home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Acorn User 1
/
AU_CD1.iso
/
internet
/
starterpak
/
Docs
/
FAQs
/
ZEN-1-0_TX
< prev
Wrap
Text File
|
1992-11-02
|
186KB
|
4,603 lines
Zen and the Art of the Internet
===============================================================================
A Beginner's Guide to the Internet
First Edition
January 1992
by Brendan P. Kehoe
_______________________________________________________________________________
This is revision 1.0 of February 2, 1992.
Copyright Oc 1992 Brendan P. Kehoe
Permission is granted to make and distribute verbatim copies of this guide
provided the copyright notice and this permission notice are preserved on
all copies.
Permission is granted to copy and distribute modified versions of this
booklet under the conditions for verbatim copying, provided that the entire
resulting derived work is distributed under the terms of a permission notice
identical to this one.
Permission is granted to copy and distribute translations of this booklet
into another language, under the above conditions for modified versions,
except that this permission notice may be stated in a translation approved
by the author.
Preface 1
Preface
The composition of this booklet was originally started because the
Computer Science department at Widener University was in desperate need of
documentation describing the capabilities of this "great new Internet link"
we obtained.
It's since grown into an effort to acquaint the reader with much of
what's currently available over the Internet. Aimed at the novice user, it
attempts to remain operating system "neutral" - little information herein is
specific to Unix, VMS, or any other environment. This booklet will,
hopefully, be usable by nearly anyone.
Some typographical conventions are maintained throughout this guide. All
abstract items like possible filenames, usernames, etc., are all represented
in italics. Likewise, definite filenames and email addresses are represented
in a quoted `typewriter' font. A user's session is usually offset from the
rest of the paragraph, as such:
prompt> command
The results are usually displayed here.
The purpose of this booklet is two-fold: first, it's intended to serve
as a reference piece, which someone can easily grab on the fly and look
something up. Also, it forms a foundation from which people can explore the
vast expanse of the Internet. Zen and the Art of the Internet doesn't spend
a significant amount of time on any one point; rather, it provides enough
for people to learn the specifics of what his or her local system offers.
One warning is perhaps in order - this territory we are entering can
become a fantastic time-sink. Hours can slip by, people can come and go, and
you'll be locked into Cyberspace. Remember to do your work!
With that, I welcome you, the new user, to The Net.
brendan@cs.widener.edu
Chester, PA
2 Zen and the Art of the Internet
Acknowledgements 3
Acknowledgements
Certain sections in this booklet are not my original work - rather, they
are derived from documents that were available on the Internet and already
aptly stated their areas of concentration. The chapter on Usenet is, in
large part, made up of what's posted monthly to news.announce.newusers, with
some editing and rewriting. Also, the main section on archie was derived
from `whatis.archie' by Peter Deutsch of the McGill University Computing
Centre. It's available via anonymous FTP from archie.mcgill.ca. Much of
what's in the telnet section came from an impressive introductory document
put together by SuraNet. Some definitions in the one are from an excellent
glossary put together by Colorado State University.
This guide would not be the same without the aid of many people on The
Net, and the providers of resources that are already out there. I'd like to
thank the folks who gave this a read-through and returned some excellent
comments, suggestions, and criticisms, and those who provided much-needed
information on the fly. Glee Willis deserves particular mention for all of
his work; this guide would have been considerably less polished without his
help.
o Andy Blankenbiller, Army at Aberdeen
o Alan Emtage, McGill University Computer Science Department
o Brian Fitzgerald, Rensselaer Polytechnic Institute
o John Goetsch, Rhodes University, South Africa
o Jeff Kellem, Boston University's Chemistry Department
o Bill Krauss, Moravian College
o Steve Lodin, Delco Electronics
o Mike Nesel, NASA
o Bob Neveln, Widener University Computer Science Department
o Wanda Pierce, McGill University Computing Centre
o Joshua Poulson, Widener University Computing Services
o Dave Sill, Oak Ridge National Laboratory
o Bob Smart, CitiCorp/TTI
o Ed Vielmetti, Vice President of MSEN
o Craig Ward, USC/Information Sciences Institute (ISI)
o Glee Willis, University of Nevada, Reno
o Chip Yamasaki, OSHA
4 Zen and the Art of the Internet
Chapter 1: Network Basics 5
1 Network Basics
We are truly in an information society. Now more than ever, moving vast
amounts of information quickly across great distances is one of our most
pressing needs. From small one-person entrepreneurial efforts, to the
largest of corporations, more and more professional people are discovering
that the only way to be successful in the '90s and beyond is to realize that
technology is advancing at a break-neck pace - and they must somehow keep
up. Likewise, researchers from all corners of the earth are finding that
their work thrives in a networked environment. Immediate access to the work
of colleagues and a "virtual" library of millions of volumes and thousands
of papers affords them the ability to encorporate a body of knowledge
heretofore unthinkable. Work groups can now conduct interactive
conferences with each other, paying no heed to physical location - the
possibilities are endless.
You have at your fingertips the ability to talk in "real-time" with
someone in Japan, send a 2,000-word short story to a group of people who
will critique it for the sheer pleasure of doing so, see if a Macintosh
sitting in a lab in Canada is turned on, and find out if someone happens to
be sitting in front of their computer (logged on) in Australia, all inside
of thirty minutes. No airline (or tardis, for that matter) could ever match
that travel itinerary.
The largest problem people face when first using a network is grasping
all that's available. Even seasoned users find themselves surprised when
they discover a new service or feature that they'd never known even existed.
Once acquainted with the terminology and sufficiently comfortable with
making occasional mistakes, the learning process will drastically speed up.
1.1 Domains
Getting where you want to go can often be one of the more difficult
aspects of using networks. The variety of ways that places are named will
probably leave a blank stare on your face at first. Don't fret; there is a
method to this apparent madness.
If someone were to ask for a home address, they would probably expect a
street, apartment, city, state, and zip code. That's all the information the
post office needs to deliver mail in a reasonably speedy fashion. Likewise,
computer addresses have a structure to them. The general form is:
a person's email address on a computer: user@somewhere.domain
a computer's name: somewhere.domain
The user portion is usually the person's account name on the system,
though it doesn't have to be. somewhere.domain tells you the name of a
6 Zen and the Art of the Internet
system or location, and what kind of organization it is. The trailing domain
is often one of the following:
com Usually a company or other commercial institution or organiza-
tion, like Convex Computers (`convex.com').
edu An educational institution, e.g. New York University, named
`nyu.edu'.
gov A government site; for example, NASA is `nasa.gov'.
mil A military site, like the Air Force (`af.mil').
net Gateways and other administrative hosts for a network (it does
not mean all of the hosts in a network).1 One such gateway is
`near.net'.
org This is a domain reserved for private organizations, who don't
comfortably fit in the other classes of domains. One example
is the Electronic Frontier Foundation (see Section 8.3.3 [EFF],
page 66), named `eff.org'.
Each country also has its own top-level domain. For example, the us
domain includes each of the fifty states. Other countries represented with
domains include:
au Australia
ca Canada
fr France
uk The United Kingdom. These also have sub-domains of things
like `ac.uk' for academic sites and `co.uk' for commercial ones.
The proper terminology for a site's domain name (somewhere.domain above)
is its Fully Qualified Domain Name (FQDN). It is usually selected to give a
clear indication of the site's organization or sponsoring agent. For
example, the Massachusetts Institute of Technology's FQDN is `mit.edu';
similarly, Apple Computer's domain name is `apple.com'. While such obvious
names are usually the norm, there are the occasional exceptions that are
ambiguous enough to mislead - like `vt.edu', which on first impulse one might
surmise is an educational institution of some sort in Vermont; not so. It's
actually the domain name for Virginia Tech. In most cases it's relatively
easy to glean the meaning of a domain name - such confusion is far from the
norm.
_________________________________
1 The Matrix, 111.
Chapter 1: Network Basics 7
1.2 Internet Numbers
Every single machine on the Internet has a unique address,2 called its
Internet number or IP Address. It's actually a 32-bit number, but is most
commonly represented as four numbers joined by periods (`.'), like
147.31.254.130. This is sometimes also called a dotted quad; there are
literally thousands of different possible dotted quads. The ARPAnet (the
mother to today's Internet) originally only had the capacity to have up to
256 systems on it because of the way each system was addressed. In the early
eighties, it became clear that things would fast outgrow such a small limit;
the 32-bit addressing method was born, freeing thousands of host numbers.
Each piece of an Internet address (like 192) is called an "octet," rep-
resenting one of four sets of eight bits. The first two or three pieces
(e.g. 192.55.239) represent the network that a system is on, called its
subnet. For example, all of the computers for Wesleyan University are in the
subnet 129.133. They can have numbers like 129.133.10.10, 129.133.230.19,
up to 65 thousand possible combinations (possible computers).
IP addresses and domain names aren't assigned arbitrarily - that would
lead to unbelievable confusion. An application must be filed with the
Network Information Center (NIC), either electronically (to
hostmaster@nic.ddn.mil) or via regular mail.
1.3 Resolving Names and Numbers
Ok, computers can be referred to by either their FQDN or their Internet
address. How can one user be expected to remember them all?
They aren't. The Internet is designed so that one can use either method.
Since humans find it much more natural to deal with words than numbers in
most cases, the FQDN for each host is mapped to its Internet number. Each
domain is served by a computer within that domain, which provides all of the
necessary information to go from a domain name to an IP address, and
vice-versa. For example, when someone refers to foosun.bar.com, the resolver
knows that it should ask the system foovax.bar.com about systems in bar.com.
It asks what Internet address foosun.bar.com has; if the name foosun.bar.com
really exists, foovax will send back its number. All of this "magic" happens
behind the scenes.
_________________________________
2 At least one address, possibly two or even three - but we won't go into
that.
8 Zen and the Art of the Internet
Rarely will a user have to remember the Internet number of a site
(although often you'll catch yourself remembering an apparently obscure num-
ber, simply because you've accessed the system frequently). However, you
will remember a substantial number of FQDNs. It will eventually reach a
point when you are able to make a reasonably accurate guess at what do- main
name a certain college, university, or company might have, given just their
name.
1.4 The Networks
Internet The Internet is a large "network of networks." There is no
one network known as The Internet; rather, regional nets like
SuraNet, PrepNet, NearNet, et al., are all inter-connected
(nay, "inter-networked") together into one great living thing,
communicating at amazing speeds with the TCP/IP protocol.
All activity takes place in "real-time."
UUCP The UUCP network is a loose association of systems all
communicating with the `UUCP' protocol. (UUCP stands for `Unix-
to-Unix Copy Program'.) It's based on two systems connecting to
each other at specified intervals, called polling, and
executing any work scheduled for either of them. Historically
most UUCP was done with Unix equipment, although the software's
since been implemented on other platforms (e.g. VMS). For
example, the system oregano polls the system basil once every
two hours. If there's any mail waiting for oregano, basil will
send it at that time; likewise, oregano will at that time send
any jobs waiting for basil.
BITNET BITNET (the "Because It's Time Network") is comprised of
systems connected by point-to-point links, all running the NJE
protocol. It's continued to grow, but has found itself
suffering at the hands of the falling costs of Internet
connections. Also, a number of mail gateways are in place to
reach users on other networks.
1.5 The Physical Connection
The actual connections between the various networks take a variety of
forms. The most prevalent for Internet links are 56k leased lines (dedicated
telephone lines carrying 56kilobit-per-second connections) and T1 links
(special phone lines with 1Mbps connections). Also installed are T3 links,
Chapter 1: Network Basics 9
acting as backbones between major locations to carry a massive 45Mbps load
of traffic.
These links are paid for by each institution to a local carrier (for
example, Bell Atlantic owns PrepNet, the main provider in Pennsylvania).
Also available are SLIP connections, which carry Internet traffic (packets)
over high-speed modems.
UUCP links are made with modems (for the most part), that run from 1200
baud all the way up to as high as 38.4Kbps. As was mentioned in Section 1.4
[The Networks], page 8, the connections are of the store-and- forward
variety. Also in use are Internet-based UUCP links (as if things weren't
already confusing enough!). The systems do their UUCP traffic over TCP/IP
connections, which give the UUCP-based network some blindingly fast "hops,"
resulting in better connectivity for the network as a whole. UUCP
connections first became popular in the 1970's, and have remained in
wide-spread use ever since. Only with UUCP can Joe Smith correspond with
someone across the country or around the world, for the price of a local
telephone call.
BITNET links mostly take the form of 9600bps modems connected from site
to site. Often places have three or more links going; the majority,
however, look to "upstream" sites for their sole link to the network.
"The Glory and the Nothing of a Name"
Byron, Churchill's Grave
10 Zen and the Art of the Internet
Chapter 2: Electronic Mail 11
2 Electronic Mail
The desire to communicate is the essence of networking. People have
always wanted to correspond with each other in the fastest way possible,
short of normal conversation. Electronic mail (or email) is the most
prevalent application of this in computer networking. It allows people to
write back and forth without having to spend much time worrying about how
the message actually gets delivered. As technology grows closer and closer
to being a common part of daily life, the need to understand the many ways
it can be utilized and how it works, at least to some level, is vital.
2.1 Email Addresses
Electronic mail is hinged around the concept of an address; the section
on Networking Basics made some reference to it while introducing domains.
Your email address provides all of the information required to get a message
to you from anywhere in the world. An address doesn't necessarily have to go
to a human being. It could be an archive server,1 a list of people, or even
someone's pocket pager. These cases are the exception to the norm - mail to
most addresses is read by human beings.
2.1.1 %@!.: Symbolic Cacophony
Email addresses usually appear in one of two forms - using the Internet
format which contains `@', an "at"-sign, or using the UUCP format which
contains `!', an exclamation point, also called a "bang." The latter of the
two, UUCP "bang" paths, is more restrictive, yet more clearly dictates how
the mail will travel.
To reach Jim Morrison on the system south.america.org, one would address
the mail as `jm@south.america.org'. But if Jim's account was on a UUCP site
named brazil, then his address would be `brazil!jm'. If it's possible (and
one exists), try to use the Internet form of an address; bang paths can fail
if an intermediate site in the path happens to be down. There is a growing
trend for UUCP sites to register Internet domain names, to help alleviate
the problem of path failures.
Another symbol that enters the fray is `%' - it acts as an extra
"routing" method. For example, if the UUCP site dream is connected to
_________________________________
1 See [Archive Servers], page 77, for a description.
12 Zen and the Art of the Internet
south.america.org, but doesn't have an Internet domain name of its own, a
user debbie on dream can be reached by writing to the address
debbie%dream@south.america.org
The form is significant. This address says that the local system should
first send the mail to south.america.org. There the address debbie%dream
will turn into debbie@dream, which will hopefully be a valid address. Then
south.america.org will handle getting the mail to the host dream, where it
will be delivered locally to debbie.
All of the intricacies of email addressing methods are fully covered in
the book !%@.: A Directory of Electronic Mail Addressing and Networks
published by O'Reilly and Associates, as part of their Nutshell Handbook
series. It is a must for any active email user. Write to nuts@ora.com for
ordering information.
2.1.2 Sending and Receiving Mail
We'll make one quick diversion from being OS-neuter here, to show you
what it will look like to send and receive a mail message on a Unix system.
Check with your system administrator for specific instructions related to
mail at your site.
A person sending the author mail would probably do something like this:
% mail brendan@cs.widener.edu
Subject: print job's stuck
I typed `print babe.gif' and it didn't work! Why??
The next time the author checked his mail, he would see it listed in his
mailbox as:
% mail
"/usr/spool/mail/brendan": 1 messages 1 new 1 unread
U 1 joeuser@foo.widene Tue May 5 20:36 29/956 print job's stuck
?
which gives information on the sender of the email, when it was sent, and
the subject of the message. He would probably use the `reply' command of
Unix mail to send this response:
Chapter 2: Electronic Mail 13
? r
To: joeuser@foo.widener.edu
Subject: Re: print job's stuck
You shouldn't print binary files like GIFs to a printer!
Brendan
Try sending yourself mail a few times, to get used to your system's
mailer. It'll save a lot of wasted aspirin for both you and your system
administrator.
2.1.3 Anatomy of a Mail Header
An electronic mail message has a specific structure to it that's common
across every type of computer system.2 A sample would be:
From bush@hq.mil Sat May 25 17:06:01 1991
Received: from hq.mil by house.gov with SMTP id AA21901
(4.1/SMI for dan@house.gov); Sat, 25 May 91 17:05:56 -0400
Date: Sat, 25 May 91 17:05:56 -0400
From: The President <bush@hq.mil>
Message-Id: <9105252105.AA06631@hq.mil>
To: dan@senate.gov
Subject: Meeting
Hi Dan .. we have a meeting at 9:30 a.m. with the Joint Chiefs. Please
don't oversleep this time.
The first line, with `From' and the two lines for `Received:' are usually
not very interesting. They give the "real" address that the mail is coming
from (as opposed to the address you should reply to, which may look much
different), and what places the mail went through to get to you. Over the
Internet, there is always at least one `Received:' header and usually no
more than four or five. When a message is sent using UUCP, one `Received:'
header is added for each system that the mail passes through. This can
often result in more than a dozen `Received:' headers. While they help with
dissecting problems in mail delivery, odds are the average user will never
want to see them. Most mail programs will filter out this kind of "cruft"
in a header.
The `Date:' header contains the date and time the message was sent.
Likewise, the "good" address (as opposed to "real" address) is laid out in
the `From:' header. Sometimes it won't include the full name of the person
_________________________________
2 The standard is written down in RFC-822. See [RFCs], page 73 for more
info on how to get copies of the various RFCs.
