Dec 132017
 
Info from Internet about Ping / FTP sites in Microsoft Word format.
File HAND1.ZIP from The Programmer’s Corner in
Category UNIX Files
Info from Internet about Ping / FTP sites in Microsoft Word format.
File Name File Size Zip Size Zip Type
HAND1.DOC 191503 33546 deflated
READ.DOC 167 138 deflated

Download File HAND1.ZIP Here

Contents of the HAND1.DOC file


-/@,-0Bp(PT0pLm
44h7sxTfIntroduction to the internet
by David B. ODonnell




W

elcome to the Internet! This handout is intended to complement the brief introduction I am giving you today. Information in this document will be in more depth than our talk and will cover topics I dont have time to discuss with you today. I hope that you will use this handout as a kind of tourists guide to the services and power of the Internet.


Throughout this handout you will see instances of the symbol to the left. The sections it appears next to cover topics I consider to be fairly advanced. They wont be covered in any depth in our talk and may not be discussed at all. Consider them future challenges for you to get out there and plumb the depths of the worlds largest collection of networks!


The symbol to the left of this paragraph introduces a section of the handout which will be covered during the Internet talk. It is also used to indicate when advanced topics are over.



Organization
This handout is organized into seven sections as shown below:

Section One:Introduction
Section Two:Email
Section Three:Files
Section Four:Traveling
Section Five:Other Services
Section Six:Notes
Section Seven:Index to Topics

The primary thrust of the talk will be on sections One and Two, with some brief stops in the remaining sections. Section Six is actually a blank page for you to jot down notes.


Contacting the Author
If you have questions that this handout and the discussion dont cover, or you would simply like to get in touch with me, send rfc 822 compliant email (see Section Two) to one of the addresses below:
[email protected]@brownvm.brown.edu
Be sure to include your name and a subject which is indicative of the mailI occasionally get so deluged with email that even I have to prioritize, and personal mail ranks highest after my listserv management tasks.

Resources
Some of the information in this handout comes from !%@:: A Dictionary of Electronic Mail Addressing and Networks, Second Edition, by Donnalyn Frey and Rick Adams. This dictionary is published by OReilly and Associates, Inc., located at 632 Petaluma Ave, Sebastopol CA 95472. The publishers can be reached via email at:
[email protected]
Many other sources of information were used; I would like to thank all of them for their indispensable assistance and information. Thanks particularly to the membership of the IETF (Internet Engineering Task Force) listserv forum, located at the Information Sciences Institute of the University of Southern California, Marina del Rey, for their speedy reply to my email inquiries. Thanks also to Peter DiCamillo of Brown University for pointing me in the direction of IETF, and to David Bogartz of Ziff Desktop Information for his insightful suggestions and Macintosh information. Information on gopher was obtained, over gopher, from the University of Illinois at Urbana-Champaign. bitftp information comes from the bitftp service at Princeton University. Special thank-yous go to Mark Lottor, Ole Jacobsen, Alex Bochannek, Frank Solensky, Donald Eastlake iii and Sheryl Frez for their data and graphics, which made my numbers more accurate and gave me a bigger picture on the scope of the Internet. Information on fidonet was gleaned primarily from Gne Raymond, to whom I owe a debt larger than can be expressed here. star trek: the next generation and star trek: deep space nine characters are registered trademarks of Paramount Pictures. I would also like to thank my friends Julie, Carole and Yvonne for providing much-needed editorial comments. Finally, much of this handout is based on personal experience of the author. Any errors are, naturally, the fault of the author only.

Publication Specifications
This handout was produced in Microsoft Word for WindowsSYMBOL 228 \f "Symbol". The cover page, footer graphic and advanced and topical graphics were created in Corel DRAW!SYMBOL 228 \f "Symbol" and imported into Word as 300dpi tiff images.

Body and footnote text for this handout is set in Monotype Calisto. Paragraph headers and figure/chart text are Univers; section heads, title and drop cap are Monotype Bodoni Bold Condensed and computer text is Univers Condensed.

Section One: introduction

Who Am I?

You might be asking yourself, Just who is this David ODonnell and why is he going on about the Internet? Well, I have been working and playing with computers since the early 1980s, and Ive been traveling the world networks since 1986. I have several accounts which have access to the Internet; own and manage four Internet email conferences while participating in over a dozen more; and maintain a healthy presence on the fido and rime bbs networks.

The Internet: No Matter Where You Go, There You Are.
Although its namethe Internetimplies one gigantic network, in fact the Internet is a loose collection of networks which literally spans the globe.

CREATION. The Internet did not have a specific date of birth: in 1969 the United States Defense Advanced Research Projects Agency (darpa) started an experimental packet-switched host-to-host network called arpanet. This network expanded to include military sites (milnet) and other non-classified government networks. In 1982, arpanet joined with milnet and others and the Internet was born. Today the Internet has connections in the United States, Canada, Mexico, Central and South America, Europe, the former Soviet Union and client states, Australia, the Pacific Basin and Asia. Currently the Internet has links in over 40 nations with over sixty thousand sites. Gateways to other networks such as bitnet, janet and eunet make connecting all across the world virtually seamless.

GROWTH. The Internet is growing at a phenomenal rate. Today technology allows virtually anyone with a personal computer and modem to connect to one of the dozens of sub Internets via email. It is becoming common for the more powerful personal computers and workstations to have direct connections which allow other services such as ftp and telnet (see Sections Three and Four). It is estimated that nearly two million computers are connected to the Internet and its subnetworks and that over nineteen million people have accounts on hosts with some kind of Internet linkage.


Excerpts from the January 1993 Internet Domain Survey. (Produced quarterly by the Network Information Systems Center at SRI International; contact Mark Lottor [email protected] for more information.)

Jan. 1993
Oct. 1992
Jul. 1992
Apr. 92
Jan. 92
Change

Hosts:
1 313 000
1 136 000
992 000
890 000
727 000
80.6%+

Domains:
21 000
18 100
16 300
20 000
17 000
23.5%+


To ping every host on the Internet would take 37 hours assuming a reply time of 100 milliseconds. Given an average of ten users per Internet host, there were approximately thirteen million people on the Internet in January 1993.

If every user were registered with network name servers, the birthday daemon would have to deliver some 35,600 email announcements per day.

