home *** CD-ROM | disk | FTP | other *** search
Text File | 1996-05-06 | 211.5 KB | 6,066 lines |
- INTERNET-TOUR
-
- The Internet is a worldwide collection of thousands of computer
- networks that can intercommunicate. All of them speak the same
- Rlanguage,S namely the TCP/IP protocol suite. Users of any of the
- Internet networks can reach users on any of the other networks. The
- Internet started with the ARPANET, but now includes such networks as
- NSFNET, NEARNet, and others. Many other networks, such as BITNET, are
- tied to the Internet but are not an integral part of it. Approximately
- one million people use the Internet daily.
-
-
- About the Internet
-
- The Internet is a worldwide collection of thousands of computer
- networks that can intercommunicate. All of them speak the same
- Rlanguage,S namely the TCP/IP protocol suite. Users of any of the
- Internet networks can reach users on any of the other networks. The
- Internet started with the ARPANET, but now includes such networks as
- NSFNET, NEARNet, and others. Many other networks, such as BITNET and
- SPAN, are tied to the Internet, but are not an integral part of it.
- Approximately one million people use the Internet daily.
-
- The ancestry of the Internet is rooted in the ARPANET, a network
- developed by the Advanced Research Projects Agency (ARPA, see
- DARPA) to aid in the sharing of information and resources among
- researchers. The ARPANET, which was made operational in 1969,
- became an essential tool for remote login, file transfer, electronic
- mail and the sharing of information by interest groups.
-
-
- History of the Internet
-
- The ancestry of the Internet is rooted in the ARPANET, a network
- developed by the Advanced Research Projects Agency (ARPA, see
- DARPA) to aid in the sharing of information and resources among
- researchers. The ARPANET, which was made operational in 1969,
- became an essential tool for remote login, file transfer, electronic
- mail and the sharing of information by interest groups.
-
- Development of TCP/IP
-
- The ARPANET was growing in size while other networks were being
- developed. Soon the architects of the ARPANET recognized the need to
- communicate with other networks. They also realized that they needed
- new protocols (the NCP protocol suite that they had developed wasnUt
- able to cope with the diverse characteristics of other networks).
- Therefore they designed a new architecture and protocol suite called
- the ARPA Internet; the protocol suite was called TCP/IP.
-
-
-
-
- Start of the Internet
-
- The Internet first became operational in 1983, when the ARPANET was
- split into two separate networks, MILNET and ARPANET, which together
- formed the Internet. Each was given a network number, and gateways
- were installed to provide packet forwarding between them.
-
- TCP/IP in the Internet
-
- When the ARPANET was split to form the Internet, the Defense
- Communications Agency (DCA) mandated the use of TCP/IP for all
- ARPANET hosts, and enforced this by modifying the packet switching
- software. As a result, all ARPANET hosts had to begin using TCP/IP
- protocols and interacting with the Internet environment.
-
- This meant that more networks and gateways could be added to the
- Internet without any effect on the existing network.
-
- Growth of the Internet
-
- Since its creation in 1983, the Internet has grown exponentially in
- terms of numbers of networks connected to it. By 1985, the number
- was approxiately one hundred. By 1987, the number had grown to two
- hundred; in 1989, it exceeded five hundred. According to tables kept at
- the DDN Network Information Center (DDN NIC), there were 2,218
- networks connected to the Internet as of January 1990.
-
- As the Internet has grown, its underpinnings have changed. ARPANET
- and MILNET continued to grow, and other backbone networks were added
- to the Internet. One of these was CSNET, established in 1981 to
- provide for collaboration between computer and engineering
- researchers. CSNET provided Internet access from sites not served by
- ARPANET and MILNET. Today, CSNET has expanded to include
- institutions involved in science and engineering, and is one of several
- midlevel networks that make up NSFNET.
-
-
-
-
-
-
- Internet Backbone Networks
-
- NSFNET
-
- NSFNET began providing backbone Internet service in July 1986 to
- permit supercomputer centers (see Computing Centers) to
- communicate. NSFNET's scope has since expanded, and today it is the
- U.S. national research network. It has extended to the academic and
- commercial communities the TCP/IP services that were previously
- available to government researchers. NSFNET links midlevel
- networks, which in turn connect networks at universities and
- commercial enterprises. Therefore, NSFNET, like the Internet of which
- it forms a large part, is itself a network of networks.
-
- Decommissioning the ARPANET
-
- As NSFNET has grown to handle much of the interconnection load of the
- Internet, other networks have outgrown their usefulness and been
- eliminated. A milestone in this area was the decommissioning of the
- ARPANET in June 1990. The Defense Communications Agency shut down
- the ARPANET because its functions had been subsumed by the midlevel
- networks and NSFNET. Perhaps the greatest testimony to the
- architecture of the Internet is that when ARPANET, the network from
- which the Internet grew, was turned off, no one but network staff was
- aware of it.
-
-
- Poems about the Internet
-
- The Big Bang, or by Leonard
- The Birth of the ARPANET Kleinrock
-
- Requiem for the ARPANET by Vint Cerf
-
- Rosencrantz and Ethernet by Vint Cerf
-
- Untitled by Barry Boehm
-
-
-
- The Big Bang
- (or The Birth of the ARPANET)
-
- by Leonard Kleinrock
-
- It was back in '67 that the clan agreed to meet.
- The gangsters and the planners were a breed
- damned hard to beat.
- The goal we set was honest and the need was clear
- to all:
- Connect those big old mainframes and the minis,
- lest they fall.
-
- The spec was set quite rigid: it must work without a
- hitch.
- It should stand a single failure with an unattended
- switch.
- Files at hefty throughput 'cross the ARPANET
- must zip.
- Send the interactive traffic on a quarter-second trip.
-
- The spec went out to bidders and t'was BBN that
- won.
- They worked on soft and hardware and they all got
- paid for fun.
- We decided that the first node would be we who
- are your hosts
- And so today you're gathered here while UCLA
- boasts.
-
- I suspect you might be asking "What means first
- node on the net?"
- Well frankly, it meant trouble, 'specially since no
- specs were set.
- For you see the interface between the nascent
- IMP and host
- Was a confidential secret from us folks on the
- West Coast.
-
- BBN had promised that the IMP was running late.
- We welcomed any slippage in the deadly
- scheduled date.
- But one day after Labor Day, it was plopped down
- at our gate!
- Those dirty rotten scoundrels sent the damned
- thing out air freight!
-
- As I recall that Tuesday, it makes me want to cry.
- Everybody's brother came to blame the other guy!
- Folks were there from ARPA, GTE, and Honeywell.
- UCLA and ATT and all were scared as hell.
-
- We cautiously connected and the bits began to flow.
- The pieces really functionedQjust why I still don't
- know.
- Messages were moving pretty well by Wednesday
- morn.
- All the rest is historyQpacket switching had been
- born!
-
-
-
-
-
-
-
- Rosencrantz and Ethernet
-
- by Vint Cerf
-
- All the world's a net! And all the data in it merely
- packets
- Come to store-and-forward in the queues a while
- and then are
- Heard no more. 'Tis a network waiting to be
- switched!
-
- To switch or not to switch? That is the question.
- Whether
- 'Tis wiser in the net to suffer the store and forward
- of
- Stochastic networks or to raise up circuits against a
- sea
- Of packets and, by dedication, serve them.
-
-
- To net, to switch. To switch, perchance to slip!
- Aye, there's the rub. For in that choice of switch,
- What loops may lurk, when we have shuffled
- through
- This Banyan net? Puzzles the will, initiates
- symposia,
- Stirs endless debate and gives rise to uncontrolled
- Flights of poetry beyond recompense!
-
-
-
- Untitled
-
- by Barry Boehm (stanzas 1 and 2)
-
- Paul Baran came out of the wood
- With a message first misunderstood
- But despite dangers lurking
- The IMP's were soon working
- And ARPA did see it was good.
-
- So in place of our early myopia
- We now have a net cornucopia
- With IMPs, TIPs, and LANs
- Wideband VANs, MANs, and WANs
- And prospects of World Net Utopia.
-
- Requiem for the ARPANET
-
- by Vint Cerf
-
- Like distant islands sundered by the sea,
- We had no sense of one community.
- We lived and worked apart and rarely knew
- That others searched with us for knowledge, too.
-
- Distant ARPA spurred us in our quest
- And for our part we worked and put to test
- New thoughts and theories of computing art;
- We deemed it science not, but made a start.
-
- Each time a new machine was built and sold,
- We'd add it to our list of needs and told
- Our source of funds "Alas! Our knowledge loom
- Will halt 'til it's in our computer room."
-
- Even ARPA with its vast resources
- Could not buy us all new teams of horses
- Every year with which to run the race.
- Not even ARPA could keep up that pace!
-
- But, could these new resources not be shared?
- Let links be built; machines and men be paired!
- Let distance be no barrier! They set
- That goal: design and built the ARPANET!
-
- As so it was in nineteen sixty-nine,
- A net arose of BBN design.
- No circuit switches these, nor net complete
- But something new: a packet switching fleet.
-
- The first node occupied UCLA
- Where protocols and measurement would play
- A major role in shaping how the net
- Would rise to meet the challenges unmet.
-
- The second node, the NIC, was soon installed.
- The Network Info Center, it was called.
- Hosts and users, services were touted:
- To the NIC was network knowledge routed.
-
- Nodes three and four soon joined the other two:
- UCSB and UTAH come on cue.
- To monitor it all around the clock
- At BBN, they built and ran the NOC.
-
- A protocol was built for host-to-host
- Communication. Running coast-to-coast,
- Below the TELNET and the FTP,
- We called this protocol the NCP.
-
- The big surprise for most of us, although
- Some said they guessed, was another
- protocol
- Used more than all the rest to shuttle
- Mail in content flaming or most subtle.
-
- When we convened the first I Triple C,
- The ARPANET was shown for all to see.
- A watershed in packet switching art,
- this demo played an overwhelming part.
-
- Within three years the net had grown so
- large
- We had to ask that DCA take charge
- To operate a system guaranteed
- For R&D and military need.
-
- Exploring other packet switching modes,
- we built the first spread spectrum mobile
- nodes.
- The Packet Radio, the mobile net,
- worked on the ground and even in a jet.
-
- Deployed at SAC and Eighteenth Airborne Corps,
- The Packet Radio unlocked the door
- to what we now know as the Internet.
- The driver for it all was PRNET.
-
- The Packet Satellite, another new
- technique, was added to the net milieu.
- And then to shed more light upon the dark,
- there came the Ethernet from Xerox PARC.
-
- To these we added yet another thing
- from MIT: a local token ring.
- We saw the local net techniques compound
- until the list could easily confound.
-
- The Internet foundation thus was laid.
- Its protocols from many sources made.
- And through it all the ARPANET grew more;
- It was, for Internet, the central core.
-
- The hardware of the net was changing, too.
- The Honeywell was first, and then the SUE,
- which forms the heart of Pluribus today
- though where this platform sits one cannot say.
-
- The next big change was called the MBB.
- It emulated Honeywell, you see,
- so one by one they modified each node,
- by means of closely written microcode.
-
- Now known as 30 prefixed with a C,
- these nodes are everywhere from A to Z.
- The European MINET too was full
- of nodes like these from Mons to Istanbul.
-
- The second Autodin was long desired
- but once accepted instantly expired.
- Then to the rescue rode the ARPANET!
- And soon the MILNET by its side was set.
-
- By nineteen-eighty DoD opened
- its data networks soon must be aligned
- with Internetwork protocols, to wit:
- by eighty-three the TCP was IT!
-
- Soon every host that sat on ARPANET
- became a gateway to a local net.
- By eighty-six new long-haul nets appeared
- as ARPANET its second decade neared.
-
- The NSFNET and its entourage
- began a stately national dressage
- and soon was galloping at T1 speed
- outdistancing its aging peer indeed.
-
- And so, at last, we knew its course had run,
- our faithful servant, ARPANET, was done.
- It was the first, and being first, was best,
- but now we lay it down to ever rest.
-
- Now pause with me a moment, shed some
- tears.
- For auld lang syne, for love, for years and years
- of faithful service, duty done, I weep.
- Lay down thy packet, now, O friend, and sleep.
-
- (for ARPA, see DARPA; for the NIC, see DDN NIC; for TCP, see TCP/IP)
-
- Internet Networks
-
- CREN/CSNET (Computer and Science Network)
-
- DDN (Defense Data Net )
-
- ESNet (Energy Sciences Network)
-
- NSFNET (National Science Foundation Network)
-
- NASA Science Network
-
- The Internet communicates via gateways with other networks such as
- CompuServe, MCI Mail, BITNET, FIDONet, UUNET, and USENET. The
- Internet has several component networks (which themselves include
- other networks):
-
- % CREN/CSNET
-
- % DDN (Defense Data Net )
-
- % ESNET (Energy Sciences Network)
-
- % NASA Science Internet
-
- % NSFNET (National Science Foundation
- Network)
-
- % Terrestrial Wideband Network
-
-
-
-
-
-
- Internet Networks
-
- The Internet communicates via gateways with networks outside the
- Internet, such as CompuServe, MCI Mail, BITNET, FIDONet, UUNET, and
- USENET. Within the Internet there are several smaller networks (which
- themselves include other networks):
-
- % CREN/CSNET (Computer and Science
- Network)
-
- % DDN (Defense Data Net )
-
- % ESNET (Energy Sciences Network)
-
- % NASA Science Network
-
- % NSFNET (National Science Foundation
- Network)
-
-
- NSFNET Mid-Level Wide Area Networks
-
- BARRNET (Bay Area Regional Research Network)
-
- CERFNET (California Education & Research Federation Network)
-
- CICNET (Committee on Institutional Cooperation Network)
-
- JvNCNET (JvNCNet Northeast Research Regional Network)
-
- LOS NETTOS (Greater Los Angeles Area Network)
-
- MICHNET
-
- MIDNET (Midwestern States Network)
-
- MRNET (Minnesota Regional Network)
-
- NCSANET (National Center for Supercomputing Applications Network)
-
- NEARNET (New England Academic & Research Network)
-
- NEVADANET
-
- NORTHWESTNET (Northwestern States Network)
-
- NYSERNET (New York State Education & Research Network)
-
- OARNET (Ohio Academic Resources Network)
-
- PREPNET (Pennsylvania Research and Economic Partnership Network)
-
- PSCNET (Pittsburgh Supercomputing Center Network)
-
- PSINET
-
- SDSCNET (San Diego Supercomputer Center Network)
-
- SESQUINET (Texas Sesquicentennial Network)
-
- SURANET (Southeastern Universities Research Association Network)
-
- THENET (The Texas Higher Education Network)
-
- USAN (NCAR's University Satellite Network)
-
- VERNET (Virginia Education and Research Network)
-
- WESTNET (Southwestern States Network)
-
-
-
-
-
-
-
-
-
-
-
- CREN/CSNET
-
- CSNET: The Computer + Science Network
- is an international data communications network that supports
- research and education. Members of CSNET include universities,
- colleges, government agencies, non-profit organizations, and industrial
- research laboratories. CSNET is affiliated with twelve foreign
- university networks.
-
- CSNET and BITNET are merged into a single organization, CREN, the
- Corporation for Research and Educational Networking.
-
- Address:
- CREN/CSNET Coordination and
- Information Center
- BBN Systems and Technologies
- 10 Moulton St.
- Cambridge, MA 02138 USA
-
- E-mail: cic@sh.cs.net
-
- Phone: (617)873-2777 [CSNET hotline]
-
- DDN
-
- The Defense Data Network is a worldwide operational communications
- network serving the US Department of Defense. Defense Data Network.
-
- Address:
- SRI International
- Network Information Systems Center
- Room EJ291
- 333 Ravenswood Avenue
- Menlo Park, CA 94015
-
- E-mail: nic@noc.ddn.mil
-
- Phone: 1-800-235-3155 or (415) 859-3695
-
-
-
- ESNET
-
- The Energy Sciences Network is a computer data communications
- network managed and funded by the Department of Energy Office of
- Energy Research (DOE/OER). ESnet is intended for use by scientific
- collaborators throughout ER programs.
-
- ESnet is installed and operated by the National Energy Supercomputer
- Center
- (NERSC), formerly known as the National Magnetic Fusion Energy
- Computer Center
- (NMFECC), which is located at Lawrence Livermore National Laboratory
- (LLNL) in
- California. NERSC provides user
- services for ESnet.
-
- Address:
- NERSC
- L-561
- Lawrence Livermore Labs
- Livermore, Ca. 94550
-
- E-mail: info@es.net
-
- Phone: 1-800-33-ESNET
-
- Contacts:
-
- Jim Leighton, 415-422-4025, jfl@es.net, Network Manager
-
- Tony Hain, 415-422-4200, hain@eagle.es.net, Associate Network
- Manager
-
- Bob Aiken, 415-422-4474, aiken@es.net, Network Information and
- Services Group
-
-
- NASA Science Internet
-
- The NASA Science Internet (NSI) supports scientists and flight projects
- funded by NASA's Office of Space Science and Applications (OSSA).
- Users include NASA sites, and government facilities, research, and
- academic sites conducting NASA-funded research. The NSI is a NASA-
- wide network with hubs at several NASA centers.
-
- Address:
- Network Information Center
- NASA Science Network
- MS 233-18
- NASA Ames Research Center
- Moffett Field, CA 94035
-
- E-mail: nsnnic@nsipo.nasa.gov
-
- Phone: (415) 694-5859 or (FTS) 464-5859
-
-
- TERRESTRIAL WIDEBAND NETWORK
-
- The Terrestrial Wideband Network supports research in high-speed
- networking, provides connectivity among academic and government
- sites, and supports a testbed for Internet protocol development and
- experimentation with applications. It supports a research environment
- for multimedia conferencing and voice/video conferencing using
- gateways which use a real-time connection-oriented protocol over a
- connectionless network.
-
- Address:
- Terrestrial Wideband Network
- c/o BBN Systems and Technologies
- 10 Moulton St.
- Cambridge, Massachusetts 02138
- Attn: Karen Seo
-
- E-mail: wbhelp@bbn.com
-
- Phone: (617) 873-3427 (Terrestrial Wideband Network hotline)
- NSFNET
-
- The National Science Foundation Network is the backbone network of
- the U.S. National Science Foundation (NSF). It interconnects mid-level
- networks and other resources throughout the United States. The
- network may be used by researchers in general, according to NSF
- guidelines.
-
- Address:
- Merit Computer Network
- 1075 Beal Avenue
- Ann Arbor, Michigan 48109
-
- E-mail: nsfnet-info@merit.edu
-
- Phone: 1-800-66-MERIT
-
- Contacts: For information about becoming a part of NSFNET, contact
- the NSF Network Service Center (NNSC) at BBN:
-
- NNSC
- Bolt Beranek and Newman Inc.
- 10 Moulton St.
- Cambridge, MA 02138
- nnsc@nnsc.nsf.net
- (617) 873-3400
-
- For information about NSFNET contact NSF, MERIT, or the NNSC (above):
- At NSF:
-
- Steve Wolff DNCRI Director
- (202) 357-9717 swolff@note.nsf.gov
- Jane Caviness NSFNET Deputy Divison Director
- (202) 357-9717 jcavines@note.nsf.gov
- Dan van Belleghem NSFNET operations and general questions
-
- At Merit:
-
- Eric Aupperle Project Director (313) 763-4897 eaupperle@merit.edu
- Hans-Werner Braun Principal Investigator (313) 763-4897 hwb@merit.edu
- BARRNet
-
- The Bay Area Regional Research Network is the Northern California
- regional hub of the NSFNET. BARRNet members include universities,
- government and private research laboratories, and corporate affiliates.
-
- Address:
- Pine Hall, Rm. 115
- Stanford University
- Stanford, CA 94305-4122
-
- Email: info@nic.barrnet.net
-
- Phone: (415) 725-1790
-
- Contacts:
-
- William H. Yundt, Executive Director
- Pine Hall Rm. 115
- Stanford University
- Stanford, CA 94305-4122
- gd.why@forsythe.stanford.edu
- (415) 723-3104
-
- Philip Almquist, Technical Comittee Chair
- Pine Hall, Rm. 115
- Stanford University
- Stanford, CA 94305-4122
- almquist@jessica.stanford.edu
- (415) 723-2229
-
- Ron Roberts, Network Operating Center Manager
- Business hours: (415) 723-7360
- After hours/weekends: (415) 723-1611
- barrnet-noc@nic.barrnet.net
-
-
- CERFNET
-
- The California Education and Research Federation Network, CERFnet, is
- a regional network that operates throughout California. CERFnet
- membership includes universities, colleges, industrial and government
- facilities, hospitals, and libraries.
-
- Address:
-
- CERFnet
- c/o San Diego Supercomputer Center
- P. O. Box 85608
- San Diego, California 92186-9784
-
- Email: help@cerf.net
-
- Phone: (619) 534-5087
-
- Contact:
-
- Karen Armstrong McKelvey
- mckelvey@sds.sdsc.edu
-
- CICNet
-
- CICNet is a regional network serving a seven-state region of the
- midwestern United States. It connects the members of the Big Ten and
- the University of Chicago, as well as corporate and nonprofit
- organizations.
-
- Address:
- CICNet, Inc.
- 2901 Hubbard Drive, Pod G
- Ann Arbor, MI 48105
-
- E-mail: info@cic.net
-
- Phone: (313) 998-6103
-
-
- JvNCnet
-
- JvNCnet, the North East Research Regional Network, connects research
- organizations concentrated in the Northeastern United States, with
- access to the NSFNET backbone and with international connections to
- several Scandinavian countries (Norway, Finland, Iceland, Sweden and
- Denmark), and the United Kingdom.
-
- Address:
- JvNCnet
- P.O. Box 3717
- Princeton, N.J. 08543
-
- E-mail: nisc@nisc.jvnc.net
-
- Phone: (609) 520-2000 [Sergio Heker]
-
- Contact:
- The JvNCnet Network Coordinator:
- nisc@nisc.jvnc.net or (609) 520-2000.
-
- Los Nettos
-
- Los Nettos is a regional network in the Los Angeles area. It may be
- used for any educational or research purpose. The member
- organizations are universities and research laboratories. The
- Information Sciences Institute (ISI) of the University of Southern
- California (USC) acts as the agent for Los Nettos.
-
- Address:
- Los Nettos
- c/o Ann Westine
- USC/Information Sciences Institute
- 4676 Admiralty Way
- Marina del Rey, California 90292
-
- E-mail: los-nettos-request@isi.edu
-
- Phone: (213) 822-1511 (Ann Westine)
-
- MichNet
-
- MichNet is a statewide network operated by Merit. The network plans
- to reach out beyond Merit's traditional audience of four-year, publically
- supported colleges and universities in Michigan.
-
- E-mail: Merit_Computer_Network@um.cc.umich.edu
-
- Phone: (412)268-7870
-
- Contact: Eric Aupperle
- (313) 764-9423
- eaupperle@merit.edu
-
- Midnet
-
- MIDnet is a regional computer network for the seven midwestern
- states. The network provides researchers access to supercomputers
- and is a vehicle for exchanging information among researchers.
-
- Contact: Dale Finkelson
-
- Phone: (402) 472-5032
-
- E-mail: dmf@westie.unl.edu
-
-
-
-
-
-
-
-
- MRNet
-
- The Minnesota Regional Network (MRNet) is an NSF regional network
- which provides communications between the nationwide NSFNET and
- researchers at the Minnesota Supercomputer Center, the University of
- Minnesota, and other educational institutions. MRNet also provides
- NSFNET access to several Minnesota organizations involved in high-
- technology research.
-
- Address:
- MRNet
- c/o Mahlon Stacy
- Mayo Foundation
- Medical Sciences 1-18
- Rochester, MN 55905
-
- Technical:
- MRNet
- c/o Jeff Wabik
- Minnesota Supercomputer Center
- 1200 Washington Street
- Minneapolis, MN 55415
-
- E-mail: mrnet@nic.mr.net
-
- Phone:
- (507) 284-4558 (Mahlon Stacy)
- (612) 626-1888 (Jeff Wabik)
-
-
-
- NCSAnet
-
- NCSAnet is a regional supercomputing network that connects university
- and government research sites primarily located in Illinois, Wisconsin,
- and Indiana. The NCSAnet private corporate network is national in
- scale.
