They include
-
- alt.test
- gnu.gnusenet.test
- misc.test
-
- some of which will generate auto-magic replies to your posts to
- let you know they made it through. There are certain denizens of
- Usenet that frequent the test groups to help new users out. They
- respond to the posts, often including the article so the poster can
- see how it got to the person's site. Also, many regional hierarchies
- have test groups, like phl.test in Philadelphia.
-
- By all means, experiment and test---just do it in its proper place.
-
- Famous People Appearing
-
- Every once in a while, someone says that a celebrity is accessible
- through ``The Net''; or, even more entertaining, an article is forged
- to appear to be coming from that celebrity. One example is Stephen
- Spielberg---the rec.arts.movies readership was in an uproar for
- two weeks following a couple of posts supposedly made by Mr.
- Spielberg. (Some detective work revealed it to be a hoax.)
-
- There are a few well-known people that are acquainted with
- Usenet and computers in general---but the overwhelming majority are
- just normal people. One should act with skepticism whenever a notable
- personality is ``seen'' in a newsgroup.
-
- Summaries
-
- Authors of articles occasionally say that readers should reply by
- mail and they'll summarize. Accordingly, readers should do just
- that---reply via mail. Responding with a followup article to such an
- article defeats the intention of the author. She, in a few days,
- will post one article containing the highlights of the responses she
- received. By following up to the whole group, the author may not
- read what you have to say.
-
- When creating a summary of the replies to a post, try to make it as
- reader-friendly as possible. Avoid just putting all of the messages
- received into one big file. Rather, take some time and edit the
- messages into a form that contains the essential information that
- other readers would be interested in.
-
- Also, sometimes people will respond but request to remain anonymous
- (one example is the employees of a corporation that feel the
- information's not proprietary, but at the same time want to protect
- themselves from political backlash). Summaries should honor this
- request accordingly by listing the From: address as
- anonymous or (Address withheld by request).
-
- Quoting
-
- When following up to an article, many newsreaders provide the facility
- to quote the original article with each line prefixed by >
- , as in
-
- In article <1232@foo.bar.com>, sharon@foo.bar.com wrote:
- > I agree, I think that basketweaving's really catching on,
- > particularly in Pennsylvania. Here's a list of every person
- > in PA that currently engages in it publicly:
- line ... etc ...
-
- This is a severe example (potentially a horribly long article), but
- proves a point. When you quote another person, edit out whatever
- isn't directly applicable to your reply. {But not changing their
- words, of course. } This gives the reader of the new article a better
- idea of what points you were addressing. By including the entire
- article, you'll only annoy those reading it. Also, signatures in the
- original aren't necessary; the readers already know who wrote it (by
- the attribution).
-
- Avoid being tedious with responses---rather than pick apart an
- article, address it in parts or as a whole. Addressing practically
- each and every word in an article only proves that the person
- responding has absolutely nothing better to do with his time.
-
- If a ``war'' starts (insults and personal comments get thrown back
- and forth), take it into email---exchange email with the person
- you're arguing with. No one enjoys watching people bicker
- incessantly.
-
- Crossposting
-
- The Newsgroups: line isn't limited to just one group---an
- article can be posted in a list of groups. For instance, the line
-
- Newsgroups: sci.space,comp.simulation
-
- posts the article to both the groups sci.space and
- comp.simulation. It's usually safe to crosspost to up to three
- or four groups. To list more than that is considered ``excessive
- noise.''
-
- It's also suggested that if an article is crossposted a
- Followup-To: header be included. It should name the group to
- which all additional discussion should be directed to. For the above
- example a possible Followup-To: would be
-
- Followup-To: sci.space
-
- which would make all followups automatically be posted to just
- sci.space, rather than both sci.space and comp.simulation. If every
- response made with a newsreader's ``followup'' command should go to
- the person posting the article no matter what, there's also a
- mechanism worked in to accommodate. The Followup-To: header should
- contain the single word poster:
-
- Followup-To: poster
-
- Certain newsreaders will use this to sense that a reply should never
- be posted back onto The Net. This is often used with questions that
- will yield a summary of information later, a vote, or an
- advertisement.
-
- Recent News
-
- One should avoid posting ``recent'' events---sports scores, a plane
- crash, or whatever people will see on the evening news or read in the
- morning paper. By the time the article has propagated across all of
- Usenet, the ``news'' value of the article will have become stale.
- (This is one case for the argument that Usenet news is a misnomer.
- {Note that the Clarinet News service (Clarinet) offers news items in
- a Usenet format as a precise alternative to the morning paper, et.
- al.)
-
- Quality of Postings
-
- How you write and present yourself in your articles is important. If
- you have terrible spelling, keep a dictionary near by. If you have
- trouble with grammar and punctuation, try to get a book on English
- grammar and composition (found in many bookstores and at garage
- sales). By all means pay attention to what you say---it makes you who
- you are on The Net.
-
- Likewise, try to be clear in what you ask. Ambiguous or vague
- questions often lead to no response at all, leaving the poster
- discouraged. Give as much essential information as you feel is
- necessary to let people help you, but keep it within limits. For
- instance, you should probably include the operating system of your
- computer in the post if it's needed, but don't tell everybody what
- peripherals you have hanging off of it.
-
- Useful Subjects
-
- The Subject: line of an article is what will first attract
- people to read it---if it's vague or doesn't describe what's contained
- within, no one will read the article. At the same time,
- Subject: lines that're too wordy tend to be irritating. For
- example:
-
-
- Good
- Subject: Building Emacs on a Sun Sparc under 4.1
-
- Good
- Subject: Tryin' to find Waldo in NJ.
-
- Bad
- Subject: I can't get emacs to work !!!
-
- Bad
- Subject: I'm desperately in search of the honorable Mr. Waldo in the state
- of...
-
- Simply put, try to think of what will best help the reader when he or
- she encounters your article in a newsreading session.
-
- Tone of Voice
-
- Since common computers can't portray the inflection or tone in a
- person's voice, how articles are worded can directly affect the
- response to them. If you say
-
- Anybody using a Vic-20 should go buy themselves a life.
-
- you'll definitely get some responses---telling you to take a leap.
- Rather than be inflammatory, phrase your articles in a way that
- rationally expresses your opinion, like
-
- What're the practical uses of a Vic-20 these days?
-
- which presents yourself as a much more level-headed individual.
-
- Also, what case (upper or lower) you use can indicate how you're
- trying to speak---netiquette dictates that if you USE ALL CAPITAL
- LETTERS, people will think you're ``shouting.'' Write as you would in
- a normal letter to a friend, following traditional rules of English
- (or whatever language you happen to speak).
-
- Computer Religion
-
- No matter what kind of computer a person is using, theirs is always
- the best and most efficient of them all. Posting articles
- asking questions like What computer should I buy? An Atari ST or an
- Amiga? will lead only to fervent arguments over the merits and
- drawbacks of each brand. Don't even ask The Net---go to a local user
- group, or do some research of your own like reading some magazine
- reviews. Trying to say one computer is somehow better than another is
- a moot point.
-
- The Anatomy of an Article
-
- Frequently Asked Questions
-
- A number of groups include Frequently Asked Question (FAQ) lists,
- which give the answers to questions or points that have been raised
- time and time again in a newsgroup. They're intended to help cut
- down on the redundant traffic in a group. For example, in the
- newsgroup alt.tv.simpsons, one recurring question is Did you notice
- that there's a different blackboard opening at the beginning of every
- Simpsons episode? As a result, it's part of the FAQ for that group.
-
- Usually, FAQ lists are posted at the beginning of each month, and are
- set to expire one month later (when, supposedly, the next FAQ will be
- published). Nearly every FAQ is also crossposted to news.answers,
- which is used as a Usenet repository for them.
-
- The Pit-Manager Archive
-
- MIT, with Jonathan Kamens, has graciously dedicated a machine to the
- archiving and storage of the various periodic postings that are
- peppered throughout the various Usenet groups. To access them, FTP to
- the system pit-manager.mit.edu and look in the directory
- /pub/usenet.
-
- ``Be it true or false, so it be news.''
- Ben Jonson, News from the New World
-
- -----
- Telnet
-
- Telnet is the main Internet protocol for creating a connection
- with a remote machine. It gives the user the opportunity to be on one
- computer system and do work on another, which may be across the street
- or thousands of miles away. Where modems are limited, in the majority,
- by the quality of telephone lines and a single connection, telnet
- provides a connection that's error-free and nearly always faster than
- the latest conventional modems.
-
- Using Telnet
-
- As with FTP (Anonymous FTP), the actual command for negotiating a telnet
- connection varies from system to system. The most common is
- telnet itself, though. It takes the form of:
-
- telnet somewhere.domain
-
- To be safe, we'll use your local system as a working example. By now,
- you hopefully know your site's domain name. If not, ask or try
- to figure it out. You'll not get by without it.
-
- To open the connection, type
-
- telnet your.system.name
-
- If the system were wubba.cs.widener.edu, for example, the
- command would look like
-
- telnet wubba.cs.widener.edu
-
- The system will respond with something similar to
-
- Trying 147.31.254.999...
- Connected to wubba.cs.widener.edu.
- Escape character is '^]'.
-
- The escape character, in this example ^] (Control-]), is the
- character that will let you go back to the local system to close the
- connection, suspend it, etc. To close this connection, the user
- would type ^], and respond to the telnet> prompt with the command
- close. Local documentation should be checked for information on
- specific commands, functions, and escape character that can be used.
-
- Telnet Ports
-
- Many telnet clients also include a third option, the port on
- which the connection should take place. Normally, port 23 is the
- default telnet port; the user never has to think about it. But
- sometimes it's desirable to telnet to a different port on a system,
- where there may be a service available, or to aid in debugging a
- problem. Using
-
- telnet somewhere.domain port
-
- will connect the user to the given port on the system
- somewhere.domain. Many libraries use this port method to offer their
- facilities to the general Internet community; other services are also
- available. For instance, one would type
-
- telnet martini.eecs.umich.edu 3000
-
- to connect to the geographic server at the University of Michigan
- (Geographic Server). Other such port connections follow the
- same usage.
-
- Publicly Accessible Libraries
-
- Over the last several years, most university libraries have switched
- from a manual (card) catalog system to computerized library catalogs.