For more information, check out the following directories on host ftp.nisc.sri.com:
pub/zonepub/zone/iso-country-codes
For information on the census program used to create the Domain Survey, see technical report UCSCCRL9234 located on the host ftp.cse.ucsc.edu.
Section Two: email

Basic Information
Everyone is familiar with the idea of mail, and email is probably nothing new to youafter all, email is only an extension of the familiar, right? Email is more than just an extension, however. Its practically a new medium, only vaguely related to surface mail.

Briefly put, email is an electronic document transmitted from a sender to one or more recipients. It is composed of two basic pieces: a header and the body. These are characteristics shared by all email in existence today. Beyond this preliminary description, however, similarities can vanish.

One of the most interesting features of the Internet is that virtually every personal computer, minicomputer and maiframe can connect to it in one fashion or another. There are easily a dozen operating systems in use on the Internet: vm, vms, mvs, ultrix, dos, unix, nextstep, os/2, Macintosh System, and so on. Nearly every operating system has its own email style, as will be covered later in this handout. To overcome the mess of competing standards, the Internet had adopted a particular format for email. Based on the rfc (Request for Comments) 822, it is called rfc 822-compliant email.


Requests for Comments are documents drawn up by scholars, researchers and computer scientists in an attempt to help provide working standards for the Internet. Many file servers on both the Internet and bitnet maintain repositories of some or all of these documents. If you know of a particular rfc you are interested in getting hold of, check out these sites:
educom.eduBITNIC
Another good way to search is to use the archie service (see Section Three) and search on either rfc or rfcxxxxx, replacing xxxxx with the number of the document youre seeking.

RFC 822 Compliant Addressing

Dont let the imposing name deter you from exploring further! As explained above, all email consists of two parts: a header and the body. The header contains a series of informative lines which tell the mailing system where to deliver to mail and provide basic memorandum-like information for the sender and recipient(s). The body generally consists of free-form text. However, technological advances are making it possible to imbed graphics, sound, and even full-motion video in the body of email. Some computers, such as the NeXT machine, already have this capability.

THE HEADER. If you imagine email as a form of advanced memoranda, its easy to come up with the basic information needed in an email header. The header lines consist of a tag which identifies the information and the information itself. All tags end in a colon and are followed by white space: one or more spaces or tabs. Tag information is text which may or may not be in a particular format, depending on the tag it applies to. Rfc 822 allows for wrapping on lines whose contents exceed the informal eighty-character line length standard; wrapped lines are identifiable by the first character on subsequent lines being white space.

Date:Friday, 26 March 1993; 22:18:45 EST
To:[email protected] (David B. ODonnell),
[email protected]
From:[email protected] (Dr. Julian Bashir)
Subject:Failed mail to user [email protected]?
Cc:[email protected]

In fact, the text above does constitute a fully legal Internet mail header, even though the originator and carbon copy recipient addresses are fakes. The absolute minimum tags required to address email on the Internet consist of the Date:, To: and From: tags. All others are unnecessary though in practice a great many more are used. Internetters being the industrious folk that we are, the list of frequently used header items is much larger. In fact, it would not be out of the ordinary to receive email where the header lines number in the dozens and the header tags (the words suffixed with colons) are numbered in the tens.


Some Additional Common Email Header Tags:
Received:
Return-Path:
Full-Name:

Mailer:
X-tag:
Resent-tag:

BCC:
Message-Content:
X-400-Address:

Comment:
Reply-To:
In-Reply-To:

Organization:
Message-ID:
Sender:

In general, one can include almost any kind of information in the email header. For example, it is not uncommon to see a tag called X-Face: which contains a compressed graphical image some mail systems can decompress and display at the users terminal. Under rfc 822 any tag which begins with X is considered an extension to the listed set and can safely be ignored by email processing systems.


THE BODY. The body of email is separated from the header by exactly one blank line. The rfc 822 specification does not state what format the body information must appear in, but the vast majority of email on the Internet today consists of eighty-character-wide lines of ascii text.

ADDRESSING EMAIL. To address email it is necessary to know the recipients email address. Similar to the postal address we all have, an email address is a means of identifying where on the Internet a person can be contacted. For example: I can be reached by several addresses, including [email protected]; I consider it to be my primary email address.

Addresses are divided into two parts: the userid and the host domain (or domain name). Unless the recipient of your email resides on the same Internet host as you, it will always be necessary to specify both the userid and host domain when sending a piece of email to another person.

The userid is fairly straightforward: it is a collection of letters and possibly numbers which is used by the host to reference the user. In the case of my email address, atropos is my userid. The composition of the host domain, on the other hand, is somewhat more complex.

The host domain string is a hierarchical assemblage of components whichif properly constructedshould identify just where in the Internet a user is coming from. The host domain proceeds from left to right in order of increasing generality of location. In other words, if we dissect the domain name from my email address (netlab.cis.brown.edu) we see that I am in the educational domain (edu), am located at Brown University (brown), and that the computer I log in to, netlab, is part of Computing and Information Services (cis). Realistically speaking it is fairly unusual for a host domain string to be that clear to human beingsand I am aided in this dissection by the fact that I already know all this informationbut it is generally possible to glean at least some information about the user from the domain name portion of their email address.

Because the networks that historically began the Internet were located in the United States, most sites in the US, Canada and US overseas installations follow a breakdown into six generic domains:

SYMBOL 183 \f "Symbol" \s 10 \hedu:These are educational sites, such as universities(example: brown.edu, Brown University)
SYMBOL 183 \f "Symbol" \s 10 \hcom:These are commercial sites, generally large corporations with research facilities attached to the Internet(example: lotus.com, Lotus Development Corporation)
SYMBOL 183 \f "Symbol" \s 10 \hgov:These are non-military government sites(example: nasa.gov, the National Aeronautics and Space Administration)
SYMBOL 183 \f "Symbol" \s 10 \hmil:These are military installations(example: wsmr-simtel20.mil, White Sands Missile Range)
SYMBOL 183 \f "Symbol" \s 10 \horg:These are non-commercial, non-network sites and gateways(example: fidonet.org, the fidonetSYMBOL 171 \f "Symbol"Internet gateway)
SYMBOL 183 \f "Symbol" \s 10 \hnet:These are other networks to which email must traverse a gateway(example: uunet.uu.net, the uucpSYMBOL 171 \f "Symbol"Internet gateway)

The rest of the world uses a domain-naming standard which makes use of two-character country abbreviations (de for Germany, se for Sweden, uk for the United Kingdom, et cetera). Within the domains the hierarchical schemes can vary but the most common variation is to include a US-style identifier for the type of installation the user is at. For example: [email protected] identifies someone at the University of Sydney in Australia. It is becoming more common in the US for sitesparticularly small onesto adopt this naming strategy as well. Therefore someday you may well be able to send email to [email protected].

