home *** CD-ROM | disk | FTP | other *** search
-
-
-
- ==Phrack Inc.==
-
- Volume Three, Issue 27, File 3 of 12
-
- <><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><>
- <> <>
- <> Introduction to MIDNET <>
- <> ~~~~~~~~~~~~~~~~~~~~~~ <>
- <> Chapter Seven Of The Future Transcendent Saga <>
- <> <>
- <> A More Indepth Look Into NSFnet <>
- <> National Science Foundation Network <>
- <> <>
- <> Presented by Knight Lightning <>
- <> June 16, 1989 <>
- <> <>
- <><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><>
-
-
- Prologue
- ~~~~~~~~
- If you are not already familiar with NSFnet, I would suggest that you read:
-
- "Frontiers" (Phrack Inc., Volume Two, Issue 24, File 4 of 13), and definitely;
- "NSFnet: National Science Foundation Network" (Phrack Inc., Volume Three,
- Issue 26, File 4 of 11).
-
-
- Table Of Contents
- ~~~~~~~~~~~~~~~~~
- * Introduction
- * The DOD Protocol Suite
- * Names and Addresses In A Network
- * Telnet (*NOT* Telenet)
- * File Transfer
- * Mail
-
-
- Introduction
- ~~~~~~~~~~~~
- MIDNET is a regional computer network that is part of the NSFnet, the National
- Science Foundation Network. Currently, eleven mid-United States universities
- are connected to each other and to the NSFnet via MIDnet:
-
- UA - University of Arkansas at Fayetteville
- ISU - Iowa State University at Ames
- UI - University of Iowa at Iowa City
- KSU - Kansas State University at Manhattan
- KU - University of Kansas at Lawrence
- UMC - University of Missouri at Columbia
- WU - Washington University at St. Louis, Missouri
- UNL - University of Nebraska at Lincoln
- OSU - Oklahoma State University at Stillwater
- UT - University of Tulsa (Oklahoma)
- OU - University of Oklahoma at Norman
-
- Researchers at any of these universities that have funded grants can access the
- six supercomputer centers funded by the NSF:
-
- John Von Neuman Supercomputer Center
- National Center for Atmospheric Research
- Cornell National Supercomputer Facility
- National Center for Supercomputing Applications
- Pittsburgh Supercomputing Center
- San Diego Supercomputing Center
-
- In addition, researchers and scientists can communicate with each other over a
- vast world-wide computer network that includes the NSFnet, ARPAnet, CSnet,
- BITnet, and others that you have read about in The Future Transcendent Saga.
- Please refer to "Frontiers" (Phrack Inc., Volume Two, Issue 24, File 4 of 13)
- for more details.
-
- MIDnet is just one of several regional computer networks that comprise the
- NSFnet system. Although all of these regional computer networks work the same,
- MIDnet is the only one that I have direct access to and so this file is written
- from a MIDnet point of view. For people who have access to the other regional
- networks of NSFnet, the only real differences depicted in this file that would
- not apply to the other regional networks are the universities that are served
- by MIDnet as opposed to:
-
- NYSERnet in New York State
- SURAnet in the southeastern United States
- SEQSUInet in Texas
- BARRnet in the San Francisco area
- MERIT in Michigan
-
- (There are others that are currently being constructed.)
-
- These regional networks all hook into the NSFnet backbone, which is a network
- that connects the six supercomputer centers. For example, a person at Kansas
- State University can connect with a supercomputer via MIDnet and the NSFnet
- backbone. That researcher can also send mail to colleagues at the University
- of Delaware by using MIDnet, NSFnet and SURAnet. Each university has its own
- local computer network which connects on-campus computers as well as providing
- a means to connecting to a regional network.
-
- Some universities are already connected to older networks such as CSnet, the
- ARPAnet and BITnet. In principal, any campus connected to any of these
- networks can access anyone else in any other network since there are gateways
- between the networks.