- The automated systems provide users with easily accessible and
- up-to-date information about the books available in these libraries.
- This has been further improved upon with the advent of local area
- networks, dialup modems, and wide area networks. Now many of us can
- check on our local library's holdings or that of a library halfway
- around the world!
-
- Many, many institutions of higher learning have made their library
- catalogs available for searching by anyone on the Internet. They
- include Boston University, the Colorado Alliance of Research Libraries
- (CARL), and London University King's College.
-
- To include a listing of some of the existing sites would not only be
- far too long for this document, it would soon be out of date.
- Instead, several lists are being maintained and are available either
- by mail or via FTP. Also, the Internet Resource Guide (IRG) also
- describes a few libraries that are accessible---IRG for further
- information.
-
- Art St. George and Ron Larsen are maintaining a list of
- Internet-accessible libraries and databases often referred to as
- ``the St. George directory.'' It began with only library catalogs
- but has expanded to include sections on campus-wide information
- systems, and even bulletin board systems that are not on the
- Internet. The library catalog sections are divided into those that
- are free, those that charge, and international (i.e. non-U.S.)
- catalogs; they are arranged by state, province, or country within
- each section. There is also a section giving dialup information for
- some of the library catalogs. It's available for FTP (Anonymous FTP)
- on nic.cerf.net in the directory
- cerfnet/cerfnet_info/library_catalog. The file internet-catalogs has
- a date suffix; check for the most current date. The information is
- updated periodically.
-
- Billy Barron, Systems Manager at the University of North Texas,
- produces a directory as an aid to his user community. It complements
- the St. George guide by providing a standard format for all systems
- which lists the Internet address, login instructions, the system
- vendor, and logoff information. The arrangement is alphabetic by
- organization name. It's available for FTP on vaxb.acs.unt.edu in the
- subdirectory library as the file libraries.txt.
-
- For announcements of new libraries being available and discussion on
- related topics, consult the Usenet newsgroup
- comp.internet.library (Usenet News to learn how to read
- news).
-
- Bulletin Board Systems
-
- The Cleveland Freenet
-
- Freenets are open-access, free, community computer systems. One such
- system is the Cleveland Freenet, sponsored by CWRU (Case Western
- Reserve University). Anyone and everyone is welcome to join and take
- part in the exciting project---that of a National Telecomputing Public
- Network, where everyone benefits. There's no charge for the
- registration process and no charge to use the system.
-
- To register, telnet to any one of
-
- freenet-in-a.cwru.edu
- freenet-in-b.cwru.edu
- freenet-in-c.cwru.edu
-
- After you're connected, choose the entry on the menu that signifies
- you're a guest user. Another menu will follow; select Apply for
- an account, and you'll be well on your way to being a FreeNet member.
-
- You will need to fill out a form and send it to them through the
- Postal Service---your login id and password will be created in a few
- days. At that point you're free to use the system as you wish. They
- provide multi-user chat, email, Usenet news, and a variety of other
- things to keep you occupied for hours on end.
-
- Directories
-
- There are a few systems that are maintained to provide the Internet
- community with access to lists of information---users, organizations,
- etc. They range from fully dedicated computers with access to papers
- and research results, to a system to find out about the faculty
- members of a university.
-
- Knowbot
-
- Knowbot is a ``master directory'' that contains email address
- information from the NIC WHOIS database (Whois), the PSI White
- Pages Pilot Project, the NYSERNET X.500 database and MCI Mail. Most
- of these services are email registries themselves, but Knowbot
- provides a very comfortable way to access all of them in one place.
- Telnet to nri.reston.va.us on port 185.
-
- White Pages
-
- PSI maintains a directory of information on individuals. It will
- list the person's name, organization, and email address if it is
- given. Telnet to wp.psi.net and log in as fred. The White Pages
- Project also includes an interface to use Xwindows remotely.
-
- Faculty and Staff Listings
-
- Many universities offer access to information on current faculty and
- staff. Included are:
-
- Cornell Telnet to cuinfo.cornell.edu on port 3000.
- NC State Telnet to ccvax1.cc.ncsu.edu and log in as info.
- Rutgers Telnet to hangout.rutgers.edu on port 98.
- U of Maryland Telnet to umail.umd.edu and log in as lookup.
- UNC Chapel Hill Telnet to info.acs.unc.edu and log in as info.
- Yale Telnet to yalevm.ycc.yale.edu on port 300.
-
- Databases
-
- For information on database services, Commercial Databases.
- Not all databases on the Internet require payment for use, though.
- There do exist some, largely research-driven databases, which are
- publicly accessible. New ones spring up regularly.
-
- To find out more about the databases in this section, contact the
- people directly responsible for them. Their areas of concentration
- and the software used to implement them are widely disparate, and are
- probably beyond the author's expertise. Also, don't forget to check
- with your local library---the reference librarian there can provide
- information on conventional resources, and possibly even those
- available over the Internet (they are becoming more common).
-
- Colorado Alliance of Research Libraries (CARL)
-
- The Colorado Alliance of Research Libraries (CARL), in association
- with CARL Systems Inc., operates a public access catalog of services.
- Offered are a number of library databases, including searches for
- government periodicals, book reviews, indices for current articles,
- and access to to other library databases around the country. Other
- services are available to CARL members including an online
- encyclopedia. Telnet to pac.carl.org, or write to help@carl.org for
- more details.
-
- PENpages
-
- PENpages is an agriculturally-oriented database administered by
- Pennsylvania State University. Information entered into PENpages is
- provided by numerous sources including the Pennsylvania Dept. of
- Agriculture, Rutgers University, and Penn State. Easy-to-use menus
- guide users to information ranging from cattle and agricultural
- prices to current weather information, from health information to
- agricultural news from around the nation. A keyword search option
- also allows users to search the database for related information and
- articles. The database is updated daily, and a listing of most
- recent additions is displayed after login. Telnet to psupen.psu.edu
- and log in as the user PNOTPA.
-
- Clemson Univ. Forestry & Agricultural Network
-
- Clemson maintains a database similar to PENpages in content, but the
- information provided tends to be localized to the Southeastern United
- States. A menu-driven database offers queries involving the weather,
- food, family, and human resources. Telnet to eureka.clemson.edu and
- log in as PUBLIC. You need to be on a good VT100 emulator (or a real
- VT terminal).
-
- University of Maryland Info Database
-
- The Computer Science department of the University of Maryland
- maintains a repository of information on a wide variety of topics.
- They wish to give a working example of how network technology can
- (and should) provide as much information as possible to those who use
- it. Telnet to info.umd.edu and log in as info. The information
- contained in the database is accessible through a screen-oriented
- interface, and everything therein is available via anonymous FTP.
-
- There is a mailing list used to discuss the UMD Info Database,
- welcoming suggestions for new information, comments on the interface
- the system provides, and other related topics. Send mail to
- listserv@umdd.umd.edu with a body of
-
- subscribe INFO-L Your Full Name
-
- Listservs for more information on using the Listserv system.
-
- University of Michigan Weather Underground
-
- The University of Michigan's Department of Atmospheric, Oceanic, &
- Space Sciences maintains a database of weather and related
- information for the United States and Canada. Available are current
- weather conditions and forecasts for cities in the U.S., a national
- weather summary, ski conditions, earthquake and hurricane updates,
- and a listing of severe weather conditions. Telnet to
- madlab.sprl.umich.edu on port 3000 to use the system.
-
- Geographic Name Server
-
- A geographic database listing information for cities in the United
- States and some international locations is maintained by Merit, Inc.
- The database is searchable by city name, zip code, etc. It will
- respond with a lot of information: the area code,
- elevation, time zone, and longitude and latitude are included. For
- example, a query of 19013 yields
-
- 0 Chester
- 1 42045 Delaware
- 2 PA Pennsylvania
- 3 US United States
- F 45 Populated place
- L 39 50 58 N 75 21 22 W
- P 45794
- E 22
- Z 19013
- Z 19014
- Z 19015
- Z 19016
- .
-
-
- To use the server, telnet to martini.eecs.umich.edu on port
- 3000. The command help will yield further instructions, along
- with an explanation for each of the fields in a reponse.
-
- FEDIX---Minority Scholarship Information
-
- FEDIX is an on-line information service that links the higher
- education community and the federal government to facilitate research,
- education, and services. The system provides accurate and timely
- federal agency information to colleges, universities, and other
- research organizations. There are no registration fees and no access
- charges for FEDIX whatsoever.
-
- FEDIX offers the Minority On-Line Information Service (MOLIS), a
- database listing current information about Black and Hispanic colleges
- and universities.
-
- Daily information updates are made on federal education and research
- programs, scholarships, fellowships, and grants, available used
- research equipment, and general information about FEDIX itself. To
- access the database, telnet to fedix.fie.com and log in as
- fedix.
-
- Science & Technology Information System
-
- The STIS is maintained by the National Science Foundation (NSF), and
- provides access to many NSF publications. The full text of
- publications can be searched online and copied from the system, which
- can accommodate up to ten users at one time. Telnet to stis.nsf.gov
- and log in as public. Everything on the system is also available via
- anonymous FTP. For further information, contact:
-
- STIS, Office of Information Systems, Room 401
- National Science Foundation
- 1800 G. Street, N.W.
- Washington, D.C. 20550
- stis-request@nsf.gov
- (202) 357-7492
- (202) 357-7663 (Fax)
-
- Ocean Network Information Center
-
- The University of Delaware College of Marine Studies offers access to
- an interactive database of research information covering all aspects
- of marine studies, nicknamed OCEANIC. This includes the World Oceanic
- Circulation Experiment (WOCE) information and program information,
- research ship schedules and information, and a Who's Who of email and
- mailing addresses for oceanic studies. Data from a variety of
- academic institutions based on research studies is also available.
- Telnet to delocn.udel.edu and log in as INFO.
-
- NASA/IPAC Extragalactic Database (NED)
-
- The NASA/IPAC Extragalactic Database (NED) is an ongoing project,
- funded by NASA, to make data and literature on extragalactic objects
- available over computer networks. NED is an object-oriented database
- which contains extensive information for nearly 132,000 extragalactic
- objects taken from about major catalogs of galaxies, quasars, infrared
- and radio sources. NED provides positions, names, and other basic
- data (e.g. magnitude types, sizes and redshifts as well as
- bibliographic references and abstracts). Searches can be done by
- name, around a name, and on an astronomical position. NED contains a
- tutorial which guides the user through the retrieval process. Telnet
- to ipac.caltech.edu and log in as ned.