Common Email Programs and Platforms
The following are some of the most common platforms and operating systems which can send and/or receive Internet mail; also given where applicable are the common email system(s) for each entry.

UNIX. Unix systems are particularly common on the Internet. Many pay-as-you-go and free Internet hosts use unix as their operating system.

Unix comes with an email system called, appropriately enough, mail. It can send and receive Internet email and uucp mail, the original built-in mail network. A more useful email program is available on nearly every unix system, elm. Elm uses a menu-driven interface and allows users to set up aliases for frequent email recipients, specify the text editor of their choice, maintain a simple calendar and reminder system and categorize email into folders.


VMS. Vms systems are also fairly common on the Internet and there are several sites where access can be purchased. Dec calls its e-mail technology decnet; although the name implies a network, this is not the case; decnet is only the technology.


Vms also comes with a built-in email system called mail. While vms systems can send and receive Internet mail, it is not always easy to do so using the internal mailing system. The vms mail system can be configured locally for Internet (and bitnet) email delivery. The most common method of addressing mail to a non-decnet (e.g., non-vms) system is as follows:
network%"userid@host-domain"
For example, to send email to my netlab account you would enter
in%"[email protected]"
for the recipient address, while sending email to my bitnet account would entail entering
bitnet%"el406006@brownvm"
for the recipient address. There is another email package available for vms called mm which uses directly-rfc 822 compliant addressing. The interface for mm is also nicer than that of vms mail, particularly when the users terminal can support vt-220 or greater emulation.


COMPUSERVE. CompuServe Information Service began offering Internet email capabilities in 1989. CompuServes Internet domain name is compuserve.com. It is important to note that CompuServes Internet email gateway will only accept messages under 64kb in size. For personal email this is generally sufficient, but it could cause troubles if you attempt to send or receive uuencoded files.

To send email to someone who is on the Internet, you will need to know their Internet email address. In Easyplex, you format the recipient address as follows (assuming you were going to send email to me):
>Internet:[email protected]
To send email to someone on CompuServe, convert their CompuServe numeric id as follows:
72241,544 SYMBOL 224 \f "Wingdings" 72241.544
and address the email to [email protected].

OTHER SERVICES. There are several other commercial services which have or will be adding Internet connections:

Service NameDomain Name
Prodigy(unknown)
Delphidelphi.com
GEniegenie.geis.com
America OnLineaol.com
MCI Mailmcimail.com
AT&T Mailattmail.com

While I have heard rumors that Prodigy will be establishing an email gateway to the Internet, I have not received any definite information to confirm or deny this. Also, the domain name for GEnie Information Service may have changed to genie.com.
Other Networks

There are three networks which are quite solidly established and which do not (by default) use rfc 822 compliant email: uucp, bitnet and fidonet. Sites on bitnet and machines which have uucp network connections can use rfc 822 compliant addressing, but internally the addressing system is different.

BITNET. The bitnet (Because Its Time Network) was formed in 1981 as a consortium of educational sites in the United States, Canada and Western Europe. Bitnet is a store-and-forward network (see page 3) whose network technology is based on that of the venerable ibm rscs (Remote Spooling Communications Subsystem). Internally, host names are limited to eight characters and while non-ibm systems may have userids which are in excess of eight characters, the network will generally not understand anything beyond eight. The basic format for email within the bitnet varies with the host operating system. The two most popular are ibm vm/cms and dec vms which use the following formats:
username at sitename(vm/cms)hostname::username(vms)
Conveniently, it is becoming more popular for bitnet sites to maintain Internet connections as well. However, if you do not know the rfc 822 address for someone on the bitnet to whom you wish to send mail, you can send it via one of the sites which maintains connections to both Internet and bitnet: brownvm.brown.edu, mitvma.mit.edu and cunyvm.cuny.edu being most well-known. For example, to send email to user ensignro at ncc1701d, you would address email to:
ensignro%[email protected]
Because brownvm.brown.edu resides on both bitnet and Internet, it would know how to route the bitnet address encapsulated in the userid.

UUCP. The uucp network is a haphazard collection of computers running unix or uucp-compatible email systems (many pcs and bbs systems do this). Another store-and-forward network, until fairly recently it was necessary to know virtually the entire network path a piece of email would take in order to route it. Lately, however, uucp network administrators have been encouraging both the adaptation of Internet-style addressing and a more efficient network pathing structure.

Uucp email is somewhat similar to the dec decnet addressing convention in that host computers precede the userid in the address:
host1!host2!host3! ... !hostn!userid
To send email to someone who has a uucp address, reverse the given address and format it as below (assuming uuhost!futility!borg!locutus):
locutus%[email protected]
Occasionally uunet.uu.net has problems addressing mail. This can frequently be fixed by adding more of the uucp address:
locutus%borg%[email protected]


FIDONET. The fidonet is a global network of bbs (bulletin board system) hosts which are connected using modems and both store-and-forward and direct-connection technology. Begun in 1984, it is now becoming vogue for fido bbs systems to offer Internet mail, usenet news (see Section Five) and uucp mail. In fact a number of bbs systems have attached to the Internet and have acquired Internet domain names (for example, the Channel One bbs is known on the Internet as channel1.com).

Fidonet addressing organizes the fido network into zones, networks, nodes and points. To address email from the Internet to fidonet, take the source address
David ODonnell at 1:323/121
and convert it to an Internet-style address:
[email protected]
Note that if you are on a fido bbs where the bbs address includes a point (e.g., the address ends in a decimal point followed by a number, such as .15), you should exclude the point when converting to rfc 822 compliant addressing. While fido networking software can support this extra dimension to an address, not all sites do and therefore, to ensure the greatest compatibility, you should not include points in an rfc 822 compliant address.

