home *** CD-ROM | disk | FTP | other *** search
Text File | 1993-11-24 | 172.7 KB | 4,337 lines |
-
- Zen and the Art of the Internet
- =================================================================================
- A Beginner's Guide to the Internet
- First Edition
- January 1992
-
-
-
- by Brendan P. Kehoe
- _______________________________________________________________________________
-
-
- This is revision 1.0 of February 2, 1992.
-
-
-
- Copyright Oc 1992 Brendan P. Kehoe
-
- Permission is granted to make and distribute verbatim copies of this guide
- provided the copyright notice and this permission notice are preserved on all
- copies.
-
- Permission is granted to copy and distribute modified versions of this booklet
- under the conditions for verbatim copying, provided that the entire resulting
- derived work is distributed under the terms of a permission notice identical
- to this one.
-
- Permission is granted to copy and distribute translations of this booklet into
- another language, under the above conditions for modified versions, except
- that this permission notice may be stated in a translation approved by the
- author.
- Preface 1
-
-
-
-
-
- Preface
-
-
- The composition of this booklet was originally started because the Com-
- puter Science department at Widener University was in desperate need of
- documentation describing the capabilities of this "great new Internet link"
- we obtained.
-
- It's since grown into an effort to acquaint the reader with much of what's
- currently available over the Internet. Aimed at the novice user, it attempts
- to remain operating system "neutral"_little information herein is specific
- to Unix, VMS, or any other environment. This booklet will, hopefully, be
- usable by nearly anyone.
-
- Some typographical conventions are maintained throughout this guide. All
- abstract items like possible filenames, usernames, etc., are all represente d
- in italics. Likewise, definite filenames and email addresses are represented
- in a quoted `typewriter' font. A user's session is usually offset from the
- rest of the paragraph, as such
-
- prompt> command
- The results are usually displayed here.
-
- The purpose of this booklet is two-fold first, it's intended to serve as a
- reference piece, which someone can easily grab on the fly and look something
- up. Also, it forms a foundation from which people can explore the vast
- expanse of the Internet. Zen and the Art of the Internet doesn't spend a
- significant amount of time on any one point; rather, it provides enough for
- people to learn the specifics of what his or her local system offers.
-
- One warning is perhaps in order_this territory we are entering can be-
- come a fantastic time-sink. Hours can slip by, people can come and go, and
- you'll be locked into Cyberspace. Remember to do your work!
-
- With that, I welcome you, the new user, to The Net.
-
-
- brendan@cs.widener.edu
- Chester, PA
- 2 Zen and the Art of the Internet
-
-
- Acknowledgements 3
-
-
-
-
-
- Acknowledgements
-
-
- Certain sections in this booklet are not my original work_rather, they
- are derived from documents that were available on the Internet and already
- aptly stated their areas of concentration. The chapter on Usenet is, in large
- part, made up of what's posted monthly to news.announce.newusers, with
- some editing and rewriting. Also, the main section on archie was derived
- from `whatis.archie' by Peter Deutsch of the McGill University Computing
- Centre. It's available via anonymous FTP from archie.mcgill.ca. Much of
- what's in the telnet section came from an impressive introductory document
- put together by SuraNet. Some definitions in the one are from an excellent
- glossary put together by Colorado State University.
-
- This guide would not be the same without the aid of many people on The
- Net, and the providers of resources that are already out there. I'd like to
- thank the folks who gave this a read-through and returned some excellent
- comments, suggestions, and criticisms, and those who provided much-needed
- information on the fly. Glee Willis deserves particular mention for all of his
- work; this guide would have been considerably less polished without his help.
-
-
-
- o Andy Blankenbiller, Army at Aberdeen
-
- o Alan Emtage, McGill University Computer Science Department
-
- o Brian Fitzgerald, Rensselaer Polytechnic Institute
-
- o John Goetsch, Rhodes University, South Africa
-
- o Jeff Kellem, Boston University's Chemistry Department
-
- o Bill Krauss, Moravian College
-
- o Steve Lodin, Delco Electronics
-
- o Mike Nesel, NASA
-
- o Bob Neveln, Widener University Computer Science Department
-
- o Wanda Pierce, McGill University Computing Centre
-
- o Joshua Poulson, Widener University Computing Services
-
- o Dave Sill, Oak Ridge National Laboratory
-
- o Bob Smart, CitiCorp/TTI
-
- o Ed Vielmetti, Vice President of MSEN
-
- o Craig Ward, USC/Information Sciences Institute (ISI)
-
- o Glee Willis, University of Nevada, Reno
-
- o Chip Yamasaki, OSHA
- 4 Zen and the Art of the Internet
-
-
- Chapter 1 Network Basics 5
-
-
-
-
-
- 1 Network Basics
-
-
- We are truly in an information society. Now more than ever, moving
- vast amounts of information quickly across great distances is one of our
- most pressing needs. From small one-person entrepreneurial efforts, to the
- largest of corporations, more and more professional people are discovering
- that the only way to be successful in the '90s and beyond is to realize that
- technology is advancing at a break-neck pace_and they must somehow keep
- up. Likewise, researchers from all corners of the earth are finding that their
- work thrives in a networked environment. Immediate access to the work of
- colleagues and a "virtual" library of millions of volumes and thousands of
- papers affords them the ability to encorporate a body of knowledge hereto-
- fore unthinkable. Work groups can now conduct interactive conferences with
- each other, paying no heed to physical location_the possibilities are endless.
-
- You have at your fingertips the ability to talk in "real-time" with someone
- in Japan, send a 2,000-word short story to a group of people who will critique
- it for the sheer pleasure of doing so, see if a Macintosh sitting in a lab in
- Canada is turned on, and find out if someone happens to be sitting in front
- of their computer (logged on) in Australia, all inside of thirty minutes. No
- airline (or tardis, for that matter) could ever match that travel itinerary.
-
- The largest problem people face when first using a network is grasping all
- that's available. Even seasoned users find themselves surprised when they
- discover a new service or feature that they'd never known even existed. Once
- acquainted with the terminology and sufficiently comfortable with making
- occasional mistakes, the learning process will drastically speed up.
-
-
-
- 1.1 Domains
-
-
- Getting where you want to go can often be one of the more difficult
- aspects of using networks. The variety of ways that places are named will
- probably leave a blank stare on your face at first. Don't fret; there is a
- method to this apparent madness.
-
- If someone were to ask for a home address, they would probably expect
- a street, apartment, city, state, and zip code. That's all the information the
- post office needs to deliver mail in a reasonably speedy fashion. Likewise,
- computer addresses have a structure to them. The general form is
-
- a person's email address on a computer user@somewhere.domain
- a computer's name somewhere.domain
-
- The user portion is usually the person's account name on the system,
- though it doesn't have to be. somewhere.domain tells you the name of a
- 6 Zen and the Art of the Internet
-
-
-
-
-
- system or location, and what kind of organization it is. The trailing domain
- is often one of the following
-
- com Usually a company or other commercial institution or organiza-
- tion, like Convex Computers (`convex.com').
-
- edu An educational institution, e.g. New York University, named
- `nyu.edu'.
-
- gov A government site; for example, NASA is `nasa.gov'.
-
- mil A military site, like the Air Force (`af.mil').
-
- net Gateways and other administrative hosts for a network (it does
- not mean all of the hosts in a network).1 One such gateway is
- `near.net'.
-
- org This is a domain reserved for private organizations, who don't
- comfortably fit in the other classes of domains. One example
- is the Electronic Frontier Foundation (see Section 8.3.3 [EFF],
- page 66), named `eff.org'.
-
- Each country also has its own top-level domain. For example, the us
- domain includes each of the fifty states. Other countries represented with
- domains include
-
- au Australia
-
- ca Canada
-
- fr France
-
- uk The United Kingdom. These also have sub-domains of things
- like `ac.uk' for academic sites and `co.uk' for commercial ones.
-
- The proper terminology for a site's domain name (somewhere.domain
- above) is its Fully Qualified Domain Name (FQDN). It is usually selected
- to give a clear indication of the site's organization or sponsoring agent. For
- example, the Massachusetts Institute of Technology's FQDN is `mit.edu';
- similarly, Apple Computer's domain name is `apple.com'. While such ob-
- vious names are usually the norm, there are the occasional exceptions that
- are ambiguous enough to mislead_like `vt.edu', which on first impulse one
- might surmise is an educational institution of some sort in Vermont; not so.
- It's actually the domain name for Virginia Tech. In most cases it's relatively
- easy to glean the meaning of a domain name_such confusion is far from the
- norm.
-
- _________________________________
-
-
- 1 The Matrix, 111.
- Chapter 1 Network Basics 7
-
-
-
-
-
- 1.2 Internet Numbers
-
-
- Every single machine on the Internet has a unique address,2 called its
- Internet number or IP Address. It's actually a 32-bit number, but
- i s most commonly represented as four numbers joined by periods (`.'), like
- 147.31.254.130. This is sometimes also called a dotted quad; there are
- literally thousands of different possible dotted quads. The ARPAnet (the
- mother to today's Internet) originally only had the capacity to have up to 256
- systems on it because of the way each system was addressed. In the early
- eighties, it became clear that things would fast outgrow such a small limit;
- the 32-bit addressing method was born, freeing thousands of host numbers.
-
- Each piece of an Internet address (like 192) is called an "octet," rep-
- resenting one of four sets of eight bits. The first two or three pieces (e.g.
- 192.55.239) represent the network that a system is on, called its subnet.
- For example, all of the computers for Wesleyan University are in the subnet
- 129.133. They can have numbers like 129.133.10.10, 129.133.230.19,
- up to 65 thousand possible combinations (possible computers).
-
- IP addresses and domain names aren't assigned arbitrarily_that
- would lead to unbelievable confusion. An application must be filed
- with the Network Information Center (NIC), either electronically (to
- hostmaster@nic.ddn.mil) or via regular mail.
-
-
-
- 1.3 Resolving Names and Numbers
-
-
- Ok, computers can be referred to by either their FQDN or their Internet
- address. How can one user be expected to remember them all?
-
- They aren't. The Internet is designed so that one can use either method.
- Since humans find it much more natural to deal with words than numbers
- in most cases, the FQDN for each host is mapped to its Internet number.
- Each domain is served by a computer within that domain, which provides
- all of the necessary information to go from a domain name to an IP address,
- and vice-versa. For example, when someone refers to foosun.bar.com, the
- resolver knows that it should ask the system foovax.bar.com about systems
- in bar.com. It asks what Internet address foosun.bar.com has; if the name
- foosun.bar.com really exists, foovax will send back its number. All of this
- "magic" happens behind the scenes.
- _________________________________
-
-
- 2 At least one address, possibly two or even three_but we won't go into
-
- that.
- 8 Zen and the Art of the Internet
-
-
-
-
-
- Rarely will a user have to remember the Internet number of a site (al-
- though often you'll catch yourself remembering an apparently obscure num-
- ber, simply because you've accessed the system frequently). However, you
- will remember a substantial number of FQDNs. It will eventually reach a
- point when you are able to make a reasonably accurate guess at what do-
- main name a certain college, university, or company might have, given just
- their name.
-
-
-
- 1.4 The Networks
-
-
- Internet The Internet is a large "network of networks." There is no
- one network known as The Internet; rather, regional nets like
- SuraNet, PrepNet, NearNet, et al., are all inter-connected (nay,
- "inter-networked") together into one great living thing, com-
- municating at amazing speeds with the TCP/IP protocol. All
- activity takes place in "real-time."
- UUCP The UUCP network is a loose association of systems all com-
- municating with the `UUCP' protocol. (UUCP stands for `Unix-
- to-Unix Copy Program'.) It's based on two systems connecting to
- each other at specified intervals, called polling, and executing
- any work scheduled for either of them. Historically most UUCP was
- done with Unix equipment, although the software's since been
- implemented on other platforms (e.g. VMS). For example, the
- system oregano polls the system basil once every two hours. If
- there's any mail waiting for oregano, basil will send it at that
- time; likewise, oregano will at that time send any jobs waiting
- for basil.
- BITNET BITNET (the "Because It's Time Network") is comprised of
- systems connected by point-to-point links, all running the NJE
- protocol. It's continued to grow, but has found itself suffering
- at the hands of the falling costs of Internet connections. Also,
- a number of mail gateways are in place to reach users on other
- networks.
-
-
-
- 1.5 The Physical Connection
-
-
- The actual connections between the various networks take a variety of
- forms. The most prevalent for Internet links are 56k leased lines (dedicated
- telephone lines carrying 56kilobit-per-second connections) and T1 links (spe-
- cial phone lines with 1Mbps connections). Also installed are T3 links, acting
- Chapter 1 Network Basics 9
-
-
-
-
-
- as backbones between major locations to carry a massive 45Mbps load of
- traffic.
-
- These links are paid for by each institution to a local carrier (for exam-
- ple, Bell Atlantic owns PrepNet, the main provider in Pennsylvania). Also
- available are SLIP connections, which carry Internet traffic (packets) over
- high-speed modems.
-
- UUCP links are made with modems (for the most part), that run from
- 1200 baud all the way up to as high as 38.4Kbps. As was mentioned in
- Section 1.4 [The Networks], page 8, the connections are of the store-and-
- forward variety. Also in use are Internet-based UUCP links (as if things
- weren't already confusing enough!). The systems do their UUCP traffic over
- TCP/IP connections, which give the UUCP-based network some blindingly
- fast "hops," resulting in better connectivity for the network as a whole.
- UUCP connections first became popular in the 1970's, and have remained
- in wide-spread use ever since. Only with UUCP can Joe Smith correspond
- with someone across the country or around the world, for the price of a local
- telephone call.
-
- BITNET links mostly take the form of 9600bps modems connected from
- site to site. Often places have three or more links going; the majority,
- however, look to "upstream" sites for their sole link to the network.
-
-
-
- "The Glory and the Nothing of a Name"
- Byron, Churchill's Grave
- 10 Zen and the Art of the Internet
-
-
- Chapter 2 Electronic Mail 11
-
-
-
-
-
- 2 Electronic Mail
-
-
- The desire to communicate is the essence of networking. People have
- always wanted to correspond with each other in the fastest way possible,
- short of normal conversation. Electronic mail (or email) is the most preva-
- lent application of this in computer networking. It allows people to write
- back and forth without having to spend much time worrying about how the
- message actually gets delivered. As technology grows closer and closer to
- being a common part of daily life, the need to understand the many ways it
- can be utilized and how it works, at least to some level, is vital.
-
-
-
- 2.1 Email Addresses
-
-
- Electronic mail is hinged around the concept of an address; the section
- on Networking Basics made some reference to it while introducing domains.
- Your email address provides all of the information required to get a message
- to you from anywhere in the world. An address doesn't necessarily have to
- go to a human being. It could be an archive server,1 a list of people, or even
- someone's pocket pager. These cases are the exception to the norm_mail
- to most addresses is read by human beings.
-
-
-
- 2.1.1 %@!. Symbolic Cacophony
-
-
- Email addresses usually appear in one of two forms_using the Internet
- format which contains `@', an "at"-sign, or using the UUCP format which
- contains `!', an exclamation point, also called a "bang." The latter of the
- two, UUCP "bang" paths, is more restrictive, yet more clearly dictates how
- the mail will travel.
-
- To reach Jim Morrison on the system south.america.org, one would
- address the mail as `jm@south.america.org'. But if Jim's account was on
- a UUCP site named brazil, then his address would be `brazil!jm'. If it's
- possible (and one exists), try to use the Internet form of an address; bang
- paths can fail if an intermediate site in the path happens to be down. There
- is a growing trend for UUCP sites to register Internet domain names, to help
- alleviate the problem of path failures.
-
- Another symbol that enters the fray is `%'_it acts as an extra "rout-
- ing" method. For example, if the UUCP site dream is connected to
- _________________________________
-
-
- 1 See [Archive Servers], page 77, for a description.
- 12 Zen and the Art of the Internet
-
-
-
-
-
- south.america.org, but doesn't have an Internet domain name of its own,
- a user debbie on dream can be reached by writing to the address
-
- debbie%dream@south.america.org
-
- The form is significant. This address says that the local system should first
- send the mail to south.america.org. There the address debbie%dream
- will turn into debbie@dream, which will hopefully be a valid address. Then
- south.america.org will handle getting the mail to the host dream, where
- it will be delivered locally to debbie.
-
- All of the intricacies of email addressing methods are fully covered in
- the book !%@ A Directory of Electronic Mail Addressing and Networks
- published by O'Reilly and Associates, as part of their Nutshell Handbook
- series. It is a must for any active email user. Write to nuts@ora.com for
- ordering information.
-
-
-
- 2.1.2 Sending and Receiving Mail
-
-
- We'll make one quick diversion from being OS-neuter here, to show you
- what it will look like to send and receive a mail message on a Unix system.
- Check with your system administrator for specific instructions related to
- mail at your site.
-
- A person sending the author mail would probably do something like this
-
- % mail brendan@cs.widener.edu
- Subject print job's stuck
-
-
- I typed `print babe.gif' and it didn't work! Why??
-
- The next time the author checked his mail, he would see it listed in his
- mailbox as
-
- % mail
- "/usr/spool/mail/brendan" 1 messages 1 new 1 unread
- U 1 joeuser@foo.widene Tue May 5 2036 29/956 print job's stuck
- ?
-
- which gives information on the sender of the email, when it was sent, and
- the subject of the message. He would probably use the `reply' command of
- Unix mail to send this response
- Chapter 2 Electronic Mail 13
-
-
- ? r
- To joeuser@foo.widener.edu
- Subject Re print job's stuck
-
-
- You shouldn't print binary files like GIFs to a printer!
-
-
- Brendan
-
- Try sending yourself mail a few times, to get used to your system's mailer.
- It'll save a lot of wasted aspirin for both you and your system administrator.
-
-
-
- 2.1.3 Anatomy of a Mail Header
-
-
- An electronic mail message has a specific structure to it that's common
- across every type of computer system.2 A sample would be
-
- From bush@hq.mil Sat May 25 170601 1991
- Received from hq.mil by house.gov with SMTP id AA21901
- (4.1/SMI for dan@house.gov); Sat, 25 May 91 170556 -0400
- Date Sat, 25 May 91 170556 -0400
- From The President <bush@hq.mil>
- Message-Id <9105252105.AA06631@hq.mil>
- To dan@senate.gov
- Subject Meeting
-
-
- Hi Dan .. we have a meeting at 930 a.m. with the Joint Chiefs. Please
- don't oversleep this time.