14 Zen and the Art of the Internet
(in this case `The President'), and may look different, but it should always
contain an email address of some form.
The `Message-ID:' of a message is intended mainly for tracing mail
routing, and is rarely of interest to normal users. Every `Message-ID:' is
guaranteed to be unique.
`To:' lists the email address (or addresses) of the recipients of the
message. There may be a `Cc:' header, listing additional addresses.
Finally, a brief subject for the message goes in the `Subject:' header.
The exact order of a message's headers may vary from system to system,
but it will always include these fundamental headers that are vital to
proper delivery.
2.1.4 Bounced Mail
When an email address is incorrect in some way (the system's name is
wrong, the domain doesn't exist, whatever), the mail system will bounce the
message back to the sender, much the same way that the Postal Service does
when you send a letter to a bad street address. The message will include
the reason for the bounce; a common error is addressing mail to an account
name that doesn't exist. For example, writing to Lisa Simpson at Widener
University's Computer Science department will fail, because she doesn't have
an account.3
From: Mail Delivery Subsystem <MAILER-DAEMON>
Date: Sat, 25 May 91 16:45:14 -0400
To: mg@gracie.com
Cc: Postmaster@cs.widener.edu
Subject: Returned mail: User unknown
----- Transcript of session follows -----
While talking to cs.widener.edu:
>>> RCPT To:<lsimpson@cs.widener.edu>
<<< 550 <lsimpson@cs.widener.edu>... User unknown
550 lsimpson... User unknown
As you can see, a carbon copy of the message (the `Cc:' header entry) was
sent to the postmaster of Widener's CS department. The Postmaster is
responsible for maintaining a reliable mail system on his system. Usually
postmasters at sites will attempt to aid you in getting your mail where it's
_________________________________
3 Though if she asked, we'd certainly give her one.
Chapter 2: Electronic Mail 15
supposed to go. If a typing error was made, then try re-sending the message.
If you're sure that the address is correct, contact the postmaster of the
site directly and ask him how to properly address it.
The message also includes the text of the mail, so you don't have to
retype everything you wrote.
----- Unsent message follows -----
Received: by cs.widener.edu id AA06528; Sat, 25 May 91 16:45:14 -0400
Date: Sat, 25 May 91 16:45:14 -0400
From: Matt Groening <mg@gracie.com>
Message-Id: <9105252045.AA06528@gracie.com>
To: lsimpson@cs.widener.edu
Subject: Scripting your future episodes
Reply-To: writing-group@gracie.com
: : : verbiage : : :
The full text of the message is returned intact, including any headers that
were added. This can be cut out with an editor and fed right back into the
mail system with a proper address, making redelivery a relatively painless
process.
2.2 Mailing Lists
People that share common interests are inclined to discuss their hobby
or interest at every available opportunity. One modern way to aid in this
exchange of information is by using a mailing list - usually an email
address that redistributes all mail sent to it back out to a list of ad-
dresses. For example, the Sun Managers mailing list (of interest to people
that administer computers manufactured by Sun) has the address `sun-
managers@eecs.nwu.edu'. Any mail sent to that address will "explode" out to
each person named in a file maintained on a computer at Northwestern
University.
Administrative tasks (sometimes referred to as administrivia) are often
handled through other addresses, typically with the suffix `-request'. To
continue the above, a request to be added to or deleted from the Sun Man-
agers list should be sent to `sun-managers-request@eecs.nwu.edu'.
When in doubt, try to write to the `-request' version of a mailing list
address first; the other people on the list aren't interested in your desire
to be added or deleted, and can certainly do nothing to expedite your
request. Often if the administrator of a list is busy (remember, this is all
peripheral to real jobs and real work), many users find it necessary to ask
16 Zen and the Art of the Internet
again and again, often with harsher and harsher language, to be removed from
a list. This does nothing more than waste traffic and bother everyone else
receiving the messages. If, after a reasonable amount of time, you still
haven't succeeded to be removed from a mailing list, write to the postmaster
at that site and see if they can help.
Exercise caution when replying to a message sent by a mailing list. If
you wish to respond to the author only, make sure that the only address
you're replying to is that person, and not the entire list. Often messages
of the sort "Yes, I agree with you completely!" will appear on a list,
boring the daylights out of the other readers. Likewise, if you explicitly
do want to send the message to the whole list, you'll save yourself some
time by checking to make sure it's indeed headed to the whole list and not a
single person.
A list of the currently available mailing lists is available in at least
two places; the first is in a file on ftp.nisc.sri.com called
`interest-groups' under the `netinfo/' directory. It's updated fairly
regularly, but is large (presently around 700K), so only get it every once
in a while. The other list is maintained by Gene Spafford
(spaf@cs.purdue.edu), and is posted in parts to the newsgroup news.lists
semi-regularly. (See Chapter 4 [Usenet News], page 29, for info on how to
read that and other newsgroups.)
2.2.1 Listservs
On BITNET there's an automated system for maintaining discussion lists
called the listserv. Rather than have an already harried and overworked
human take care of additions and removals from a list, a program performs
these and other tasks by responding to a set of user-driven commands.
Areas of interest are wide and varied - ETHICS-L deals with ethics in
computing, while ADND-L has to do with a role-playing game. A full list of
the available BITNET lists can be obtained by writing to
`LISTSERV@BITNIC.BITNET' with a body containing the command
list global
However, be sparing in your use of this - see if it's already on your system
somewhere. The reply is quite large.
The most fundamental command is `subscribe'. It will tell the listserv
to add the sender to a specific list. The usage is
subscribe foo-l Your Real Name
It will respond with a message either saying that you've been added to the
list, or that the request has been passed on to the system on which the list
is actually maintained.
Chapter 2: Electronic Mail 17
The mate to `subscribe' is, naturally, `unsubscribe'. It will remove a
given address from a BITNET list. It, along with all other listserv
commands, can be abbreviated - `subscribe' as `sub', `unsubscribe' as
`unsub', etc. For a full list of the available listserv commands, write to
`LISTSERV@BITNIC.BITNET', giving it the command `help'.
As an aside, there have been implementations of the listserv system for
non-BITNET hosts (more specifically, Unix systems). One of the most com-
plete is available on cs.bu.edu in the directory `pub/listserv'.
"I made this letter longer than usual because
I lack the time to make it shorter."
Pascal, Provincial Letters XVI
18 Zen and the Art of the Internet
Chapter 3: Anonymous FTP 19
3 Anonymous FTP
FTP (File Transfer Protocol) is the primary method of transferring files
over the Internet. On many systems, it's also the name of the program that
implements the protocol. Given proper permission, it's possible to copy a
file from a computer in South Africa to one in Los Angeles at very fast
speeds (on the order of 5-10K per second). This normally requires either a
user id on both systems or a special configuration set up by the system
administrator(s).
There is a good way around this restriction - the anonymous FTP service.
It essentially will let anyone in the world have access to a certain area of
disk space in a non-threatening way. With this, people can make files
publicly available with little hassle. Some systems have dedicated entire
disks or even entire computers to maintaining extensive archives of source
code and information. They include gatekeeper.dec.com (Digital),
wuarchive.wustl.edu (Washington University in Saint Louis), and
archive.cis.ohio-state.edu (The Ohio State University).
The process involves the "foreign" user (someone not on the system
itself) creating an FTP connection and logging into the system as the user
`anonymous', with an arbitrary password:
Name (foo.site.com:you): anonymous
Password: jm@south.america.org
Custom and netiquette dictate that people respond to the Password: query
with an email address so that the sites can track the level of FTP usage, if
they desire. (See Section 2.1 [Addresses], page 11 for information on email
addresses).
The speed of the transfer depends on the speed of the underlying link. A
site that has a 9600bps SLIP connection will not get the same throughput as
a system with a 56k leased line (see Section 1.5 [The Physical Connection],
page 8, for more on what kinds of connections can exist in a network). Also,
the traffic of all other users on that link will affect performance. If
there are thirty people all FTPing from one site simultaneously, the load on
the system (in addition to the network connection) will degrade the overall
throughput of the transfer.
3.1 FTP Etiquette
Lest we forget, the Internet is there for people to do work. People
using the network and the systems on it are doing so for a purpose, whether
20 Zen and the Art of the Internet
it be research, development, whatever. Any heavy activity takes away from
the overall performance of the network as a whole.
The effects of an FTP connection on a site and its link can vary; the
general rule of thumb is that any extra traffic created detracts from the
ability of that site's users to perform their tasks. To help be considerate
of this, it's highly recommended that FTP sessions be held only after normal
business hours for that site, preferably late at night. The possible effects
of a large transfer will be less destructive at 2 a.m. than 2 p.m. Also,
remember that if it's past dinner time in Maine, it's still early afternoon
in California - think in terms of the current time at the site that's being
visited, not of local time.
3.2 Basic Commands
While there have been many extensions to the various FTP clients out
there, there is a de facto "standard" set that everyone expects to work. For
more specific information, read the manual for your specific FTP program.
This section will only skim the bare minimum of commands needed to op- erate
an FTP session.
3.2.1 Creating the Connection
The actual command to use FTP will vary among operating systems; for the
sake of clarity, we'll use `FTP' here, since it's the most general form.
There are two ways to connect to a system - using its hostname or its
Internet number. Using the hostname is usually preferred. However, some
sites aren't able to resolve hostnames properly, and have no alternative.
We'll assume you're able to use hostnames for simplicity's sake. The form is
ftp somewhere.domain
See Section 1.1 [Domains], page 5 for help with reading and using domain
names (in the example below, somewhere.domain is ftp.uu.net).
You must first know the name of the system you want to connect to. We'll
use `ftp.uu.net' as an example. On your system, type:
ftp ftp.uu.net
(the actual syntax will vary depending on the type of system the connection's
being made from). It will pause momentarily then respond with the message
Connected to ftp.uu.net.
and an initial prompt will appear:
Chapter 3: Anonymous FTP 21
220 uunet FTP server (Version 5.100 Mon Feb 11 17:13:28 EST 1991) ready.
Name (ftp.uu.net:jm):
to which you should respond with anonymous:
220 uunet FTP server (Version 5.100 Mon Feb 11 17:13:28 EST 1991) ready.
Name (ftp.uu.net:jm): anonymous
The system will then prompt you for a password; as noted previously, a good
response is your email address:
331 Guest login ok, send ident as password.
Password: jm@south.america.org
230 Guest login ok, access restrictions apply.
ftp>
The password itself will not echo. This is to protect a user's security when
he or she is using a real account to FTP files between machines. Once you
reach the ftp> prompt, you know you're logged in and ready to go.
3.2.2 dir
At the `ftp>' prompt, you can type a number of commands to perform
various functions. One example is `dir' - it will list the files in the
current directory. Continuing the example from above:
ftp> dir
200 PORT command successful.
150 Opening ASCII mode data connection for /bin/ls.
total 3116
drwxr-xr-x 2 7 21 512 Nov 21 1988 .forward
-rw-rw-r-- 1 7 11 0 Jun 23 1988 .hushlogin
drwxrwxr-x 2 0 21 512 Jun 4 1990 Census
drwxrwxr-x 2 0 120 512 Jan 8 09:36 ClariNet
: : : etc etc : : :
-rw-rw-r-- 1 7 14 42390 May 20 02:24 newthisweek.Z
: : : etc etc : : :
-rw-rw-r-- 1 7 14 2018887 May 21 01:01 uumap.tar.Z
drwxrwxr-x 2 7 6 1024 May 11 10:58 uunet-info
226 Transfer complete.
5414 bytes received in 1.1 seconds (4.9 Kbytes/s)
ftp>
The file `newthisweek.Z' was specifically included because we'll be using it
later. Just for general information, it happens to be a listing of all of the
22 Zen and the Art of the Internet
files added to UUNET's archives during the past week.
The directory shown is on a machine running the Unix operating system -
the dir command will produce different results on other operating systems
(e.g. TOPS, VMS, et al.). Learning to recognize different formats will take
some time. After a few weeks of traversing the Internet, it proves easier to
see, for example, how large a file is on an operating system you're otherwise
not acquainted with.
With many FTP implementations, it's also possible to take the output
of dir and put it into a file on the local system with
ftp> dir n* outfilename
the contents of which can then be read outside of the live FTP connection;
this is particularly useful for systems with very long directories (like
ftp.uu.net). The above example would put the names of every file that
begins with an `n' into the local file outfilename.
3.2.3 cd
At the beginning of an FTP session, the user is in a "top-level"
directory. Most things are in directories below it (e.g. `/pub'). To change
the current directory, one uses the cd command. To change to the directory
`pub', for example, one would type
ftp> cd pub
which would elicit the response
250 CWD command successful.
Meaning the "Change Working Directory" command (`cd') worked properly.
Moving "up" a directory is more system-specific - in Unix use the command
`cd ..', and in VMS, `cd [-]'.
3.2.4 get and put
The actual transfer is performed with the get and put commands. To get
a file from the remote computer to the local system, the command takes the
form:
ftp> get filename
where filename is the file on the remote system. Again using ftp.uu.net as
an example, the file `newthisweek.Z' can be retrieved with
Chapter 3: Anonymous FTP 23
ftp> get newthisweek.Z
200 PORT command successful.
150 Opening ASCII mode data connection for newthisweek.Z (42390 bytes).
226 Transfer complete.
local: newthisweek.Z remote: newthisweek.Z
42553 bytes received in 6.9 seconds (6 Kbytes/s)
ftp>
The section below on using binary mode instead of ASCII will describe why
this particular choice will result in a corrupt and subsequently unusable file.
If, for some reason, you want to save a file under a different name (e.g.
your system can only have 14-character filenames, or can only have one dot
in the name), you can specify what the local filename should be by providing
get with an additional argument
ftp> get newthisweek.Z uunet-new
which will place the contents of the file `newthisweek.Z' in `uunet-new' on
the local system.
The transfer works the other way, too. The put command will transfer
a file from the local system to the remote system. If the permissions are set
up for an FTP session to write to a remote directory, a file can be sent with
ftp> put filename
As with get, put will take a third argument, letting you specify a different
name for the file on the remote system.
3.2.4.1 ASCII vs Binary
In the example above, the file `newthisweek.Z' was transferred, but
supposedly not correctly. The reason is this: in a normal ASCII transfer
(the default), certain characters are translated between systems, to help
make text files more readable. However, when binary files (those containing
non- ASCII characters) are transferred, this translation should not take
place. One example is a binary program - a few changed characters can render
it completely useless.
To avoid this problem, it's possible to be in one of two modes - ASCII
or binary. In binary mode, the file isn't translated in any way. What's on
the remote system is precisely what's received. The commands to go between
the two modes are:
ftp> ascii
200 Type set to A. (Note the A, which signifies ASCII mode.)
ftp> binary
200 Type set to I. (Set to Image format, for pure binary transfers.)
24 Zen and the Art of the Internet
Note that each command need only be done once to take effect; if the user
types binary, all transfers in that session are done in binary mode (that
is, unless ascii is typed later).
The transfer of `newthisweek.Z' will work if done as:
ftp> binary
200 Type set to I.
ftp> get newthisweek.Z
200 PORT command successful.
150 Opening BINARY mode data connection for newthisweek.Z (42390 bytes).
226 Transfer complete.
local: newthisweek.Z remote: newthisweek.Z
42390 bytes received in 7.2 seconds (5.8 Kbytes/s)
Note: The file size (42390) is different from that done in ASCII
mode (42553) bytes; and the number 42390 matches the one in the
listing of UUNET's top directory. We can be relatively sure that
we've received the file without any problems.
3.2.4.2 mget and mput
The commands mget and mput allow for multiple file transfers using wild-
cards to get several files, or a whole set of files at once, rather than
having to do it manually one by one. For example, to get all files that
begin with the letter `f', one would type
ftp> mget f*
Similarly, to put all of the local files that end with .c:
ftp> mput *.c
Rather than reiterate what's been written a hundred times before, con-
sult a local manual for more information on wildcard matching (every DOS
manual, for example, has a section on it).
Normally, FTP assumes a user wants to be prompted for every file in a
mget or mput operation. You'll often need to get a whole set of files and
not have each of them confirmed - you know they're all right. In that case,
use the prompt command to turn the queries off.
ftp> prompt
Interactive mode off.
Likewise, to turn it back on, the prompt command should simply be issued
again.
Chapter 3: Anonymous FTP 25
3.3 The archie Server
A group of people at McGill University in Canada got together and cre-
ated a query system called archie. It was originally formed to be a quick
and easy way to scan the offerings of the many anonymous FTP sites that are
maintained around the world. As time progressed, archie grew to include
other valuable services as well.
The archie service is accessible through an interactive telnet session,
email queries, and command-line and X-window clients. The email responses
can be used along with FTPmail servers for those not on the Internet. (See
[FTP-by-Mail Servers], page 77, for info on using FTPmail servers.)
3.3.1 Using archie Today
Currently, archie tracks the contents of over 800 anonymous FTP archive
sites containing over a million files stored across the Internet.
Collectively, these files represent well over 50 gigabytes of information,
with new entries being added daily.
The archie server automatically updates the listing information from
each site about once a month. This avoids constantly updating the
databases, which could waste network resources, yet ensures that the
information on each site's holdings is reasonably up to date.