There are two additionalimportantpoints to make note of:

SYMBOL 183 \f "Symbol" \s 10 \hThe addressing scheme listed here works only for sending mail into fidonet. Sending mail to a fidonet bbs which has an Internet domain name should be done using the Internet format, not the one given above.
SYMBOL 183 \f "Symbol" \s 10 \hOther than for fidonet sites which have Internet domain names, I do not know of any fashion for sending mail from fidonet to the Internet.

The InternetSYMBOL 171 \f "Symbol"fidonet gateway is located in Arizona and the system operator (or SysOp) there has indicated that large amounts of incoming email are not appreciated, as he must pay for the long distance call to pick up the email. You should check with your local bbs SysOp to see if there are more efficient Internet connections in your area.
Section Three: files
One of the most exciting aspects of the Internet is its huge repository of filesprograms, data, graphics, sound and so forthall of which are accessible to people with Internet connections. While it used to be the case that access was limited to local users and those with ftp, mechanisms are now in place which can locate, index and transfer files from the Internet via email.

FTP: File Transfer Protocol

Ftp is the mother of all file transfer protocols. Through it a user directly connects to an Internet-connected computer, accesses the file system and gets or stores files. Ftp is one of the basic portions of the tcp/ip suite, a collection of protocols which define networking on the Internet.

Virtually any kind of file anyone could possibly want can be found on the Internet and retrieved using ftp. Some of the more popular sites and their contents include:

TopicSite Name
Windows Applicationsftp.cica.indiana.edu,
wuarchive.wustl.edu,
nic.funet.fi,
wsmr-simtel20.mil
Macintosh Applicationssumex-aim.stanford.edu,
brownvm.brown.edu,
wuarchive.wustl.edu
gifswuarchive.wustl.edu,
sumex-aim.stanford.edu,
archive.msdos.umich.edu
dos Applicationswuarchive.wustl.edu,
archive.msdos.umich.edu,
oak.oakland.edu

To mangle a metaphor, this is only the tiniest tip of the Internet file iceberg. To help make some organizational sense of the hundreds of thousands of files available on the Internet, archie and gopher were created. To help those without ftp access obtain files, there is the bitftp service.

Archie: the Archive Server

Archie is an application which is used to quickly determine what sites on the Internet carry files that are being sought by a user. The current implementation of archie consists of two parts, only one of which is necessary: the archie server and the archie client. It helps to think of archie as the ultimate Internet file list filter, because that is precisely what it does with the file lists of anonymous ftp sites.

ARCHIE server. The archie server is an application which is run as the operating environment of a computer account. To use an archie server one must either have access to telnet (see Section Four) or be able to log in to a computer which has an archie server running. Two of the several available servers are on hosts
archie.sura.netandarchie.unl.edu
At the user login prompt one enters archie as the user name. There is no password and the archie server will display a brief introductory banner, frequently containing news of the day. More recent versions of the server system are able to detect the terminal emulation of your computer and will adjust output to match. If you are using a non-standard setup (for example, my vt-320 setup has 32 rows instead of the default 24) you would use the set term command as follows:
set term terminal-name screen-rows screen-columns
In my case the command is
set term vt320 32 80
Other archie commands include the following:

help
See help topics.
pager
Break file listings into pages; press spacebar to advance pages.
prog argument
Search for all entries which contain the string argument.
set regex
Use unix-like regular expressions for entry searches.

Release 3.0.1 of the archie server will allow you to specify an email address to which the results of a search can be sent.

ARCHIE CLIENT. The archie client is an interface application which is similar to that of the archie server (in fact, the server runs a client application which connects to the database manipulation/search application). There are reputedly versions of the client available for unix, vms and vm/cms.

bitftp: File Access for the FTP-challenged

The bitftp system was originally created to allow computer users on the bitnet to have access to Internet ftp sites. The application runs at Princeton University and is manipulated via email. To learn how to use bitftp, send email to [email protected]. Do not include a Subject: tag in the header of the email; instead, as the body include the single word help.

GOPHER: the Internet Distributed Information Delivery Service

Gopher is a sophisticated information retrieval and management system which is becoming popular for cwises, or Campus-Wide Information Services. Utilizing client-server technology, gophers efficiently divide information retrieval/management tasks between the client (where the user is located) and the server (where the gopher brains are located). Gopher is the only application that truly makes navigating and using many services on the Internet as natural as choosing an entre from a dinner menu.

UTILITY. Gopher was first developed at the University of Minnesota as a text-retrieval system. It has since grown into an application of prodigious scope. Text files, binary files, sounds and graphics can be retrieved with gopher. With the proper gopher client/server arrangement it is possible to browse ftp archive directories and retrieve their contents; use archie to browse the anonymous ftp sites on the Internet and retrieve contents; telnet and tn3270 to other Internet hosts; and link up with distributed information services like the World-Wide Net (wwn) and other waises (Wide-Area Information Services).

CLIENTS. Gopher client software exists for dos, Macintosh System, Xwindows, vm/cms and unix. Many Internet hosts, particularly educational sites, are installing gopher clients as part of their cwis or wais. Each client has differing levels of functionality: some can only retrieve and view text files, some can display graphics and play sound files, and others have intuitive, user-friendly graphical interfaces. To find out if a particular site has a gopher, log in to it and try gopher or cwis. You may need to contact system administration for further information.

Section Four: traveling
While ftp and email are great tools for manipulating the Internet and keeping in touch with users, it is also possible to literally travel the network via the telnet application.

USE. To use telnet, you must be working on a computer which has full access to the Internet: a tcp/ip connection, ip address and a domain name. Depending on the operating system of your computer it may be necessary to establish access to the tcp/ip software.

MODES. Telnet operates in two modes: full-screen and line. Under most circumstances, connections will be established automatically in full-screen mode. In this mode, what you see on your screen is a direct representation of the screen, operating environment and file system of the remote computer. Although you will not have physically moved, for all intents and purposes your computer is now attached to the remote computer is if it were plugged in at the remote site.

Line mode acts as though your computer were a teletype terminal attached to the remote system. None of the advantages of full-screen operation are possible. Line mode does have a valuable purpose, however. Due to the simple, streamlined nature of the connection, line mode is particularly suitable for client applications: ftp, irc, archie, et cetera. Line mode is also activated when your local computer cannot correctly emulate a terminal attached to a remote computer. This most commonly occurs when someone logged into a vm/cms machine attempts to open a telnet connection to a unix or vms system. Both latter operating systems support stream-oriented all-points-addressable video terminals while the technology used by ibm mainframes is more primitive.