-
- Gateways are specialized computers that forward network traffic, thereby
- connecting networks. In practice, these wide-area networks use different
- networking technology which make it impossible to provide full functionality
- across the gateways. However, mail is almost universally supported across all
- gateways, so that a person at a BITnet site can send mail messages to a
- colleague at an ARPAnet site (or anywhere else for that matter). You should
- already be somewhat familiar with this, but if not refer to;
-
- "Limbo To Infinity" (Phrack Inc., Volume Two, Issue 24, File 3 of 13) and
- "Internet Domains" (Phrack Inc., Volume Three, Issue 26, File 8 of 11)
-
- Computer networks rely on hardware and software that allow computers to
- communicate. The language that enables network communication is called a
- protocol. There are many different protocols in use today. MIDnet uses the
- TCP/IP protocols, also known as the DOD (Department of Defense) Protocol Suite.
-
- Other networks that use TCP/IP include ARPAnet, CSnet and the NSFnet. In fact,
- all the regional networks that are linked to the NSFnet backbone are required
- to use TCP/IP. At the local campus level, TCP/IP is often used, although other
- protocols such as IBM's SNA and DEC's DECnet are common. In order to
- communicate with a computer via MIDnet and the NSFnet, a computer at a campus
- must use TCP/IP directly or use a gateway that will translate its protocols
- into TCP/IP.
-
- The Internet is a world-wide computer network that is the conglomeration of
- most of the large wide area networks, including ARPAnet, CSnet, NSFnet, and the
- regionals, such as MIDnet. To a lesser degree, other networks such as BITnet
- that can send mail to hosts on these networks are included as part of the
- Internet. This huge network of networks, the Internet, as you have by now read
- all about in the pages of Phrack Inc., is a rapidly growing and very complex
- entity that allows sophisticated communication between scientists, students,
- government officials and others. Being a part of this community is both
- exciting and challenging.
-
- This chapter of the Future Transcendent Saga gives a general description of the
- protocols and software used in MIDnet and the NSFNet. A discussion of several
- of the more commonly used networking tools is also included to enable you to
- make practical use of the network as soon as possible.
-
-
- The DOD Protocol Suite
- ~~~~~~~~~~~~~~~~~~~~~~
- The DOD Protocol Suite includes many different protocols. Each protocol is a
- specification of how communication is to occur between computers. Computer
- hardware and software vendors use the protocol to create programs and sometimes
- specialized hardware in order to implement the network function intended by the
- protocol. Different implementations of the same protocol exist for the varied
- hardware and operating systems found in a network.
-
- The three most commonly used network functions are:
-
- Mail -- Sending and receiving messages
- File Transfer -- Sending and receiving files
- Remote Login -- Logging into a distant computer
-
- Of these, mail is probably the most commonly used.
-
- In the TCP/IP world, there are three different protocols that realize these
- functions:
-
- SMTP -- (Simple Mail Transfer Protocol) Mail
- FTP -- (File Transfer Protocol) sending and receiving files
- Telnet -- Remote login
-
- How to use these protocols is discussed in the next section. At first glance,
- it is not obvious why these three functions are the most common. After all,
- mail and file transfer seem to be the same thing. However, mail messages are
- not identical to files, since they are usually comprised of only ASCII
- characters and are sequential in structure. Files may contain binary data and
- have complicated, non-sequential structures. Also, mail messages can usually
- tolerate some errors in transmission whereas files should not contain any
- errors. Finally, file transfers usually occur in a secure setting (i.e. The
- users who are transferring files know each other's names and passwords and are
- permitted to transfer the file, whereas mail can be sent to anybody as long as
- their name is known).
-
- While mail and transfer accomplish the transfer of raw information from one
- computer to another, Telnet allows a distant user to process that information,
- either by logging in to a remote computer or by linking to another terminal.
- Telnet is most often used to remotely log in to a distant computer, but it is
- actually a general-purpose communications protocol. I have found it incredibly
- useful over the last year. In some ways, it could be used for a great deal of
- access because you can directly connect to another computer anywhere that has
- TCP/IP capabilities, however please note that Telnet is *NOT* Telenet.
-
- There are other functions that some networks provide, including the following:
-
- - Name to address translation for networks, computers and people
- - The current time
- - Quote of the day or fortune
- - Printing on a remote printer, or use of any other remote peripheral
- - Submission of batch jobs for non-interactive execution
- - Dialogues and conferencing between multiple users
- - Remote procedure call (i.e. Distributing program execution over several
- remote computers)
- - Transmission of voice or video information
-
- Some of these functions are still in the experimental stages and require faster
- computer networks than currently exist. In the future, new functions will
- undoubtedly be invented and existing ones improved.