To access archie interactively, telnet to one of the existing servers.1
They include
archie.ans.net (New York, USA)
archie.rutgers.edu (New Jersey, USA)
archie.sura.net (Maryland, USA)
archie.unl.edu (Nebraska, USA)
archie.mcgill.ca (the first Archie server, in Canada)
archie.funet.fi (Finland)
archie.au (Australia)
archie.doc.ic.ac.uk (Great Britain)
At the login: prompt of one of the servers, enter `archie' to log in. A
greeting will be displayed, detailing information about ongoing work in the
archie project; the user will be left at a `archie>' prompt, at which he may
enter commands. Using `help' will yield instructions on using the `prog'
command to make queries, `set' to control various aspects of the server's
_________________________________
1 See Chapter 5 [Telnet], page 45, for notes on using the telnet program.
26 Zen and the Art of the Internet
operation, et al. Type `quit' at the prompt to leave archie. Typing the
query `prog vine.tar.Z' will yield a list of the systems that offer the
source to the X-windows program vine; a piece of the information returned
looks like:
Host ftp.uu.net (137.39.1.9)
Last updated 10:30 7 Jan 1992
Location: /packages/X/contrib
FILE rw-r--r-- 15548 Oct 8 20:29 vine.tar.Z
Host nic.funet.fi (128.214.6.100)
Last updated 05:07 4 Jan 1992
Location: /pub/X11/contrib
FILE rw-rw-r-- 15548 Nov 8 03:25 vine.tar.Z
3.3.2 archie Clients
There are two main-stream archie clients, one called (naturally enough)
`archie', the other `xarchie' (for X-Windows). They query the archie
databases and yield a list of systems that have the requested file(s) avail-
able for anonymous FTP, without requiring an interactive session to the
server. For example, to find the same information you tried with the server
command `prog', you could type
% archie vine.tar.Z
Host athene.uni-paderborn.de
Location: /local/X11/more_contrib
FILE -rw-r--r-- 18854 Nov 15 1990 vine.tar.Z
Host emx.utexas.edu
Location: /pub/mnt/source/games
FILE -rw-r--r-- 12019 May 7 1988 vine.tar.Z
Host export.lcs.mit.edu
Location: /contrib
FILE -rw-r--r-- 15548 Oct 9 00:29 vine.tar.Z
Note that your system administrator may not have installed the archie
clients yet; the source is available on each of the archie servers, in the
direc- tory `archie/clients'.
Using the X-windows client is much more intuitive - if it's installed,
just read its man page and give it a whirl. It's essential for the networked
desktop.
Chapter 3: Anonymous FTP 27
3.3.3 Mailing archie
Users limited to email connectivity to the Internet should send a
message to the address `archie@archie.mcgill.ca' with the single word help
in the body of the message. An email message will be returned explaining how
to use the email archie server, along with the details of using FTPmail.
Most of the commands offered by the telnet interface can be used with the
mail server.
3.3.4 The whatis database
In addition to offering access to anonymous FTP listings, archie also
permits access to the whatis description database. It includes the names
and brief synopses for over 3,500 public domain software packages, datasets
and informational documents located on the Internet.
Additional whatis databases are scheduled to be added in the future.
Planned offerings include listings for the names and locations of online
library catalog programs, the names of publicly accessible electronic
mailing lists, compilations of Frequently Asked Questions lists, and archive
sites for the most popular Usenet newsgroups. Suggestions for additional
descriptions or locations databases are welcomed and should be sent to the
archie developers at `archie-l@cs.mcgill.ca'.
"Was f"ur pl"undern!"
("What a place to plunder!")
Gebhard Leberecht Bl"ucher
28 Zen and the Art of the Internet
Chapter 4: Usenet News 29
4 Usenet News
The first thing to understand about Usenet is that it is widely
misunderstood. Every day on Usenet the "blind men and the elephant"
phenomenon appears, in spades. In the opinion of the author, more flame
wars (rabid arguments) arise because of a lack of understanding of the
nature of Usenet than from any other source. And consider that such flame
wars arise, of necessity, among people who are on Usenet. Imagine, then,
how poorly understood Usenet must be by those outside!
No essay on the nature of Usenet can ignore the erroneous impressions
held by many Usenet users. Therefore, this section will treat falsehoods
first. Keep reading for truth. (Beauty, alas, is not relevant to Usenet.)
4.1 What Usenet Is
Usenet is the set of machines that exchange articles tagged with one or
more universally-recognized labels, called newsgroups (or "groups" for
short). (Note that the term `newsgroup' is correct, while `area', `base',
`board', `bboard', `conference', `round table', `SIG', etc. are incorrect.
If you want to be understood, be accurate.)
4.2 The Diversity of Usenet
If the above definition of Usenet sounds vague, that's because it is. It
is almost impossible to generalize over all Usenet sites in any non-trivial
way. Usenet encompasses government agencies, large universities, high
schools, businesses of all sizes, home computers of all descriptions, etc.
Every administrator controls his own site. No one has any real control
over any site but his own. The administrator gets his power from the owner
of the system he administers. As long as the owner is happy with the job the
administrator is doing, he can do whatever he pleases, up to and including
cutting off Usenet entirely. C'est la vie.
4.3 What Usenet Is Not
Usenet is not an organization.
Usenet has no central authority. In fact, it has no central
anything. There is a vague notion of "upstream" and
30 Zen and the Art of the Internet
"downstream" related to the direction of high-volume news
flow. It follows that, to the extent that "upstream" sites
decide what traffic they will carry for their "downstream"
neighbors, that "upstream" sites have some influence on their
neighbors. But such influence is usually easy to circumvent,
and heavy-handed manipulation typically results in a backlash
of resentment.
Usenet is not a democracy.
A democracy can be loosely defined as "government of the
people, by the people, for the people." However, as explained
above, Usenet is not an organization, and only an organization
can be run as a democracy. Even a democracy must be organized,
for if it lacks a means of enforcing the peoples' wishes, then
it may as well not exist.
Some people wish that Usenet were a democracy. Many people
pretend that it is. Both groups are sadly deluded.
Usenet is not fair.
After all, who shall decide what's fair? For that matter, if
someone is behaving unfairly, who's going to stop him? Neither
you nor I, that's certain.
Usenet is not a right.
Some people misunderstand their local right of "freedom of
speech" to mean that they have a legal right to use others'
computers to say what they wish in whatever way they wish, and
the owners of said computers have no right to stop them.
Those people are wrong. Freedom of speech also means freedom
not to speak; if I choose not to use my computer to aid your
speech, that is my right. Freedom of the press belongs to those
who own one.
Usenet is not a public utility.
Some Usenet sites are publicly funded or subsidized. Most of
them, by plain count, are not. There is no government monopoly
on Usenet, and little or no control.
Usenet is not a commercial network.
Many Usenet sites are academic or government organizations; in
fact, Usenet originated in academia. Therefore, there is a
Usenet custom of keeping commercial traffic to a minimum. If
such commercial traffic is generally considered worth carrying,
then it may be grudgingly tolerated. Even so, it is usually
separated somehow from non-commercial traffic; see comp.newprod.
Chapter 4: Usenet News 31
Usenet is not the Internet.
The Internet is a wide-ranging network, parts of which are
subsidized by various governments. The Internet carries many
kinds of traffic; Usenet is only one of them. And the Internet
is only one of the various networks carrying Usenet traffic.
Usenet is not a Unix network, nor even an ASCII network.
Don't assume that everyone is using "rn" on a Unix machine.
There are Vaxen running VMS, IBM mainframes, Amigas, and MS-DOS
PCs reading and posting to Usenet. And, yes, some of them use
(shudder) EBCDIC. Ignore them if you like, but they're out
there.
Usenet is not software.
There are dozens of software packages used at various sites to
transport and read Usenet articles. So no one program or
package can be called "the Usenet software."
Software designed to support Usenet traffic can be (and is)
used for other kinds of communication, usually without risk of
mixing the two. Such private communication networks are
typically kept distinct from Usenet by the invention of
newsgroup names different from the universally-recognized ones.
Usenet is not a UUCP network.
UUCP is a protocol (some might say protocol suite, but that's
a technical point) for sending data over point-to-point connec-
tions, typically using dialup modems. Usenet is only one of the
various kinds of traffic carried via UUCP, and UUCP is only one
of the various transports carrying Usenet traffic.
Well, enough negativity.
4.4 Propagation of News
In the old days, when UUCP over long-distance dialup lines was the
dominant means of article transmission, a few well-connected sites had real
influence in determining which newsgroups would be carried where. Those
sites called themselves "the backbone."
But things have changed. Nowadays, even the smallest Internet site has
connectivity the likes of which the backbone admin of yesteryear could only
dream. In addition, in the U.S., the advent of cheaper long-distance calls
and high-speed modems has made long-distance Usenet feeds thinkable for
smaller companies. There is only one pre-eminent UUCP transport site
32 Zen and the Art of the Internet
today in the U.S., namely UUNET. But UUNET isn't a player in the propagation
wars, because it never refuses any traffic - it gets paid by the minute,
after all; to refuse based on content would jeopardize its legal status as
an enhanced service provider.
All of the above applies to the U.S. In Europe, different cost
structures favored the creation of strictly controlled hierarchical
organizations with central registries. This is all very unlike the
traditional mode of U.S. sites (pick a name, get the software, get a feed,
you're on). Europe's "benign monopolies", long uncontested, now face
competition from looser organizations patterned after the U.S. model.
4.5 Group Creation
As discussed above, Usenet is not a democracy. Nevertheless, currently
the most popular way to create a new newsgroup involves a "vote" to
determine popular support for (and opposition to) a proposed newsgroup. See
Appendix C [Newsgroup Creation], page 79, for detailed instructions and
guidelines on the process involved in making a newsgroup.
If you follow the guidelines, it is probable that your group will be
created and will be widely propagated. However, due to the nature of Usenet,
there is no way for any user to enforce the results of a newsgroup vote (or
any other decision, for that matter). Therefore, for your new newsgroup to
be propagated widely, you must not only follow the letter of the guidelines;
you must also follow its spirit. And you must not allow even a whiff of
shady dealings or dirty tricks to mar the vote.
So, you may ask: How is a new user supposed to know anything about the
"spirit" of the guidelines? Obviously, she can't. This fact leads
inexorably to the following recommendation:
If you're a new user, don't try to create a new newsgroup alone.
If you have a good newsgroup idea, then read the news.groups newsgroup for a
while (six months, at least) to find out how things work. If you're too
impatient to wait six months, then you really need to learn; read
news.groups for a year instead. If you just can't wait, find a Usenet old
hand to run the vote for you.
Readers may think this advice unnecessarily strict. Ignore it at your
peril. It is embarrassing to speak before learning. It is foolish to jump
into a society you don't understand with your mouth open. And it is futile to
try to force your will on people who can tune you out with the press of a key.
Chapter 4: Usenet News 33
4.6 If You're Unhappy...
Property rights being what they are, there is no higher authority on
Usenet than the people who own the machines on which Usenet traffic is
carried. If the owner of the machine you use says, "We will not carry
alt.sex on this machine," and you are not happy with that order, you have no
Usenet recourse. What can we outsiders do, after all?
That doesn't mean you are without options. Depending on the nature of
your site, you may have some internal political recourse. Or you might find
external pressure helpful. Or, with a minimal investment, you can get a feed
of your own from somewhere else. Computers capable of taking Usenet feeds
are down in the $500 range now, Unix-capable boxes are going for under
$2000, and there are at least two Unix lookalikes in the $100 price range.
No matter what, appealing to "Usenet" won't help. Even if those who
read such an appeal regarding system administration are sympathetic to your
cause, they will almost certainly have even less influence at your site than
you do.
By the same token, if you don't like what some user at another site is
doing, only the administrator and/or owner of that site have any authority
to do anything about it. Persuade them that the user in question is a problem
for them, and they might do something (if they feel like it). If the user
in question is the administrator or owner of the site from which he or she
posts, forget it; you can't win. Arrange for your newsreading software to
ignore articles from him or her if you can, and chalk one up to experience.
4.7 The History of Usenet (The ABCs)
In the beginning, there were conversations, and they were good. Then
came Usenet in 1979, shortly after the release of V7 Unix with UUCP; and it
was better. Two Duke University grad students in North Carolina, Tom
Truscott and Jim Ellis, thought of hooking computers together to exchange
information with the Unix community. Steve Bellovin, a grad student at the
University of North Carolina, put together the first version of the news
software using shell scripts and installed it on the first two sites: unc
and duke. At the beginning of 1980 the network consisted of those two sites
and phs (another machine at Duke), and was described at the January 1980
Usenix conference in Boulder, CO.1 Steve Bellovin later rewrote the scripts
into C programs, but they were never released beyond unc and duke. Shortly
_________________________________
34 Zen and the Art of the Internet
thereafter, Steve Daniel did another implementation in the C programming
language for public distribution. Tom Truscott made further modifications,
and this became the "A" news release.
In 1981 at the University of California at Berkeley, grad student Mark
Horton and high school student Matt Glickman rewrote the news software to
add functionality and to cope with the ever increasing volume of news - "A"
news was intended for only a few articles per group per day. This rewrite
was the "B" news version. The first public release was version 2.1 in 1982;
all versions before 2.1 were considered in beta test. As The Net grew, the
news software was expanded and modified. The last version maintained and
released primarily by Mark was 2.10.1.
Rick Adams, then at the Center for Seismic Studies, took over
coordination of the maintenance and enhancement of the news software with
the 2.10.2 release in 1984. By this time, the increasing volume of news was
becoming a concern, and the mechanism for moderated groups was added to the
software at 2.10.2. Moderated groups were inspired by ARPA mailing lists
and experience with other bulletin board systems. In late 1986, version
2.11 of news was released, including a number of changes to support a new
naming structure for newsgroups, enhanced batching and compression, enhanced
ihave/sendme control messages, and other features. The current release of
news is 2.11, patchlevel 19.
A new version of news, becoming known as "C" news, has been developed at
the University of Toronto by Geoff Collyer and Henry Spencer. This version
is a rewrite of the lowest levels of news to increase article processing
speed, decrease article expiration processing and improve the reliability of
the news system through better locking, etc. The package was released to
The Net in the autumn of 1987. For more information, see the paper News
Need Not Be Slow, published in the Winter 1987 Usenix Technical Conference
proceedings.
Usenet software has also been ported to a number of platforms, from the
Amiga and IBM PCs all the way to minicomputers and mainframes.
4.8 Hierarchies
Newsgroups are organized according to their specific areas of
concentration. Since the groups are in a tree structure, the various areas
are called hierarchies. There are seven major categories:
________________________________
1 The Usenix conferences are semi-annual meetings where members of the
Usenix Association, a group of Unix enthusiasts, meet and trade notes.
Chapter 4: Usenet News 35
`comp' Topics of interest to both computer professionals and hobbyists,
including topics in computer science, software sources, and
information on hardware and software systems.
`misc' Group addressing themes not easily classified into any of the
other headings or which incorporate themes from multiple
categories. Subjects include fitness, job-hunting, law, and
investments.
`sci' Discussions marked by special knowledge relating to research in
or application of the established sciences.
`soc' Groups primarily addressing social issues and socializing. In-
cluded are discussions related to many different world cultures.
`talk' Groups largely debate-oriented and tending to feature long
discussions without resolution and without appreciable amounts
of generally useful information.
`news' Groups concerned with the news network, group maintenance,
and software.
`rec' Groups oriented towards hobbies and recreational activities
These "world" newsgroups are (usually) circulated around the entire
Usenet - this implies world-wide distribution. Not all groups actually
enjoy such wide distribution, however. The European Usenet and Eunet sites
take only a selected subset of the more "technical" groups, and
controversial "noise" groups are often not carried by many sites in the U.S.
and Canada (these groups are primarily under the `talk' and `soc'
classifications). Many sites do not carry some or all of the comp.binaries
groups because of the typically large size of the posts in them (being
actual executable programs).
Also available are a number of "alternative" hierarchies:
`alt' True anarchy; anything and everything can and does appear;
subjects include sex, the Simpsons, and privacy.
`gnu' Groups concentrating on interests and software with the GNU
Project of the Free Software Foundation. For further info on
what the FSF is, see Section 8.3.4 [FSF], page 68.
`biz' Business-related groups.
4.9 Moderated vs Unmoderated
Some newsgroups insist that the discussion remain focused and on-target;
to serve this need, moderated groups came to be. All articles posted to a
moderated group get mailed to the group's moderator. He or she periodically
(hopefully sooner than later) reviews the posts, and then either posts them
36 Zen and the Art of the Internet
individually to Usenet, or posts a composite digest of the articles for the
past day or two. This is how many mailing list gateways work (for example,
the Risks Digest).
4.10 news.groups & news.announce.newgroups
Being a good net.citizen includes being involved in the continuing
growth and evolution of the Usenet system. One part of this involvement
includes following the discussion in the groups news.groups and the notes in
news.announce.newgroups. It is there that discussion goes on about the
creation of new groups and destruction of inactive ones. Every person on
Usenet is allowed and encouraged to vote on the creation of a newsgroup.
4.11 How Usenet Works
The transmission of Usenet news is entirely cooperative. Feeds are
generally provided out of good will and the desire to distribute news
everywhere. There are places which provide feeds for a fee (e.g. UUNET),
but for the large part no exchange of money is involved.
There are two major transport methods, UUCP and NNTP. The first is
mainly modem-based and involves the normal charges for telephone calls. The
second, NNTP, is the primary method for distributing news over the Internet.
With UUCP, news is stored in batches on a site until the neighbor calls
to receive the articles, or the feed site happens to call. A list of groups
which the neighbor wishes to receive is maintained on the feed site. The
Cnews system compresses its batches, which can dramatically reduce the
transmission time necessary for a relatively heavy newsfeed.
NNTP, on the other hand, offers a little more latitude with how news is
sent. The traditional store-and-forward method is, of course, available.