Section Five: other services
This section covers some of the other services available on the Internet as well as list some of the sites where access to the Internet can be obtained for free or for a nominal fee.

IRC: Internet Relay Chat
Irc is an interactive, real-time conversation system. Originally begun as a hobby by some computer science students, irc has grown to be a 24-hour-a-day phenomenon. At any given time over a thousand people will be using irc from sites all across the world.

DESCRIPTION. Irc is similar to the cb chatting fora on commercial services. Users are organized into channels where conversation is public. Users can also send and receive private messages. Due to the informal nature of irc (regardless of nsfnet regulations on network resource usage) irc users, or ircers as they are known in the vernacular, are free to adopt nine-character nicknames and can change personal user information to virtually anything.

Each channel on irc is identified by a pound-sign (#) and up to 80 letters or numbersfor example, #Resistance_is_futile. Channels can have topics which are publicly visible to anyone requesting a list of channels. They can be private, invitation-only, be restricted to a certain number of members and can even be invisible to the public. People who are not on a channel are said to be in Limbo.

Channels are organized in whatever fashion suits the members. There can be channel operators, called chanops, who monitor the members of a channel and can change the attributes of the channel as well as forcibly remove someone from the channel (called kicking, from the /kick command used). There can be more than one chanop to a channelor none, if it is so desired. Channels are created when an ircer uses the /join command with the name of a channel not already in existence. Channel creators are automatically made chanop.

Above the chanop is the ircop, an individual who runs one of the irc server applications. All irc clients must connect to a server to join the ircnet, and all servers are interconnected via special line-mode telnet links. An ircop has what passes for ultimate authority on irc: he or she can join any channel, irrespective of the mode settings; become a chanop on any channel; kick someone off a channel into Limbo or kill a users irc client session; and manipulate the interconnections of irc servers. In theory only responsible people are given ircop status, but in reality things are often quite different.

ACCESS. To use irc you need to have two things: a tcp/ip connection to the Internet and a client application (usually called ircii for Internet Relay Chat, version two). In actuality it is possible to use irc without a client application but writing from personal experience, it is not enjoyable. Irc clients exist for unix, ultrix, vms and vm/cms. Versions for Macintosh System 7.1, ms-dos and Windows are in the works. When you start irc you provide a servers Internet name or numeric ip address to the client so it knows where to connect. There are several hundred servers around the world, but normally you will only connect to the closest server. An exception would be when the local server does not support certain features. Some of the most popular servers are:

csa.bu.eduThe Boston University hub server for New England.irc.mit.eduMITs server is not always available and usually out-of-date.hub.cs.jmu.eduJames Madison Universitys server, which also allows /note spys.

CLIENTS. The latest versions of irc client software are always maintained on the Internet site at Boston University,
cs.bu.edu
in the directories
irc/clientsirc/clients/VMSandirc/clients/VM
As other client versions become available they will be added to the ftp site. Many Internet sites already have an irc client available for users, while others specifically prohibit the use of irc. Be sure to check with your site administration for policy.

USENET News
Usenet news is one of those slippery, magical services which is only now becoming integrated with the Internet. Usenet began in 1979 as a bulletin board system between two universities in North Carolina. It has grown to be one of the largest, most comprehensive news systems in the world. Several thousand conferences exist, broken down into a loose hierarchy similar to that of the domain naming system. Usenet news has the advantage that anyone with either a uucp-style mailer or access to a nntp-compliant news reader can receive and contribute to the gestalt.

ACCESS. Access to usenet news is primarily through news reader applications. It is possible, however, to participate in a usenet news conference if a computer site offers to redistribute it via email. Keeping current with news is particularly difficult in this situation, however. Many news conferences are extremely prolific and corresponding via the relatively slow system of electronic mail is inefficient. Two of the thousands of conferences available are perfect examples of the profligate nature of usenet news: in a one week period, my threaded news reading application displayed
640 new items in group soc.motss. Read now? [YNyn]1254 new items in group rec.arts.startrek. Read now? [YNyn]

INTERFACES. Every major operating system has a usenet news reading application available. On the Internet, the following four are most common.

SYMBOL 183 \f "Symbol" \s 10 \hRn, typical unix shorthand for read news, is the archetypal news reading software. Its interface is straightforward and unembellished. It lacks threading, however, and can quickly overrun the user.
SYMBOL 183 \f "Symbol" \s 10 \hReadnews is a somewhat advanced version of rn. Its primary advantage is the ability to easily mark threads of topics as killedthe news reader will automatically skip over those topic/threads. Newer releases of rn may have this feature as well.
SYMBOL 183 \f "Symbol" \s 10 \hTrn, or threaded readnews, is undoubtedly my favorite. The trn user can choose from two formats for newsitem display: the venerable list format of rn, or a visual, threaded format where one can follow the progress of a discussion thread through the newsgroup.
SYMBOL 183 \f "Symbol" \s 10 \hVNEWS is the vms equivalent of trn. Vnews has a particularly pleasing visual display, though its built-in assumption that the users keyboard is the dec lk102 can be frustrating. Vms built-in help system also provided inspiration for vnews, although vnews is arguably even more difficult to make heads or tails of.

NEWSGROUPS. New newsgroups are constantly being created, but the list below should give you some good places to begin exploring usenet news:

alt.sex
rec.humor.funny
comp.os.os2.advocacy

alt.ensign.wesley.die.die.die
alt.french-captain.borg.borg.borg
comp.os.ms-windows.advocacy

talk.*
soc.*
rec.arts.startrek

alt.binaries.pictures
alt.binaries.sounds.misc



Note: in groups like talk.*, the asterisk signifies that there are many newsgroups under the hierarchy, each of which is likely to prove interesting.

LISTSERV: The List Server Network
Listserv is the name of an application written by Eric Thomas of searn for the maintenance of email-based redistribution lists. Originally created to service the bitnet, listserv has migrated to unix platforms as well and the mailing lists managed by listservers can be accessed by anyone with Internet email capability.

