💾 Archived View for spam.works › mirrors › textfiles › internet › internet.tour captured on 2023-11-14 at 10:24:18.

View Raw

More Information

⬅️ Previous capture (2023-06-14)

-=-=-=-=-=-=-

The Internet is a worldwide collection of thousands of computer 
networks  that can intercommunicate.  All of them speak the same 
?language,? namely the TCP/IP protocol suite.  Users of any of the 
Internet networks can reach users on any of the other networks.  The 
Internet started with the ARPANET, but now includes such networks as 
NSFNET, NEARNet, and others.  Many other networks, such as BITNET, are 
tied to the Internet but are not an integral part of it.  Approximately 
one million people use the Internet daily. 


About the Internet

The Internet is a worldwide collection of thousands of computer 
networks  that can intercommunicate.  All of them speak the same 
?language,? namely the TCP/IP protocol suite.  Users of any of the 
Internet networks can reach users on any of the other networks.  The 
Internet started with the ARPANET, but now includes such networks as 
NSFNET, NEARNet, and others.  Many other networks, such as BITNET and 
SPAN, are tied to the Internet, but are not an integral part of it.  
Approximately one million people use the Internet daily. 

The ancestry of the Internet is rooted in the ARPANET, a network 
developed by the Advanced Research Projects Agency (ARPA, see 
DARPA) to aid in the sharing of information and resources among 
researchers.  The ARPANET, which was made operational in 1969, 
became an essential tool for remote login, file transfer, electronic 
mail and the sharing of information by interest groups.  

    
History of the Internet

The ancestry of the Internet is rooted in the ARPANET, a network 
developed by the Advanced Research Projects Agency (ARPA, see 
DARPA) to aid in the sharing of information and resources among 
researchers.  The ARPANET, which was made operational in 1969, 
became an essential tool for remote login, file transfer,  electronic 
mail and the sharing of information by interest groups.  
     
Development of TCP/IP

The ARPANET was growing in size while other networks were being 
developed.  Soon the architects of the ARPANET recognized the need to 
communicate with other networks.  They also realized that they needed 
new protocols (the NCP protocol suite that they had developed wasn?t 
able to cope with the diverse characteristics of other networks).  
Therefore they designed a new architecture and protocol suite called 
the ARPA Internet; the protocol suite was called TCP/IP.




Start of the Internet

The Internet first became operational in 1983, when the ARPANET was 
split into two separate networks, MILNET and ARPANET, which together 
formed the Internet.  Each was given a network number, and gateways 
were installed to provide packet forwarding between them. 

TCP/IP in the Internet

When the ARPANET was split to form the Internet, the Defense 
Communications Agency (DCA) mandated the use of TCP/IP for all 
ARPANET hosts, and enforced this by modifying the packet switching 
software.  As a result, all ARPANET hosts had to begin using TCP/IP 
protocols and interacting with the Internet environment. 

This meant that more networks and gateways could be added to the 
Internet without any effect on the existing network.

Growth of the Internet

Since its creation in 1983, the Internet  has grown exponentially in 
terms of numbers of networks connected to it.  By 1985, the number 
was approxiately one hundred.  By 1987, the number had grown to two 
hundred; in 1989, it exceeded five hundred.  According to tables kept at 
the DDN Network Information Center (DDN NIC), there were 2,218 
networks connected to the Internet as of January 1990.

As the Internet has grown, its underpinnings have changed.  ARPANET 
and MILNET continued to grow, and other backbone networks were added 
to the Internet.  One of these was CSNET, established in 1981 to 
provide for collaboration between computer and engineering 
researchers.  CSNET provided Internet access from sites not served by 
ARPANET and MILNET.  Today, CSNET has expanded to include 
institutions involved in science and engineering, and is one of several 
midlevel networks that make up NSFNET.





     
Internet Backbone Networks
    
NSFNET
 
NSFNET began providing backbone Internet service in July 1986 to 
permit supercomputer centers (see Computing Centers) to 
communicate.  NSFNET's scope has since expanded, and today it is the 
U.S. national research network.  It has extended to the academic and 
commercial communities the TCP/IP services that were previously 
available to government researchers.    NSFNET links midlevel 
networks, which in turn connect networks at universities and 
commercial enterprises.  Therefore, NSFNET, like the Internet of which 
it forms a large part, is itself a network of networks.

Decommissioning the ARPANET

As NSFNET has grown to handle much of the interconnection load of the 
Internet, other networks have outgrown their usefulness and been 
eliminated.  A milestone in this area was the decommissioning of the 
ARPANET in June 1990.  The Defense Communications Agency shut down 
the ARPANET because its functions had been subsumed by the midlevel 
networks and NSFNET.  Perhaps the greatest testimony to the 
architecture of the Internet is that when ARPANET, the network from 
which the Internet grew, was turned off, no one but network staff was 
aware of it.

    
Poems about the Internet

The Big Bang, or                   by Leonard
The Birth of the ARPANET        Kleinrock  
                                                   
Requiem for the ARPANET   by Vint Cerf

Rosencrantz and Ethernet   by Vint Cerf

Untitled                             by Barry Boehm
 


The Big Bang 
(or The Birth of the ARPANET)

by Leonard Kleinrock

It was back in '67 that the clan agreed to meet.
The gangsters and the planners were a breed  
     damned hard to beat.
The goal we set was honest and the need was clear 
     to all:
Connect those big old mainframes and the minis, 
     lest they fall.

The spec was set quite rigid:  it must work without a
      hitch.
It should stand a single failure with an unattended 
     switch.
Files at hefty throughput 'cross the ARPANET 
     must zip.
Send the interactive traffic on a quarter-second trip.

The spec went out to bidders and t'was BBN that  
     won.
They worked on soft and hardware and they all got  
     paid for fun.
We decided that the first node would be we who   
     are  your hosts
And so today you're gathered here while UCLA  
     boasts.

I suspect you might be asking "What means first  
     node on the net?"
Well frankly, it meant trouble, 'specially since no  
     specs were set. 
For you see the interface between the nascent  
     IMP and host
Was a confidential secret from us folks on the   
     West Coast.

BBN had promised that the IMP was running late.
We welcomed any slippage in the deadly   
     scheduled date.
But one day after Labor Day, it was plopped down  
      at our gate!
Those dirty rotten scoundrels sent the damned  
     thing out air freight!

As I recall that Tuesday, it makes me want to cry.
Everybody's brother came to blame the other guy!
Folks were there from ARPA, GTE, and Honeywell.
UCLA and ATT and all were scared as hell.

We cautiously connected and the bits began to flow.
The pieces really functioned?just why I still don't  
     know.
Messages were moving pretty well by Wednesday  
     morn.
All the rest is history?packet switching had been  
     born!






     
Rosencrantz and Ethernet

by Vint Cerf

All the world's a net!  And all the data in it merely 
     packets
Come to store-and-forward in the queues a while   
     and then are
Heard no more.  'Tis a network waiting to be 
     switched!

To switch or not to switch?  That is the question.  
     Whether 
'Tis wiser in the net to suffer the store and forward 
     of
Stochastic networks or to raise up circuits against a 
     sea
Of packets and, by dedication, serve them.


To net, to switch.  To switch, perchance to slip!
Aye, there's the rub.  For in that choice of switch,
What loops may lurk, when we have shuffled 
     through
This Banyan net?  Puzzles the will, initiates 
     symposia,
Stirs endless debate and gives rise to uncontrolled
Flights of poetry beyond recompense!
                                                                                      

     
Untitled

by Barry Boehm (stanzas 1 and 2)

     Paul Baran came out of the wood
     With a message first misunderstood
     But despite dangers lurking
     The IMP's were soon working
     And ARPA did see it was good.

     So in place of our early myopia
     We now have a net cornucopia
     With IMPs, TIPs, and LANs
     Wideband VANs, MANs, and WANs
     And prospects of World Net Utopia.
     
Requiem for the ARPANET

by Vint Cerf

Like distant islands sundered by the sea,
We had no sense of one community.
We lived and worked apart and rarely knew
That others searched with us for knowledge, too.

Distant ARPA spurred us in our quest
And for our part we worked and put to test
New thoughts and theories of computing art;
We deemed it science not, but made a start.

Each time a new machine was built and sold,
We'd add it to our list of needs and told
Our source of funds "Alas! Our knowledge loom
Will halt 'til it's in our computer room."

Even ARPA with its vast resources
Could not buy us all new teams of horses
Every year with which to run the race.
Not even ARPA could keep up that pace!

But, could these new resources not be  shared?
Let links be built; machines and men be paired!
Let distance be no barrier! They set
That goal: design and built the ARPANET!

As so it was in nineteen sixty-nine,
A net arose of BBN design.
No circuit switches these, nor net complete
But something new: a packet switching fleet.

The first node occupied UCLA
Where protocols and measurement would play
A major role in shaping how the net
Would rise to meet the challenges unmet.

The second node, the NIC, was soon  installed.
The Network Info Center, it was called.
Hosts and users, services were touted:
To the NIC was network knowledge routed.

Nodes three and four soon joined the other two:
UCSB and UTAH come on cue.
To monitor it all around the clock
At BBN, they built and ran the NOC.

A protocol was built for host-to-host
Communication.  Running coast-to-coast,
Below the TELNET and the FTP,
We called this protocol the NCP.

The big surprise for most of us, although
Some said they guessed, was another 
     protocol
Used more than all the rest to shuttle
Mail in content flaming or most subtle.

When we convened the first I Triple C,
The ARPANET was shown for all to see.
A watershed in packet switching art,
this demo played an overwhelming part.

Within three years the net had grown so 
     large
We had to ask that DCA take charge
To operate a system guaranteed
For R&D and military need.

Exploring other packet switching modes,
we built the first spread spectrum mobile 
     nodes.
The Packet Radio, the mobile net,
worked on the ground and even in a jet.

Deployed at SAC and Eighteenth Airborne Corps,
The Packet Radio unlocked the door
to what we now know as the Internet.
The driver for it all was PRNET.

The Packet Satellite, another new
technique, was added to the net milieu.
And then to shed more light upon the dark,
there came the Ethernet from Xerox PARC.

To these we added yet another thing
from MIT: a local token ring.
We saw the local net techniques compound
until the list could easily confound.