-
- U.S. Naval Observatory Automated Data Service
-
- Operated by the U.S. Naval Observatory in Washington, D.C., this
- automated data service provides database access to information
- ranging from current navigational satellite positioning, astronomical
- data, and software utilities. A wide variety of databases can be
- searched and instructions for file transfer are given. Telnet to
- tycho.usno.navy.mil and log in as ads.
-
- ``My consciousness suddenly switched locations, for the first time in
- my life, from the vicinity of my head and body to a point about
- twenty feet away from where I normally see the world.'' Howard
- Rheingold, Virtual Reality p255
-
- -----------------
- Various Tools
-
- New and interesting ways to use the Internet are being dreamed up
- every day. As they gain wide-spread use, some methods become
- near-standard (or actual written standard) tools for Internet users to
- take advantage of. A few are detailed here; there are undoubtedly
- others, and new ideas spring up all the time. An active user of the
- Internet will discover most of the more common ones in time. Usually,
- these services are free. Commercial Services for applications
- that are commercially available over the Internet.
-
- Usenet is often used to announce a new service or capability on
- the Internet. In particular, the groups comp.archives and
- comp.protocols.tcp-ip are good places to look. Information
- will drift into other areas as word spreads. Usenet News for
- information on reading news.
-
- Finger
-
- On many systems there exists the finger command, which yield
- information about each user that's currently logged in. This command
- also has extensions for use over the Internet, as well. Under normal
- circumstances, the command is simply finger for a summary of who's
- logged into the local system, or finger username for specific
- information about a user. It's also possible to go one step further
- and go onto the network. The general usage is
-
- finger @hostname
-
- To see who's currently logged in at Widener University, for instance, use
-
- % finger @cs.widener.edu
- [cs.widener.edu]
- Login Name TTY Idle When Where
- brendan Brendan Kehoe p0 Fri 02:14 tattoo.cs.widene
- sven Sven Heinicke p1 Fri 04:16 xyplex3.cs.widen
-
-
- To find out about a certain user, they can be fingered specifically
- (and need not be logged in):
-
- % finger bart@cs.widener.edu
- [cs.widener.edu]
- Login name: bart In real life: Bart Simpson
- Directory: /home/springfield/bart Shell: /bin/underachiever
- Affiliation: Brother of Lisa Home System: channel29.fox.org
- Last login Thu May 23 12:14 (EDT) on ttyp6 from channel29.fox.org.
- No unread mail
- Project: To become a "fluff" cartoon character.
- Plan:
- Don't have a cow, man.
-
-
- Please realize that some sites are very security conscious, and need
- to restrict the information about their systems and users available
- to the outside world. To that end, they often block finger requests
- from outside sites---so don't be surprised if fingering a computer or
- a user returns with Connection refused.
-
- Internet Relay Chat
-
- The Lamont View Server System
- On lamont.ldgo.columbia.edu in pub/gb.tar.Z.
-
- Ping
-
- The ping command allows the user to check if another system is
- currently ``up'' and running. The general form of the command
- is ping system. {The usage will, again, vary.}
- For example,
-
- ping cs.widener.edu
-
- will tell you if the main machine in Widener University's Computer
- Science lab is currently online (we certainly hope so!).
-
- Many implementations of ping also include an option to let you
- see how fast a link is running (to give you some idea of the load on
- the network). For example:
-
- % ping -s cs.swarthmore.edu
- PING cs.swarthmore.edu: 56 data bytes
- 64 bytes from 130.58.68.1: icmp_seq=0 ttl=251 time=66 ms
- 64 bytes from 130.58.68.1: icmp_seq=1 ttl=251 time=45 ms
- 64 bytes from 130.58.68.1: icmp_seq=2 ttl=251 time=46 ms
- ^C
- --- cs.swarthmore.edu ping statistics ---
- 3 packets transmitted, 3 packets received, 0% packet loss
- round-trip min/avg/max = 45/52/66 ms
-
-
- This case tells us that for cs.swarthmore.edu it takes about 46
- milliseconds for a packet to go from Widener to Swarthmore College and
- back again. It also gives the average and worst-case speeds, and any
- packet loss that may have occurred (e.g. because of network
- congestion).
-
- While ping generally doesn't hurt network performance, you
- shouldn't use it too often---usually once or twice will leave
- you relatively sure of the other system's state.
-
- Talk
-
- Sometimes email is clumsy and difficult to manage when one really
- needs to have an interactive conversation. The Internet provides for
- that as well, in the form of talk. Two users can literally see
- each other type across thousands of miles.
-
- To talk with Bart Simpson at Widener, one would type
-
- talk bart@@cs.widener.edu
-
- which would cause a message similar to the following to be displayed
- on Bart's terminal:
-
- Message from Talk_Daemon@cs.widener.edu at 21:45 ...
- talk: connection requested by joe@ee.someplace.edu
- talk: respond with: talk joe@ee.someplace.edu
-
- Bart would, presumably, respond by typing talk joe@ee.someplace.edu.
- They could then chat about whatever they wished, with instantaneous
- response time, rather than the write-and-wait style of email. To
- leave talk, on many systems one would type Ctrl-C (hold down
- the Control key and press C). Check local documentation to be sure.
-
- There are two different versions of talk in common use today. The
- first, dubbed ``old talk,'' is supported by a set of Unix systems
- (most notably, those currently sold by Sun). The second, ntalk
- (aka ``new talk''), is more of the standard. If, when attempting to
- talk with another user, it responds with an error about protocol
- families, odds are the incompatibilities between versions of talk is
- the culprit. It's up to the system administrators of sites which use
- the old talk to install ntalk for their users.
-
- Wide Area Information Servers (WAIS)
-
- The WHOIS Database
-
- The main WHOIS database is run at the Network Information Center
- (NIC). The whois command will let you search a database of every
- registered domain (e.g. mit.edu) and of registered users. It's
- primarily used by system postmasters or listowners to find the Points
- of Contact for a site, to let them know of a problem or contact them
- for one reason or another. You can also find out their postal
- address. For example:
-
- % whois mit.edu
- Massachusetts Institute of Technology (MIT) MIT.EDU 18.72.2.1
- Massachusetts Institute of Technology (MIT-DOM) MIT.EDU
-
- Note that there are two entries for mit.edu; we'll go for the
- second.
-
- % whois mit-dom
- Massachusetts Institute of Technology (MIT-DOM)
- Cambridge, MA 02139
-
- Domain Name: MIT.EDU
-
- Administrative Contact, Technical Contact, Zone Contact:
- Schiller, Jeffrey I. (JIS) JIS@MIT.EDU
- (617) 253-8400
-
- Record last updated on 22-Jun-88.
-
- Domain servers in listed order:
- STRAWB.MIT.EDU 18.71.0.151
- W20NS.MIT.EDU 18.70.0.160
- BITSY.MIT.EDU 18.72.0.3
- LITHIUM.LCS.MIT.EDU 18.26.0.121
-
- To see this host record with registered users, repeat the command with
- a star ('*') before the name; or, use '%' to show JUST the registered users.
-
- Much better! Now this information (sought, possibly, by a system
- administrator) can be used to find out how to notify MIT of a security
- issue or problem with connectivity.
-
- Queries can be made for individuals as well; the following would yield
- an entry for the author:
-
- % whois brendan
- Kehoe, Brendan (BK59) brendan@cs.widener.edu
- Widener University
- Department of Computer Science
- Kirkbride 219
- P.O. Box 83 Widener University
- Chester, PA 19013
- (215)/499-4011
-
- Record last updated on 02-May-91.
-
-
- Included is the author's name, his handle (a unique sequence of letters
- and numbers), information on how to contact him, and the last time the record
- was modified in any way.
-
- Anyone can register with the whois database. People who are
- administrative or technical contacts for domains are registered
- automatically when their domain applications are processed. For
- normal users, one must simply fill out a form from the NIC. FTP to
- nic.ddn.mil and get the file netinfo/user-template.txt. The completed
- form should be mailed to registrar@nic.ddn.mil.
-
- Other Uses of WHOIS
-
- Also, many educational sites run WHOIS servers of their own, to offer
- information about people who may be currently on the staff or
- attending the institution. To specify a WHOIS server, many
- implementations include some sort of option or qualifier---in VMS
- under MultiNet, it's /HOST, in Unix -h. To receive
- information about using the Stanford server, one might use the command
-
- whois -h stanford.edu help
-
- A large list of systems offering WHOIS services is being maintained by
- Matt Power of MIT (mhpower@stan.mit.edu). It is available via
- anonymous FTP from sipb.mit.edu, in the directory
- pub/whois. The file is named whois-servers.list.
-
- The systems available include, but are certainly not limited to,
- Syracuse University (syr.edu), New York University
- (acfcluster.nyu.edu), the University of California at San Diego
- (ucsd.edu), and Stanford University (stanford.edu).
-
- ``Fingers were made before forks.''
- Jonathan Swift, Polite Conversation
-
- -------
- Commercial Services
-
- Many services can be accessed through the Internet. As time
- progresses and more outlets for commercial activity appear,
- once-restricted traffic (by the NSFnet Acceptable Use Policy) may now
- flow freely. Now that there are other networks for that information
- to travel on, businesses are making their move.
-
- Internet Service Providers
-
- Providers (AlterNet, PSI, etc)...
-
- Supercomputers
- The Internet Resource Guide (IRG) contains a chapter on
- computer time that's available for a fee. Rather than reproduce it
- here, which would fast become out-of-date as well as triple the size
- of this guide, it's suggested that the reader consult the IRG if such
- services are of interest.
-
- Electronic Journals
-
- The Association of Research Libraries (ARL) publishes a hard-copy
- directory of electronic journals, newsletters, and scholarly
- discussion lists. It is a compilation of entries for hundreds of
-
- sts, dozens of journals and newsletters, and a many
- ``other'' titles, including newsletter-digests, into one reference
- source. Each entry includes instructions on how to access the
- referenced publication or list.
-
- The documents are available electronically by sending the commands
-
- get ejournl1 directry
- get ejournl2 directry
-
- to the server at LISTSERV@OTTAWA.BITNET.