Given the "real-time" nature of the Internet, though, other methods have
been devised. Programs now keep constant connections with their news
neighbors, sending news nearly instantaneously, and can handle dozens of
simultaneous feeds, both incoming and outgoing.
The transmission of a Usenet article is centered around the uniqu e
`Message-ID:' header. When an NNTP site offers an article to a neighbor,
it says it has that specific Message ID. If the neighbor finds it hasn't
received the article yet, it tells the feed to send it through; this is
repeate d for each and every article that's waiting for the neighbor. Using
Chapter 4: Usenet News 37
unique IDs helps prevent a system from receiving five copies of an article
from each of its five news neighbors, for example.
Further information on how Usenet works with relation to the various
transports is available in the documentation for the Cnews and NNTP
packages, as well as in RFC-1036, the Standard for Interchange of USENET
Messages and RFC-977, Network News Transfer Protocol: A Proposed Standard
for the Stream-Based Transmission of News. The RFCs do tend to be rather dry
reading, particularly to the new user. See [RFCs], page 73 for information
on retrieving RFCs.
4.12 Mail Gateways
A natural progression is for Usenet news and electronic mailing lists to
somehow become merged - which they have, in the form of news gateways. Many
mailing lists are set up to "reflect" messages not only to the readership of
the list, but also into a newsgroup. Likewise, posts to a newsgroup can be
sent to the moderator of the mailing list, or to the entire mailing list.
Some examples of this in action are comp.risks (the Risks Digest) and
comp.dcom.telecom (the Telecom Digest).
This method of propagating mailing list traffic has helped solve the
problem of a single message being delivered to a number of people at the
same site - instead, anyone can just subscribe to the group. Also, mailing
list maintenance is lowered substantially, since the moderators don't have
to be constantly removing and adding users to and from the list. Instead,
the people can read and not read the newsgroup at their leisure.
4.13 Usenet "Netiquette"
There are many traditions with Usenet, not the least of which is dubbed
netiquette - being polite and considerate of others. If you follow a few
basic guidelines, you, and everyone that reads your posts, will be much
happier in the long run.
4.13.1 Signatures
At the end of most articles is a small blurb called a person's
signature. In Unix this file is named `.signature' in the person's login
directory - it will vary for other operating systems. It exists to provide
information about how to get in touch with the person posting the article,
38 Zen and the Art of the Internet
including their email address, phone number, address, or where they're
located. Even so, signatures have become the graffiti of computers. People
put song lyrics, pictures, philosophical quotes, even advertisements in
their ".sigs". (Note, however, that advertising in your signature will more
often than not get you flamed until you take it out.)
Four lines will suffice - more is just extra garbage for Usenet sites to
carry along with your article, which is supposed to be the intended focus of
the reader. Netiquette dictates limiting oneself to this "quota" of
four - some people make signatures that are ten lines or even more, including
elaborate ASCII drawings of their hand-written signature or faces or even
the space shuttle. This is not cute, and will bother people to no end.
Similarly, it's not necessary to include your signature - if you forget
to append it to an article, don't worry about it. The article's just as
good as it ever would be, and contains everything you should want to say.
Don't re-post the article just to include the signature.
4.13.2 Posting Personal Messages
If mail to a person doesn't make it through, avoid posting the message to
a newsgroup. Even if the likelihood of that person reading the group is very
high, all of the other people reading the articles don't give a whit what
you have to say to Jim Morrison. Simply wait for the person to post again
and double-check the address, or get in touch with your system administrator
and see if it's a problem with local email delivery. It may also turn out
that their site is down or is having problems, in which case it's just
necessary to wait until things return to normal before contacting Jim.
4.13.3 Posting Mail
In the interests of privacy, it's considered extremely bad taste to post
any email that someone may have sent, unless they explicitly give you
permission to redistribute it. While the legal issues can be heavily
debated, most everyone agrees that email should be treated as anything one
would receive via normal snailmail,2, with all of the assumed rights that
are carried with it.
_________________________________
2 The slang for the normal land and air postal service.
Chapter 4: Usenet News 39
4.13.4 Test Messages
Many people, particularly new users, want to try out posting before
actually taking part in discussions. Often the mechanics of getting messages
out is the most difficult part of Usenet. To this end, many, many users
find it necessary to post their tests to "normal" groups (for example,
news.admin or comp.mail.misc). This is considered a major netiquette faux
pas in the Usenet world. There are a number of groups available, called
test groups, that exist solely for the purpose of trying out a news system,
reader, or even new signature. They include
alt.test
gnu.gnusenet.test
misc.test
some of which will generate auto-magic replies to your posts to let you know
they made it through. There are certain denizens of Usenet that frequent the
test groups to help new users out. They respond to the posts, often including
the article so the poster can see how it got to the person's site. Also,
many regional hierarchies have test groups, like phl.test in Philadelphia.
By all means, experiment and test - just do it in its proper place.
4.13.5 Famous People Appearing
Every once in a while, someone says that a celebrity is accessible
through "The Net"; or, even more entertaining, an article is forged to
appear to be coming from that celebrity. One example is Stephen Spielberg -
the rec.arts.movies readership was in an uproar for two weeks following a
couple of posts supposedly made by Mr. Spielberg. (Some detective work
revealed it to be a hoax.)
There are a few well-known people that are acquainted with Usenet and
computers in general - but the overwhelming majority are just normal people.
One should act with skepticism whenever a notable personality is "seen" in a
newsgroup.
4.13.6 Summaries
Authors of articles occasionally say that readers should reply by mail
and they'll summarize. Accordingly, readers should do just that - reply via
mail. Responding with a followup article to such an article defeats the
intention of the author. She, in a few days, will post one article
containing the highlights of the responses she received. By following up to
the whole group, the author may not read what you have to say.
40 Zen and the Art of the Internet
When creating a summary of the replies to a post, try to make it as
reader-friendly as possible. Avoid just putting all of the messages
received into one big file. Rather, take some time and edit the messages
into a form that contains the essential information that other readers would
be interested in.
Also, sometimes people will respond but request to remain anonymous (one
example is the employees of a corporation that feel the information's not
proprietary, but at the same time want to protect themselves from political
backlash). Summaries should honor this request accordingly by listing the
`From:' address as `anonymous' or `(Address withheld by request)'.
4.13.7 Quoting
When following up to an article, many newsreaders provide the facility
to quote the original article with each line prefixed by `> ', as in
In article <1232@foo.bar.com>, sharon@foo.bar.com wrote:
> I agree, I think that basketweaving's really catching on,
> particularly in Pennsylvania. Here's a list of every person
> in PA that currently engages in it publicly:
: : : etc : : :
This is a severe example (potentially a horribly long article), but
proves a point. When you quote another person, edit out whatever isn't
directly applicable to your reply.3 This gives the reader of the new article
a better idea of what points you were addressing. By including the entire
article, you'll only annoy those reading it. Also, signatures in the
original aren't necessary; the readers already know who wrote it (by the
attribution).
Avoid being tedious with responses - rather than pick apart an article,
address it in parts or as a whole. Addressing practically each and every
word in an article only proves that the person responding has absolutely
nothing better to do with his time.
If a "war" starts (insults and personal comments get thrown back and
forth), take it into email - exchange email with the person you're arguing
with. No one enjoys watching people bicker incessantly.
_________________________________
3 But not changing their words, of course.
Chapter 4: Usenet News 41
4.13.8 Crossposting
The `Newsgroups:' line isn't limited to just one group - an article can
be posted in a list of groups. For instance, the line
Newsgroups: sci.space,comp.simulation
posts the article to both the groups sci.space and comp.simulation. It's
usually safe to crosspost to up to three or four groups. To list more than
that is considered "excessive noise."
It's also suggested that if an article is crossposted a `Followup-To:'
header be included. It should name the group to which all additional discus-
sion should be directed to. For the above example a possible `Followup-To:'
would be
Followup-To: sci.space
which would make all followups automatically be posted to just sci.space,
rather than both sci.space and comp.simulation. If every response made with
a newsreader's "followup" command should go to the person posting the
article no matter what, there's also a mechanism worked in to accommodate.
The Followup-To: header should contain the single word `poster':
Followup-To: poster
Certain newsreaders will use this to sense that a reply should never be
posted back onto The Net. This is often used with questions that will yield
a summary of information later, a vote, or an advertisement.
4.13.9 Recent News
One should avoid posting "recent" events - sports scores, a plane crash,
or whatever people will see on the evening news or read in the morning
paper. By the time the article has propagated across all of Usenet, the
"news" value of the article will have become stale. (This is one case for
the argument that `Usenet news' is a misnomer.4)
4.13.10 Quality of Postings
How you write and present yourself in your articles is important. If
you have terrible spelling, keep a dictionary near by. If you have trouble
_________________________________
4 Note that the Clarinet News service (see Section 7.3 [Clarinet], page 60)
offers news items in a Usenet format as a precise alternative to the
morning paper, et. al.
42 Zen and the Art of the Internet
with grammar and punctuation, try to get a book on English grammar and
composition (found in many bookstores and at garage sales). By all means
pay attention to what you say - it makes you who you are on The Net.
Likewise, try to be clear in what you ask. Ambiguous or vague questions
often lead to no response at all, leaving the poster discouraged. Give as
much essential information as you feel is necessary to let people help you,
but keep it within limits. For instance, you should probably include the
operating system of your computer in the post if it's needed, but don't tell
everybody what peripherals you have hanging off of it.
4.13.11 Useful Subjects
The `Subject:' line of an article is what will first attract people to
read it - if it's vague or doesn't describe what's contained within, no one
will read the article. At the same time, `Subject:' lines that're too wordy
tend to be irritating. For example:
Good Subject: Building Emacs on a Sun Sparc under 4.1
Good Subject: Tryin' to find Waldo in NJ.
Bad Subject: I can't get emacs to work !!!
Bad Subject: I'm desperately in search of the honorable Mr. Waldo
in the state of...
Simply put, try to think of what will best help the reader when he or she
encounters your article in a newsreading session.
4.13.12 Tone of Voice
Since common computers can't portray the inflection or tone in a
person's voice, how articles are worded can directly affect the response to
them. If you say
Anybody using a Vic-20 should go buy themselves a life.
you'll definitely get some responses - telling you to take a leap. Rather
than be inflammatory, phrase your articles in a way that rationally
expresses your opinion, like
What're the practical uses of a Vic-20 these days?
which presents yourself as a much more level-headed individual.
Also, what case (upper or lower) you use can indicate how you're trying
to speak - netiquette dictates that if you USE ALL CAPITAL LETTERS, people
will think you're "shouting." Write as you would in a normal letter
Chapter 4: Usenet News 43
to a friend, following traditional rules of English (or whatever language
you happen to speak).
4.13.13 Computer Religion
No matter what kind of computer a person is using, theirs is always the
best and most efficient of them all. Posting articles asking questions like
`What computer should I buy? An Atari ST or an Amiga?' will lead only to
fervent arguments over the merits and drawbacks of each brand. Don't even
ask The Net - go to a local user group, or do some research of your own like
reading some magazine reviews. Trying to say one computer is somehow better
than another is a moot point.
4.14 Frequently Asked Questions
A number of groups include Frequently Asked Question (FAQ) lists, which
give the answers to questions or points that have been raised time and time
again in a newsgroup. They're intended to help cut down on the redundant
traffic in a group. For example, in the newsgroup alt.tv.simpsons, one
recurring question is `Did you notice that there's a different blackboard
opening at the beginning of every Simpsons episode?' As a result, it's part
of the FAQ for that group.
Usually, FAQ lists are posted at the beginning of each month, and are
set to expire one month later (when, supposedly, the next FAQ will be
published). Nearly every FAQ is also crossposted to news.answers, which is
used as a Usenet repository for them.
4.14.1 The Pit-Manager Archive
MIT, with Jonathan Kamens, has graciously dedicated a machine to the
archiving and storage of the various periodic postings that are peppered
throughout the various Usenet groups. To access them, FTP to the system
pit-manager.mit.edu and look in the directory `/pub/usenet'.
"Be it true or false, so it be news."
Ben Jonson, News from the New World
44 Zen and the Art of the Internet
Chapter 5: Telnet 45
5 Telnet
Telnet is the main Internet protocol for creating a connection with a
remote machine. It gives the user the opportunity to be on one computer
system and do work on another, which may be across the street or thousands
of miles away. Where modems are limited, in the majority, by the quality of
telephone lines and a single connection, telnet provides a connection that's
error-free and nearly always faster than the latest conventional modems.
5.1 Using Telnet
As with FTP (see Section 3.2.2 [Anonymous FTP], page 21), the actual
command for negotiating a telnet connection varies from system to system.
The most common is telnet itself, though. It takes the form of:
telnet somewhere.domain
To be safe, we'll use your local system as a working example. By now, you
hopefully know your site's domain name. If not, ask or try to figure it out.
You'll not get by without it.
To open the connection, type
telnet your.system.name
If the system were wubba.cs.widener.edu, for example, the command
would look like
telnet wubba.cs.widener.edu
The system will respond with something similar to
Trying 147.31.254.999...
Connected to wubba.cs.widener.edu.
Escape character is '^]'.
The escape character, in this example ^] (Control-]), is the character that
will let you go back to the local system to close the connection, suspend
it, etc. To close this connection, the user would type ^], and respond to
the telnet> prompt with the command close. Local documentation should be
checked for information on specific commands, functions, and escape
character that can be used.
5.1.1 Telnet Ports
Many telnet clients also include a third option, the port on which the
connection should take place. Normally, port 23 is the default telnet port;
46 Zen and the Art of the Internet
the user never has to think about it. But sometimes it's desirable to telnet
to a different port on a system, where there may be a service available, or
to aid in debugging a problem. Using
telnet somewhere.domain port
will connect the user to the given port on the system somewhere.domain. Many
libraries use this port method to offer their facilities to the general
Internet community; other services are also available. For instance, one
would type
telnet martini.eecs.umich.edu 3000
to connect to the geographic server at the University of Michigan (see
Section 5.5.6 [Geographic Server], page 50). Other such port connections
follow the same usage.
5.2 Publicly Accessible Libraries
Over the last several years, most university libraries have switched
from a manual (card) catalog system to computerized library catalogs. The
automated systems provide users with easily accessible and up-to-date
information about the books available in these libraries. This has been
further improved upon with the advent of local area networks, dialup modems,
and wide area networks. Now many of us can check on our local library's
holdings or that of a library halfway around the world!
Many, many institutions of higher learning have made their library
catalogs available for searching by anyone on the Internet. They include
Boston University, the Colorado Alliance of Research Libraries (CARL), and
London University King's College.
To include a listing of some of the existing sites would not only be far
too long for this document, it would soon be out of date. Instead, several
lists are being maintained and are available either by mail or via FTP.
Also, the Internet Resource Guide (IRG) also describes a few libraries that
are accessible - see Section 9.1 [IRG], page 71 for further information.
Art St. George and Ron Larsen are maintaining a list of Internet
accessible libraries and databases often referred to as "the St. George
directory." It began with only library catalogs but has expanded to include
sections on campus-wide information systems, and even bulletin board systems
that are not on the Internet. The library catalog sections are divided into
those that are free, those that charge, and international (i.e. non-U.S.)
catalogs; they are arranged by state, province, or country within each
section. There is also a section giving dialup information for some of the
Chapter 5: Telnet 47
library catalogs. It's available for FTP (see Section 3.2.2 [Anonymous
FTP], page 21) on nic.cerf.net in the directory
`cerfnet/cerfnet_info/library_catalog'. The file `internet-catalogs' has a
date suffix; check for the most current date. The information is updated
periodically.
Billy Barron, Systems Manager at the University of North Texas, produces
a directory as an aid to his user community. It complements the St. George
guide by providing a standard format for all systems which lists the
Internet address, login instructions, the system vendor, and logoff
information. The arrangement is alphabetic by organization name. It's
available for FTP on vaxb.acs.unt.edu in the subdirectory `library' as the
file `libraries.txt'.
For announcements of new libraries being available and discussion on
related topics, consult the Usenet newsgroup comp.internet.library (see
Chapter 4 [Usenet News], page 29 to learn how to read news).
5.3 The Cleveland Freenet
Freenets are open-access, free, community computer systems. One such
system is the Cleveland Freenet, sponsored by CWRU (Case Western Reserve
University). Anyone and everyone is welcome to join and take part in the
exciting project - that of a National Telecomputing Public Network, where
everyone benefits. There's no charge for the registration process and no
charge to use the system.
To register, telnet to any one of
freenet-in-a.cwru.edu
freenet-in-b.cwru.edu
freenet-in-c.cwru.edu
After you're connected, choose the entry on the menu that signifies you're a
guest user. Another menu will follow; select `Apply for an account', and
you'll be well on your way to being a FreeNet member.
You will need to fill out a form and send it to them through the Postal
Service - your login id and password will be created in a few days. At that
point you're free to use the system as you wish. They provide multi-user
chat, email, Usenet news, and a variety of other things to keep you occupied
for hours on end.
5.4 Directories
There are a few systems that are maintained to provide the Internet com-
48 Zen and the Art of the Internet
munity with access to lists of information - users, organizations, etc. They
range from fully dedicated computers with access to papers and research
results, to a system to find out about the faculty members of a university.
5.4.1 Knowbot
Knowbot is a "master directory" that contains email address information
from the NIC WHOIS database (see Section 6.4.1 [Whois], page 57), the PSI
White Pages Pilot Project, the NYSERNET X.500 database and MCI Mail. Most
of these services are email registries themselves, but Knowbot provides a
very comfortable way to access all of them in one place. Telnet to
nri.reston.va.us on port 185.