-
- The DOD Protocol Suite is a layered network architecture, which means that
- network functions are performed by different programs that work independently
- and in harmony with each other. Not only are there different programs but
- there are different protocols. The protocols SMTP, FTP and Telnet are
- described above. Protocols have been defined for getting the current time, the
- quote of the day, and for translating names. These protocols are called
- applications protocols because users directly interact with the programs that
- implement these protocols.
-
- The Transmission Control Protocol, TCP, is used by many of the application
- protocols. Users almost never interact with TCP directly. TCP establishes a
- reliable end-to-end connection between two processes on remote computers. Data
- is sent through a network in small chunks called packets to improve reliability
- and performance. TCP ensures that packets arrive in order and without errors.
- If a packet does have errors, TCP requests that the packet be retransmitted.
-
- In turn, TCP calls upon IP, Internet Protocol, to move the data from one
- network to another. IP is still not the lowest layer of the architecture,
- since there is usually a "data link layer protocol" below it. This can be any
- of a number of different protocols, two very common ones being X.25 and
- Ethernet.
-
- FTP, Telnet and SMTP are called "application protocols", since they are
- directly used by applications programs that enable users to make use of the
- network. Network applications are the actual programs that implement these
- protocols and provide an interface between the user and the computer. An
- implementation of a network protocol is a program or package of programs that
- provides the desired network function such as file transfer. Since computers
- differ from vendor to vendor (e.g. IBM, DEC, CDC), each computer must have its
- own implementation of these protocols. However, the protocols are standardized
- so that computers can interoperate over the network (i.e. Can understand and
- process each other's data). For example, a TCP packet generated by an IBM
- computer can be read and processed by a DEC computer.
-
- In many instances, network applications programs use the name of the protocol.
- For example, the program that transfers files may be called "FTP" and the
- program that allows remote logins may be called "Telnet." Sometimes these
- protocols are incorporated into larger packages, as is common with SMTP. Many
- computers have mail programs that allow users on the same computer to send mail
- to each other. SMTP functions are often added to these mail programs so that
- users can also send and receive mail through a network. In such cases, there
- is no separate program called SMTP that the user can access, since the mail
- program provides the user interface to this network function.
-
- Specific implementation of network protocols, such as FTP, are tailored to the
- computer hardware and operating system on which they are used. Therefore, the
- exact user interface varies from one implementation to another. For example,
- the FTP protocol specifies a set of FTP commands which each FTP implementation
- must understand and process. However, these are usually placed at a low level,
- often invisible to the user, who is given a higher set of commands to use.
-
- These higher-level commands are not standardized so they may vary from one
- implementation of FTP to another. For some operating systems, not all of these
- commands make equal sense, such as "Change Directory," or may have different
- meanings. Therefore the specific user interface that the user sees will
- probably differ.
-
- This file describes a generic implementation of the standard TCP/IP application
- protocols. Users must consult local documentation for specifics at their
- sites.
-
-
- Names and Addresses In A Network
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- In DOD Protocol Suite, each network is given a unique identifying number. This
- number is assigned by a central authority, namely the Network Information
- Center run by SRI, abbreviated as SRI-NIC, in order to prevent more than one
- network from having the same network number. For example, the ARPAnet has
- network number 10 while MIDnet has a longer number, namely 128.242.
-
- Each host in a network has a unique identification so other hosts can specify
- them unambiguously. Host numbers are usually assigned by the organization that
- manages the network, rather than one central authority. Host numbers do not
- need to be unique throughout the whole Internet but two hosts on the same
- network need to have unique host numbers.
-
- The combination of the network number and the host number is called the IP
- address of the host and is specified as a 32-bit binary number. All IP
- addresses in the Internet are expressible as 32-bit numbers, although they are
- often written in dotted decimal notation. Dotted decimal notation breaks the
- 32-bit number into four eight-bit parts or octets and each octet is specified
- as a decimal number. For example, 00000001 is the binary octet that specifies
- the decimal number 1, while 11000000 specifies 192. Dotted decimal notation
- makes IP addresses much easier to read and remember.