- Listservs for further instructions on using a listserv.
-
- The directory, along with a compilation by Diane Kovacs called
- Directories of Academic E-Mail Conferences, is available in
- print and on diskette (DOS WordPerfect and MacWord) from:
-
- Office of Scientific & Academic Publishing
- Association of Research Libraries
- 1527 New Hampshire Avenue, NW
- Washington, DC 20036
- ARLHQ@UMDC.BITNET
- (202) 232--2466
- (202) 462--7849 (Fax)
-
- The ARL is a not-for-profit organization representing over one
- hundred research libraries in the United States and Canada. The
- publication is available to ARL members for $10 and to non-members
- for $20 (add $5 postage per directory for foreign addresses). Orders
- of six or more copies will receive a 10% discount; all orders must be
- prepaid and sent to the ARL.
-
- Commercial Databases
-
- The American Institute of Physics maintains the Physics Information
- Network. It contains the bibliographic SPIN and General Physics
- Advanced Abstracts databases. Also available is access to bulletin
- boards and several searchable lists (job notices, announcements, etc).
- Telnet to pinet.aip.org; new users must log in as NEW
- and give registration information.
-
- Some of the databases accessible through WAIS (WAIS) are
- available for a fee.
-
- Clarinet News
-
- Clarinet's an electronic publishing network service that provides
- professional news and information, including live UPI wireservice
- news, in the Usenet file format.
-
- Clarinet lets you read an ``electronic newspaper'' right on the local
- system; you can get timely industry news, technology related
- wirestories, syndicated columns and features, financial information,
- stock quotes and more.
-
- Clarinet's provided by using the Usenet message interchange format,
- and is available via UUCP and other delivery protocols, including
- NNTP.
-
- The main feature is ClariNews, an ``electronic newspaper,''
- gathered live from the wire services of United Press International
- (UPI). ClariNews articles are distributed in 100 newsgroups based on
- their subject matter, and are keyworded for additional topics and the
- geographical location of the story. ClariNews includes headlines,
- industry news, box scores, network TV schedules, and more. The main
- products of ClariNews are:
-
-
- ClariNews General, the general news``paper'' with news,
- sports, and features, averaging about 400 stories per day.
-
- TechWire, special groups for stories on science,
- technology, and industry stories around them.
-
- ClariNews-Biz, business and financial stories.
-
- Newsbytes, a daily computer industry newsmagazine.
-
- Syndicated Columns, including Dave Barry (humor) and Mike
- Royko (opinion).
-
- Full information on ClariNet, including subscription information, is
- available from
-
- Clarinet Communications Corp.
- 124 King St. North
- Waterloo, Ontario N2J 2X8
- info@@clarinet.com
- (800) USE-NETS
-
- or with anonymous FTP in the directory /Clarinet on
- ftp.uu.net (Anonymous FTP).
-
- ``Needless to say, Aristotle did not envisage modern finance.''
- Frederick Copleston, S.J.
- A History of Philosophy: Vol 1 Greece & Rome Part II, p95
-
- ---------
- Things You'll Hear About
-
- There are certain things that you'll hear about shortly after you
- start actively using the Internet. Most people assume that everyone's
- familiar with them, and they require no additional explanation. If
- only that were true!
-
- This section addresses a few topics that are commonly encountered and
- asked about as a new user explores Cyberspace. Some of them are
- directly related to how the networks are run today; other points are
- simply interesting to read about.
-
- The Internet Worm
-
- from a letter by Severo M. Ornstein, in ACM June 89 Vol32 No6
- and the appeal notice
-
- On November 2, 1988, Robert Morris, Jr., a graduate student in
- Computer Science at Cornell, wrote an experimental, self-replicating,
- self-propagating program called a worm and injected it into the
- Internet. He chose to release it from MIT, to disguise the fact that
- the worm came from Cornell. Morris soon discovered that the program
- was replicating and reinfecting machines at a much faster rate than
- he had anticipated---there was a bug. Ultimately, many machines at
- locations around the country either crashed or became ``catatonic.''
- When Morris realized what was happening, he contacted a friend at
- Harvard to discuss a solution. Eventually, they sent an anonymous
- message from Harvard over the network, instructing programmers how to
- kill the worm and prevent reinfection. However, because the network
- route was clogged, this message did not get through until it was too
- late. Computers were affected at many sites, including universities,
- military sites, and medical research facilities. The estimated cost
- of dealing with the worm at each installation ranged from $200 to
- more than $53,000. {Derived in part from a letter by Severo M.
- Ornstein, in the Communications of the ACM, Vol 32 No 6, June 1989.}
-
- The program took advantage of a hole in the debug mode of the Unix
- sendmail program, which runs on a system and waits for other systems
- to connect to it and give it email, and a hole in the finger daemon
- fingerd, which serves finger requests (Finger). People at the
- University of California at Berkeley and MIT had copies of the
- program and were actively disassembling it (returning the program
- back into its source form) to try to figure out how it worked.
-
- Teams of programmers worked non-stop to come up with at least a
- temporary fix, to prevent the continued spread of the worm. After
- about twelve hours, the team at Berkeley came up with steps that
- would help retard the spread of the virus. Another method was also
- discovered at Purdue and widely published. The information didn't
- get out as quickly as it could have, however, since so many sites had
- completely disconnected themselves from the network.
-
- After a few days, things slowly began to return to normalcy and
- everyone wanted to know who had done it all. Morris was later named
- in The New York Times as the author (though this hadn't yet been
- officially proven, there was a substantial body of evidence pointing
- to Morris).
-
- Robert T. Morris was convicted of violating the computer Fraud and
- Abuse Act (Title 18), and sentenced to three years of probation, 400
- hours of community service, a fine of $10,050, and the costs of his
- supervision. His appeal, filed in December, 1990, was rejected the
- following March.
-
- The Cuckoo's Egg
-
- First in an article entitled ``Stalking the Wily Hacker,'' and later
- in the book The Cuckoo's Egg, Clifford Stoll detailed his experiences
- trying to track down someone breaking into a system at Lawrence
- Berkeley Laboratory in California. {See the bibliography for full
- citations.}
-
- A 75-cent discrepancy in the Lab's accounting records led Stoll on a
- chase through California, Virginia, and Europe to end up in a small
- apartment in Hannover, West Germany. Stoll dealt with many levels of
- bureaucracy and red tape, and worked with the FBI, the CIA, and the
- German Bundespost trying to track his hacker down.
-
- The experiences of Stoll, and particularly his message in speaking
- engagements, have all pointed out the dire need for communication
- between parties on a network of networks. The only way everyone can
- peacefully co-exist in Cyberspace is by ensuring rapid recognition of
- any existing problems.
-
- Organizations
-
- The indomitable need for humans to congregate and share their common
- interests is also present in the computing world. User groups
- exist around the world, where people share ideas and experiences.
- Similarly, there are organizations which are one step ``above'' user
- groups; that is to say, they exist to encourage or promote an idea or
- set of ideas, rather than support a specific computer or application
- of computers.
-
- The Association for Computing Machinery
-
- The Association for Computing Machinery (the ACM) was founded in
- 1947, immediately after Eckert and Mauchly unveiled one of the first
- electronic computers, the ENIAC, in 1946. Since then, the ACM has
- grown by leaps and bounds, becoming one of the leading educational
- and scientific societies in the computer industry.
-
- The ACM's stated purposes are:
-
- To advance the sciences and arts of information processing;
-
- To promote the free interchange of information about the sciences and
- arts of information processing both among specialists and among the
- public;
-
- To develop and maintain the integrity and competence of individuals
- engaged in the practices of the sciences and arts of information
- processing.
-
- Membership in the ACM has grown from seventy-eight in September, 1947,
- to over 77,000 today. There are local chapters around the world, and
- many colleges and universities endorse student chapters. Lecturers
- frequent these meetings, which tend to be one step above the normal
- ``user group'' gathering. A large variety of published material is
- also available at discounted prices for members of the association.
-
- The ACM has a number of Special Interest Groups (SIGs) that
- concentrate on a certain area of computing, ranging from graphics to
- the Ada programming language to security. Each of the SIGs also
- publishes its own newsletter. There is a Usenet group, comp.org.acm,
- for the discussion of ACM topics. Usenet News for more information
- on reading news.
-
- For more information and a membership application, write to:
-
- Assocation for Computing Machinery
- 1515 Broadway
- New York City, NY 10036
- ACMHELP@ACMVM.BITNET
- (212) 869-7440
-
- Computer Professionals for Social Responsibility
- from their letter to prospective members
-
- The CPSR is an alliance of computer professionals concentrating on
- certain areas of the impact of computer technology on society. It
- traces its history to the fall of 1981, when several researchers in
- Palo Alto, California, organized a lunch meeting to discuss their
- shared concerns about the connection between computing and the
- nuclear arms race. Out of that meeting and the discussions which
- followed, CPSR was born, and has been active ever since. {This
- section is part of the CPSR's letter to prospective members.}
-
- The national CPSR program focuses on the following project areas:
-
-
- Reliability and Risk This area reflects on the concern that
- overreliance on computing technology can lead to unacceptable risks
- to society. It includes, but isn't limited to, work in analyzing
- military systems such as SDI.
-
- Civil Liberties and Privacy This project is concerned with such
- topics as the FBI National Crime Information Center, the growing use
- of databases by both government and private industry, the right of
- access to public information, extension of First Amendment rights to
- electronic communication, and establishing legal protections for
- privacy of computerized information.
-
- Computers in the Workplace The CPSR Workplace Project has
- concentrated its attention on the design of software for the
- workplace, and particularly on the philosophy of ``participatory
- design,'' in which software designers work together with users to
- ensure that systems meet the actual needs of that workplace.
-
- The 21st Century Project This is a coalition with other
- professional organizations working towards redirecting national
- research priorities from concentrating on military issues to
- anticipating and dealing with future problems as science and
- technology enter the next century.