5.4.2 White Pages
PSI maintains a directory of information on individuals. It will list
the person's name, organization, and email address if it is given. Telnet
to wp.psi.net and log in as `fred'. The White Pages Project also includes an
interface to use Xwindows remotely.
5.5 Databases
For information on database services, see Section 7.2 [Commercial
Databases], page 60. Not all databases on the Internet require payment for
use, though. There do exist some, largely research-driven databases, which
are publicly accessible. New ones spring up regularly.
To find out more about the databases in this section, contact the people
directly responsible for them. Their areas of concentration and the software
used to implement them are widely disparate, and are probably beyond the
author's expertise. Also, don't forget to check with your local library - the
reference librarian there can provide information on conventional resources,
and possibly even those available over the Internet (they are becoming more
common).
5.5.1 Colorado Alliance of Research Libraries (CARL)
The Colorado Alliance of Research Libraries (CARL), in association with
CARL Systems Inc., operates a public access catalog of services. Offered are
a number of library databases, including searches for government periodicals,
book reviews, indices for current articles, and access to to other library
Chapter 5: Telnet 49
databases around the country. Other services are available to CARL members
including an online encyclopedia. Telnet to pac.carl.org, or write to
`help@carl.org' for more details.
5.5.2 PENpages
PENpages is an agriculturally-oriented database administered by
Pennsylvania State University. Information entered into PENpages is provided
by numerous sources including the Pennsylvania Dept. of Agriculture, Rutgers
University, and Penn State. Easy-to-use menus guide users to information
ranging from cattle and agricultural prices to current weather information,
from health information to agricultural news from around the nation. A
keyword search option also allows users to search the database for related
information and articles. The database is updated daily, and a listing of
most recent additions is displayed after login. Telnet to psupen.psu.edu
and log in as the user `PNOTPA'.
5.5.3 Clemson Univ. Forestry & Agricultural Network
Clemson maintains a database similar to PENpages in content, but the
information provided tends to be localized to the Southeastern United
States. A menu-driven database offers queries involving the weather, food,
family, and human resources. Telnet to eureka.clemson.edu and log in as
`PUBLIC'. You need to be on a good VT100 emulator (or a real VT terminal).
5.5.4 University of Maryland Info Database
The Computer Science department of the University of Maryland maintains
a repository of information on a wide variety of topics. They wish to give
a working example of how network technology can (and should) provide as much
information as possible to those who use it. Telnet to info.umd.edu and log
in as `info'. The information contained in the database is accessible
through a screen-oriented interface, and everything therein is available via
anonymous FTP.
There is a mailing list used to discuss the UMD Info Database, welcoming
suggestions for new information, comments on the interface the system
provides, and other related topics. Send mail to listserv@umdd.umd.edu with
a body of
subscribe INFO-L Your Full Name
See Section 2.2.1 [Listservs], page 16 for more information on using the
Listserv system.
50 Zen and the Art of the Internet
5.5.5 University of Michigan Weather Underground
The University of Michigan's Department of Atmospheric, Oceanic, & Space
Sciences maintains a database of weather and related information for the
United States and Canada. Available are current weather conditions and
forecasts for cities in the U.S., a national weather summary, ski conditions,
earthquake and hurricane updates, and a listing of severe weather conditions.
Telnet to madlab.sprl.umich.edu on port 3000 to use the system.
5.5.6 Geographic Name Server
A geographic database listing information for cities in the United
States and some international locations is maintained by Merit, Inc. The
database is searchable by city name, zip code, etc. It will respond with a
lot of information: the area code, elevation, time zone, and longitude and
latitude are included. For example, a query of `19013' yields
0 Chester
1 42045 Delaware
2 PA Pennsylvania
3 US United States
F 45 Populated place
L 39 50 58 N 75 21 22 W
P 45794
E 22
Z 19013
Z 19014
Z 19015
Z 19016
.
To use the server, telnet to martini.eecs.umich.edu on port 3000. The
command `help' will yield further instructions, along with an explanation
for each of the fields in a reponse.
5.5.7 FEDIX - Minority Scholarship Information
FEDIX is an on-line information service that links the higher education
community and the federal government to facilitate research, education, and
services. The system provides accurate and timely federal agency
information to colleges, universities, and other research organizations.
There are no registration fees and no access charges for FEDIX whatsoever.
Chapter 5: Telnet 51
FEDIX offers the Minority On-Line Information Service (MOLIS), a
database listing current information about Black and Hispanic colleges and
universities.
Daily information updates are made on federal education and research
programs, scholarships, fellowships, and grants, available used research
equipment, and general information about FEDIX itself. To access the
database, telnet to fedix.fie.com and log in as `fedix'.
5.5.8 Science & Technology Information System
The STIS is maintained by the National Science Foundation (NSF), and
provides access to many NSF publications. The full text of publications can
be searched online and copied from the system, which can accommodate up to
ten users at one time. Telnet to stis.nsf.gov and log in as `public'.
Everything on the system is also available via anonymous FTP. For further
information, contact:
STIS, Office of Information Systems, Room 401
National Science Foundation
1800 G. Street, N.W.
Washington, D.C. 20550
stis-request@nsf.gov
(202) 357-7492
(202) 357-7663 (Fax)
5.5.9 Ocean Network Information Center
The University of Delaware College of Marine Studies offers access to an
interactive database of research information covering all aspects of marine
studies, nicknamed OCEANIC. This includes the World Oceanic Circulation
Experiment (WOCE) information and program information, research ship
schedules and information, and a Who's Who of email and mailing addresses
for oceanic studies. Data from a variety of academic institutions based on
research studies is also available. Telnet to delocn.udel.edu and log in as
`INFO'.
5.5.10 NASA/IPAC Extragalactic Database (NED)
The NASA/IPAC Extragalactic Database (NED) is an ongoing project, funded
by NASA, to make data and literature on extragalactic objects available over
52 Zen and the Art of the Internet
computer networks. NED is an object-oriented database which contains
extensive information for nearly 132,000 extragalactic objects taken from
about major catalogs of galaxies, quasars, infrared and radio sources. NED
provides positions, names, and other basic data (e.g. magnitude types,
sizes and redshifts as well as bibliographic references and abstracts).
Searches can be done by name, around a name, and on an astronomical
position. NED contains a tutorial which guides the user through the
retrieval process. Telnet to ipac.caltech.edu and log in as `ned'.
5.5.11 U.S. Naval Observatory Automated Data Service
Operated by the U.S. Naval Observatory in Washington, D.C., this
automated data service provides database access to information ranging from
current navigational satellite positioning, astronomical data, and software
utilities. A wide variety of databases can be searched and instructions for
file transfer are given. Telnet to tycho.usno.navy.mil and log in as `ads'.
"My consciousness suddenly switched locations, for the first time in
my life, from the vicinity of my head and body to a point about
twenty feet away from where I normally see the world."
Howard Rheingold, Virtual Reality
Chapter 6: Various Tools 53
6 Various Tools
New and interesting ways to use the Internet are being dreamed up every
day. As they gain wide-spread use, some methods become near-standard (or
actual written standard) tools for Internet users to take advantage of. A
few are detailed here; there are undoubtedly others, and new ideas spring up
all the time. An active user of the Internet will discover most of the more
common ones in time. Usually, these services are free. See Chapter 7
[Commercial Services], page 59 for applications that are commercially
available over the Internet.
Usenet is often used to announce a new service or capability on the
Internet. In particular, the groups comp.archives and comp.protocols.tcp-ip
are good places to look. Information will drift into other areas as word
spreads. See Chapter 4 [Usenet News], page 29 for information on reading
news.
6.1 Finger
On many systems there exists the `finger' command, which yield
information about each user that's currently logged in. This command also
has extensions for use over the Internet, as well. Under normal
circumstances, the command is simply `finger' for a summary of who's logged
into the local system, or `finger username' for specific information about a
user. It's also possible to go one step further and go onto the network.
The general usage is
finger @hostname
To see who's currently logged in at Widener University, for instance, use
% finger @cs.widener.edu
[cs.widener.edu]
Login Name TTY Idle When Where
brendan Brendan Kehoe p0 Fri 02:14 tattoo.cs.widene
sven Sven Heinicke p1 Fri 04:16 xyplex3.cs.widen
To find out about a certain user, they can be fingered specifically (and need
not be logged in):
54 Zen and the Art of the Internet
% finger bart@cs.widener.edu
[cs.widener.edu]
Login name: bart In real life: Bart Simpson
Directory: /home/springfield/bart Shell: /bin/underachiever
Affiliation: Brother of Lisa Home System: channel29.fox.org
Last login Thu May 23 12:14 (EDT) on ttyp6 from channel29.fox.org.
No unread mail
Project: To become a "fluff" cartoon character.
Plan:
Don't have a cow, man.
Please realize that some sites are very security conscious, and need to
restrict the information about their systems and users available to the
outside world. To that end, they often block finger requests from outside
sites - so don't be surprised if fingering a computer or a user returns with
`Connection refused'.
6.2 Ping
The `ping' command allows the user to check if another system is
currently "up" and running. The general form of the command is `ping sys-
tem'.1 For example,
ping cs.widener.edu
will tell you if the main machine in Widener University's Computer Science
lab is currently online (we certainly hope so!).
Many implementations of `ping' also include an option to let you see how
fast a link is running (to give you some idea of the load on the network).
For example:
% ping -s cs.swarthmore.edu
PING cs.swarthmore.edu: 56 data bytes
64 bytes from 130.58.68.1: icmp_seq=0 ttl=251 time=66 ms
64 bytes from 130.58.68.1: icmp_seq=1 ttl=251 time=45 ms
64 bytes from 130.58.68.1: icmp_seq=2 ttl=251 time=46 ms
^C
--- cs.swarthmore.edu ping statistics ---
3 packets transmitted, 3 packets received, 0% packet loss
round-trip min/avg/max = 45/52/66 ms
This case tells us that for `cs.swarthmore.edu' it takes about 46 millisec-
onds for a packet to go from Widener to Swarthmore College and back again.
_________________________________
1 The usage will, again, vary.
Chapter 6: Various Tools 55
It also gives the average and worst-case speeds, and any packet loss that
may have occurred (e.g. because of network congestion).
While `ping' generally doesn't hurt network performance, you shouldn't
use it too often - usually once or twice will leave you relatively sure of
the other system's state.
6.3 Talk
Sometimes email is clumsy and difficult to manage when one really needs
to have an interactive conversation. The Internet provides for that as well,
in the form of talk. Two users can literally see each other type across
thousands of miles.
To talk with Bart Simpson at Widener, one would type
talk bart@cs.widener.edu
which would cause a message similar to the following to be displayed on
Bart's terminal:
Message from Talk_Daemon@cs.widener.edu at 21:45 ...
talk: connection requested by joe@ee.someplace.edu
talk: respond with: talk joe@ee.someplace.edu
Bart would, presumably, respond by typing `talk joe@ee.someplace.edu'. They
could then chat about whatever they wished, with instantaneous response
time, rather than the write-and-wait style of email. To leave talk, on many
systems one would type Ctrl-C (hold down the Control key and press `C').
Check local documentation to be sure.
There are two different versions of talk in common use today. The first,
dubbed "old talk," is supported by a set of Unix systems (most notably,
those currently sold by Sun). The second, ntalk (aka "new talk"), is more of
the standard. If, when attempting to talk with another user, it responds
with an error about protocol families, odds are the incompatibilities
between versions of talk is the culprit. It's up to the system administrators
of sites which use the old talk to install ntalk for their users.
6.4 The WHOIS Database
The main WHOIS database is run at the Network Information Center
(NIC). The `whois' command will let you search a database of every regis-
tered domain (e.g. `mit.edu') and of registered users. It's primarily used by
system postmasters or listowners to find the Points of Contact for a site, to
56 Zen and the Art of the Internet
let them know of a problem or contact them for one reason or another. You
can also find out their postal address. For example:
% whois mit.edu
Massachusetts Institute of Technology (MIT) MIT.EDU 18.72.2.1
Massachusetts Institute of Technology (MIT-DOM) MIT.EDU
Note that there are two entries for `mit.edu'; we'll go for the second.
% whois mit-dom
Massachusetts Institute of Technology (MIT-DOM) ) Mailing address
Cambridge, MA 02139
Domain Name: MIT.EDU ) Domain name
Administrative Contact, Technical Contact, Zone Contact:
Schiller, Jeffrey I. (JIS) JIS@MIT.EDU
(617) 253-8400
Record last updated on 22-Jun-88. ) Last change made to the record
Domain servers in listed order: ) Systems that can tell you the Internet
addresses for a site
STRAWB.MIT.EDU 18.71.0.151
W20NS.MIT.EDU 18.70.0.160
BITSY.MIT.EDU 18.72.0.3
LITHIUM.LCS.MIT.EDU 18.26.0.121
To see this host record with registered users, repeat the command with
a star ('*') before the name; or, use '%' to show JUST the registered
users.
Much better! Now this information (sought, possibly, by a system
administrator) can be used to find out how to notify MIT of a security issue
or problem with connectivity.
Queries can be made for individuals as well; the following would yield an
entry for the author:
Chapter 6: Various Tools 57
% whois brendan
Kehoe, Brendan (BK59) brendan@cs.widener.edu
Widener University
Department of Computer Science
Kirkbride 219
P.O. Box 83 Widener University
Chester, PA 19013
(215)/499-4011
Record last updated on 02-May-91.
Included is the author's name, his handle (a unique sequence of letters and
numbers), information on how to contact him, and the last time the record
was modified in any way.
Anyone can register with the whois database. People who are adminis-
trative or technical contacts for domains are registered automatically when
their domain applications are processed. For normal users, one must sim-
ply fill out a form from the NIC. FTP to nic.ddn.mil and get the file
`netinfo/user-template.txt'. The completed form should be mailed to
`registrar@nic.ddn.mil'.
6.4.1 Other Uses of WHOIS
Also, many educational sites run WHOIS servers of their own, to offer
information about people who may be currently on the staff or attending the
institution. To specify a WHOIS server, many implementations include some
sort of option or qualifier - in VMS under MultiNet, it's `/HOST', in Unix
`-h'. To receive information about using the Stanford server, one might use
the command
whois -h stanford.edu help
A large list of systems offering WHOIS services is being maintained by
Matt Power of MIT (mhpower@stan.mit.edu). It is available via anonymous
FTP from sipb.mit.edu, in the directory `pub/whois'. The file is named
`whois-servers.list'.
The systems available include, but are certainly not limited to, Syra-
cuse University (syr.edu), New York University (acfcluster.nyu.edu),
the University of California at San Diego (ucsd.edu), and Stanford Univer-
sity (stanford.edu).
"Fingers were made before forks."
Jonathan Swift, Polite Conversation
58 Zen and the Art of the Internet
Chapter 7: Commercial Services 59
7 Commercial Services
Many services can be accessed through the Internet. As time progresses
and more outlets for commercial activity appear, once-restricted traffic (by
the NSFnet Acceptable Use Policy) may now flow freely. Now that there are
other networks for that information to travel on, businesses are making
their move.
7.1 Electronic Journals
The Association of Research Libraries (ARL) publishes a hard-copy di-
rectory of electronic journals, newsletters, and scholarly discussion lists.
It is a compilation of entries for hundreds of scholarly lists, dozens of
journals and newsletters, and a many "other" titles, including
newsletter-digests, into one reference source. Each entry includes
instructions on how to access the referenced publication or list.
The documents are available electronically by sending the commands
get ejournl1 directry
get ejournl2 directry
to the server at `LISTSERV@OTTAWA.BITNET'. See Section 2.2.1 [Listservs],
page 16 for further instructions on using a listserv.
The directory, along with a compilation by Diane Kovacs called Directo-
ries of Academic E-Mail Conferences, is available in print and on diskette
(DOS WordPerfect and MacWord) from:
Office of Scientific & Academic Publishing
Association of Research Libraries
1527 New Hampshire Avenue, NW
Washington, DC 20036
ARLHQ@UMDC.BITNET
(202) 232-2466
(202) 462-7849 (Fax)
The ARL is a not-for-profit organization representing over one hundred
research libraries in the United States and Canada. The publication is
available to ARL members for $10 and to non-members for $20 (add $5 postage
per directory for foreign addresses). Orders of six or more copies will
receive a 10% discount; all orders must be prepaid and sent to the ARL.
60 Zen and the Art of the Internet
7.2 Commercial Databases
The American Institute of Physics maintains the Physics Information
Network. It contains the bibliographic SPIN and General Physics Advanced
Abstracts databases. Also available is access to bulletin boards and several
searchable lists (job notices, announcements, etc). Telnet to pinet.aip.org;
new users must log in as `NEW' and give registration information.
7.3 Clarinet News
Clarinet's an electronic publishing network service that provides
professional news and information, including live UPI wireservice news, in
the Usenet file format. See Chapter 4 [Usenet News], page 29 for more
information about Usenet.
Clarinet lets you read an "electronic newspaper" right on the local system; you can get timely industry news, technology related wirestories,
syndicated columns and features, financial information, stock quotes and more.
Clarinet's provided by using the Usenet message interchange format, and
is available via UUCP and other delivery protocols, including NNTP.