-
- Computers in the Internet are also identified by hostnames, which are strings
- of characters, such as "phrackvax." However, IP packets must specify the
- 32-bit IP address instead of the hostname so some way to translating hostnames
- to IP addresses must exist.
-
- One way is to have a table of hostnames and their corresponding IP addresses,
- called a hosttable. Nearly every TCP/IP implementation has such a hosttable,
- although the weaknesses of this method are forcing a shift to a new scheme
- called the domain name system. In UNIX systems, the hosttable is often called
- "/etc/hosts." You can usually read this file and find out what the IP
- addresses of various hosts are. Other systems may call this file by a
- different name and make it unavailable for public viewing.
-
- Users of computers are generally given accounts to which all charges for
- computer use are billed. Even if computer time is free at an installation,
- accounts are used to distinguish between the users and enforce file
- protections. The generic term "username" will be used in this file to refer to
- the name by which the computer account is accessed.
-
- In the early days of the ARPAnet which was the first network to use the TCP/IP
- protocols, computer users were identified by their username, followed by a
- commercial "at" sign (@), followed by the hostname on which the account
- existed. Networks were not given names, per se, although the IP address
- specified a network number.
-
- For example, "knight@phrackvax" referred to user "knight" on host "phrackvax."
- This did not specify which network "phrackvax" was on, although that
- information could be obtained by examining the hosttable and the IP address for
- "phrackvax." (However, "phrackvax" is a ficticious hostname used for this
- presentation.)
-
- As time went on, every computer on the network had to have an entry in its
- hosttable for every other computer on the network. When several networks
- linked together to form the Internet, the problem of maintaining this central
- hosttable got out of hand. Therefore, the domain name scheme was introduced to
- split up the hosttable and make it smaller and easier to maintain.
-
- In the new domain name scheme, users are still identified by their usernames,
- but hosts are now identified by their hostname and any and all domains of which
- they are a part. For example, the following address,
- "KNIGHT@UMCVMB.MISSOURI.EDU" specifies username "KNIGHT" on host "UMCVMB".
- However, host "UMCVMB" is a part of the domain "MISSOURI" " which is in turn
- part of the domain "EDU". There are other domains in "EDU", although only one
- is named "MISSOURI". In the domain "MISSOURI", there is only one host named
- "UMCVMB".
-
- However, other domains in "EDU" could theoretically have hosts named "UMCVMB"
- (although I would say that this is rather unlikely in this example). Thus the
- combination of hostname and all its domains makes it unique. The method of
- translating such names into IP addresses is no longer as straightforward as
- looking up the hostname in a table. Several protocols and specialized network
- software called nameservers and resolvers implement the domain name scheme.
-
- Not all TCP/IP implementations support domain names because it is rather new.
- In those cases, the local hosttable provides the only way to translate
- hostnames to IP addresses. The system manager of that computer will have to
- put an entry into the hosttable for every host that users may want to connect
- to. In some cases, users may consult the nameserver themselves to find out the
- IP address for a given hostname and then use that IP address directly instead
- of a hostname.
-
- I have selected a few network hosts to demonstrate how a host system can be
- specified by both the hostname and host numerical address. Some of the nodes I
- have selected are also nodes on BITnet, perhaps even some of the others that I
- do not make a note of due a lack of omniscent awareness about each and every
- single host system in the world :-)
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- Numerical Hostname Location BITnet
- --------- -------- -------- ------
- 18.72.0.39 ATHENA.MIT.EDU (Mass. Institute of Technology) ?
- 26.0.0.73 SRI-NIC.ARPA (DDN Network Information Center) -
- 36.21.0.13 MACBETH.STANFORD.EDU (Stanford University) ?
- 36.21.0.60 PORTIA.STANFORD.EDU (Stanford University) ?
- 128.2.11.131 ANDREW.CMU.EDU (Carnegie Mellon University) ANDREW
- 128.3.254.13 LBL.GOV (Lawrence Berkeley Labrotories) LBL
- 128.6.4.7 RUTGERS.RUTGERS.EDU (Rutgers University) ?
- 128.59.99.1 CUCARD.MED.COLUMBIA.EDU (Columbia University) ?