-
- For more information on the CPSR, contact them at:
-
- Computer Professionals for Social Responsibility
- P.O. Box 717
- Palo Alto, CA 94302
- cpsr@csli.stanford.edu
- (415) 322--3778
- (415) 322--3798 (Fax)
-
- The Electronic Frontier Foundation
-
- The Electronic Frontier Foundation (EFF) was established to help
- civilize the ``electronic frontier''---the Cyberspacial medium
- becoming ever-present in today's society; to make it truly useful and
- beneficial not just to a technical elite, but to everyone; and to do
- this in a way which is in keeping with the society's highest
- traditions of the free and open flow of information and
- communication. {This section was derived from eff.about, available
- along with other material via anonymous FTP from ftp.eff.org}
-
- The mission of the EFF is to engage in and support educational
- activities which increase popular understanding of the opportunities
- and challenges posed by developments in computing and
- telecommunications;
-
- to develop among policy-makers a better understanding of the
- issues underlying free and open telecommunications, and support the
- creation of legal and structural approaches which will ease the
- assimilation of these new technologies by society;
-
- to raise public awareness about civil liberties issues arising from
- the rapid advancement in the area of new computer-based
- communications media and, where necessary, support litigation in the
- public interest to preserve, protect, and extend First Amendment
- rights within the realm of computing and telecommunications
- technology;
-
- to encourage and support the development of new tools which will
- endow non-technical users with full and easy access to computer-based
- telecommunications;
-
- The Usenet newsgroups comp.org.eff.talk and comp.org.eff.news are
- dedicated to discussion concerning the EFF. They also have mailing
- list counterparts for those that don't have access to Usenet,
- eff-talk-request@eff.org and eff-news-request@eff.org. The first is
- an informal arena (aka a normal newsgroup) where anyone may voice his
- or her opinions. The second, comp.org.eff.news, is a moderated area
- for regular postings from the EFF in the form of EFFector Online. To
- submit a posting for the EFFector Online, or to get general
- information about the EFF, write to eff@eff.org. There is also a
- wealth of information available via anonymous FTP on ftp.eff.org.
-
- The EFF can be contacted at
-
- The Electronic Frontier Foundation, Inc.
- 155 Second St. #1
- Cambridge, MA 02141
- eff@eff.org
- (617) 864-0665
- (617) 864-0866 (Fax)
-
- The Free Software Foundation
-
- The Free Software Foundation was started by Richard Stallman (creator
- of the popular GNU Emacs editor). It is dedicated to eliminating
- restrictions on copying, redistributing, and modifying software.
-
- The word ``free'' in their name does not refer to price; it refers to
- freedom. First, the freedom to copy a program and redistribute it to
- your neighbors, so that they can use it as well as you. Second, the
- freedom to change a program, so that you can control it instead of it
- controlling you; for this, the source code must be made available to
- you.
-
- The Foundation works to provide these freedoms by developing free
- compatible replacements for proprietary software. Specifically, they
- are putting together a complete, integrated software system called
- ``GNU'' that is upward-compatible with Unix. {As an aside, the editor
- of the GNU project, emacs, contains a built-in LISP interpreter and a
- large part of its functionality is written in LISP. The name GNU is
- itself recursive (the mainstay of the LISP language); it stands for
- ``Gnu's Not Unix.''}
-
- When it is released, everyone will be permitted to copy it and
- distribute it to others. In addition, it will be distributed with
- source code, so you will be able to learn about operating systems by
- reading it, to port it to your own machine, and to exchange the
- changes with others.
-
- For more information on the Free Software Foundation and the status of
- the GNU Project, or for a list of the current tasks that still need to
- be done, write to gnu@prep.ai.mit.edu.
-
- The IEEE
-
- Need IEEE...
-
- The League for Programming Freedom
-
- The League for Programming Freedom is a grass-roots organization of
- professors, students, businessmen, programmers and users dedicated to
- ``bringing back'' the freedom to write programs, which they contend
- has been lost over the past number years. The League is not opposed
- to the legal system that Congress intended--copyright on individual
- programs. Their aim is to reverse the recent changes made by judges in
- response to special interests, often explicitly rejecting the public
- interest principles of the Constitution.
-
- The League works to abolish the new monopolies by publishing articles,
- talking with public officials, boycotting egregious offenders, and in
- the future may intervene in court cases. On May 24, 1989, the League
- picketed Lotus headquarters because of their lawsuits, and then
- again on August 2, 1990. These marches stimulated widespread media
- coverage for the issue. They welcome suggestions for other
- activities, as well as help in carrying them out.
-
- For information on the League and how to join, write to
-
- League for Programming Freedom
- 1 Kendall Square #143
- P.O. Box 9171
- Cambridge, MA 02139
- league@prep.ai.mit.edu
-
- Networking Initiatives
-
- Research and development are two buzz words often heard when
- discussing the networking field---everything needs to go faster, over
- longer distances, for a lower cost. To ``keep current,'' one should
- read the various trade magazines and newspapers, or frequent the
- networking-oriented newsgroups of Usenet. If possible, attend trade
- shows and symposia like Usenix, Interop, et. al.
-
- ISDN
-
- NREN
-
- The National Research and Education Network (NREN) is a five-year
- project approved by Congress in the Fall of 1991. It's intended to
- create a national electronic ``super-highway.'' The NREN will be 50
- times faster than the fastest available networks (at the time of this
- writing). Proponents of the NREN claim it will be possible to
- transfer the equivalent of the entire text of the Encyclopedia
- Britannica in one second. Further information, including the
- original text of the bill presented by Senator Al Gore (D--TN), is
- available through anonymous FTP to nis.nsf.net, in the directory
- nsfnet. In addition, Vint Cerf wrote on the then-proposed NREN in
- RFC-1167, Thoughts on the National Research and Education Network.
- RFCs for information on obtaining RFCs.
-
- A mailing list, nren-discuss@uu.psi.com, is available for
- discussion of the NREN; write to
- nren-discuss-request@uu.psi.com to be added.
-
- ``To talk in publick, to think in solitude,
- to read and to hear, to inquire,
- and to answer inquiries, is the business of a scholar.''
- Samuel Johnson
- Chapter VIII
- The History of Rasselas, Prince of Abissinia
-
- -----
- Finding Out More
-
- Internet Resource Guide
-
- The NSF Network Service Center (NNSC) compiles and makes available an
- Internet Resource Guide (IRG). The goal of the guide is to increase the
- visibility of various Internet resources that may help users do their
- work better. While not yet an exhaustive list, the guide is a useful
- compendium of many resources and can be a helpful reference for a new
- user.
-
- Resources listed are grouped by types into sections. Current sections
- include descriptions of online library catalogs, data archives, online
- white pages directory services, networks, network information centers,
- and computational resources, such as supercomputers. Each entry
- describes the resource, identifies who can use the resource, explains
- how to reach the local network via the Internet, and lists contacts
- for more information. The list is distributed electronically by the
- NNSC. To receive a guide, or to get on a mailing list that alerts you
- to when it is updated, send a message to
- resource-guide-request@nnsc.nsf.net.
-
- The current edition of the IRG is available via anonymous FTP from
- nnsc.nsf.net, in the directory /resource-guide.
-
- Requests for Comments
-
- The internal workings of the Internet are defined by a set of
- documents called RFCs (Request for Comments). The general process
- for creating an RFC is for someone wanting something formalized to
- write a document describing the issue and mailing it to Jon Postel
- (postel@isi.edu). He acts as a referee for the proposal. It is then
- commented upon by all those wishing to take part in the discussion
- (electronically, of course). It may go through multiple revisions.
- Should it be generally accepted as a good idea, it will be assigned a
- number and filed with the RFCs.
-
- The RFCs can be divided into five groups: required, suggested,
- directional, informational and obsolete. Required RFCs (e.g.,
- RFC-791, The Internet Protocol) must be implemented on any host
- connected to the Internet.
-
- Suggested RFCs are generally implemented by network hosts. Lack of
- them does not preclude access to the Internet, but may impact its
- usability. RFC-793, Transmission Control Protocol, is a must for
- those implementing TCP.
-
- Directional RFCs were discussed and agreed to, but their application
- has never come into wide use. This may be due to the lack of wide
- need for the specific application (RFC-937, The Post Office Protocol) or
- that, although technically superior, ran against other pervasive
- approaches (RFC-891, Hello). It is suggested that, should the facility
- be required by a particular site, an implementation be done in
- accordance with the RFC. This ensures that, should the idea be one
- whose time has come, the implementation will be in accordance with
- some standard and will be generally usable.
-
- Informational RFCs contain factual information about the Internet and
- its operation (RFC-990, Assigned Numbers).
-
- There is also a subset of RFCs called FYIs (For Your Information).
- They are written in a language much more informal than that used in
- the other, standard RFCs. Topics range from answers to common
- questions for new and experienced users to a suggested bibliography.
-
- Finally, as the Internet has grown and technology has changed, some
- RFCs become unnecessary. These obsolete RFCs cannot be ignored,
- however. Frequently when a change is made to some RFC that causes a
- new one to obsolete others, the new RFC only contains explanations and
- motivations for the change. Understanding the model on which the
- whole facility is based may involve reading the original and
- subsequent RFCs on the topic.
-
- RFCs and FYIs are available via FTP from many sources, including:
-
- The nic.ddn.mil archive, as /rfc/rfc-xxxx.txt, where
- xxxx is the number of the RFC.
-
- from ftp.uu.net, in the directory /RFC.
-
- They're also available through mail by writing to
- service@nic.ddn.mil, with a Subject: line of send RFC-xxxx.TXT, again
- with xxxx being the RFC number.
-
- ``Knowledge is of two kinds. We know a subject ourselves, or we
- know where we can find information upon it.''
- Samuel Johnson
- Letter to Lord Chesterfield
- February, 1755
- a book of quotes said April 18, 1775 .. the book of Johnson's works
- said it's 1755; I'll go with the latter.
-
- -------
- Conclusion
-
- This guide is far from complete---the Internet changes on a daily (if
- not hourly) basis. However, this booklet should provide enough
- information to make the incredible breadth and complexity of the
- Internet a mite less imposing. Coupled with some exploration and
- experimentation, every user has the potential to be a competent net
- citizen, using the facilities that are available to their fullest.
-
- You, the reader, are strongly encouraged to suggest improvements to
- any part of this booklet. If something was unclear, left you with
- doubts, or wasn't addressed, it should be fixed. If you find any
- problems, inaccuracies, spelling errors, etc., please report them to:
-
-
- Brendan Kehoe
- Department of Computer Science
- Widener University
- Chester, PA 19013
-
- Internet: guide-bugs@cs.widener.edu
- UUCP: ...!widener!guide-bugs
-
-
- If you are interested in future updates to this guide (aside from
- normal new editions), discussion about information to be included or
- removed, etc., write to guide-request@cs.widener.edu to be placed on
- a mailing list for such things.