-
- Address:
- NCSAnet
- attn: Charlie Catlett
- National Center for Supercomputing
- Applications
- 605 E. Springfield Ave.
- Champaign, IL 61820
-
- Email: network@ncsa.uiuc.edu
-
- Phone: (217) 244-8297 [NCSA Networking Office]
-
- NEARNET
-
- The New England Academic and Research
- Network, NEARnet, is a high-speed network of academic, industrial,
- government, and nonprofit organizations in New England.
-
- Address:
- NEARnet
- c/o BBN Systems and Technologies Corp.
- 10 Moulton St.
- Cambridge, MA 02138
- Attn: John Rugo
-
- E-mail: nearnet-staff@bbn.com
-
- Phone: (617) 873-8730 [NEARnet hotline]
-
- NevadaNet
-
- NevadaNet is a state-wide network and currently serves the Desert
- Research Institute, the University of Nevada, Reno and the University of
- Nevada, Las Vegas.
-
- Address:
-
- NevadaNet
- University of Nevada System
- Computing Services
- 4505 Maryland Parkway
- Las Vegas, Nevada 89154
-
- E-mail: info@nevada.edu
-
- Phone: (702) 739-3557 [Jim Williams]
-
- Contacts:
-
- NOC Manager: Van Weddle
- 702-739-3883
- weddle@uns-helios.nevada.edu
-
- NIC Manager: Becky Seibert
- 702-784-4343
- seibert@unssun.nevada.edu
-
-
-
-
-
-
-
-
- NorthWestNet
-
- NorthWestNet (NWNet) is a mid-level network of the National Science
- Foundation Network (NSFNET). NWNet provides communication with
- NSFNET for research centers throughout the Northwest, including sites
- in Alaska, Idaho, Montana, North Dakota, Oregon, and Washington.
-
- Address:
-
- Administrative:
- Richard Markwood
- Western Interstate Commission on Higher
- Education (WICHE)
- P.O. Drawer P
- Boulder, CO 80301-9752
-
- Technical:
- Dan Jordt
- University Networks and Distributed
- Computing
- UW, HG-45
- 3737 Brooklyn Ave. NE
- Seattle, WA 98105
-
- E-mail:
-
- Administrative: markwood@vaxf.colorado.edu
- Technical: danj@cac.washington.edu
-
- Phone:
-
- Administrative: (303) 497-0220
- Technical: (206) 543-7352
-
- Contact:
-
- The 24x7 NOC hotline number is (206) 543-5128, or noc@nwnet.net.
-
-
-
-
-
-
-
-
- NYSERNet
-
- NYSERNet is a midlevel network incorporating corporate, academic, and
- government institutions.
-
- Address:
- NYSERNet Inc.
- 165 Jordan Rd
- Troy, NY 12180
-
- E-mail: info@nisc.nyser.net
-
- Phone: (518) 283-8860
-
-
-
- OARnet
-
- The Ohio Academic Resources Network is the regional network for the
- state of Ohio. It serves the entire higher education community.
-
- E-mail: alison@maverick.osc.edu
-
- Phone: (614) 292-9248
-
- Contact: Alison Brown
-
-
- PSCNet
-
- PSCNET is an NSF-sponsored regional research and education network.
-
- E-mail: hastings@morgul.psc.edu
-
- Phone: (412) 268-4960
-
- Contact: Eugene Hastings
-
-
- PREPnet
-
- Pennsylvania Research and Economic Partnership Network, PREPnet, is
- a mid-level network serves Pennsylvania. Organizations operating
- within Pennsylvania involved in education, research, technology
- transfer, or the economic development of Pennsylvania participate.
-
- Address:
- PREPnet
- 530 N. Neville Street
- Pittsburgh, PA 15213
-
- E-mail: prepnet+@andrew.cmu.edu
-
- Phone: (412)268-7870
-
- Contacts:
-
- Executive Director: Thomas W. Bajzek, twb+@andrew.cmu.edu
-
- NIC Manager: Marsha L. Perrott, mlp+@andrew.cmu.edu
-
- PSINet
-
- PSINet is a US-based internetwork available throughout the continental
- US and in Canada, Germany, and Israel. The PSINet operations center is
- located in Albany NY (another office is located in Santa Clara,
- California). PSINet provides internetworking services to the NYSERNet
- user community.
-
- Address:
- Performance Systems International
- 11800 Sunrise Valley Drive - Suite 1100
- Reston, VA 22091
-
- E-mail: info@psi.com
-
- Phone:
- (+1-703) 620-6651
- 1-800-82psi82
-
- SDSCnet
-
- SDSCnet is a network linking academic, industrial, and government
- affiliates with the San Diego Supercomputer Center (SDSC), which
- administers the network, and, by extension, NSFNET.
-
- Address:
- Paul Love
- San Diego Supercomputer Center
- PO Box 85608
- San Diego, CA 92186-9784
-
- E-mail: loveep@sds.sdsc.edu
-
- Phone: (619)534-5000
-
-
- Sesquinet
-
- Sesquinet is a regional network in Texas. Its
- members include universities, research laboratories, and industrial
- organizations
-
- Address:
- Guy Almes
- Dept. of Computer Science
- Rice University
- Houston, Texas 77251-1892
-
- E-mail:
- almes@rice.edu [Guy Almes]
- farrell@rice.edu [Farrell Gerbode]
-
- Phone:
- (713) 527-6038 [Almes],
- (713) 527-4988 [Gerbode]
-
-
-
-
-
-
-
-
-
- SURAnet
-
- SURAnet is an NSFNET mid-level network. SURAnet's geographic area
- includes the District of Columbia and thirteen states in the southeast
- US: Alabama, Delaware, Florida, Georgia, Kentucky, Louisiana, Maryland,
- Mississippi, North Carolina, South Carolina, Tennessee, Virginia and
- West Virginia. While SURA, the parent organization, is a consortium of
- academic organizations, SURAnet members comprise approximately
- two-thirds academic institutions and one-third non-academic sites.
-
- Address:
- SURAnet
- Computer Science Center
- University of Maryland
- College Park, MD 20742-2411
- attn: Dr. Jack Hahn
-
- E-mail:
- hahn@umd5.umd.edu,
- suranet-admin@noc.sura.net
-
- Phone: (301)454-5434 [Hahn]
-
- Contacts:
-
- Network Operations Center (NOC)
- Hours: 0800-1630 Manager: Mark Oros
- Hotline: (301) 454-8055 oros@umd5.umd.edu
-
- SURAnet Personnel: suranet-admin@noc.sura.net
- NOC Personnel: noc-staff@noc.sura.net
- User Problems: help@noc.sura.net
-
-
- THEnet
-
- The Texas Higher Education Network is an NSFNET regional network
- that covers the state of Texas, with a link to the Instituto Tecnologico
- y de Estudios Superiores de Monterrey in Monterrey, Mexico. Network
- information and operations management are provided through the
- University of Texas (UT) System Office of Telecommunication Services
- (OTS).
-
- Address:
- Texas Higher Education Network
- Information Center
- Commons Building Room 1.156A
- Balcones Research Center
- 10100 Burnet Road
- Austin, TX 78758-4497
-
- E-mail:
- THEnet (DECnet):+THENIC::INFO
- BITNET:+INFO@THENIC
- Internet:+info@nic.the.net
- SPAN:+UTSPAN::THENIC::INFO
-
- Phone: (512) 471-2444
-
- USAN
-
- USAN (University Satellite Network) is a discipline-oriented network
- serving organizations that do research in the atmospheric and
- oceanographic sciences. Current members are the Universities of
- Miami, Oregon State, Penn State, Maryland, Wisconsin, the Institute of
- Naval Oceanography, the Naval Research Lab, and Woods Hole
- Oceanographic Institute. The primary use of the network is for access
- to supercomputer facilities at NCAR; secondary use is for access to the
- Internet.
-
- Address:
- National Center for Atmospheric Research
- USAN Network/Scientific Computing
- Division
- 1850 Table Mesa Drive
- P.O. Box 3000
- Boulder, CO 80307
-
- E-mail: morris@ncar.ucar.edu
-
- Phone: (303) 497-1282 [Don Morris]
-
- VERNet
-
- The Virginia Education and Research Network
- is the regional network for the state of Virginia.
-
- E-mail: jaj@crash.virginia.edu
-
- Phone: (804) 924-0616
-
- Contacts: Jim Jokl
- Westnet
-
- Westnet is a regional network with nodes in the states of Arizona,
- Colorado, southern Idaho, New Mexico, Utah and Wyoming. The member
- organizations are universities, research laboratories, and commercial
- organizations.
-
- Addresses:
- Administrative:
- Westnet
- c/o Patrick J. Burns
- Department of Mechanical Engineering
- Colorado State University
- Fort Collins, CO 80523
-
- Technical:
- Westnet
- c/o Carol Ward
- 3645 Marine Street
- University of Colorado
- Boulder, C0 80309-0455
-
- E-mail: westnet@spot.colorado.edu
-
- Phone:
- (303) 491-1575 [Pat Burns]
- (303) 492-5860 [Carol Ward]
- Net Etiquette
-
- "Etiquette" means "ticket" in French. On the Internet, "netiquette" is
- your ticket to "travelling" (by FTP, TELNET, and electronic mail)
- without annoying others.
-
- Electronic mail messages can be informal, but thought should be given
- before they are sent. Don't send a message until you have taken time to
- review its contents and header. Make sure your message is correctly
- addressed (that you aren't copying it to a group address unintentionally
- or unwisely), that it is free of typos, and that you really mean what it
- says. Especially when sending a message to a mailing list or bboard
- (see Interest Groups), try to be clear and consise.
-
- Addresses
-
- When you send Internet electronic mail, make sure that the "From:"
- field in the headers of your messages can be used to generate replies
- from Internet hosts. The "From:" field should contain either a full
- Internet address, for example,
-
- From: socrates@agora.edu
-
- or your "signature" name plus the Internet address enclosed in "angle
- brackets":
-
- From: "Socrates Jones" <socrates@agora.edu>
-
- The following From: fields will prevent people on the Internet from
- replying to your messages:
-
- From: groucho@cs (No domain name!)
- From: cs!groucho (uucp address)
- From: cs!groucho@fredonia.edu
- (This might work, but test it!)
-
- DECNET, VAX/VMS, and BITNET addresses will also have problems.
- Hopefully, your host gateways to the Internet through a host that
- rewrites addresses so that Internet hosts can reply to them.
-
- Check the address of the recipient of your message. If you are not sure
- of an address, don't guess. Electronic mail addresses are very
- unforgivingQyou must get every character exactly right.
-
- The quickest way to check an address is by telephone. If you can't do
- that, try to find the domain for the organization, and send email to
- postmaster@domain (using the domain name). Or send a U.S. postal
- letter to the recipient and ask for a reply by electronic mail. If the
- email address is wrong, you should get the message back eventually,
- but it can take three days to a week to return.
-
- Many mailing lists (see Interest Groups) are distributed by 'repeater'
- programs. For example, when you send a message to unix-
- pmdf@sh.cs.net, the message is automatically re-mailed to everyone on
- the mailing list.
-
- Be careful of thisQthere is nothing in the name of a repeater list to
- help you distinguish it from a non-repeating address. Inadvertently
- sending a private message to a mailing list can be embarrassing, and
- someone on the list might "flame" at you. Always assume a list
- address is a 'repeater'. Check the header before you send a message to
- make sure there is no extra address in the "To:" or "Cc." field.
-
- Many lists (such as dip-people) have a special "-request" address (such
- as dip-people-request@relay.cs.net). Be careful to send requests to be
- added or dropped from the list to the moderator or the -request
- address, and not to the whole list.
-
- Netiquette for Groups
-
- Check with your system administrator to see what newsgroups are
- available to you and how to use them.
-
- The following is based on The USENET Primer on How to Work With the
- USENET Community by Gene Spafford
-
- Never Forget that the Person on the Other Side is Human
-
- Because your interaction with the network is through a computer, it is
- easy to forget that there are people "out there." Situations arise
- where emotions erupt into a verbal free-for-all that can lead to hurt
- feelings. Strongly critical messages on the network are called
- "flames." The following will help you to avoid sending or provoking
- flames.
-
- Try not to say anything to others that you would not say to them in
- person in a room full of people. Please remember that when you send a
- messsage to a bulletin board or mailing list, people all over the world
- are reading your words.
-
- Don't attack peopleQtry to persuade them by presenting facts. Cursing
- and abuse only make people less willing to help when you need it.
-
- If you are upset at something or someone, wait until you have had a
- chance to calm down and think about it. A cup of coffee or a good
- night's sleep works wonders on your perspective. Hasty words create
- more problems than they solve.
-
- Be Careful What You Say About Others
-
- Please rememberQthousands of people may read your message. They
- quite possibly include your boss, your friend's boss, your girlfriend's
- brother's best friend, and one of your father's beer buddies.
- Information posted on the net can come back to haunt you or the person
- you are talking about.
-
- Think twice before you post personal information about yourself or
- others.
-
- Be Brief
-
- Say what you have to say succinctly and it will have a greater impact.
- Remember that the longer you make your article, the fewer people will
- bother to read it.
-
- Your Postings Reflect Upon YouQBe Proud of Them
-
- Most people will know you only by what you say and how well you say
- it. Take some time to make sure each posting won't embarrass you
- later. Minimize your spelling errors and make sure that the article is
- easy to read and to understand.
-
- Use Descriptive Titles
-
- The subject line of an article enables people to decide whether or not
- to read your article. Tell people what the article is about before they
- read it. A title like "Car for Sale" does not help as much as "66 MG
- Midget for sale: Beaverton OR." Don't expect people to read your article
- to find out what it's about Q many won't bother. Some sites truncate
- the length of the subject line to forty characters, so keep your subjects
- short and to the point.
-
- Think About Your Audience
-
- When you post an article, think about the people you are trying to reach.
- Try to get the most appropriate audience for your message, not the
- widest.
-
- Avoid abbreviations and acronyms, if possible, and define the ones you
- use.
-
- If your message is of interest to a limited geographic area
- (apartments, car sales, meetings, concerts, etc...), restrict the
- distribution of the message to your local area. Some areas have special
- newsgroups with geographical limitationsQcheck with your system
- administrator.
-
- If you want to try a test of something, don't use a world-wide
- newsgroup! There are
- newsgroups that are local to your computer or area, which should be
- used for this. Your system administrator can tell you what they are.
-
- Be familiar with the group you are posting to before you post.
-
- You shouldn't post to groups you don't read, or to groups you've only read
- a few articles fromQyou may not be familiar with the conventions and
- themes of the group. One normally does not join a conversation by just
- walking up and talking. Instead, you listen first and then join in if you
- have something pertinent to contribute.
-
- Be Careful with Humor and Sarcasm
-
- Without the voice inflections and body language of personal
- communications, it's easy for remarks meant to be funny to be
- misinterpreted. Subtle humor tends to get lost. Take steps to make
- sure that people realize you are trying to be funny. The net has
- developed a symbol called the smiley face, which looks like this: :-) It
- points out sections of articles with humorous intent. No matter how
- broad the humor or satire, it is safer to remind people that you are
- being funny.
-
- But also be aware that frequently satire is posted without explicit
- indications. If an article outrages you strongly, ask yourself if it may
- have been unmarked satire. Several self-proclaimed connoisseurs
- refuse to use smiley faces, so take heed or you may make a temporary
- fool of yourself.
-
- Only Post a Message Once
-
- Avoid posting messages to more than one group unless you are sure it
- is appropriate. If you do post to multiple groups, don't post to each
- group separately. Instead, specify all the groups on a single message.
- This reduces network overhead and lets people who subscribe to more
- than one of those groups see the message once instead of having to
- wade through each copy.
-
- Please "Rotate" Messages With Questionable Content
-
- Certain messages may be offensive to some people. To make sure that
- these messages are not read unless they are explicitly requested, they
- should be encrypted. The standard encryption method is to rotate each
- letter by thirteen characters so that an "a" becomes an "n." This is
- known on the network as "rot13"; when you rotate a message the word
- "rot13" should be in the "Subject:" line.
-
- Most of the software used to read network articles has some way of
- encrypting and decrypting messages. Your system administrator can
- tell you how the software on your system works, or you can use the
- Unix command "tr [a-z][A-Z] [n-z][a-m][N-Z][A-M]". (Note that some
- versions of Unix don't require the [] in the "tr" command. In fact, some
- systems will
- get upset if you use them in an unquoted manner. The following should
- work for everyone, but may be shortened on some systems: tr '[a-m][n-
- z][A-M][N-Z]'
- '[n-z][a-m][N-Z][A-M]'QDon't forget the single quotes!)
-
- Summarize What You are Following Up
-
- When you are following up someone's article, please summarize the
- parts of the article to which you are responding. This allows readers
- to appreciate your comments rather than trying to remember what the
- original article said. It is also possible for your response to reach
- some sites before the original article does!
-
- Summarization is best done by including appropriate quotes from the
- original article. Don't include the entire article, since it will
- irritate the people who have already seen it. Even if you are responding
- to the entire article, summarize only the major points you are
- discussing.
-
- When Summarizing, Summarize!
-
- When you request information from the network, it is common courtesy
- to report your findings so that others can benefit as well. The best
- way of doing this is to take all the responses that you received and edit
- them into a single article that is posted to the places where you
- originally posted your question. Take the time to strip headers,
- combine duplicate information, and write a short summary. Try to
- credit the information to the people that sent it to you, where possible.
-
- Use Mail, Don't Post a Follow-up
-
- One of the biggest problems we have on the network is that when
- someone asks a question, many people send out identical answers.
- When this happens, dozens of identical answers pour through the net.
- Mail your answer to the person and suggest that they summarize to the
- network. This way the net will only see a single copy of the answers,
- no matter how many people answer the question.
-
- If you post a question, please remind people to send you the answers by
- mail and at least offer to summarize them to the network.
-
- Read All Follow-ups and Don't Repeat What Has Already Been Said
-
- Before you submit a follow-up to a message, read the rest of the
- messages in the newsgroup to see whether someone has already said
- what you want to say. If someone has, don't repeat it.
-
- Check the Headers When Following Up
-
- Some software has provisions to specify that follow-ups to an article
- should go to a specific set of newsgroupsQpossibly different from the
- newsgroups to which the original article was posted. Sometimes the
- groups chosen for follow-ups are inappropriate, especially as a thread
- of discussion changes with repeated postings. You should carefully
- check the groups and distributions given in the header and edit them as
- appropriate. If you change the groups named in the header, or if you
- direct follow-ups to a particular group, say so in the body of the
- messageQnot everyone reads the headers of postings.
-
- Be Careful About Copyrights and Licenses
-
- Once something is posted onto the network, it is *probably* in the
- public domain unless you own the appropriate rights (for example, if
- you wrote it yourself) and you post it with a valid copyright notice; a
- court would have to decide the specifics and
- there are arguments for both sides of the issue.
-
- Now that the US has ratified the Berne convention, the issue is even
- murkier. For all practical purposes, though, assume that you
- effectively give up the copyright if you don't put in a notice. Of course,
- the information becomes public, so you mustn't post trade secrets that
- way.
-
- Keep in mind that material that is UNIX-related may be restricted by
- the license you or your company signed with AT&T, so be careful not to
- violate it. You should also be aware that posting movie reviews, song
- lyrics, or anything else published under a copyright could cause you,
- your company, or members of the net community to be held liable for
- damages, so we highly recommend caution in using this material.
-
- Cite Appropriate References
-
- If you are using facts to support a cause, state where they came from.
- Don't take someone else's ideas and use them as your own. You don't
- want someone pretending that your ideas are theirs; show them the
- same respect.
-
- Mark or Rotate Answers and Spoilers
-
- When you post something (like a movie review that discusses a detail
- of the plot) that might spoil a surprise for other people, please mark
- your message with a warning so that they can skip the message.
- Another alternative would be to use the "rot13" protocol to encrypt the
- message so it cannot be read accidentally. When you post a message
- with a spoiler in it make sure the word "spoiler" is part of the
- "Subject:" line.
-
- Spelling Flames Considered Harmful
-
- Every few months a plague descends on the network called the spelling
- flame. It starts out when someone posts an article correcting the
- spelling or grammar in some article. The immediate result seems to be
- for everyone on the net to turn into a sixth grade English teacher and
- pick apart each other's posting. This is not productive and tends to
- cause people to get angry with each other.
-
- It is important to remember that we all make mistakes, and that there
- are many users on the net who use English as a second language. There
- are also a number of people who suffer from dyslexia and who have
- difficulty noticing their spelling mistakes. If you feel that you must
- make a comment on the quality of a posting, please do so by mail, not
- on the network.
-
- Don't Overdo Signatures
-
- Many people can have a signature added to their postings automatically
- by placing it in a file called "$HOME/.signature". Don't overdo it.
- Signatures can tell the world something about you, but keep them short.
- A signature that is longer than the message itself is considered to be
- in bad taste. The main purpose of a signature is to help people locate
- you, not to tell your life story. Every signature should include at least
- your return
- address relative to a major, known site on the network and a proper
- domain-format address. Your system administrator can give this to
- you. Some news posters attempt to enforce a four-line limit on
- signature filesQan amount that should be more than sufficient to
- provide a return address and attribution.
-
- Limit Line Length and Avoid Control Characters
-
- Try to keep your text in a generic format. Many (if not most) of the
- people reading Usenet do so from eighty-column terminals or from
- workstations with eighty-column terminal windows. Try to keep your
- lines of text to less than eighty-characters for optimal readability.
- Also realize that there are many, many different forms of terminals in
- use.
-
- If you enter special control characters in your message, it may result
- in your message being unreadable on some terminal types; a character
- sequence that causes reverse video on your screen may result in a
- keyboard lock and graphics mode on someone else's terminal. You
- should try to avoid the use of tabs, too, since they may also be
- interpreted differently on terminals other than your own.
-
- Summary of Things to Remember
-
- Never forget that the person on the other side is human
-
- Be careful what you say about others
-
- Be brief
-
- Your postings reflect upon you; be proud of them
-
- Use descriptive titles
-
- Think about your audience
-
- Be careful with humor and sarcasm
-
- Only post a message once
-
- Please rotate material with questionable content
-
- Summarize what you are following up
-
- Use e-mail, don't post a follow-up
-
- Read all follow-ups and don't repeat what has already been said
-
- Double-check follow-up newsgroups and distributions.
-
- Be careful about copyrights and licenses
-
- Cite appropriate references
-
- When summarizing, summarize
-
- Mark or rotate answers or spoilers
-
- Spelling flames are considered harmful
-
- Don't overdo signatures
-
- Limit line length and avoid control characters
-
- (*)UNIX is a registered trademark of AT&T.
-
- Electronic Mail
-
- Electronic mail allows you to exchange messages with other computer
- users (or groups of users) via a communications network. Electronic
- mail is one of the most popular uses of the Internet.
-
- The Internet standard for naming computers is called the "domain
- system."
-
- Different computers use different software for electronic mail. UNIX
- systems, for example, may use UNIX mail, mh, msg, or something else.
- Different software uses different commands. Ask the Postmaster at
- your site how to use electronic mail on your system.
-
-
- Domain System
-
- The Internet standard for naming computers is called the "domain
- system." This hierarchical system references values such as country,
- type of organization, organization name, division name, and computer
- name. Below is an example:
-
- joe@bitsy.mit.edu
-
- The information in a mail address becomes more global as you read
- from left to right. The user's name is always to the left of an @ sign.
- Computer and organization names are always to the right. In the
- example above, the person, Joe, receives his mail on a computer called
- "bitsy" at MIT. Because MIT is an educational organization, it is
- included in the top-level domain "edu". Other top-level domains are
- listed below:
-
- com commercial
- gov government
- mil military
- org nonprofit organization
- net network operation and info centers
-
- Outside of the U.S., top-level domains are two-letter country codes
- such as these:
-
- au Australia
- il Israel
- jp Japan
- uk United Kingdom
-
- Finding Mail Addresses
-
- You can learn the electronic mail address of another person by asking
- him or by using one of the following resources:
-
- % A postmaster at the recipient's organization can provide the correct
- address when you know the the domain name of the organization. Send
- a message requesting help to postmaster@domain.