- 128.102.18.3 AMES.ARC.NASA.GOV (Ames Research Center [NASA]) -
- 128.103.1.1 HARVARD.EDU (Harvard University) HARVARD
- 128.111.24.40 HUB.UCSB.EDU (Univ. Of Calif-Santa Barbara) ?
- 128.115.14.1 LLL-WINKEN.LLNL.GOV (Lawrence Livermore Labratories) -
- 128.143.2.7 UVAARPA.VIRGINIA.EDU (University of Virginia) ?
- 128.148.128.40 BROWNVM.BROWN.EDU (Brown University) BROWN
- 128.163.1.5 UKCC.UKY.EDU (University of Kentucky) UKCC
- 128.183.10.4 NSSDCA.GSFC.NASA.GOV (Goddard Space Flight Center [NASA])-
- 128.186.4.18 RAI.CC.FSU.EDU (Florida State University) FSU
- 128.206.1.1 UMCVMB.MISSOURI.EDU (Univ. of Missouri-Columbia) UMCVMB
- 128.208.1.15 MAX.ACS.WASHINGTON.EDU (University of Washington) MAX
- 128.228.1.2 CUNYVM.CUNY.EDU (City University of New York) CUNYVM
- 129.10.1.6 NUHUB.ACS.NORTHEASTERN.EDU (Northeastern University) NUHUB
- 131.151.1.4 UMRVMA.UMR.EDU (University of Missouri-Rolla) UMRVMA
- 192.9.9.1 SUN.COM (Sun Microsystems, Inc.) -
- 192.33.18.30 VM1.NODAK.EDU (North Dakota State Univ.) NDSUVM1
- 192.33.18.50 PLAINS.NODAK.EDU (North Dakota State Univ.) NDSUVAX
-
- Please Note: Not every system on BITnet has an IP address. Likewise, not
- every system that has an IP address is on BITnet. Also, while
- some locations like Stanford University may have nodes on BITnet
- and have hosts on the IP as well, this does not neccessarily
- imply that the systems on BITnet and on IP (the EDU domain in
- this case) are the same systems.
-
- Attempts to gain unauthorized access to systems on the Internet
- are not tolerated and is legally a federal offense. At some
- hosts, they take this very seriously, especially the government
- hosts such as NASA's Goddard Space Flight Center, where they do
- not mind telling you so at the main prompt when you connect to
- their system.
-
- However, some nodes are public access to an extent. The DDN
- Network Information Center can be used by anyone. The server and
- database there have proven to be an invaluable source of
- information when locating people, systems, and other information
- that is related to the Internet.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- Telnet
-
- ~~~~~~
- Remote login refers to logging in to a remote computer from a terminal
- connected to a local computer. Telnet is the standard protocol in the DOD
- Protocol Suite for accomplishing this. The "rlogin" program, provided with
- Berkeley UNIX systems and some other systems, also enables remote login.
-
- For purposes of discussion, the "local computer" is the computer to which your
- terminal is directly connected while the "remote computer" is the computer on
- the network to which you are communicating and to which your terminal is *NOT*
- directly connected.
-
- Since some computers use a different method of attaching terminals to
- computers, a better definition would be the following: The "local computer" is
- the computer that you are currently using and the "remote computer" is the
- computer on the network with which you are or will be communicating. Note that
- the terms "host" and "computer" are synonymous in the following discussion.
-
- To use Telnet, simply enter the command: TELNET
-
- The prompt that Telnet gives is: Telnet>
-
- (However, you can specify where you want to Telnet to immediately and bypass
- the the prompts and other delays by issuing the command: TELNET [location].)
-
- There is help available by typing in ?. This prints a list of all the valid
- subcommands that Telnet provides with a one-line explanation.
-
- Telnet> ?
-
- To connect to to another computer, use the open subcommand to open a connection
- to that computer. For example, to connect to the host "UMCVMB.MISSOURI.EDU",
- do "open umcvmb.missouri.edu"
-
- Telnet will resolve (i.e. Translate, the hostname "umcvmb.missouri.edu" into an
- IP address and will send a packet to that host requesting login. If the remote
- host decides to let you attempt a login, it prompts you for your username and
- password. If the host does not respond, Telnet will "time out" (i.e. Wait for
- a reasonable amount of time such as 20 seconds) and then terminate with a
- message such as "Host not responding."