-
- @dots is actually `. . . .'
- ``I've seed de first an de last @dots I seed de beginnin,
- en now I sees de endin.''
- William Faulkner
- The Sound & The Fury
- April 8, 1928
-
- --------
-
- Getting to Other Networks
-
- Inter-connectivity has been and always will be one of the biggest
- goals in computer networking. The ultimate desire is to make it so
- one person can contact anyone else no matter where they are. A number
- of ``gateways'' between networks have been set up. They include:
-
- AppleLink
- Quantum Services sells access to AppleLink, which is similar to
- QuantumLink for Commodore computers and PCLink for IBM PCs and
- compatibles. It also provides email access through the address
- user@applelink.apple.com.
-
- ATTMail
- AT&T sells a commercial email service called ATTMail. Its users
- can be reached by writing to user@attmail.com.
-
- BIX
- Users on BIX (the Byte Information eXchange) can be reached
- through the DAS gateway at user@cibix.das.net.
-
- CompuServe (CI$)
- To reach a user on the commercial service CompuServe, you must
- address the mail as xxxxx.xxx@compuserve.com, with
- xxxxx.xxx being their CompuServe user ID. Normally CompuServe
- ids are represented as being separated by a comma (like
- 71999,141); since most mailers don't react well to having
- commas in addresses, it was changed to a period. For the above
- address, mail would be sent to 71999.141@compuserve.com.
-
- EasyNet
- Digital sells a service called EasyNet; users that subscribe to it can
- be reached with the addresses user@host.enet.dec.com or
- user%host.enet@decwrl.dec.com.
-
- FidoNet
- The FidoNet computer network can be reached by using a special
- addressing method. If John Smith is on the node 1:2/3.4 on
- FidoNet, his or her email address would be
- john.smith@p4.f3.n2.z1.fidonet.org
- (notice how the numbers fall in place?).
-
- MCI Mail
- MCI also sells email accounts (similar to ATTMail). Users can be
- reached with user@mcimail.com.
-
- PeaceNet
- Users on the PeaceNet network can be reached by writing to
- user@igc.org.
-
- The Well
- Users on the service The Well can be reached by writing to
- user@well.sf.ca.us. The Well is directly connected to the Internet.
-
- This table is far from complete. In addition to sites not being
- listed, some services are not (nor do they plan to be) accessible
- from the ``outside'' (like Prodigy); others, like GEnie, are actively
- investigating the possibility of creating a gateway into their
- system. For the latest information, consult a list called the
- Inter-Network Mail Guide. It's available from a number of FTP sites,
- including UUNET; Anonymous FTP, for more information on getting a
- copy of it using anonymous FTP.
-
- Retrieving Files via Email
-
- For those who have a connection to the Internet, but cannot FTP, there
- do exist a few alternatives to get those files you so desperately
- need. When requesting files, it's imperative that you keep in mind
- the size of your request---odds are the other people who may be using
- your link won't be too receptive to sudden bursts of really heavy
- traffic on their normally sedate connection.
-
- Archive Servers
-
- An alternative to the currently well over-used FTPmail system is
- taking advantage of the many archive servers that are presently
- being maintained. These are programs that receive email messages that
- contain commands, and act on them. For example, sending an archive
- server the command help will usually yield, in the form of a
- piece of email, information on how to use the various commands that
- the server has available.
-
- One such archive server is service@nic.ddn.mil. Maintained by
- the Network Information Center (NIC) in Chantilly, VA, the server is
- set up to make all of the information at the NIC available for people
- who don't have access to FTP. This also includes the WHOIS service
- (Whois). Some sample Subject: lines for queries to the
- NIC server are:
-
- Subject: help Describes available commands.
- Subject: rfc 822 Sends a copy of RFC-822.
- Subject: rfc index Sends an index of the available RFCs.
- Subject: netinfo domain-template.txt Sends a domain application.
- Subject: whois widener Sends WHOIS information on `widener'.
-
- More information on using their archive server can be obtained by
- writing to their server address service@nic.ddn.mil with a
- Subject: of help.
-
- There are different ``brands'' of archive server, each with its own
- set of commands and services. Among them there often exists a common
- set of commands and services (e.g. index, help, etc).
- Be that as it may, one should always consult the individual help for a
- specific server before assuming the syntax---100K surprises can be
- hard on a system.
-
- FTP-by-Mail Servers
- Some systems offer people the ability to receive files through a
- mock-FTP interface via email. Anonymous FTP for a general overview of
- how to FTP. The effects of providing such a service varies, although
- a rule of thumb is that it will probably use a substantial amount of
- the available resources on a system.
-
- The ``original'' FTP-by-Mail service, BITFTP, is available to BITNET
- users from the Princeton node PUCC. It was once accessible to
- anyone, but had to be closed out to non-BITNET users because of the
- heavy load on the system.
-
- In response to this closure, Paul Vixie designed and installed a
- system called FTPmail on one of Digital's gateway computers,
- decwrl.dec.com. Write to ftpmail@decwrl.dec.com with help in the
- body of the letter for instructions on its use. The software is
- undergoing constant development; once it reaches a stable state,
- other sites will be encouraged to adopt it and provide the service
- also.
-
- Newsgroup Creation
-
- Everyone has the opportunity to make a Call For Votes on the
- Usenet and attempt to create a newsgroup that he/she feels would be of
- benefit to the general readership. The rules governing newsgroup
- creation have evolved over the years into a generally accepted method.
- They only govern the ``world'' groups; they aren't applicable to
- regional or other alternative hierarchies.
-
- Discussion
-
- A discussion must first take place to address issues like the naming
- of the group, where in the group tree it should go (e.g.
- rec.sports.koosh vs rec.games.koosh?), and whether or not it should
- be created in the first place. The formal Request For Discussion
- (RFD) should be posted to news.announce.newgroups, along with any
- other groups or mailing lists at all related to the proposed topic.
- news.announce.newgroups is moderated. You should place it first in
- the Newsgroups: header, so that it will get mailed to the moderator
- only. The article won't be immediately posted to the other
- newsgroups listed; rather, it will give you the opportunity to have
- the moderator correct any inconsistencies or mistakes in your RFD.
- He or she will take care of posting it to the newsgroups you
- indicated. Also the Followup-To: header will be set so that the
- actual discussion takes place only in news.groups. If a user has
- difficulty posting to a moderated group, he or she may mail
- submissions intended for news.announce.newgroups to the address
- announce-newgroups@rpi.edu.
-
- The final name and charter of the group, and whether it will be
- moderated or unmoderated, will be determined during the discussion
- period. If it's to be moderated, the discussion will also decide who
- the moderator will be. If there's no general agreement on these
- points among those in favor of a new group at the end of 30 days,
- the discussion will be taken into mail rather than continued posting
- to news.groups; that way, the proponents of the group can iron out
- their differences and come back with a proper proposal, and make
- a new Request For Discussion.
-
- Voting
- After the discussion period (which is mandatory), if it's been
- determined that a new group really is desired, a name and charter are
- agreed upon, and it's been determined whether the group will be
- moderated (and by whom), a Call For Votes (CFV) should be posted
- to news.announce.newgroups, along with any other groups that
- the original Request For Discussion was posted to. The CFV should be
- posted (or mailed to the news.announce.newgroups moderator) as
- soon as possible after the discussion ends (to keep it fresh in
- everyone's mind).
-
- The Call for Votes should include clear instructions on how to cast a
- vote. It's important that it be clearly explained how to both vote
- for and against a group (and be of equivalent difficulty or
- ease). If it's easier for you or your administrator, two separate
- addresses can be used to mail yes and no votes to, providing that
- they're on the same machine. Regardless of the method, everyone
- must have a very specific idea of how to get his/her vote counted.
-
- The voting period can last between 21 and 31 days, no matter what the
- preliminary results of the vote are. A vote can't be called off
- simply because 400 ``no'' votes have come in and only two ``yes''
- votes. The Call for Votes should include the exact date that the
- voting period will end---only those votes arriving on the vote-taker's
- machine before this date can be counted.
-
- To keep awareness high, the CFV can be repeated during the vote,
- provided that it gives the same clear, unbiased instructions for
- casting a vote as the original; it also has to be the same proposal as
- was first posted. The charter can't change in mid-vote. Also, votes
- that're posted don't count---only those that were mailed to the
- vote-taker can be tallied.
-
- Partial results should never be included; only a statement of
- the specific proposal, that a vote is in progress on it, and how to
- cast a vote. A mass acknowledgement (``Mass ACK'' or ``Vote ACK'') is
- permitted; however, it must be presented in a way that gives no
- indication of which way a person voted. One way to avoid this is to
- create one large list of everyone who's voted, and sort it in
- alphabetical order. It should not be two sorted lists (of the yes and
- no votes, respectively).
-
- Every vote is autonomous. The votes for or against one group can't be
- transferred to another, similar proposal. A vote can only count for
- the exact proposal that it was a response to. In particular, a vote
- for or against a newsgroup under one name can't be counted as a vote
- for or against another group with a different name or charter, a
- different moderated/unmoderated status, or, if it's moderated, a
- different moderator or set of moderators. Whew!
-
- Finally, the vote has to be explicit; they should be of the form I
- vote for the group foo.bar as proposed or I vote against the group
- foo.bar as proposed. The wording doesn't have to be exact, your
- intention just has to be clear.
-
- The Result of a Vote
-
- At the end of the voting period, the vote-taker has to post (to
- news.announce.newgroups) the tally and email addresses of the votes
- received. Again, it can also be posted to any of the groups listed in
- the original CFV. The tally should make clear which way a person
- voted, so the results can be verified if it proves necessary to do so.
-
- After the vote result is posted to news.announce.newgroups,
- there is a mandatory five-day waiting period. This affords everyone
- the opportunity to correct any errors or inconsistencies in the voter
- list or the voting procedure.