The main feature is ClariNews, an "electronic newspaper," gathered live
from the wire services of United Press International (UPI). ClariNews arti-
cles are distributed in 100 newsgroups based on their subject matter, and
are keyworded for additional topics and the geographical location of the
story. ClariNews includes headlines, industry news, box scores, network TV
schedules, and more. The main products of ClariNews are:
o ClariNews General, the general news"paper" with news, sports, and
features, averaging about 400 stories per day.
o TechWire, special groups for stories on science, technology, and industry
stories around them.
o ClariNews-Biz, business and financial stories.
o Newsbytes, a daily computer industry newsmagazine.
o Syndicated Columns, including Dave Barry (humor) and Mike Royko
(opinion).
Full information on ClariNet, including subscription information, is available
from
Clarinet Communications Corp.
124 King St. North
Waterloo, Ontario N2J 2X8
info@clarinet.com
Chapter 7: Commercial Services 61
(800) USE-NETS
or with anonymous FTP in the directory `/Clarinet' on ftp.uu.net (see
Section 3.2.2 [Anonymous FTP], page 21).
"Needless to say, Aristotle did not envisage modern finance."
Frederick Copleston, S.J.
A History of Philosophy, v.1
62 Zen and the Art of the Internet
Chapter 8: Things You'll Hear About 63
8 Things You'll Hear About
There are certain things that you'll hear about shortly after you start
actively using the Internet. Most people assume that everyone's familiar
with them, and they require no additional explanation. If only that were
true!
This section addresses a few topics that are commonly encountered and
asked about as a new user explores Cyberspace. Some of them are directly
related to how the networks are run today; other points are simply
interesting to read about.
8.1 The Internet Worm
On November 2, 1988, Robert Morris, Jr., a graduate student in Com-
puter Science at Cornell, wrote an experimental, self-replicating, self-
propagating program called a worm and injected it into the Internet. He
chose to release it from MIT, to disguise the fact that the worm came from
Cornell. Morris soon discovered that the program was replicating and rein-
fecting machines at a much faster rate than he had anticipated - there was a
bug. Ultimately, many machines at locations around the country either
crashed or became "catatonic." When Morris realized what was happening, he
contacted a friend at Harvard to discuss a solution. Eventually, they sent
an anonymous message from Harvard over the network, instructing program-
mers how to kill the worm and prevent reinfection. However, because the
network route was clogged, this message did not get through until it was too
late. Computers were affected at many sites, including universities,
military sites, and medical research facilities. The estimated cost of
dealing with the worm at each installation ranged from $200 to more than
$53,000.1
The program took advantage of a hole in the debug mode of the Unix
sendmail program, which runs on a system and waits for other systems to
connect to it and give it email, and a hole in the finger daemon fingerd,
which serves finger requests (see Section 6.1 [Finger], page 53). People at
the University of California at Berkeley and MIT had copies of the program
and were actively disassembling it (returning the program back into its
source form) to try to figure out how it worked.
Teams of programmers worked non-stop to come up with at least a tem-
porary fix, to prevent the continued spread of the worm. After about twelve
_________________________________
1 Derived in part from a letter by Severo M. Ornstein, in the Communica-
tions of the ACM, Vol 32 No 6, June 1989.
64 Zen and the Art of the Internet
hours, the team at Berkeley came up with steps that would help retard the
spread of the virus. Another method was also discovered at Purdue and widely
published. The information didn't get out as quickly as it could have,
however, since so many sites had completely disconnected themselves from the
network.
After a few days, things slowly began to return to normalcy and everyone
wanted to know who had done it all. Morris was later named in The New York
Times as the author (though this hadn't yet been officially proven, there
was a substantial body of evidence pointing to Morris).
Robert T. Morris was convicted of violating the computer Fraud and Abuse
Act (Title 18), and sentenced to three years of probation, 400 hours of
community service, a fine of $10,050, and the costs of his supervision. His
appeal, filed in December, 1990, was rejected the following March.
8.2 The Cuckoo's Egg
First in an article entitled "Stalking the Wily Hacker," and later in
the book The Cuckoo's Egg, Clifford Stoll detailed his experiences trying to
track down someone breaking into a system at Lawrence Berkeley Laboratory in
California.2
A 75-cent discrepancy in the Lab's accounting records led Stoll on a
chase through California, Virginia, and Europe to end up in a small
apartment in Hannover, West Germany. Stoll dealt with many levels of
bureaucracy and red tape, and worked with the FBI, the CIA, and the German
Bundespost trying to track his hacker down.
The experiences of Stoll, and particularly his message in speaking
engagements, have all pointed out the dire need for communication between
parties on a network of networks. The only way everyone can peacefully co-
exist in Cyberspace is by ensuring rapid recognition of any existing problems.
8.3 Organizations
The indomitable need for humans to congregate and share their common
interests is also present in the computing world. User groups exist around
the world, where people share ideas and experiences. Similarly, there are
organizations which are one step "above" user groups; that is to say, they
_________________________________
2 See the bibliography for full citations.
Chapter 8: Things You'll Hear About 65
exist to encourage or promote an idea or set of ideas, rather than support a
specific computer or application of computers.
8.3.1 The Association for Computing Machinery
The Association for Computing Machinery (the ACM) was founded in
1947, immediately after Eckert and Mauchly unveiled one of the first elec-
tronic computers, the ENIAC, in 1946. Since then, the ACM has grown by
leaps and bounds, becoming one of the leading educational and scientific
societies in the computer industry.
The ACM's stated purposes are:
o To advance the sciences and arts of information processing;
o To promote the free interchange of information about the sciences and
arts of information processing both among specialists and among the
public;
o To develop and maintain the integrity and competence of individuals
engaged in the practices of the sciences and arts of information process-
ing.
Membership in the ACM has grown from seventy-eight in September,
1947, to over 77,000 today. There are local chapters around the world, and
many colleges and universities endorse student chapters. Lecturers frequent
these meetings, which tend to be one step above the normal "user group"
gathering. A large variety of published material is also available at dis-
counted prices for members of the association.
The ACM has a number of Special Interest Groups (SIGs) that concen-
trate on a certain area of computing, ranging from graphics to the Ada
programming language to security. Each of the SIGs also publishes its own
newsletter. There is a Usenet group, comp.org.acm, for the discussion of
ACM topics. See Chapter 4 [Usenet News], page 29 for more information on
reading news.
For more information and a membership application, write to:
Assocation for Computing Machinery
1515 Broadway
New York City, NY 10036
ACMHELP@ACMVM.BITNET
(212) 869-7440
8.3.2 Computer Professionals for Social Responsibility
The CPSR is an alliance of computer professionals concentrating on cer-
66 Zen and the Art of the Internet
tain areas of the impact of computer technology on society. It traces its
history to the fall of 1981, when several researchers in Palo Alto,
California, organized a lunch meeting to discuss their shared concerns about
the con- nection between computing and the nuclear arms race. Out of that
meeting and the discussions which followed, CPSR was born, and has been
active ever since.3
The national CPSR program focuses on the following project areas:
o Reliability and Risk This area reflects on the concern that overreliance
on computing technology can lead to unacceptable risks to society. It
includes, but isn't limited to, work in analyzing military systems such
as SDI.
o Civil Liberties and Privacy This project is concerned with such top-
ics as the FBI National Crime Information Center, the growing use of
databases by both government and private industry, the right of access
to public information, extension of First Amendment rights to elec-
tronic communication, and establishing legal protections for privacy of
computerized information.
o Computers in the Workplace The CPSR Workplace Project has con-
centrated its attention on the design of software for the workplace, and
particularly on the philosophy of "participatory design," in which soft-
ware designers work together with users to ensure that systems meet
the actual needs of that workplace.
o The 21st Century Project This is a coalition with other professional
organizations working towards redirecting national research priorities
from concentrating on military issues to anticipating and dealing with
future problems as science and technology enter the next century.
For more information on the CPSR, contact them at:
Computer Professionals for Social Responsibility
P.O. Box 717
Palo Alto, CA 94302
cpsr@csli.stanford.edu
(415) 322-3778
(415) 322-3798 (Fax)
8.3.3 The Electronic Frontier Foundation
The Electronic Frontier Foundation (EFF) was established to help civilize
_________________________________
3 This section is part of the CPSR's letter to prospective members.
Chapter 8: Things You'll Hear About 67
the "electronic frontier" - the Cyberspacial medium becoming ever-present in
today's society; to make it truly useful and beneficial not just to a
technical elite, but to everyone; and to do this in a way which is in
keeping with the society's highest traditions of the free and open flow of
information and communication.4
The mission of the EFF is
o to engage in and support educational activities which increase popular
understanding of the opportunities and challenges posed by develop-
ments in computing and telecommunications;
o to develop among policy-makers a better understanding of the issues
underlying free and open telecommunications, and support the creation
of legal and structural approaches which will ease the assimilation of
these new technologies by society;
o to raise public awareness about civil liberties issues arising from the
rapid advancement in the area of new computer-based communications
media and, where necessary, support litigation in the public interest to
preserve, protect, and extend First Amendment rights within the realm
of computing and telecommunications technology;
o to encourage and support the development of new tools which will en-
dow non-technical users with full and easy access to computer-based
telecommunications;
The Usenet newsgroups comp.org.eff.talk and comp.org.eff.news are
dedicated to discussion concerning the EFF. They also have mailing list
counterparts for those that don't have access to Usenet, eff-talk-
request@eff.org and eff-news-request@eff.org. The first is an informal arena
(aka a normal newsgroup) where anyone may voice his or her opinions. The
second, comp.org.eff.news, is a moderated area for regular postings from the
EFF in the form of EFFector Online. To submit a posting for the EFFector
Online, or to get general information about the EFF, write to eff@eff.org.
There is also a wealth of information available via anonymous FTP on
ftp.eff.org.
The EFF can be contacted at
_________________________________
4 This section was derived from `eff.about', available along with other
material via anonymous FTP from ftp.eff.org
68 Zen and the Art of the Internet
The Electronic Frontier Foundation, Inc.
155 Second St. #1
Cambridge, MA 02141
eff@eff.org
(617) 864-0665
(617) 864-0866 (Fax)
8.3.4 The Free Software Foundation
The Free Software Foundation was started by Richard Stallman (creator of
the popular GNU Emacs editor). It is dedicated to eliminating restrictions
on copying, redistributing, and modifying software.
The word "free" in their name does not refer to price; it refers to
freedom. First, the freedom to copy a program and redistribute it to your
neighbors, so that they can use it as well as you. Second, the freedom to
change a program, so that you can control it instead of it controlling you;
for this, the source code must be made available to you.
The Foundation works to provide these freedoms by developing free
compatible replacements for proprietary software. Specifically, they are
putting together a complete, integrated software system called "GNU" that is
upward-compatible with Unix.5 When it is released, everyone will be
permitted to copy it and distribute it to others. In addition, it will be
distributed with source code, so you will be able to learn about operating
systems by reading it, to port it to your own machine, and to exchange the
changes with others.
For more information on the Free Software Foundation and the status of
the GNU Project, or for a list of the current tasks that still need to be
done, write to gnu@prep.ai.mit.edu.
8.3.5 The League for Programming Freedom
The League for Programming Freedom is a grass-roots organization of
professors, students, businessmen, programmers and users dedicated to
"bringing back" the freedom to write programs, which they contend has
been lost over the past number years. The League is not opposed to the le-
gal system that Congress intended-copyright on individual programs. Their
_________________________________
5 As an aside, the editor of the GNU project, emacs, contains a built-in
LISP interpreter and a large part of its functionality is written in LISP.
The name GNU is itself recursive (the mainstay of the LISP language);
it stands for "Gnu's Not Unix."
Chapter 8: Things You'll Hear About 69
aim is to reverse the recent changes made by judges in response to special
interests, often explicitly rejecting the public interest principles of the
Constitution.
The League works to abolish the new monopolies by publishing articles,
talking with public officials, boycotting egregious offenders, and in the
future may intervene in court cases. On May 24, 1989, the League picketed
Lotus headquarters because of their lawsuits, and then again on August 2,
1990. These marches stimulated widespread media coverage for the issue.
They welcome suggestions for other activities, as well as help in carrying
them out.
For information on the League and how to join, write to
League for Programming Freedom
1 Kendall Square #143
P.O. Box 9171
Cambridge, MA 02139
league@prep.ai.mit.edu
8.4 Networking Initiatives
Research and development are two buzz words often heard when discussing
the networking field - everything needs to go faster, over longer distances,
for a lower cost. To "keep current," one should read the various trade
magazines and newspapers, or frequent the networking-oriented newsgroups of
Usenet. If possible, attend trade shows and symposia like Usenix, Interop,
et. al.
8.4.1 NREN
The National Research and Education Network (NREN) is a five-year
project approved by Congress in the Fall of 1991. It's intended to create
a national electronic "super-highway." The NREN will be 50 times faster
than the fastest available networks (at the time of this writing). Propo-
nents of the NREN claim it will be possible to transfer the equivalent of
the entire text of the Encyclopedia Britannica in one second. Further infor-
mation, including the original text of the bill presented by Senator Al Gore
(D-TN), is available through anonymous FTP to nis.nsf.net, in the di-
rectory `nsfnet'. In addition, Vint Cerf wrote on the then-proposed NREN
in RFC-1167, Thoughts on the National Research and Education Network.
See [RFCs], page 73 for information on obtaining RFCs.
70 Zen and the Art of the Internet
A mailing list, `nren-discuss@uu.psi.com', is available for discussion of
the NREN; write to `nren-discuss-request@uu.psi.com' to be added.
"To talk in publick, to think in solitude,
to read and to hear, to inquire,
and to answer inquiries, is the business of a scholar."
Samuel Johnson
Chapter VIII
The History of Rasselas, Prince of Abissinia
Chapter 9: Finding Out More 71
9 Finding Out More
9.1 Internet Resource Guide
The NSF Network Service Center (NNSC) compiles and makes available
an Internet Resource Guide (IRG). The goal of the guide is to increase the
visibility of various Internet resources that may help users do their work
better. While not yet an exhaustive list, the guide is a useful compendium
of many resources and can be a helpful reference for a new user.
Resources listed are grouped by types into sections. Current sections
include descriptions of online library catalogs, data archives, online white
pages directory services, networks, network information centers, and com-
putational resources, such as supercomputers. Each entry describes the re-
source, identifies who can use the resource, explains how to reach the local
network via the Internet, and lists contacts for more information. The list
is distributed electronically by the NNSC. To receive a guide, or to get on
a mailing list that alerts you to when it is updated, send a message to
resource-guide-request@nnsc.nsf.net.
The current edition of the IRG is available via anonymous FTP from
nnsc.nsf.net, in the directory `/resource-guide'.
9.2 Requests for Comments
The internal workings of the Internet are defined by a set of documents
called RFCs (Request for Comments). The general process for creating an RFC
is for someone wanting something formalized to write a document describing
the issue and mailing it to Jon Postel (postel@isi.edu). He acts as a
referee for the proposal. It is then commented upon by all those wishing to
take part in the discussion (electronically, of course). It may go through
multiple revisions. Should it be generally accepted as a good idea, it will
be assigned a number and filed with the RFCs.
The RFCs can be divided into five groups: required, suggested, direc-
tional, informational and obsolete. Required RFCs (e.g., RFC-791, The
Internet Protocol) must be implemented on any host connected to the In-
ternet.
Suggested RFCs are generally implemented by network hosts. Lack of
them does not preclude access to the Internet, but may impact its usability.
RFC-793, Transmission Control Protocol, is a must for those implementing
TCP.
72 Zen and the Art of the Internet
Directional RFCs were discussed and agreed to, but their application has
never come into wide use. This may be due to the lack of wide need for
the specific application (RFC-937, The Post Office Protocol) or that, al-
though technically superior, ran against other pervasive approaches (RFC-
891, Hello). It is suggested that, should the facility be required by a par-
ticular site, an implementation be done in accordance with the RFC. This
ensures that, should the idea be one whose time has come, the implementa-
tion will be in accordance with some standard and will be generally usable.
Informational RFCs contain factual information about the Internet and
its operation (RFC-990, Assigned Numbers).
There is also a subset of RFCs called FYIs (For Your Information). They
are written in a language much more informal than that used in the other,
standard RFCs. Topics range from answers to common questions for new and
experienced users to a suggested bibliography.
Finally, as the Internet has grown and technology has changed, some
RFCs become unnecessary. These obsolete RFCs cannot be ignored, how-
ever. Frequently when a change is made to some RFC that causes a new
one to obsolete others, the new RFC only contains explanations and motiva-
tions for the change. Understanding the model on which the whole facility
is based may involve reading the original and subsequent RFCs on the topic.
RFCs and FYIs are available via FTP from many sources, including:
o The nic.ddn.mil archive, as `/rfc/rfc-xxxx.txt', where xxxx is the
number of the RFC.
o from ftp.uu.net, in the directory `/RFC'.
They're also available through mail by writing to service@nic.ddn.mil,
with a `Subject:' line of send RFC-xxxx.TXT, again with xxxx being the
RFC number. To learn about archive servers, [Archive Servers], page 77.)
"Knowledge is of two kinds. We know a subject ourselves, or we
know where we can find information upon it."
Samuel Johnson
Letter to Lord Chesterfield
February, 1755
Conclusion 73
Conclusion
This guide is far from complete - the Internet changes on a daily (if
not hourly) basis. However, this booklet should provide enough information
to make the incredible breadth and complexity of the Internet a mite less
imposing. Coupled with some exploration and experimentation, every user has
the potential to be a competent net citizen, using the facilities that are
available to their fullest.
You, the reader, are strongly encouraged to suggest improvements to any
part of this booklet. If something was unclear, left you with doubts, or
wasn't addressed, it should be fixed. If you find any problems,
inaccuracies, spelling errors, etc., please report them to:
Brendan Kehoe
Department of Computer Science
Widener University
Chester, PA 19013
Internet: guide-bugs@cs.widener.edu
UUCP: ...!widener!guide-bugs
If you are interested in future updates to this guide (aside from normal new
editions), discussion about information to be included or removed, etc.,
write to `guide-request@cs.widener.edu' to be placed on a mailing list for
such things.