Listserv is run as a loosely organized network of listservers spread out across the bitnet. Listservers maintain databases of email distribution lists (commonly referred to as lists), their subscribers and any related files or archives of discussion. Several thousand lists currently exist; all that is required to create a new list is to find a listserv manager willing to store the database entry, archives and subscription list. Similar to the organization (or, rather, lack thereof) of usenet, there is no central administrative listserver, though most are highly integrated into the computing services departments of their organizations and follow both general bitnet regulations and organizational rules.

ACCESS. Anyone who can send and receive Internet email can get access to listserv. Users on the bitnet have the additional advantage of being able to command the servers via interactive messaging, but all commands are available through e-mail.

LISTS. Every listserver maintains what is commonly referred to as the list of lists. This document is several thousand lines of text giving the name and listserv host of every list. To obtain a copy of the list of lists, address email to any listserver. In the body of the mail, include the command list global:

Date:Friday, 26 March 1993; 17:38:44 EST
To:[email protected]
From:[email protected] (Guinan is a Pest)

list global

Sending the command help will allow you to obtain listservs on-line help documentation.

How To Get Onboard
Now that youve gotten your feet wet, how can you get access to the Internet?

If you are content with email access, check out the commercial services, especially CompuServe, America OnLine and Delphi.

If you want more, you will need an account on an Internet host with full tcp/ip suite access. The list below includes some of the more popular sites and the services they offer.

THE WORLD. The World at Software Tool & Die, Internet host name
world.std.com
offers a wide range of Internet services, including ftp, telnet, irc, usenet, email and listserv. The service is commercial with a reasonable fee structure of $2 per hour with a $5 per month account fee.

DRYCAS. The Carneige-Mellon University Computer Club runs a decstation 5000 with full Internet access. The Internet host name is
drycas.club.cc.cmu.eduordrycas
on the bitnet. Ftp, telnet, irc, usenet, listserv and email are accessible from this excellent vms site. Contact Marc Shannon ([email protected]) for the latest information on their annual fee structure. Carneige-Mellon University is not local to the Boston area but drycas is an excellent platform to explore both vms and the bitnet from another Internet site.

GNU/FSF. The GNU Project/Free Software Foundation, Internet host name
gnu.ai.mit.edu
offers ftp, telnet, irc, usenet, listserv, email and a host of gnu Project software for unix. This site is free and local to Boston. Unfortunately space is extremely limited and most applications for accounts will be denied without sufficient reason. To apply for an account, telnet to
gate.gnu.ai.mit.edu
and login as
apply
Follow the directions from the application account service.

IDS. IDS Data Forum is a bbs system running in Warwick, ri on a dec minicomputer. Its Internet host name is
idsvax.ids.risc.net
IDS offers both bbs and Internet services on a fee-related basis. Internet access includes ftp, telnet, usenet, listserv and email, but you must contact the SysOp to obtain access. You can reach him as
[email protected]
or by telephoning (401) 884-9002.

LOCAL ACCESS. If you have a Macintosh, you may be able to connect to the Internet right from Ziff-Davis. Contact David Bogartz at x5280 for additional information.
Wrapping Everything Up
I hope you have found this handout to be useful and entertaining. The Internet provides a wealth of opportunity which is only just beginning to be tapped. If you have any questions about anything contained in this handout or would like more information on the aspects of the Internet which were not covered, please send me email at
[email protected]
Section Six: notes (This Page Left Blank)
Section Seven: index to topics

The SYMBOL 254 \f "Wingdings" symbol under Type marks an advanced topic.

Type
Topic
SYMBOL 50 \f "Wingdings"