-
- The first line, with `From' and the two lines for `Received' are usually
- not very interesting. They give the "real" address that the mail is coming
- from (as opposed to the address you should reply to, which may look much
- different), and what places the mail went through to get to you. Over the
- Internet, there is always at least one `Received' header and usually no more
- than four or five. When a message is sent using UUCP, one `Received'
- header is added for each system that the mail passes through. This can
- often result in more than a dozen `Received' headers. While they help
- with dissecting problems in mail delivery, odds are the average user will
- never want to see them. Most mail programs will filter out this kind of
- "cruft" in a header.
-
- The `Date' header contains the date and time the message was sent.
- Likewise, the "good" address (as opposed to "real" address) is laid out in
- the `From' header. Sometimes it won't include the full name of the person
- _________________________________
-
-
- 2 The standard is written down in RFC-822. See [RFCs], page 73 for more
-
- info on how to get copies of the various RFCs.
- 14 Zen and the Art of the Internet
-
-
-
-
-
- (in this case `The President'), and may look different, but it should always
- contain an email address of some form.
-
- The `Message-ID' of a message is intended mainly for tracing mail rout-
- ing, and is rarely of interest to normal users. Every `Message-ID' is guar-
- anteed to be unique.
-
- `To' lists the email address (or addresses) of the recipients of the
- message.
-
- There may be a `Cc' header, listing additional addresses. Finally, a brief
- subject for the message goes in the `Subject' header.
-
- The exact order of a message's headers may vary from system to system,
- but it will always include these fundamental headers that are vital to proper
- delivery.
-
-
-
- 2.1.4 Bounced Mail
-
-
- When an email address is incorrect in some way (the system's name is
- wrong, the domain doesn't exist, whatever), the mail system will bounce the
- message back to the sender, much the same way that the Postal Service does
- when you send a letter to a bad street address. The message will include
- the reason for the bounce; a common error is addressing mail to an account
- name that doesn't exist. For example, writing to Lisa Simpson at Widener
- University's Computer Science department will fail, because she doesn't have
- an account.3
-
- From Mail Delivery Subsystem <MAILER-DAEMON>
- Date Sat, 25 May 91 164514 -0400
- To mg@gracie.com
- Cc Postmaster@cs.widener.edu
- Subject Returned mail User unknown
-
-
- ----- Transcript of session follows -----
- While talking to cs.widener.edu
- >>> RCPT To<lsimpson@cs.widener.edu>
- <<< 550 <lsimpson@cs.widener.edu>... User unknown
- 550 lsimpson... User unknown
-
- As you can see, a carbon copy of the message (the `Cc' header entry) was
- sent to the postmaster of Widener's CS department. The Postmaster is
- responsible for maintaining a reliable mail system on his system. Usually
- postmasters at sites will attempt to aid you in getting your mail where it's
- _________________________________
-
-
- 3 Though if she asked, we'd certainly give her one.
- Chapter 2 Electronic Mail 15
-
-
-
-
-
- supposed to go. If a typing error was made, then try re-sending the message.
- If you're sure that the address is correct, contact the postmaster of the site
- directly and ask him how to properly address it.
-
- The message also includes the text of the mail, so you don't have to
- retype everything you wrote.
-
- ----- Unsent message follows -----
- Received by cs.widener.edu id AA06528; Sat, 25 May 91 164514 -0400
- Date Sat, 25 May 91 164514 -0400
- From Matt Groening <mg@gracie.com>
- Message-Id <9105252045.AA06528@gracie.com>
- To lsimpson@cs.widener.edu
- Subject Scripting your future episodes
- Reply-To writing-group@gracie.com
-
-
- verbiage
-
- The full text of the message is returned intact, including any headers that
- were added. This can be cut out with an editor and fed right back into the
- mail system with a proper address, making redelivery a relatively painless
- process.
-
-
-
- 2.2 Mailing Lists
-
-
- People that share common interests are inclined to discuss their hobby or
- interest at every available opportunity. One modern way to aid in
- this exchange of information is by using a mailing list_usually an email
- address that redistributes all mail sent to it back out to a list
- of addresses. For example, the Sun Managers mailing list (of interest to
- people that administer computers manufactured by Sun) has the address `sun-
- managers@eecs.nwu.edu'. Any mail sent to that address will "explode" out to
- each person named in a file maintained on a computer at Northwestern
- University.
-
- Administrative tasks (sometimes referred to as administrivia) are often
- handled through other addresses, typically with the suffix `-request'. To
- continue the above, a request to be added to or deleted from the Sun Man-
- agers list should be sent to `sun-managers-request@eecs.nwu.edu'.
-
- When in doubt, try to write to the `-request' version of a mailing list
- address first; the other people on the list aren't interested in your desire
- to be added or deleted, and can certainly do nothing to expedite your request.
- Often if the administrator of a list is busy (remember, this is all peripheral
- to real jobs and real work), many users find it necessary to ask again and
- again,
- 16 Zen and the Art of the Internet
-
-
-
-
-
- often with harsher and harsher language, to be removed from a list. This
- does nothing more than waste traffic and bother everyone else receiving the
- messages. If, after a reasonable amount of time, you still haven't succeeded
- to be removed from a mailing list, write to the postmaster at that site and
- see if they can help.
-
- Exercise caution when replying to a message sent by a mailing list. If
- you wish to respond to the author only, make sure that the only address
- you're replying to is that person, and not the entire list. Often messages of
- the sort "Yes, I agree with you completely!" will appear on a list, boring the
- daylights out of the other readers. Likewise, if you explicitly do want to send
- the message to the whole list, you'll save yourself some time by checking to
- make sure it's indeed headed to the whole list and not a single person.
-
- A list of the currently available mailing lists is available in at least
- two places; the first is in a file on ftp.nisc.sri.com called
- `interest-groups' under the `netinfo/' directory. It's updated fairly
- regularly, but is large (presently around 700K), so only get it every once in
- a while. The other list is maintained by Gene Spafford (spaf@cs.purdue.edu),
- and is posted in parts to the newsgroup news.lists semi-regularly. (See
- Chapter 4 [Usenet News], page 29, for info on how to read that and other
- newsgroups.)
-
-
-
- 2.2.1 Listservs
-
-
- On BITNET there's an automated system for maintaining discussion lists
- called the listserv. Rather than have an already harried and overworked
- human take care of additions and removals from a list, a program performs
- these and other tasks by responding to a set of user-driven commands.
-
- Areas of interest are wide and varied_ETHICS-L deals with ethics
- in computing, while ADND-L has to do with a role-playing game. A
- full list of the available BITNET lists can be obtained by writing to
-
- `LISTSERV@BITNIC.BITNET' with a body containing the command
-
- list global
-
- However, be sparing in your use of this_see if it's already on your system
- somewhere. The reply is quite large.
-
- The most fundamental command is `subscribe'. It will tell the listserv
- to add the sender to a specific list. The usage is
-
- subscribe foo-l Your Real Name
-
- It will respond with a message either saying that you've been added to the
- list, or that the request has been passed on to the system on which the list
- is actually maintained.
- Chapter 2 Electronic Mail 17
-
-
-
-
-
- The mate to `subscribe' is, naturally, `unsubscribe'. It will remove a
- given address from a BITNET list. It, along with all other listserv
- commands, can be abbreviated_`subscribe' as `sub', `unsubscribe' as `unsub',
- etc. For a full list of the available listserv commands, write to
-
- `LISTSERV@BITNIC.BITNET', giving it the command `help'.
-
- As an aside, there have been implementations of the listserv system for
- non-BITNET hosts (more specifically, Unix systems). One of the most com-
- plete is available on cs.bu.edu in the directory `pub/listserv'.
-
-
-
- "I made this letter longer than usual because
- I lack the time to make it shorter."
- Pascal, Provincial Letters XVI
- 18 Zen and the Art of the Internet
-
-
- Chapter 3 Anonymous FTP 19
-
-
-
-
-
- 3 Anonymous FTP
-
-
-
- FTP (File Transfer Protocol) is the primary method of transferring files
- over the Internet. On many systems, it's also the name of the program that
- implements the protocol. Given proper permission, it's possible to copy a
- file from a computer in South Africa to one in Los Angeles at very fast
- speeds (on the order of 5-10K per second). This normally requires either
- a user id on both systems or a special configuration set up by the system
- administrator(s).
-
- There is a good way around this restriction_the anonymous FTP ser- vice.
- It essentially will let anyone in the world have access to a certain area of
- disk space in a non-threatening way. With this, people can make files
- publicly available with little hassle. Some systems have dedicated en- tire
- disks or even entire computers to maintaining extensive archives of
- source code and information. They include gatekeeper.dec.com (Digi- tal),
- wuarchive.wustl.edu (Washington University in Saint Louis), and
- archive.cis.ohio-state.edu (The Ohio State University).
-
- The process involves the "foreign" user (someone not on the system it-
- self) creating an FTP connection and logging into the system as the user
- `anonymous', with an arbitrary password
-
- Name (foo.site.comyou) anonymous
- Password jm@south.america.org
-
- Custom and netiquette dictate that people respond to the Password query
- with an email address so that the sites can track the level of FTP usage, if
- they desire. (See Section 2.1 [Addresses], page 11 for information on email
- addresses).
-
- The speed of the transfer depends on the speed of the underlying link. A
- site that has a 9600bps SLIP connection will not get the same throughput as a
- system with a 56k leased line (see Section 1.5 [The Physical Connection], page
- 8, for more on what kinds of connections can exist in a network). Also, the
- traffic of all other users on that link will affect performance. If there are
- thirty people all FTPing from one site simultaneously, the load on the system
- (in addition to the network connection) will degrade the overall throughput of
- the transfer.
-
-
-
- 3.1 FTP Etiquette
-
-
- Lest we forget, the Internet is there for people to do work. People using
- the network and the systems on it are doing so for a purpose, whether it be
- 20 Zen and the Art of the Internet
-
-
-
-
-
- research, development, whatever. Any heavy activity takes away from the
- overall performance of the network as a whole.
-
- The effects of an FTP connection on a site and its link can vary; the
- general rule of thumb is that any extra traffic created detracts from the
- ability of that site's users to perform their tasks. To help be considerate of
- this, it's highly recommended that FTP sessions be held only after normal
- business hours for that site, preferably late at night. The possible effects
- of a large transfer will be less destructive at 2 a.m. than 2 p.m. Also,
- remember that if it's past dinner time in Maine, it's still early afternoon in
- California _ think in terms of the current time at the site that's being
- visited, not of local time.
-
-
-
- 3.2 Basic Commands
-
-
- While there have been many extensions to the various FTP clients out
- there, there is a de facto "standard" set that everyone expects to work. For
- more specific information, read the manual for your specific FTP program.
- This section will only skim the bare minimum of commands needed to op-
- erate an FTP session.
-
-
-
- 3.2.1 Creating the Connection
-
-
- The actual command to use FTP will vary among operating systems; for
- the sake of clarity, we'll use `FTP' here, since it's the most general form.
-
- There are two ways to connect to a system_using its hostname or its
- Internet number. Using the hostname is usually preferred. However, some
- sites aren't able to resolve hostnames properly, and have no alternative.
- We'll assume you're able to use hostnames for simplicity's sake. The form is
-
- ftp somewhere.domain
-
- See Section 1.1 [Domains], page 5 for help with reading and using domain
- names (in the example below, somewhere.domain is ftp.uu.net).
-
- You must first know the name of the system you want to connect to.
- We'll use `ftp.uu.net' as an example. On your system, type
-
- ftp ftp.uu.net
-
- (the actual syntax will vary depending on the type of system the connection's
- being made from). It will pause momentarily then respond with the message
-
- Connected to ftp.uu.net.
-
- and an initial prompt will appear
- Chapter 3 Anonymous FTP 21
-
-
-
-
-
- 220 uunet FTP server (Version 5.100 Mon Feb 11 171328 EST 1991) ready.
- Name (ftp.uu.netjm)
-
- to which you should respond with anonymous
-
- 220 uunet FTP server (Version 5.100 Mon Feb 11 171328 EST 1991) ready.
- Name (ftp.uu.netjm) anonymous
-
- The system will then prompt you for a password; as noted previously, a good
- response is your email address
-
- 331 Guest login ok, send ident as password.
- Password jm@south.america.org
- 230 Guest login ok, access restrictions apply.
- ftp>
-
- The password itself will not echo. This is to protect a user's security when
- he or she is using a real account to FTP files between machines. Once you
- reach the ftp> prompt, you know you're logged in and ready to go.
-
-
-
- 3.2.2 dir
-
-
- At the `ftp>' prompt, you can type a number of commands to perform
- various functions. One example is `dir'_it will list the files in the current
- directory. Continuing the example from above
-
- ftp> dir
-
-
- 200 PORT command successful.
- 150 Opening ASCII mode data connection for /bin/ls.
- total 3116
- drwxr-xr-x 2 7 21 512 Nov 21 1988 .forward
- -rw-rw-r-- 1 7 11 0 Jun 23 1988 .hushlogin
- drwxrwxr-x 2 0 21 512 Jun 4 1990 Census
- drwxrwxr-x 2 0 120 512 Jan 8 0936 ClariNet
- etc etc
- -rw-rw-r-- 1 7 14 42390 May 20 0224 newthisweek.Z
- etc etc
- -rw-rw-r-- 1 7 14 2018887 May 21 0101 uumap.tar.Z
- drwxrwxr-x 2 7 6 1024 May 11 1058 uunet-info
-
-
- 226 Transfer complete.
- 5414 bytes received in 1.1 seconds (4.9 Kbytes/s)
- ftp>
-
- The file `newthisweek.Z' was specifically included because we'll be using it
- later. Just for general information, it happens to be a listing of all of the
- 22 Zen and the Art of the Internet
-
-
-
-
-
- files added to UUNET's archives during the past week.
-
- The directory shown is on a machine running the Unix operating system_
- the dir command will produce different results on other operating systems
- (e.g. TOPS, VMS, et al.). Learning to recognize different formats will take
- some time. After a few weeks of traversing the Internet, it proves easier to
- see, for example, how large a file is on an operating system you're otherwise
- not acquainted with.
-
- With many FTP implementations, it's also possible to take the output
- of dir and put it into a file on the local system with
-
- ftp> dir n* outfilename
-
- the contents of which can then be read outside of the live FTP connec-
- tion; this is particularly useful for systems with very long directories (like
- ftp.uu.net). The above example would put the names of every file that
- begins with an `n' into the local file outfilename.
-
-
-
- 3.2.3 cd
-
-
- At the beginning of an FTP session, the user is in a "top-level" directory.
- Most things are in directories below it (e.g. `/pub'). To change the current
- directory, one uses the cd command. To change to the directory `pub', for
- example, one would type
-
- ftp> cd pub
-
- which would elicit the response
-
- 250 CWD command successful.
-
- Meaning the "Change Working Directory" command (`cd') worked properly.
- Moving "up" a directory is more system-specific_in Unix use the command
- `cd ..', and in VMS, `cd [-]'.
-
-
-
- 3.2.4 get and put
-
-
- The actual transfer is performed with the get and put commands. To
- get a file from the remote computer to the local system, the command takes
- the form
-
- ftp> get filename
-
- where filename is the file on the remote system. Again using ftp.uu.net as
- an example, the file `newthisweek.Z' can be retrieved with
- Chapter 3 Anonymous FTP 23
-
-
- ftp> get newthisweek.Z
- 200 PORT command successful.
- 150 Opening ASCII mode data connection for newthisweek.Z (42390 bytes).
- 226 Transfer complete.
- local newthisweek.Z remote newthisweek.Z
- 42553 bytes received in 6.9 seconds (6 Kbytes/s)
- ftp>
-
- The section below on using binary mode instead of ASCII will describe why
- this particular choice will result in a corrupt and subsequently unusable file.
-
- If, for some reason, you want to save a file under a different name (e.g.
- your system can only have 14-character filenames, or can only have one dot
- in the name), you can specify what the local filename should be by providing
- get with an additional argument
-
- ftp> get newthisweek.Z uunet-new
-
- which will place the contents of the file `newthisweek.Z' in `uunet-new' on
- the local system.
-
- The transfer works the other way, too. The put command will transfer
- a file from the local system to the remote system. If the permissions are set
- up for an FTP session to write to a remote directory, a file can be sent with
-
- ftp> put filename
-
- As with get, put will take a third argument, letting you specify a different
- name for the file on the remote system.
-
-
-
- 3.2.4.1 ASCII vs Binary
-
-
- In the example above, the file `newthisweek.Z' was transferred, but sup-
- posedly not correctly. The reason is this in a normal ASCII transfer (the
- default), certain characters are translated between systems, to help make
- text files more readable. However, when binary files (those containing non-
- ASCII characters) are transferred, this translation should not take place.
- One example is a binary program_a few changed characters can render it
- completely useless.
-
- To avoid this problem, it's possible to be in one of two modes_ASCII or
- binary. In binary mode, the file isn't translated in any way. What's on the
- remote system is precisely what's received. The commands to go between
- the two modes are
-
- ftp> ascii
- 200 Type set to A. (Note the A, which signifies ASCII mode.)
-
-
- ftp> binary
- 200 Type set to I. (Set to Image format, for pure binary transfers.)
- 24 Zen and the Art of the Internet
-
-
-
-
-
- Note that each command need only be done once to take effect; if the user
- types binary, all transfers in that session are done in binary mode (that is,
- unless ascii is typed later).
-
- The transfer of `newthisweek.Z' will work if done as
-
- ftp> binary
- 200 Type set to I.
- ftp> get newthisweek.Z
- 200 PORT command successful.
- 150 Opening BINARY mode data connection for newthisweek.Z (42390 bytes).
- 226 Transfer complete.
- local newthisweek.Z remote newthisweek.Z
- 42390 bytes received in 7.2 seconds (5.8 Kbytes/s)
-
- Note The file size (42390) is different from that done in ASCII
- mode (42553) bytes; and the number 42390 matches the one in the
- listing of UUNET's top directory. We can be relatively sure that
- we've received the file without any problems.
-
-
-
- 3.2.4.2 mget and mput
-
-
- The commands mget and mput allow for multiple file transfers using wild-
- cards to get several files, or a whole set of files at once, rather than having
- to do it manually one by one. For example, to get all files that begin with
- the letter `f', one would type
-
- ftp> mget f*
-
- Similarly, to put all of the local files that end with .c
-
- ftp> mput *.c
-
- Rather than reiterate what's been written a hundred times before, con-
- sult a local manual for more information on wildcard matching (every DOS
- manual, for example, has a section on it).