-
- Creation of the Group
-
- If, after the waiting period, there are no serious objections that
- might invalidate the vote, the vote is put to the ``water test.'' If
- there were 100 more valid YES/create votes than NO/don't create
- votes, and at least two-thirds of the total number of votes are in
- favor of creation, then a newgroup control message can be sent out
- (often by the moderator of news.announce.newgroups). If the 100-vote
- margin or the two-thirds percentage isn't met, the group has failed
- and can't be created.
-
- If the proposal failed, all is not lost---after a six-month waiting
- period (a ``cooling down''), a new Request For Discussion can be posted
- to news.groups, and the whole process can start over again. If after
- a couple of tries it becomes obvious that the group is not
- wanted or needed, the vote-taker should humbly step back and accept
- the opinion of the majority. (As life goes, so goes Usenet.)
-
- --------
-
- Glossary
-
- This glossary is only a tiny subset of all of the various terms and
- other things that people regularly use on The Net. For a more
- complete (and very entertaining) reference, it's suggested you get a
- copy of The New Hacker's Dictionary, which is based on a VERY large
- text file called the Jargon File. Edited by Eric Raymond
- (eric@snark.thyrsus.com), it is available from the MIT Press,
- Cambridge, Massachusetts, 02142; its ISBN number is 0-262-68069-6.
- Also see RFC-1208, A Glossary of Networking Terms.
-
-
- :-)
- This odd symbol is one of the ways a person can portray ``mood'' in
- the very flat medium of computers---by using ``smilies.'' This is
- `metacommunication', and there are literally hundreds of them, from
- the obvious to the obscure. This particular example expresses
- ``happiness.'' Don't see it? Tilt your head to the left 90 degrees.
- Smilies are also used to denote sarcasm.
-
- Network addresses are usually of two types:
-
- the physical or hardware address of a network interface card; for
- ethernet this 48-bit address might be 0260.8C00.7666. The hardware
- address is used to forward packets within a physical network.
- Fortunately, network users do not have to be concerned about hardware
- addresses since they are automatically handled by the networking
- software.
-
- The logical or Internet address is used to facilitate moving data
- between physical networks. The 32-bit Internet address is made up of a
- network number, a subnetwork number, and a host number. Each host
- computer on the Internet, has a unique address. For example, all
- Internet addresses at Colorado State have a network number of 129.82, a
- subnet number in the range of 1-254, and a host number in the range of
- 1-254. All Internet hosts have a numeric address and an English-style
- name. For example, the Internet address for UCC's CYBER 840 is
- 129.82.103.96; its Internet name is csugreen.UCC.ColoState.EDU.
-
- address resolution
- Conversion of an Internet address to the corresponding physical address.
- On an ethernet, resolution requires broadcasting on the local area network.
-
- administrivia
- Administrative tasks, most often related to the maintenance of mailing
- lists, digests, news gateways, etc.
-
- anonymous FTP
- Also known as ``anon FTP''; a service provided to make files available
- to the general Internet community---Anonymous FTP.
-
- ANSI
- The American National Standards Institute disseminates basic standards
- like ASCII, and acts as the United States' delegate to the ISO.
- Standards can be ordered from ANSI by writing to the ANSI Sales Department,
- 1430 Broadway, New York, NY 10018, or by telephoning (212) 354-3300.
-
- archie
- A service which provides lookups for packages in a database of the
- offerings of countless of anonymous FTP sites. archie for a
- full description.
-
- archive server
- An email-based file transfer facility offered by some systems.
-
- ARPA (Advanced Research Projects Agency)
- Former name of DARPA, the government agency that funded ARPAnet and
- later the DARPA Internet.
-
- ARPAnet
- A pioneering long haul network funded by ARPA. It
- served as the basis for early networking research as well as a
- central backbone during the development of the Internet. The
- ARPAnet consisted of individual packet switching computers
- interconnected by leased lines. The ARPAnet no longer exists as a
- singular entity.
-
- asynchronous
- Transmission by individual bytes, not related to specific timing on the
- transmitting end.
-
- auto-magic
- Something which happens pseudo-automatically, and is usually too
- complex to go into any further than to say it happens ``auto-magically.''
-
- backbone
- A high-speed connection within a network that connects shorter,
- usually slower circuits. Also used in reference to a system that acts
- as a ``hub'' for activity (although those are becoming much less
- prevalent now than they were ten years ago).
-
- bandwidth
- The capacity of a medium to transmit a signal. More informally, the
- mythical ``size'' of The Net, and its ability to carry the files and
- messages of those that use it. Some view certain kinds of traffic
- (FTPing hundreds of graphics images, for example) as a ``waste of
- bandwidth'' and look down upon them.
-
- BITNET (Because It's Time Network)
- An NJE-based international educational network.
-
- bounce
- The return of a piece of mail because of an error in its delivery.
-
- btw
- An abbreviation for ``by the way.''
-
- CFV (Call For Votes)
- Initiates the voting period for a Usenet newsgroup. At least one
- (occasionally two or more) email address is customarily included as a
- repository for the votes. See Newsgroup Creation
- for a full description of the Usenet voting process.
-
- ClariNews
- The fee-based Usenet newsfeed available from ClariNet Communications.
-
- client
- The user of a network service; also used to describe a computer that
- relies upon another for some or all of its resources.
-
- Cyberspace
- A term coined by William Gibson in his fantasy novel
- Neuromancer to describe the ``world'' of computers, and the
- society that gathers around them.
-
- datagram
- The basic unit of information passed across the Internet. It contains
- a source and destination address along with data. Large messages are
- broken down into a sequence of IP datagrams.
-
- disassembling
- Converting a binary program into human-readable machine language code.
-
- DNS (Domain Name System)
- The method used to convert Internet names to their corresponding
- Internet numbers.
-
- domain
- A part of the naming hierarchy. Syntactically, a domain name consists
- of a sequence of names or other words separated by dots.
-
- dotted quad
- A set of four numbers connected with periods that make up an Internet
- address; for example, 147.31.254.130.
-
- email
- The vernacular abbreviation for electronic mail.
-
- email address
- The UUCP or domain-based address that a user is referred to with. For
- example, the author's address is brendan@cs.widener.edu.
-
- ethernet
- A 10-million bit per second networking scheme originally developed by
- Xerox Corporation. Ethernet is widely used for LANs because it can
- network a wide variety of computers, it is not proprietary, and
- components are widely available from many commercial sources.
-
- FDDI (Fiber Distributed Data Interface)
- An emerging standard for network technology based on fiber optics that
- has been established by ANSI. FDDI specifies a 100-million bit per
- second data rate. The access control mechanism uses token ring
- technology.
-
- flame
- A piece of mail or a Usenet posting which is violently argumentative.
-
- FQDN (Fully Qualified Domain Name)
- The FQDN is the full site name of a system, rather than just its
- hostname. For example, the system lisa at Widener University
- has a FQDN of lisa.cs.widener.edu.
-
- FTP (File Transfer Protocol)
- The Internet standard high-level protocol for transferring files from
- one computer to another.
-
- FYI
- An abbreviation for the phrase ``for your information.'' There is
- also a series of RFCs put out by the Network Information Center called
- FYIs; they address common questions of new users and many other useful
- things. RFCs for instructions on retrieving FYIs.
-
- gateway
- A special-purpose dedicated computer that attaches to two or more
- networks and routes packets from one network to the other. In
- particular, an Internet gateway routes IP datagrams among the networks
- it connects. Gateways route packets to other gateways until they can be
- delivered to the final destination directly across one physical network.
-
- header
- The portion of a packet, preceding the actual data, containing source
- and destination addresses and error-checking fields. Also part of a
- message or news article.
-
- hostname
- The name given to a machine. (See also FQDN.)
-
- IMHO (In My Humble Opinion)
- This usually accompanies a statement that may bring about personal
- offense or strong disagreement.
-
- Internet
- A concatenation of many individual TCP/IP campus, state, regional, and
- national networks (such as NSFnet, ARPAnet, and Milnet) into one
- single logical network all sharing a common addressing scheme.
-
- Internet number
- The dotted-quad address used to specify a certain system. The
- Internet number for the site cs.widener.edu is 147.31.254.130. A
- resolver is used to translate between hostnames and Internet
- addresses.
-
- interoperate
- The ability of multi-vendor computers to work together using a common
- set of protocols. With interoperability, PCs, Macs, Suns, Dec VAXen,
- CDC Cybers, etc, all work together allowing one host computer to
- communicate with and take advantage of the resources of another.
-
- ISO (International Organization for Standardization)
- Coordinator of the main networking standards that are put into use today.
-
- kernel
- The level of an operating system or networking system that contains the
- system-level commands or all of the functions hidden from the user. In
- a Unix system, the kernel is a program that contains the device drivers,
- the memory management routines, the scheduler, and system calls. This
- program is always running while the system is operating.
-
- LAN (Local Area Network)
- Any physical network technology that operates at high speed over short
- distances (up to a few thousand meters).
-
- mail gateway
- A machine that connects to two or more electronic mail systems
- (especially dissimilar mail systems on two different networks) and
- transfers mail messages among them.
-
- mailing list
- A possibly moderated discussion group, distributed via email from a
- central computer maintaining the list of people involved in the
- discussion.
-
- mail path
- A series of machine names used to direct electronic mail from one user
- to another.
-
- medium
- The material used to support the transmission of data. This can be
- copper wire, coaxial cable, optical fiber, or electromagnetic wave (as in
- microwave).
-
- multiplex
- The division of a single transmission medium into multiple logical
- channels supporting many simultaneous sessions. For example, one
- network may have simultaneous FTP, telnet, rlogin, and SMTP
- connections, all going at the same time.
-
- net.citizen
- An inhabitant of Cyberspace. One usually tries to be a good
- net.citizen, lest one be flamed.
-
- netiquette
- A pun on ``etiquette''; proper behavior on The Net. Usenet Netiquette.
-
- network
- A group of machines connected together so they can transmit information
- to one another. There are two kinds of networks: local networks and
- remote networks.
-
- NFS (Network File System)
- A method developed by Sun Microsystems to allow computers to share
- files across a network in a way that makes them appear as if they're
- ``local'' to the system.
-
- NIC
- The Network Information Center.
-
- node
- A computer that is attached to a network; also called a host.
-
- NSFnet
- The national backbone network, funded by the National Science Foundation
- and operated by the Merit Corporation, used to interconnect regional
- (mid-level) networks such as WestNet to one another.