-
- % The DDN Network Information Center (DDN NIC) in Menlo Park,
- California, maintains a "white pages" directory of computer users,
- hosts, and domains on the Internet. You can use Telnet to access this
- database on a computer called nic.ddn.mil. Many computers also have a
- program called whois, which automatically accesses the DDN NIC
- database. Ask your system administrator whether your computer has
- whois.
-
-
- UNIX mail Manual
-
- This is the UNIX (see BSD) manual entry for mail, a common electronic
- mail system. Your site may use other electronic mail softwareQ check
- with your system administrator.
-
- NAME
- mail - send or read mail
-
- SYNTAX
- mail [-v] [-i] [-n] [-e] [-s subject] [user...]
- mail [-v] [-i] [-n] -f [name]
- mail [-v] [-i] [-n] -u user
- mail nodename::username (If DECnet is installed.)
-
- The mail utility is an intelligent mail processing system which has a
- command syntax similar to ed. However, in mail lines are replaced by
- messages. If DECnet is installed on your system, you can also send and
- receive mail from other DECnet users.
-
- Sending mail. To send a message to one or more persons, type mail and
- the names of the people to receive your mail.
-
- Press the return key. You are then prompted for a subject.
-
- After entering a subject, and pressing the return key, type your
- message. To send the message, type on a blank line.
-
- You can use tilde (~) escape sequences to perform special functions
- when composing mail messages. See the list of options for more on
- tilde escape sequences.
-
- Reading mail. In normal usage mail is given no arguments and checks
- your mail out of the mail directory. Then it prints out a one line header
- of each message there. The current message is initially the first
- message and is numbered 1. It can be displayed using the print
- command.
-
- The -e option causes mail not to be printed. Instead, an exit value is
- returned. For the exit status, see RETURN VALUES. You can move among
- the messages by typing a plus sign (+) followed by a number to move
- forward that many messages, or a minus sign (-) followed by a number
- to move backward that many messages.
-
- Disposing of mail. After reading a message you can delete (d) it or
- reply (r) to it. Deleted messages can be undeleted, however, in one of
- two ways: you can use the undelete (u) command and the number of the
- message, or you can end the mail session with the exit (x) command.
- Note that if you end a session with the quit (q) command, you cannot
- retrieve deleted messages.
-
- Specifying messages. Commands such as print and delete can be given a
- list of message numbers as arguments. Thus, the command
- delete 1 2
- deletes messages 1 and 2, while the command
- delete 1-5
- deletes messages 1 through 5. The asterisk (*) addresses all
- messages, and the dollar sign ($) addresses the last message. For
- example, the top command, which prints the first few lines of a
- message, can be used in the following manner to print the first few
- lines of all messages:
- top *
-
- Replying to or originating mail. Use the reply command to respond to a
- message.
-
- Ending a mail processing session. End a mail session with the quit (q)
- command. Unless they were deleted, messages that you have read go to
- your mbox file. Unread messages go back to the mail directory. The -f
- option causes mail to read in the contents of your mbox (or the
- specified file) for processing. When you quit, the mail utility writes
- undeleted messages back to this file. The -u flag is a short way of
- specifying: mail -f /usr/spool/mail/user.
-
- Personal and systemwide distribution lists. You can create a personal
- distribution list that directs mail to a group of people. Such lists can
- be defined by placing a line similar to the following in the .mailrc file
- in your home directory:
- alias cohorts bill ozalp jkf mark kridle@ucbcory
-
- Cohorts is the name of the distribution list that consists of the
- following users: bill, ozalp, jkf, mark, and kridle@ucbcory. A list of
- current aliases can be displayed with the alias (a) command in mail.
-
- System-wide distribution lists can be created by editing
- /usr/lib/aliases. The syntax of system-wide lists differs from that of
- personally defined aliases.
-
- Personal aliases are expanded in mail you send. When a recipient on a
- personally defined mailing list uses the reply (r) option, the entire
- mailing list receives the response automatically. System-wide aliases
- are not expanded when the mail is sent, but any reply returned to the
- machine will have the system-wide alias expanded as all mail goes
- through sendmail.
-
- Options
- -e Causes mail not to be printed. Instead, an exit value is returned.
- -f Causes mail to read in the contents of your mbox file (or another
- file you specify) for processing.
- -i Causes tty interrupt signals to be ignored. This is useful when
- using mail on noisy phone lines.
- -n Inhibits the reading of /usr/lib/mail.rc.
- -s Specifies a subject on the command line. Note that only the
- first argument after the -s flag is used as a subject and that you must
- enclose subjects containing spaces in quotes.
- -u Specifies a short hand for expressing the following: mail -f
- /usr/spool/mail/user
- -v Prints the mail message. The details of delivery are displayed
- on the user's terminal.
-
- The following options can be set in the .mailrc file to alter the
- behavior of the mail command. Each command is typed on a line by
- itself and may take arguments following the command word and the
- command abbreviation. For commands that take message lists as
- arguments, if no message list is given, then the next message forward
- which satisfies the command's requirements is used. If there are no
- messages forward of the current message, the search proceeds
- backwards. If there are no good messages at all, mail cancels the
- command, displaying the message: No applicable messages.
-
- - Prints out the previous message. If given a numeric argument n,
- prints n-th previous message.
- ? Prints a brief summary of commands.
- ! Executes the ULTRIX shell command which follows.
- alias (a) Prints out all currently defined aliases, if given without
- arguments. With one argument, prints out that alias. With more than
- one argument, creates a new or changes an old alias. These aliases are
- in effect for the current mail session only.
- alternates (alt) Informs mail that you have several valid addresses.
- The alternates command is useful if you have accounts on more than
- one machine. When you reply to messages, mail does not send a copy of
- the message to any of the addresses listed on the alternates list. If
- the alternates command is given with no argument, the current set of
- alternate names is displayed.
- chdir (ch) Changes the user's working directory to that specified. If
- no directory is given, then the chdir command changes to the user's
- login directory.
- copy (co) Takes a message list and file name and appends each
- message to the end of the file. The copy command functions in the
- same way as the save command, except that it does not mark the
- messages that you copy for deletion when you quit.
- delete (d) Takes a list of messages as argument and marks them all
- as deleted. Deleted messages are not saved in mbox, nor are they
- available for most other commands.
- dp (or dt) Deletes the current message and prints the next message.
- If there is no next message, mail returns a message: at EOF.
- edit (e) Takes a list of messages and points the text editor at each
- one in turn. On return from the editor, the message is read back in.
- exit (ex or x) Returns to the shell without modifying the user's
- system mailbox, mbox file, or edit file in -f.
- file (fi) Switches to a new mail file or folder. If no arguments are
- given, it tells you which file you are currently reading. If you give it an
- argument, it writes out changes (such as deletions) you have made in
- the current file and reads in the new file. Some special conventions
- are recognized for the name. A pound sign (#) indicates the previous
- file, a percent sign (%) indicates your systemb mailbox, %user indicates
- the user's system mailbox, an ampersand (&) indicates your ~/mbox
- file, and +folder indicates a file in your folder directory.
- folders List the names of the folders in your folder directory.
- folder (fo) Switches to a new mail file or folder. The folder
- command functions in the same way as the file command.
- from (f) Takes a list of messages and prints their message headers
- in the order that they appear in the mail directory, not in the order
- given in the list.
- headers (h) Lists the current range of headers, which is an eighteen-
- message group. If a plus sign (+) is given as an argument, then the next
- message group is printed. If a minus sign (-) is given as an argument,
- the previous message group is printed.
- help Prints a brief summary of commands. Synonymous with ?.
- hold (ho, also preserve) Takes a message list and marks each
- message in it to be saved in the user's system mailbox instead of in
- mbox. The hold command does not override the delete command.
- ignore Adds the list of header fields named to the ignored list.
- Header fields in the ignore list are not printed on your terminal when
- you print a message. This command is frequently used to suppress
- certain machine-generated header fields. The Type and Print commands
- are used to print a message in its entirety, including ignored fields. If
- ignore is executed with no arguments, it lists the current set of
- ignored fields.
- mail(m) Takes login names and distribution group names as
- arguments and sends mail to those people.
- mbox Indicates that a list of messages should be sent to mbox in
- your home directory when you quit. This is the default action for
- messages if you did not set the hold option.
- next (n, + or CR) Goes to the next message in sequence and types it.
- With an argument list, it types the next matching message.
- preserve (pre) Takes a message list and marks each message in it to
- be saved in the user's system mailbox instead of in mbox . Synonymous
- with the hold command.
- print (p) Takes a message list and types out each message on the
- user's terminal, without printing any specified ignored fields.
- Print (P) Prints a message in its entirety, including specified
- ignored fields.
- quit (q) Terminates the session. All undeleted, unsaved messages
- are saved in the user's mbox file in his login directory; all messages
- marked with hold or preserve or that were never referenced are saved
- in his system mailbox; and all other messages are removed from his
- system mailbox.
-
- If new mail arrives during the session, the user receives the message
- "You have new mail." If given while editing a mailbox file with the -f
- flag, then the edit file is rewritten. A return to the Shell is effected,
- unless the rewrite of the edit file fails, in which case the user can
- escape with the exit command.
- reply (r) Takes a message list and sends mail to the sender and all
- recipients of the specified message. The default message must not be
- deleted.
- Reply (R) Replies to originator of the message. Does notreply to
- other recipients of the original message.
- respond Takes a message list and sends mail to the sender and all
- recipients of the specified message. Synonymous with reply.
- save (s) Takes a message list and a file name and appends each
- message to the end of the file. The messages are saved in the order in
- which they appear in the mail directory, not in the order given in the
- message list. The filename, which is enclosed in quotes, followed by
- the line count and character count, is displayed on the user's terminal.
- set (se) Prints all variable values when no arguments are given.
- Otherwise, the set command sets the specified option. Arguments
- either take the form: option=value or option.
- shell (sh) Invokes an interactive version of the shell.
- size Takes a message list and prints out the size (in characters) of
- each message. The size of the messages are printed in the order that
- they appear in the mail directory, not in the order given in the list.
- source (so) Reads mail commands from a file.
- top Takes a message list and prints the top few lines of each. The
- number of lines printed is controlled by the variable toplines and
- defaults to five.
- type (t) Takes a message list and types out each message on the
- user's terminal, without printing any specified ignored fields.
- Synonymous with print.
- Type (T) Prints a message in its entirety, including specified
- ignored fields. Synonymous with Print.
- unalias Takes a list of names defined by alias commands and
- cancels the list of users. The group names no longer have any
- significance.
- undelete (u) Takes a message list and marks each one as not being
- deleted.
- unset Takes a list of option names and discards their remembered
- values; the inverse of set.
- visual (v) Takes a message list and invokes the display editor on
- each message.
- write (w) Takes a message list and a file name and appends each
- message to the end of the file. Synonymous with save.
- xit (x) Returns to the Shell without modifying the user's system
- mailbox, mbox , or edit file in -f. Synonymous with exit.
- z Presents message headers in windowfulls as described under the
- headers command. You can move forward to the next window with the z
- command. Also, you can move to the previous window by using z-.
-
- The following is a summary of the tilde escape functions that you can
- use when composing mail messages. Note that you can only invoke
- these functions from within the body of a mail message and that the
- sequences are only executed if they are placed at the beginning of lines.
- ~!command Executes the indicated shell command, then returns to
- the message.
- ~? Prints a brief summary of tilde commands.
- ~: Executes the mail commands. (For example, the command ~:10
- prints out message number 10 while ~:- prints out the previous
- message.
- ~c name ... Adds the given names to the list of carbon copy
- recipients.
- ~d Reads the file named dead.letter from your home directory into
- the message.
- ~e Invokes the text editor on the message you are typing. After the
- editing session is finished, you may continue appending text to the
- message.
- ~f messages Reads the named messages into the message being
- sent. If no messages are specified, reads in the current message.
- ~h Edits the message header fields by typing each one in turn and
- allowing the user to append text to the end or to modify the field by
- using the current terminal erase and kill characters.
- ~m messages Reads the named messages into the message being
- sent, shifted one tab space to the right. If no messages are specified,
- reads the current message.
- ~p Prints out the message on your terminal, prefaced by the
- message header fields.
- ~q Aborts the message being sent, copying the message to
- dead.letter in your home directory if the save option is set.
- ~r filename Reads the named file into the message.
- ~s string Causes the named string to become the current subject
- field.
- ~t name ... Adds the given names to the direct recipient list.
- ~v Invokes an alternate editor (defined by the VISUAL option)
- on the message. Usually, the alternate editor is a screen editor. After
- you
- quit the editor, you can resume appending text to the end of your
- message.
- ~w filename Writes the message onto the named file.
- ~|command Pipes the message through the command as a filter. If
- the command gives no output or terminates abnormally, retains the
- original text of the message. The command fmt(1) is often used as
- command to rejustify the message.
- ~~string Inserts the string of text in the message prefaced by a
- single tilde (~). If you have changed the escape character, then you
- should double that character in order to send it.
-
- Options are controlled via the set and unset commands. Options may be
- either binary or string. If they are binary you should see whether or not
- they are set; if they are string it is the actual value that is of interest.
-
- The binary options include the following:
-
- append Causes messages saved in mbox to be appended rather than
- prepended. (This is set in /usr/lib/Mail.rc on version 7 systems.)
- ask Causes mail to prompt you for the subject of each message you
- send. If you simply respond with a new line, no subject field is sent.
- askcc Asks you at the end of each message whether you want to
- send a carbon copy of the message to additional recipients. Responding
- with a new line indicates your satisfaction with the current list.
- autoprint Causes the delete command to behave like dp - thus,
- after deleting a message, the next one is typed automatically.
- debug Causes mail to output information useful for debugging mail.
- Setting the binary option debug is the same as specifying -d on the
- command line.
- dot Causes mail to interpret a period alone on a line as the
- terminator of a message you are sending.
- hold Holds messages in the system mailbox by default.
- ignore Causes interrupt signals from your terminal to be ignored
- and echoed as at signs (@).
- ignoreeof Causes mail to refuse to accept a control-d as the end of
- a message.
- msgprompt Prompts you for the message text and indicates how to
- terminate the message.
- metoo Includes the sender in the distribution group receiving a
- mail message.
- nosave Prevents mail from copying aborted messages into the
- dead.letter file in your home directory.
- quiet Suppresses the printing of the version when first invoked.
- verbose Displays the details of each message's delivery on the
- user's terminal. Setting the verbose option is the same as typing -v on
- the command line.
-
- The string options include the following:
-
- EDITOR Pathname of the text editor to use in the edit command and
- ~e escape. If not defined, then a default editor is used.
- SHELL Pathname of the shell to use in the ! command and the ~!
- escape. A default shell is used if this option is not defined.
- VISUAL Pathname of the text editor to use in the visual command
- and ~v escape.
- crt Threshold to determine how long a message must be before
- more is used to read it.
- escape The first character of this option gives the character to use
- in the place of tilde (~) to denote escapes, if defined.
- folder Directory name to use for storing folders of messages. If
- this name begins with a backslash (/) mail considers it an absolute
- pathname; otherwise, the folder directory is found relative to your
- home directory.
- record Pathname of the file used to record all out-going mail. If
- it is not defined, then out-going mail is not so saved.
- toplines The number of lines of a message that is printed out with
- the top command; normally, the first five lines are printed.
-
- RETURN VALUES
-
- If mail is invoked with the -e option, the following exit values are
- returned:
- 0 the user has mail
- 1 the user has no mail
-
- FILES
-
- /usr/spool/mail/* mail directory
- ~/mbox your read mail
- ~/.mailrc file giving initial mail
- commands
- /tmp/R# temporary for editor escape
- /usr/lib/Mail.help* help files
- /usr/lib/Mail.rc system initialization file
- Message* temporary for editing messages
-
-
-
-
-
-
-
- This is the manual entry for the mail utility on the VMS operating
- system, a common electronic mail system. Your site may use other
- electronic mail softwareQ check with your system administrator.
-
- The VMS Personal Mail Utility (MAIL), is used to send messages to
- other users. For a complete description of the VMS Personal Mail
- Utility, including information about the MAIL command and its
- qualifiers, see the VMS Mail Utility Manual.
-
- Format:
-
- MAIL [file-spec] [recipient-name]
-
- Additional information available:
-
- Parameters Command_Qualifiers
- /PERSONAL_NAME /SUBJECT /EDIT /SELF
-
- Examples
-
- MAIL Subtopic? /personal
-
- MAIL
-
- /PERSONAL_NAME
- /PERSONAL_NAME=name
- /NOPERSONAL_NAME
-
- Specifies the personal name to be used when sending a message. This
- qualifier does not override the default personal name; the personal
- name is changed only for the current message. Specifying
- /NOPERSONAL_NAME removes the default personal name for the current
- message.
-
- MAIL Subtopic? /subject
-
- MAIL
-
- /SUBJECT
- /SUBJECT=text
-
- Specifies the subject of the message for the heading. If the text
- consists of more than one word, enclose the text in quotation marks
- (").
-
- You must include a file specification on the command line to enable
- this qualifier.
-
- If you omit this qualifier, the message is sent without a subject
- notation.
-
- MAIL Subtopic? /edit
-
- MAIL
-
- /EDIT
-
- /EDIT=[(send,reply=extract,forward)]
-
- Sets the default to /EDIT for the SEND, REPLY, and FORWARD commands.
-
- MAIL Subtopic? /self
-
- MAIL
-
- /SELF
-
- /SELF
-
- Sends a copy of the message containing the file specification on the
- command line back to you.
-
- MAIL Subtopic? exam
-
- MAIL
-
- Examples
-
- 1. $ MAIL
- MAIL>
-
- This MAIL command invokes MAIL to process commands interactively.
-
- 2. $ MAIL/SUBJECT="New Project" PROJECT.DOC JONES,SMITH,ADAMS
-
- This MAIL command specifies that the file named PROJECT.DOC is to be
- sent to users JONES, SMITH, and ADAMS, with a subject description of
- New Project in the heading.
-
- 3. $ MAIL/SUBJECT="Vacation Policy Change" NEWSLETTR "@USERS"
-
- This MAIL command invokes MAIL to send the file NEWSLETTR.TXT to all
- the users named in the file USERS.DIS. The subject description is
- Vacation Policy Change.
-
- RCCA> mail
- You have 1 new message.
-
- MAIL> dir
-
- NEWMAIL
- # From Date Subject
-
- 1 IN%"RBEAUPRE@ccr2.bb 22-AUG-1990 END OF SHIFT
-
- MAIL> send
- To: mlbanker
- Subj: test
- Enter your message below. Press CTRL/Z when complete, or CTRL/C to
- quit:
- this is a test message
-
- MAIL> read
-
- #1 22-AUG-1990 11:51:41.03 NEWMAIL
- From: IN%"RBEAUPRE@ccr2.bbn.com" "Ray Beaupre"
- To: TURNOVER@mikey.bbn.com
- CC:
- Subj: END OF SHIFT
-
- From: Ray Beaupre <RBEAUPRE@ccr2.bbn.com>
- Subject: END OF SHIFT
- To: TURNOVER@mikey.bbn.com
- X-VMS-To: TURNOVER
-
- Worked in Building 20 with Max Stepp last night in the 7th Floor Lab. I
- was trained on the following Building 20 systems.
-
- MAIL> delete 1
-
- MAIL> exit
- %MAIL-I-RECLPLSWAIT, reclaiming deleted file space. Please wait...
-
-
-
-
-
-
-
-
- VMS Mail Utility Manual
-
-
-
-
-
-
-
-
-
-
-
- mail(1)
-
- NAME
- mail - send or read mail
-
- SYNTAX
- mail [-v] [-i] [-n] [-e] [-s subject] [user...]
- mail [-v] [-i] [-n] -f [name]
- mail [-v] [-i] [-n] -u user
- mail nodename::username (If DECnet is installed.)
-
- DESCRIPTION
- The mail utility is an intelligent mail processing system which has
- a command syntax similar to ed. However, in mail lines are replaced by
- messages. If DECnet is installed on your system, you can also send and
- receive mail from other DECnet users.
-
- Sending mail. To send a message to one or more persons, type mail
- and the names of the people to receive your mail.
- Press the RETURN key. You are then prompted for a subject.
- After entering a subject, and pressing the RETURN key, type your
- message. To send the message, type on a blank line.
-
- You can use tilde (~) escape sequences to perform special functions
- when composing mail messages. See the list of options for more on
- tilde escape sequences.
-
- Reading mail. In normal usage mail is given no arguments and
- checks your mail out of the mail directory. Then it prints out a one line
- header of each message there. The current message is initially the
- first message and is numbered 1. It can be displayed using the print
- command.
-
- The -e option causes mail not to be printed. Instead, an exit value is
- returned. For the exit status, see RETURN VALUES. You can move among
- the messages by typing a plus sign (+) followed by a number to move
- forward that many messages, or a minus sign (-) followed by a number
- to move backward that many messages.
-
- Disposing of mail. After reading a message you can delete (d) it or
- reply (r) to it. Deleted messages can be undeleted, however, in one of
- two ways: you can use the undelete (u) command and the number of the
- message, or you can end the mail session with the exit (x) command.
- Note that if you end a session with the quit (q) command, you cannot
- retrieve deleted messages.
-
- Specifying messages. Commands such as print and delete can be
- given a list of message numbers as arguments. Thus, the command
- delete 1 2
- deletes messages 1 and 2, while the command
- delete 1-5
- deletes messages 1 through 5. The asterisk (*) addresses all
- messages, and the dollar sign ($) addresses the last message. For
- example, the top command, which prints the first few lines of a
- message, can be used in the following manner to print the first few
- lines of all messages:
- top *
-
- Replying to or originating mail. Use the reply command to respond
- to a message.
-
- Ending a mail processing session. End a mail session with the quit
- (q) command. Unless they were deleted, messages that you have read go
- to your mbox file. Unread messages go back to the mail directory. The -
- f option causes mail to read in the contents of your mbox (or the
- specified file) for processing. When you quit, the mail utility writes
- undeleted messages back to this file. The -u flag is a short way of
- specifying: mail -f /usr/spool/mail/user.
-
- Personal and systemwide distribution lists. You can create a
- personal distribution list that directs mail to a group of people. Such
- lists can be defined by placing a line similar to the following in the
- .mailrc file in your home directory:
- alias cohorts bill ozalp jkf mark kridle@ucbcory
- Cohorts is the name of the distribution list that consists of the
- following users: bill, ozalp, jkf, mark, and kridle@ucbcory. A list of
- current aliases can be displayed with the alias (a) command in mail.
-
- System-wide distribution lists can be created by editing
- /usr/lib/aliases. The syntax of system-wide lists differs from that of
- personally defined aliases.
-
- Personal aliases are expanded in mail you send. When a recipient on
- a personally defined mailing list uses the reply (r) option, the entire
- mailing list receives the response automatically. System-wide aliases
- are not expanded when the mail is sent, but any reply returned to the
- machine will have the system-wide alias expanded as all mail goes
- through sendmail.
-
- OPTIONS
- -e Causes mail not to be printed. Instead, an exit value is returned.
- -f Causes mail to read in the contents of your mbox file (or another
- file you specify) for processing.
- -i Causes tty interrupt signals to be ignored. This is useful when
- using mail on noisy phone lines.
- -n Inhibits the reading of /usr/lib/mail.rc.
- -s Specifies a subject on the command line. Note that only the
- first argument after the -s flag is used as a subject and that you must
- enclose subjects containing spaces in quotes.
- -u Specifies a short hand for expressing the following:
- mail -f /usr/spool/mail/user
- -v Prints the mail message. The details of delivery are displayed
- on the user's terminal.
-
- The following options can be set in the .mailrc file to alter the
- behavior of the mail command. Each command is typed on a line by
- itself and may take arguments following the command word and the
- command abbreviation. For commands that take message lists as
- arguments, if no message list is given, then the next message forward
- which satisfies the command's requirements is used. If there are no
- messages forward of the current message, the search proceeds
- backwards. If there are no good messages at all, mail cancels the
- command, displaying the message: No applicable messages.