-
- Normally, FTP assumes a user wants to be prompted for every file in a
- mget or mput operation. You'll often need to get a whole set of files and not
- have each of them confirmed_you know they're all right. In that case, use
- the prompt command to turn the queries off.
-
- ftp> prompt
- Interactive mode off.
-
- Likewise, to turn it back on, the prompt command should simply be issued
- again.
- Chapter 3 Anonymous FTP 25
-
-
-
-
-
- 3.3 The archie Server
-
-
- A group of people at McGill University in Canada got together and cre-
- ated a query system called archie. It was originally formed to be a quick and
- easy way to scan the offerings of the many anonymous FTP sites that are
- maintained around the world. As time progressed, archie grew to include
- other valuable services as well.
-
- The archie service is accessible through an interactive telnet session,
- email queries, and command-line and X-window clients. The email responses can
- be used along with FTPmail servers for those not on the Internet. (See
- [FTP-by-Mail Servers], page 77, for info on using FTPmail servers.)
-
-
-
- 3.3.1 Using archie Today
-
-
- Currently, archie tracks the contents of over 800 anonymous FTP archive
- sites containing over a million files stored across the Internet.
- Collectively , these files represent well over 50 gigabytes of information,
- with new entries being added daily.
-
- The archie server automatically updates the listing information from each
- site about once a month. This avoids constantly updating the databases,
- which could waste network resources, yet ensures that the information on
- each site's holdings is reasonably up to date.
-
- To access archie interactively, telnet to one of the existing servers.1
- They include
-
- archie.ans.net (New York, USA)
- archie.rutgers.edu (New Jersey, USA)
- archie.sura.net (Maryland, USA)
- archie.unl.edu (Nebraska, USA)
- archie.mcgill.ca (the first Archie server, in Canada)
- archie.funet.fi (Finland)
- archie.au (Australia)
- archie.doc.ic.ac.uk (Great Britain)
-
- At the login prompt of one of the servers, enter `archie' to log in. A
- greeting will be displayed, detailing information about ongoing work in the
- archie project; the user will be left at a `archie>' prompt, at which he may
- enter commands. Using `help' will yield instructions on using the `prog'
- command to make queries, `set' to control various aspects of the server's
- _________________________________
-
-
- 1 See Chapter 5 [Telnet], page 45, for notes on using the telnet program.
- 26 Zen and the Art of the Internet
-
-
-
-
-
- operation, et al. Type `quit' at the prompt to leave archie. Typing the
- query `prog vine.tar.Z' will yield a list of the systems that offer the source
- to the X-windows program vine; a piece of the information returned looks
- like
-
- Host ftp.uu.net (137.39.1.9)
- Last updated 1030 7 Jan 1992
-
-
- Location /packages/X/contrib
- FILE rw-r--r-- 15548 Oct 8 2029 vine.tar.Z
-
-
- Host nic.funet.fi (128.214.6.100)
- Last updated 0507 4 Jan 1992
-
-
- Location /pub/X11/contrib
- FILE rw-rw-r-- 15548 Nov 8 0325 vine.tar.Z
-
-
-
- 3.3.2 archie Clients
-
-
- There are two main-stream archie clients, one called (naturally enough)
- `archie', the other `xarchie' (for X-Windows). They query the archie
- databases and yield a list of systems that have the requested file(s) avail-
- able for anonymous FTP, without requiring an interactive session to the
- server. For example, to find the same information you tried with the server
- command `prog', you could type
-
- % archie vine.tar.Z
- Host athene.uni-paderborn.de
- Location /local/X11/more_contrib
- FILE -rw-r--r-- 18854 Nov 15 1990 vine.tar.Z
-
-
- Host emx.utexas.edu
- Location /pub/mnt/source/games
- FILE -rw-r--r-- 12019 May 7 1988 vine.tar.Z
-
-
- Host export.lcs.mit.edu
- Location /contrib
- FILE -rw-r--r-- 15548 Oct 9 0029 vine.tar.Z
-
- Note that your system administrator may not have installed the archie
- clients yet; the source is available on each of the archie servers, in the
- direc- tory `archie/clients'.
-
- Using the X-windows client is much more intuitive_if it's installed, just
- read its man page and give it a whirl. It's essential for the networked
- desktop .
- Chapter 3 Anonymous FTP 27
-
-
-
-
-
- 3.3.3 Mailing archie
-
-
- Users limited to email connectivity to the Internet should send a message
- to the address `archie@archie.mcgill.ca' with the single word help in the
- body of the message. An email message will be returned explaining how to
- use the email archie server, along with the details of using FTPmail. Most
- of the commands offered by the telnet interface can be used with the mail
- server.
-
-
-
- 3.3.4 The whatis database
-
-
- In addition to offering access to anonymous FTP listings, archie also
- permits access to the whatis description database. It includes the names
- and brief synopses for over 3,500 public domain software packages, datasets
- and informational documents located on the Internet.
-
- Additional whatis databases are scheduled to be added in the future.
- Planned offerings include listings for the names and locations of online
- library catalog programs, the names of publicly accessible electronic mailing
- lists, compilations of Frequently Asked Questions lists, and archive sites for
- the most popular Usenet newsgroups. Suggestions for additional descriptions or
- locations databases are welcomed and should be sent to the archie developers
- at `archie-l@cs.mcgill.ca'.
-
-
-
- "Was f"ur pl"undern!"
- ("What a place to plunder!")
- Gebhard Leberecht Bl"ucher
- 28 Zen and the Art of the Internet
-
-
- Chapter 4 Usenet News 29
-
-
-
-
-
- 4 Usenet News
-
-
-
- The first thing to understand about Usenet is that it is widely misunder-
- stood. Every day on Usenet the "blind men and the elephant" phenomenon
- appears, in spades. In the opinion of the author, more flame wars (rabid
- arguments) arise because of a lack of understanding of the nature of Usenet
- than from any other source. And consider that such flame wars arise, of
- necessity, among people who are on Usenet. Imagine, then, how poorly
- understood Usenet must be by those outside!
-
- No essay on the nature of Usenet can ignore the erroneous impressions
- held by many Usenet users. Therefore, this section will treat falsehoods first.
- Keep reading for truth. (Beauty, alas, is not relevant to Usenet.)
-
-
-
- 4.1 What Usenet Is
-
-
- Usenet is the set of machines that exchange articles tagged with one
- or more universally-recognized labels, called newsgroups (or "groups" for
- short). (Note that the term `newsgroup' is correct, while `area', `base',
- `board', `bboard', `conference', `round table', `SIG', etc. are incorrect. If
- you want to be understood, be accurate.)
-
-
-
- 4.2 The Diversity of Usenet
-
-
- If the above definition of Usenet sounds vague, that's because it is. It is
- almost impossible to generalize over all Usenet sites in any non-trivial way.
- Usenet encompasses government agencies, large universities, high schools,
- businesses of all sizes, home computers of all descriptions, etc.
-
- Every administrator controls his own site. No one has any real control
- over any site but his own. The administrator gets his power from the owner
- of the system he administers. As long as the owner is happy with the job the
- administrator is doing, he can do whatever he pleases, up to and including
- cutting off Usenet entirely. C'est la vie.
-
-
-
- 4.3 What Usenet Is Not
-
-
- Usenet is not an organization.
-
- Usenet has no central authority. In fact, it has no central any-
- thing. There is a vague notion of "upstream" and "downstream"
- 30 Zen and the Art of the Internet
-
-
-
-
-
- related to the direction of high-volume news flow. It follows
- that , to the extent that "upstream" sites decide what traffic
- they will carry for their "downstream" neighbors, that "upstream"
- sites have some influence on their neighbors. But such influence
- is usually easy to circumvent, and heavy-handed manipulation
- typically results in a backlash of resentment.
-
- Usenet is not a democracy.
-
- A democracy can be loosely defined as "government of the peo-
- ple, by the people, for the people." However, as explained above,
- Usenet is not an organization, and only an organization can be
- run as a democracy. Even a democracy must be organized, for
- if it lacks a means of enforcing the peoples' wishes, then it may
- as well not exist.
-
- Some people wish that Usenet were a democracy. Many people
- pretend that it is. Both groups are sadly deluded.
-
- Usenet is not fair.
-
- After all, who shall decide what's fair? For that matter, if some-
- one is behaving unfairly, who's going to stop him? Neither you
- nor I, that's certain.
-
- Usenet is not a right.
-
- Some people misunderstand their local right of "freedom of
- speech" to mean that they have a legal right to use others' com-
- puters to say what they wish in whatever way they wish, and
- the owners of said computers have no right to stop them.
-
- Those people are wrong. Freedom of speech also means freedom
- not to speak; if I choose not to use my computer to aid your
- speech, that is my right. Freedom of the press belongs to those
- who own one.
-
- Usenet is not a public utility.
-
- Some Usenet sites are publicly funded or subsidized. Most of
- them, by plain count, are not. There is no government monopoly
- on Usenet, and little or no control.
-
- Usenet is not a commercial network.
-
- Many Usenet sites are academic or government organizations; in
- fact, Usenet originated in academia. Therefore, there is a Usenet
- custom of keeping commercial traffic to a minimum. If such
- commercial traffic is generally considered worth carrying, then
- it may be grudgingly tolerated. Even so, it is usually separated
- somehow from non-commercial traffic; see comp.newprod.
- Chapter 4 Usenet News 31
-
-
-
-
-
- Usenet is not the Internet.
-
- The Internet is a wide-ranging network, parts of which are subsi-
- dized by various governments. The Internet carries many kinds
- of traffic; Usenet is only one of them. And the Internet is only
- one of the various networks carrying Usenet traffic.
-
- Usenet is not a Unix network, nor even an ASCII network.
-
- Don't assume that everyone is using "rn" on a Unix machine.
- There are Vaxen running VMS, IBM mainframes, Amigas, and
- MS-DOS PCs reading and posting to Usenet. And, yes, some
- of them use (shudder) EBCDIC. Ignore them if you like, but
- they're out there.
-
- Usenet is not software.
-
- There are dozens of software packages used at various sites to
- transport and read Usenet articles. So no one program or pack-
- age can be called "the Usenet software."
-
- Software designed to support Usenet traffic can be (and is) used
- for other kinds of communication, usually without risk of mixing
- the two. Such private communication networks are typically
- kept distinct from Usenet by the invention of newsgroup names
- different from the universally-recognized ones.
-
- Usenet is not a UUCP network.
-
- UUCP is a protocol (some might say protocol suite, but that's
- a technical point) for sending data over point-to-point connec-
- tions, typically using dialup modems. Usenet is only one of the
- various kinds of traffic carried via UUCP, and UUCP is only one
- of the various transports carrying Usenet traffic.
-
- Well, enough negativity.
-
-
-
- 4.4 Propagation of News
-
-
- In the old days, when UUCP over long-distance dialup lines was the
- dominant means of article transmission, a few well-connected sites had real
- influence in determining which newsgroups would be carried where. Those
- sites called themselves "the backbone."
-
- But things have changed. Nowadays, even the smallest Internet site has
- connectivity the likes of which the backbone admin of yesteryear could only
- dream. In addition, in the U.S., the advent of cheaper long-distance calls
- and high-speed modems has made long-distance Usenet feeds thinkable for
- smaller companies. There is only one pre-eminent UUCP transport site
- 32 Zen and the Art of the Internet
-
-
-
-
-
- today in the U.S., namely UUNET. But UUNET isn't a player in the propa-
- gation wars, because it never refuses any traffic_it gets paid by the minute,
- after all; to refuse based on content would jeopardize its legal status as an
- enhanced service provider.
-
- All of the above applies to the U.S. In Europe, different cost structures
- favored the creation of strictly controlled hierarchical organizations with
- central registries. This is all very unlike the traditional mode of U.S. sites
- (pick a name, get the software, get a feed, you're on). Europe's "benign mo-
- nopolies", long uncontested, now face competition from looser organizations
- patterned after the U.S. model.
-
-
-
- 4.5 Group Creation
-
-
- As discussed above, Usenet is not a democracy. Nevertheless, currently
- the most popular way to create a new newsgroup involves a "vote" to de-
- termine popular support for (and opposition to) a proposed newsgroup. See
- Appendix C [Newsgroup Creation], page 79, for detailed instructions and
- guidelines on the process involved in making a newsgroup.
-
- If you follow the guidelines, it is probable that your group will be
- created and will be widely propagated. However, due to the nature of Usenet,
- there is no way for any user to enforce the results of a newsgroup vote (or
- any other decision, for that matter). Therefore, for your new newsgroup to be
- propagated widely, you must not only follow the letter of the guidelines; you
- must also follow its spirit. And you must not allow even a whiff of shady
- dealings or dirty tricks to mar the vote.
-
- So, you may ask How is a new user supposed to know anything about the
- "spirit" of the guidelines? Obviously, she can't. This fact leads inexorably
- to the following recommendation
-
- If you're a new user, don't try to create a new newsgroup alone.
-
- If you have a good newsgroup idea, then read the news.groups newsgroup for
- a while (six months, at least) to find out how things work. If you're too im-
- patient to wait six months, then you really need to learn; read news.groups
- for a year instead. If you just can't wait, find a Usenet old hand to run the
- vote for you.
-
- Readers may think this advice unnecessarily strict. Ignore it at your
- peril. It is embarrassing to speak before learning. It is foolish to jump into
- a society you don't understand with your mouth open. And it is futile to try
- to force your will on people who can tune you out with the press of a key.
- Chapter 4 Usenet News 33
-
-
-
-
-
- 4.6 If You're Unhappy
-
-
- Property rights being what they are, there is no higher authority on
- Usenet than the people who own the machines on which Usenet traffic is
- carried. If the owner of the machine you use says, "We will not carry alt.sex
- on this machine," and you are not happy with that order, you have no Usenet
- recourse. What can we outsiders do, after all?
-
- That doesn't mean you are without options. Depending on the nature
- of your site, you may have some internal political recourse. Or you might
- find external pressure helpful. Or, with a minimal investment, you can get a
- feed of your own from somewhere else. Computers capable of taking Usenet
- feeds are down in the $500 range now, Unix-capable boxes are going for
- under $2000, and there are at least two Unix lookalikes in the $100 price
- range.
-
- No matter what, appealing to "Usenet" won't help. Even if those who
- read such an appeal regarding system administration are sympathetic to
- your cause, they will almost certainly have even less influence at your site
- than you do.
-
- By the same token, if you don't like what some user at another site is
- doing, only the administrator and/or owner of that site have any authority to
- do anything about it. Persuade them that the user in question is a problem
- for them, and they might do something (if they feel like it). If the user in
- question is the administrator or owner of the site from which he or she posts,
- forget it; you can't win. Arrange for your newsreading software to ignore
- articles from him or her if you can, and chalk one up to experience.
-
-
-
- 4.7 The History of Usenet (The ABCs)
-
-
- In the beginning, there were conversations, and they were good. Then
- came Usenet in 1979, shortly after the release of V7 Unix with UUCP; and
- it was better. Two Duke University grad students in North Carolina, Tom
- Truscott and Jim Ellis, thought of hooking computers together to exchange
- information with the Unix community. Steve Bellovin, a grad student at
- the University of North Carolina, put together the first version of the news
- software using shell scripts and installed it on the first two sites unc and
- duke. At the beginning of 1980 the network consisted of those two sites
- and phs (another machine at Duke), and was described at the January 1980
- Usenix conference in Boulder, CO.1 Steve Bellovin later rewrote the scripts
- into C programs, but they were never released beyond unc and duke. Shortly
- _________________________________
- 34 Zen and the Art of the Internet
-
-
-
-
-
- thereafter, Steve Daniel did another implementation in the C programming
- language for public distribution. Tom Truscott made further modifications,
- and this became the "A" news release.
-
- In 1981 at the University of California at Berkeley, grad student Mark
- Horton and high school student Matt Glickman rewrote the news software to
- add functionality and to cope with the ever increasing volume of news_"A"
- news was intended for only a few articles per group per day. This rewrite
- was the "B" news version. The first public release was version 2.1 in 1982;
- all versions before 2.1 were considered in beta test. As The Net grew, the
- news software was expanded and modified. The last version maintained and
- released primarily by Mark was 2.10.1.
-
- Rick Adams, then at the Center for Seismic Studies, took over coordi-
- nation of the maintenance and enhancement of the news software with the
- 2.10.2 release in 1984. By this time, the increasing volume of news was be-
- coming a concern, and the mechanism for moderated groups was added to
- the software at 2.10.2. Moderated groups were inspired by ARPA mailing
- lists and experience with other bulletin board systems. In late 1986, ver-
- sion 2.11 of news was released, including a number of changes to support a
- new naming structure for newsgroups, enhanced batching and compression,
- enhanced ihave/sendme control messages, and other features. The current
- release of news is 2.11, patchlevel 19.
-
- A new version of news, becoming known as "C" news, has been developed at
- the University of Toronto by Geoff Collyer and Henry Spencer. This version is
- a rewrite of the lowest levels of news to increase article processing speed,
- decrease article expiration processing and improve the reliability of the news
- system through better locking, etc. The package was released to The Net in
- the autumn of 1987. For more information, see the paper News Need Not Be
- Slow, published in the Winter 1987 Usenix Technical Conference proceedings.
-
- Usenet software has also been ported to a number of platforms, from the
- Amiga and IBM PCs all the way to minicomputers and mainframes.
-
-
-
- 4.8 Hierarchies
-
-
- Newsgroups are organized according to their specific areas of concentra-
- tion. Since the groups are in a tree structure, the various areas are called
- hierarchies. There are seven major categories
- _________________________________
- 1 The Usenix conferences are semi-annual meetings where members of the
-
- Usenix Association, a group of Unix enthusiasts, meet and trade notes.
- Chapter 4 Usenet News 35
-
-
-
-
-
- `comp' Topics of interest to both computer professionals and hobby-
- ists, including topics in computer science, software sources, and
- information on hardware and software systems.
-
- `misc' Group addressing themes not easily classified into any of the
- other headings or which incorporate themes from multiple cat-
- egories. Subjects include fitness, job-hunting, law, and invest-
- ments.
-
- `sci' Discussions marked by special knowledge relating to research in
- or application of the established sciences.
-
- `soc' Groups primarily addressing social issues and socializing. In-
- cluded are discussions related to many different world cultures.
-
- `talk' Groups largely debate-oriented and tending to feature long dis-
- cussions without resolution and without appreciable amounts of
- generally useful information.