-
- If your computer does not have an entry for a remote host in its hosttable and
- it cannot resolve the name, you can use the IP address explicitly in the telnet
- command. For example,
-
- TELNET 26.0.0.73 (Note: This is the IP address for the DDN Network Information
- Center [SRI-NIC.ARPA])
-
- If you are successful in logging in, your terminal is connected to the remote
- host. For all intents and purposes, your terminal is directly hard-wired to
- that host and you should be able to do anything on your remote terminal that
- you can do at any local terminal. There are a few exceptions to this rule,
- however.
-
- Telnet provides a network escape character, such as CONTROL-T. You can find out
- what the escape character is by entering the "status" subcommand:
-
- Telnet> status
-
- You can change the escape character by entering the "escape" subcommand:
-
- Telnet> escape
-
- When you type in the escape character, the Telnet prompt returns to your screen
- and you can enter subcommands. For example, to break the connection, which
- usually logs you off the remote host, enter the subcommand "quit":
-
- Telnet> quit
-
- Your Telnet connection usually breaks when you log off the remote host, so the
- "quit" subcommand is not usually used to log off.
-
- When you are logged in to a remote computer via Telnet, remember that there is
- a time delay between your local computer and the remote one. This often
- becomes apparent to users when scrolling a long file across the terminal screen
- nd they wish to cancel the scrolling by typing CONTROL-C or something similar.
- After typing the special control character, the scrolling continues. The
- special control character takes a certain amount of time to reach the remote
- computer which is still scrolling information. Thus response from the remote
- computer will not likely be as quick as response from a local computer.
-
- Once you are remotely logged on, the computer you are logged on to effectively
- becomes your "local computer," even though your original "local computer" still
- considers you logged on. You can log on to a third computer which would then
- become your "local computer" and so on. As you log out of each session, your
- previous session becomes active again.
-
-
- File Transfer
- ~~~~~~~~~~~~~
-
- FTP is the program that allows files to be sent from one computer to another.
- "FTP" stands for "File Transfer Protocol".
-
- When you start using FTP, a communications channel with another computer on the
- network is opened. For example, to start using FTP and initiate a file
- transfer session with a computer on the network called "UMCVMB", you would
- issue the following subcommand:
-
- FTP UMCVMB.MISSOURI.EDU
-
- Host "UMCVMB" will prompt you for an account name and password. If your login
- is correct, FTP will tell you so, otherwise it will say "login incorrect." Try
- again or abort the FTP program. (This is usually done by typing a special
- control character such as CONTROL-C. The "program abort" character varies from
- system to system.)
-
- Next you will see the FTP prompt, which is:
-
- Ftp>
-
- There are a number of subcommands of FTP. The subcommand "?" will list these
- commands and a brief description of each one.
-
- You can initiate a file transfer in either direction with FTP, either from the
- remote host or to the remote host. The "get" subcommand initiates a file
- transfer from the remote host (i.e. Tells the remote computer to send the file
- to the local computer [the one on which you issued the "ftp" command]). Simply
- enter "get" and FTP will prompt you for the remote host's file name and the
- (new) local host's file name. Example:
-
- Ftp> get
- Remote file name?
- theirfile
- local file name?
- myfile
-
- ou can abbreviate this by typing both file names on the same line as the "get"
- subcommand. If you do not specify a local file name, the new local file will
- be called the same thing as the remote file. Valid FTP subcommands to get a
- file include the following:
-
- get theirfile myfile
- get doc.x25
-
- The "put" subcommand works in a similar fashion and is used to send a file from
- the local computer to the remote computer. Enter the command "put" and FTP
- will prompt you for the local file name and then the remote file name. If the
- transfer cannot be done because the file doesn't exist or for some other
- reason, FTP will print an error message.
-
- There are a number of other subcommands in FTP that allow you to do many more
- things. Not all of these are standard so consult your local documentation or
- type a question mark at the FTP prompt. Some functions often built into FTP
- include the ability to look at files before getting or putting them, the
- ability to change directories, the ability to delete files on the remote
- computer, and the ability to list the directory on the remote host.