-
- - Prints out the previous message. If given a numeric
- argument n, prints n-th previous message.
- ? Prints a brief summary of commands.
- ! Executes the ULTRIX shell command which follows.
- alias (a) Prints out all currently defined aliases, if given without
- arguments. With one argument, prints out that alias. With more than
- one argument, creates a new or changes an old alias. These aliases are
- in effect for the current mail session only.
- alternates (alt) Informs mail that you have several valid addresses.
- The alternates command is useful if you have accounts on more than
- one machine. When you reply to messages, mail does not send a copy of
- the message to any of the addresses listed on the alternates list. If
- the alternates command is given with no argument, the current set of
- alternate names is displayed.
- chdir (ch) Changes the user's working directory to that specified. If
- no directory is given, then the chdir command changes to the user's
- login directory.
- copy (co) Takes a message list and file name and appends each
- message to the end of the file. The copy command functions in the
- same way as the save command, except that it does not mark the
- messages that you copy for deletion when you quit.
- delete (d) Takes a list of messages as argument and marks them all
- as deleted. Deleted messages are not saved in mbox, nor are they
- available for most other commands.
- dp (or dt) Deletes the current message and prints the next message.
- If there is no next message, mail returns a message: at EOF.
- edit (e) Takes a list of messages and points the text editor at each
- one in turn. On return from the editor, the message is read back in.
- exit (ex or x) Returns to the shell without modifying the user's
- system mailbox, mbox file, or edit file in -f.
- file (fi) Switches to a new mail file or folder. If no arguments are
- given, it tells you which file you are currently reading. If you give it an
- argument, it writes out changes (such as deletions) you have made in
- the current file and reads in the new file. Some special conventions
- are recognized for the name. A pound sign (#) indicates the previous
- file, a percent sign (%) indicates your systemb mailbox, %user indicates
- the user's system mailbox, an ampersand (&) indicates your ~/mbox
- file, and +folder indicates a file in your folder directory.
- folders List the names of the folders in your folder directory.
- folder (fo) Switches to a new mail file or folder. The folder
- command functions in the same way as the file command.
- from (f) Takes a list of messages and prints their message
- headers in the order that they appear in the mail directory, not in the
- order given in the list.
- headers (h) Lists the current range of headers, which is an eighteen-
- message group. If a plus sign (+) is given as an argument, then the next
- message group is printed. If a minus sign (-) is given as an argument,
- the previous message group is printed.
- help Prints a brief summary of commands. Synonymous with ?.
- hold (ho, also preserve) Takes a message list and marks each
- message in it to be saved in the user's system mailbox instead of in
- mbox. The hold command does not override the delete command.
- ignore Adds the list of header fields named to the ignored list.
- Header fields in the ignore list are not printed on your terminal when
- you print a message. This command is frequently used to suppress
- certain machine-generated header fields. The Type and Print commands
- are used to print a message in its entirety, including
- ignored fields. If ignore is executed with no
- arguments, it lists the current set of ignored fields.
- mail(m) Takes login names and distribution group names as
- arguments and sends mail to those people.
- mbox Indicates that a list of messages should be sent to mbox in
- your home directory when you quit. This is the default action for
- messages if you did not set the hold option.
- next (n, + or CR) Goes to the next message in sequence and types it.
- With an argument list, it types the next matching message.
- preserve (pre) Takes a message list and marks each message in it to
- be saved in the user's system mailbox instead of in mbox . Synonymous
- with the hold command.
- print (p) Takes a message list and types out each message on the
- user's terminal, without printing any specified ignored fields.
- Print (P) Prints a message in its entirety, including specified
- ignored fields.
- quit (q) Terminates the session. All undeleted, unsaved messages
- are saved in the user's mbox file in his login directory; all messages
- marked with hold or preserve or that were never referenced are saved
- in his system mailbox; and all other messages are removed from his
- system mailbox.
- If new mail arrives during the session, the user receives the
- message: You have new mail. If given while editing a mailbox file with
- the -f flag, then the edit file is rewritten. A return to the Shell is
- effected, unless the rewrite of the edit file fails, in which case the
- user can escape with the exit command.
- reply (r) Takes a message list and sends mail to the sender and all
- recipients of the specified message. The default message must not be
- deleted.
- Reply (R) Replies to originator of the message. Does notreply to
- other recipients of the original message.
- respond Takes a message list and sends mail to the sender and all
- recipients of the specified message. Synonymous with reply.
- save (s) Takes a message list and a file name and appends each
- message to the end of the file. The messages are saved in the order in
- which they appear in the mail directory, not in the order given in the
- message list. The filename, which is enclosed in quotes, followed by
- the line count and character count, is displayed on the user's terminal.
- set (se) Prints all variable values when no arguments are given.
- Otherwise, the set command sets the specified option. Arguments
- either take the form
- option=value
- or
- option
- shell (sh) Invokes an interactive version of the shell.
- size Takes a message list and prints out the size (in characters) of
- each message. The size of the messages are printed in the order that
- they appear in the mail directory, not in the order given in the list.
- source (so) Reads mail commands from a file.
- top Takes a message list and prints the top few lines of each. The
- number of lines printed is controlled by the variable toplines and
- defaults to five.
- type (t) Takes a message list and types out each message on the
- user's terminal, without printing any specified ignored fields.
- Synonymous with print.
- Type (T) Prints a message in its entirety, including specified
- ignored fields. Synonymous with Print.
- unalias Takes a list of names defined by alias commands and
- cancels the list of users. The group names no longer have any
- significance.
- undelete (u) Takes a message list and marks each one as not being
- deleted.
- unset Takes a list of option names and discards their remembered
- values; the inverse of set.
- visual (v) Takes a message list and invokes the display editor on
- each message.
- write (w) Takes a message list and a file name and appends each
- message to the end of the file. Synonymous with save.
- xit (x) Returns to the Shell without modifying the user's system
- mailbox, mbox , or edit file in -f. Synonymous with exit.
- z Presents message headers in windowfulls as described
- under the headers command. You can move forward to the next window
- with the z command. Also, you can move to the previous window by
- using z-.
-
- The following is a summary of the tilde escape functions that you
- can use when composing mail messages. Note that you can only invoke
- these functions from within the body of a mail message and that the
- sequences are only executed if they are placed at the beginning of lines.
- ~!command Executes the indicated shell command, then returns to
- the message.
- ~? Prints a brief summary of tilde commands.
- ~: Executes the mail commands. (For example, the command
- ~:10 prints out message number 10 while ~:- prints out the previous
- message.
- ~c name ... Adds the given names to the list of carbon copy
- recipients.
- ~d Reads the file named dead.letter from your home directory
- into the message.
- ~e Invokes the text editor on the message you are typing.
- After the editing session is finished, you may continue appending text
- to the message.
- ~f messages Reads the named messages into the message being
- sent. If no messages are specified, reads in the current message.
- ~h Edits the message header fields by typing each one in turn
- and allowing the user to append text to the end or to modify the field by
- using the current terminal erase and kill characters.
- ~m messages Reads the named messages into the message being
- sent, shifted one tab space to the right. If no messages are specified,
- reads the current message.
- ~p Prints out the message on your terminal, prefaced by the
- message header fields.
- ~q Aborts the message being sent, copying the message to
- dead.letter in your home directory if the save option is set.
- ~r filename Reads the named file into the message.
- ~s string Causes the named string to become the current subject
- field.
- ~t name ... Adds the given names to the direct recipient list.
- ~v Invokes an alternate editor (defined by the VISUAL option)
- on the message. Usually, the alternate editor is a screen editor. After
- you
- quit the editor, you can resume appending text
- to the end of your message.
- ~w filename Writes the message onto the named file.
- ~|command Pipes the message through the command as a filter. If
- the command gives no output or terminates abnormally, retains the
- original text of the message. The command fmt(1) is often used as
- command to rejustify the message.
- ~~string Inserts the string of text in the message prefaced by a
- single tilde (~). If you have changed the escape character, then you
- should double that character in order to send it.
-
- Options are controlled via the set and unset commands. Options may
- be either binary or string. If they are binary you should see whether or
- not they are set; if they are string it is the actual value that is of
- interest.
-
- The binary options include the following:
-
- append Causes messages saved in mbox to be appended rather
- than prepended. (This is set in /usr/lib/Mail.rc on version 7 systems.)
- ask Causes mail to prompt you for the subject of each
- message you send. If you simply respond with a new line, no subject
- field is sent.
- askcc Asks you at the end of each message whether you want
- to send a carbon copy of the message to additional recipients.
- Responding with a new line indicates your satisfaction with the
- current list.
- autoprint Causes the delete command to behave like dp - thus,
- after deleting a message, the next one is typed automatically.
- debug Causes mail to output information useful for debugging
- mail. Setting the binary option debug is the same as specifying -d on
- the command line.
- dot Causes mail to interpret a period alone on a line as the
- terminator of a message you are sending.
- hold Holds messages in the system mailbox by default.
- ignore Causes interrupt signals from your terminal to be
- ignored and echoed as at signs (@).
- ignoreeof Causes mail to refuse to accept a control-d as the end
- of a message.
- msgprompt Prompts you for the message text and indicates how
- to terminate the message.
- metoo Includes the sender in the distribution group receiving a
- mail message.
- nosave Prevents mail from copying aborted messages into the
- dead.letter file in your home directory.
- quiet Suppresses the printing of the version when first
- invoked.
- verbose Displays the details of each message's delivery on the
- user's terminal. Setting the verbose option is the same as typing -v on
- the command line.
-
- The string options include the following:
-
- EDITOR Pathname of the text editor to use in the edit command
- and ~e escape. If not defined, then a default editor is used.
- SHELL Pathname of the shell to use in the ! command and the ~!
- escape. A default shell is used if this option is not defined.
- VISUAL Pathname of the text editor to use in the visual
- command and ~v escape.
- crt Threshold to determine how long a message must be
- before more is used to read it.
- escape The first character of this option gives the character to
- use in the place of tilde (~) to denote escapes, if defined.
- folder Directory name to use for storing folders of messages.
- If this name begins with a backslash (/) mail considers it an absolute
- pathname; otherwise, the folder directory is found relative to your
- home directory.
- record Pathname of the file used to record all out-going mail.
- If it is not defined, then out-going mail is not so saved.
- toplines The number of lines of a message that is printed out
- with the top command; normally, the first five lines are printed.
-
- RETURN VALUES
- If mail is invoked with the -e option, the following exit values are
- returned:
- 0 the user has mail
- 1 the user has no mail
-
- FILES
- /usr/spool/mail/* mail directory
- ~/mbox your read mail
- ~/.mailrc file giving initial mail commands
- /tmp/R# temporary for editor escape
- /usr/lib/Mail.help* help files
- /usr/lib/Mail.rc system initialization file
- Message* temporary for editing messages
-
-
- To invoke the message program your system uses, you would type the
- command's name (for this example, we are using mail, which is used on
- UNIX BSD systems). Add the address(es) of the recipient(s). (This
- example message is going to two people.) Then press return.
-
- --> mail carver@herhost.org glynn@hishost.edu
-
- You are then prompted to enter a subject.
- After entering a subject, press return.
-
- --> mail carver@herhost.org glynn@hishost.edu
- Subject: Proposal
-
- Then you can type a message.
-
- --> mail carver@herhost.org glynn@hishost.edu
- Subject: Proposal
- Hi Sue and Ed,
- Haven't heard from you two about the report
- draft. Have you finished reviewing it yet?
- Please pay particular attention to the sampling
- strategy described in Chapter 3.
-
- Thanks,
- Ben
-
- To send a message using this system, you would type a blank line.
-
- -->
-
- To read mail using mail on a UNIX system, type mail and press return.
- You will see the sender and subject of each message you have received.
-
- 3 carver@herhost.org Re: Report
- -->
-
- To display a message on the screen, type print.
-
-
- --> print 3
- Received: from herhost.org by nnsc.nsf.net id
- From: Susan Carver <carver@herhost.org>
- Date: Weds, 10 Oct 90 10:41:37 EDT
- Ben,
- So far I have only minor changes--it looks
- good! I should be finished tomorrow.
- Sue
- -->
-
- You can reply to a message by typing r.
-
- --> print 3
- Received: from herhost.org by nnsc.nsf.net id
- From: Susan Carver <carver@herhost.org>
- Date: Weds, 10 Oct 90 10:41:37 EDT
- Ben,
- So far I have only minor changes--it looks
- good! I should be finished tomorrow.
- Sue
- -->
-
- To delete it, type d .
-
- -->
-
- You can move among your messages by typing a plus sign (+) followed
- by a numberQyou will move forward that many messages.
- Or type a minus sign (-) followed by a number to move backward that
- many messages.
-
- Message 1
- Received: from nnsc@nsf.net by labs.bbn.com id
- From: Ed Glynn <glynn@hishost.edu>
- Date: Weds, 10 Oct 90 12:51:39 EDT
- Ben,
- I think it's fine except that I think the
- budget for film is too low by 20%.
- Ed
- -->
-
- Commands such as print and delete can be given a list of message
- numbers to act upon. In UNIX mail, the command delete 1 2 deletes
- messages 1 and 2, while the command delete 1-5 deletes messages 1
- through 5. (Click the arrow to continue.)
-
- Received: from nnsc@nsf.net by labs.bbn.com id
- From: Ed Glynn <glynn@hishost.edu>
- Date: Weds, 10 Oct 90 12:51:39 EDT
- Ben,
- I think it's fine except that I think the
- budget for film is too low by 20%.
- Ed
- -->
-
- You can quit in two ways:
- (1) by typing q. You will not be able to retrieve deleted messages.
- Messages that you have read but not deleted will go to your "mbox" file.
- (2) by typing x. This leaves your messages unchanged; deleted
- messages can be retrieved.
- (End of Sample Session)
-
-
- Interest Groups
-
- Network interest groups include
- bulletin boards ("bboards") and mailing lists. Messages are distributed
- to people who share an interest but may not know each other. Ask your
- system administrator what groups are available to you.
-
- Three important, organized sources of
- interest groups are available to people who can exchange mail with the
- Internet: Internet mailing lists, BITNET LISTSERV, and USENET news.
- There is a lot of overlap between them.
-
- See Net Etiquette for some guidelines for using interest groups
- successfully.
-
- Each Internet mailing list has a moderator or coordinator. You must ask
- to be put on the list by sending an electronic mail message to the
- moderator. Internet mailing lists are not highly automated. The only
- problem is how to distinguish the moderator from the list.
-
- A list of Internet mailing lists (about five hundred kilobytes in size) is
- available by anonymous FTP from the Internet host nisc.sri.com at SRI
- International, Menlo Park, California. Use these commands:
-
- cd netinfo
- get interest-groups
-
- The interest-groups list is also available by
- electronic mail from the CSNET Info-Server. (The file will be split into
- messages of less than fifty kilobytes when sent to you.) Send a
- message to info-server@sh.cs.net with the following text:
-
- request: info
- topic: interest-groups
-
- BITNET LISTSERV is a highly automated program that automatically
- sends electronic mail messages and subscribes and unsubscribes users
- in response to formatted messages. LISTSERV programs run on many
- BITNET hosts. A subscribe message can be sent to any LISTSERV
- programQit will be forwarded to the correct host. For a complete list
- of LISTSERV lists, send the command list global to any LISTSERV.
-
- Telnet is a program that allows a computer user at one site to work on
- a computer at another site. It is the Internet standard protocol for
- remote terminal connection service.
-
- Telnet requires Internet access (that is, you must be on a network that
- gateways to the Internet). Unlike FTP and electronic mail, telnet
- exposes you to the commands and programs of the remote host.
-
- For example, you can use the telnet command to run a program in your
- directory on a supercomputer hundreds of miles away.
-
- Remote LoginQTelnet
-
- Telnet is a program that allows a computer user at one site to work on
- a computer at another site. It is the Internet standard protocol for
- remote terminal connection service.
-
- Telnet requires Internet access, that is, you must be on a TCP/IP
- network that gateways to the Internet. Unlike FTP and electronic mail,
- Telnet actually exposes you to the commands and programs of the
- remote host.
-
- For example, you can use the telnet command to run a program in your
- directory on a supercomputer hundreds of miles away.
-
- In most cases, the traveller must make arrangements beforehand to use
- telnet on a remote host. Some interactive programs allow any network
- traveller to log in with no password or a password that is advertised.
- Sometimes the password is "anonymous" and the password can be
- "guest." The type of activity allowed with anonymous telnet is
- restricted.
- Telnet Manual for UNIX
-
- This is the UNIX (see BSD) manual entry for telnet.
-
- telnet - user interface to the TELNET protocol
-
- Syntax: telnet [host[port]]
-
- The telnet interface is used to communicate with another host using
- the TELNET protocol. If telnet is invoked without arguments, it enters
- command mode, which is indicated by the prompt, telnet>. In this mode,
- telnet accepts and executes the commands listed below. If it is
- invoked with arguments, it performs an open command (see below) with
- those arguments.
-
- Once a connection is opened, telnet enters input mode. The input mode
- is either character-at-a-time or line-by-line, depending on what the
- remote system supports. In character-at-a-time mode, text is sent to
- the remote host as it is typed. In line-by-line mode, text is echoed
- locally and only completed lines are sent to the remote host. The
- local-echo-character, initially ^E. turns the local echo on and off,
- which is useful when you want to enter passwords without them
- echoing to the screen.
- In either mode, if the localchars toggle is true (the default in line
- mode), then the user's quit, intr, and flush characters are trapped
- locally and sent as TELNET protocol sequences to the remote side.
- Options such as toggle autoflush and toggle autosynch flush previous
- terminal input, as in quit and intr, in additon to flushing subsequent
- output to the terminal until the remote host acknowledges the TELNET
- sequence.
-
- To issue telnet commands when in input mode, precede them with the
- telnet escape character, initially the control character followed by a
- right bracket (^]). When in command mode, use the normal terminal
- editing conventions.
-
- The following commands are available:
-
- open host [ port ] Opens a connection to the named host. If the no port
- number is specified, telnet attempts to contact a TELNET server at the
- default port. The host specification may be either a host name or an
- Internet address specified in the dot notation. For further information,
- see hosts(5) and inet(3n).
-
- close Closes a TELNET session and returns to command mode.
-
- quit Closes any open TELNET session and exits telnet.
-
- z Suspends TELNET. This command only works when the user is using
- the csh(1).
-
- mode type The type is either line, for line-by-line mode, or character,
- for character-at-a-time mode. The local host asks the remote host for
- permission to go into one or the other mode. The remote host enters the
- requested mode if it is capable of it.
-
- status Shows the current status of telnet. This includes the peer one
- is connected to, as well as the state of debugging.
-
- display [ argument... ] Displays all, or some, of the set and toggle
- values (see below).
-
- ? [ command ] Accesses on-line help. With no arguments, telnet prints
- a help summary. If a command is specified, TELNET prints the help
- information for that command.
-
- send argument(s) Sends one or more special character sequences to the
- remote host. One or more of the following arguments can be specified:
-
- escape Sends the current telnet escape character (initially the control
- character followed by a right bracket, ^]).
-
- synch Sends the TELNET SYNCH sequence. This sequence causes the
- remote system to discard input that was previously entered but that it
- has not yet read. This sequence is sent as TCP urgent data and may not
- work if the remote system is a 4.2 BSD system. If it does not work, a
- lower case r may be echoed on the terminal screen.
-
- brk Sends the TELNET BRK (Break) sequence, which may have
- significance to the remote system.
-
- ip Sends the TELNET IP (Interrupt Process) sequence, which causes the
- remote system to abort the currently running process.
- ao Sends the TELNET AO (Abort Output)sequence, which causes the
- remote system to flush all output from the remote system to the user's
- terminal.
-
- ayt Sends the TELNET AYT (Are You There) sequence. The remote
- system may or may not respond.
-
- ec Sends the TELNET EC (Erase Character) sequence, which causes the
- remote system to erase the last character entered.
-
- el Sends the TELNET EL (Erase Line) sequence, which causes the remote
- system to erase the line currently being entered.
-
-
- ga Sends the TELNET GA (Go Ahead) sequence. Often this sequence has
- no significance to the remote system.
-
- nop Sends the TELNET NOP (No OPeration) sequence.
-
- ? Prints out help information for the send command.
-
- set argument value Sets a telnet variable to a specific value. The off
- value turns off the function associated with the variable. The current
- values of variables can be displayed with the display command. The
- following variables that can be specified:
-
- echo Toggles between local echoing of entered characters, and
- suppressing echoing of entered characters when in line-by-line mode.
- The value is initially ^E.
-
- escape Enters the telnet command mode when you are connected to a
- remote system. The value is initially the control character followed by
- a left bracket (^[).
-
- interrupt Sends a TELNET IP sequence (see send ip above) to the remote
- host if telnet is in localchars mode (see toggle localchars below) and
- the interrupt character is typed. The initial value for the interrupt
- character is the terminal's intr character.
-
- quit Sends a TELNET BRK sequence (see send brk above) to the remote
- host if telnet is in localchars mode (see toggle localchars below) and
- the quit character is yped. The initial value for the quit character is
- the terminal's quit character.
-
- flushoutput Sends a TELNET AO sequence (see send ao above) to the
- remote host if telnet is in localchars mode (see toggle localchars
- below) and the flushoutput character is typed. The initial value for the
- flush character is the terminal's flush character.
-
- erase Sends a TELNET EC sequence (see send ec above) to the remote
- system if telnet is in localchars mode (see toggle localchars below),
- and if telnet is operating in character-at-time mode. The initial value
- for the erase character is the terminal's erase character.
-
- kill Sends a TELNET EL sequence (see send el above) to the remote
- system if telnet is in localchars mode (see toggle localchars below)
- and if telnet is operating in character-at-a-time mode. The initial
- value for the kill character is the terminal's kill character.
-
- eof Sends this character to the remote system if telnet is operating in
- line-by-line mode and this character is entered as the first character
- on a line. The initial value of the eof character is the terminal's eof
- character.
-
- toggle arguments . . . Toggles (between true and false) flags that
- control how telnet responds to events. More than one argument may be
- specified and the current value of these flags can be displayed with the
- display command. Valid arguments for the toggle command are the
- following:
-
- localchars Causes the flush, interrupt, quit, erase, and kill
- characters to be recognized locally and transformed into appropriate
- TELNET control sequences if this flag is set to true. (See set above).
- The appropriate TELNET control sequences are: ao, ip, brk, ec, and el,
- respectively. For more information see the send command. The initial
- value for this toggle is true in line-by-line mode, and false in
- character at-a-time mode.
-
- autoflush Causes the telnet command to not display any data on the
- user's terminal until the remote system acknowledges (via a TELNET
- Timing Mark option) that it recognized and processed the following
- TELNET sequences: ao, intr, or quit. Both autoflush and localchars must
- be true for autoflush to work in this manner. The initial value for this
- toggle is true if the terminal user did not specify stty noflsh.
- Otherwise it is false. For further information, see stty(1).
-
- autosynch Causes the TELNET SYNCH sequence to follow the TELNET
- sequence that is initiated when either the intr or quit character is
- typed. The autosynch flag works in this manner when both the
- autosynch and localchars are true. This procedure should cause the
- remote system to begin throwing away all previously typed input until
- both of the TELNET sequences have been read and acted upon. The
- initial value of this toggle is false.
-
- crmod Toggles carriage return mode. When this mode is enabled, most
- carriage return characters received from the remote host are mapped
- into a carriage return followed by a line feed. It is useful only when
- the remote host sends carriage returns but never line feeds. The initial
- value for this toggle is False.
-
- debug Toggles socket level debugging which is useful only to the
- superuser. The initial value for this toggle is false.
-
- options Toggles the display of internal telnet protocol processing that
- deals with TELNET options. The initial value for this toggle is false.
-
- netdata Toggles the display of all network data (in hexadecimal
- format). The initial value for this toggle is false.
-
- ? Displays the legal toggle commands.
-
- Restrictions In line-by-line mode, the terminal's EOF character is only
- recognized and sent to the remote system when it is the first character
- on a line.
-
- Telnet
-
- -->
-
- Type telnet followed by the name of the host that you want to access.