-
- `news' Groups concerned with the news network, group maintenance,
- and software.
-
- `rec' Groups oriented towards hobbies and recreational activities
-
- These "world" newsgroups are (usually) circulated around the entire
- Usenet_this implies world-wide distribution. Not all groups actually en-
- joy such wide distribution, however. The European Usenet and Eunet sites
- take only a selected subset of the more "technical" groups, and controversial
- "noise" groups are often not carried by many sites in the U.S. and Canada
- (these groups are primarily under the `talk' and `soc' classifications). Many
- sites do not carry some or all of the comp.binaries groups because of the
- typically large size of the posts in them (being actual executable programs).
-
- Also available are a number of "alternative" hierarchies
-
- `alt' True anarchy; anything and everything can and does appear;
- subjects include sex, the Simpsons, and privacy.
-
- `gnu' Groups concentrating on interests and software with the GNU
- Project of the Free Software Foundation. For further info on
- what the FSF is, see Section 8.3.4 [FSF], page 68.
-
- `biz' Business-related groups.
-
-
-
- 4.9 Moderated vs Unmoderated
-
-
- Some newsgroups insist that the discussion remain focused and on-target;
- to serve this need, moderated groups came to be. All articles posted to a
- moderated group get mailed to the group's moderator. He or she periodically
- (hopefully sooner than later) reviews the posts, and then either posts them
- 36 Zen and the Art of the Internet
-
-
-
-
-
- individually to Usenet, or posts a composite digest of the articles for the
- past day or two. This is how many mailing list gateways work (for example,
- the Risks Digest).
-
-
-
- 4.10 news.groups & news.announce.newgroups
-
-
- Being a good net.citizen includes being involved in the continuing growth
- and evolution of the Usenet system. One part of this involvement
- includes following the discussion in the groups news.groups and the notes
- in news.announce.newgroups. It is there that discussion goes on about the
- creation of new groups and destruction of inactive ones. Every person on
- Usenet is allowed and encouraged to vote on the creation of a newsgroup.
-
-
-
- 4.11 How Usenet Works
-
-
- The transmission of Usenet news is entirely cooperative. Feeds are gener-
- ally provided out of good will and the desire to distribute news everywhere.
- There are places which provide feeds for a fee (e.g. UUNET), but for the
- large part no exchange of money is involved.
-
- There are two major transport methods, UUCP and NNTP. The first is
- mainly modem-based and involves the normal charges for telephone calls.
- The second, NNTP, is the primary method for distributing news over the
- Internet.
-
- With UUCP, news is stored in batches on a site until the neighbor calls
- to receive the articles, or the feed site happens to call. A list of groups
- which the neighbor wishes to receive is maintained on the feed site. The
- Cnews system compresses its batches, which can dramatically reduce the
- transmission time necessary for a relatively heavy newsfeed.
-
- NNTP, on the other hand, offers a little more latitude with how news
- is sent. The traditional store-and-forward method is, of course, available.
- Given the "real-time" nature of the Internet, though, other methods have
- been devised. Programs now keep constant connections with their news
- neighbors, sending news nearly instantaneously, and can handle dozens of
- simultaneous feeds, both incoming and outgoing.
-
- The transmission of a Usenet article is centered around the unique
- `Message-ID' header. When an NNTP site offers an article to a neigh-
- bor, it says it has that specific Message ID. If the neighbor finds it hasn't
- received the article yet, it tells the feed to send it through; this is repeated
- for each and every article that's waiting for the neighbor. Using unique IDs
- Chapter 4 Usenet News 37
-
-
-
-
-
- helps prevent a system from receiving five copies of an article from each of
- its five news neighbors, for example.
-
- Further information on how Usenet works with relation to the various
- transports is available in the documentation for the Cnews and NNTP pack-
- ages, as well as in RFC-1036, the Standard for Interchange of USENET
- Messages and RFC-977, Network News Transfer Protocol A Proposed Stan-
- dard for the Stream-Based Transmission of News. The RFCs do tend to be
- rather dry reading, particularly to the new user. See [RFCs], page 73 for
- information on retrieving RFCs.
-
-
-
- 4.12 Mail Gateways
-
-
- A natural progression is for Usenet news and electronic mailing lists to
- somehow become merged_which they have, in the form of news gateways.
- Many mailing lists are set up to "reflect" messages not only to the readership
- of the list, but also into a newsgroup. Likewise, posts to a newsgroup can
- be sent to the moderator of the mailing list, or to the entire mailing list.
- Some examples of this in action are comp.risks (the Risks Digest) and
- comp.dcom.telecom (the Telecom Digest).
-
- This method of propagating mailing list traffic has helped solve the prob-
- lem of a single message being delivered to a number of people at the same
- site_instead, anyone can just subscribe to the group. Also, mailing list
- maintenance is lowered substantially, since the moderators don't have to be
- constantly removing and adding users to and from the list. Instead, the
- people can read and not read the newsgroup at their leisure.
-
-
-
- 4.13 Usenet "Netiquette"
-
-
- There are many traditions with Usenet, not the least of which is dubbed
- netiquette_being polite and considerate of others. If you follow a few basic
- guidelines, you, and everyone that reads your posts, will be much happier in
- the long run.
-
-
-
- 4.13.1 Signatures
-
-
- At the end of most articles is a small blurb called a person's signature.
- In Unix this file is named `.signature' in the person's login directory_
- it will vary for other operating systems. It exists to provide information
- about how to get in touch with the person posting the article, including
- 38 Zen and the Art of the Internet
-
-
-
-
-
- their email address, phone number, address, or where they're located. Even
- so, signatures have become the graffiti of computers. People put song lyrics,
- pictures, philosophical quotes, even advertisements in their ".sigs". (Note,
- however, that advertising in your signature will more often than not get you
- flamed until you take it out.)
-
- Four lines will suffice_more is just extra garbage for Usenet sites to carry
- along with your article, which is supposed to be the intended focus of the
- reader. Netiquette dictates limiting oneself to this "quota" of four_some
- people make signatures that are ten lines or even more, including elaborate
- ASCII drawings of their hand-written signature or faces or even the space
- shuttle. This is not cute, and will bother people to no end.
-
- Similarly, it's not necessary to include your signature_if you forget to
- append it to an article, don't worry about it. The article's just as good as
- it ever would be, and contains everything you should want to say. Don't
- re-post the article just to include the signature.
-
-
-
- 4.13.2 Posting Personal Messages
-
-
- If mail to a person doesn't make it through, avoid posting the message to
- a newsgroup. Even if the likelihood of that person reading the group is very
- high, all of the other people reading the articles don't give a whit what you
- have to say to Jim Morrison. Simply wait for the person to post again and
- double-check the address, or get in touch with your system administrator
- and see if it's a problem with local email delivery. It may also turn out that
- their site is down or is having problems, in which case it's just necessary to
- wait until things return to normal before contacting Jim.
-
-
-
- 4.13.3 Posting Mail
-
-
- In the interests of privacy, it's considered extremely bad taste to post any
- email that someone may have sent, unless they explicitly give you permis-
- sion to redistribute it. While the legal issues can be heavily debated, most
- everyone agrees that email should be treated as anything one would receive
- via normal snailmail,2, with all of the assumed rights that are carried with
- it.
-
- _________________________________
-
-
- 2 The slang for the normal land and air postal service.
- Chapter 4 Usenet News 39
-
-
-
-
-
- 4.13.4 Test Messages
-
-
- Many people, particularly new users, want to try out posting before actu-
- ally taking part in discussions. Often the mechanics of getting messages out
- is the most difficult part of Usenet. To this end, many, many users find it
- necessary to post their tests to "normal" groups (for example, news.admin
- or comp.mail.misc). This is considered a major netiquette faux pas in the
- Usenet world. There are a number of groups available, called test groups,
- that exist solely for the purpose of trying out a news system, reader, or even
- new signature. They include
-
- alt.test
- gnu.gnusenet.test
- misc.test
-
- some of which will generate auto-magic replies to your posts to let you know
- they made it through. There are certain denizens of Usenet that frequent the
- test groups to help new users out. They respond to the posts, often including
- the article so the poster can see how it got to the person's site. Also, many
- regional hierarchies have test groups, like phl.test in Philadelphia.
-
- By all means, experiment and test_just do it in its proper place.
-
-
-
- 4.13.5 Famous People Appearing
-
-
- Every once in a while, someone says that a celebrity is accessible through
- "The Net"; or, even more entertaining, an article is forged to appear to
- be coming from that celebrity. One example is Stephen Spielberg_the
- rec.arts.movies readership was in an uproar for two weeks following a
- couple of posts supposedly made by Mr. Spielberg. (Some detective work
- revealed it to be a hoax.)
-
- There are a few well-known people that are acquainted with Usenet and
- computers in general_but the overwhelming majority are just normal peo-
- ple. One should act with skepticism whenever a notable personality is "seen"
- in a newsgroup.
-
-
-
- 4.13.6 Summaries
-
-
- Authors of articles occasionally say that readers should reply by mail and
- they'll summarize. Accordingly, readers should do just that_reply via mail.
- Responding with a followup article to such an article defeats the intention of
- the author. She, in a few days, will post one article containing the highlights
- of the responses she received. By following up to the whole group, the author
- may not read what you have to say.
- 40 Zen and the Art of the Internet
-
-
-
-
-
- When creating a summary of the replies to a post, try to make it as
- reader-friendly as possible. Avoid just putting all of the messages received
- into one big file. Rather, take some time and edit the messages into a form
- that contains the essential information that other readers would be interested
- in.
-
- Also, sometimes people will respond but request to remain anonymous
- (one example is the employees of a corporation that feel the information's not
- proprietary, but at the same time want to protect themselves from political
- backlash). Summaries should honor this request accordingly by listing the
- `From' address as `anonymous' or `(Address withheld by request)'.
-
-
-
- 4.13.7 Quoting
-
-
- When following up to an article, many newsreaders provide the facility
- to quote the original article with each line prefixed by `> ', as in
-
- In article <1232@foo.bar.com>, sharon@foo.bar.com wrote
- > I agree, I think that basketweaving's really catching on,
- > particularly in Pennsylvania. Here's a list of every person
- > in PA that currently engages in it publicly
-
-
- etc
-
- This is a severe example (potentially a horribly long article), but proves
- a point. When you quote another person, edit out whatever isn't directly
- applicable to your reply.3 This gives the reader of the new article a better
- idea of what points you were addressing. By including the entire article,
- you'll only annoy those reading it. Also, signatures in the original aren't
- necessary; the readers already know who wrote it (by the attribution).
-
- Avoid being tedious with responses_rather than pick apart an article,
- address it in parts or as a whole. Addressing practically each and every word
- in an article only proves that the person responding has absolutely nothing
- better to do with his time.
-
- If a "war" starts (insults and personal comments get thrown back and
- forth), take it into email_exchange email with the person you're arguing
- with. No one enjoys watching people bicker incessantly.
-
- _________________________________
-
-
- 3 But not changing their words, of course.
- Chapter 4 Usenet News 41
-
-
-
-
-
- 4.13.8 Crossposting
-
-
- The `Newsgroups' line isn't limited to just one group_an article can be
- posted in a list of groups. For instance, the line
-
- Newsgroups sci.space,comp.simulation
-
- posts the article to both the groups sci.space and comp.simulation. It's
- usually safe to crosspost to up to three or four groups. To list more than
- that is considered "excessive noise."
-
- It's also suggested that if an article is crossposted a `Followup-To'
- header be included. It should name the group to which all additional discus-
- sion should be directed to. For the above example a possible `Followup-To'
- would be
-
- Followup-To sci.space
-
- which would make all followups automatically be posted to just sci.space,
- rather than both sci.space and comp.simulation. If every response made
- with a newsreader's "followup" command should go to the person posting the
- article no matter what, there's also a mechanism worked in to accommodate.
- The Followup-To header should contain the single word `poster'
-
- Followup-To poster
-
- Certain newsreaders will use this to sense that a reply should never be posted
- back onto The Net. This is often used with questions that will yield a
- summary of information later, a vote, or an advertisement.
-
-
-
- 4.13.9 Recent News
-
-
- One should avoid posting "recent" events_sports scores, a plane crash,
- or whatever people will see on the evening news or read in the morning paper.
- By the time the article has propagated across all of Usenet, the "news" value
- of the article will have become stale. (This is one case for the argument that
- `Usenet news' is a misnomer.4)
-
-
-
- 4.13.10 Quality of Postings
-
-
- How you write and present yourself in your articles is important. If
- you have terrible spelling, keep a dictionary near by. If you have trouble
- _________________________________
-
-
- 4 Note that the Clarinet News service (see Section 7.3 [Clarinet], page 60)
-
- offers news items in a Usenet format as a precise alternative to the morn-
- ing paper, et. al.
- 42 Zen and the Art of the Internet
-
-
-
-
-
- with grammar and punctuation, try to get a book on English grammar and
- composition (found in many bookstores and at garage sales). By all means
- pay attention to what you say_it makes you who you are on The Net.
-
- Likewise, try to be clear in what you ask. Ambiguous or vague questions
- often lead to no response at all, leaving the poster discouraged. Give as
- much essential information as you feel is necessary to let people help you,
- but keep it within limits. For instance, you should probably include the
- operating system of your computer in the post if it's needed, but don't tell
- everybody what peripherals you have hanging off of it.
-
-
-
- 4.13.11 Useful Subjects
-
-
- The `Subject' line of an article is what will first attract people to read
- it_if it's vague or doesn't describe what's contained within, no one will read
- the article. At the same time, `Subject' lines that're too wordy tend to be
- irritating. For example
-
- Good Subject Building Emacs on a Sun Sparc under 4.1
-
- Good Subject Tryin' to find Waldo in NJ.
-
- Bad Subject I can't get emacs to work !!!
-
- Bad Subject I'm desperately in search of the honorable Mr. Waldo
- in the state of
-
- Simply put, try to think of what will best help the reader when he or she
- encounters your article in a newsreading session.
-
-
-
- 4.13.12 Tone of Voice
-
-
- Since common computers can't portray the inflection or tone in a person's
- voice, how articles are worded can directly affect the response to them. If
- you say
-
- Anybody using a Vic-20 should go buy themselves a life.
-
- you'll definitely get some responses_telling you to take a leap. Rather than
- be inflammatory, phrase your articles in a way that rationally expresses your
- opinion, like
-
- What're the practical uses of a Vic-20 these days?
-
- which presents yourself as a much more level-headed individual.
-
- Also, what case (upper or lower) you use can indicate how you're trying
- to speak_netiquette dictates that if you USE ALL CAPITAL LETTERS,
- people will think you're "shouting." Write as you would in a normal letter
- Chapter 4 Usenet News 43
-
-
-
-
-
- to a friend, following traditional rules of English (or whatever language you
- happen to speak).
-
-
-
- 4.13.13 Computer Religion
-
-
- No matter what kind of computer a person is using, theirs is always
- the best and most efficient of them all. Posting articles asking questions like
- `What computer should I buy? An Atari ST or an Amiga?' will lead only to
- fervent arguments over the merits and drawbacks of each brand. Don't even
- ask The Net_go to a local user group, or do some research of your own like
- reading some magazine reviews. Trying to say one computer is somehow
- better than another is a moot point.
-
-
-
- 4.14 Frequently Asked Questions
-
-
- A number of groups include Frequently Asked Question (FAQ) lists,
- which give the answers to questions or points that have been raised time
- and time again in a newsgroup. They're intended to help cut down
- on the redundant traffic in a group. For example, in the newsgroup
- alt.tv.simpsons, one recurring question is `Did you notice that there's
- a different blackboard opening at the beginning of every Simpsons
- episode?' As a result, it's part of the FAQ for that group.
-
- Usually, FAQ lists are posted at the beginning of each month, and are
- set to expire one month later (when, supposedly, the next FAQ will be
- published). Nearly every FAQ is also crossposted to news.answers, which
- is used as a Usenet repository for them.
-
-
-
- 4.14.1 The Pit-Manager Archive
-
-
- MIT, with Jonathan Kamens, has graciously dedicated a machine to the
- archiving and storage of the various periodic postings that are peppered
- throughout the various Usenet groups. To access them, FTP to the system
- pit-manager.mit.edu and look in the directory `/pub/usenet'.
-
-
-
- "Be it true or false, so it be news."
- Ben Jonson, News from the New World
- 44 Zen and the Art of the Internet
-
-
- Chapter 5 Telnet 45
-
-
-
-
-
- 5 Telnet
-
-
-
- Telnet is the main Internet protocol for creating a connection with a
- remote machine. It gives the user the opportunity to be on one computer
- system and do work on another, which may be across the street or thousands
- of miles away. Where modems are limited, in the majority, by the quality of
- telephone lines and a single connection, telnet provides a connection that's
- error-free and nearly always faster than the latest conventional modems.
-
-
-
- 5.1 Using Telnet
-
-
- As with FTP (see Section 3.2.2 [Anonymous FTP], page 21), the actual
- command for negotiating a telnet connection varies from system to system.
- The most common is telnet itself, though. It takes the form of
-
- telnet somewhere.domain
-
- To be safe, we'll use your local system as a working example. By now, you
- hopefully know your site's domain name. If not, ask or try to figure it out.
- You'll not get by without it.
-
- To open the connection, type
-
- telnet your.system.name
-
- If the system were wubba.cs.widener.edu, for example, the command
- would look like
-
- telnet wubba.cs.widener.edu
-
- The system will respond with something similar to
-
- Trying 147.31.254.999...
- Connected to wubba.cs.widener.edu.
- Escape character is '^]'.
-
- The escape character, in this example ^] (Control-]), is the character that
- will let you go back to the local system to close the connection, suspend it,
- etc. To close this connection, the user would type ^], and respond to the
- telnet> prompt with the command close. Local documentation should
- be checked for information on specific commands, functions, and escape
- character that can be used.
-
-
-
- 5.1.1 Telnet Ports
-
-
- Many telnet clients also include a third option, the port on which the
- connection should take place. Normally, port 23 is the default telnet port;
- 46 Zen and the Art of the Internet
-
-
-
-
-
- the user never has to think about it. But sometimes it's desirable to telnet
- to a different port on a system, where there may be a service available, or
- to aid in debugging a problem. Using
-
- telnet somewhere.domain port
-
- will connect the user to the given port on the system somewhere.domain.