The Internet foundation thus was laid.
Its protocols from many sources made.
And through it all the ARPANET grew more;
It was, for Internet, the central core.

The hardware of the net was changing, too.
The Honeywell was first, and then the SUE, 
which forms the heart of Pluribus today
though where this platform sits one cannot say.

The next big change was called the MBB.
It emulated Honeywell, you see,
so one by one they modified each node,
by means of closely written microcode.

Now known as 30 prefixed with a C,
these nodes are everywhere from A to Z.
The European MINET too was full
of nodes like these from Mons to Istanbul.

The second Autodin was long desired
but once accepted instantly expired.
Then to the rescue rode the ARPANET!
And soon the MILNET by its side was set.

By nineteen-eighty DoD opened
its data networks soon must be aligned
with Internetwork protocols, to wit:
by eighty-three the TCP was IT!

Soon every host that sat on ARPANET
became a gateway to a local net.
By eighty-six new long-haul nets appeared
as ARPANET its second decade neared.

The NSFNET and its entourage
began a stately national dressage
and soon was galloping at T1 speed
outdistancing its aging peer indeed.

And so, at last, we knew its course had run,
our faithful servant, ARPANET, was done.
It was the first, and being first, was best,
but now we lay it down to ever rest.

Now pause with me a moment, shed some 
     tears.
For auld lang syne, for love, for years and years
of faithful service, duty done, I weep.
Lay down thy packet, now, O friend, and sleep.

(for ARPA, see DARPA; for the NIC, see DDN NIC; for TCP, see TCP/IP)

Internet Networks

CREN/CSNET (Computer and Science Network)

DDN (Defense Data Net )

ESNet (Energy Sciences Network)

NSFNET (National Science Foundation Network)

NASA Science Network

The Internet communicates via gateways with other networks such as 
CompuServe, MCI Mail, BITNET, FIDONet, UUNET, and USENET.  The 
Internet has several component networks (which themselves include 
other networks):

?  CREN/CSNET 

?  DDN  (Defense Data Net )

?  ESNET (Energy Sciences Network)

?  NASA Science Internet

?  NSFNET  (National Science Foundation 
    Network)

?  Terrestrial Wideband Network 





     
Internet Networks

The Internet communicates via gateways with networks outside the 
Internet, such as CompuServe, MCI Mail, BITNET, FIDONet, UUNET, and 
USENET.  Within the Internet there are several smaller networks (which 
themselves include other networks):

?  CREN/CSNET (Computer and Science 
    Network)

?  DDN  (Defense Data Net )

?  ESNET (Energy Sciences Network)

?  NASA Science Network

?  NSFNET  (National Science Foundation 
    Network)


NSFNET Mid-Level Wide Area Networks

BARRNET (Bay Area Regional Research Network)

CERFNET  (California Education & Research Federation Network)

CICNET (Committee on Institutional Cooperation Network)

JvNCNET (JvNCNet Northeast Research Regional Network)

LOS NETTOS (Greater Los Angeles Area Network)

MICHNET  

MIDNET (Midwestern States Network)

MRNET  (Minnesota Regional Network)

NCSANET  (National Center for Supercomputing Applications Network)

NEARNET  (New England Academic & Research Network)

NEVADANET

NORTHWESTNET (Northwestern States Network)

NYSERNET (New York State Education & Research Network)

OARNET (Ohio Academic Resources Network)

PREPNET (Pennsylvania Research and Economic Partnership Network)

PSCNET (Pittsburgh Supercomputing Center Network)

PSINET 

SDSCNET (San Diego Supercomputer Center Network)

SESQUINET (Texas Sesquicentennial Network)

SURANET (Southeastern Universities Research Association Network)

THENET (The Texas Higher Education Network)

USAN  (NCAR's University Satellite Network)

VERNET (Virginia Education and Research Network)

WESTNET (Southwestern States Network)











CREN/CSNET

CSNET: The Computer + Science Network
is an international data communications network that supports 
research and education.  Members of CSNET include universities, 
colleges, government agencies, non-profit organizations, and industrial 
research laboratories.  CSNET is affiliated with twelve foreign 
university networks.

CSNET and BITNET are merged into a single organization, CREN, the 
Corporation for Research and Educational Networking.

Address:
     CREN/CSNET Coordination and
           Information Center
    BBN Systems and Technologies
    10 Moulton St.
    Cambridge, MA  02138 USA

E-mail:  cic@sh.cs.net

Phone:  (617)873-2777 [CSNET hotline]
     
DDN

The Defense Data Network is a worldwide operational communications 
network serving the US Department of Defense.  Defense Data Network.  

Address: 
       SRI International
       Network Information Systems Center
       Room EJ291
       333 Ravenswood Avenue
       Menlo Park, CA 94015

E-mail:  nic@noc.ddn.mil 

Phone: 1-800-235-3155 or (415) 859-3695

     

ESNET

The Energy Sciences Network is a computer data communications 
network managed and funded by the Department of Energy Office of 
Energy Research (DOE/OER).  ESnet is intended for use by scientific 
collaborators throughout ER programs.
          
ESnet is installed and operated by the National Energy Supercomputer 
Center
(NERSC), formerly known as the National Magnetic Fusion Energy 
Computer Center
(NMFECC), which is located at Lawrence Livermore National Laboratory 
(LLNL) in
California.  NERSC provides user
services for ESnet.
          
Address:
     NERSC
     L-561
     Lawrence Livermore Labs
     Livermore, Ca. 94550
          
E-mail: info@es.net
          
Phone:  1-800-33-ESNET
          
Contacts:
          
Jim Leighton, 415-422-4025, jfl@es.net, Network Manager
          
Tony Hain, 415-422-4200, hain@eagle.es.net, Associate Network 
Manager
          
Bob Aiken, 415-422-4474, aiken@es.net, Network Information and 
Services Group 
        

NASA Science Internet

The NASA Science Internet (NSI) supports scientists and flight projects 
funded by NASA's Office of Space Science and Applications (OSSA).  
Users include NASA sites, and government facilities, research, and 
academic sites conducting NASA-funded research.  The NSI is a NASA-
wide network  with hubs at several NASA centers.
             
Address:
     Network Information Center
     NASA Science Network
     MS 233-18
     NASA Ames Research Center
     Moffett Field, CA  94035
             
E-mail: nsnnic@nsipo.nasa.gov
             
Phone: (415) 694-5859 or (FTS) 464-5859
             
     
TERRESTRIAL WIDEBAND NETWORK

The Terrestrial Wideband Network supports research in high-speed 
networking, provides connectivity among academic and government 
sites, and supports a testbed for Internet protocol development and 
experimentation with applications.  It supports a research environment 
for multimedia conferencing and voice/video conferencing using 
gateways which use a real-time connection-oriented protocol over a 
connectionless network.
             
Address:
     Terrestrial Wideband Network
     c/o BBN Systems and Technologies
     10 Moulton St.
     Cambridge, Massachusetts 02138
     Attn: Karen Seo
             
E-mail:  wbhelp@bbn.com
             
Phone: (617) 873-3427 (Terrestrial Wideband Network hotline)
NSFNET

The National Science Foundation Network is the backbone network of 
the U.S. National Science Foundation (NSF).  It interconnects mid-level 
networks and other resources throughout the United States.  The 
network may be used by researchers in general, according to NSF 
guidelines.
             
Address:
     Merit Computer Network
     1075 Beal Avenue
     Ann Arbor, Michigan 48109
             
E-mail: nsfnet-info@merit.edu
             
Phone: 1-800-66-MERIT
             
Contacts:    For information about becoming a part of NSFNET, contact 
the NSF Network Service Center (NNSC) at BBN:

     NNSC
     Bolt Beranek and Newman Inc.
     10 Moulton St.
     Cambridge, MA  02138
     nnsc@nnsc.nsf.net
     (617) 873-3400     

For information about NSFNET contact NSF, MERIT, or the NNSC (above):
At NSF:
             
     Steve Wolff      DNCRI Director
     (202) 357-9717   swolff@note.nsf.gov     
     Jane Caviness  NSFNET Deputy Divison Director
     (202) 357-9717   jcavines@note.nsf.gov  
     Dan van Belleghem  NSFNET operations and  general questions
             
At Merit:

Eric Aupperle  Project Director  (313) 763-4897    eaupperle@merit.edu     
Hans-Werner Braun  Principal Investigator  (313) 763-4897  hwb@merit.edu   
BARRNet

The Bay Area Regional Research Network is the Northern California 
regional hub of the NSFNET.  BARRNet members include universities, 
government and private research laboratories, and corporate affiliates.
             
Address:
     Pine Hall, Rm. 115
     Stanford University
     Stanford, CA 94305-4122
             
Email: info@nic.barrnet.net
             
Phone: (415) 725-1790
             
Contacts:
             
     William H. Yundt, Executive Director
     Pine Hall Rm. 115
     Stanford University
     Stanford, CA 94305-4122
     gd.why@forsythe.stanford.edu
     (415) 723-3104
             
     Philip Almquist, Technical Comittee Chair
     Pine Hall, Rm. 115
     Stanford University
     Stanford, CA 94305-4122
     almquist@jessica.stanford.edu
     (415) 723-2229
             
     Ron Roberts, Network Operating Center  Manager
     Business hours:         (415) 723-7360
     After hours/weekends:   (415) 723-1611        
     barrnet-noc@nic.barrnet.net    
             

CERFNET

The California Education and Research Federation Network, CERFnet, is 
a regional network that operates throughout California.  CERFnet 
membership includes universities, colleges, industrial and government 
facilities, hospitals, and libraries.
             
Address:
             
     CERFnet
     c/o San Diego Supercomputer Center
     P. O. Box 85608
     San Diego, California 92186-9784
             
Email: help@cerf.net
             
Phone: (619) 534-5087
             
Contact:
             
        Karen Armstrong McKelvey
        mckelvey@sds.sdsc.edu

CICNet

CICNet is a regional network serving a seven-state region of the 
midwestern United States.  It connects the members of the Big Ten and 
the University of Chicago, as well as corporate and nonprofit 
organizations. 
             
Address:
       CICNet, Inc.
       2901 Hubbard Drive, Pod G
       Ann Arbor, MI 48105
             
E-mail:  info@cic.net
             
Phone: (313) 998-6103 


JvNCnet

JvNCnet, the North East Research Regional Network, connects research 
organizations concentrated in the Northeastern United States, with 
access to the NSFNET backbone  and with international connections to 
several Scandinavian countries (Norway, Finland, Iceland, Sweden and 
Denmark), and the United Kingdom.
             