- If the connection is successful, you will see a message to that effect
- from telnet, followed by the opening screen provided by the remote
- host, in this case the Boston University library catalog.
-
- WELCOME TO THE BOSTON
- UNIVERSITY LIBRARIES
- AND TO TOMUS
- THE ONLINE CATALOG
-
- -->
-
- You are now connected to the remote host, so you must use commands
- that are understood by that system.
-
- --> find author twain
- Your search:FIND AUTHOR TWAIN
- Items found:197 at ALL BOSTON UNIVERSITY LIBRARIES
- Press RETURN to see them, or type HELP, then press the key marked
- RETURN.
-
- ->
-
- Leave the remote host by using the host's quit command (in this case
- that command happens to be quit), or by using your system's telnet
- "escape" keys. You may have been told what this is when you first
- entered telnet (control-] may work).
-
- (End of sample session.)
-
- File Transfer
-
- % File Transfer Protocol (FTP)
-
- % Downloading Macintosh Files
-
- The File Transfer Protocol (FTP) is the Internet standard protocol for
- moving files from one computer to another. You can use the ftp
- command to copy computer files containing a variety of kinds of
- information, such as software, documentation, or maps. FTP is the
- name not only of the protocol, but usually also of the program the user
- invokes to execute it (e.g., by typing ftp host.bbn.com). FTP is available
- on several operating systems.
-
- File Transfer Protocol (FTP)
-
- Anonymous FTP, like Telnet, requires access to the Internet . Unlike
- Telnet, anonymous FTP is widely available. Anyone can become an
- Internet traveller by giving the command ftp host, for example, ftp
- cs.fredonia.edu. When the remote host prompts with login: and
- password: (or something similarQdetails vary on different types of
- computers) the traveller types "anonymous" for the login name and
- "guest" for the password.
-
- After logging in, the traveller remains in a program with a restricted
- set of commands. Files on the remote host are usually protected so
- that visitors cannot change or delete them.
-
- Manual for FTP under UNIX
-
- This is the UNIX (see BSD) manual entry for ftp.
-
- ftp - file transfer program
-
- Syntax: ftp [-v] [-d] [-i] [-n] [-g] [host]
-
- The ftp command is the user interface to the ARPANET standard File
- Transfer Protocol. The program allows a user to transfer files to and
- from a remote network site.
-
- The client host with which ftp is to communicate may be specified on
- the command line. If the client host is specified on the command line,
- ftp immediately attempts to establish a connection to an FTP server on
- that host; otherwise, ftp enters its command interpreter and awaits
- instructions from the user. While ftp is awaiting commands from the
- user, it provides the user with the prompt: ftp>.
- The following commands are recognized by ftp:
-
- ! Invokes a shell on the local machine.
-
- $ macro-name [ args ] Executes the macro macro-name that was
- defined with the macdef command. Arguments are passed to the macro
- unglobbed.
-
- account [ passwd ] Supplies a supplemental password required by a
- remote system for access to resources once a login has been
- successfully completed. If no argument is included, the user is
- prompted for an account password in a non-echoing input mode.
-
- append local-file [ remote-file ] Appends a local file to a file on the
- remote machine. If remote-file is not specified, the local file name is
- used in naming the remote file. File transfer uses the current settings
- for type, format, mode, and structure.
-
- ascii Sets the file transfer type to network ASCII. This is the default
- type.
-
- bell Arranges for a bell to sound after each file transfer command is
- completed.
-
- binary Sets the file transfer type to support binary image transfer.
-
- bye Terminates the FTP session with the remote server and exits ftp.
-
- case Toggles the remote computer's file name case mapping during
- mget commands. When case is on (default is off), the remote
- computer's file names are written in the local directory with all
- letters in upper case mapped to lower case.
-
- cd remote-directory Changes the working directory on the remote
- machine to remote-directory.
-
- cdup Changes the remote machine working directory to the parent of
- the current remote machine working directory.
-
- close Terminates the FTP session with the remote server and returns
- to the command interpreter.
-
- cr Toggles the carriage return stripping during ascii type file
- retrieval. Records are denoted by a carriage return/linefeed sequence
- during ascii type file transfer. When cr is on (the default), carriage
- returns are stripped from this sequence to conform with the UNIX
- single linefeed record delimiter. Records on non-UNIX remote systems
- may contain single linefeeds; when an ascii type transfer is made,
- these linefeeds may be distinguished from a record delimiter only when
- cr is off.
- delete remote-file Deletes the file remote-file on the remote machine.
-
- debug [ debug-value ] Toggles the debugging mode. If an optional
- debug-value is specified, it is used to set the debugging level. When
- debugging is on, ftp prints each command sent to the remote machine,
- preceded by the string q-->.
-
- dir [ remote-directory ] [ local-file ] Prints a listing of the directory
- contents in the directory, remote directory, and, optionally, places the
- output in local file. If no directory is specified, the current working
- directory on the remote machine is used. If no local file is specified,
- output comes to the terminal.
- disconnect A synonym for close.
-
- form format Sets the file transfer form to format. The default
- format is file.
- get remote-file [ local-file ] Retrieves the remote-file and stores it
- on the local machine. If the local filename is not specified, it is given
- the same name it has on the remote machine. The current settings for
- type, form, mode, and structure are used while transferring the file.
- hash Toggles the hash-sign (#) printing for each data block
- transferred. The size of a data block is 1024 bytes.
-
- glob Toggles filename expansion for mdelete, mget, and mput. If
- globbing is turned off with glob, the file name arguments are taken
- literally and not expanded. Globbing for mput is done as in csh(1). For
- mdelete and mget, each remote filename is expanded separately on the
- remote machine and the lists are not merged. Expansion of a directory
- name is likely to be different from expansion of the name of an
- ordinary file. The exact result depends on the foreign operating system
- and ftp server, and can be previewed by entering: mls remote files.
- Neither mget nor mput is meant to transfer entire directory subtrees of
- files. That can be done by transferring a tar(1) archive of the subtree
- (in binary mode).
-
- lcd [ directory ] Changes the working directory on the local machine.
- If no directory is specified, the user's home directory is used.
-
- ls [ remote-directory ] [ local-file ] Prints an abbreviated listing of
- the contents of a directory on the remote machine. If remote-directory
- is left unspecified, the current working directory is used. If no local
- file is specified, the output is sent to the terminal.
-
- macdef macro-name Defines a macro. Subsequent lines are stored as
- the macro macro-name; a null line (consecutive newline characters in a
- file or carriage returns from the teminal) terminates macro input
- mode. There is a limit of 16 macros and 4096 total characters in all
- defined macros. Macros remain defined until a close command is
- executed.
-
- The macro processor interprets dollar signs ($) and backslashes (\) as
- special characters. A dollar sign ($) followed by a number (or numbers)
- is replaced by the corresponding argument on the macro invocation
- command line. A dollar sign ($) followed by an i signals the macro
- processor that the executing macro is to be looped. On the first pass,
- $i is replaced by the first argument on the macro invocation command
- line. On the second pass it is replaced by the second argument, and so
- on. A backslash (\) followed by any character is replaced by that
- character. Use the backslash (\) to prevent special treatment of the
- dollar sign ($).
- mdelete remote-files Deletes the specified files on the remote
- machine. If globbing is enabled, the specification of remote files will
- first be expanded using ls.
-
- mdir remote-files local-file Obtains a directory listing of multiple
- files on the remote machine and places the result in local-file.
-
- mget remote-files Retrieves the specified files from the remote
- machine and places them in the current local directory. If globbing is
- enabled, the specification of remote files will first be expanding using
- ls.
-
- mkdir directory-name Makes a directory on the remote machine.
-
- mls remote-files local-file Obtains an abbreviated listing of multiple
- files on the remote machine and places the result in local-file.
-
- mode [ mode-name ] Sets the file transfer mode to mode name. The
- default mode is the stream mode.
-
- mput local-files Transfers multiple local files from the current local
- directory to the current working directory on the remote machine.
-
- nmap [ inpattern outpattern ] Sets or unsets the filename mapping
- mechanism. If no arguments are specified, the filename mapping
- mechanism is unset. If arguments are specified, remote filenames are
- mapped during mput commands and put commands which are issued
- without a specified remote target filename. If arguments are
- specified, local filenames are mapped during mget commands and get
- commands which are issued without a specified local target filename.
-
- This command is useful when connecting to a non-UNIX remote
- computer with different file naming conventions or practices. The
- mapping follows the pattern set by inpattern and outpattern.
-
- Inpattern is a template for incoming filenames (which may have
- already been processed according to the ntrans and case settings).
- Variable templating is accomplished by including the sequences $1, $2,
- ..., $9 in inpattern. Use a backslash (\) to prevent this special
- treatment of the dollar sign ($) character. All other characters are
- treated literally, and are used to determine the nmap inpattern variable
- values. For example, given inpattern $1.$2 and the remote file name
- mydata.data, $1 has the value mydata, and $2 has the value data.
- The outpattern determines the resulting mapped filename. The
- sequences $1, $2, ...., $9 are replaced by any value resulting from the
- inpattern template.
-
- The sequence $0 is replace by the origi nal filename. Additionally, the
- sequence [seq1,seq2] is replaced by seq1 if seq1 is not a null string;
- otherwise it is replaced by seq2. For example, the command nmap
- $1.$2.$3 [$1,$2].[$2,file] yields the output filename myfile.data for
- input filenames myfile.data and myfile.data.old, myfile.file for the
- input filename myfile, and myfile.myfile for the input filename .myfile.
- Spaces may be included in outpattern, as in the exam ple: nmap $1 |sed
- "s/ *$//" > $1 . Use the backslash (\) to prevent special treatment of
- the dollar sign ($), left bracket ([), right bracket (]), and comma (,).
-
- ntrans [ inchars [ outchars ] ] Sets or unsets the filename character
- translation mechanism. If no arguments are specified, the filename
- character translation mechanism is unset. If arguments are specified,
- characters in remote filenames are translated during mput commands
- and put commands which are issued without a specified remote target
- filename. If arguments are specified, characters in local filenames are
- translated during mget commands and get commands which are issued
- without a specified local target filename.
-
- This command is useful when connecting to a non-UNIX remote
- computer with different file naming conventions or prac tices.
- Characters in a filename match ing a character in inchars are replaced
- with the corresponding character in outchars. If the character's
- position in inchars is longer than the length of outchars, the character
- is deleted from the file name.
-
- open host [ port ] Establishes a connection to the speci fied host FTP
- server. If an optional port number is supplied, ftp attempts to contact
- an FTP server at that port. If the auto-login option is on (default), ftp
- automatically attempts to log the user in to the FTP server (see below).
-
- prompt Toggles interactive prompting. Interactive prompting occurs
- during multiple file transfers to allow the user to retrieve or store
- files selectively. If prompting is turned off (default), any mget or
- mput transfers all files.
-
- proxy ftp-command Executes an ftp command on a secondary control
- connection. This command allows simultaneous connection to two
- remote ftp servers for transferring files between the two servers. The
- first proxy command should be an open, to establish the secondary
- control connection. Type the command proxy? to see other ftp
- commands executable on the secondary connection. The following
- commands behave differently when prefaced by proxy:
-
- open will not define new macros during the auto-login process
-
- close will not erase existing macro definitions
-
- get and mget transfer files from the host on the primary control
- connection to the host on the secondary control connection
-
- put, mput, and append transfer files from the host on the secondary
- control connection to the host on the primary control connection. Third
- party file transfers depend upon support of the ftp protocol PASV
- command by the server on the secondary control connection.
-
- put local-file [ remote-file ] Stores a local file on the remote machine.
- If remote-file is unspecified, the local file name is used in naming the
- remote file. File transfer uses the current settings for type, format,
- mode, and structure.
-
- pwd Prints the name of the current working directory on the remote
- machine.
-
- quit A synonym for bye.
-
- quote arg1 arg2 ... Sends the arguments that are specified, verbatim, to
- the remote FTP server. A single FTP reply code is expected in return.
-
- recv remote-file [ local-file ] A synonym for get.
-
- remotehelp [ command-name ] Requests help from the remote FTP
- server. If a command-name is specified it is supplied to the server as
- well.
-
- rename [ from ] [ to ] Renames the file from on the remote machine, to
- the file to.
- reset Clears the reply queue. This command re-synchronizes
- command/reply sequencing with the remote ftp server. If the remote
- server violates the ftp protocol, resynchronization may be neccesary.
- rmdir directory-name Deletes a directory on the remote machine.
-
- runique Toggles storing of files on the local system with unique
- filenames. If a file already exists with a name equal to the target
- local filename for a get or mget command, a .1 is appended to the name.
- If the resulting name matches another existing file, a .2 is appended to
- the original name. If this process contin ues up to .99, an error
- message is printed, and the transfer does not take place. The generated
- unique filename will be reported. Note that runique will not affect
- local files generated from a shell command (see below). The default
- value is off.
-
- send local-file [ remote-file ] A synonym for put.
-
- sendport Toggles the use of PORT commands. By default, ftp attempts
- to use a PORT com mand when establishing a connection for each data
- transfer. If the PORT command fails, ftp uses the default data port.
- When the use of PORT commands is disabled, no attempt is made to use
- PORT commands for each data transfer. This is useful for certain FTP
- implementations which do ignore PORT commands but, incorrectly,
- indicate that they have been accepted.
-
- status Shows the current status of ftp.
- struct [ struct-name ] Sets the file transfer structure to struct-name.
- By default stream structure is used.
-
- sunique Toggles storing of files on a remote machine under unique file
- names. The remote ftp server must support the ftp protocol STOU
- command for successful completion of this command. The remote
- server reports the unique name. Default value is off.
-
- tenex Sets the file transfer type to that needed to talk to TENEX
- machines.
- trace Toggles packet tracing.
-
- type [ type-name ] Sets the file transfer type to type name. If no type
- is specified, the current type is printed. The default type is network
- ASCII.
-
- user user-name [ password ] [ account ] Identifies the user to the
- remote FTP server. If the password is not specified and the server
- requires it, ftp disables the local echo and then prompts the user for it.
- If an account field is not specified, and the FTP server requires it, the
- user is prompted for it also. Unless ftp is invoked with auto login
- disabled, this process is done automatically on initial connection to the
- FTP server.
-
- verbose Toggles the verbose mode. In verbose mode, all responses from
- the FTP server are displayed to the user. In addition, if verbose is on,
- statistics regarding the efficiency of a file transfer are reported when
- the transfer is complete. By default, verbose is on.
-
- ? [ command ] A synonym for help.
- Command arguments which have embedded spaces may be quoted with
- quotation (") marks.
-
- Aborting a file transfer To abort a file transfer, use the terminal
- interrupt key (usually <CTRL/C>). Sending transfers are halted
- immediately. Receiving transfers are halted by sending a ftp protocol
- ABOR command to the remote server, and discarding any further data
- received. The speed at which this is accomplished depends upon the
- remote server's support for ABOR processing. If the remote server does
- not support the ABOR command, an ftp> prompt appears when the
- remote server has completed sending the requested file.
- The terminal interrupt key sequence is ignored when ftp has completed
- any local processing and is awaiting a reply from the remote server. A
- long delay in this mode may result from ABOR processing, or from
- unexpected behavior by the remote server, including violations of the
- ftp protocol. If the delay results from unexpected remote server
- behavior, the local ftp program must be killed by hand.
-
- File-naming conventions Files specified as arguments to ftp commands
- are processed according to the following rules:
-
- 1) Standard input is used for reading and standard output is used for
- writing when the file name is specified by an en dash (-).
- 2) If the first character of the file name is a vertical line (|), the
- remainder of the argument is interpreted as a shell command. The ftp
- command then forks a shell, using popen(3) with the argument supplied,
- and reads (writes) from the stdout (stdin). If the shell command
- includes spaces, the argument must be quoted, as in ""| ls -lt"". A
- particularly useful example of this mechan ism is: "dir |more".
- 3) If globbing is enabled, local file names are expanded according to
- the rules used in the csh(1) (compare to the glob command). If the ftp
- command expects a single local file, such as put, only the first
- filename gen erated by the globbing operation is used.
- 4) For mget commands and get commands with unspecified local file
- names, the local filename is the remote filename and can be altered by
- a case, ntrans, or nmap setting. The resulting filename may then be
- altered if runique is on.
- 5) For mput commands and put commands with unspecified remote file
- names, the remote filename is the local filename and may be altered by
- a ntrans or nmap setting. The resulting filename can then be altered by
- the remote server if sunique is on.
-
- File transfer parameters Many parameters can affect a file transfer.
- The type can be ascii, image (binary), ebcdic, or local byte size (for
- PDP10's and PDP-20's generally). The ftp command supports the ascii
- and image types of file transfer and local byte size 8 for tenex mode
- transfers.
- The ftp command supports only the default values for the remaining
- file transfer parameters: mode, form, and struct.
-
- The .netrc file The .netrc file contains login and initialization
- information used by the auto-login process. It resides in the user's
- home directory. The following tokens are recognized; they may be
- separated by spaces, tabs, or new-lines:
-
- machine name Identifies a remote machine name. The auto-login
- process searches the .netrc file for a machine token that matches the
- remote machine specified on the ftp command line or as an open
- command argu ment. Once a match is made, the subse quent .netrc
- tokens are processed, stop ping when the end of file is reached or
- another machine token is encountered.
-
- login name Identifies a user on the remote machine. If this token is
- present, the auto-login process initiates a login using the specified
- name.
-
- password string Supplies a password. If this token is present, the
- auto-login process supplies the specified string if the remote server
- requires a password as part of the login process. Note that if this
- token is present in the .netrc file, and if the .netrc is readable by
- anyone other than the user, ftp aborts the auto-login process.
-
- account string Supplies an additional account password. When this
- token is present, the auto login process supplies the the remote server
- with an additional account pass word if the remote server requires it.
- If it does not, the auto-login process initiates an ACCT command.
-
- macdef name Defines a macro. This token functions like the ftp macdef
- command. A macro is defined with a specified name; its con tents
- begin with the next .netrc line and continue until a null line (consecu
- tive new-line characters) is encoun tered. If a macro named init is
- defined, it is automatically executed as the last step in the auto-login
- process.
-
- Options
-
- -d Enables debugging.
- -g Disables file name expansion.
- -i Disables interactive prompting during multiple file transfers.
- -n Disables autologin during an initial connection. If auto-login is
- enabled, ftp will check the .netrc file in the user's home directory for
- an entry describing an account on the remote machine. If no entry
- exists, ftp will use the login name on the local machine as the user
- identity on the remote machine, prompt for a password and, optionally,
- an account with which to login.
-
- -v Displays all responses from the remote server as well as all data
- transfer statistics.
-
- Restrictions Correct execution of many commands depends on proper
- behavior by the remote server. An error in the treatment of carriage
- returns in the 4.2BSD UNIX ascii-mode transfer code has been
- corrected. This correction may result in incorrect transfers of binary
- files to and from 4.2BSD servers using the ascii type. Avoid this
- problem by using the binary image type.
-
- FTP
-
- -->
-
- Type ftp followed by the address of the host you want to access. The
- ftp program will respond with a message. If the connection
- was successful, you will see a response like the one above.
- (Click the arrow to continue.
-
- --> ftp nic.near.net
-
- Connected to nic.near.net.
- 220 nic.near.net FTP server ready.
-
- Then you will normally be prompted to give a name and a password. If
- the system allows anonymous ftp, the name will often be "anonymous"
- and the password may be "guest" or you may be asked to use your
- username as a password. Again you will get a response.
- (Click the arrow to continue.)
-
- The "list" command (ls) causes the remote computer to print a list of
- available subdirectories and files. Below is an exercise that will show
- you how to change directories and transfer a file from a subdirectory.
- The commands you will type are printed in bold italics.
-
- ftp>
-
- After you are logged in, you can issue a few commands, such as ls to
- list the contents of the current directory. (Click the arrow to
- continue.)
-
- The "list" command (ls) causes the remote computer to print a list of
- available subdirectories and files. Below is an exercise that will show
- you how to change directories and transfer a file from a subdirectory.
- The commands you will type are printed in bold italics.
-
- ftp>
-
- To see the ftp commands available to you, type ? at the "ftp>" prompt.
- (The list of commands shown here is incomplete.)
-
- The "list" command (ls) causes the remote computer to print a list of
- available subdirectories and files. Below is an exercise that will show
- you how to change directories and transfer a file from a subdirectory.
- The commands you will type are printed in bold italics.
-
- ftp>
-
- Type the "status" command to check your file type.
-
- The "list" command (ls) causes the remote computer to print a list of
- available subdirectories and files. Below is an exercise that will show
- you how to change directories and transfer a file from a subdirectory.
- The commands you will type are printed in bold italics.
-
- ftp>
-
- To ftp text files, including files that end in ".txt" or ".ps", your file type
- should be ASCII. This is the default. (The ASCII setting is the same as
- TEXT.) (Click the arrow to continue.)
-
- The "list" command (ls) causes the remote computer to print a list of
- available subdirectories and files. Below is an exercise that will show
- you how to change directories and transfer a file from a subdirectory.
- The commands you will type are printed in bold italics.
-
- ftp>
-
- If you intened to ftp non-ascii files, including compressed files that
- end in ".Z" or object files, set your file type to binary. The "binary"
- setting is the same as "image." (Click the arrow to continue.)
-
- ftp>
-
- The cd command is used to change directories on the remote host.
-
- ftp> cd info-sources
- 250 CWD command successful.
-
- The get command is used to copy a file from the remote host to your
- system. Type get and the name of the file you want. You will be told
- when the transfer is complete.
-
- ftp> cd info-sources
- 250 CWD command successful.
-
- ftp> get README
-
- PORT command successful.
- 150 Opening ASCII mode data connection for README (1042 bytes).
- 226 Transfer complete.
- 1071 bytes received in 0.02 seconds (52 Kbytes/s).
-
- ftp>
-
- Leave ftp and close the connection by typing quit at the ftp prompt.
- (End of sample session.)
-
- Downloading
-
- Over the Internet you can reach archives of Macintosh files. You can get
- Macintosh files such as HyperCard stacks, tools, fonts, games, tips,
- desk accessories, cdevs, inits, demos, and applications from these
- archives. Before the files can be run on your Macintosh, you must ftp
- them and then process them. Here is a general description of how to
- get files from an archive to your Mac. See your system administrator
- or ask a Macintosh user group for more information.
-
- In summary, there are generally five steps to pulling files from
- Macintosh archives:
-
-
- 1. Transfer to your computer with ftp
- (using a text-only option).
-
- 2. If necessary, combine the parts.
-
- 3. Transfer to your Macintosh.
-
- 4. Run BinHex 4.0 and/or StuffIt to convert
- the .hqx files into either Macintosh files
- or compressed Macintosh files (or use a
- Unix program such as mcvert or xbin
- before transferring the file to your
- Macintosh.)
-
- 5. If a file is compressed, use the
- appropriate decompression program
- (usually StuffIt, or UnStuffIt) to
- decompress it.
-
- Step 1, ftp
-
- First, ftp to a site that has Macintosh files,
- such as rascal.ics.utexas.edu or the info-mac directory at sumex-
- aim.stanford.edu. (Note that sumex may not be available for anonymous
- ftp during west coast business hours.) On sumex, use the account name
- "anonymous" (lower-case) and enter any password. Type ls to see a list
- of directories, and type cd to a directory of Macintosh files. (on sumex,
- type cd info-mac). Type ls again to see a list of subdirectories, and
- type cd with the name of a subdirectory that interests you. Type ls
- again to see the filenames.
-
- Choose a file and ftp it (using ftp's get [filename] commandQwith a
- statement like get disinfectant.hqx). An ftp transfer using a text-only
- option should work, since the files are normally in text format.
-
- Step 2
-
- Some files are large and have been split into smaller pieces so that
- they can be more easily mailed. You must join them together. hqx files
- can be edited as text; therefore, you can use any word processor or the
- append command on your host to stitch the pieces together. There are
- some files in the info-mac/util directory on sumex that do this step
- for you (unity and united).