- Many libraries use this port method to offer their facilities to the general
- Internet community; other services are also available. For instance, one
- would type
-
- telnet martini.eecs.umich.edu 3000
-
- to connect to the geographic server at the University of Michigan (see Sec-
- tion 5.5.6 [Geographic Server], page 50). Other such port connections follow
- the same usage.
-
-
-
- 5.2 Publicly Accessible Libraries
-
-
- Over the last several years, most university libraries have switched from
- a manual (card) catalog system to computerized library catalogs. The au-
- tomated systems provide users with easily accessible and up-to-date infor-
- mation about the books available in these libraries. This has been further
- improved upon with the advent of local area networks, dialup modems, and
- wide area networks. Now many of us can check on our local library's holdings
- or that of a library halfway around the world!
-
- Many, many institutions of higher learning have made their library cata-
- logs available for searching by anyone on the Internet. They include Boston
- University, the Colorado Alliance of Research Libraries (CARL), and London
- University King's College.
-
- To include a listing of some of the existing sites would not only be far
- too long for this document, it would soon be out of date. Instead, several
- lists are being maintained and are available either by mail or via FTP. Also,
- the Internet Resource Guide (IRG) also describes a few libraries that are
- accessible_see Section 9.1 [IRG], page 71 for further information.
-
- Art St. George and Ron Larsen are maintaining a list of
- Internet accessible libraries and databases often referred to as "the St.
- George directory." It began with only library catalogs but has
- expanded to include sections on campus-wide information systems, and
- even bulletin board systems that are not on the Internet. The
- library catalog sections are divided into those that are free, those that
- charge, and international (i.e. non-U.S. ) catalogs; they are arranged by
- state, province, or country within each section. There is also a
- section giving dialup information for some of the library catalogs.
- It's available for FTP (see
- Chapter 5 Telnet 47
-
-
-
-
-
- Section 3.2.2 [Anonymous FTP], page 21) on nic.cerf.net in the di-
- rectory `cerfnet/cerfnet_info/library_catalog'. The file `internet-
- catalogs' has a date suffix; check for the most current date. The informa-
- tion is updated periodically.
-
- Billy Barron, Systems Manager at the University of North Texas, pro-
- duces a directory as an aid to his user community. It complements the St.
- George guide by providing a standard format for all systems which lists the
- Internet address, login instructions, the system vendor, and logoff informa-
- tion. The arrangement is alphabetic by organization name. It's available
- for FTP on vaxb.acs.unt.edu in the subdirectory `library' as the file
- `libraries.txt'.
-
- For announcements of new libraries being available and discussion on
- related topics, consult the Usenet newsgroup comp.internet.library (see
- Chapter 4 [Usenet News], page 29 to learn how to read news).
-
-
-
- 5.3 The Cleveland Freenet
-
-
- Freenets are open-access, free, community computer systems. One such
- system is the Cleveland Freenet, sponsored by CWRU (Case Western Re-
- serve University). Anyone and everyone is welcome to join and take part
- in the exciting project_that of a National Telecomputing Public Network,
- where everyone benefits. There's no charge for the registration process and
- no charge to use the system.
-
- To register, telnet to any one of
-
- freenet-in-a.cwru.edu
- freenet-in-b.cwru.edu
- freenet-in-c.cwru.edu
-
- After you're connected, choose the entry on the menu that signifies you're
- a guest user. Another menu will follow; select `Apply for an account', and
- you'll be well on your way to being a FreeNet member.
-
- You will need to fill out a form and send it to them through the Postal
- Service_your login id and password will be created in a few days. At that
- point you're free to use the system as you wish. They provide multi-user
- chat, email, Usenet news, and a variety of other things to keep you occupied
- for hours on end.
-
-
-
- 5.4 Directories
-
-
- There are a few systems that are maintained to provide the Internet com-
- 48 Zen and the Art of the Internet
-
-
-
-
-
- munity with access to lists of information_users, organizations, etc. They
- range from fully dedicated computers with access to papers and research
- results, to a system to find out about the faculty members of a university.
-
-
-
- 5.4.1 Knowbot
-
-
- Knowbot is a "master directory" that contains email address information
- from the NIC WHOIS database (see Section 6.4.1 [Whois], page 57), the
- PSI White Pages Pilot Project, the NYSERNET X.500 database and MCI
- Mail. Most of these services are email registries themselves, but Knowbot
- provides a very comfortable way to access all of them in one place. Telnet
- to nri.reston.va.us on port 185.
-
-
-
- 5.4.2 White Pages
-
-
- PSI maintains a directory of information on individuals. It will list the
- person's name, organization, and email address if it is given. Telnet to
- wp.psi.net and log in as `fred'. The White Pages Project also includes an
- interface to use Xwindows remotely.
-
-
-
- 5.5 Databases
-
-
- For information on database services, see Section 7.2 [Commercial
- Databases], page 60. Not all databases on the Internet require payment
- for use, though. There do exist some, largely research-driven databases,
- which are publicly accessible. New ones spring up regularly.
-
- To find out more about the databases in this section, contact the people
- directly responsible for them. Their areas of concentration and the software
- used to implement them are widely disparate, and are probably beyond the
- author's expertise. Also, don't forget to check with your local library_the
- reference librarian there can provide information on conventional resources,
- and possibly even those available over the Internet (they are becoming more
- common).
-
-
-
- 5.5.1 Colorado Alliance of Research Libraries (CARL)
-
-
- The Colorado Alliance of Research Libraries (CARL), in association with
- CARL Systems Inc., operates a public access catalog of services. Offered are
- a number of library databases, including searches for government periodi-
- cals, book reviews, indices for current articles, and access to to other library
- Chapter 5 Telnet 49
-
-
-
-
-
- databases around the country. Other services are available to CARL mem-
- bers including an online encyclopedia. Telnet to pac.carl.org, or write to
- `help@carl.org' for more details.
-
-
-
- 5.5.2 PENpages
-
-
- PENpages is an agriculturally-oriented database administered by Penn-
- sylvania State University. Information entered into PENpages is provided by
- numerous sources including the Pennsylvania Dept. of Agriculture, Rutgers
- University, and Penn State. Easy-to-use menus guide users to information
- ranging from cattle and agricultural prices to current weather information,
- from health information to agricultural news from around the nation. A
- keyword search option also allows users to search the database for related
- information and articles. The database is updated daily, and a listing of
- most recent additions is displayed after login. Telnet to psupen.psu.edu
- and log in as the user `PNOTPA'.
-
-
-
- 5.5.3 Clemson Univ. Forestry & Agricultural Network
-
-
- Clemson maintains a database similar to PENpages in content, but the
- information provided tends to be localized to the Southeastern United States.
- A menu-driven database offers queries involving the weather, food, family,
- and human resources. Telnet to eureka.clemson.edu and log in as `PUBLIC'.
- You need to be on a good VT100 emulator (or a real VT terminal).
-
-
-
- 5.5.4 University of Maryland Info Database
-
-
- The Computer Science department of the University of Maryland main-
- tains a repository of information on a wide variety of topics. They wish to
- give a working example of how network technology can (and should) provide
- as much information as possible to those who use it. Telnet to info.umd.edu
- and log in as `info'. The information contained in the database is accessible
- through a screen-oriented interface, and everything therein is available via
- anonymous FTP.
-
- There is a mailing list used to discuss the UMD Info Database, welcom-
- ing suggestions for new information, comments on the interface the system
- provides, and other related topics. Send mail to listserv@umdd.umd.edu
- with a body of
-
- subscribe INFO-L Your Full Name
-
- See Section 2.2.1 [Listservs], page 16 for more information on using the
- Listserv system.
- 50 Zen and the Art of the Internet
-
-
-
-
-
- 5.5.5 University of Michigan Weather Underground
-
-
- The University of Michigan's Department of Atmospheric, Oceanic, &
- Space Sciences maintains a database of weather and related information for
- the United States and Canada. Available are current weather conditions and
- forecasts for cities in the U.S., a national weather summary, ski conditions,
- earthquake and hurricane updates, and a listing of severe weather conditions.
- Telnet to madlab.sprl.umich.edu on port 3000 to use the system.
-
-
-
- 5.5.6 Geographic Name Server
-
-
- A geographic database listing information for cities in the United States
- and some international locations is maintained by Merit, Inc. The database
- is searchable by city name, zip code, etc. It will respond with a lot of
- information the area code, elevation, time zone, and longitude and latitude
- are included. For example, a query of `19013' yields
-
- 0 Chester
- 1 42045 Delaware
- 2 PA Pennsylvania
- 3 US United States
- F 45 Populated place
- L 39 50 58 N 75 21 22 W
- P 45794
- E 22
- Z 19013
- Z 19014
- Z 19015
- Z 19016
- .
-
- To use the server, telnet to martini.eecs.umich.edu on port 3000. The
- command `help' will yield further instructions, along with an explanation
- for each of the fields in a reponse.
-
-
-
- 5.5.7 FEDIX_Minority Scholarship Information
-
-
- FEDIX is an on-line information service that links the higher education
- community and the federal government to facilitate research, education, and
- services. The system provides accurate and timely federal agency informa-
- tion to colleges, universities, and other research organizations. There are no
- registration fees and no access charges for FEDIX whatsoever.
- Chapter 5 Telnet 51
-
-
-
-
-
- FEDIX offers the Minority On-Line Information Service (MOLIS), a
- database listing current information about Black and Hispanic colleges and
- universities.
-
- Daily information updates are made on federal education and research
- programs, scholarships, fellowships, and grants, available used research
- equipment, and general information about FEDIX itself. To access the
- database, telnet to fedix.fie.com and log in as `fedix'.
-
-
-
- 5.5.8 Science & Technology Information System
-
-
- The STIS is maintained by the National Science Foundation (NSF), and
- provides access to many NSF publications. The full text of publications can
- be searched online and copied from the system, which can accommodate up
- to ten users at one time. Telnet to stis.nsf.gov and log in as `public'.
- Everything on the system is also available via anonymous FTP. For further
- information, contact
-
- STIS, Office of Information Systems, Room 401
- National Science Foundation
- 1800 G. Street, N.W.
- Washington, D.C. 20550
- stis-request@nsf.gov
- (202) 357-7492
- (202) 357-7663 (Fax)
-
-
-
- 5.5.9 Ocean Network Information Center
-
-
- The University of Delaware College of Marine Studies offers access to an
- interactive database of research information covering all aspects of marine
- studies, nicknamed OCEANIC. This includes the World Oceanic Circulation
- Experiment (WOCE) information and program information, research ship
- schedules and information, and a Who's Who of email and mailing addresses
- for oceanic studies. Data from a variety of academic institutions based on
- research studies is also available. Telnet to delocn.udel.edu and log in as
- `INFO'.
-
-
-
- 5.5.10 NASA/IPAC Extragalactic Database (NED)
-
-
- The NASA/IPAC Extragalactic Database (NED) is an ongoing project,
- funded by NASA, to make data and literature on extragalactic objects avail-
- able over computer networks. NED is an object-oriented database which
- 52 Zen and the Art of the Internet
-
-
-
-
-
- contains extensive information for nearly 132,000 extragalactic objects taken
- from about major catalogs of galaxies, quasars, infrared and radio sources.
- NED provides positions, names, and other basic data (e.g. magnitude
- types, sizes and redshifts as well as bibliographic references and abstracts).
- Searches can be done by name, around a name, and on an astronomical po-
- sition. NED contains a tutorial which guides the user through the retrieval
- process. Telnet to ipac.caltech.edu and log in as `ned'.
-
-
-
- 5.5.11 U.S. Naval Observatory Automated Data Service
-
-
- Operated by the U.S. Naval Observatory in Washington, D.C., this au-
- tomated data service provides database access to information ranging from
- current navigational satellite positioning, astronomical data, and software
- utilities. A wide variety of databases can be searched and instructions for
- file transfer are given. Telnet to tycho.usno.navy.mil and log in as `ads'.
-
-
-
- "My consciousness suddenly switched locations, for the first time in
- my life, from the vicinity of my head and body to a point about
- twenty feet away from where I normally see the world."
- Howard Rheingold, Virtual Reality
- Chapter 6 Various Tools 53
-
-
-
-
-
- 6 Various Tools
-
-
-
- New and interesting ways to use the Internet are being dreamed up every
- day. As they gain wide-spread use, some methods become near-standard (or
- actual written standard) tools for Internet users to take advantage of. A few
- are detailed here; there are undoubtedly others, and new ideas spring up
- all the time. An active user of the Internet will discover most of the more
- common ones in time. Usually, these services are free. See Chapter 7 [Com-
- mercial Services], page 59 for applications that are commercially available
- over the Internet.
-
- Usenet is often used to announce a new service or capability on the Inter-
- net. In particular, the groups comp.archives and comp.protocols.tcp-ip
- are good places to look. Information will drift into other areas as word
- spreads. See Chapter 4 [Usenet News], page 29 for information on reading
- news.
-
-
-
- 6.1 Finger
-
-
- On many systems there exists the `finger' command, which yield infor-
- mation about each user that's currently logged in. This command also has
- extensions for use over the Internet, as well. Under normal circumstances,
- the command is simply `finger' for a summary of who's logged into the lo-
- cal system, or `finger username' for specific information about a user. It's
- also possible to go one step further and go onto the network. The general
- usage is
-
- finger @hostname
-
- To see who's currently logged in at Widener University, for instance, use
-
-
- % finger @cs.widener.edu
- [cs.widener.edu]
- Login Name TTY Idle When Where
- brendan Brendan Kehoe p0 Fri 0214 tattoo.cs.widene
- sven Sven Heinicke p1 Fri 0416 xyplex3.cs.widen
-
- To find out about a certain user, they can be fingered specifically (and need
- not be logged in)
- 54 Zen and the Art of the Internet
-
-
- % finger bart@cs.widener.edu
- [cs.widener.edu]
- Login name bart In real life Bart Simpson
- Directory /home/springfield/bart Shell /bin/underachiever
- Affiliation Brother of Lisa Home System channel29.fox.org
- Last login Thu May 23 1214 (EDT) on ttyp6 from channel29.fox.org.
- No unread mail
- Project To become a "fluff" cartoon character.
- Plan
- Don't have a cow, man.
-
- Please realize that some sites are very security conscious, and need to restrict
- the information about their systems and users available to the outside world.
- To that end, they often block finger requests from outside sites_so don't
- be surprised if fingering a computer or a user returns with `Connection
- refused'.
-
-
-
- 6.2 Ping
-
-
- The `ping' command allows the user to check if another system is cur-
- rently "up" and running. The general form of the command is `ping sys-
- tem'.1 For example,
-
- ping cs.widener.edu
-
- will tell you if the main machine in Widener University's Computer Science
- lab is currently online (we certainly hope so!).
-
- Many implementations of `ping' also include an option to let you see how
- fast a link is running (to give you some idea of the load on the network).
- For example
-
- % ping -s cs.swarthmore.edu
- PING cs.swarthmore.edu 56 data bytes
- 64 bytes from 130.58.68.1 icmp_seq=0 ttl=251 time=66 ms
- 64 bytes from 130.58.68.1 icmp_seq=1 ttl=251 time=45 ms
- 64 bytes from 130.58.68.1 icmp_seq=2 ttl=251 time=46 ms
- ^C
- --- cs.swarthmore.edu ping statistics ---
- 3 packets transmitted, 3 packets received, 0% packet loss
- round-trip min/avg/max = 45/52/66 ms
-
- This case tells us that for `cs.swarthmore.edu' it takes about 46 millisec-
- onds for a packet to go from Widener to Swarthmore College and back again.
-
- _________________________________
-
-
- 1 The usage will, again, vary.
- Chapter 6 Various Tools 55
-
-
-
-
-
- It also gives the average and worst-case speeds, and any packet loss that may
- have occurred (e.g. because of network congestion).
-
- While `ping' generally doesn't hurt network performance, you shouldn't
- use it too often_usually once or twice will leave you relatively sure of the
- other system's state.
-
-
-
- 6.3 Talk
-
-
- Sometimes email is clumsy and difficult to manage when one really needs
- to have an interactive conversation. The Internet provides for that as well, in
- the form of talk. Two users can literally see each other type across thousands
- of miles.
-
- To talk with Bart Simpson at Widener, one would type
-
- talk bart@cs.widener.edu
-
- which would cause a message similar to the following to be displayed on
- Bart's terminal
-
- Message from Talk_Daemon@cs.widener.edu at 2145 ...
- talk connection requested by joe@ee.someplace.edu
- talk respond with talk joe@ee.someplace.edu
-
- Bart would, presumably, respond by typing `talk joe@ee.someplace.edu'.
- They could then chat about whatever they wished, with instantaneous re-
- sponse time, rather than the write-and-wait style of email. To leave talk,
- on many systems one would type Ctrl-C (hold down the Control key and
- press `C'). Check local documentation to be sure.
-
- There are two different versions of talk in common use today. The first,
- dubbed "old talk," is supported by a set of Unix systems (most notably,
- those currently sold by Sun). The second, ntalk (aka "new talk"), is more
- of the standard. If, when attempting to talk with another user, it responds
- with an error about protocol families, odds are the incompatibilities between
- versions of talk is the culprit. It's up to the system administrators of sites
- which use the old talk to install ntalk for their users.
-
-
-
- 6.4 The WHOIS Database
-
-
- The main WHOIS database is run at the Network Information Center
- (NIC). The `whois' command will let you search a database of every regis-
- tered domain (e.g. `mit.edu') and of registered users. It's primarily used by
- system postmasters or listowners to find the Points of Contact for a site, to
- 56 Zen and the Art of the Internet
-
-
-
-
-
- let them know of a problem or contact them for one reason or another. You
- can also find out their postal address. For example
-
-
-
- % whois mit.edu
- Massachusetts Institute of Technology (MIT) MIT.EDU 18.72.2.1
- Massachusetts Institute of Technology (MIT-DOM) MIT.EDU
-
-
-
- Note that there are two entries for `mit.edu'; we'll go for the second.
-
-
-
- % whois mit-dom
- Massachusetts Institute of Technology (MIT-DOM) ) Mailing address
- Cambridge, MA 02139
-
-
- Domain Name MIT.EDU ) Domain name
-
-
- Administrative Contact, Technical Contact, Zone Contact
- Schiller, Jeffrey I. (JIS) JIS@MIT.EDU
- (617) 253-8400
-
-
- Record last updated on 22-Jun-88. ) Last change made to the record
-
-
- Domain servers in listed order ) Systems that can tell you the
- Internet addresses for a site
- STRAWB.MIT.EDU 18.71.0.151
- W20NS.MIT.EDU 18.70.0.160
- BITSY.MIT.EDU 18.72.0.3
- LITHIUM.LCS.MIT.EDU 18.26.0.121
-
-
- To see this host record with registered users, repeat the command with
- a star ('*') before the name; or, use '%' to show JUST the registered
- users.