Address:
     JvNCnet
     P.O. Box 3717
     Princeton, N.J. 08543
             
E-mail: nisc@nisc.jvnc.net
             
Phone: (609) 520-2000 [Sergio Heker]
             
 Contact: 
 The JvNCnet Network Coordinator:
nisc@nisc.jvnc.net or (609) 520-2000.
     
Los Nettos
             
Los Nettos is a regional network in the Los Angeles area.  It may be 
used for any educational or research purpose.  The member 
organizations are universities and research laboratories.  The 
Information Sciences Institute (ISI) of the University of Southern 
California (USC) acts as the agent for Los Nettos.
             
Address:
     Los Nettos 
     c/o Ann Westine
     USC/Information Sciences Institute
     4676 Admiralty Way
     Marina del Rey, California  90292
             
E-mail:  los-nettos-request@isi.edu
             
Phone:  (213) 822-1511 (Ann Westine)
             
MichNet

MichNet is a statewide network operated by Merit.  The network plans 
to reach out beyond Merit's traditional audience of four-year, publically 
supported colleges and universities in Michigan.
             
E-mail:  Merit_Computer_Network@um.cc.umich.edu
             
Phone: (412)268-7870
             
Contact: Eric Aupperle
                   (313) 764-9423
                   eaupperle@merit.edu

Midnet
            
MIDnet is a regional computer network for the seven midwestern 
states.  The network provides researchers access to supercomputers 
and is a vehicle for exchanging information among researchers.       
             
Contact:    Dale Finkelson     
             
Phone: (402) 472-5032
             
E-mail: dmf@westie.unl.edu
             






     
MRNet

The Minnesota Regional Network (MRNet) is an NSF regional network 
which provides communications between the nationwide NSFNET and 
researchers at the Minnesota Supercomputer Center, the University of 
Minnesota, and other educational institutions.  MRNet also provides 
NSFNET access to several Minnesota organizations involved in high-
technology research.
             
Address:
     MRNet
     c/o Mahlon Stacy
     Mayo Foundation
     Medical Sciences 1-18
     Rochester, MN 55905
             
Technical:
     MRNet
     c/o Jeff Wabik
     Minnesota Supercomputer Center
     1200 Washington Street
     Minneapolis, MN 55415
             
E-mail: mrnet@nic.mr.net
             
Phone:
     (507) 284-4558  (Mahlon Stacy)
     (612) 626-1888  (Jeff Wabik)
 

     
NCSAnet

NCSAnet is a regional supercomputing network that connects university 
and government research sites primarily located in Illinois, Wisconsin, 
and Indiana.  The NCSAnet private corporate network is national in 
scale.  
             
Address:
     NCSAnet
     attn: Charlie Catlett
     National Center for Supercomputing        
           Applications
     605 E. Springfield Ave.
     Champaign, IL  61820
             
Email: network@ncsa.uiuc.edu
             
Phone: (217) 244-8297 [NCSA Networking Office]
      
NEARNET

The New England Academic and Research 
Network, NEARnet, is a high-speed network of academic, industrial, 
government, and nonprofit organizations in New England.  
             
Address:
     NEARnet
     c/o BBN Systems and Technologies Corp.
     10 Moulton St.
     Cambridge, MA  02138
     Attn: John Rugo
             
E-mail: nearnet-staff@bbn.com
             
Phone: (617) 873-8730 [NEARnet hotline]
             
NevadaNet

NevadaNet is a state-wide network and currently serves the Desert 
Research Institute, the University of Nevada, Reno and the University of 
Nevada, Las Vegas.   
             
Address:
             
     NevadaNet
     University of Nevada System   
          Computing Services
     4505 Maryland Parkway
     Las Vegas, Nevada   89154
             
E-mail:  info@nevada.edu
             
Phone:  (702) 739-3557  [Jim Williams]
             
Contacts:
             
     NOC Manager: Van Weddle     
     702-739-3883
     weddle@uns-helios.nevada.edu
             
     NIC Manager:    Becky Seibert          
     702-784-4343
     seibert@unssun.nevada.edu    
             






     
NorthWestNet

NorthWestNet (NWNet) is a mid-level network of the National Science 
Foundation Network (NSFNET).  NWNet provides communication with 
NSFNET for research centers throughout the Northwest, including sites 
in Alaska, Idaho, Montana, North Dakota, Oregon, and Washington.  
             
Address:
             
     Administrative:
          Richard Markwood
          Western Interstate Commission on Higher    
                    Education (WICHE)
          P.O. Drawer P
          Boulder, CO 80301-9752
             
     Technical:
          Dan Jordt
          University Networks and Distributed 
                    Computing
          UW, HG-45
          3737 Brooklyn Ave. NE
          Seattle, WA 98105
             
E-mail:
             
Administrative: markwood@vaxf.colorado.edu
Technical: danj@cac.washington.edu
             
Phone:
             
Administrative: (303) 497-0220
Technical: (206) 543-7352
             
Contact:
             
The 24x7 NOC hotline number is (206) 543-5128, or noc@nwnet.net.      
             






     
NYSERNet

NYSERNet is a midlevel network incorporating corporate, academic, and 
government institutions.
             
Address:
     NYSERNet Inc.
     165 Jordan Rd
     Troy, NY  12180
             
E-mail: info@nisc.nyser.net
             
Phone: (518) 283-8860
             

    
OARnet
       
The Ohio Academic Resources Network is the regional network for the 
state of Ohio.  It serves the entire higher education community.
             
E-mail: alison@maverick.osc.edu
             
Phone: (614) 292-9248
             
Contact: Alison Brown
             
     
PSCNet
             
PSCNET is an NSF-sponsored regional research and education network.  
             
E-mail: hastings@morgul.psc.edu
             
Phone: (412) 268-4960
             
Contact:  Eugene Hastings
             

PREPnet

Pennsylvania Research and Economic Partnership Network, PREPnet, is 
a mid-level network serves Pennsylvania.  Organizations operating 
within Pennsylvania involved in education, research, technology 
transfer, or the economic development of Pennsylvania participate.  
             
Address:
     PREPnet
     530 N. Neville Street
     Pittsburgh, PA 15213
             
E-mail: prepnet+@andrew.cmu.edu
             
Phone: (412)268-7870
             
Contacts:
             
Executive Director:  Thomas W. Bajzek, twb+@andrew.cmu.edu
             
NIC Manager:  Marsha L. Perrott, mlp+@andrew.cmu.edu   
                  
PSINet

PSINet is a US-based internetwork available throughout the continental 
US and in Canada, Germany, and Israel.  The PSINet operations center is 
located in Albany NY (another office is located in Santa Clara, 
California).  PSINet provides internetworking services to the NYSERNet 
user community.
             
Address:
     Performance Systems International
     11800 Sunrise Valley Drive - Suite 1100
     Reston, VA 22091
             
E-mail: info@psi.com
             
Phone: 
     (+1-703) 620-6651
     1-800-82psi82
          
SDSCnet

SDSCnet is a network linking academic, industrial, and government 
affiliates with the San Diego Supercomputer Center (SDSC), which 
administers the network, and, by extension, NSFNET. 

Address:
     Paul Love
     San Diego Supercomputer Center
     PO Box 85608
     San Diego, CA 92186-9784

E-mail: loveep@sds.sdsc.edu

Phone: (619)534-5000

   
Sesquinet

Sesquinet is a regional network in Texas.  Its
members include universities, research laboratories, and industrial 
organizations
             
Address:
     Guy Almes
     Dept. of Computer Science
     Rice University
     Houston, Texas  77251-1892
             
E-mail:
     almes@rice.edu [Guy Almes]
     farrell@rice.edu [Farrell Gerbode]
             
Phone:
     (713) 527-6038 [Almes],
     (713) 527-4988 [Gerbode]
             







     
SURAnet

SURAnet is an NSFNET mid-level network.  SURAnet's geographic area 
includes the District of Columbia and thirteen states in the southeast 
US: Alabama, Delaware, Florida, Georgia, Kentucky, Louisiana, Maryland, 
Mississippi, North Carolina, South Carolina, Tennessee, Virginia and 
West Virginia.  While SURA, the parent organization, is a consortium of 
academic organizations, SURAnet members comprise approximately 
two-thirds academic institutions and one-third non-academic sites.
             
Address:
     SURAnet
     Computer Science Center
     University of Maryland
     College Park, MD 20742-2411
     attn: Dr. Jack Hahn
             
E-mail:
     hahn@umd5.umd.edu,      
     suranet-admin@noc.sura.net
             
Phone:  (301)454-5434 [Hahn]
             
Contacts:
             
Network Operations Center (NOC)
     Hours: 0800-1630        Manager: Mark Oros
     Hotline: (301) 454-8055 oros@umd5.umd.edu
             
SURAnet Personnel: suranet-admin@noc.sura.net
NOC Personnel:  noc-staff@noc.sura.net
User Problems:  help@noc.sura.net 
             
 
THEnet

The Texas Higher Education Network  is an NSFNET regional network 
that covers the state of Texas, with a link to the Instituto Tecnologico 
y de Estudios Superiores de Monterrey in Monterrey, Mexico.  Network 
information and operations management are provided through the 
University of Texas (UT) System Office of Telecommunication Services 
(OTS).
             
Address:
     Texas Higher Education Network    
          Information Center
     Commons Building Room 1.156A
     Balcones Research Center
     10100 Burnet Road
     Austin, TX 78758-4497
             
E-mail:
THEnet (DECnet):+THENIC::INFO
BITNET:+INFO@THENIC
Internet:+info@nic.the.net
SPAN:+UTSPAN::THENIC::INFO
             
Phone: (512) 471-2444
               
USAN

USAN (University Satellite Network) is a discipline-oriented network 
serving organizations that do research in the atmospheric and 
oceanographic sciences. Current members are the Universities of 
Miami, Oregon State, Penn State, Maryland, Wisconsin, the Institute of 
Naval Oceanography, the Naval Research Lab, and Woods Hole 
Oceanographic Institute.  The primary use of the network is for access 
to supercomputer facilities at NCAR; secondary use is for access to the 
Internet.
             