-
- packet
- The unit of data sent across a packet switching network. The term is
- used loosely. While some Internet literature uses it to refer
- specifically to data sent across a physical network, other literature
- views the Internet as a packet switching network and describes IP
- datagrams as packets.
-
- polling
- Connecting to another system to check for things like mail or news.
-
- postmaster
- The person responsible for taking care of mail problems, answering
- queries about users, and other related work at a site.
-
- protocols
- A formal description of message formats and the rules two computers must
- follow to exchange those messages. Protocols can describe low-level
- details of machine-to-machine interfaces (e.g., the order in which bits
- and bytes are sent across a wire) or high-level exchanges between
- allocation programs (e.g., the way in which two programs transfer a file
- across the Internet).
-
- recursion
- The facility of a programming language to be able to call functions
- from within themselves.
-
- resolve
- Translate an Internet name into its equivalent IP address or other DNS
- information.
-
- RFD (Request For Discussion)
- Usually a two- to three-week period in which the particulars of
- newsgroup creation are battled out.
-
- route
- The path that network traffic takes from its source to its destination.
-
- router
- A dedicated computer (or other device) that sends packets from one
- place to another, paying attention to the current state of the network.
-
- RTFM (Read The Fantastic Manual).
- This anacronym is often used when someone asks a simple or common
- question. The word `Fantastic' is usually replaced with one much more
- vulgar.
-
- SMTP (Simple Mail Transfer Protocol)
- The Internet standard protocol for transferring electronic mail messages
- from one computer to another. SMTP specifies how two mail systems
- interact and the format of control messages they exchange to transfer
- mail.
-
- server
- A computer that shares its resources, such as printers and files, with
- other computers on the network. An example of this is a Network File
- System (NFS) server which shares its disk space with other computers.
-
- signal-to-noise ratio
- When used in reference to Usenet activity, signal-to-noise
- ratio describes the relation between amount of actual information in
- a discussion, compared to their quantity. More often than not,
- there's substantial activity in a newsgroup, but a very small number
- of those articles actually contain anything useful.
-
- signature
- The small, usually four-line message at the bottom of a piece of email
- or a Usenet article. In Unix, it's added by creating a file
- .signature in the user's home directory. Large signatures are
- a no-no.
-
- summarize
- To encapsulate a number of responses into one coherent, usable
- message. Often done on controlled mailing lists or active newsgroups,
- to help reduce bandwidth.
-
- synchronous
- Data communications in which transmissions are sent at a fixed rate,
- with the sending and receiving devices synchronized.
-
- TCP/IP (Transmission Control Protocol/Internet Protocol)
- A set of protocols, resulting from ARPA efforts, used by the Internet to
- support services such as remote login (telnet), file transfer
- (FTP) and mail (SMTP).
-
- telnet
- The Internet standard protocol for remote terminal connection service.
- Telnet allows a user at one site to interact with a remote timesharing
- system at another site as if the user's terminal were connected directly
- to the remote computer.
-
- terminal server
- A small, specialized, networked computer that connects many terminals to
- a LAN through one network connection. Any user on the network can then
- connect to various network hosts.
-
- TeX
- A free typesetting system by Donald Knuth.
-
- twisted pair
- Cable made up of a pair of insulated copper wires wrapped around each
- other to cancel the effects of electrical noise.
-
- UUCP (Unix to Unix Copy Program)
- A store-and-forward system, primarily for Unix systems but currently
- supported on other platforms (e.g. VMS and personal computers).
-
- WAN (Wide-Area Network)
- A network spanning hundreds or thousands of miles.
-
- workstation
- A networked personal computing device with more power than a standard
- IBM PC or Macintosh. Typically, a workstation has an operating system
- such as unix that is capable of running several tasks at the same time.
- It has several megabytes of memory and a large, high-resolution display.
- Examples are Sun workstations and Digital DECstations.
-
- worm
- A computer program which replicates itself. The Internet worm
- (The Internet Worm) was perhaps the most famous; it
- successfully (and accidentally) duplicated itself on systems across
- the Internet.
-
- wrt
- With respect to.
-
-
- ``I hate definitions.''
- Benjamin Disraeli
- Vivian Grey, bk i chap ii
-
- ------
- Bibliography
-
- What follows is a compendium of sources that have information that
- will be of use to anyone reading this guide. Most of them were used
- in the writing of the booklet, while others are simply noted because
- they are a must for any good net.citizen's bookshelf.
-
- Books
-
- Comer, Douglas E.
- Internetworking With TCP/IP, 2nd ed., 2v
- Prentice Hall
- Englewood Cliffs, NJ
- 1991
-
- Davidson, John
- An Introduction to TCP/IP
- Springer-Verlag
- Berlin
- 1988
-
- Frey, Donnalyn, and Adams, Rick
- !@%:: A Directory of Electronic Mail Addressing and Networks
- O'Reilly and Associates
- Newton, MA
- 1989
-
- Gibson, William
- Neuromancer
- Ace
- New York, NY
- 1984
-
- LaQuey, Tracy
- Users' Directory of Computer Networks
- Digital Press
- Bedford, MA
- 1990
-
- Levy, Stephen
- Hackers: Heroes of the Computer Revolution
- Anchor Press/Doubleday
- Garden City, NY
- 1984
-
- Partridge, Craig
- Innovations in Internetworking
- ARTECH House
- Norwood, MA
- 1988
-
- Quarterman, John S.
- The Matrix: Computer Networks and Conferencing Systems Worldwide
- Digital Press
- Bedford, MA
- 1989
-
- Raymond, Eric (ed)
- The New Hacker's Dictionary
- MIT Press
- Cambridge, MA
- 1991
-
- Stoll, Clifford
- The Cuckoo's Egg
- Doubleday
- New York
- 1989
-
- Tanenbaum, Andrew S.
- Computer Networks, 2d ed
- Prentice-Hall
- Englewood Cliffs, NJ
- 1988
-
- Todinao, Grace
- Using UUCP and USENET: A Nutshell Handbook
- O'Reilly and Associates
- Newton, MA
- 1986
-
- The Waite Group
- Unix Communications, 2nd ed.
- Howard W. Sams & Company
- Indianapolis
- 1991
-
- Periodicals & Papers
- magazine: Barlow, J
- Coming Into The Country
- Communications of the ACM 34:3
- 2
- March 1991
- Addresses ``Cyberspace''---John Barlow was a co-founder of the EFF.
-
- proceedings: Collyer, G., and Spencer, H
- News Need Not Be Slow
- Proceedings of the 1987 Winter USENIX Conference
- 181--90
- USENIX Association, Berkeley, CA
- January 1987
-
- magazine: Denning, P
- The Internet Worm
- American Scientist
- 126--128
- March--April 1989
-
- magazine: The Science of Computing: Computer Networks
- American Scientist
- 127--129
- March--April 1985
-
- magazine: Frey, D., and Adams, R
- USENET: Death by Success?
- UNIX REVIEW
- 55--60
- August 1987
-
- magazine: Gifford, W. S
- ISDN User-Network Interfaces
- IEEE Journal on Selected Areas in Communications
- 343--348
- May 1986
-
- magazine: Ginsberg, K
- Getting from Here to There
- UNIX REVIEW
- 45
- January 1986
-
- magazine: Hiltz, S. R
- The Human Element in Computerized Conferencing Systems
- Computer Networks
- 421--428
- December 1978
-
-
- proceedings: Horton, M
- What is a Domain?
- Proceedings of the Summer 1984 USENIX Conference
- 368--372
- USENIX Association, Berkeley, CA
- June 1984
-
- magazine: Jacobsen, Ole J
- Information on TCP/IP
- ConneXions---The Interoperability Report
- 14--15
- July 1988
-
-
- magazine: Jennings, D., et al
- Computer Networking for Scientists
- Science
- 943--950
- 28 February 1986
-
-
- paper: Markoff, J
- ``Author of computer `virus' is son of U.S. electronic security expert.''
- New York Times
- Nov. 5, 1988
- A1
-
- paper: ``Computer snarl: A `back door' ajar.''
- New York Times
- Nov. 7, 1988
- B10
-
- magazine: McQuillan, J. M., and Walden, D. C
- The ARPA Network Design Decisions
- Computer Networks
- 243--289
- 1977
-
-
- magazine: Ornstein, S. M
- A letter concerning the Internet worm
- Communications of the ACM 32:6
- June 1989
-
- proceedings: Partridge, C
- Mail Routing Using Domain Names: An Informal Tour
- Proceedings of the 1986 Summer USENIX Conference
- 366--76
- USENIX Association, Berkeley, CA
- June 1986
-
- magazine: Quarterman, J
- Etiquette and Ethics
- ConneXions---The Interoperability Report
- 12--16
- March 1989
-
-
- magazine: Notable Computer Networks
- Communications of the ACM 29:10
- October 1986
- This was the predecessor to The Matrix.
-
- magazine: Raeder, A. W., and Andrews, K. L
- Searching Library Catalogs on the Internet: A Survey
- Database Searcher 6
- 16--31
- September 1990
-
- proceedings: Seeley, D
- A tour of the worm
- Proceedings of the 1989 Winter USENIX Conference
- 287--304
- USENIX Association, Berkeley, CA
- February 1989
-
- magazine: Shulman, G
- Legal Research on USENET Liability Issues
- ;login: The USENIX Association Newsletter
- 11--17
- December 1984
-
- magazine: Smith, K
- E-Mail to Anywhere
- PC World
- 220--223
- March 1988
-
- magazine: Stoll, C
- Stalking the Wily Hacker
- Communications of the ACM 31:5
- 14
- May 1988
- This article grew into the book The Cuckoo's Egg.
-
- proceedings: Taylor, D
- The Postman Always Rings Twice: Electronic Mail in a Highly Distributed
- Environment
- Proceedings of the 1988 Winter USENIX Conference
- 145--153
- USENIX Association, Berkeley, CA
- December 1988
-
- magazine: U.S.Gen'l Accounting Ofc
- Computer Security: Virus Highlights Need for Improved Internet Management
- GAO/IMTEC-89-57,
- 1989
- Addresses the Internet worm.
-
-
- ``And all else is literature.''
- Paul Verlaine
- The Sun, New York
- While he was city editor in 1873--1890.
-
-
-