-
-
-
- Much better! Now this information (sought, possibly, by a system admin-
- istrator) can be used to find out how to notify MIT of a security issue or
- problem with connectivity.
-
-
-
- Queries can be made for individuals as well; the following would yield an
- entry for the author
- Chapter 6 Various Tools 57
-
-
- % whois brendan
- Kehoe, Brendan (BK59) brendan@cs.widener.edu
- Widener University
- Department of Computer Science
- Kirkbride 219
- P.O. Box 83 Widener University
- Chester, PA 19013
- (215)/499-4011
-
-
- Record last updated on 02-May-91.
-
- Included is the author's name, his handle (a unique sequence of letters and
- numbers), information on how to contact him, and the last time the record
- was modified in any way.
-
- Anyone can register with the whois database. People who are adminis-
- trative or technical contacts for domains are registered automatically when
- their domain applications are processed. For normal users, one must sim-
- ply fill out a form from the NIC. FTP to nic.ddn.mil and get the file
- `netinfo/user-template.txt'. The completed form should be mailed to
- `registrar@nic.ddn.mil'.
-
-
-
- 6.4.1 Other Uses of WHOIS
-
-
- Also, many educational sites run WHOIS servers of their own, to offer
- information about people who may be currently on the staff or attending the
- institution. To specify a WHOIS server, many implementations include some
- sort of option or qualifier_in VMS under MultiNet, it's `/HOST', in Unix `-
- h'. To receive information about using the Stanford server, one might use
- the command
-
- whois -h stanford.edu help
-
- A large list of systems offering WHOIS services is being maintained by
- Matt Power of MIT (mhpower@stan.mit.edu). It is available via anonymous
- FTP from sipb.mit.edu, in the directory `pub/whois'. The file is named
- `whois-servers.list'.
-
- The systems available include, but are certainly not limited to, Syra-
- cuse University (syr.edu), New York University (acfcluster.nyu.edu),
- the University of California at San Diego (ucsd.edu), and Stanford Univer-
- sity (stanford.edu).
-
-
-
- "Fingers were made before forks."
- Jonathan Swift, Polite Conversation
- 58 Zen and the Art of the Internet
-
-
- Chapter 7 Commercial Services 59
-
-
-
-
-
- 7 Commercial Services
-
-
-
- Many services can be accessed through the Internet. As time progresses
- and more outlets for commercial activity appear, once-restricted traffic (by
- the NSFnet Acceptable Use Policy) may now flow freely. Now that there
- are other networks for that information to travel on, businesses are making
- their move.
-
-
-
- 7.1 Electronic Journals
-
-
- The Association of Research Libraries (ARL) publishes a hard-copy di-
- rectory of electronic journals, newsletters, and scholarly discussion lists. It
- is a compilation of entries for hundreds of scholarly lists, dozens of journals
- and newsletters, and a many "other" titles, including newsletter-digests, into
- one reference source. Each entry includes instructions on how to access the
- referenced publication or list.
-
- The documents are available electronically by sending the commands
-
- get ejournl1 directry
- get ejournl2 directry
-
- to the server at `LISTSERV@OTTAWA.BITNET'. See Section 2.2.1 [Listservs],
- page 16 for further instructions on using a listserv.
-
- The directory, along with a compilation by Diane Kovacs called Directo-
- ries of Academic E-Mail Conferences, is available in print and on diskette
- (DOS WordPerfect and MacWord) from
-
- Office of Scientific & Academic Publishing
- Association of Research Libraries
- 1527 New Hampshire Avenue, NW
- Washington, DC 20036
- ARLHQ@UMDC.BITNET
- (202) 232-2466
- (202) 462-7849 (Fax)
-
- The ARL is a not-for-profit organization representing over one hundred re-
- search libraries in the United States and Canada. The publication is available
- to ARL members for $10 and to non-members for $20 (add $5 postage per
- directory for foreign addresses). Orders of six or more copies will receive a
- 10% discount; all orders must be prepaid and sent to the ARL.
- 60 Zen and the Art of the Internet
-
-
-
-
-
- 7.2 Commercial Databases
-
-
- The American Institute of Physics maintains the Physics Information
- Network. It contains the bibliographic SPIN and General Physics Advanced
- Abstracts databases. Also available is access to bulletin boards and several
- searchable lists (job notices, announcements, etc). Telnet to pinet.aip.org;
- new users must log in as `NEW' and give registration information.
-
-
-
- 7.3 Clarinet News
-
-
- Clarinet's an electronic publishing network service that provides profes-
- sional news and information, including live UPI wireservice news, in the
- Usenet file format. See Chapter 4 [Usenet News], page 29 for more informa-
- tion about Usenet.
-
- Clarinet lets you read an "electronic newspaper" right on the local system;
- you can get timely industry news, technology related wirestories, syndicated
- columns and features, financial information, stock quotes and more.
-
- Clarinet's provided by using the Usenet message interchange format, and
- is available via UUCP and other delivery protocols, including NNTP.
-
- The main feature is ClariNews, an "electronic newspaper," gathered live
- from the wire services of United Press International (UPI). ClariNews arti-
- cles are distributed in 100 newsgroups based on their subject matter, and
- are keyworded for additional topics and the geographical location of the
- story. ClariNews includes headlines, industry news, box scores, network TV
- schedules, and more. The main products of ClariNews are
-
- o ClariNews General, the general news"paper" with news, sports, and
- features, averaging about 400 stories per day.
-
- o TechWire, special groups for stories on science, technology, and industry
- stories around them.
-
- o ClariNews-Biz, business and financial stories.
-
- o Newsbytes, a daily computer industry newsmagazine.
-
- o Syndicated Columns, including Dave Barry (humor) and Mike Royko
- (opinion).
-
- Full information on ClariNet, including subscription information, is available
- from
-
- Clarinet Communications Corp.
- 124 King St. North
- Waterloo, Ontario N2J 2X8
- info@clarinet.com
- Chapter 7 Commercial Services 61
-
-
-
-
-
- (800) USE-NETS
-
- or with anonymous FTP in the directory `/Clarinet' on ftp.uu.net (see
- Section 3.2.2 [Anonymous FTP], page 21).
-
-
-
- "Needless to say, Aristotle did not envisage modern finance."
- Frederick Copleston, S.J.
- A History of Philosophy, v.1
- 62 Zen and the Art of the Internet
-
-
- Chapter 8 Things You'll Hear About 63
-
-
-
-
-
- 8 Things You'll Hear About
-
-
- There are certain things that you'll hear about shortly after you start
- actively using the Internet. Most people assume that everyone's familiar
- with them, and they require no additional explanation. If only that were
- true!
-
- This section addresses a few topics that are commonly encountered and
- asked about as a new user explores Cyberspace. Some of them are directly
- related to how the networks are run today; other points are simply interesting
- to read about.
-
-
-
- 8.1 The Internet Worm
-
-
- On November 2, 1988, Robert Morris, Jr., a graduate student in Com-
- puter Science at Cornell, wrote an experimental, self-replicating, self
- -
- propagating program called a worm and injected it into the Internet. He
- chose to release it from MIT, to disguise the fact that the worm came from
- Cornell. Morris soon discovered that the program was replicating and rein-
- fecting machines at a much faster rate than he had anticipated_there was
- a bug. Ultimately, many machines at locations around the country either
- crashed or became "catatonic." When Morris realized what was happening,
- he contacted a friend at Harvard to discuss a solution. Eventually, they sent
- an anonymous message from Harvard over the network, instructing program-
- mers how to kill the worm and prevent reinfection. However, because the
- network route was clogged, this message did not get through until it was too
- late. Computers were affected at many sites, including universities, military
- sites, and medical research facilities. The estimated cost of dealing with the
- worm at each installation ranged from $200 to more than $53,000.1
-
- The program took advantage of a hole in the debug mode of the Unix
- sendmail program, which runs on a system and waits for other systems to
- connect to it and give it email, and a hole in the finger daemon fingerd, which
- serves finger requests (see Section 6.1 [Finger], page 53). People at the
- University of California at Berkeley and MIT had copies of the program and
- were actively disassembling it (returning the program back into its source
- form) to try to figure out how it worked.
-
- Teams of programmers worked non-stop to come up with at least a tem-
- porary fix, to prevent the continued spread of the worm. After about twelve
- _________________________________
-
-
- 1 Derived in part from a letter by Severo M. Ornstein, in the Communica-
-
- tions of the ACM, Vol 32 No 6, June 1989.
- 64 Zen and the Art of the Internet
-
-
-
-
-
- hours, the team at Berkeley came up with steps that would help retard
- the spread of the virus. Another method was also discovered at Purdue and
- widely published. The information didn't get out as quickly as it could have,
- however, since so many sites had completely disconnected themselves from
- the network.
-
- After a few days, things slowly began to return to normalcy and everyone
- wanted to know who had done it all. Morris was later named in The New
- York Times as the author (though this hadn't yet been officially proven,
- there was a substantial body of evidence pointing to Morris).
-
- Robert T. Morris was convicted of violating the computer Fraud and
- Abuse Act (Title 18), and sentenced to three years of probation, 400 hours
- of community service, a fine of $10,050, and the costs of his supervision. His
- appeal, filed in December, 1990, was rejected the following March.
-
-
-
- 8.2 The Cuckoo's Egg
-
-
- First in an article entitled "Stalking the Wily Hacker," and later in the
- book The Cuckoo's Egg, Clifford Stoll detailed his experiences trying to track
- down someone breaking into a system at Lawrence Berkeley Laboratory in
- California.2
-
- A 75-cent discrepancy in the Lab's accounting records led Stoll on a chase
- through California, Virginia, and Europe to end up in a small apartment in
- Hannover, West Germany. Stoll dealt with many levels of bureaucracy and
- red tape, and worked with the FBI, the CIA, and the German Bundespost
- trying to track his hacker down.
-
- The experiences of Stoll, and particularly his message in speaking engage-
- ments, have all pointed out the dire need for communication between parties
- on a network of networks. The only way everyone can peacefully co-exist in
- Cyberspace is by ensuring rapid recognition of any existing problems.
-
-
-
- 8.3 Organizations
-
-
- The indomitable need for humans to congregate and share their common
- interests is also present in the computing world. User groups exist around
- the world, where people share ideas and experiences. Similarly, there are
- organizations which are one step "above" user groups; that is to say, they
- _________________________________
-
-
- 2 See the bibliography for full citations.
- Chapter 8 Things You'll Hear About 65
-
-
-
-
-
- exist to encourage or promote an idea or set of ideas, rather than support a
- specific computer or application of computers.
-
-
-
- 8.3.1 The Association for Computing Machinery
-
-
- The Association for Computing Machinery (the ACM) was founded in
- 1947, immediately after Eckert and Mauchly unveiled one of the first elec-
- tronic computers, the ENIAC, in 1946. Since then, the ACM has grown by
- leaps and bounds, becoming one of the leading educational and scientific
- societies in the computer industry.
-
- The ACM's stated purposes are
-
- o To advance the sciences and arts of information processing;
-
- o To promote the free interchange of information about the sciences and
- arts of information processing both among specialists and among the
- public;
-
- o To develop and maintain the integrity and competence of individuals
- engaged in the practices of the sciences and arts of information process-
- ing.
-
- Membership in the ACM has grown from seventy-eight in September,
- 1947, to over 77,000 today. There are local chapters around the world, and
- many colleges and universities endorse student chapters. Lecturers frequent
- these meetings, which tend to be one step above the normal "user group"
- gathering. A large variety of published material is also available at dis-
- counted prices for members of the association.
-
- The ACM has a number of Special Interest Groups (SIGs) that concen-
- trate on a certain area of computing, ranging from graphics to the Ada
- programming language to security. Each of the SIGs also publishes its own
- newsletter. There is a Usenet group, comp.org.acm, for the discussion of
- ACM topics. See Chapter 4 [Usenet News], page 29 for more information on
- reading news.
-
- For more information and a membership application, write to
-
- Assocation for Computing Machinery
- 1515 Broadway
- New York City, NY 10036
- ACMHELP@ACMVM.BITNET
- (212) 869-7440
-
-
-
- 8.3.2 Computer Professionals for Social Responsibility
-
-
- The CPSR is an alliance of computer professionals concentrating on cer-
- 66 Zen and the Art of the Internet
-
-
-
-
-
- tain areas of the impact of computer technology on society. It traces its
- history to the fall of 1981, when several researchers in Palo Alto, California,
- organized a lunch meeting to discuss their shared concerns about the con-
- nection between computing and the nuclear arms race. Out of that meeting
- and the discussions which followed, CPSR was born, and has been active
- ever since.3
-
- The national CPSR program focuses on the following project areas
-
- o Reliability and Risk This area reflects on the concern that overreliance
- on computing technology can lead to unacceptable risks to society. It
- includes, but isn't limited to, work in analyzing military systems such
- as SDI.
-
- o Civil Liberties and Privacy This project is concerned with such top-
- ics as the FBI National Crime Information Center, the growing use of
- databases by both government and private industry, the right of access
- to public information, extension of First Amendment rights to elec-
- tronic communication, and establishing legal protections for privacy of
- computerized information.
-
- o Computers in the Workplace The CPSR Workplace Project has con-
- centrated its attention on the design of software for the workplace, and
- particularly on the philosophy of "participatory design," in which soft-
- ware designers work together with users to ensure that systems meet
- the actual needs of that workplace.
-
- o The 21st Century Project This is a coalition with other professional
- organizations working towards redirecting national research priorities
- from concentrating on military issues to anticipating and dealing with
- future problems as science and technology enter the next century.
-
- For more information on the CPSR, contact them at
-
- Computer Professionals for Social Responsibility
- P.O. Box 717
- Palo Alto, CA 94302
- cpsr@csli.stanford.edu
- (415) 322-3778
- (415) 322-3798 (Fax)
-
-
-
- 8.3.3 The Electronic Frontier Foundation
-
-
- The Electronic Frontier Foundation (EFF) was established to help civilize
- _________________________________
-
-
- 3 This section is part of the CPSR's letter to prospective members.
- Chapter 8 Things You'll Hear About 67
-
-
-
-
-
- the "electronic frontier"_the Cyberspacial medium becoming ever-present
- in today's society; to make it truly useful and beneficial not just to a techni
- *
- *cal
- elite, but to everyone; and to do this in a way which is in keeping with the
- society's highest traditions of the free and open flow of information and
- communication.4
-
- The mission of the EFF is
-
- o to engage in and support educational activities which increase popular
- understanding of the opportunities and challenges posed by develop-
- ments in computing and telecommunications;
-
- o to develop among policy-makers a better understanding of the issues
- underlying free and open telecommunications, and support the creation
- of legal and structural approaches which will ease the assimilation of
- these new technologies by society;
-
- o to raise public awareness about civil liberties issues arising from the
- rapid advancement in the area of new computer-based communications
- media and, where necessary, support litigation in the public interest to
- preserve, protect, and extend First Amendment rights within the realm
- of computing and telecommunications technology;
-
- o to encourage and support the development of new tools which will en-
- dow non-technical users with full and easy access to computer-based
- telecommunications;
-
- The Usenet newsgroups comp.org.eff.talk and comp.org.eff.news
- are dedicated to discussion concerning the EFF. They also have mailing
- list counterparts for those that don't have access to Usenet, eff-talk-
- request@eff.org and eff-news-request@eff.org. The first is an informal
- arena (aka a normal newsgroup) where anyone may voice his or her opinions.
- The second, comp.org.eff.news, is a moderated area for regular postings
- from the EFF in the form of EFFector Online. To submit a posting for
- the EFFector Online, or to get general information about the EFF, write to
- eff@eff.org. There is also a wealth of information available via anonymous
- FTP on ftp.eff.org.
-
- The EFF can be contacted at
-
-
-
- _________________________________
-
-
- 4 This section was derived from `eff.about', available along with other
-
- material via anonymous FTP from ftp.eff.org
- 68 Zen and the Art of the Internet
-
-
- The Electronic Frontier Foundation, Inc.
- 155 Second St. #1
- Cambridge, MA 02141
- eff@eff.org
- (617) 864-0665
- (617) 864-0866 (Fax)
-
-
-
- 8.3.4 The Free Software Foundation
-
-
- The Free Software Foundation was started by Richard Stallman (creator
- of the popular GNU Emacs editor). It is dedicated to eliminating restrictions
- on copying, redistributing, and modifying software.
-
- The word "free" in their name does not refer to price; it refers to freedom
- .
- First, the freedom to copy a program and redistribute it to your neighbors,
- so that they can use it as well as you. Second, the freedom to change a
- program, so that you can control it instead of it controlling you; for this, the
- source code must be made available to you.
-
- The Foundation works to provide these freedoms by developing free
- compatible replacements for proprietary software. Specifically, they are
- putting together a complete, integrated software system called "GNU" that
- is upward-compatible with Unix.5 When it is released, everyone will be
- permitted to copy it and distribute it to others. In addition, it will be
- distributed with source code, so you will be able to learn about operating
- systems by reading it, to port it to your own machine, and to exchange the
- changes with others.
-
- For more information on the Free Software Foundation and the status of
- the GNU Project, or for a list of the current tasks that still need to be done,
- write to gnu@prep.ai.mit.edu.
-
-
-
- 8.3.5 The League for Programming Freedom
-
-
- The League for Programming Freedom is a grass-roots organization of
- professors, students, businessmen, programmers and users dedicated to
- "bringing back" the freedom to write programs, which they contend has
- been lost over the past number years. The League is not opposed to the le-
- gal system that Congress intended-copyright on individual programs. Their
- _________________________________
-
-
- 5 As an aside, the editor of the GNU project, emacs, contains a built-in
-
- LISP interpreter and a large part of its functionality is written in LISP.
- The name GNU is itself recursive (the mainstay of the LISP language);
- it stands for "Gnu's Not Unix."
- Chapter 8 Things You'll Hear About 69
-
-
-
-
-
- aim is to reverse the recent changes made by judges in response to spe-
- cial interests, often explicitly rejecting the public interest principles of the
- Constitution.
-
- The League works to abolish the new monopolies by publishing articles,
- talking with public officials, boycotting egregious offenders, and in the future
- may intervene in court cases. On May 24, 1989, the League picketed Lotus
- headquarters because of their lawsuits, and then again on August 2, 1990.