Address:
       National Center for Atmospheric Research
       USAN Network/Scientific Computing 
           Division
       1850 Table Mesa Drive
       P.O. Box 3000
       Boulder, CO 80307
             
E-mail: morris@ncar.ucar.edu
             
Phone: (303) 497-1282 [Don Morris]
             
VERNet
             
The Virginia Education and Research Network
is the regional network for the state of Virginia.
             
E-mail: jaj@crash.virginia.edu

Phone: (804) 924-0616
             
Contacts:  Jim Jokl
 Westnet

Westnet is a regional network with nodes in the states of Arizona, 
Colorado, southern Idaho, New Mexico, Utah and Wyoming.  The member 
organizations are universities, research laboratories, and commercial 
organizations. 
             
Addresses:
     Administrative:
          Westnet 
          c/o Patrick J. Burns
          Department of Mechanical Engineering
          Colorado State University
          Fort Collins, CO 80523
             
     Technical:
          Westnet 
          c/o Carol Ward
          3645 Marine Street
          University of Colorado
          Boulder, C0 80309-0455
             
E-mail: westnet@spot.colorado.edu
             
Phone:
        (303) 491-1575 [Pat Burns]
        (303) 492-5860 [Carol Ward]
 Net Etiquette

"Etiquette" means "ticket" in French.  On the Internet, "netiquette" is 
your ticket to "travelling" (by FTP, TELNET, and electronic mail) 
without annoying others.  
             
Electronic mail messages can be informal, but thought should be given 
before they are sent.  Don't send a message until you have taken time to 
review its contents and header.  Make sure your message is correctly 
addressed (that you aren't copying it to a group address unintentionally 
or unwisely), that it is free of typos, and that you really mean what it 
says.  Especially when sending a message to a mailing list or bboard 
(see Interest Groups), try to be clear and consise.
             
Addresses
             
When you send Internet electronic mail, make sure that the "From:" 
field in the headers of your messages can be used to generate replies 
from Internet hosts.  The "From:" field should contain either a full 
Internet address, for example,
             
    From: socrates@agora.edu
             
or your "signature" name plus the Internet address enclosed in "angle 
brackets":
             
 From: "Socrates Jones" <socrates@agora.edu>
             
The following From: fields will prevent people on the Internet from 
replying to your messages:
             
    From: groucho@cs    (No domain name!)
    From: cs!groucho    (uucp address)
    From: cs!groucho@fredonia.edu
         (This might work, but test it!)
             
DECNET, VAX/VMS, and BITNET addresses will also have problems.  
Hopefully, your host gateways to the Internet through a host that 
rewrites addresses so that Internet hosts can reply to them.
             
Check the address of the recipient of your message.  If you are not sure 
of an address, don't guess.  Electronic mail addresses are very 
unforgiving?you must get every character exactly right.
             
The quickest way to check an address is by telephone.  If you can't do 
that, try to find the domain for the organization, and send email to 
postmaster@domain (using the domain name).  Or send a U.S. postal 
letter to the recipient and ask for a reply by electronic mail.  If the 
email address is wrong, you should get the message back eventually, 
but it can take three days to a week to return.
             
Many mailing lists (see Interest Groups) are distributed by 'repeater' 
programs.  For example, when you send a message to unix-
pmdf@sh.cs.net, the message is automatically re-mailed to everyone on 
the mailing list.  

Be careful of this?there is nothing in the name of a repeater list to 
help you distinguish it from a non-repeating address.  Inadvertently 
sending a private message to a mailing list can be embarrassing, and 
someone on the list might "flame" at you.  Always assume a list 
address is a 'repeater'.  Check the header before you send a message to 
make sure there is no extra address in the "To:" or "Cc." field.
             
Many lists (such as dip-people) have a special "-request" address (such 
as dip-people-request@relay.cs.net).  Be careful to send requests to be 
added or dropped from the list to the moderator or the -request 
address, and not to the whole list.
                  
Netiquette for Groups

Check with your system administrator to see what newsgroups are 
available to you and how to use them.  
             
The following is based on The USENET Primer on How to Work With the 
USENET Community   by Gene Spafford
             
Never Forget that the Person on the Other Side is Human
             
Because your interaction with the network is through a computer, it is 
easy to forget that there are people  "out there."  Situations arise 
where emotions erupt into a verbal free-for-all that can lead to hurt 
feelings.  Strongly critical messages on the network are called 
"flames."  The following will help you to avoid sending or provoking 
flames.
             
Try not to say anything to others that you would not say to them in 
person in a room full of people.  Please remember that when you send a 
messsage to a bulletin board or mailing list, people all over the world 
are reading your words.  
             
Don't attack people?try to persuade them by presenting facts.  Cursing 
and abuse only make people less willing to help when you need it.
             
If you are upset at something or someone, wait until you have had a 
chance to calm down and think about it.  A cup of coffee or a good 
night's sleep works wonders on your perspective.  Hasty words create 
more problems than they solve.  
             
Be Careful What You Say About Others
             
Please remember?thousands of people may read your message.  They 
quite possibly include your boss, your friend's  boss, your girlfriend's 
brother's best friend, and one of your father's beer buddies.  
Information posted on the net can come back to haunt you or the person 
you are talking about.
             
Think twice before you post personal information about yourself or 
others. 
             
Be Brief
             
Say what you have to say succinctly and it will have a greater impact.  
Remember that the longer you make your article, the fewer people will 
bother to read it.
             
Your Postings Reflect Upon You?Be Proud of Them
             
Most people will know you only by what you say and how well you say 
it.  Take some time to make sure each posting won't embarrass you 
later.  Minimize your spelling errors and make sure that the article is 
easy to read and to understand.  
             
Use Descriptive Titles
             
The subject line of an article enables people to decide whether or not 
to read your article.  Tell people what the article is about before they 
read it.  A title like "Car for Sale" does not help as much as "66 MG 
Midget for sale: Beaverton OR."  Don't expect people to read your article 
to find out what it's about ? many won't bother.  Some sites truncate 
the length of the subject line to forty characters, so keep your subjects 
short and to the point.
             
Think About Your Audience
             
When you post an article, think about the people you are trying to reach.  
Try to get the most appropriate audience for your message, not the 
widest.
             
Avoid abbreviations and acronyms, if possible, and define the ones you 
use.
             
If your message is of interest to a limited geographic area 
(apartments, car sales, meetings, concerts, etc...), restrict the 
distribution of the message to your local area.  Some areas have special 
newsgroups with geographical limitations?check with your system 
administrator.  
             
If you want to try a test of something, don't use a world-wide 
newsgroup!   There are
newsgroups that are local to your computer or area, which should be 
used for this.  Your system administrator can tell you what they are.
             
Be familiar with the group you are posting to before you post.  
             
You shouldn't post to groups you don't read, or to groups you've only read 
a few articles from?you may not be familiar with the conventions and 
themes of the group.  One normally does not join a conversation by just 
walking up and talking.  Instead, you listen first and then join in if you 
have something pertinent to contribute.
             
Be Careful with Humor and Sarcasm
             
Without the voice inflections and body language of personal 
communications, it's easy for remarks meant to be funny to be
misinterpreted.  Subtle humor tends to get lost.  Take steps to make 
sure that people realize you are trying to be funny.  The net has 
developed a symbol called the smiley face, which looks like this: :-) It 
points out sections of articles with humorous intent.  No matter how 
broad the humor or satire, it is safer to remind people that you are 
being funny.
             
But also be aware that frequently satire is posted without explicit 
indications.  If an article outrages you strongly, ask yourself if it may 
have been unmarked satire.  Several self-proclaimed connoisseurs 
refuse to use smiley faces, so take heed or you may make a temporary 
fool of yourself.
             
Only Post a Message Once
             
Avoid posting messages to more than one group unless you are sure  it 
is appropriate.  If you do post to multiple groups, don't post to each 
group separately.  Instead, specify all the groups on a single message.  
This reduces network overhead and lets people who subscribe to more 
than one of those groups see the message once instead of having to 
wade through each copy.
             
Please "Rotate" Messages With Questionable Content
             
Certain messages may be offensive to some people.  To make sure that 
these messages are not read unless they are explicitly requested, they 
should be encrypted.  The standard encryption method is to rotate each 
letter by thirteen characters so that an "a" becomes an "n."  This is 
known on the network as "rot13"; when you rotate a message the word 
"rot13" should be in the "Subject:" line.  
             
Most of the software used to read network articles has some way of 
encrypting and decrypting messages.  Your system administrator can 
tell you how the software on your system works, or you can use the 
Unix command "tr [a-z][A-Z] [n-z][a-m][N-Z][A-M]".  (Note that some 
versions of Unix don't require the [] in the "tr" command.  In fact, some 
systems will
get upset if you use them in an unquoted manner.  The following should 
work for everyone, but may be shortened on some systems: tr '[a-m][n-
z][A-M][N-Z]'
'[n-z][a-m][N-Z][A-M]'?Don't forget the single quotes!)
             
Summarize What You are Following Up
             
When you are following up someone's article, please summarize the 
parts of the article to which you are responding.  This allows readers 
to appreciate your comments rather than trying to remember what the 
original article said.  It is also possible for your response to reach 
some sites before the original article does!
             
Summarization is best done by including appropriate quotes from the 
original article.  Don't include the entire article, since it will
irritate the people who have already seen it.  Even if you are responding 
to the entire article, summarize only the major points you are 
discussing.
             
When Summarizing, Summarize!
             
When you request information from the network, it is common courtesy 
to report your findings so that others can benefit as well.  The best 
way of doing this is to take all the responses that you received and edit 
them into a single article that is posted to the places where you 
originally posted your question.  Take the time to strip headers, 
combine duplicate information, and write a short summary.  Try to 
credit the information to the people that sent it to you, where possible.
             
Use Mail, Don't Post a Follow-up
             
One of the biggest problems we have on the network is that when 
someone asks a question, many people send out identical answers.  
When this happens, dozens of identical answers pour through the net.  
Mail your answer to the person and suggest that they summarize to the 
network.  This way the net will only see a single copy of the answers, 
no matter how many people answer the question.
             
If you post a question, please remind people to send you the answers by 
mail and at least offer to summarize them to the network.

Read All Follow-ups and Don't Repeat What Has Already Been Said

Before you submit a follow-up to a message, read the rest of the 
messages in the newsgroup to see whether someone has already said 
what you want to say.  If someone has, don't repeat it.