"I've seed de first an de last... I seed de beginnin,
en now I sees de endin."
William Faulkner
The Sound & The Fury
April 8, 1928
74 Zen and the Art of the Internet
Appendix A: Getting to Other Networks 75
Appendix A Getting to Other Networks
Inter-connectivity has been and always will be one of the biggest goals
in computer networking. The ultimate desire is to make it so one person
can contact anyone else no matter where they are. A number of "gateways"
between networks have been set up. They include:
AppleLink Quantum Services sells access to AppleLink, which is similar to
QuantumLink for Commodore computers and PCLink for IBM
PCs and compatibles. It also provides email access through the
address `user@applelink.apple.com'.
ATTMail AT&T sells a commercial email service called ATTMail. Its
users can be reached by writing to `user@attmail.com'.
BIX Users on BIX (the Byte Information eXchange) can be reached
through the DAS gateway at `user@dcibix.das.net'.
CompuServe (CI$) To reach a user on the commercial service CompuServe, you
must address the mail as xxxxx.xxx@compuserve.com, with
xxxxx.xxx being their CompuServe user ID. Normally Com-
puServe ids are represented as being separated by a comma (like
71999,141); since most mailers don't react well to having com-
mas in addresses, it was changed to a period. For the above
address, mail would be sent to `71999.141@compuserve.com'.
EasyNet Digital sells a service called EasyNet; users that subscribe to
it can be reached with the addresses user@host.enet.dec.com or
`user%host.enet@decwrl.dec.com'.
FidoNet The FidoNet computer network can be reached by using a
special addressing method. If John Smith is on the node
`1:2/3.4' on FidoNet, his or her email address would be
`john.smith@p4.f3.n2.z1.fidonet.org' (notice how the num-
bers fall in place?).
MCI Mail MCI also sells email accounts (similar to ATTMail). Users can
be reached with `user@mcimail.com'.
PeaceNet Users on the PeaceNet network can be reached by writing to
`user@igc.org'.
This table is far from complete. In addition to sites not being listed,
some services are not (nor do they plan to be) accessible from the "outside"
(like Prodigy); others, like GEnie, are actively investigating the possibility
of creating a gateway into their system. For the latest information, consult
a list called the Inter-Network Mail Guide. It's available from a number of
FTP sites, including UUNET; see Section 3.2.2 [Anonymous FTP], page 21,
for more information on getting a copy of it using anonymous FTP.
76 Zen and the Art of the Internet
Appendix B: Retrieving Files via Email 77
Appendix B Retrieving Files via Email
For those who have a connection to the Internet, but cannot FTP, there
do exist a few alternatives to get those files you so desperately need. When
requesting files, it's imperative that you keep in mind the size of your
request - odds are the other people who may be using your link won't be too
receptive to sudden bursts of really heavy traffic on their normally sedate
connection.
Archive Servers
An alternative to the currently well over-used FTPmail system is taking
advantage of the many archive servers that are presently being maintained.
These are programs that receive email messages that contain commands, and
act on them. For example, sending an archive server the command `help' will
usually yield, in the form of a piece of email, information on how to use
the various commands that the server has available.
One such archive server is `service@nic.ddn.mil'. Maintained by the
Network Information Center (NIC) in Chantilly, VA, the server is set up to
make all of the information at the NIC available for people who don't have
access to FTP. This also includes the WHOIS service (see Section 6.4.1
[Whois], page 57). Some sample `Subject:' lines for queries to the NIC
server are:
Subject: help Describes available commands.
Subject: rfc 822 Sends a copy of RFC-822.
Subject: rfc index Sends an index of the available RFCs.
Subject: netinfo domain-template.txt Sends a domain application.
Subject: whois widener Sends WHOIS information on `widener'.
More information on using their archive server can be obtained by
writing to their server address service@nic.ddn.mil with a `Subject:' of help.
There are different "brands" of archive server, each with its own set of
commands and services. Among them there often exists a common set of
commands and services (e.g. `index', `help', etc). Be that as it may, one
should always consult the individual help for a specific server before
assuming the syntax - 100K surprises can be hard on a system.
FTP-by-Mail Servers
Some systems offer people the ability to receive files through a mock-
FTP interface via email. See Section 3.2.2 [Anonymous FTP], page 21 for
78 Zen and the Art of the Internet
a general overview of how to FTP. The effects of providing such a service
varies, although a rule of thumb is that it will probably use a substantial
amount of the available resources on a system.
The "original" FTP-by-Mail service, BITFTP, is available to BITNET users
from the Princeton node PUCC. It was once accessible to anyone, but had to
be closed out to non-BITNET users because of the heavy load on the system.
In response to this closure, Paul Vixie designed and installed a system
called FTPmail on one of Digital's gateway computers, decwrl.dec.com. Write
to `ftpmail@decwrl.dec.com' with `help' in the body of the letter for
instructions on its use. The software is undergoing constant development;
once it reaches a stable state, other sites will be encouraged to adopt it
and provide the service also.
Appendix C: Newsgroup Creation 79
Appendix C Newsgroup Creation
Everyone has the opportunity to make a Call For Votes on the Usenet
and attempt to create a newsgroup that he/she feels would be of benefit
to the general readership. The rules governing newsgroup creation have
evolved over the years into a generally accepted method. They only govern
the "world" groups; they aren't applicable to regional or other alternative
hierarchies.
Discussion
A discussion must first take place to address issues like the naming of
the group, where in the group tree it should go (e.g. rec.sports.koosh vs
rec.games.koosh?), and whether or not it should be created in the first
place. The formal Request For Discussion (RFD) should be posted to
news.announce.newgroups, along with any other groups or mailing lists at all
related to the proposed topic. news.announce.newgroups is moderated. You
should place it first in the `Newsgroups:' header, so that it will get
mailed to the moderator only. The article won't be immediately posted to the
other newsgroups listed; rather, it will give you the opportunity to have
the moderator correct any inconsistencies or mistakes in your RFD. He or she
will take care of posting it to the newsgroups you indicated. Also the
`Followup-To:' header will be set so that the actual discussion takes place
only in news.groups. If a user has difficulty posting to a moderated group,
he or she may mail submissions intended for news.announce.newgroups to the
address `announce-newgroups@rpi.edu'.
The final name and charter of the group, and whether it will be
moderated or unmoderated, will be determined during the discussion period.
If it's to be moderated, the discussion will also decide who the moderator
will be. If there's no general agreement on these points among those in
favor of a new group at the end of 30 days, the discussion will be taken
into mail rather than continued posting to news.groups; that way, the
proponents of the group can iron out their differences and come back with a
proper proposal, and make a new Request For Discussion.
Voting
After the discussion period (which is mandatory), if it's been determined
that a new group really is desired, a name and charter are agreed upon, and
it's been determined whether the group will be moderated (and by whom), a
80 Zen and the Art of the Internet
Call For Votes (CFV) should be posted to news.announce.newgroups, along with
any other groups that the original Request For Discussion was posted to. The
CFV should be posted (or mailed to the news.announce.newgroups moderator) as
soon as possible after the discussion ends (to keep it fresh in everyone's
mind).
The Call for Votes should include clear instructions on how to cast a
vote. It's important that it be clearly explained how to both vote for and
against a group (and be of equivalent difficulty or ease). If it's easier
for you or your administrator, two separate addresses can be used to mail
yes and no votes to, providing that they're on the same machine. Regardless
of the method, everyone must have a very specific idea of how to get his/her
vote counted.
The voting period can last between 21 and 31 days, no matter what the
preliminary results of the vote are. A vote can't be called off simply
because 400 "no" votes have come in and only two "yes" votes. The Call for
Votes should include the exact date that the voting period will end - only
those votes arriving on the vote-taker's machine before this date can be
counted.
To keep awareness high, the CFV can be repeated during the vote,
provided that it gives the same clear, unbiased instructions for casting a
vote as the original; it also has to be the same proposal as was first
posted. The charter can't change in mid-vote. Also, votes that're posted
don't count - only those that were mailed to the vote-taker can be tallied.
Partial results should never be included; only a statement of the
specific proposal, that a vote is in progress on it, and how to cast a vote.
A mass acknowledgement ("Mass ACK" or "Vote ACK") is permitted; however, it
must be presented in a way that gives no indication of which way a person
voted. One way to avoid this is to create one large list of everyone who's
voted, and sort it in alphabetical order. It should not be two sorted lists
(of the yes and no votes, respectively).
Every vote is autonomous. The votes for or against one group can't be
transferred to another, similar proposal. A vote can only count for the
exact proposal that it was a response to. In particular, a vote for or
against a newsgroup under one name can't be counted as a vote for or against
another group with a different name or charter, a different moderated /
unmoderated status, or, if it's moderated, a different moderator or set of
moderators. Whew!
Finally, the vote has to be explicit; they should be of the form `I
vote for the group foo.bar as proposed' or `I vote against the group foo.bar
as proposed'. The wording doesn't have to be exact, your intention just has
to be clear.
Appendix C: Newsgroup Creation 81
The Result of a Vote
At the end of the voting period, the vote-taker has to post (to
news.announce.newgroups) the tally and email addresses of the votes
received. Again, it can also be posted to any of the groups listed in the
original CFV. The tally should make clear which way a person voted, so the
results can be verified if it proves necessary to do so.
After the vote result is posted to news.announce.newgroups, there is a
mandatory five-day waiting period. This affords everyone the opportunity to
correct any errors or inconsistencies in the voter list or the voting
procedure.
Creation of the Group
If, after the waiting period, there are no serious objections that might
invalidate the vote, the vote is put to the "water test." If there were 100
more valid `YES/create' votes than `NO/don't' create votes, and at least
two-thirds of the total number of votes are in favor of creation, then a
newgroup control message can be sent out (often by the moderator of
news.announce.newgroups). If the 100-vote margin or the two-thirds per-
centage isn't met, the group has failed and can't be created.
If the proposal failed, all is not lost - after a six-month waiting pe-
riod (a "cooling down"), a new Request For Discussion can be posted to
news.groups, and the whole process can start over again. If after a couple
of tries it becomes obvious that the group is not wanted or needed, the
vote- taker should humbly step back and accept the opinion of the majority.
(As life goes, so goes Usenet.)
82 Zen and the Art of the Internet
Glossary 83
Glossary
This glossary is only a tiny subset of all of the various terms and
other things that people regularly use on The Net. For a more complete (and
very entertaining) reference, it's suggested you get a copy of The New
Hacker's Dictionary, which is based on a VERY large text file called the
Jargon File. Edited by Eric Raymond (eric@snark.thyrsus.com), it is
available from the MIT Press, Cambridge, Massachusetts, 02142; its ISBN
number is 0- 262-68069-6. Also see RFC-1208, A Glossary of Networking Terms.
:-) This odd symbol is one of the ways a person can portray "mood" in
the very flat medium of computers - by using "smilies." This is `meta-
communication', and there are literally hundreds of them, from the obvious
to the obscure. This particular example expresses "happiness." Don't see
it? Tilt your head to the left 90 degrees. Smilies are also used to denote
sarcasm.
address resolution Conversion of an Internet address to the correspond-
ing physical address. On an ethernet, resolution requires broadcasting on
the local area network.
administrivia Administrative tasks, most often related to the mainte-
nance of mailing lists, digests, news gateways, etc.
anonymous FTP Also known as "anon FTP"; a service provided to make files
available to the general Internet community - see Section 3.2.2 [Anonymous
FTP], page 21.
ANSI The American National Standards Institute disseminates basic
standards like ASCII, and acts as the United States' delegate to the ISO.
Standards can be ordered from ANSI by writing to the ANSI Sales De-
partment, 1430 Broadway, New York, NY 10018, or by telephoning (212)
354-3300.
archie A service which provides lookups for packages in a database of
the offerings of countless of anonymous FTP sites. See Section 3.3.1 [archie],
page 25 for a full description.
archive server An email-based file transfer facility offered by some sys-
tems.
ARPA (Advanced Research Projects Agency) Former name of DARPA,
the government agency that funded ARPAnet and later the DARPA Inter-
net.
84 Zen and the Art of the Internet
ARPAnet A pioneering long haul network funded by ARPA. It served
as the basis for early networking research as well as a central backbone dur-
ing the development of the Internet. The ARPAnet consisted of individual
packet switching computers interconnected by leased lines. The ARPAnet
no longer exists as a singular entity.
asynchronous Transmission by individual bytes, not related to specific
timing on the transmitting end.
auto-magic Something which happens pseudo-automatically, and is usu-
ally too complex to go into any further than to say it happens "auto-
magically."
backbone A high-speed connection within a network that connects
shorter, usually slower circuits. Also used in reference to a system that acts
as a "hub" for activity (although those are becoming much less prevalent
now than they were ten years ago).
bandwidth The capacity of a medium to transmit a signal. More infor-
mally, the mythical "size" of The Net, and its ability to carry the files and
messages of those that use it. Some view certain kinds of traffic (FTPing
hundreds of graphics images, for example) as a "waste of bandwidth" and
look down upon them.
BITNET (Because It's Time Network) An NJE-based international ed-
ucational network.
bounce The return of a piece of mail because of an error in its delivery.
btw An abbreviation for "by the way."
CFV (Call For Votes) Initiates the voting period for a Usenet newsgroup.
At least one (occasionally two or more) email address is customarily included
as a repository for the votes. See See Appendix C [Newsgroup Creation],
page 79 for a full description of the Usenet voting process.
ClariNews The fee-based Usenet newsfeed available from ClariNet Com-
munications.
client The user of a network service; also used to describe a computer
that relies upon another for some or all of its resources.
Cyberspace A term coined by William Gibson in his fantasy novel Neu-
romancer to describe the "world" of computers, and the society that gathers
around them.
datagram The basic unit of information passed across the Internet. It
contains a source and destination address along with data. Large messages
are broken down into a sequence of IP datagrams.
disassembling Converting a binary program into human-readable ma-
chine language code.
Glossary 85
DNS (Domain Name System) The method used to convert Internet
names to their corresponding Internet numbers.
domain A part of the naming hierarchy. Syntactically, a domain name
consists of a sequence of names or other words separated by dots.
dotted quad A set of four numbers connected with periods that make up
an Internet address; for example, 147.31.254.130.
email The vernacular abbreviation for electronic mail.
email address The UUCP or domain-based address that a user is referred
to with. For example, the author's address is brendan@cs.widener.edu.
ethernet A 10-million bit per second networking scheme originally devel-
oped by Xerox Corporation. Ethernet is widely used for LANs because it can
network a wide variety of computers, it is not proprietary, and components
are widely available from many commercial sources.
FDDI (Fiber Distributed Data Interface) An emerging standard for net-
work technology based on fiber optics that has been established by ANSI.
FDDI specifies a 100-million bit per second data rate. The access control
mechanism uses token ring technology.
flame A piece of mail or a Usenet posting which is violently argumenta-
tive.
FQDN (Fully Qualified Domain Name) The FQDN is the full site name
of a system, rather than just its hostname. For example, the system lisa
at Widener University has a FQDN of lisa.cs.widener.edu.
FTP (File Transfer Protocol) The Internet standard high-level protocol
for transferring files from one computer to another.
FYI An abbreviation for the phrase "for your information." There is also
a series of RFCs put out by the Network Information Center called FYIs;
they address common questions of new users and many other useful things.
See [RFCs], page 73 for instructions on retrieving FYIs.
gateway A special-purpose dedicated computer that attaches to two or
more networks and routes packets from one network to the other. In par-
ticular, an Internet gateway routes IP datagrams among the networks it
connects. Gateways route packets to other gateways until they can be de-
livered to the final destination directly across one physical network.
header The portion of a packet, preceding the actual data, containing
source and destination addresses and error-checking fields. Also part of a
message or news article.
hostname The name given to a machine. (See also FQDN.)
IMHO (In My Humble Opinion) This usually accompanies a statement
86 Zen and the Art of the Internet
that may bring about personal offense or strong disagreement.
Internet A concatenation of many individual TCP/IP campus, state,
regional, and national networks (such as NSFnet, ARPAnet, and Milnet)
into one single logical network all sharing a common addressing scheme.
Internet number The dotted-quad address used to specify a certain sys-
tem. The Internet number for the site cs.widener.edu is 147.31.254.130.
A resolver is used to translate between hostnames and Internet addresses.
interoperate The ability of multi-vendor computers to work together
using a common set of protocols. With interoperability, PCs, Macs, Suns,
Dec VAXen, CDC Cybers, etc, all work together allowing one host computer
to communicate with and take advantage of the resources of another.
ISO (International Organization for Standardization) Coordinator of the
main networking standards that are put into use today.
kernel The level of an operating system or networking system that con-
tains the system-level commands or all of the functions hidden from the user.
In a Unix system, the kernel is a program that contains the device drivers,
the memory management routines, the scheduler, and system calls. This
program is always running while the system is operating.