- These marches stimulated widespread media coverage for the issue. They
- welcome suggestions for other activities, as well as help in carrying them
- out.
-
- For information on the League and how to join, write to
-
- League for Programming Freedom
- 1 Kendall Square #143
- P.O. Box 9171
- Cambridge, MA 02139
- league@prep.ai.mit.edu
-
-
-
- 8.4 Networking Initiatives
-
-
- Research and development are two buzz words often heard when dis-
- cussing the networking field_everything needs to go faster, over longer dis-
- tances, for a lower cost. To "keep current," one should read the various trade
- magazines and newspapers, or frequent the networking-oriented newsgroups
- of Usenet. If possible, attend trade shows and symposia like Usenix, Interop,
- et. al.
-
-
-
- 8.4.1 NREN
-
-
- The National Research and Education Network (NREN) is a five-year
- project approved by Congress in the Fall of 1991. It's intended to create
- a national electronic "super-highway." The NREN will be 50 times faster
- than the fastest available networks (at the time of this writing). Propo-
- nents of the NREN claim it will be possible to transfer the equivalent of
- the entire text of the Encyclopedia Britannica in one second. Further infor-
- mation, including the original text of the bill presented by Senator Al Gore
- (D-TN), is available through anonymous FTP to nis.nsf.net, in the di-
- rectory `nsfnet'. In addition, Vint Cerf wrote on the then-proposed NREN
- in RFC-1167, Thoughts on the National Research and Education Network.
- See [RFCs], page 73 for information on obtaining RFCs.
- 70 Zen and the Art of the Internet
-
-
-
-
-
- A mailing list, `nren-discuss@uu.psi.com', is available for discussion of
- the NREN; write to `nren-discuss-request@uu.psi.com' to be added.
-
-
-
- "To talk in publick, to think in solitude,
- to read and to hear, to inquire,
- and to answer inquiries, is the business of a scholar."
- Samuel Johnson
- Chapter VIII
- The History of Rasselas, Prince of Abissinia
- Chapter 9 Finding Out More 71
-
-
-
-
-
- 9 Finding Out More
-
-
-
- 9.1 Internet Resource Guide
-
-
- The NSF Network Service Center (NNSC) compiles and makes available
- an Internet Resource Guide (IRG). The goal of the guide is to increase the
- visibility of various Internet resources that may help users do their work
- better. While not yet an exhaustive list, the guide is a useful compendium
- of many resources and can be a helpful reference for a new user.
-
- Resources listed are grouped by types into sections. Current sections
- include descriptions of online library catalogs, data archives, online white
- pages directory services, networks, network information centers, and com-
- putational resources, such as supercomputers. Each entry describes the re-
- source, identifies who can use the resource, explains how to reach the local
- network via the Internet, and lists contacts for more information. The list
- is distributed electronically by the NNSC. To receive a guide, or to get on
- a mailing list that alerts you to when it is updated, send a message to
- resource-guide-request@nnsc.nsf.net.
-
- The current edition of the IRG is available via anonymous FTP from
- nnsc.nsf.net, in the directory `/resource-guide'.
-
-
-
- 9.2 Requests for Comments
-
-
- The internal workings of the Internet are defined by a set of documents
- called RFCs (Request for Comments). The general process for creating
- an RFC is for someone wanting something formalized to write a document
- describing the issue and mailing it to Jon Postel (postel@isi.edu). He
- acts as a referee for the proposal. It is then commented upon by all those
- wishing to take part in the discussion (electronically, of course). It may go
- through multiple revisions. Should it be generally accepted as a good idea,
- it will be assigned a number and filed with the RFCs.
-
- The RFCs can be divided into five groups required, suggested, direc-
- tional, informational and obsolete. Required RFCs (e.g., RFC-791, The
- Internet Protocol) must be implemented on any host connected to the In-
- ternet.
-
- Suggested RFCs are generally implemented by network hosts. Lack of
- them does not preclude access to the Internet, but may impact its usability.
- RFC-793, Transmission Control Protocol, is a must for those implementing
- TCP.
- 72 Zen and the Art of the Internet
-
-
-
-
-
- Directional RFCs were discussed and agreed to, but their application has
- never come into wide use. This may be due to the lack of wide need for
- the specific application (RFC-937, The Post Office Protocol) or that, al-
- though technically superior, ran against other pervasive approaches (RFC-
- 891, Hello). It is suggested that, should the facility be required by a par-
- ticular site, an implementation be done in accordance with the RFC. This
- ensures that, should the idea be one whose time has come, the implementa-
- tion will be in accordance with some standard and will be generally usable.
-
- Informational RFCs contain factual information about the Internet and
- its operation (RFC-990, Assigned Numbers).
-
- There is also a subset of RFCs called FYIs (For Your Information). They
- are written in a language much more informal than that used in the other,
- standard RFCs. Topics range from answers to common questions for new
- and experienced users to a suggested bibliography.
-
- Finally, as the Internet has grown and technology has changed, some
- RFCs become unnecessary. These obsolete RFCs cannot be ignored, how-
- ever. Frequently when a change is made to some RFC that causes a new
- one to obsolete others, the new RFC only contains explanations and motiva-
- tions for the change. Understanding the model on which the whole facility
- is based may involve reading the original and subsequent RFCs on the topic.
-
- RFCs and FYIs are available via FTP from many sources, including
-
- o The nic.ddn.mil archive, as `/rfc/rfc-xxxx.txt', where xxxx is the
- number of the RFC.
-
- o from ftp.uu.net, in the directory `/RFC'.
-
- They're also available through mail by writing to service@nic.ddn.mil,
- with a `Subject' line of send RFC-xxxx.TXT, again with xxxx being the
- RFC number. To learn about archive servers, [Archive Servers], page 77.)
-
-
-
- "Knowledge is of two kinds. We know a subject ourselves, or we
- know where we can find information upon it."
- Samuel Johnson
- Letter to Lord Chesterfield
- February, 1755
- Conclusion 73
-
-
-
-
-
- Conclusion
-
-
- This guide is far from complete_the Internet changes on a daily (if not
- hourly) basis. However, this booklet should provide enough information
- to make the incredible breadth and complexity of the Internet a mite less
- imposing. Coupled with some exploration and experimentation, every user
- has the potential to be a competent net citizen, using the facilities that are
- available to their fullest.
-
- You, the reader, are strongly encouraged to suggest improvements to any
- part of this booklet. If something was unclear, left you with doubts, or
- wasn't addressed, it should be fixed. If you find any problems, inaccuracies,
- spelling errors, etc., please report them to
-
-
-
- Brendan Kehoe
- Department of Computer Science
- Widener University
- Chester, PA 19013
-
-
- Internet guide-bugs@cs.widener.edu
- UUCP ...!widener!guide-bugs
-
-
-
- If you are interested in future updates to this guide (aside from normal new
- editions), discussion about information to be included or removed, etc., write
- to `guide-request@cs.widener.edu' to be placed on a mailing list for such
- things.
-
-
-
- "I've seed de first an de last I seed de beginnin,
- en now I sees de endin."
- William Faulkner
- The Sound & The Fury
- April 8, 1928
- 74 Zen and the Art of the Internet
-
-
- Appendix A Getting to Other Networks 75
-
-
-
-
-
- Appendix A Getting to Other Networks
-
-
- Inter-connectivity has been and always will be one of the biggest goals
- in computer networking. The ultimate desire is to make it so one person
- can contact anyone else no matter where they are. A number of "gateways"
- between networks have been set up. They include
-
- AppleLink Quantum Services sells access to AppleLink, which is similar to
- QuantumLink for Commodore computers and PCLink for IBM
- PCs and compatibles. It also provides email access through the
- address `user@applelink.apple.com'.
- ATTMail AT&T sells a commercial email service called ATTMail. Its
- users can be reached by writing to `user@attmail.com'.
- BIX Users on BIX (the Byte Information eXchange) can be reached
- through the DAS gateway at `user@dcibix.das.net'.
- CompuServe (CI$)
-
- To reach a user on the commercial service CompuServe, you
- must address the mail as xxxxx.xxx@compuserve.com, with
- xxxxx.xxx being their CompuServe user ID. Normally Com-
- puServe ids are represented as being separated by a comma (like
- 71999,141); since most mailers don't react well to having com-
- mas in addresses, it was changed to a period. For the above
- address, mail would be sent to `71999.141@compuserve.com'.
- EasyNet Digital sells a service called EasyNet; users that subscribe to it
- can be reached with the addresses user@host.enet.dec.com or
- `user%host.enet@decwrl.dec.com'.
- FidoNet The FidoNet computer network can be reached by using a
- special addressing method. If John Smith is on the node
- `12/3.4' on FidoNet, his or her email address would be
- `john.smith@p4.f3.n2.z1.fidonet.org' (notice how the num-
- bers fall in place?).
- MCI Mail MCI also sells email accounts (similar to ATTMail). Users can
- be reached with `user@mcimail.com'.
- PeaceNet Users on the PeaceNet network can be reached by writing to
- `user@igc.org'.
-
- This table is far from complete. In addition to sites not being listed,
- some services are not (nor do they plan to be) accessible from the "outside"
- (like Prodigy); others, like GEnie, are actively investigating the possibility
- of creating a gateway into their system. For the latest information, consult
- a list called the Inter-Network Mail Guide. It's available from a number of
- FTP sites, including UUNET; see Section 3.2.2 [Anonymous FTP], page 21,
- for more information on getting a copy of it using anonymous FTP.
- 76 Zen and the Art of the Internet
-
-
- Appendix B Retrieving Files via Email 77
-
-
-
-
-
- Appendix B Retrieving Files via Email
-
-
-
- For those who have a connection to the Internet, but cannot FTP, there do
- exist a few alternatives to get those files you so desperately need. When re-
- questing files, it's imperative that you keep in mind the size of your request_
- odds are the other people who may be using your link won't be too receptive
- to sudden bursts of really heavy traffic on their normally sedate connection.
-
-
-
- Archive Servers
-
-
- An alternative to the currently well over-used FTPmail system is taking
- advantage of the many archive servers that are presently being maintained.
- These are programs that receive email messages that contain commands, and
- act on them. For example, sending an archive server the command `help'
- will usually yield, in the form of a piece of email, information on how to use
- the various commands that the server has available.
-
- One such archive server is `service@nic.ddn.mil'. Maintained by the
- Network Information Center (NIC) in Chantilly, VA, the server is set up
- to make all of the information at the NIC available for people who don't
- have access to FTP. This also includes the WHOIS service (see Section 6.4.1
- [Whois], page 57). Some sample `Subject' lines for queries to the NIC
- server are
-
- Subject help Describes available commands.
- Subject rfc 822 Sends a copy of RFC-822.
- Subject rfc index Sends an index of the available
- RFCs.
- Subject netinfo domain-template.txt Sends a domain application.
- Subject whois widener Sends WHOIS information on
- `widener'.
-
- More information on using their archive server can be obtained by writing
- to their server address service@nic.ddn.mil with a `Subject' of help.
-
- There are different "brands" of archive server, each with its own set of
- commands and services. Among them there often exists a common set of
- commands and services (e.g. `index', `help', etc). Be that as it may, one
- should always consult the individual help for a specific server before assuming
- the syntax_100K surprises can be hard on a system.
-
-
-
- FTP-by-Mail Servers
-
-
- Some systems offer people the ability to receive files through a mock-
- FTP interface via email. See Section 3.2.2 [Anonymous FTP], page 21 for
- 78 Zen and the Art of the Internet
-
-
-
-
-
- a general overview of how to FTP. The effects of providing such a service
- varies, although a rule of thumb is that it will probably use a substantial
- amount of the available resources on a system.
-
- The "original" FTP-by-Mail service, BITFTP, is available to BITNET
- users from the Princeton node PUCC. It was once accessible to anyone, but
- had to be closed out to non-BITNET users because of the heavy load on the
- system.
-
- In response to this closure, Paul Vixie designed and installed a system
- called FTPmail on one of Digital's gateway computers, decwrl.dec.com.
- Write to `ftpmail@decwrl.dec.com' with `help' in the body of the letter
- for instructions on its use. The software is undergoing constant development;
- once it reaches a stable state, other sites will be encouraged to adopt it and
- provide the service also.
- Appendix C Newsgroup Creation 79
-
-
-
-
-
- Appendix C Newsgroup Creation
-
-
-
- Everyone has the opportunity to make a Call For Votes on the Usenet
- and attempt to create a newsgroup that he/she feels would be of benefit
- to the general readership. The rules governing newsgroup creation have
- evolved over the years into a generally accepted method. They only govern
- the "world" groups; they aren't applicable to regional or other alternative
- hierarchies.
-
-
-
- Discussion
-
-
- A discussion must first take place to address issues like the naming of
- the group, where in the group tree it should go (e.g. rec.sports.koosh
- vs rec.games.koosh?), and whether or not it should be created in the
- first place. The formal Request For Discussion (RFD) should be posted
- to news.announce.newgroups, along with any other groups or mailing lists
- at all related to the proposed topic. news.announce.newgroups is moder-
- ated. You should place it first in the `Newsgroups' header, so that it will
- get mailed to the moderator only. The article won't be immediately posted
- to the other newsgroups listed; rather, it will give you the opportunity to
- have the moderator correct any inconsistencies or mistakes in your RFD. He
- or she will take care of posting it to the newsgroups you indicated. Also the
- `Followup-To' header will be set so that the actual discussion takes place
- only in news.groups. If a user has difficulty posting to a moderated group,
- he or she may mail submissions intended for news.announce.newgroups to
- the address `announce-newgroups@rpi.edu'.
-
- The final name and charter of the group, and whether it will be moderated
- or unmoderated, will be determined during the discussion period. If it's to
- be moderated, the discussion will also decide who the moderator will be. If
- there's no general agreement on these points among those in favor of a new
- group at the end of 30 days, the discussion will be taken into mail rather
- than continued posting to news.groups; that way, the proponents of the
- group can iron out their differences and come back with a proper proposal,
- and make a new Request For Discussion.
-
-
-
- Voting
-
-
- After the discussion period (which is mandatory), if it's been determined
- that a new group really is desired, a name and charter are agreed upon, and
- it's been determined whether the group will be moderated (and by whom), a
- 80 Zen and the Art of the Internet
-
-
-
-
-
- Call For Votes (CFV) should be posted to news.announce.newgroups, along
- with any other groups that the original Request For Discussion was posted
- to. The CFV should be posted (or mailed to the news.announce.newgroups
- moderator) as soon as possible after the discussion ends (to keep it fresh in
- everyone's mind).
-
- The Call for Votes should include clear instructions on how to cast a
- vote. It's important that it be clearly explained how to both vote for and
- against a group (and be of equivalent difficulty or ease). If it's easier for
- you or your administrator, two separate addresses can be used to mail yes and
- no votes to, providing that they're on the same machine. Regardless of the
- method, everyone must have a very specific idea of how to get his/her vote
- counted.
-
- The voting period can last between 21 and 31 days, no matter what the
- preliminary results of the vote are. A vote can't be called off simply because
- 400 "no" votes have come in and only two "yes" votes. The Call for Votes
- should include the exact date that the voting period will end_only those
- votes arriving on the vote-taker's machine before this date can be counted.
-
- To keep awareness high, the CFV can be repeated during the vote, pro-
- vided that it gives the same clear, unbiased instructions for casting a vote
- as the original; it also has to be the same proposal as was first posted. The
- charter can't change in mid-vote. Also, votes that're posted don't count_only
- those that were mailed to the vote-taker can be tallied.
-
- Partial results should never be included; only a statement of the specific
- proposal, that a vote is in progress on it, and how to cast a vote. A mass
- acknowledgement ("Mass ACK" or "Vote ACK") is permitted; however, it
- must be presented in a way that gives no indication of which way a person
- voted. One way to avoid this is to create one large list of everyone who's
- voted, and sort it in alphabetical order. It should not be two sorted lists (of
- the yes and no votes, respectively).
-
- Every vote is autonomous. The votes for or against one group can't be
- transferred to another, similar proposal. A vote can only count for the exact
- proposal that it was a response to. In particular, a vote for or against a
- newsgroup under one name can't be counted as a vote for or against another
- group with a different name or charter, a different moderated/unmoderated
- status, or, if it's moderated, a different moderator or set of moderators.
- Whew!
-
- Finally, the vote has to be explicit; they should be of the form `I
- vote for the group foo.bar as proposed' or `I vote against the group
- foo.bar as proposed'. The wording doesn't have to be exact, your inten-
- tion just has to be clear.
- Appendix C Newsgroup Creation 81
-
-
-
-
-
- The Result of a Vote
-
-
- At the end of the voting period, the vote-taker has to post (to
- news.announce.newgroups) the tally and email addresses of the votes
- received. Again, it can also be posted to any of the groups listed in the
- original CFV. The tally should make clear which way a person voted, so the
- results can be verified if it proves necessary to do so.
-
- After the vote result is posted to news.announce.newgroups, there is a
- mandatory five-day waiting period. This affords everyone the opportunity to
- correct any errors or inconsistencies in the voter list or the voting procedure
- .
-
-
-
- Creation of the Group
-
-
- If, after the waiting period, there are no serious objections that might
- invalidate the vote, the vote is put to the "water test." If
- there were 100 more valid `YES/create' votes than `NO/don't' create votes, and
- at least two-thirds of the total number of votes are in favor of creation,
- then a newgroup control message can be sent out (often by the moderator of
- news.announce.newgroups). If the 100-vote margin or the two-thirds per-
- centage isn't met, the group has failed and can't be created.
-
- If the proposal failed, all is not lost_after a six-month waiting
- period (a "cooling down"), a new Request For Discussion can be posted to
- news.groups, and the whole process can start over again. If after a couple
- of tries it becomes obvious that the group is not wanted or needed, the vote-
- taker should humbly step back and accept the opinion of the majority. (As
- life goes, so goes Usenet.)
- 82 Zen and the Art of the Internet
-
-
- Glossary 83
-
-
-
-
-
- Glossary
-
-
-
- This glossary is only a tiny subset of all of the various terms and other
- things that people regularly use on The Net. For a more complete (and very
- entertaining) reference, it's suggested you get a copy of The New Hacker's
- Dictionary, which is based on a VERY large text file called the Jargon File.
- Edited by Eric Raymond (eric@snark.thyrsus.com), it is available from
- the MIT Press, Cambridge, Massachusetts, 02142; its ISBN number is 0-
- 262-68069-6. Also see RFC-1208, A Glossary of Networking Terms.