Check the Headers When Following Up

Some software has provisions to specify that follow-ups to an article 
should go to a specific set of newsgroups?possibly different from the 
newsgroups to which the original article was posted.  Sometimes the 
groups chosen for follow-ups are inappropriate, especially as a thread 
of discussion changes with repeated postings.  You should carefully 
check the groups and distributions given in the header and edit them as 
appropriate.  If you change the groups named in the header, or if you 
direct follow-ups to a particular group, say so in the body of the 
message?not everyone reads the headers of postings.

Be Careful About Copyrights and Licenses

Once something is posted onto the network, it is *probably* in the 
public domain unless you own the appropriate rights (for example, if 
you wrote it yourself) and you post it with a valid copyright notice; a 
court would have to decide the specifics and
there are arguments for both sides of the issue.  

Now that the US has ratified the Berne convention, the issue is even 
murkier.  For all practical purposes, though, assume that you 
effectively give up the copyright if you don't put in a notice.  Of course, 
the information becomes public, so you mustn't post trade secrets that 
way.  

Keep in mind that material that is UNIX-related may be restricted by 
the license you or your company signed with AT&T, so be careful not to 
violate it.  You should also be aware that posting movie reviews, song 
lyrics, or anything else published under a copyright could cause you, 
your company, or members of the net community to be held liable for 
damages, so we highly recommend caution in using this material.

Cite Appropriate References

If you are using facts to support a cause, state where they came from.  
Don't take someone else's ideas and use them as your own.  You don't 
want someone pretending that your ideas are theirs; show them the 
same respect.

Mark or Rotate Answers and Spoilers

When you post something (like a movie review that discusses a detail 
of the plot) that might spoil a surprise for other people, please mark 
your message with a warning so that they can skip the message.  
Another alternative would be to use the "rot13" protocol to encrypt the 
message so it cannot be read accidentally.  When you post a message 
with a spoiler in it make sure the word "spoiler" is part of the 
"Subject:" line.

Spelling Flames Considered Harmful
             
Every few months a plague descends on the network called the spelling 
flame.  It starts out when someone posts an article correcting the 
spelling or grammar in some article.  The immediate result seems to be 
for everyone on the net to turn into a sixth grade English teacher and 
pick apart each other's posting.  This is not productive and tends to 
cause people to get angry with each other.
             
It is important to remember that we all make mistakes, and that there 
are many users on the net who use English as a second language.  There 
are also a number of people who suffer from dyslexia and who have 
difficulty noticing their spelling mistakes.  If you feel that you must 
make a comment on the quality of a posting, please do so by mail, not 
on the network.
             
Don't Overdo Signatures
             
Many people can have a signature added to their postings automatically 
by placing it in a file called "$HOME/.signature".  Don't overdo it.  
Signatures can tell the world something about you, but keep them short.  
A signature that is longer than the message itself is considered to be 
in bad taste.  The main purpose of a signature is to help people locate 
you, not to tell your life story.  Every signature should include at least 
your return
address relative to a major, known site on the network and a proper 
domain-format address.   Your system administrator can give this to 
you.  Some news posters attempt to enforce a four-line limit on 
signature files?an amount that should be more than sufficient to 
provide a return address and attribution.
             
Limit Line Length and Avoid Control Characters
             
Try to keep your text in a generic format.  Many (if not most) of the 
people reading Usenet do so from eighty-column terminals or from 
workstations with eighty-column terminal windows.  Try to keep your 
lines of text to less than eighty-characters for optimal readability. 
Also realize that there are many, many different forms of terminals in 
use.  
             
If you enter special control characters in your message, it may result 
in your message being unreadable on some terminal types; a character 
sequence that causes reverse video on your screen may result in a 
keyboard lock and graphics mode on someone else's terminal.  You 
should try to avoid the use of tabs, too, since they may also be 
interpreted differently on terminals other than your own.
             
Summary of Things to Remember
             
Never forget that the person on the other side is human
             
Be careful what you say about others
             
Be brief
             
Your postings reflect upon you; be proud of them
             
Use descriptive titles
             
Think about your audience
             
Be careful with humor and sarcasm
             
Only post a message once
             
Please rotate material with questionable content
             
Summarize what you are following up
             
Use e-mail, don't post a follow-up
             
Read all follow-ups and don't repeat what has already been said
             
Double-check follow-up newsgroups and distributions.
             
Be careful about copyrights and licenses
             
Cite appropriate references
             
When summarizing, summarize
             
Mark or rotate answers or spoilers
             
Spelling flames are considered harmful
             
Don't overdo signatures
             
Limit line length and avoid control characters
             
(*)UNIX is a registered trademark of AT&T.

Electronic Mail

Electronic mail allows you to exchange messages with other computer 
users (or groups of users) via a communications network.  Electronic 
mail is one of the most popular uses of the Internet. 

The Internet standard for naming computers is called the "domain 
system."  

Different computers use different software for electronic mail.  UNIX 
systems, for example, may use UNIX mail, mh, msg, or something else.  
Different software uses different commands.  Ask the Postmaster at 
your site how to use electronic mail on your system.

     
Domain System

The Internet standard for naming computers is called the "domain 
system."  This hierarchical system references values such as country, 
type of organization, organization name, division name, and computer 
name.  Below is an example:
             
     	joe@bitsy.mit.edu
             
The information in a mail address  becomes more global as you read 
from left to right.  The user's name is always to the left of an @ sign.  
Computer and organization names are always to the right.  In the 
example above, the  person, Joe, receives his mail on a computer called 
"bitsy" at MIT.  Because MIT is an educational organization, it is 
included in the top-level domain "edu".  Other top-level domains are 
listed below:
             
     	com	commercial
     	gov	government
     	mil	military 
     	org 	nonprofit organization
     	net 	network operation and info centers
             
Outside of the U.S., top-level domains are two-letter country codes 
such as these:
             
	     au	Australia
     	il 	Israel
	     jp	Japan
     	uk	United Kingdom
             
Finding Mail Addresses
             
You can learn the electronic mail address of another person by asking 
him or by using one of the following resources:
             
?  A postmaster at the recipient's organization can provide the correct 
address when you know the the domain name of the organization.  Send 
a message requesting help to postmaster@domain. 
             
?  The DDN Network Information Center (DDN NIC) in Menlo Park, 
California, maintains a "white pages" directory of computer users, 
hosts, and domains on the Internet.  You can use Telnet to access this 
database on a computer called nic.ddn.mil.  Many computers also have a 
program called whois, which automatically accesses the DDN NIC 
database.  Ask your system administrator whether your computer has 
whois.
             

UNIX mail Manual

This is the UNIX (see BSD) manual entry for mail, a common electronic 
mail system.  Your site may use other electronic mail software? check 
with your system administrator.
             
NAME
     mail - send or read mail
             
SYNTAX
     mail [-v] [-i] [-n] [-e] [-s subject] [user...]
     mail [-v] [-i] [-n] -f [name]
     mail [-v] [-i] [-n] -u user
     mail nodename::username (If DECnet is installed.)
             
The mail utility is an intelligent mail processing system which has a 
command syntax similar to ed.  However, in mail lines are replaced by 
messages.   If DECnet is installed on your system, you can also send and  
receive mail from other DECnet users.  
             
Sending mail.  To send a message to one or more persons, type mail and 
the names of the people to receive your mail.
             
Press the return key.  You are then prompted for a subject.
             
After entering a subject, and pressing the return key, type your 
message.  To send the message, type on a blank line.
             
You can use tilde (~) escape sequences to perform special functions 
when composing mail messages.  See the list of options for more on 
tilde escape sequences.
             
Reading mail.  In normal usage mail is given no arguments and checks 
your mail out of the mail directory.  Then it prints out a one line header 
of each message there.  The current message is initially the first 
message and is numbered 1.  It can be displayed using the print 
command.
             
The -e option causes mail not to be printed.  Instead, an exit value is 
returned.  For the exit status, see RETURN VALUES.  You can move among 
the messages by typing a plus  sign (+) followed by a number to move 
forward that many messages, or a minus sign (-) followed by a number 
to move backward that many messages.
             
Disposing of mail.  After reading a message you can delete (d) it or 
reply (r) to it.  Deleted messages can be undeleted, however, in one of 
two ways:  you can use the undelete (u) command and the number of the 
message, or you can end the mail session with the exit (x) command.  
Note that if you end a session with the quit (q) command, you cannot 
retrieve deleted messages.
             
Specifying messages.  Commands such as print and delete can be given a 
list of message numbers as arguments.  Thus, the command
       delete 1 2
deletes messages 1 and 2, while the command
       delete 1-5
deletes messages 1 through 5.  The asterisk (*) addresses all 
messages, and the dollar sign ($) addresses the last message.  For 
example, the top command, which prints the first few lines of a 
message, can be used in the following  manner to print the first few 
lines of all messages:
          top *
             
Replying to or originating mail.  Use the reply command to respond to a 
message.
             
Ending a mail processing session.  End a mail session with the quit (q) 
command.  Unless they were deleted, messages that you have read go to 
your mbox file.  Unread messages go back to the mail directory. The -f 
option causes mail to read in the contents of your mbox (or the 
specified file) for processing.  When you quit, the mail utility writes 
undeleted messages back to this file.  The -u flag is a short way of 
specifying: mail -f /usr/spool/mail/user.
             
Personal and systemwide distribution lists.  You can create a personal 
distribution list that directs mail to a group of people.  Such lists can 
be defined by placing a line similar to the following in the .mailrc file 
in your home directory:
      alias cohorts bill ozalp jkf mark kridle@ucbcory
             
Cohorts is the name of the distribution list that consists  of the 
following users: bill, ozalp, jkf, mark, and kridle@ucbcory.  A list of 
current aliases can be displayed with the alias (a) command in mail.
             
System-wide distribution lists can be created by editing 
/usr/lib/aliases. The syntax of system-wide lists differs from that of 
personally defined aliases.
             
Personal aliases are expanded in mail you send.  When a recipient on a 
personally defined mailing list uses the reply (r) option, the entire 
mailing list receives the response automatically.  System-wide aliases 
are not expanded when the mail is sent, but any reply returned to the 
machine will have the system-wide alias expanded as all mail goes 
through sendmail.
             