LAN (Local Area Network) Any physical network technology that op-
erates at high speed over short distances (up to a few thousand meters).
mail gateway A machine that connects to two or more electronic mail
systems (especially dissimilar mail systems on two different networks) and
transfers mail messages among them.
mailing list A possibly moderated discussion group, distributed via email
from a central computer maintaining the list of people involved in the dis-
cussion.
mail path A series of machine names used to direct electronic mail from
one user to another.
medium The material used to support the transmission of data. This
can be copper wire, coaxial cable, optical fiber, or electromagnetic wave (as
in microwave).
multiplex The division of a single transmission medium into multiple
logical channels supporting many simultaneous sessions. For example, one
network may have simultaneous FTP, telnet, rlogin, and SMTP connections,
all going at the same time.
net.citizen An inhabitant of Cyberspace. One usually tries to be a good
net.citizen, lest one be flamed.
netiquette A pun on "etiquette"; proper behavior on The Net. See
Section 4.13 [Usenet Netiquette], page 37.
Glossary 87
network A group of machines connected together so they can transmit
information to one another. There are two kinds of networks: local networks
and remote networks.
NFS (Network File System) A method developed by Sun Microsystems
to allow computers to share files across a network in a way that makes them
appear as if they're "local" to the system.
NIC The Network Information Center.
node A computer that is attached to a network; also called a host.
NSFnet The national backbone network, funded by the National Science
Foundation and operated by the Merit Corporation, used to interconnect
regional (mid-level) networks such as WestNet to one another.
packet The unit of data sent across a packet switching network. The term
is used loosely. While some Internet literature uses it to refer specifically
to data sent across a physical network, other literature views the Internet
as a packet switching network and describes IP datagrams as packets.
polling Connecting to another system to check for things like mail or
news.
postmaster The person responsible for taking care of mail problems,
answering queries about users, and other related work at a site.
protocols A formal description of message formats and the rules two
computers must follow to exchange those messages. Protocols can describe
low-level details of machine-to-machine interfaces (e.g., the order in which
bits and bytes are sent across a wire) or high-level exchanges between allo-
cation programs (e.g., the way in which two programs transfer a file across
the Internet).
recursion The facility of a programming language to be able to call
functions from within themselves.
resolve Translate an Internet name into its equivalent IP address or other
DNS information.
RFD (Request For Discussion) Usually a two- to three-week period in
which the particulars of newsgroup creation are battled out.
route The path that network traffic takes from its source to its destina-
tion.
router A dedicated computer (or other device) that sends packets from
one place to another, paying attention to the current state of the network.
RTFM (Read The Fantastic Manual) . This anacronym is often used
when someone asks a simple or common question. The word `Fantastic' is
usually replaced with one much more vulgar.
88 Zen and the Art of the Internet
SMTP (Simple Mail Transfer Protocol) The Internet standard proto-
col for transferring electronic mail messages from one computer to another.
SMTP specifies how two mail systems interact and the format of control
messages they exchange to transfer mail.
server A computer that shares its resources, such as printers and files,
with other computers on the network. An example of this is a Network File
System (NFS) server which shares its disk space with other computers.
signal-to-noise ratio When used in reference to Usenet activity, `signal-
to-noise ratio' describes the relation between amount of actual informa-
tion in a discussion, compared to their quantity. More often than not, there's
substantial activity in a newsgroup, but a very small number of those articles
actually contain anything useful.
signature The small, usually four-line message at the bottom of a piece of
email or a Usenet article. In Unix, it's added by creating a file `.signature'
in the user's home directory. Large signatures are a no-no.
summarize To encapsulate a number of responses into one coherent,
usable message. Often done on controlled mailing lists or active newsgroups,
to help reduce bandwidth.
synchronous Data communications in which transmissions are sent at a
fixed rate, with the sending and receiving devices synchronized.
TCP/IP (Transmission Control Protocol/Internet Protocol) A set of
protocols, resulting from ARPA efforts, used by the Internet to support
services such as remote login (telnet), file transfer (FTP) and mail (SMTP).
telnet The Internet standard protocol for remote terminal connection
service. Telnet allows a user at one site to interact with a remote timesharing
system at another site as if the user's terminal were connected directly to
the remote computer.
terminal server A small, specialized, networked computer that connects
many terminals to a LAN through one network connection. Any user on the
network can then connect to various network hosts.
TEX A free typesetting system by Donald Knuth.
twisted pair Cable made up of a pair of insulated copper wires wrapped
around each other to cancel the effects of electrical noise.
UUCP (Unix to Unix Copy Program) A store-and-forward system, pri-
marily for Unix systems but currently supported on other platforms (e.g.
VMS and personal computers).
WAN (Wide-Area Network) A network spanning hundreds or thousands
of miles.
workstation A networked personal computing device with more power
Glossary 89
than a standard IBM PC or Macintosh. Typically, a workstation has an
operating system such as unix that is capable of running several tasks at the
same time. It has several megabytes of memory and a large, high-resolution
display. Examples are Sun workstations and Digital DECstations.
worm A computer program which replicates itself. The Internet worm
(see Section 8.1 [The Internet Worm], page 63) was perhaps the most fa-
mous; it successfully (and accidentally) duplicated itself on systems across
the Internet.
wrt With respect to.
"I hate definitions."
Benjamin Disraeli
Vivian Grey, bk i chap ii
90 Zen and the Art of the Internet
Bibliography 91
Bibliography
What follows is a compendium of sources that have information that will
be of use to anyone reading this guide. Most of them were used in the writing
of the booklet, while others are simply noted because they are a must for
any good net.citizen's bookshelf.
Books
Comer, Douglas E. (1991). Internetworking With TCP/IP, 2nd ed., 2v.
Prentice Hall: Englewood Cliffs, NJ.
Davidson, John (1988). An Introduction to TCP/IP. Springer-Verlag:
Berlin.
Frey, Donnalyn, and Adams, Rick (1989). !@%.: A Directory of Elec-
tronic Mail Addressing and Networks. O'Reilly and Associates: Newton,
MA.
Gibson, William (1984). Neuromancer. Ace: New York, NY.
LaQuey, Tracy (1990). Users' Directory of Computer Networks. Digital
Press: Bedford, MA.
Levy, Stephen (1984). Hackers: Heroes of the Computer Revolution.
Anchor Press/Doubleday: Garden City, NY.
Partridge, Craig (1988). Innovations in Internetworking. ARTECH
House: Norwood, MA.
Quarterman, John S. (1989). The Matrix: Computer Networks and Con-
ferencing Systems Worldwide. Digital Press: Bedford, MA.
Raymond, Eric (ed) (1991). The New Hacker's Dictionary. MIT Press:
Cambridge, MA.
Stoll, Clifford (1989). The Cuckoo's Egg. Doubleday: New York.
Tanenbaum, Andrew S. (1988). Computer Networks, 2d ed. Prentice-
Hall: Englewood Cliffs, NJ.
Todinao, Grace (1986). Using UUCP and USENET: A Nutshell Hand-
book. O'Reilly and Associates: Newton, MA.
The Waite Group (1991). Unix Communications, 2nd ed.. Howard W.
Sams & Company: Indianapolis.
92 Zen and the Art of the Internet
Periodicals & Papers
Barlow, J. Coming Into The Country. Communications of the ACM 34:3
(March 1991): 2. Addresses "Cyberspace" - John Barlow was a co-founder
of the EFF.
Collyer, G., and Spencer, H. News Need Not Be Slow. Proceedings of the
1987 Winter USENIX Conference: 181-90. USENIX Association, Berkeley,
CA (January 1987).
Denning, P. The Internet Worm. American Scientist (March-April 1989):
126-128.
________.The Science of Computing: Computer Networks. American Sci-
entist (March-April 1985): 127-129.
Frey, D., and Adams, R. USENET: Death by Success? UNIX REVIEW
(August 1987): 55-60.
Gifford, W. S. ISDN User-Network Interfaces. IEEE Journal on Selected
Areas in Communications (May 1986): 343-348.
Ginsberg, K. Getting from Here to There. UNIX REVIEW (January
1986): 45.
Hiltz, S. R. The Human Element in Computerized Conferencing Systems.
Computer Networks (December 1978): 421-428.
Horton, M. What is a Domain? Proceedings of the Summer 1984 USENIX
Conference: 368-372. USENIX Association, Berkeley, CA (June 1984).
Jacobsen, Ole J. Information on TCP/IP. ConneXions - The Interoper-
ability Report (July 1988): 14-15.
Jennings, D., et al. Computer Networking for Scientists. Science (28
February 1986): 943-950.
Markoff, J. "Author of computer `virus' is son of U.S. electronic security
expert." New York Times (Nov. 5, 1988): A1.
________."Computer snarl: A `back door' ajar." New York Times (Nov.
7, 1988): B10.
McQuillan, J. M., and Walden, D. C. The ARPA Network Design Deci-
sions. Computer Networks (1977): 243-289.
Ornstein, S. M. A letter concerning the Internet worm. Communications
of the ACM 32:6 (June 1989).
Partridge, C. Mail Routing Using Domain Names: An Informal Tour.
Proceedings of the 1986 Summer USENIX Conference: 366-76. USENIX As-
sociation, Berkeley, CA (June 1986).
Bibliography 93
Quarterman, J. Etiquette and Ethics. ConneXions - The Interoperability
Report (March 1989): 12-16.
________.Notable Computer Networks. Communications of the ACM 29:10
(October 1986). This was the predecessor to The Matrix.
Raeder, A. W., and Andrews, K. L. Searching Library Catalogs on the
Internet: A Survey. Database Searcher 6 (September 1990): 16-31.
Seeley, D. A tour of the worm. Proceedings of the 1989 Winter USENIX
Conference: 287-304. USENIX Association, Berkeley, CA (February 1989).
Shulman, G. Legal Research on USENET Liability Issues. ;login: The
USENIX Association Newsletter (December 1984): 11-17.
Smith, K. E-Mail to Anywhere. PC World (March 1988): 220-223.
Stoll, C. Stalking the Wily Hacker. Communications of the ACM 31:5
(May 1988): 14. This article grew into the book The Cuckoo's Egg.
Taylor, D. The Postman Always Rings Twice: Electronic Mail in a Highly
Distributed Environment. Proceedings of the 1988 Winter USENIX Confer-
ence: 145-153. USENIX Association, Berkeley, CA (December 1988).
U.S. Gen'l Accounting Ofc. Computer Security: Virus Highlights Need for
Improved Internet Management. GAO / IMTEC - 89 - 57, (1989). Addresses
the Internet worm.
"And all else is literature."
Paul Verlaine
The Sun, New York
94 Zen and the Art of the Internet
Index 95
Index
A finger............................53, 63
ACM.................................65 FQDN................................6, 7
address, email..............11, 14, 38 Freenet...............................47
address, IP (Internet).......7, 20, 47 FSF (Free Software Foundation)........68
administrivia...................15, 83 FTPable Items.16, 17, 43, 47, 57, 67, 75
ANSI................................83
AppleLink...........................75 G
archie..........................25, 26 gateway, mail-news............35, 37, 75
archive servers.................11, 72 GNU Project.......................... 68
ARL.................................59
B H
bang path.......................... 11 headers...............................13
BITFTP..............................78 help, with archie.....................26
BITNET...............................8 help, with FTPmail....................78
book bugs.......................... 73 help, with geo server.................50
bounce, mail delivery...............14 help, with listservs..................17
C I
CARL........................... 46, 48 Internet number........................7
Clarinet............................60 Internet worm.....................63, 89
CompuServe..........................75 IRG (Internet Resource Guide).........71
CPSR................................65
crossposting........................41 J
Cyberspace...........1, 63, 64, 67, 84 journals..............................59
D K
databases...........................60 Knowbot...............................48
domains..............5, 11, 14, 56, 85
L
E leased line............................9
EFF.................................66 libraries.....................27, 46, 71
EFF (Electronic Frontier Foundation).6 listserv..................16, 17, 49, 59
Electronic Mail.....................11 LPF...................................68
extragalactic database..............51
M
F mailing list..........................15
FAQs................................43 MCI Mail..............................75
FEDIX...............................50 minority scholarships.................50
96 Zen and the Art of the Internet
moderation, of newsgroups..34,35,79,80 RFC-822, email format.................13
Morris, Robert (Jr.)................63 RFCs (Requests for Comments)......37, 71
N S
NED.................................51 security..............................54
newsgroups, for testing.............39 signature files.......................37
NJE protocol, for BITNET.............8 SLIP links, modem-based IP.........9, 19
NNTP............................36, 60 STIS..................................51
Nutshell Books......................12 Stoll, Cliff..........................64
subnet.................................7
O Sun Managers..........................15
OCEANIC.............................51
octet................................7 T
talk..................................55
P
ping................................54 U
postmaster..............15, 16, 56, 87 UUCP...........8, 11, 13, 36, 60, 73, 85
UUNET.............................20, 32
Q
quotes, stock.......................60 W
Weather...............................50
R White Pages Pilot Project.............48
resolving....................7, 20, 86 WHOIS databases.......................55
i
Table of Contents
Preface..................................................................1
Acknowledgements.........................................................3
1 Network Basics......................................................5
1.1 Domains....................................................5
1.2 Internet Numbers...........................................7
1.3 Resolving Names and Numbers................................7
1.4 The Networks...............................................8
1.5 The Physical Connection....................................8
2 Electronic Mail....................................................11
2.1 Email Addresses...........................................11
2.1.1 %@!.: Symbolic Cacophony........................11
2.1.2 Sending and Receiving Mail......................12
2.1.3 Anatomy of a Mail Header........................13
2.1.4 Bounced Mail....................................14
2.2 Mailing Lists.............................................15
2.2.1 Listservs.......................................16
3 Anonymous FTP......................................................19
3.1 FTP Etiquette.............................................19
3.2 Basic Commands............................................20
3.2.1 Creating the Connection.........................20
3.2.2 dir.............................................21
3.2.3 cd..............................................22
3.2.4 get and put.....................................22
3.2.4.1 ASCII vs Binary.......................23
3.2.4.2 mget and mput.........................24
3.3 The archie Server.........................................25
3.3.1 Using archie Today..............................25
3.3.2 archie Clients..................................26
3.3.3 Mailing archie..................................27
3.3.4 The whatis database.............................27
4 Usenet News........................................................29
4.1 What Usenet Is............................................29
ii Zen and the Art of the Internet
4.2 The Diversity of Usenet...................................29
4.3 What Usenet Is Not........................................29
4.4 Propagation of News.......................................31
4.5 Group Creation............................................32
4.6 If You're Unhappy.........................................33
4.7 The History of Usenet (The ABCs)..........................33
4.8 Hierarchies...............................................34
4.9 Moderated vs Unmoderated..................................35
4.10 news.groups & news.announce.newgroups....................36
4.11 How Usenet Works.........................................36
4.12 Mail Gateways............................................37
4.13 Usenet "Netiquette"......................................37
4.13.1 Signatures.....................................37
4.13.2 Posting Personal Messages......................38
4.13.3 Posting Mail...................................38
4.13.4 Test Messages..................................39
4.13.5 Famous People Appearing........................39
4.13.6 Summaries......................................39
4.13.7 Quoting........................................40
4.13.8 Crossposting...................................41
4.13.9 Recent News....................................41
4.13.10 Quality of Postings...........................41
4.13.11 Useful Subjects...............................42
4.13.12 Tone of Voice.................................42
4.13.13 Computer Religion.............................43
4.14 Frequently Asked Questions...............................43
4.14.1 The Pit-Manager Archive........................43
5 Telnet.............................................................45
5.1 Using Telnet..............................................45
5.1.1 Telnet Ports....................................45
5.2 Publicly Accessible Libraries.............................46
5.3 The Cleveland Freenet.....................................47
5.4 Directories...............................................47
5.4.1 Knowbot.........................................48
5.4.2 White Pages.....................................48
5.5 Databases.................................................48
5.5.1 Colorado Alliance of Research Libraries (CARL)..48
5.5.2 PENpages........................................49
5.5.3 Clemson Univ. Forestry & Agricultural Network...49
5.5.4 University of Maryland Info Database............49
5.5.5 University of Michigan Weather Underground......50
5.5.6 Geographic Name Server..........................50
5.5.7 FEDIX - Minority Scholarship Information........50
iii
5.5.8 Science & Technology Information System.........51
5.5.9 Ocean Network Information Center................51
5.5.10 NASA/IPAC Extragalactic Database (NED).........51
5.5.11 U.S. Naval Observatory Automated Data Service..52
6 Various Tools......................................................53
6.1 Finger....................................................53
6.2 Ping......................................................54
6.3 Talk......................................................55
6.4 The WHOIS Database........................................55
6.4.1 Other Uses of WHOIS.............................57
7 Commercial Services................................................59
7.1 Electronic Journals.......................................59
7.2 Commercial Databases......................................60
7.3 Clarinet News.............................................60
8 Things You'll Hear About...........................................63
8.1 The Internet Worm.........................................63
8.2 The Cuckoo's Egg..........................................64
8.3 Organizations.............................................64
8.3.1 The Association for Computing Machinery.........65
8.3.2 Computer Professionals for Social Responsibility65
8.3.3 The Electronic Frontier Foundation..............66
8.3.4 The Free Software Foundation....................68
8.3.5 The League for Programming Freedom..............68
8.4 Networking Initiatives....................................69
8.4.1 NREN............................................69
9 Finding Out More...................................................71
9.1 Internet Resource Guide...................................71
9.2 Requests for Comments.....................................71
Conclusion..............................................................73
Appendix A Getting to Other Networks.................................75
Appendix B Retrieving Files via Email................................77
Archive Servers.................................................77
FTP-by-Mail Servers.............................................77
iv Zen and the Art of the Internet
Appendix C Newsgroup Creation........................................79
Discussion......................................................79
Voting..........................................................79
The Result of a Vote............................................81
Creation of the Group...........................................81
Glossary................................................................83
Bibliography............................................................91
Books...........................................................91
Periodicals & Papers............................................92
Index...................................................................95