-
- Step 3 or 4, decode binhex file
-
- Most files are stored in BinHex 4.0 (text) format. The common practice
- is to label such files with .hqx extensions. To take these files and use
- them on your Macintosh, you must first run them through a program that
- will convert them from .hqx format. On Unix systems, you can use the
- mcvert program, stored as /unix/mcvert.shar. You can also do the
- conversion on your Macintosh after you transfer the file. On the Mac,
- use either BinHex 4.0 or StuffIt. In Stuffit, choose "Decode Binhex file"
- from the "Other" menu. Ask your system administrator what is the best
- method to use on your system.
-
- Step 3 or 4, transfer the file to your Macintosh
-
- Ask your system adminstrator what method you should use to do thisQ
- such as kermit or ftp.
-
- Step 5, unstuffing
-
- Many files have been compressed to save space. You will know they
- have been compressed when the filename (after converting to Macintosh
- format) ends with a .sit, .cpt, .sea, or .pit extension. You should use
- StuffIt (or Unstuffit) to convert .sit and .pit compressed files into
- uncompressed Macintosh files. (With .pit files you need to set a special
- StuffIt option to decompress them, since they are not in the usual
- StuffIt format.) The other types, .cpt and .sea, are becoming
- increasingly common as Compactor gains in popularity. Both Compactor
- and Stuffit are in the /util directory on info/mac.
-
- In Stuffit, the name of the file you clicked on will appear in a window.
- Select it and then click extract at the bottom of the screen. Then
- select the new file(s) that appear in the window, and click the Save All
- button on the right. Stuffit will create the new file(s) (while
- preserving the stuffed .sit file).
-
- These are some of the kinds of resources available on the Internet.
-
- % INTERNET RESOURCE GUIDE
-
- % COMPUTING CENTERS
-
- % LIBRARY CATALOGS
-
- % DATA ARCHIVES
-
- % WHITE PAGES
-
- % MISCELLANEOUS
-
-
- Internet Resources
-
- These are some of the kinds of resources available on the Internet.
-
- % INTERNET RESOURCE GUIDE
-
- % COMPUTING CENTERS
-
-
- % LIBRARY CATALOGS
-
-
- % DATA ARCHIVES
-
-
- % WHITE PAGES
-
-
- % MISCELLANEOUS
-
- Internet Resource Guide
-
- The Internet Resource Guide is an online
- book that describes many services available on the Internet. You can
- transfer the resource guide via ftp from the
- subdirectory info-sources on the machine nnsc.nsf.net (see the next
- card). The IRG is also distributed electronically by the NSF Network
- Service Center (NNSC). If you wish to receive additions to the IRG in
- electronic mail messages, send a note to resource-guide-
- request@nnsc.nsf.net, and specify whether you would like them in
- PostScript format, text format, or whether you want to receive notices
- that additions are available for ftp.
-
- Internet Resource Guide
-
- How to Get and Use the
- Internet Resource Guide
-
- To get The Internet Resource Guide over the Internet, use the command
- ftp nnsc.nsf.net and then cd resource-guide.
-
- The resource-guide directory hierarchy is organized by chapter and
- section. Each chapter has its own subdirectory (resource-
- guide/chapter.#), and each section has two files in that directory, one
- for PostScript (section#-#.ps) and one for plain text (section#-#.txt).
-
- So, to retrieve section 1 of chapter 1, you should ftp the files:
-
- resource-guide/chapter.1/section1-1.ps (Postscript)
-
- resource-guide/chapter.1/section1-1.txt (Text)
-
- To simplify retrieval of entire chapters and chapter updates, or of the
- entire IRG, you can ftp compressed tar files. These include a the entire
- guide in text format (resource-guide-txt.tar.Z), in PostScript format
- (resource-guide-ps.tar.Z), or as a plain text file (wholeguide.txt).
- There are also files of individual chapters in both formats. The most
- recent changes to a chapter are in a file named
- chapter#-changes.tar.Z. These include Postscript and text versions of
- the most recently updated sections.
-
- resource-guide/chapter1-changes.tar.Z
-
- Nitty-Gritty Information about PostScript, ftp, Compress, and tar files.
-
- A Note about PostScript Documents
-
- PostScript is a formatting language used to prepare documents for
- printing on advanced printers such as Apple LaserWriters.
- PostScript files contain ASCII characters only, but are virtually
- unreadable because the text of the document is interspersed with
- numerous formatting commands and numeric symbols for printers'
- characters that are not part of the ASCII character set.
-
- Do not attempt to print PostScript files unless you have a printer that
- is specifically designed for PostScript.
-
- How to Use the ftp Command
-
- You can ftp the resource guide files from nnsc.nsf.net with a standard
- anonymous ftp connection:
-
- ftp nnsc.nsf.net
-
- You will see a "banner" and be promted for your login:
-
- Connected to nnsc.nsf.net.
- 220 nnsc.nsf.net FTP server (Version 5.59 Mon May 14 13:48:21
- EDT 1990) ready.
- Name (nnsc.nsf.net:yourname):
-
- You should type anonymous, and then use the password guest. The
- password will not be displayed on your terminal.
-
- Name (nnsc.nsf.net:name): anonymous
- Password (nnsc.nsf.net:anonymous):
- 331 Guest login ok, send ident as password.
- 230 Guest login ok, access restrictions apply.
- ftp>
-
- 3) Change directory to the "resource-guide" directory:
-
- ftp> cd resource-guide
-
- 4) To get a listing of the files in the resource-guide directory, give
- the "dir" command (usually equivlent to the "ls" command on Unix
- systems).
-
- ftp> dir *
- ...
- chapter.1/section1-1.ps
- etc.
-
- section1-1.ps is in the chapter.1 directory. Use the "cd"
- command again.
-
- ftp> cd chapter.1
-
- How to Uncompress and Extract the tar.Z Files
-
- Do not attempt to use the tar.Z files unless you have the Unix
- "compress" and "uncompress" commands and the "tar" command on your
- host computer, and your operating system is compatible with Berkeley
- Unix.
-
- 1) Use the "uncompress" command to
- replace the compressed "Z" file
- with a copy of the file as it was before
- "compress" was used:
-
- uncompress -v chapter1-ps.tar.Z
- chapter1-ps.tar.Z: -- replaced with chapter1.tar
-
- The result is "chapter1-ps.tar".
-
- 2) Use tar -xvf to replace the tar
- file with the set of directories and files
- in the original file.
-
- tar -xvf chapter1.tar
- x copyright.ps, 5931 bytes, 12 tape blocks
- x copyright.txt, 945 bytes, 2 tape blocks
- etc. ...
-
- This creates a new directory, chapter.1, with the files:
-
- copyright.ps
- copyright.txt
- intro.ps
- intro.txt
- section1-1.ps
- section1-1.txt
- etc. ...
-
- Then you throw away the files you don't wantQeither the ".ps" files or
- the ".txt" files Qand print the files that remain.
-
- For more information about the action of these commands, consult the
- manual for your Unix system, or give the commands "man compress" and
- "man tar" for online documentation.
-
- Computational resources are centers or machines that serve users who
- have special computing requirements. A good example of such a
- resource is a supercomputer center.
-
- Air Force Supercomputer Center at Kirtland AFB
-
- Arizona: University of Arizona Supercomputing Center
-
- BRL: US Army Ballistic Research Laboratory
-
- Berkeley: University of California Information Systems and Technology
-
- Calgary: SuperComputing Services, The University of Calgary
-
- CERPASS: Center for Experimental Research in Parallel Algorithms,
- Software and Systems
-
- Cornell National Supercomputer Facility: Center for Theory and
- Simulation in Science and Engineering
-
- NCAR: National Center for Atmospheric Research
-
- NCSA: National Center for Supercomputing Applications
-
- NCSC: North Carolina Supercomputing Center
-
- NERSC: National Energy Research Supercomputer Center
-
- NPAC: Northeast Parallel Architectures Center
-
- OSC: Ohio Supercomputer Center
-
- PSC: Pittsburgh Supercomputing Center
-
- SDSC: San Diego Supercomputer Center
-
- Texas: University of Texas System Center for High Performance
- Computing
-
- UCLA Office of Academic Computing
-
- Air Force: consulting@ddnvx1.afwl.af.mil
-
- Cornell: psfy@cornellf.tn.cornell.edu
-
- NCAR: scdinfo@ncar.ucar.edu
-
- UCLA: calloac@oac.ucla.edu
-
- Arizona: kgrmc@asuacad.bitnet or kgbat@asuacad.bitnet
-
- NCSC: info@flyer.ncsc.edu
-
- Texas: g.smith@chpc.utexas.edu
-
- CERPASS: cerpass@isi.edu
-
- Calgary: super@uncacdc.bitnet
-
- Berkeley: consult@cmsa.berkeley.edu (CMS) or
- consult@lynx.berkeley.edu (Cray)
-
- BRL: crimmins@brl.mil
-
- SDSC: consultant@sdsc.edu
-
- NCSA: consult@ncsaa.ncsa.uiuc.edu
-
- NERSC: consultant@nersc.gov
-
- NPAC: npac@nova.npac.syr.edu
-
- OSC: oschelp@osc.edu
-
- PSC: consult@a.psc.edu
-
-
- Computing Centers
-
- Many libraries allow access to their catalogs via the Internet. Such
- catalogs can be useful for finding books not available at a local library
- or to check citations or references. Some catalogs also support more
- extended reference facilities.
-
- Please note that online catalogs often have a limited number of ports;
- users are asked not to abuse their access.
-
- ARLO, The Library Catalog for the University of Colorado at Colorado
- Springs
-
- Boston University (TOMUS)
-
- Univ. California and California St. (MELVYL)
-
- Cleveland Public Library Catalog
-
- Colorado Alliance of Research Libraries
-
- Emory University Libraries Online Public Access Catalog
-
- Florida Center for Library Automation
-
- HOLLIS: Harvard Online Library Automation System
-
- U. Illinois at Chicago NOTIS/LUIS
-
- Info-Lib
-
- InfoTrax
-
- MAGICQMichigan State University Libraries
-
- MIRLYN, The University of Michigan's Online Catalog
-
- Northwestern University LUIS Online Catalog
-
- Research Libraries Information Network (RLIN)
-
- U. New Mexico Gateway
-
- Penn State University Library Information and Access System (LIAS)
-
- U. Pennsylvania Libraries
-
- URSUS, University of Maine System Library Catalog
-
- U. Utah Library Card Catalog System
-
- U. Wisconsin Madison and Milwaukee Campuses Network Library System
- (NLS)
-
- Boston University (TOMUS)
- library.bu.edu (128.197.4.200)
-
- California (MELVYL)
- melvyl.ucop.edu (31.1.0.1)
-
- RLIN rlg.stanford.edu (36.54.0.18)
-
- Colorado
- pac.carl.org (192.54.81.128)
-
- Florida
- nervm.nerdcufl.edu
-
- MIRLYN, U. Michigan
- cts.merit.edu (35.1.1.6)
-
- New Mexico
- bootes.unm.edu (129.24.8.2)
-
- Emory University Libraries
- emuvm1.cc.emory.edu (128.140.1.4)
-
- MAGIC: merit.msu.edu (35.8.2.56) or magic.msu.edu (35.8.2.99)
-
- Info-Lib: umd5.umd.edu
-
- InfoTrax: infotrax.rpi.edu (128.113.1.31)
-
- ARLO: arlo.colorado.edu (128.198.26.129)
-
- Pennsylvania: pennlib.upenn.edu
-
- Wisconsin: nls.adp.wisc.edu (128.104.198.20)
-
- U. Utah: lib.utah.edu
-
- NW: pacx.acns.nwu.edu (129.105.49.2)
-
- URSUS: ursus.maine.edu (130.111.64.1)
-
- Cleveland: clevxe.cpl.org
-
- U. Illinois: uicvm.uic.edu (128.248.2.50)
-
- Penn State: lias.psu.edu (128.118.25.13)
-
- HOLLIS: hollis.harvard.edu (128.103.60.31)
-
- Data Archives
-
- The Internet is home to a wide variety of data archives. In this section
- we try to list the more important and the more uncommon archives. In
- particular, we do not list archives of mailing lists, other than those
- that do software distributions. Such archives can be located by asking
- the maintainers of the mailing lists.
-
- Archie Archive Server Listing Service
-
- COSMIC
-
- Dartmouth Dante Database
-
- Gene-Server
-
- IBM Supercomputing Program Data Base
-
- INFO-SOUTH Latin American Information System
-
- IuBio Archive for Molecular and General Biology
-
- LiMB (Listing of Molecular Biology Databases)
-
- Matrix of Biological Knowledge Archive-Server
-
- MBCRR: The Molecular Biology Computer Research Resource
-
- MEMDB: Medieval and Early Modern Data Bank
-
- University of North Carolina at Chapel Hill INFO Service
-
- NED (NASA/IPAC Extragalactic Database)
-
- NETLIB Mathematical Software Distribution System
-
- PENpages
-
- SDDAS: Southwest Research Data Display & Analysis System
-
- SERVICE Mail ServerQDDN NIC
-
- SIMBAD
-
- SIMTEL20 Software Archives
-
- Unidata weather data program
-
- VxWorks Users Group Archive
-
- Washington University Public Domain Archives
-
- Gene Server: email "SEND HELP" to: genbank-server@uhnix2.uh.edu,
-
- Molecular Biology Databases: limb@lanl.gov
-
- SIMBAD: simbad@cfa.harvard.edu
-
- SIMTEL20 : 26.2.0.74
-
- SDDAS: espsun.space.swri.edu
-
- Wash.: wuarchive.wustl.edu (128.252.135.4)
-
- Matrix: email "SEND HELP" to: genbank-server@uhnix2.uh.edu,
-
- COSMIC: e-mail to: cosnic@uga.bitnet or
- service@cossack.cosmic.uga.edu
-
- IUBIO Biology Archive: iubio.bio.indiana.edu
-
- PENpages: psupen.psu.edu (128.118.36.5)
-
- Dante: eleazar.dartmouth.edu (129.170.16.2)
-
- MEMDB: 4212001@rutmvs1.rutgers.edu
-
- NETLIB: netlib@mcs.anl.gov
-
- VxWorks: thor.atd.ucar.edu (128.117.81.51)
-
- IBM: send mail to: listserv@uicvm.cc.uic.edu,
- containing "get supersft help"
-
- SERVICE: e-mail to service@nic.ddn.mil
- with "HELP" in subject line
-
- Unidata: unidata.ucar.edu
-
- Archie: quiche.cs.mcgill.ca (132.206.3.30) login as archie.
-
- MBCRR: mbcrr.harvard.edu
-
- NED: ipac.caltech.edu
-
- Chapel Hill INFO: info.acs.unc.edu
- username: info
-
- INFO-SOUTH: sabio.ir.miami.edu (129.171.32.26)
-
- White Pages
-
- The Internet supports several databases that contain basic information
- about users, such as e-mail addresses, telephone numbers, and postal
- addresses. These databases can be searched to get information about
- particular individuals. Because they serve a function akin to the
- telephone book, these databases are often referred to as "white pages."
- (The names of the resources are followed by the addresses to use for
- remote login.)
-
- NASA Ames Research Center Electronic Phone Book
-
- DDN Network Information Center WHOIS Service
-
- NYSERNet/PSI White Pages Pilot Project
-
- CREN/CSNET User Name Server "ns"
-
- Knowbot Information Service
-
- This section lists diverse Internet resources that defy better
- categorization.
-
- Chiron: Linotype Postscript Typesetter
-
- CIAC (Department of Energy Computer Incident Advisory Capability)
-
- FASTQA Computer Network Broker for Standard Electronic Parts
-
- Geographic Name Server
-
- MOSIS Chip Fabrication Server
-
- Nest - A Network Simulation Testbed
-
- PROPHET
-
- Vax Book
-
- Chiron: joe@wjh12.harvard.edu
-
- CIAC: email to ciac@tiger.llnl.gov or ciac@lll-crg.llnl.gov
-
- Geographic:
- martini.eecs.umich.edu
-
- Nest: columbia.edu (10.3.0.89)
-
- PROPHET: e-mail to prophet-help@bbn.com
-
- FAST: e-mail "REQUEST: INFORMATION
- TOPIC: INTRODUCTION
- REQUEST: END" to fast@isi.edu
-
- Vax Book
- decoy.uoregon.edu (128.223.32.19)
-
- MOSIS: e-mail to: mosis@mosis.edu
-
- Miscellaneous Resources
-
- This section lists diverse Internet resources that defied better
- categorization.
-
- Chiron: Linotype Postscript Typesetter
-
- Department of Energy Computer Incident Advisory Capability (CIAC)
-
- Geographic Name Server
- port 3000 on martini.eecs.umich.edu
-
- MOSIS Chip Fabrication Server
-
- Nest - A Network Simulation Testbed
- columbia.edu (10.3.0.89)
-
- PROPHET
-
- FAST - A Computer Network Broker for Standard Electronic Parts
-
- Vax Book
- DECOY.UOREGON.EDU (128.223.32.19)
-
- These are information centers (NICs) for networks in the Internet and
- outside it.
-
- % BITNET NIC
-
- % CREN/CSNET CIC
-
- % DDN NIC (Defense Data Net NIC)
-
- % NNSC (NSF Network Service Center)
-
- % OCEANIC
-
- % SPAN NIC
-
- Geographic:
- martini.eecs.umich.edu
-
- Nest: columbia.edu (10.3.0.89)
-
- Vax Book
- decoy.uoregon.edu (128.223.32.19)
-
- Network Information Centers
-
-
- Miscellaneous Resources
-
- This section lists diverse Internet resources that defied better
- categorization.
-
- Chiron: Linotype Postscript Typesetter
-
- Department of Energy Computer Incident Advisory Capability (CIAC)
-
- Geographic Name Server
- port 3000 on martini.eecs.umich.edu
-
- MOSIS Chip Fabrication Server
-
- Nest - A Network Simulation Testbed
- columbia.edu (10.3.0.89)
-
- PROPHET
-
- FAST - A Computer Network Broker for Standard Electronic Parts
-
- Vax Book
- DECOY.UOREGON.EDU (128.223.32.19)
-
- BITNET Information Center
-
- BITNIC provides and coordinates user
- support, information, and administrative services for BITNET,
- including:
-
- % BITNEWS, an electronically distributed
- newsletter.
-
- % On-line BITNET documentation
- accessible via LIST-SERV and
- NETSERV server.
-
- % On-line and telephone assistance for
- campus BITNET support staff and
- organizations seeking BITNET
- membership.
-
- Network Access:
-
- Subscribe to BITNEWS by sending electronic mail to LISTSERV@BITNIC
- (on BITNET) with any subject and the text: SUBSCRIBE BITNEWS your-
- name
-
- Obtain a list of files available by sending mail with any subject and the
- text: SENDME NETINFO INDEX
-
- Order a file by sending mail with any subject and the text SENDME
- filename filetype using the filename and filetype of the file as shown
- in NETINFO INDEX.
-
- Address:
- BITNET Network Information Center
- EDUCOM
- Suite 600
- 1112 Sixteenth Street, NW
- Washington, DC 20036
-
- Email:
- bitnet@bitnic (on BITNET)
- bitnet%bitnic@cunyvm.cuny.edu
- (on Internet)
-
- Phone: (202) 872-4200
-
- Who Can Use the BITNET
-
- The BITNIC services are supported by dues from the BITNET member
- organizations,
- and their primary purpose is to assist BITNET members. The on-line
- newsletter and files are, however, available to all who can access
- BITNET with electronic mail.
-
- CREN/CSNET CIC
-
- The CREN/CSNET Coordination and Information Center provides
- technical and information support for members of CREN/CSNET.
-
- The CIC staff also maintains the following automated services, which
- can be accessed by electronic mail from CSNET hosts, and also from all
- other hosts that can exchange mail with the Internet.
-
- The Info-Server: info-server@sh.cs.net
-
- This automatic program distributes documents in response to specially
- formatted messages. Info documents are also available to Internet
- users through standard anonymous ftp login.
-
- For instructions about this and other services, send a message to info-
- server@sh.cs.net with "HELP" in the body of the message.
-
- Email/ftp: info-server@sh.cs.net
-
- Provides file transfer service to hosts that do not have access to the
- Internet. (In beta test.)
-
- Status: info-server@sh.cs.net
-
- The status report on the availability of exceptional CSNET systems can
- be retrieved from the Info-Server.
-
- The User Name Server: registrar@sh.cs.net
-
- This is a central database containing information about CSNET sites
- and users, which is maintained on the CIC Service Host, sh.cs.net.
- Users on other sites may send specially formatted messages by
- electronic mail, or may access the User Name Server by dial-up modem
- on (617) 491-2777. Internet users may telnet to sh.cs.net and log on as
- ns, no password required.
-
- Fixaddr: fixaddr@relay.cs.net (or fixaddr@sh.cs.net)
-
- This program is a helpful first step in converting mailing lists to up-
- to-date domain-style addresses. Send a message with a mailing list in
- the body of the message.
-
- The list should contain one address per line, in the form "user@domain",
- for example, "groucho@cs.fredonia.edu". Fixaddr will convert nicknames
- into official names. It checks both the DDN NIC host table, and the
- Internet domain servers, using the MX option for off-Internet hosts. It
- knows about non-domain-style names that have disappeared from the
- NIC table.
-
- Nslookup: nslookup@sh.cs.net
-
- For hosts that do not have access to domain servers. Send a message
- with domain names or IP addresses, one per line, in the body of the
- message. The nslookup program sends back a message containing all
- the domain nameserver records (not just the MX ones) for the named
- domains.
-
- Network Access
-
- Unlimited
-
- Address:
-
- CREN/CSNET Coordination and Information Center (CIC)
- BBN
- 10 Moulton Street
- Cambridge MA 02138
-
- Email: cic@sh.cs.net
-
- Phone: (617) 873-2777
-
- Who Can Use the Resource/Restrictions
-
- Open to all Internet users.
-
- Miscellaneous Information
-
- Karen Roubicek, Manager
- Charlotte Mooers, User Services
-
- DDN Information Center
-
- The DDN Network Information Center (NIC) assists Defense Data
- Network (DDN) users and potential subscribers in obtaining information
- about the DDN and the Internet.
-
- The NIC provides the following databases and information servers:
-
- % WHOIS registry of users, hosts, domains, and networks
-
- % NIC/QUERY browsing system
-
- % TACNEWS server
-
- % SERVICE electronic mail server
-
- The NIC provides host name translation tables, maintains domain
- system server files, assigns IP network numbers and autonomous
- system numbers, registers network users, and issues MILNET TAC
- access cards. The NIC is the site of the DDN Security Coordination
- Center (SCC). The NIC is also the source of DDN documents and the
- complete Internet Request For Comments (RFC) series and index.
-
- The NIC maintains a toll-free hotline from 6:00 a.m. to 5:00 p.m.
- (Pacific time) at 1-800-235-3155 or (415) 859-3695. Users
- experiencing problems with TAC login, or who have requests for NIC
- services, are encouraged to call.
-
- The NIC has numerous publicly accessible information files available in
- the following public directories:
-
- % NETINFO:
-
- % RFC: PROTOCOLS:
-
- % SCC:
-
- % IEN:
-
- % DDN-NEWS:
-
- Each directory has an index. Files are available for anonymous ftp
- and, in most cases, are accessible via the automatic mail server
- SERVICE@NIC.DDN.MIL.
-
- The NIC shadows IETF information in the publicly accessible IETF: and
- INTERNET-DRAFTS: directories.
-
- Network Access
-
- % FTP to nic.ddn.mil (192.67.67.20) to
- retrieve NIC files.
-
- % Telnet to nic.ddn.mil to use servers or
- run WHOIS program.
-
- % Send electronic mail to
- service@nic.ddn.mil to receive
- information via the mail server.
-
- % By user Kermit server to retrieve NIC files
-
- Address:
- SRI International
- Network Information Systems Center
- Room EJ291
- 333 Ravenswood Avenue
- Menlo Park, CA 94015
-
- E-mail: nic@noc.ddn.mil (for general user questions or document
- requests)
-
- Phone: 1-800-235-3155 or (415) 859-3695
-
- Who Can Use the DDN NIC
-
- All services are available to users of the DDN. Many services are
- available to Internet users. Some services are available via electronic
- mail to users of networks that gateway to the Internet.