 Options
     -e   Causes mail not to be printed.  Instead, an exit value is returned.
     -f   Causes mail to read in the contents of your mbox file (or another 
file you specify) for processing.
     -i   Causes tty interrupt signals to be ignored. This is useful when 
using mail on noisy phone lines.
     -n   Inhibits the reading of /usr/lib/mail.rc.
     -s   Specifies a subject on the command line.  Note that only the 
first argument after the -s flag is used as a subject and that you must 
enclose subjects containing spaces in quotes.
     -u   Specifies a short hand for expressing the following: mail -f 
/usr/spool/mail/user
     -v   Prints the mail message.  The details of delivery are displayed 
on the user's terminal.
             
The following options can be set in the .mailrc file to alter the 
behavior of the mail command.   Each command is typed on a line by 
itself and may take arguments following the command word and the 
command abbreviation. For commands that take message lists as 
arguments, if no message list is given, then the next message forward 
which satisfies the command's requirements is used.  If there are no 
messages forward of the current message, the search proceeds 
backwards.  If there are no good messages at all, mail cancels the 
command, displaying the message: No applicable messages.
             
     -    Prints out the previous message. If given a numeric argument n, 
prints n-th previous message.
     ?    Prints a brief summary of commands.
     !   Executes the ULTRIX shell command which follows.
     alias (a)   Prints out all currently defined aliases, if given without 
arguments.  With one argument, prints out that alias.  With more than 
one argument, creates a new or changes an old alias.  These aliases are 
in effect for the current mail session only.
     alternates (alt) Informs mail that you have several valid addresses.  
The alternates command is useful if you have accounts on more than 
one machine.  When you reply to messages, mail does not send a copy of 
the message to any of the addresses listed on the alternates list.  If 
the alternates command is given with no argument, the current set of 
alternate names is displayed.
     chdir (ch)  Changes the user's working directory to that specified.  If 
no directory is given, then the chdir command changes to the user's 
login directory.
    copy (co)  Takes a message list and file name and appends each 
message to the end of the file.  The copy command functions in the 
same way as the save command, except that it does not mark the 
messages that you copy for deletion when you quit.
     delete (d)  Takes a list of messages as argument and marks them all 
as deleted.  Deleted messages are not saved in mbox, nor are they 
available for most other commands.
     dp (or dt)  Deletes the current message and prints the next message.  
If there is no next message, mail returns a message:  at EOF.
     edit (e)  Takes a list of messages and points the text editor at each 
one in turn.  On return from the editor, the message is read back in.
     exit (ex or x)  Returns to the shell without modifying the user's 
system mailbox, mbox file, or edit file in -f.
     file (fi)   Switches to a new mail file or folder.  If no arguments are 
given, it tells you which file you are currently reading.  If you give it an 
argument, it writes out changes (such as deletions) you have made in 
the current file and reads in the new file.  Some special conventions 
are recognized for the name. A pound sign (#) indicates the previous 
file, a percent sign (%) indicates your systemb mailbox, %user indicates 
the user's system mailbox, an ampersand (&) indicates your ~/mbox 
file, and +folder indicates a file in your folder directory.
     folders   List the names of the folders in your folder directory.
     folder (fo) Switches to a new mail file or folder.  The folder 
command functions in the same way as the file command.
     from (f)  Takes a list of messages and prints their message headers 
in the order that they appear in the mail directory, not in the order 
given in the list.
     headers (h) Lists the current range of headers, which is an eighteen-
message group.  If a plus sign (+) is given as an argument, then the next 
message group is printed.  If a minus sign (-) is given as an argument, 
the previous message group is printed.
     help  Prints a brief summary of commands.  Synonymous with ?.
     hold (ho, also preserve) Takes a message list and marks each 
message in it to be saved in the user's system mailbox instead of in 
mbox.  The hold command does not override the delete command.
     ignore  Adds the list of header fields named to the ignored list.  
Header fields in the ignore list are not printed on your terminal when 
you print a message.  This command is frequently used to suppress 
certain machine-generated header fields. The Type and Print commands 
are used to print a message in its entirety, including ignored fields.  If 
ignore is executed with no arguments, it lists the current set of 
ignored fields.
     mail(m)  Takes login names and distribution group names as 
arguments and sends mail to those people.
     mbox  Indicates that a list of messages should be sent to mbox in 
your home directory when you quit.  This is the default action for 
messages if you did not set the hold option.
     next (n, + or CR) Goes to the next message in sequence and types it.  
With an argument list, it types the next matching message.
     preserve (pre) Takes a message list and marks each message in it to 
be saved in the user's system mailbox instead of in mbox . Synonymous 
with the hold command.
     print (p)   Takes a message list and types out each message on the 
user's terminal, without printing any specified ignored fields.
     Print (P)   Prints a message in its entirety, including specified 
ignored fields.
     quit (q)    Terminates the session.  All undeleted, unsaved messages 
are saved in the user's mbox file in his login directory; all messages 
marked with hold or preserve or that were never referenced are saved 
in his system mailbox; and all other messages are removed from his 
system mailbox.
             
If new mail arrives during the session, the user receives the message 
"You have new mail."  If given while editing a mailbox file with the -f 
flag, then the edit file is rewritten.  A return to the Shell is effected, 
unless the rewrite of the edit file fails, in which case the user can 
escape with the exit command.
     reply (r)   Takes a message list and sends mail to the sender and all 
recipients of the specified message.  The default message must not be 
deleted.
     Reply (R)   Replies to originator of the message.  Does notreply to 
other recipients of the original message.
     respond     Takes a message list and sends mail to the sender and all 
recipients of the specified message.  Synonymous with reply.
    save (s)    Takes a message list and a file name and appends each 
message to the end of the file. The messages are saved in the order in 
which they appear in the mail directory, not in the order given in the 
message list.  The filename, which is enclosed in quotes, followed by 
the line count and character count, is displayed on the user's terminal.
     set (se)    Prints all variable values when no arguments are given.  
Otherwise, the set command sets the specified option.  Arguments 
either take the form: option=value or option.
     shell (sh)  Invokes an interactive version of the shell.
     size  Takes a message list and prints out the size (in characters) of 
each message.  The size of the messages are printed in the order that 
they appear in the mail directory, not in the order given in the list.
     source (so) Reads mail commands from a file.
     top   Takes a message list and prints the top few lines of each.  The 
number of lines printed is controlled by the variable toplines and 
defaults to five.
     type (t)  Takes a message list and types out each message on the 
user's terminal, without printing any specified ignored fields.  
Synonymous with print.
     Type (T)   Prints a message in its entirety, including specified 
ignored fields.  Synonymous with Print.
     unalias  Takes a list of names defined by alias commands and 
cancels the list of users.  The group names no longer have any 
significance.
     undelete (u)  Takes a message list and marks each one as not being 
deleted.
     unset   Takes a list of option names and discards their  remembered 
values; the inverse of set.
    visual (v)  Takes a message list and invokes the display editor on 
each message.
     write (w)   Takes a message list and a file name and appends each 
message to the end of the file.  Synonymous with save.
     xit (x)     Returns to the Shell without modifying the user's system 
mailbox, mbox , or edit file in -f.  Synonymous with exit.
     z   Presents message headers in windowfulls as described under the 
headers command.  You can move forward to the next window with the z 
command. Also, you can move to the previous window by using z-.
             
The following is a summary of the tilde escape functions that you can 
use when composing mail messages.  Note that you can only invoke 
these functions from within the body of a mail message and that the 
sequences are only executed if they are placed at the beginning of lines.
     ~!command   Executes the indicated shell command, then returns to 
the message.
     ~?          Prints a brief summary of tilde commands.
     ~:  Executes the mail commands. (For example, the command ~:10 
prints out message number 10 while ~:- prints out the previous 
message.
     ~c name ...  Adds the given names to the list of carbon copy 
recipients.
     ~d   Reads the file named dead.letter from your home directory into 
the message.
     ~e   Invokes the text editor on the message you are typing.  After the 
editing session is finished, you may continue appending text to the 
message.
     ~f messages  Reads the named messages into the message being 
sent.  If no messages are specified, reads in the current message.
     ~h    Edits the message header fields by typing each one in turn and 
allowing the user to append text to the end or to modify the field by 
using the current terminal erase and kill characters.
     ~m messages  Reads the named messages into the message being 
sent, shifted one tab space to the right.  If no messages are specified, 
reads the current message.
     ~p   Prints out the message on your terminal, prefaced by the 
message header fields.
     ~q  Aborts the message being sent, copying the message to 
dead.letter in your home directory if the save option is set.
     ~r filename  Reads the named file into the message.
     ~s string   Causes the named string to become the current subject 
field.
     ~t name ...  Adds the given names to the direct recipient list.
     ~v          Invokes an alternate editor (defined by the VISUAL option) 
on the message.  Usually, the alternate editor is a screen editor.  After 
you
quit the editor, you can resume appending text to the end of your 
message.
     ~w filename  Writes the message onto the named file.
     ~|command   Pipes the message through the command as a filter.  If 
the command gives no output or terminates abnormally, retains the 
original text of the message.  The command fmt(1) is often used as 
command to rejustify the message.
     ~~string    Inserts the string of text in the message prefaced by a 
single tilde (~).  If you have changed the escape character, then you 
should double that character in order to send it.
             
Options are controlled via the set and unset commands.  Options may be 
either binary or string.  If they are binary you should see whether or not 
they are set; if they are string it is the actual value that is of interest.
             
The binary options include the following:
             
     append  Causes messages saved in mbox to be appended rather than 
prepended.  (This is set in /usr/lib/Mail.rc on version 7 systems.)
     ask  Causes mail to prompt you for the subject of each message you 
send.  If you simply respond with a new line, no subject field is sent.
     askcc  Asks you at the end of each message whether you want to 
send a carbon copy of the message to additional recipients.  Responding 
with a new line indicates your satisfaction with the current list.
     autoprint   Causes the delete command to behave like dp - thus, 
after deleting a message, the next one is typed automatically.
     debug   Causes mail to output information useful for debugging mail. 
Setting the binary option debug is the same as specifying -d on the 
command line.
     dot   Causes mail to interpret a period alone on a line as the 
terminator of a message you are sending.
     hold  Holds messages in the system mailbox by default.
     ignore  Causes interrupt signals from your terminal to be ignored 
and echoed as at signs (@).
     ignoreeof   Causes mail to refuse to accept a control-d as the end of 
a message.
     msgprompt   Prompts you for the message text and indicates how to 
terminate the message.
     metoo   Includes the sender in the distribution group receiving a 
mail message.
     nosave   Prevents mail from copying aborted messages into the 
dead.letter file in your home directory.
     quiet   Suppresses the printing of the version when first invoked.
     verbose   Displays the details of each message's delivery on the 
user's terminal.  Setting the verbose option is the same as typing -v on 
the command line.
             