Contacting the Author
2


Basic Internet Information
3

SYMBOL 254 \f "Wingdings"
Internet Size and Growth Statistics
3


rfc 822 Address Format
5


Components of Internet E-Mail
6


E-Mail on a unix System
7

SYMBOL 254 \f "Wingdings"
E-Mail on a vms System
7


E-Mail on CompuServe
8


Other On-Line Services
8

SYMBOL 254 \f "Wingdings"
E-Mail to/from the bitnet
9

SYMBOL 254 \f "Wingdings"
E-Mail to/from the uucp Network
9


E-Mail to fidonet bbs Systems
10

SYMBOL 254 \f "Wingdings"
ftp (File Transfer Protocol)
11


Archie
11

SYMBOL 254 \f "Wingdings"
bitftp (ftp via E-Mail)
12

SYMBOL 254 \f "Wingdings"
Gopher
13

SYMBOL 254 \f "Wingdings"
telnet
14

SYMBOL 254 \f "Wingdings"
irc (Internet Relay Chat)
15

SYMBOL 254 \f "Wingdings"
usenet News
16

SYMBOL 254 \f "Wingdings"
listserv Distributed Mail Conference System
17

SYMBOL 254 \f "Wingdings"
The World at Software Tool and Die
18

SYMBOL 254 \f "Wingdings"
Drycas, the Carneige-Mellon Computer Club
18

SYMBOL 254 \f "Wingdings"
gnu/fsf (gnu Project/Free Software Foundation)
18


Connecting to the Internet from Ziff-Davis
18


Wrapping It All Up
18










Packet switching networks are the forebears of modern network schemes. In a packet-switched network such as bitnet, data are sent as small packets which are queued through the network in a store-and-forward fashion; that is, to get from one host to another, it may be necessary for the packets to travel through several intermediary hosts. The speed of transmission is greatly dependent on the intermediary systems.
Data based on the January 1993 Internet Domain Survey. Extrapolations of growth figures would indicate that current numbers are between twenty and thirty percent higher than the numbers given.
Vm and mvs are the realm of ibm mainframes and compatible systems. Vms and ultrix run on a variety of dec computers, and unix is running on virtually everything from Intel 80386-based pcs on up. Unix is a trademark of Bell Labs.
This site is completely fictional, but it is a good example of how computers frequently are named on the Internet. Since its highly unlikely that Buckaroo Banzais fictitious Yoyodyne Propulsion Systems is really a part of the University of Sydney, this address makes an important exception to the naming style used in my own ([email protected]) because all that is certain about the addressee is that he or she is located at the University. Chances are that the computer the user is logged into most frequently is called captain-kirk but there is no insurance that it will always be so.
Most dos- and Windows-based terminal emulation packages can support at least vt-220 emulation. Vt-100 and vt-101 are essentially standard and even Windows terminal application can support vt-100 emulation.
Source: !%@:: A Dictionary of Electronic Mail Addressing and Networks, second edition.
Uuencode and uudecode are unix utilities which were developed to allow the transmission of binary (non-textual) files across networks where 8-bit ascii was not allowed. Because of the nature of the Internet, it is not safe to assume that binary files transmitted as attachments to e-mail will make it to the destination intact unless they have been uuencoded first. Luckily, versions of uuencode and uudecode exist for virtually every operating systemincluding dos and Windows.
Unlike other networks, the uucp networkwhich is primarily known for usenet newsdoes not have a central administrative body. Decisions are frequently made by system administrators (sysadmin or sysops) on hosts with many connections or users who are particularly active. Uucp, like much of unix, can often be compared to a kind of mystical magic in the way it works (or doesnt work).
On fidonet it is possible to address e-mail to users which will get distributed via the normal bbs mail cycle (store-and-forward) and via a direct-mailing system where the bbs host will directly dial the recipients bbs and transmit the e-mail.
This address is for GAYtway Communications Network bbs in Providence, RI.
Tcp/ip stands for Transmission Control Protocol/Internet Protocol. The suite include: ftp (File Transfer Protocol), telnet, ping, nntp (Network News Transmission Protocol) and smtp (Simple Mail Transfer Protocol).
Anonymous ftp sites are named thus because anyone can log into the server and retrieve files. To do so, one uses ftp to open a connection to the site. At the username: prompt, enter anonymous or ftp; at the password: prompt, enter your Internet e-mail address. Since not all sites can use ftp as the username, anonymous is best.
If you are on the bitnet, you can also manipulate bitftp through interactive messages to bitftp at pucc.
Reprinted from UIUCnet, volume 6 number 1, a University of Illinois publication.
An ip address is the 32-bit decimal address used by tcp/ip software; it is divided into four tuples, each of which represents one bytes worth of the 32 bits. For example, the ip address for brownvm.brown.edu is 128.148.128.40.
Source: !%@:: A Dictionary of Electronic Mail Addressing and Networks, second edition.
The basic usenet hierarchy consists of comp (computer-related topics), sci (scientific topics), soc (social topics), alt (alternative or on the edge topics), rec (recreative topics), news and misc (miscellaneous items); in the first newsgroup motss stands for members of the same sex.
And the Internet in general, though the primary thrust remains located on the bitnet.




introduction to the internetPage PAGE20






v(ions abo~F~F~F~F~F~F~F:
v=H00C 00(0~?
~?
~?
~?|?008888v8>?xx@>pp8x
:p?p??`?>p@|98x@
|;:8?|????8??8?88? ?8> ?88 98:`;>`?>?
><8080<08x?@xp06xxvxxv??@p



s n:2

C (08?
??x8??>p0?>?0?8988{>__>08x8>>p0`x8`x8`>p~?p0p88??|?088
~
???n:

C (08?
??x8??>p0?>?0?8988{>__>08x8>>p0`x8`x8`>p~?p0p88??|?088
~
???:
H00C 00(0~?
~?
~?
~?|?008888v8>?xx@>pp8x
:p?p??`?>p@|98x@
|;:8?|????8??8?88? ?8> ?88 98:`;>`?>?
><8080<08x?@xp06xxvxxv??@p



:
"H00C 00(0~?
~?
~?
~?|?008888v8>?xx@>pp8x
:p?p??`?>p@|98x@
|;:8?|????8??8?88? ?8> ?88 98:`;>`?>?
><8080<08x?@xp06xxvxxv??@p



n:6

C (08?
??x8??>p0?>?0?8988{>__>08x8>>p0`x8`x8`>p~?p0p88??|?088
~
???:
7H00C 00(0~?
~?
~?
~?|?008888v8>?xx@>pp8x
:p?p??`?>p@|98x@
|;:8?|????8??8?88? ?8> ?88 98:`;>`?>?
><8080<08x?@xp06xxvxxv??@p



n:

C (08?
??x8??>p0?>?0?8988{>__>08x8>>p0`x8`x8`>p~?p0p88??|?088
~
???:
H00C 00(0~?
~?
~?
~?|?008888v8>?xx@>pp8x
:p?p??`?>p@|98x@
|;:8?|????8??8?88? ?8> ?88 98:`;>`?>?
><8080<08x?@xp06xxvxxv??@p



n:#

C (08?
??x8??>p0?>?0?8988{>__>08x8>>p0`x8`x8`>p~?p0p88??|?088
~
???:
/H00C 00(0~?
~?
~?
~?|?008888v8>?xx@>pp8x
:p?p??`?>p@|98x@
|;:8?|????8??8?88? ?8> ?88 98:`;>`?>?
><8080<08x?@xp06xxvxxv??@p



n:4

C (08?
??x8??>p0?>?0?8988{>__>08x8>>p0`x8`x8`>p~?p0p88??|?088
~
???:
4H00C 00(0~?
~?
~?
~?|?008888v8>?xx@>pp8x
:p?p??`?>p@|98x@
|;:8?|????8??8?88? ?8> ?88 98:`;>`?>?
><8080<08x?@xp06xxvxxv??@p



n:.

C (08?
??x8??>p0?>?0?8988{>__>08x8>>p0`x8`x8`>p~?p0p88??|?088
~
???:
-H00C 00(0~?
~?
~?
~?|?008888v8>?xx@>pp8x
:p?p??`?>p@|98x@
|;:8?|????8??8?88? ?8> ?88 98:`;>`?>?
><8080<08x?@xp06xxvxxv??@p



:
:H00C 00(0~?
~?
~?
~?|?008888v8>?xx@>pp8x
:p?p??`?>p@|98x@
|;:8?|????8??8?88? ?8> ?88 98:`;>`?>?
><8080<08x?@xp06xxvxxv??@p



4:YG& C (37g>_x?wyxxpvog~xo?Ox?o?

?

?

K?
xxxxxp~
~o?
/
y?
7
g?

o?
;_ppXxtXx@_}0
Oo?

O??

O7?

_?q_>A>Xx>\Xx?o_?{o_
/k??8
Oo3G???
wwh_G?m?ww?`[hW|X?h/wq
w
??
{???
c??
??~wp?y0pWpg_w~

_wn?

?