-
- Miscellaneous Information
-
- NIC role mailboxes for further assistance:
-
- NIC@NIC.DDN.MIL
- General user assistance and document requests
-
- REGISTRAR@NIC.DDN.MIL
- User registration and WHOIS updates
-
- HOSTMASTER@NIC.DDN.MIL
- Host, domain, network changes and updates
-
- SCC@NIC.DDN.MIL
- DDN network security information
-
- ACTION@NIC.DDN.MIL
- NIC computer operations
-
- SUGGESTIONS@NIC.DDN.MIL
- Comments on NIC services and publications
-
- SERVICE@NIC.DDN.MIL
- Automatic mail service
-
- Who Can Use the DDN NIC
-
- All services are available to users of the DDN. Many services are
- available to Internet users. Some services are available via electronic
- mail to users of networks that gateway to the Internet.
-
- Miscellaneous Information
-
- NIC role mailboxes for further assistance:
-
- nic@nic.ddn.mil
- General user assistance and document requests
-
- registrar@nic.ddn.mil
- User registration and WHOIS updates
-
- hostmaster@nic.ddn.mil
- Host, domain, network changes and updates
-
- scc@nic.ddn.mil
- DDN network security information
-
- action@nic.ddn.mil
- NIC computer operations
-
- suggestions@nic.ddn.mil
- Comments on NIC services and publications
-
- service@nic.ddn.mil
- Automatic mail service
-
-
-
- NNSC
-
- The NSF Network Service Center provides information services and
- technical assistance to NSFNET end-users. Information and documents
- (available online or printed) cover topics such as resources (the
- Internet Resource Guide), contacts at the midlevel networks and at
- local campuses and institutions (the Internet Managers' Phone Book),
- and network status reports. When prospective or current users do not
- know whom to call concerning their questions about NSFNET use, they
- should contact the NNSC by electronic mail at nnsc@nnsc.nsf.net or by
- telephone at (617) 873-3400.
-
- Online information is available via ftp and from the Info-Server, an
- automated program which distributes documents in response to
- specially formatted messages. For instructions about the info-server,
- send a message to info-server@nnsc.nsf.net with "HELP" in the body of
- the message.
-
- Address:
- NNSC
- BBN Systems & Technologies
- 10 Moulton Street
- Cambridge, MA 02138
-
- Email: nnsc@nnsc.nsf.net
-
- Phone: (617) 873-3400
-
- Who Can Use the NNSC
-
- NNSC services are geared toward users of NSFNET, however the staff
- will provide assistance, either directly or by referring questions to a
- more appropriate source for information, to users with general
- Internet-related questions or problems.
-
- Miscellaneous Information
-
- To receive copies of the NNSC newsletter (the NSF Network News) or
- other publications, please send a message to nnsc@nnsc.nsf.net.
-
- OCEANIC
-
- OCEANIC, the Ocean Network Information Center primarily supports the
- World Ocean Circulation Experiment (WOCE) research program. Examples
- of OCEANIC content are:
-
- % WOCE program information
-
- ! Summaries of research projects with
- emphasis on data collection
-
- ! WOCE Field Program plans,
- resources and maps
-
- ! WOCE administrative information
-
- % Directories of oceanographic datasets:
-
- ! Holdings of major data centers
-
- ! Directories of datasets of special
- interest to WOCE
-
- % A WOCE data-tracking system:
-
- ! Datasets planned, being collected,
- being analyzed, and in data centers.
-
- % A library of data products.
-
- OCEANIC also includes:
-
- % A searchable directory of oceanographers on Internet, SPAN,
- Telemail (Omnet and Kosmos), and Bitnet.
-
- % A searchable international oceanographic
- research ship schedules.
-
- OCEANIC is self-explanatory and menu-driven. Though intended to work
- with simple terminals, to view graphical material, you must use a
- terminal-emulation program compatible with the Tektronix 4010
- standard.
-
- Network Access:
-
- Internet: telnet to host delocn.udel.edu (128.175.24.1) and login with
- username INFO. No password is required.
-
- SPAN: use SET HOST DELOCN, and login with username INFO. No
- password is required.
-
- TELEMAIL/ OMNET (Domestic USA): Use command GOTO SONIC.
-
- Users in Alaska should use Telenet/Omnet network address 909014
- and follow the instructions above.
-
- International direct: The preferred method is via the international
- packet-switched network address:
- 311030200612Qif your national system requires a twelve-digit
- address
-
- 31103020061200Qif your national system requires a fourteen-digit
- address
-
- Some national systems require two zeroes in front of the address.
- You may need to experiment.
-
- You will connect directly into OCEANIC. No password is required.
-
- International TELEMAIL/Omnet: You may connect via
- Telemail/Omnet at one of these addresses:
-
- 311090900003Qif your local network requires a twelve-digit address
-
- 31109090000300Qif your local network requires a fourteen-digit
- address
- (NOTE: Users in Canada should use Datapac network address
- 1311090900014.)
-
- You will get a Telenet "@" prompt after entering this address.
- @ MAIL
- Username? your username
- Password? your password
- Once you are signed on to TELEMAIL:
- Command? GOTO SONIC
-
- Direct Dial-up: You may access OCEANIC directly using a modem (up to
- 2400 baud, set at 7,1,N). Dial (302) 645-4204. Login with user name
- INFO. No password is required.
-
-
- Address:
- University of Delaware
- College of Marine Studies
- Lewes, DE 19958
- Attention: Katherine A. Bouton
-
- Email:
- Internet - bouton@delocn.udel.edu,
- SPAN - DELOCN::BOUTON,
- Telemail - K.BOUTON/Omnet
-
- Phone: (302) 645-4278
-
- Who Can Use OCEANIC
-
- No restrictions. All oceanographers and meteorologists are welcome.
-
- Miscellaneous Information
-
- Telefax: (302) 645-4007
- Telex: 7407728 WDIU UC
-
- System Manager: Walt Dabell
- (302) 645-4225
- Internet: walt@delocn.udel.edu
- Span: DELOCN::WALT
-
-
- SPAN_NIC
-
- The Space Physics Analysis Network (SPAN) Information Center
- supports an interactive database system which can be accessed by
- logging in to the SPAN NIC host. The information in the database is
- grouped into six categories:
-
- (1) SPAN information section: General Information about SPAN,
- Administration structure of SPAN, History of SPAN
-
- (2) Query SPAN database of NODEs: Complete information about a
- particular node, Listing of nodes by a particular field, Complete listing
- of all nodes in the database
-
- (3) INTERmail syntaxes: How to send mail from SPAN to other users on
- other Networks and vice versa including SPAN to X.25 hosts; SPAN to
- NASAmail; GSFCmail; Telemail; OMNET; SPAN to Internet; SPAN to
- BITNET & EARN; SPAN to NSFNET; SPAN to JANET; SPAN to MFEnet;
- JUNET; UUCP; ACSnet
-
- (4) Important NEWS briefs: This section changes periodically to
- broadcast to the general SPAN public things that are happening on
- SPAN.
-
- (5) Access SPAN Library of documents: Have document e-mailed to
- you; Request document be postal mailed to you
-
- (6) How to access other Network Information Centers (NICs)
-
- Network Access
-
- Host Information
-
- Internet:
-
- 6.132 (6276)
- NSSDC
- 128.183.10.59
- NSSDC.GSFC.NASA.GOV
-
- 6.133 (6277)
- NSSDCA
- 128.183.10.4
- NSSDCA.GSFC.NASA.GOV
-
- NSSDC is a VAX 11/780. NSSDC is a VAX 8650.
-
- To connect to the SPAN NIC via DECNET, type:
-
- SET HOST NSSDCA <CR> and log in as user SPAN_NIC. You can also set
- host to NSSDC.
-
- To connect to the SPAN NIC via the Internet, telnet to either system
- and log in as SPAN_NIC.
-
- Dial-in and Telenet access are also availalble. Contact the SPAN NIC
- for details.
-
-
- Address:
- SPAN Network Information Center
- SPAN Operations Center
- NASA/Goddard Space Flight Center
- Code 630.2
- Greenbelt, Maryland 20771
-
- Email: NETMGR@NSSDCA.GSFC.NASA.GOV
- [Internet]
- NSSDCA::NETMGR [SPAN]
-
- Phone: 301-286-7251 or FTS 888-7251
-
- Who Can Use the SPAN NIC
-
- All services are available to users of SPAN and the DECnet Internet.
- Users who are part of the Internet are also welcome to use this
- service.
-
- Miscellaneous Information
-
- For further assistance:
-
- Linda Porter, Acting SPAN Operations ManagerQ for SPAN policy issues.
- SSL::PORTERL or
- PORTERL@SSL.MSFC.NASA.GOV
-
- Pat Sisson, SPAN Security ManagerQfor security related matters.
- NSSDCA::SISSON or SISSON@NSSDCA.GSFC.NASA.GOV
-
- Dave Peters SPAN Internetwork ManagerQfor interworking issues.
- NSSDCA::PETERS or PETERS@NSSDCA.GSFC.NASA.GOV
-
- To receive hardcopy of SPAN documents. NSSDCA::REQUEST or
- REQUEST@NSSDCA.GSFC.NASA.GOV
-
- Books about the Internet
-
- Douglas E. Comer. Internetworking with TCP/IP: Principles, Protocols
- and Architecture. Prentice Hall: Englewood Cliffs, New Jersey. 1988.
-
- Donnalyn Frey and Rick Adams. !%@:: A Directory of Electronic Mail
- Addressing and Networks. Second Edition, O'Reilly and Associates:
- Sebastopol, California., 1990.
-
- Charles Hedrick. "Introduction to the Internet Protocols" Rutgers
- University Computer Science Facilities Group, Piscataway, New Jersey.
- 1988.
-
- Ed Krol. Hitchhiker's Guide to the Internet (RFC 1118). University of
- Illinois, Urbana: Urbana-Champaign, Illinois. 1989.
-
- Tracy L. LaQuey. Users' Directory of Computer Networks. Digital Press:
- Bedford, Massachusetts. 1990.
-
- John S. Quarterman. The Matrix: Computer Networks and Conference
- Systems Worldwide. Digital Press: Bedford, Massachusetts. 1990.
-
- Andrew S. Tanenbaum. Computer Networks, Second Edition. 1988
-
-
-
-
-
-
-
- Book Review
-
- by Craig Partridge
-
- Douglas E. Comer. Internetworking with TCP/IP: Principles, Protocols
- and Architecture. Prentice Hall: Englewood Cliffs, NJ, 1988.
-
- This book is designed to be a comprehensive introduction to the TCP/IP
- protocol suite used on NSFNET and numerous other networks. Comer
- successfully manages to explain almost every aspect of TCP-IP
- networking, from how packets are routed to how hostnames get looked
- up.
-
- The book is intended both as an introduction for the advanced
- undergraduate and as a reference for professionals. Often that
- constitutes an unhappy mix of readers: the undergraduate gets buried by
- technical details while the professional finds little intellectual
- substance amidst the introductory text.
-
- Comer, however, manages to make this mix work. The text is easy to
- read and avoids the mathematics and heavy technical jargon that
- frustrates the beginner; at the same time, it offers the professional a
- useful reference that at least touches on all aspects of TCP-IP
- networking. The bibliography is quite good and at the end of each
- chapter Comer points the reader towards additional reading.
-
-
- Book Review
-
- by Craig Partridge
-
- Donnalyn Frey and Rick Adams. !%@:: A Directory of Electronic Mail
- Addressing and Networks. Second Edition, O'Reilly and Associates:
- Sebastopol, Calif., 1990.
-
- Imagine this scenario: Your colleague at Prairie View A&M says she has
- an electronic mail account but doesn't know what network it is on. You
- want to figure out if you can send mail to her. This useful book is
- designed to help answer your questions.
-
- The book is organized into several parts. One section is a listing of
- networks, such as NSFNET, JUNET, and SPAN, showing the area each
- network serves, and the services it supports. Another section indexes
- companies by name and by their domain names (Prairie View A&M is
- pvamu.edu). A third section indexes geographic regions along with their
- affiliated networks. Other sections try to help users figure out what
- those e-mail error messages mean.
- All this information is packed into 285 easy-to-read pages. The
- directory is a
- convenient reference to have in your office.
-
-
-
-
-
-
-
- Book Review
-
- by Karen Roubicek
-
- Tracy L. LaQuey. The Users' Directory of Computer Networks. Digital
- Press: Bedford, Mass, 1990.
-
- Today's widespread analogy that likens computer networking to the
- highway system logically leads to the observation, made by Tracy
- LaQuey, that the network traveler needs a roadmap to get around.
- LaQuey intends theUser's Directory of Computer Networks to be the
- tool that helps network users understand the communications paths,
- see how they connect, locate resources (machines, services, or people)
- that they need, and understand some basic networking concepts.
-
- The Directory is a descendant of a 1987 volume of the same title
- published by the University of Texas, and edited by Carol Englehardt
- Kroll, which was subsequently revised by LaQuey. The current directory
- is divided into chapters that discuss specific networks, such as the
- DECnet Internet and the Internet, essays on the Domain Name System,
- the OSI Directory Service (X.500), Electronic Mail, and an organizational
- index. In this volume, LaQuey includes several more networks and has
- expanded the narrative about each network.
-
- Network Overviews
-
- This book successfully pulls together a lot of information in a
- consistent and coherent presentation. Most chapters (several of which
- have subchapters that describe component networks of an internet)
- provide descriptions that answer the same key questions about each
- network: What is the topology? What protocols are supported? What
- services are provided? What are the membership requirements? How
- is the network administered? What are the usage guidelines? The
- descriptions don't go into great technical depth, but that's not the
- editor's goal. LaQuey provides maps and extensive lists of hosts,
- contacts, and network numbers for reference purposes, but the reader
- comes away from a chapter chiefly with a useful overview of each
- network and a basic understanding of where each fits into the big
- picture.
-
- The essays in the final chapters are particularly helpful for users who
- have a limited amount of networking experience. John Quartermann
- presents a good summary of the complex issues of electronic mail, and
- provides a bibliography
- for those readers who want a more extensive treatment of email. Mic
- Kaczmarczik includes a useful set of tables designed to help users
- construct and send messages between many of the networks described
- in the directory.
-
- Paul Mockapetris contributed the chapter on domains. In a succint
- three and a half pages,
- he does a neat job of summarizing the important concepts of the
- domain name system and describing why the reader should care about
- them. A list of domain names is included.
-
- The OSI X.500 chapter contains more detail than the other essays and is
- less conversational in tone. The focus here is more on the technical
- specifics of the OSI Directory and is aimed at a more technically
- sophisticated audience.
-
- The final chapter, List of Organizations, is a valuable cross-reference
- that gives the reader a picture of the connectivity of over five thousand
- organizations.
-
- A shortcoming of theDirectory is one that is typical of all books
- dealing with an area that is developing as quickly as networkingQsome
- percentage of the data is automatically outdated as soon as the text is
- given to the publisher. However, even if specifics change over time,
- such as contact names, the information that remains serves as a
- starting for finding the most current information.
-
- The User's Directory is impressive for several reasons. It presents a
- huge quantity of information in a straightforward and comprehensible
- way. LaQuey has done an excellent job of editing that doesn't make the
- user feel overwhelmed by a subject that can actually be quite
- overwhelming to those not immersed in network technology. LaQuey's
- efforts at collecting and verifying information are apparent, and her
- diligence proves worthwhile. This reference guide will occupy a
- prominent place on the bookshelves of the masses of network users
- who need the information that LaQuey has compiled.
-
-
- Book Review
-
- by Craig Partridge
-
- John S. Quarterman. The Matrix: Computer Networks and Conference
- Systems Worldwide. Digital Press: Bedford, Mass. 1990.
-
- This book chronicles the existing worldwide networks and discusses
- the history of networking. It is an indispensable reference,
- representing the networking community's first complete look at itself.
-
- The first part of the book is an extended introduction. It presents the
- basic concepts in networking, the history of many of the protocol
- suites, how networks are used, and who's-who listing of standards and
- bodies. The second half of the book lists all known computer networks,
- from the United States and Europe (with dozens of networks) to
- Thailand (TSCnet) and Costa Rica (CATIENET). The coverage is
- extraordinarily thorough. Much of the information comes from private
- communication, and many of the networks are very small (a dozen nodes
- or less).
-
-
-
-
-
-
-
- Book Review
-
- by Craig Partridge
-
- Andrew S. Tanenbaum. Computer Networks, Second Edition, 1988.
-
- Please note: This is a review of the first edition of this book.
-
- Andrew S. Tanenbaum.Computer Networks, Prentice-Hall, Inc. (1981)
-
- This book is . . . the introductory text most often recommended by
- specialists in the computer networking field. One of its great merits
- is its comparative approach. Using examples from SNA and DECnet, as
- well as TCP/IP and OSI, Tanenbaum offers a breadth of coverage that
- few writers can match.
-
- Nonetheless, the book shows its age. It takes a more favorable view of
- protocol layering than is currently in vogue and, because it was written
- while many transport protocols, such as TCP, were still being
- developed, it contains little about what has been learned in the past
- several years concerning transport-level problems. The book also
- offers no discussion of the problems of external data representations
- such as ASN.1. Despite these shortcomings, Computer Networks is
- still a good general reference book. Rumor has it that a second edition
- is due out this year.
-
-
-
-
-
-
-
- Click on an underlined word to see a definition.
-
- 1822
-
- ACK
-
- Acknowledgement
-
- ANSI
-
- AppleTalk
-
- ARP
-
- ARPANET
-
- Authority Zone
-
- Autonomous Confederation
-
- Autonomous System
-
- Backbone
-
- Bandwidth
-
- Baseband
-
- Baud
-
- BBN Bolt Beranek and Newman Inc.
-
- BITNET
-
- Broadband
-
- Broadcast
-
- BSD
-
- Catenet
-
- CCITT
-
- Checksum
-
- Client
-
- Connection
-
- COS Corporation for Open Systems
-
- CREN Corporation for Research and Educational Networking
-
- CSMA/CD Carrier Sense Multiple Access with Collision Detection
-
- CSNET
-
- DARPA Defense Advanced Research Projects Agency
-
- Datagram
-
- DDN Defense Data Network
-
- EARN
-
- EGP Exterior Gateway Protocol
-
- Electronic Mail
-
- Ethernet
-
- email
-
- FDDI Fiber Distribution Data Interface
-
- Field
-
- File Server
-
- Fragment
-
- Frame
-
- FTAM File Transfer, Access, and Management
-
- FTP File Transfer Protocol
-
- Gateway
-
- GOSIP Government OSI Profile
-
- Header
-
- HELLO
-
- Host
-
- ICMP Internet Control Message Protocol
-
- IEEE 802
-
- IEN Internet Engineering Notes
-
- IMP Interface Message Processor
-
- Internet Address
-
- Internet
-
- ISDN Integrated Services Digital Network
-
- ISO International Standards Organization
-
- Layer
-
- LAN Local Area Network
-
- LocalTalk
-
- Mail Bridge
-
- Mail Gateway
-
- MAN
-
- MAP
-
- Message
-
- MILNET MILitary Network
-
- MTU
-
- NBS National Bureau of Standards.
-
- Network
-
- Network Address
-
- NFS Network File System
-
- NIST National Institute for Standards
-
- NIC Network Information Center
-
- NOC Network Operations Center
-
- NNSC NSF Network Service Center
-
- NSF National Science Foundation
-
- NSFNET National Science Foundation Network
-
- NTP Network Time Protocol
-
- ODA Office Document Architecture
-
- OSI Open Systems Interconnect
-
- OSI Reference Model
-
- Packet
-
- Packet Switch
-
- PAD
-
- PING
-
- Protocol
-
- PSN Packet Switch Node
-
- RDP Reliable Datagram Protocol
-
- RFC-733
-
- RFC-822
-
- RFC Request for Comment
-
- RIP Routing Information Protocol
-
- Route
-
- rcp Remote copy
-
- rlogin Remote login
-
- Server
-
- SMTP Simple Mail Transfer Protocol
-
- SNA Systems Network Architecture
-
- SNMP
-
- Source Address
-
- SPAG
-
- Switch
-
- T1
-
- TCP/IP
-
- TELENET
-
- Telnet
-
- TOP Technical/Office Protocol
-
- TP-4/IP
-
- TTL Time To Live
-
- UDP User Datagram Protocol
-
- UUCP UNIX-to-UNIX-CoPy
-
- X.25
-
- X.400
-
- X.500
-
- XNS Xerox Network Services
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 1822
-
- A hardware protocol used to connect an
- Internet host to a packet switch on the
- ARPANET and MILNET. This protocol is
- also called AHIP (Asynchronous Host Interface Protocol). The number
- 1822 comes from the BBN (Bolt Beranek and Newman) report that
- defined the interface for the original ARPANET.
-
-
- ACK
-
- Short for acknowledgement.
-
-
- Acknowledgement
-
- A type of message sent to indicate that a block of data arrived at its
- destination without error. A negative acknowledgement (NACK)
- indicates that the block of data was not correctly received.
-
-
- ANSI
-
- American National Standards Institute. This organization is
- responsible for approving U.S. standards in many areas, including
- computers and communications. Standards approved by this
- organization are often called ANSI standards (e.g., ANSI C is the version
- of the C language approved by ANSI). ANSI is a member of the
- International Standards Organization (ISO).
-
- AppleTalk
-
- A networking protocol developed by Apple Computer for communication
- between Apple Computer products and other computers. This protocol
- is independent of what network it is layered on. Current
- implementations exist on Localtalk (a 235-kilobit/second local area
- network (LAN)), and Ethertalk (a 10-megabit/second local area
- network).
-
- ARP
-
- Address Resolution Protocol. This protocol is used to dynamically bind
- an Internet address to a low-level physical network address. It is
- often used on local area networks (LANs) such as Ethernet.
-
- ARPANET
-
- One of the first heterogeneous-host packet switching networks
- developed for the Advanced Research Projects Agency of the
- Department of Defense (see DARPA). The ARPANET became operational
- in 1968; it was the proving ground for many of the protocols and
- concepts in todayUs Internet.
-
- Authority Zone
-
- The part of a domain name that a single name server resolves. For
- example, if the server spooler .bbn.com is responsible for resolving all
- machine addresses in the domain bbn.com, then its authority zone is
- *.bbn.com (where * means anything is allowed). On the other hand,
- george.random.com would not be in its authority zone.
-
- Autonomous Confederation
-
- A group of independent computer systems that trust each other
- regarding routing (see route) and reachability information. Members of
- an autonomous confederation will believe information provided by other
- members of the confederation in preference to information received
- from systems that are not part of the confederation.
-
- Autonomous System
-
- A collection of networks controlled by one administrative authority.
- The gateways within this system are expected to trust one another and
- to share and update routing information (see route) among themselves
- by any mutually agreeable protocol. A core gateway must also be
- designated to share routing information with other autonomous
- systems via EGP.
-
- Backbone
-
- A central high-speed network connecting independent subnetworks.
- Today, the NSFNET provides a backbone network for regional networks
- such as NEARnet, CSNET, and BARRNet.
-
- Bandwidth
-
- The frequency width of a communications channel, usually measured in
- hertz, kilohertz, or megahertz. For example, one channel on a satellite
- transponder might have a bandwidth of six megahertz, thereby enabling
- it to carry a television signal. Sometimes, this term is applied to how
- much digital information a channel can carry, usually in conjunction
- with fully digital communications lines. For example, a T1 line might
- be said to have a bandwidth of 1.544 megabits/second; however, it
- would be more correct to say that a T1 line can carry or transmit 1.544
- megabits/second.
-
- Baseband
-
- A transmission medium where digital signals are sent without
- complicated frequency shifting. In general, only one communication
- channel is provided at a time on a baseband system. Ethernet is a
- baseband network.
-
- Baud
-
- The number of symbols that may be sent over a communications channel
- per second. Each symbol may be an arbitrary analog signal, and it may
- represent more than one bit of information. For example, a
- communications channel transmitting at 2400 baud, with each symbol
- containing four bits, is capable of sending 9600 bits per second (this is
- in fact the way V.32 9600-baud modems work).