     The string options include the following:
             
     EDITOR  Pathname of the text editor to use in the edit command and 
~e escape.  If not defined, then a default editor is used.
     SHELL          Pathname of the shell to use in the ! command and the ~! 
escape.  A default shell is used if this option is not defined.
     VISUAL  Pathname of the text editor to use in the visual command 
and ~v escape.
      crt   Threshold to determine how long a message must be before 
more is used to read it.
     escape   The first character of this option gives the character to use 
in the place of tilde (~) to denote escapes, if defined.
     folder   Directory name to use for storing folders of messages. If 
this name begins with a backslash (/) mail considers it an absolute 
pathname; otherwise, the folder directory is found relative to your 
home directory.
     record    Pathname of the file used to record all out-going mail.  If 
it is not defined, then out-going mail is not so saved.
     toplines   The number of lines of a message that is printed out with 
the top command; normally, the first five lines are printed.
             
RETURN VALUES
             
If mail is invoked with the -e option, the following exit values are 
returned:
     0    the user has mail
     1    the user has no mail
             
FILES
             
  /usr/spool/mail/*  mail directory
  ~/mbox               your read mail
  ~/.mailrc             file giving initial mail 
                            commands
   /tmp/R#             temporary for editor escape
   /usr/lib/Mail.help*    help files
   /usr/lib/Mail.rc  system initialization file
   Message*          temporary for editing messages
             






This is the manual entry for the mail utility on the VMS operating 
system, a common electronic mail system.  Your site may use other 
electronic mail software? check with your system administrator.
             
The VMS Personal Mail Utility (MAIL),  is used to send messages to 
other users.  For a complete description of the VMS Personal  Mail 
Utility, including information about the MAIL command and its 
qualifiers, see the  VMS Mail Utility Manual.
             
Format:

MAIL  [file-spec] [recipient-name]

Additional information available:
             
Parameters Command_Qualifiers
/PERSONAL_NAME        /SUBJECT   /EDIT      /SELF
             
Examples
             
MAIL Subtopic? /personal
             
MAIL
             
/PERSONAL_NAME
/PERSONAL_NAME=name
/NOPERSONAL_NAME
             
Specifies the personal name to be used when sending a message.  This 
qualifier does not override the default personal name; the personal 
name is changed only for the  current message.   Specifying 
/NOPERSONAL_NAME removes the default personal name for the current 
message.
             
MAIL Subtopic? /subject
             
MAIL
             
/SUBJECT
/SUBJECT=text
             
Specifies the subject of the message for the heading.   If  the  text  
consists  of more than one word, enclose the text in quotation marks 
(").

You must include a file specification on the command line to  enable 
this qualifier.

If you omit this qualifier, the message is sent  without  a  subject 
notation.

MAIL Subtopic? /edit

MAIL

/EDIT

/EDIT=[(send,reply=extract,forward)]

Sets the default to /EDIT for the SEND, REPLY, and FORWARD commands.

MAIL Subtopic? /self

MAIL

/SELF

/SELF

Sends a copy of the message containing the file specification on  the  
command line back to you.

MAIL Subtopic? exam

MAIL

Examples

1.   $ MAIL
       MAIL>

This MAIL command invokes MAIL to process commands interactively.

2.   $ MAIL/SUBJECT="New Project" PROJECT.DOC JONES,SMITH,ADAMS

This MAIL command specifies that the file named PROJECT.DOC is to be  
sent to users JONES, SMITH, and ADAMS, with a subject description of 
New Project in the heading.

3.   $ MAIL/SUBJECT="Vacation Policy Change" NEWSLETTR "@USERS"

This MAIL command invokes MAIL to send the file NEWSLETTR.TXT to all 
the  users  named in the file USERS.DIS.  The subject description is
Vacation Policy Change.

RCCA> mail
You have 1 new message.

MAIL> dir

NEWMAIL
    # From                 Date         Subject

1 IN%"RBEAUPRE@ccr2.bb 22-AUG-1990  END OF SHIFT

MAIL> send
To:   mlbanker
Subj: test
Enter your message below. Press CTRL/Z when complete, or CTRL/C to 
quit:
this is a test message

MAIL> read

#1          22-AUG-1990 11:51:41.03                                  NEWMAIL
From:   IN%"RBEAUPRE@ccr2.bbn.com"  "Ray Beaupre"
To:     TURNOVER@mikey.bbn.com
CC:
Subj:   END OF SHIFT

From: Ray Beaupre <RBEAUPRE@ccr2.bbn.com>
Subject: END OF SHIFT
To: TURNOVER@mikey.bbn.com
X-VMS-To: TURNOVER

Worked in Building 20 with Max Stepp last night in the 7th Floor Lab.  I 
was trained on the following Building 20 systems.

MAIL> delete 1

MAIL> exit
%MAIL-I-RECLPLSWAIT, reclaiming deleted file space.  Please wait...







     
VMS Mail Utility Manual











 mail(1)

NAME
     mail - send or read mail

SYNTAX
     mail [-v] [-i] [-n] [-e] [-s subject] [user...]
     mail [-v] [-i] [-n] -f [name]
     mail [-v] [-i] [-n] -u user
     mail nodename::username (If DECnet is installed.)

DESCRIPTION
     The mail utility is an intelligent mail processing system which has 
a command syntax similar to ed.  However, in mail lines are replaced by 
messages.   If DECnet is installed on your system, you can also send and  
receive mail from other DECnet users.  

     Sending mail.  To send a message to one or more persons,  type mail 
and the names of the people to receive your mail.
     Press the RETURN key.  You are then prompted for a subject.
     After entering a subject, and pressing the RETURN key, type your 
message.  To send the message, type on a blank line.

     You can use tilde (~) escape sequences to perform special functions 
when composing mail messages.  See the list of options for more on 
tilde escape sequences.

     Reading mail.  In normal usage mail is given no arguments and 
checks your mail out of the mail directory.  Then it prints out a one line 
header of each message there.  The current message is initially the 
first message and is numbered 1.  It can be displayed using the print 
command.

     The -e option causes mail not to be printed.  Instead, an exit value is 
returned.  For the exit status, see RETURN VALUES.  You can move among 
the messages by typing a plus  sign (+) followed by a number to move 
forward that many messages, or a minus sign (-) followed by a number 
to move backward that many messages.

     Disposing of mail.  After reading a message you can delete (d) it or 
reply (r) to it.  Deleted messages can be undeleted, however, in one of 
two ways:  you can use the undelete (u) command and the number of the 
message, or you can end the mail session with the exit (x) command.  
Note that if you end a session with the quit (q) command, you cannot 
retrieve deleted messages.

     Specifying messages.  Commands such as print and delete can be 
given a list of message numbers as arguments.  Thus, the command
       delete 1 2
deletes messages 1 and 2, while the command
       delete 1-5
deletes messages 1 through 5.  The asterisk (*) addresses all 
messages, and the dollar sign ($) addresses the last message.  For 
example, the top command, which prints the first few lines of a 
message, can be used in the following  manner to print the first few 
lines of all messages:
          top *

     Replying to or originating mail.  Use the reply command to respond 
to a message.

     Ending a mail processing session.  End a mail session with the quit 
(q) command.  Unless they were deleted, messages that you have read go 
to your mbox file.  Unread messages go back to the mail directory. The -
f option causes mail to read in the contents of your mbox (or the 
specified file) for processing.  When you quit, the mail utility writes 
undeleted messages back to this file.  The -u flag is a short way of 
specifying: mail -f /usr/spool/mail/user.

     Personal and systemwide distribution lists.  You can create a 
personal distribution list that directs mail to a group of people.  Such 
lists can be defined by placing a line similar to the following in the 
.mailrc file in your home directory:
      alias cohorts bill ozalp jkf mark kridle@ucbcory
     Cohorts is the name of the distribution list that consists  of the 
following users: bill, ozalp, jkf, mark, and kridle@ucbcory.  A list of 
current aliases can be displayed with the alias (a) command in mail.

     System-wide distribution lists can be created by editing 
/usr/lib/aliases. The syntax of system-wide lists differs from that of 
personally defined aliases.

     Personal aliases are expanded in mail you send.  When a recipient on 
a personally defined mailing list uses the reply (r) option, the entire 
mailing list receives the response automatically.  System-wide aliases 
are not expanded when the mail is sent, but any reply returned to the 
machine will have the system-wide alias expanded as all mail goes 
through sendmail.

 OPTIONS
     -e   Causes mail not to be printed.  Instead, an exit value is returned.
     -f   Causes mail to read in the contents of your mbox file (or another 
file you specify) for processing.
     -i   Causes tty interrupt signals to be ignored. This is useful when 
using mail on noisy phone lines.
     -n   Inhibits the reading of /usr/lib/mail.rc.
     -s   Specifies a subject on the command line.  Note that only the 
first argument after the -s flag is used as a subject and that you must 
enclose subjects containing spaces in quotes.
     -u   Specifies a short hand for expressing the following:
              mail -f /usr/spool/mail/user
     -v   Prints the mail message.  The details of delivery are displayed 
on the user's terminal.

     The following options can be set in the .mailrc file to alter the 
behavior of the mail command.   Each command is typed on a line by 
itself and may take arguments following the command word and the 
command abbreviation. For commands that take message lists as 
arguments, if no message list is given, then the next message forward 
which satisfies the command's requirements is used.  If there are no 
messages forward of the current message, the search proceeds 
backwards.  If there are no good messages at all, mail cancels the 
command, displaying the message: No applicable messages.