-
- An intriguing capability of many FTP implementations is "third party
- transfers." For example, if you are logged on computer A and you want to cause
- computer B to send a file to computer C, you can use FTP to connect to computer
- B and use the "rmtsend" command. Of course, you have to know usernames and
- passwords on all three computers, since FTP never allows you to peek into
- someone's directory and files unless you know their username and password.
-
- The "cd" subcommand changes your working directory on the remote host. The
- "lcd" subcommand changes the directory on the local host. For UNIX systems,
- the meaning of these subcommands is obvious. Other systems, especially those
- that do not have directory-structured file system, may not implement these
- commands or may implement them in a different manner.
-
- The "dir" and "ls" subcommands do the same thing, namely list the files in the
- working directory of of the remote host.
-
- The "list" subcommand shows the contents of a file without actually putting it
- into a file on the local computer. This would be helpful if you just wanted to
- inspect a file. You could interrupt it before it reached the end of the file
- by typing CONTROL-C or some other special character. This is dependent on your
- FTP implementation.
-
- The "delete" command can delete files on the remote host. You can also make
- and remove directories on the remote host with "mkdir" and "rmdir". The
- "status" subcommand will tell you if you are connected and with whom and what
- the state of all your options are.
-
- If you are transferring binary files or files with any non-printable
- characters, turn binary mode on by entering the "binary" subcommand:
-
- binary
-
- To resume non-binary transfers, enter the "ascii" subcommand.
-
- Transferring a number of files can be done easily by using "mput" (multiple
- put) and "mget" (multiple get). For example, to get every file in a particular
- directory, first issue a "cd" command to change to that directory and then an
- "mget" command with an asterisk to indicate every file:
-
- cd somedirectory
- mget *
-
- When you are done, use the "close" subcommand to break the communications link.
- You will still be in FTP, so you must use the "bye" subcommand to exit FTP and
- return to the command level. The "quit" subcommand will close the connection
- and exit from FTP at the same time.
-
-
- Mail
- ~~~~
- Mail is the simplest network facility to use in many ways. All you have to do
- is to create your message, which can be done with a file editor or on the spur
- of the moment, and then send it. Unlike FTP and Telnet, you do not need to
- know the password of the username on the remote computer. This is so because
- you cannot change or access the files of the remote user nor can you use their
- account to run programs. All you can do is to send a message.
-
- There is probably a program on your local computer which does mail between
- users on that computer. Such a program is called a mailer. This may or may
- not be the way to send or receive mail from other computers on the network,
- although integrated mailers are more and more common. UNIX mailers will be
- used as an example in this discussion.
-
- Note that the protocol which is used to send and receive mail over a TCP/IP
- network is called SMTP, the "Simple Mail Transfer Protocol." Typically, you
- will not use any program called SMTP, but rather your local mail program.
-
- UNIX mailers are usually used by invoking a program named "mail". To receive
- new mail, simply type "mail".
-
- There are several varieties of UNIX mailers in existence. Consult your local
- documentation for details. For example, the command "man mail" prints out the
- manual pages for the mail program on your computer.
-
- To send mail, you usually specify the address of the recipient on the mail
- command. For example: "mail knight@umcvmb.missouri.edu" will send the
- following message to username "knight" on host "umcvmb".
-
- You can usually type in your message one line at a time, pressing RETURN after
- each line and typing CONTROL-D to end the message. Other facilities to include
- already-existing files sometimes exist. For example, Berkeley UNIXes allow you
- to enter commands similar to the following to include a file in your current
- mail message:
-
- r myfile
-
- In this example, the contents of "myfile" are inserted into the message at this
- point.
-
- Most UNIX systems allow you to send a file through the mail by using input
- redirection. For example:
-
- mail knight@umcvmb.missouri.edu < myfile
-
- In this example, the contents of "myfile" are sent as a message to "knight" on
- "umcvmb."
-
- Note that in many UNIX systems the only distinction between mail bound for
- another user on the same computer and another user on a remote computer is
- simply the address specified. That is, there is no hostname for local
- recipients. Otherwise, mail functions in exactly the same way. This is common
- for integrated mail packages. The system knows whether to send the mail
- locally or through the network based on the address and the user is shielded
- from any other details.
-
-
- "The Quest For Knowledge Is Without End..."
- _______________________________________________________________________________
-
-
- Downloaded From P-80 International Information Systems 304-744-2253
-