-
- BBN
-
- Bolt Beranek and Newman Inc., a
- diversified high-technology company
- in Cambridge, Massachusetts, was awarded the original contract to
- build the ARPANET and has been extensively involved in Internet
- development. Today, BBN is responsible for managing the NNSC, CSNET,
- and NEARnet among others. This stack is brought to you by the NNSC
- staff at BBN (Hi Mom!).
-
-
- BITNET
-
- Because ItUs Time Network. An academic and research network
- connecting approximately 2500 computers in thirty-two countries.
- This network provides interactive electronic mail, and file transfer
- services via a store-and-forward methodology based on IBM NJE
- protocols. BITNET traffic and Internet traffic are exchanged via
- several gateway hosts. This network is now part of the Corporation for
- Research and Educational Networking (CREN).
-
-
- Broadband
-
- A transmission medium where multiple digital channels are frequency
- multiplexed onto a single cable. This type of network requires
- relatively complicated electronics, but is capable of carrying voice,
- data, and video all on the same medium. Cable television systems are
- examples of broadband networks.
-
-
- Broadcast
-
- A technique used to send packets to all hosts on a network. Broadcasts
- are often used in conjunction with ARP and RARP protocols on local
- area networks.
-
- BSD
-
- Berkeley Source Distribution. This acronym is used to describe the
- versions of the UNIX operating system and its utilities developed and
- distributed by the University of California at Berkeley. "BSD" is usually
- preceded by the version number of the distribution, e.g., "4.3 BSD" is
- version 4.3 of the Berkeley UNIX distribution. Many Internet hosts run
- BSD software, and it has been the ancestor of many commercial UNIX
- implementations such Sun OS and SequentUs Dynix.
-
- Catenet
-
- A term coined to describe the communications structure created when
- packet switched networks are connected by gateways. The term
- internet without a capital I is now more commonly used.
-
- CCITT
-
- Comit Consultatif International de Tlgraphique et Tlphonique
- (International Consultative Committee on Telephone and Telegraph).
- This organization is part of the United Nations International
- Telecommunications Union (ITU) and is responsible for making
- technical recommendations about telephone and data communication
- systems. X.25 is an example of a CCITT recommendation. Every four
- years CCITT holds plenary sessions where they adopt new standards; a
- session is planned for 1992.
-
- Checksum
-
- A computed symbol whose value is dependent upon the entire contents
- of a message or packet. This value is usually
- sent along with the message when it is transmitted. The receiving
- system computes a new checksum based upon the received data and
- compares this value with the one sent with the packet. If the
- two values are the same, the receiver has a high degree of confidence
- that the data was received correctly.
-
- Client
-
- A computer system or process that requests a service of another
- computer system or process. A workstation requesting the contents of
- a file from a file server is a client of the file server.
-
- Connection
-
- An agreement between two processes or hosts to pass information
- along a specified protocol path without further exchanges of addressing
- information.
-
- COS
-
- Corporation for Open Systems. An international non-profit organization
- made up of computer users and vendors. This organizationUs mission is
- to provide ways of testing OSI implementations.
-
- CREN
-
- Corporation for Research and Educational Networking. This
- organization was formed in October, 1989, when BITNET and CSNET
- were combined under one administrative authority. CREN is now
- responsible for providing networking service to both BITNET and CSNET
- users.
-
- CSMA/CD
-
- Carrier Sense Multiple Access with Collision Detection (phew!). This is
- a characteristic of a local area network (LAN). When multiple users
- have access to the network for transmitting data, the network avoids
- transmitting data from more than one user at a time, so that they avoid
- running into each other. Ethernet works this way.
-
- CSNET
-
- Computers and Science Network. A network that was established to
- provide mail forwarding and Internet connectivity to computer (and
- now other) science researchers. This network primarily provides
- electronic mail service via dial-up lines, although X.25 and Internet
- services are available from sites that are suitably connected. This
- network is now part of the Corporation for Research and Educational
- Networking (CREN).
-
- DARPA
-
- Defense Advanced Research Projects Agency. An agency of the U.S.
- Department of Defense responsible for the development of new
- technology for use by the military. DARPA (formerly known as ARPA)
- was responsible for funding much of the development of the Internet
- we know today. The New York Times business section called DARPA
- "AmericaUs answer to JapanUs MITI."
-
- Datagram
-
- A packet whose routing (see route) and interpretation is independent of
- other packets being sent by that host. Every datagram must contain a
- destination address, since it cannot rely on addressing information
- sent by previous packets. Datagrams are a connectionless form of
- communication, and are the basic building blocks of the internet
- protocol (IPQsee TCP/IP).
-
-
- DDN
-
- Defense Data Network. A worldwide operational communications
- network serving the US Department of Defense composed of ARPANET,
- MILNET, and other portions of the Internet, used to connect military
- installations. It is run by the Defense Communications Agency (DCA).
-
-
- EARN
-
- European Academic Research Network. A network connecting European
- university and research institutions providing electronic mail and
- remote job entry facilities. This network uses BITNET protocols and
- connects to BITNET in the U.S.
-
- EGP
-
- Exterior Gateway Protocol. This protocol is used by a gateway
- representing an autonomous system to export to other gateways
- information concerning networks and gateways contained within that
- system.
-
- Electronic Mail
-
- A system whereby a computer user can exchange messages with other
- computer users (or groups of users) via a communications network.
- Electronic mail is one of the most popular uses of the Internet.
-
- Ethernet
-
- A 10-megabit/second standard for local area networks (LANs), initially
- developed by Xerox, and later refined by Xerox, DEC, and Intel. All hosts
- are connected to a coaxial cable where they contend for network access
- according to the CSMA/CD protocol.
-
- Email (or E-mail)
-
- Shortspeak for electronic mail (q.v.).
-
- FDDI
-
- Fiber Distribution Data Interface. A newly emerging standard for a
- fiber-optic local area network (LAN) running at 100 megabits/second.
-
- Field
-
- In computer messages, data files, and programs, a field is a group of
- characters that is treated as a unit. For example, each TCP/IP packet
- contains fields for addressing and routing information (see route).
-
- Internet users may encounter fields in the header of an electronic mail
- message. The fields are lines that begin with a field-name followed by
- a colon and a space. To: and From: are the only required header fields,
- but there are optional standard fields for the user, and fields that are
- added by the mail delivery system. The format of email messages is
- defined in RFC-822.
-
- File Server
-
- A computer whose principal purpose is to store files and provide
- network access to those files.
-
- Fragment
-
- A piece of a packet. When a gateway is forwarding a maximum size IP
- (see TCP/IP) packet to a network that has a smaller maximum packet
- size, it is forced to break up that packet into multiple fragments for
- transport on the new network. These fragments will be reassembled
- by the IP layer at the destination host (or possibly by an intermediate
- gateway under some circumstances).
-
- Frame
-
- An assembly of bits at the Data Link layer of the ISO protocol stack.
- This collection of bits begins with some bits used for header
- information, and ends with some checksum bits used for error
- detection and/or correction. All bits between the header and the
- checksum are data.
-
- FTAM
-
- File Transfer, Access, and Management. An application layer protocol
- for moving and manipulating files.
-
- FTP
-
- File Transfer Protocol. A protocol permitting a user on one Internet
- host to access and transfer files to another host over a network, such
- as the Internet. FTP is usually the name not only of the protocol, but
- also of the program the user invokes to execute the protocol (e.g., ftp
- host.bbn.com). This protocol is usually layered on top of TCP and IP
- (see TCP/IP). FTP is available on several operating systems. You can
- use the ftp command to copy computer files that contain a variety of
- information, such as software, documentation, or maps.
-
-
- Gateway
-
- A computer used to connect together one or more networks. This
- computer is seen as a host by the networks to which it is connected,
- but is capable of forwarding packets from one network to another.
- Gateways are also responsible for providing and receiving routing
- information to other gateways in the Internet so that they will know
- the best routes for sending packets between networks. One may think
- of a gateway as a packet switch with whole computer networks as its
- communication links.
-
-
- GOSIP
-
- Government OSI Profile. GOSIP is a collection of ISO specifications for
- mixed-vendor networks for use by the government. Government
- networks are mandated to support GOSIP in the not-too-distant future.
-
- Header
-
- The header is information that appears at the top of an electronic mail
- message. See field.
-
- HELLO
-
- An inter-packet switch protocol used in the NSFNET to determine
- shortest delay routing (see route). This protocol is only used among
- packet switches that trust each other.
-
- Host
-
- A computer that allows users to communicate with other host
- computers on a network. Individual users communicate by using
- application programs, such as electronic mail, TELNET, and FTP.
-
- ICMP
-
- Internet Control Message Protocol. This protocol is an integral part of
- the Internet Protocol (IPQsee TCP/IP). The protocol is used to exchange
- error and control information among IP hosts. For example, a gateway
- that is sent an IP datagram for which it is not the best route would
- send an ICMP redirect packet back to the originating host to inform it
- of the best route. ICMP implementations also provide fault isolation
- capabilities such as packet echo.
-
- IEEE 802
-
- The IEEE standards for local and metropolitan area networks (see LAN
- and MAN). This class of standards is further broken down by type of
- network, each of which is specified by digits after a decimal point. For
- example, the Ethernet standard is 802.3; IBM Token Ring is IEEE 802.5.
-
- IEN
-
- This stands for Internet Engineering Notes.
-
-
- IMP
-
- Interface Message Processor. This was the name for the original
- packet switches used in the ARPANET and MILNET. Today, the term
- Packet Switch Node or PSN is in more common usage.
-
- Internet Address
-
- A thirty-two-bit number that uniquely identifies an Internet host. This
- address is typically represented in eight-bit numbers (octets)
- separated by dots, e.g., 128.89.1.132. An Internet address consists of a
- network number and a host number, and may be a class A, B, or C
- address. A class A network address is formatted as N.H.H.H, providing
- seven bits of network number and twenty-four bits of host number (e.g.,
- 26.0.0.117 indicates host 117 on net 26). A Class B network address is
- formatted as N.N.H.H, providing fourteen bits of network number and
- sixteen bits of host number (e.g.,128.89.1.132 indicates host 1.132 on
- net number 128.89). A Class C network address is formatted as N.N.N.H,
- providing twenty-two bits of network number and eight bits of host
- address (e.g.,192.1.14.28 indicates host 28 on network number
- 192.1.14).
-
- The Internet is the interconnection of many networks throughout the
- world that speak the same language, namely the TCP/IP protocol suite.
- Internet with a capital I refers specifically to that internet that
- contains NSFNET, MILNET, and DDN.
-
- You may see "internet" with a small "i." This can refer to any network
- built out of the TCP/IP protocol suite, or it might refer to networks
- using other protocol families that are composites of smaller networks.
-
- Internet
-
-
- ISDN
-
- Integrated Services Digital Network. A public digital network designed
- to integrate voice and non-voice traffic. This system is intended to be
- a replacement for our current analog telephone systems, and as such is
- being standardized by the CCITT.
-
- ISO
-
- International Standards Organization. The international body
- responsible for establishing multivendor networking standards.
-
-
- Layer
-
- Communication networks for computers may be organized as a set of
- more
- or less independent protocols, each in a different layer (also called
- level). The lowest layer governs direct host-to-host communication
- between the hardware at different hosts; the highest consists of user
- applications. Each layer builds on the layer beneath it. For each layer,
- programs at different hosts use protocols appropriate to the layer to
- communicate with each other.
-
- TCP/IP has five layers of protocols, and OSI
- has seven. The advantage of different layers of protocols is that the
- methods of passing information from one layer to another is specified
- clearly as part of the protocol suite, and changes within a protocol
- layer are prevented from affecting the other layers. This greatly
- simplifies the task of designing and maintaining communication
- programs.
-
- LAN
-
- Local Area Network. A data network intended to serve an area of only a
- few square kilometers or less. Because the network is known to cover
- only a small area, optimizations can be made in the network signal
- protocols that permit data rates in the 10-megabyte-per-second to
- 100-megabytes-per-second range today. Wide-area communication is
- accomplished by connecting LANs together via metropolitan area
- networks (MANs) or wide-area networks (WANs). Both Ethernet and
- FDDI are local area networks.
-
- LocalTalk
-
- A local area network (LAN) protocol developed by Apple Computer. This
- network is designed to run over twisted pairs of telephone wire and has
- a data rate of 235 kilobits/second. All Macintosh computers contain a
- LocalTalk interface.
-
- Mail Bridge
-
- A mail gateway that forwards electronic mail between two or more
- networks while ensuring that the messages it forwards meet certain
- administrative criteria. A mail bridge is simply a specialized form of
- mail gateway that enforces an administrative policy with regard to
- what mail it forwards.
-
- Mail Gateway
-
- A network host that forwards electronic mail between two or more
- possibly dissimilar networks. In the process of forwarding the mail,
- the gateway may have to reformat addresses and mail headers to
- conform with the electronic mail standards of the destination network.
-
- MAN
-
- Metropolitan Area Network. A data network intended to serve an area
- approximating that of a large city. Such networks are being
- implemented by innovative techniques such as running fiber cables
- through subway tunnels.
-
- MAP
-
- Manufacturing Automation Protocol. A protocol stack developed by
- General Motors following the OSI model that guarantees access to each
- host within a certain maximum time. At the upper layers, it includes
- many of the OSI standards. At the lower layers, it is based upon Token
- Bus (IEEE 802.4).
-
-
- Message
-
- "Message" has multiple meanings:
-
- 1) A user-defined collection of data sent
- over a network.
-
- 2) A piece of text displayed on a terminal
- screen that was sent by a user or a
- program.
-
- 3) A collection of data sent from one
- computer programming entity to
- another.
-
-
- MILNET
-
- MILitary NETwork. This network was created in 1984 from parts of the
- original ARPANET. The military users wished to have an operational
- production network, while the research community wished to have a
- network on which to continue experimenting in networking. Therefore,
- the military users were placed on MILNET, the research users were
- placed on ARPANET, and the two networks were connected with mail
- bridges and gateways. Today, MILNET is one of the class A networks in
- the Internet.
-
- MTU
-
- Maximum Transmission Unit. The largest number of bits that a
- network permits to be transmitted as one packet.
-
-
-
- NBS
-
- National Bureau of Standards. This organization, which was part of the
- U.S. Department of Commerce, was responsible for establishing
- standards in the United States. It has since become the NIST.
-
- Network
-
- A computer network is a group of computers that can communicate
- electronically. Networks can be composed of computers in a single
- building (Local Area Networks or LANs), or computers thousands of
- miles apart (Wide Area Networks or WANs). The Internet is a
- worldwide collection of computer networks that can intercommunicate.
- The system manager and computer center staff at your site can provide
- information about your local network.
-
-
- Network Address
-
- A number or group of numbers that uniquely specifies a host on a
- network. For example, 128.89.1.178 is the network address for
- nnsc.nsf.net. Also, informally, an electronic mail address. For
- example, nnsc@nnsc.nsf.net is the network address for the NSF
- Network Service Center (NNSC).
-
- NFS
-
- Network File System. This acronym describes a protocol developed by
- Sun Microsystems to allow a computer system to access files over a
- network as if they were on its local disks. This protocol has been
- incorporated in products by more than two hundred companies, and is
- now a de facto Internet standard.
-
-
- NIST
-
- This stands for the National Institute for Standards and Technology
- (see NBS).
-
- NOC
-
- Network Operations Center. A location from which the operation of a
- network or internet is monitored. This center also usually serves as a
- clearinghouse for problems and efforts to resolve those problems.
-
- NSF
-
- National Science Foundation. A government agency whose purpose is to
- promote the advancement of science. NSF funds science researchers,
- scientific projects, and infrastructure to improve the quality of
- scientific research. The NSFNET, funded by NSF, is an essential part of
- academic and research communications.
-
- NTP
-
- Network Time Protocol. A protocol built on top of TCP (see TCP/IP)
- that assures accurate local time-keeping with reference to radio and
- atomic clocks located on the Internet. This protocol is capable of
- synchronizing distributed clocks within milliseconds over long time
- periods.
-
- ODA
-
- Office Document Architecture. This emerging standard defines ways in
- which text, graphics, and facsimile documents can be moved over a
- multivendor network.
-
- OSI
-
- Open Systems Interconnect. Usually used as shorthand for the Open
- Systems Interconnection Reference Model (OSI Reference Model).
-
- OSI Reference Model
-
- A seven-layer structure designed to describe computer network
- architectures and the way that data passes through them. This model
- was developed by the ISO in 1978 to clearly define the interfaces in
- multivendor networks, and to provide users of those networks with
- conceptual guidelines in the construction of such networks.
-
- Packet
-
- A collection of data sent as a unit along a packet network. Packets are
- self-contained; each packet has its own source address and destination
- address and cannot exceed a maximum size. Long messages are broken
- up into multiple packets for transmission over the network.
-
- Packet Switch
-
- See PSN.
-
- PAD
-
- Packet Assembler/Disassembler. A network host designed to interface
- terminals to a packet network.
-
- PING
-
- Packet Internet Groper. A program that sends packets to a remote host
- on the Internet and looks for replies. This program works via the
- echoing facility provided by the ICMP protocol and is a way to
- determine if an Internet host is reachable from your host.
-
- Protocol
-
- A mutually agreed procedure for communicating information between
- two parties. Standard protocols are the basis for all computer
- communication.
-
- PSN
-
- Packet Switch Node. A dedicated computer whose purpose is to accept,
- route, and forward packets in a packet switched network.
-
- RDP
-
- Reliable Datagram Protocol. An Internet standard protocol for reliably
- sending datagrams between user programs. This protocol is like UDP,
- but guarantees delivery and does retransmission as necessary. This
- protocol is built on top of IP (see TCP/IP) and uses IP for datagram
- delivery.
-
- RFC-733
-
- An obsolete version of the Request for Comments (Standard for the
- format of ARPA Internet Test Messages, August 16, 1982) that
- specifies the format of electronic mail messages. See RFC-822.
-
- RFC-822
-
- The current version of the Request for Comments that specifies the
- format of electronic mail messages.
-
- RFC
-
- Request for Comments. RFCs are the principal documents used on the
- Internet to propose new protocols and services. These documents are
- published as electronic documents on nic.ddn.mil by the DDN NIC.
-
- RIP
-
- Routing Information Protocol. A routing (see route) protocol provided
- in the Berkeley UNIX (see BSD) operating system, that permits a group
- of hosts located on a local network to share routing information. This
- function is provided by the program routed.
-
- Route
-
- A path from one Internet host to another.
-
- rcp
-
- Remote copy. A program and protocol provided in the Berkeley UNIX
- operating system (see BSD) that permits files to be copied from one
- computer to another by an extension to the syntax of the UNIX cp (copy)
- command. This protocol is largely implemented among UNIX machines,
- but the protocol is general enough that non-UNIX machines may use it.
- However, rcp does not provide the word-length adaptability and
- flexibility that the FTP protocol does.
-
- rlogin
-
- Remote login. A program and protocol provided in Berkeley UNIX (see
- BSD) that permits a user on one computer to log in to another computer.
- This protocol is largely implemented among UNIX machines, but the
- protocol is general enough that non-UNIX machines may use it. For
- example, Excelan ANNEX terminal concentrators permit users on dumb
- terminals to use the rlogin protocol to communicate with Internet
- computers.
-
- Router
-
- A device that chooses routings for packets. This is a generic term and
- applies to such diverse devices as bridges (which pass packets from
- one physical LAN to another with almost no interpretation) and WAN
- gateways (which pass packets from one wide area network to another,
- doing fragmentation and reassembly as necessary).
-
- Server
-
- A computer system or process that provides a service for other
- computer systems or processes to access. A supercomputer can be
- thought of as a computation server. A program that provides Internet
- File Transfer Protocol (FTP) access to local files is usually called an
- FTP server.
-
- SMTP
-
- Simple Mail Transfer Protocol. This Internet standard network protocol
- is used to move electronic mail messages from one host to another.
-
- SNA
-
- Systems Network Architecture. A proprietary networking architecture
- used by IBM and IBM-compatible mainframe computers. Because of its
- widespread use, SNA is a de facto standard. While it can use packet
- switched networks for transport, SNA is largely a circuit-switching
- rather than a packet-switching technology.
-
- SNMP
-
- Simple Network Monitoring Protocol. This Internet standard protocol is
- used by a network monitoring center to gather information regarding
- the status of hosts on its network or on the Internet.
-
- Source Address
-
- The network address of the host that originates a packet.
-
- SPAG
-
- Standards Promotion and Applications Group. This European
- organization collaborates with COS to promote testing procedures and
- techniques for OSI products.
-
- Switch
-
- A computer responsible for routing (see route) packets in a packet
- switched network.
-
- T1
-
- A communications service over leased lines and microwave links that
- runs at 1.544 megabytes per second. The major links of the NSFNET are
- T1. Faster services such as T3 (45 megabytes per second) are
- available, although they are not yet off-the-shelf products. The
- NSFNET is in the process of upgrading to T3, and plans much higher
- transmission rates for the future.
-
- TCP/IP
-
- Transmission Control Protocol/Internet Protocol. A Department of
- Defense standard protocol suite encompassing both network and
- transport level protocols. While the terms TCP and IP specify two
- protocols, common usage of the two terms together has come to
- represent the entire DoD protocol suite based upon these protocols,
- including Telnet, FTP, UDP, and RDP. Technically, this is incorrect
- usage, because other protocol stacks can be layered on top of TCP and
- IP that provide similar services, but are not part of the DoD standard
- protocols (e.g., TP-4/IP, FTAM on TCP, etc.). Ideally, one should only
- use TCP/IP to mean the TCP protocol layered on top of the IP protocol.
-
- TELENET
-
- A commercial wide-area packet switching X.25 network.
-
- TELNET
-
- Telnet is a program that allows a computer user at one site to work on
- a computer at another site. It is the Internet standard protocol for
- remote terminal connection service.
-
- Telnet requires Internet access, that is, you must be on a TCP/IP
- network that gateways to the Internet. Unlike FTP and electronic mail,
- Telnet actually exposes you to the commands and programs of the
- remote host.
-
- For example, you can use the telnet command to run a program in your
- directory on a supercomputer hundreds of miles away.
-
- TOP
-
- Technical/Office Protocol. A protocol stack for office automation
- developed by Boeing following the OSI model. This protocol is very
- similar to MAP except at the lowest levels, where it uses Ethernet
- (IEEE 802.3) rather than Token Bus (IEEE 802.4).
-
- TP-4/IP
-
- The ISO protocol suite that performs the same functions as TCP/IP.
- TP-4 provides reliable, connection-oriented data streams using
- datagrams. This protocol also handles error detection, synchronization,
- and retransmission, just as TCP does.
-
- TTL
-
- Time To Live. A field in a datagram designed to prevent packets from
- looping indefinitely in the Internet. Because routing information
- changes dynamically, two or more gateways may occasionally forward
- packets to each other in a loop, since each believes the other is the
- best route to the destination. A packet is initially sent with a nonzero
- TTL field, and each gateway that forwards that packet decrements the
- value in that field. Once the value reaches zero, a loop is assumed and
- the packet is discarded.
-
- UDP
-
- User Datagram Protocol. The Internet standard protocol for sending
- datagrams between user programs. This protocol neither guarantees
- delivery nor does it require a connection. As a result it is lightweight
- and efficient, but requires the application to do all error processing
- and retransmissions. This protocol is built on top of IP and uses IP for
- datagram delivery (see TCP/IP).
-
- UUCP
-
- UNIX-to-UNIX-CoPy. This was initially a program run under the UNIX
- operating system (see BSD) that permitted one UNIX system to send
- files to another UNIX system via dial-up phone lines. Today, the term is
- more commonly used to describe the large international network made
- up of these machines using the UUCP protocol to pass netnews and
- electronic mail.
-
- X.25
-
- A standard networking protocol suite approved by the CCITT and ISO.
- This protocol suite defines standard physical, link, and networking
- layers only (layers 1 through 3). X.25 networks are in use throughout
- the world.
-
- X.400
-
- The CCITT standard for electronic mail. X.400 systems are in use in
- Europe, Canada, and several U.S. commercial installations.
-
- X.500
-
- The CCITT standard for electronic mail directory services.
-
- XNS
-
- Xerox Network Services. A proprietary networking architecture
- developed by Xerox.
-