?
?w=|?z`x`xpp8xx`xP?lpz
/-~o^


}w
x
px?p0x
=
}|

}|

?}|}|_X|XxxX|hxx)@~~
-m./n



g
}?>h}npxxhp8xxxXp}^pm/o



/
}
}sxPsx8s}q0
m






8~
|<~pXxp|HpPxp|Xxplwpxw
/ogw
o

w
O{cyxpxxXp?

|}{x?~x?>?`o-??<8??3/xxxxxoG?x?xxkoO``O
?08?/xpxOo
7g?x\x[[=WY?78r/o?4:YGv> C (37g>_x?wyxxpvog~xo?Ox?o?

?

?

K?
xxxxxp~
~o?
/
y?
7
g?

o?
;_ppXxtXx@_}0
Oo?

O??

O7?

_?q_>A>Xx>\Xx?o_?{o_
/k??8
Oo3G???
wwh_G?m?ww?`[hW|X?h/wq
w
??
{???
c??
??~wp?y0pWpg_w~

_wn?

?

?
?w=|?z`x`xpp8xx`xP?lpz
/-~o^


}w
x
px?p0x
=
}|

}|

?}|}|_X|XxxX|hxx)@~~
-m./n



g
}?>h}npxxhp8xxxXp}^pm/o



/
}
}sxPsx8s}q0
m






8~
|<~pXxp|HpPxp|Xxplwpxw
/ogw
o

w
O{cyxpxxXp?

|}{x?~x?>?`o-??<8??3/xxxxxoG?x?xxkoO``O
?08?/xpxOo
7g?x\x[[=WY?78r/o?
20
20 (%&T#'JRHL
%
A
G


nr-./MUZfuv$(-125Rx$T` G$]dqw)0z}lmqrt#>?Lcq5 ] c l p !"""*"+"##<#D#Y#Z#\#q#'$-$$$%%9%:%=%A%D%I%U%Z%%%%&+&4&8&9 P8&>&D&&&''(()),)/)))++S,X,Z,],b,g,---.D.G.Q.T..U/\/////d0e0g0p000w1}1111122$3(3*333>3C3N333#4%4444455w666666
77A7D77788T9U9t9u9z9 "hP Wz999999999q:z:::::::::1;3;4;S;T;Y;;;;;;;;;<)M>{>>>>??@@@@AA5A8AsAwAAABBBB B#BC XCCCCCC{C~CCCCCCCDD8DNBNENNN"O*OOOOOJPPPPPPPPPPPPPPPPPPPQ1Q7QQQQQ#R&R'R-R0RARCRQRVReRRRRRR ZRRSS$S*SXS^SSSSSSSSSSSSSTTTTeUfUjUnUUUUUUUUUUUUUUUUVV
VVVVV7V;VVVVV&W*W[W\W^WfWkWoWWWX
X7X;XsDs]s`ssssstttt?tGtHtNtjtmtttttttuuuuvv!v'v-v1vvvvv8w>w!%
X>wOwTw[wawwwwwAxGxUx[x\x]xcxzxxxxq{t{v{y{{{{{{;|A|]|c|t|x||||}}6}F}~~~~~~+,.BD=@LRK`
!"%djuzA A`FI.4z*,?PU[FSjm,2TZ)4pvHIhiA Yilvz34ST]*,MNmnrvw-016KNX^hTkqSXX`
jpHNs{(0rz & ]&-7!Q\b&v|f?B
'F!#,;=CF
or"#37 Z7BKUY[acd|}\`no!"; avw:P"&*0EHX\-CK$%+/su=PQRZ_glp #23OSyCGVZ: _:=DRdg%&./78UYqILv&':@Z`"EK'(39PUpt `#KLDs> %(*TVXZh0Fhj 7:!e
s
GIe_aJL~x~$$$$$$$$$$$@`1%.-
`1%.-F%.-/LMhjuxAC{')oqt<>@LXdnx~ssssssb~ssssO
x>#
^<
Z<2VO
x>#
^<
Z<$$-$$$-& W#Y#\#$$%%%%''m*o***{snbW
$$$V-$$$$$-$$$$$$1UO
x>#







^<"**$+O+g+i+---..+.7.9.B.J.W.Y._.q...........b0d0g0112244zupzkzf$$$$%xl%t



l
tl!t<$
$&4153588R9T99:3;;a<==???@@2A4ACCCDDDpEEEEOFjFGGGIII
JdJJJJ5Kwr$-$$$$$$$$8h8$8$8$8$$$6$$,5K7KQKfK{KKKKKKLLLNNPQRRSShUjUUVVV5WYW[W^WDYFYYZ2Z\Z \"\^\`\R]^}u$$x$-
$$$$$$V$$$$P$P$$*^^q_r__aa$a'aPbRbbbc;cScdcycccccd)dQdmdddeeeergtghhjjkkHkJkzupp$$$$
-$$P $xP $P $P $ $$$$$-$)JkPkckjkkkkl=l?lllmmnnooooqq=t?t|v~vvvMwOwSxUx,z.z%}'}(}F}}~~z|$$$$=$$$-$z$`-$$$$$$$$$4[fzCFH3Mvfhq
6PRTVVX&( `b$$$
H
$$$>x$Nx$p$$$p$$$$$3bFH\+-#2!#jzpRf0HSU[c @$-$$$$$$$$$$$p$p$p3#&(*ILNPiln!>_bdf5=AC`hln&*,Imq@ @
H
lH
l(h((`(&0(
0xx
h81%.-
88
8`
pW.4ggOO@

ppW...4

]t{5aj$0
g?
Rj 8@F8&z9C7KRYFen>wi&7:TUVWXYZ[\]^_`abcdeL*45K^JkbqfghijklmnopqTimes New RomanSymbol&Arial
Calisto MT"Univers (WN)Bodoni MT Bold Condensed"Univers Cd (WN)bodoni bold condensedWingdingsCG Times (WN)calist mt5Lucida Sans Typewriteruniver cd (wn)377U8u89<9994:T::::;i;;HIZ[[[\\B\d~%\v,F\v
A[j9999999999999999999999999999999999+03F!starthere>nAnp$&WYfhjv"hee:e:e87David B. O'DonnellDavid B. O'Donnell


 December 13, 2017  Add comments

 Leave a Reply

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>

(required)

(required)