-
-
-
- -) This odd symbol is one of the ways a person can portray "mood"
- in the very flat medium of computers_by using "smilies." This is `meta-
- communication', and there are literally hundreds of them, from the obvious
- to the obscure. This particular example expresses "happiness." Don't see
- it? Tilt your head to the left 90 degrees. Smilies are also used to denote
- sarcasm.
-
- address resolution Conversion of an Internet address to the correspond-
- ing physical address. On an ethernet, resolution requires broadcasting on
- the local area network.
-
- administrivia Administrative tasks, most often related to the mainte-
- nance of mailing lists, digests, news gateways, etc.
-
- anonymous FTP Also known as "anon FTP"; a service provided to make
- files available to the general Internet community_see Section 3.2.2 [Anony-
- mous FTP], page 21.
-
- ANSI The American National Standards Institute disseminates basic
- standards like ASCII, and acts as the United States' delegate to the ISO.
- Standards can be ordered from ANSI by writing to the ANSI Sales De-
- partment, 1430 Broadway, New York, NY 10018, or by telephoning (212)
- 354-3300.
-
- archie A service which provides lookups for packages in a database of
- the offerings of countless of anonymous FTP sites. See Section 3.3.1 [archie],
- page 25 for a full description.
-
- archive server An email-based file transfer facility offered by some sys-
- tems.
-
- ARPA (Advanced Research Projects Agency) Former name of DARPA,
- the government agency that funded ARPAnet and later the DARPA Inter-
- net.
- 84 Zen and the Art of the Internet
-
-
-
-
-
- ARPAnet A pioneering long haul network funded by ARPA. It served
- as the basis for early networking research as well as a central backbone dur-
- ing the development of the Internet. The ARPAnet consisted of individual
- packet switching computers interconnected by leased lines. The ARPAnet
- no longer exists as a singular entity.
-
- asynchronous Transmission by individual bytes, not related to specific
- timing on the transmitting end.
-
- auto-magic Something which happens pseudo-automatically, and is usually
- too complex to go into any further than to say it happens "auto-
- magically."
-
- backbone A high-speed connection within a network that connects
- shorter, usually slower circuits. Also used in reference to a system that acts
- as a "hub" for activity (although those are becoming much less prevalent
- now than they were ten years ago).
-
- bandwidth The capacity of a medium to transmit a signal. More infor-
- mally, the mythical "size" of The Net, and its ability to carry the files and
- messages of those that use it. Some view certain kinds of traffic (FTPing
- hundreds of graphics images, for example) as a "waste of bandwidth" and
- look down upon them.
-
- BITNET (Because It's Time Network) An NJE-based international ed-
- ucational network.
-
- bounce The return of a piece of mail because of an error in its delivery.
-
- btw An abbreviation for "by the way."
-
- CFV (Call For Votes) Initiates the voting period for a Usenet newsgroup.
- At least one (occasionally two or more) email address is customarily included
- as a repository for the votes. See See Appendix C [Newsgroup Creation],
- page 79 for a full description of the Usenet voting process.
-
- ClariNews The fee-based Usenet newsfeed available from ClariNet Com-
- munications.
-
- client The user of a network service; also used to describe a computer
- that relies upon another for some or all of its resources.
-
- Cyberspace A term coined by William Gibson in his fantasy novel Neu-
- romancer to describe the "world" of computers, and the society that gathers
- around them.
-
- datagram The basic unit of information passed across the Internet. It
- contains a source and destination address along with data. Large messages
- are broken down into a sequence of IP datagrams.
-
- disassembling Converting a binary program into human-readable ma-
- chine language code.
- Glossary 85
-
-
-
-
-
- DNS (Domain Name System) The method used to convert Internet
- names to their corresponding Internet numbers.
-
- domain A part of the naming hierarchy. Syntactically, a domain name
- consists of a sequence of names or other words separated by dots.
-
- dotted quad A set of four numbers connected with periods that make up
- an Internet address; for example, 147.31.254.130.
-
- email The vernacular abbreviation for electronic mail.
-
- email address The UUCP or domain-based address that a user is referred
- to with. For example, the author's address is brendan@cs.widener.edu.
-
- ethernet A 10-million bit per second networking scheme originally devel-
- oped by Xerox Corporation. Ethernet is widely used for LANs because it can
- network a wide variety of computers, it is not proprietary, and components
- are widely available from many commercial sources.
-
- FDDI (Fiber Distributed Data Interface) An emerging standard for net-
- work technology based on fiber optics that has been established by ANSI.
- FDDI specifies a 100-million bit per second data rate. The access control
- mechanism uses token ring technology.
-
- flame A piece of mail or a Usenet posting which is violently argumenta-
- tive.
-
- FQDN (Fully Qualified Domain Name) The FQDN is the full site name
- of a system, rather than just its hostname. For example, the system lisa
- at Widener University has a FQDN of lisa.cs.widener.edu.
-
- FTP (File Transfer Protocol) The Internet standard high-level protocol
- for transferring files from one computer to another.
-
- FYI An abbreviation for the phrase "for your information." There is also
- a series of RFCs put out by the Network Information Center called FYIs;
- they address common questions of new users and many other useful things.
- See [RFCs], page 73 for instructions on retrieving FYIs.
-
- gateway A special-purpose dedicated computer that attaches to two or
- more networks and routes packets from one network to the other. In par-
- ticular, an Internet gateway routes IP datagrams among the networks it
- connects. Gateways route packets to other gateways until they can be de-
- livered to the final destination directly across one physical network.
-
- header The portion of a packet, preceding the actual data, containing
- source and destination addresses and error-checking fields. Also part of a
- message or news article.
-
- hostname The name given to a machine. (See also FQDN.)
-
- IMHO (In My Humble Opinion) This usually accompanies a statement
- 86 Zen and the Art of the Internet
-
-
-
-
-
- that may bring about personal offense or strong disagreement.
-
- Internet A concatenation of many individual TCP/IP campus, state,
- regional, and national networks (such as NSFnet, ARPAnet, and Milnet)
- into one single logical network all sharing a common addressing scheme.
-
- Internet number The dotted-quad address used to specify a certain sys-
- tem. The Internet number for the site cs.widener.edu is 147.31.254.130.
- A resolver is used to translate between hostnames and Internet addresses.
-
- interoperate The ability of multi-vendor computers to work together
- using a common set of protocols. With interoperability, PCs, Macs, Suns,
- Dec VAXen, CDC Cybers, etc, all work together allowing one host computer
- to communicate with and take advantage of the resources of another.
-
- ISO (International Organization for Standardization) Coordinator of the
- main networking standards that are put into use today.
-
- kernel The level of an operating system or networking system that con-
- tains the system-level commands or all of the functions hidden from the user.
- In a Unix system, the kernel is a program that contains the device drivers,
- the memory management routines, the scheduler, and system calls. This
- program is always running while the system is operating.
-
- LAN (Local Area Network) Any physical network technology that op-
- erates at high speed over short distances (up to a few thousand meters).
-
- mail gateway A machine that connects to two or more electronic mail
- systems (especially dissimilar mail systems on two different networks) and
- transfers mail messages among them.
-
- mailing list A possibly moderated discussion group, distributed via email
- from a central computer maintaining the list of people involved in the dis-
- cussion.
-
- mail path A series of machine names used to direct electronic mail from
- one user to another.
-
- medium The material used to support the transmission of data. This
- can be copper wire, coaxial cable, optical fiber, or electromagnetic wave (as
- in microwave).
-
- multiplex The division of a single transmission medium into multiple
- logical channels supporting many simultaneous sessions. For example, one
- network may have simultaneous FTP, telnet, rlogin, and SMTP connections,
- all going at the same time.
-
- net.citizen An inhabitant of Cyberspace. One usually tries to be a good
- net.citizen, lest one be flamed.
-
- netiquette A pun on "etiquette"; proper behavior on The Net. See
- Section 4.13 [Usenet Netiquette], page 37.
- Glossary 87
-
-
-
-
-
- network A group of machines connected together so they can transmit
- information to one another. There are two kinds of networks local networks
- and remote networks.
-
- NFS (Network File System) A method developed by Sun Microsystems
- to allow computers to share files across a network in a way that makes them
- appear as if they're "local" to the system.
-
- NIC The Network Information Center.
-
- node A computer that is attached to a network; also called a host.
-
- NSFnet The national backbone network, funded by the National Science
- Foundation and operated by the Merit Corporation, used to interconnect
- regional (mid-level) networks such as WestNet to one another.
-
- packet The unit of data sent across a packet switching network. The term
- is used loosely. While some Internet literature uses it to refer specifically to
- data sent across a physical network, other literature views the Internet as a
- packet switching network and describes IP datagrams as packets.
-
- polling Connecting to another system to check for things like mail or
- news.
-
- postmaster The person responsible for taking care of mail problems,
- answering queries about users, and other related work at a site.
-
- protocols A formal description of message formats and the rules two
- computers must follow to exchange those messages. Protocols can describe
- low-level details of machine-to-machine interfaces (e.g., the order in which
- bits and bytes are sent across a wire) or high-level exchanges between allo-
- cation programs (e.g., the way in which two programs transfer a file across
- the Internet).
-
- recursion The facility of a programming language to be able to call
- functions from within themselves.
-
- resolve Translate an Internet name into its equivalent IP address or other
- DNS information.
-
- RFD (Request For Discussion) Usually a two- to three-week period in
- which the particulars of newsgroup creation are battled out.
-
- route The path that network traffic takes from its source to its destina-
- tion.
-
- router A dedicated computer (or other device) that sends packets from
- one place to another, paying attention to the current state of the network.
-
- RTFM (Read The Fantastic Manual) . This anacronym is often used
- when someone asks a simple or common question. The word `Fantastic' is
- usually replaced with one much more vulgar.
- 88 Zen and the Art of the Internet
-
-
-
-
-
- SMTP (Simple Mail Transfer Protocol) The Internet standard proto-
- col for transferring electronic mail messages from one computer to another.
- SMTP specifies how two mail systems interact and the format of control
- messages they exchange to transfer mail.
-
- server A computer that shares its resources, such as printers and files,
- with other computers on the network. An example of this is a Network File
- System (NFS) server which shares its disk space with other computers.
-
- signal-to-noise ratio When used in reference to Usenet activity, `signal-
- to-noise ratio' describes the relation between amount of actual informa-
- tion in a discussion, compared to their quantity. More often than not, there's
- substantial activity in a newsgroup, but a very small number of those articles
- actually contain anything useful.
-
- signature The small, usually four-line message at the bottom of a piece of
- email or a Usenet article. In Unix, it's added by creating a file `.signature'
- in the user's home directory. Large signatures are a no-no.
-
- summarize To encapsulate a number of responses into one coherent,
- usable message. Often done on controlled mailing lists or active newsgroups,
- to help reduce bandwidth.
-
- synchronous Data communications in which transmissions are sent at a
- fixed rate, with the sending and receiving devices synchronized.
-
- TCP/IP (Transmission Control Protocol/Internet Protocol) A set of
- protocols, resulting from ARPA efforts, used by the Internet to support
- services such as remote login (telnet), file transfer (FTP) and mail (SMTP).
-
- telnet The Internet standard protocol for remote terminal connection
- service. Telnet allows a user at one site to interact with a remote timesharing
- system at another site as if the user's terminal were connected directly to
- the remote computer.
-
- terminal server A small, specialized, networked computer that connects
- many terminals to a LAN through one network connection. Any user on the
- network can then connect to various network hosts.
-
- TEX A free typesetting system by Donald Knuth.
-
- twisted pair Cable made up of a pair of insulated copper wires wrapped
- around each other to cancel the effects of electrical noise.
-
- UUCP (Unix to Unix Copy Program) A store-and-forward system, pri-
- marily for Unix systems but currently supported on other platforms (e.g.
- VMS and personal computers).
-
- WAN (Wide-Area Network) A network spanning hundreds or thousands
- of miles.
-
- workstation A networked personal computing device with more power
- Glossary 89
-
-
-
-
-
- than a standard IBM PC or Macintosh. Typically, a workstation has an
- operating system such as unix that is capable of running several tasks at the
- same time. It has several megabytes of memory and a large, high-resolution
- display. Examples are Sun workstations and Digital DECstations.
-
- worm A computer program which replicates itself. The Internet worm
- (see Section 8.1 [The Internet Worm], page 63) was perhaps the most fa-
- mous; it successfully (and accidentally) duplicated itself on systems across
- the Internet.
-
- wrt With respect to.
-
-
-
- "I hate definitions.
- "
- Benjamin Disraeli
- Vivian Grey, bk i chap ii
- 90 Zen and the Art of the Internet
-
-
- Bibliography 91
-
-
-
-
-
- Bibliography
-
-
-
- What follows is a compendium of sources that have information that will
- be of use to anyone reading this guide. Most of them were used in the writing
- of the booklet, while others are simply noted because they are a must for
- any good net.citizen's bookshelf.
-
-
-
- Books
-
-
- Comer, Douglas E. (1991). Internetworking With TCP/IP, 2nd ed., 2v.
- Prentice Hall Englewood Cliffs, NJ.
-
- Davidson, John (1988). An Introduction to TCP/IP. Springer-Verlag
- Berlin.
-
- Frey, Donnalyn, and Adams, Rick (1989). !@% A Directory of Elec-
- tronic Mail Addressing and Networks. O'Reilly and Associates Newton,
- MA.
-
- Gibson, William (1984). Neuromancer. Ace New York, NY.
-
- LaQuey, Tracy (1990). Users' Directory of Computer Networks. Digital
- Press Bedford, MA.
-
- Levy, Stephen (1984). Hackers Heroes of the Computer Revolution.
- Anchor Press/Doubleday Garden City, NY.
-
- Partridge, Craig (1988). Innovations in Internetworking. ARTECH
- House Norwood, MA.
-
- Quarterman, John S. (1989). The Matrix Computer Networks and Con-
- ferencing Systems Worldwide. Digital Press Bedford, MA.
-
- Raymond, Eric (ed) (1991). The New Hacker's Dictionary. MIT Press
- Cambridge, MA.
-
- Stoll, Clifford (1989). The Cuckoo's Egg. Doubleday New York.
-
- Tanenbaum, Andrew S. (1988). Computer Networks, 2d ed. Prentice-
- Hall Englewood Cliffs, NJ.
-
- Todinao, Grace (1986). Using UUCP and USENET A Nutshell Hand-
- book. O'Reilly and Associates Newton, MA.
-
- The Waite Group (1991). Unix Communications, 2nd ed.. Howard W.
- Sams & Company Indianapolis.
- 92 Zen and the Art of the Internet
-
-
-
-
-
- Periodicals & Papers
-
-
- Barlow, J. Coming Into The Country. Communications of the ACM 343
- (March 1991) 2. Addresses "Cyberspace"_John Barlow was a co-founder
- of the EFF.
-
- Collyer, G., and Spencer, H. News Need Not Be Slow. Proceedings of the
- 1987 Winter USENIX Conference 181-90. USENIX Association, Berkeley,
- CA (January 1987).
-
- Denning, P. The Internet Worm. American Scientist (March-April 1989)
- 126-128.
-
- ________.The Science of Computing Computer Networks. American Sci-
- entist (March-April 1985) 127-129.
-
- Frey, D., and Adams, R. USENET Death by Success? UNIX REVIEW
- (August 1987) 55-60.
-
- Gifford, W. S. ISDN User-Network Interfaces. IEEE Journal on Selected
- Areas in Communications (May 1986) 343-348.
-
- Ginsberg, K. Getting from Here to There. UNIX REVIEW (January
- 1986) 45.
-
- Hiltz, S. R. The Human Element in Computerized Conferencing Systems.
- Computer Networks (December 1978) 421-428.
-
- Horton, M. What is a Domain? Proceedings of the Summer 1984 USENIX
- Conference 368-372. USENIX Association, Berkeley, CA (June 1984).
-
- Jacobsen, Ole J. Information on TCP/IP. ConneXions_The Interoper-
- ability Report (July 1988) 14-15.
-
- Jennings, D., et al. Computer Networking for Scientists. Science
- (28 February 1986) 943-950.
-
- Markoff, J. "Author of computer `virus' is son of U.S. electronic security
- expert." New York Times (Nov. 5, 1988) A1.
-
- ________."Computer snarl A `back door' ajar." New York Times (Nov.
- 7, 1988) B10.
-
- McQuillan, J. M., and Walden, D. C. The ARPA Network Design Deci-
- sions. Computer Networks (1977) 243-289.
-
- Ornstein, S. M. A letter concerning the Internet worm. Communications
- of the ACM 326 (June 1989).
-
- Partridge, C. Mail Routing Using Domain Names An Informal Tour.
- Proceedings of the 1986 Summer USENIX Conference 366-76. USENIX As-
- sociation, Berkeley, CA (June 1986).
- Bibliography 93
-
-
-
-
-
- Quarterman, J. Etiquette and Ethics. ConneXions_The Interoperability
- Report (March 1989) 12-16.
-
- ________.Notable Computer Networks. Communications of the ACM 2910
- (October 1986). This was the predecessor to The Matrix.
-
- Raeder, A. W., and Andrews, K. L. Searching Library Catalogs on the
- Internet A Survey. Database Searcher 6 (September 1990) 16-31.
-
- Seeley, D. A tour of the worm. Proceedings of the 1989 Winter USENIX
- Conference 287-304. USENIX Association, Berkeley, CA (February 1989).
-
- Shulman, G. Legal Research on USENET Liability Issues. ;login The
- USENIX Association Newsletter (December 1984) 11-17.
-
- Smith, K. E-Mail to Anywhere. PC World (March 1988) 220-223.
-
- Stoll, C. Stalking the Wily Hacker. Communications of the ACM 315
- (May 1988) 14. This article grew into the book The Cuckoo's Egg.
-
- Taylor, D. The Postman Always Rings Twice Electronic Mail in a Highly
- Distributed Environment. Proceedings of the 1988 Winter USENIX Confer-
- ence 145-153. USENIX Association, Berkeley, CA (December 1988).
-
- U.S. Gen'l Accounting Ofc. Computer Security Virus Highlights Need for
- Improved Internet Management. GAO / IMTEC - 89 - 57, (1989). Addresses
- the Internet worm.
-
-
-
- "And all else is literature."
- Paul Verlaine
- The Sun, New York
- 94 Zen and the Art of the Internet
-
-