     -           Prints out the previous message. If given a numeric 
argument n, prints n-th previous message.
     ?           Prints a brief summary of commands.
     !           Executes the ULTRIX shell command which follows.
     alias (a)   Prints out all currently defined aliases, if given without 
arguments.  With one argument, prints out that alias.  With more than 
one argument, creates a new or changes an old alias.  These aliases are 
in effect for the current mail session only.
     alternates (alt) Informs mail that you have several valid addresses.  
The alternates command is useful if you have accounts on more than 
one machine.  When you reply to messages, mail does not send a copy of 
the message to any of the addresses listed on the alternates list.  If 
the alternates command is given with no argument, the current set of 
alternate names is displayed.
     chdir (ch)  Changes the user's working directory to that specified.  If 
no directory is given, then the chdir command changes to the user's 
login directory.
    copy (co)   Takes a message list and file name and appends each 
message to the end of the file.  The copy command functions in the 
same way as the save command, except that it does not mark the 
messages that you copy for deletion when you quit.
     delete (d)  Takes a list of messages as argument and marks them all 
as deleted.  Deleted messages are not saved in mbox, nor are they 
available for most other commands.
     dp (or dt)  Deletes the current message and prints the next message.  
If there is no next message, mail returns a message:  at EOF.
     edit (e)    Takes a list of messages and points the text editor at each 
one in turn.  On return from the editor, the message is read back in.
     exit (ex or x)  Returns to the shell without modifying the user's 
system mailbox, mbox file, or edit file in -f.
     file (fi)   Switches to a new mail file or folder.  If no arguments are 
given, it tells you which file you are currently reading.  If you give it an 
argument, it writes out changes (such as deletions) you have made in 
the current file and reads in the new file.  Some special conventions 
are recognized for the name. A pound sign (#) indicates the previous 
file, a percent sign (%) indicates your systemb mailbox, %user indicates 
the user's system mailbox, an ampersand (&) indicates your ~/mbox 
file, and +folder indicates a file in your folder directory.
     folders     List the names of the folders in your folder directory.
     folder (fo) Switches to a new mail file or folder.  The folder 
command functions in the same way as the file command.
     from (f)    Takes a list of messages and prints their message 
headers in the order that they appear in the mail directory, not in the 
order given in the list.
     headers (h) Lists the current range of headers, which is an eighteen-
message group.  If a plus sign (+) is given as an argument, then the next 
message group is printed.  If a minus sign (-) is given as an argument, 
the previous message group is printed.
     help  Prints a brief summary of commands.  Synonymous with ?.
     hold (ho, also preserve) Takes a message list and marks each 
message in it to be saved in the user's system mailbox instead of in 
mbox.  The hold command does not override the delete command.
     ignore  Adds the list of header fields named to the ignored list.  
Header fields in the ignore list are not printed on your terminal when 
you print a message.  This command is frequently used to suppress 
certain machine-generated header fields. The Type and Print commands 
are used to print a message in its entirety, including
ignored fields.  If ignore is executed with no
arguments, it lists the current set of ignored fields.
     mail(m)  Takes login names and distribution group names as 
arguments and sends mail to those people.
     mbox  Indicates that a list of messages should be sent to mbox in 
your home directory when you quit.  This is the default action for 
messages if you did not set the hold option.
     next (n, + or CR) Goes to the next message in sequence and types it.  
With an argument list, it types the next matching message.
     preserve (pre) Takes a message list and marks each message in it to 
be saved in the user's system mailbox instead of in mbox . Synonymous 
with the hold command.
     print (p)   Takes a message list and types out each message on the 
user's terminal, without printing any specified ignored fields.
     Print (P)   Prints a message in its entirety, including specified 
ignored fields.
     quit (q)    Terminates the session.  All undeleted, unsaved messages 
are saved in the user's mbox file in his login directory; all messages 
marked with hold or preserve or that were never referenced are saved 
in his system mailbox; and all other messages are removed from his 
system mailbox.
                 If new mail arrives during the session, the user receives the 
message: You have new mail.  If given while editing a mailbox file with 
the -f flag, then the edit file is rewritten.  A return to the Shell is 
effected, unless the rewrite of the edit file fails, in which case the 
user can escape with the exit command.
     reply (r)   Takes a message list and sends mail to the sender and all 
recipients of the specified message.  The default message must not be 
deleted.
     Reply (R)   Replies to originator of the message.  Does notreply to 
other recipients of the original message.
     respond     Takes a message list and sends mail to the sender and all 
recipients of the specified message.  Synonymous with reply.
    save (s)    Takes a message list and a file name and appends each 
message to the end of the file. The messages are saved in the order in 
which they appear in the mail directory, not in the order given in the 
message list.  The filename, which is enclosed in quotes, followed by 
the line count and character count, is displayed on the user's terminal.
     set (se)    Prints all variable values when no arguments are given.  
Otherwise, the set command sets the specified option.  Arguments 
either take the form
                     option=value
                 or
                      option
     shell (sh)  Invokes an interactive version of the shell.
     size  Takes a message list and prints out the size (in characters) of 
each message.  The size of the messages are printed in the order that 
they appear in the mail directory, not in the order given in the list.
     source (so) Reads mail commands from a file.
     top   Takes a message list and prints the top few lines of each.  The 
number of lines printed is controlled by the variable toplines and 
defaults to five.
     type (t)    Takes a message list and types out each message on the 
user's terminal, without printing any specified ignored fields.  
Synonymous with print.
     Type (T)    Prints a message in its entirety, including specified 
ignored fields.  Synonymous with Print.
     unalias     Takes a list of names defined by alias commands and 
cancels the list of users.  The group names no longer have any 
significance.
     undelete (u)  Takes a message list and marks each one as not being 
deleted.
     unset   Takes a list of option names and discards their  remembered 
values; the inverse of set.
    visual (v)  Takes a message list and invokes the display editor on 
each message.
     write (w)   Takes a message list and a file name and appends each 
message to the end of the file.  Synonymous with save.
     xit (x)     Returns to the Shell without modifying the user's system 
mailbox, mbox , or edit file in -f. Synonymous with exit.
     z           Presents message headers in windowfulls as described 
under the headers command.  You can move forward to the next window 
with the z command. Also, you can move to the previous window by 
using z-.

     The following is a summary of the tilde escape functions that you 
can use when composing mail messages.  Note that you can only invoke 
these functions from within the body of a mail message and that the 
sequences are only executed if they are placed at the beginning of lines.
     ~!command   Executes the indicated shell command, then returns to 
the message.
     ~?          Prints a brief summary of tilde commands.
     ~:          Executes the mail commands. (For example, the command 
~:10 prints out message number 10 while ~:- prints out the previous 
message.
     ~c name ... Adds the given names to the list of carbon copy 
recipients.
     ~d          Reads the file named dead.letter from your home directory 
into the message.
     ~e          Invokes the text editor on the message you are typing.  
After the editing session is finished, you may continue appending text 
to the message.
     ~f messages  Reads the named messages into the message being 
sent.  If no messages are specified, reads in the current message.
     ~h          Edits the message header fields by typing each one in turn 
and allowing the user to append text to the end or to modify the field by 
using the current terminal erase and kill characters.
     ~m messages Reads the named messages into the message being 
sent, shifted one tab space to the right.  If no messages are specified, 
reads the current message.
     ~p          Prints out the message on your terminal, prefaced by the 
message header fields.
     ~q          Aborts the message being sent, copying the message to 
dead.letter in your home directory if the save option is set.
     ~r filename Reads the named file into the message.
     ~s string   Causes the named string to become the current subject 
field.
     ~t name ... Adds the given names to the direct recipient list.
     ~v          Invokes an alternate editor (defined by the VISUAL option) 
on the message.  Usually, the alternate editor is a screen editor.  After 
you
quit the editor, you can resume appending text
to the end of your message.
     ~w filename Writes the message onto the named file.
     ~|command   Pipes the message through the command as a filter.  If 
the command gives no output or terminates abnormally, retains the 
original text of the message.  The command fmt(1) is often used as 
command to rejustify the message.
     ~~string    Inserts the string of text in the message prefaced by a 
single tilde (~).  If you have changed the escape character, then you 
should double that character in order to send it.

     Options are controlled via the set and unset commands.  Options may 
be either binary or string.  If they are binary you should see whether or 
not they are set; if they are string it is the actual value that is of 
interest.

     The binary options include the following:

     append         Causes messages saved in mbox to be appended rather 
than prepended.  (This is set in /usr/lib/Mail.rc on version 7 systems.)
     ask            Causes mail to prompt you for the subject of each 
message you send.  If you simply respond with a new line, no subject 
field is sent.
     askcc          Asks you at the end of each message whether you want 
to send a carbon copy of the message to additional recipients.  
Responding with a new line indicates your satisfaction with the 
current list.
     autoprint      Causes the delete command to behave like dp - thus, 
after deleting a message, the next one is typed automatically.
     debug          Causes mail to output information useful for debugging 
mail. Setting the binary option debug is the same as specifying -d on 
the command line.
     dot            Causes mail to interpret a period alone on a line as the 
terminator of a message you are sending.
     hold           Holds messages in the system mailbox by default.
     ignore         Causes interrupt signals from your terminal to be 
ignored and echoed as at signs (@).
     ignoreeof      Causes mail to refuse to accept a control-d as the end 
of a message.
     msgprompt      Prompts you for the message text and indicates how 
to terminate the message.
     metoo          Includes the sender in the distribution group receiving a 
mail message.
     nosave         Prevents mail from copying aborted messages into the 
dead.letter file in your home directory.
     quiet          Suppresses the printing of the version when first 
invoked.
     verbose        Displays the details of each message's delivery on the 
user's terminal.  Setting the verbose option is the same as typing -v on 
the command line.

     The string options include the following:

     EDITOR         Pathname of the text editor to use in the edit command 
and ~e escape.  If not defined, then a default editor is used.
     SHELL          Pathname of the shell to use in the ! command and the ~! 
escape.  A default shell is used if this option is not defined.
     VISUAL         Pathname of the text editor to use in the visual 
command and ~v escape.
      crt            Threshold to determine how long a message must be 
before more is used to read it.
     escape         The first character of this option gives the character to 
use in the place of tilde (~) to denote escapes, if defined.
     folder         Directory name to use for storing folders of messages. 
If this name begins with a backslash (/) mail considers it an absolute 
pathname; otherwise, the folder directory is found relative to your 
home directory.
     record         Pathname of the file used to record all out-going mail.  
If it is not defined, then out-going mail is not so saved.
     toplines       The number of lines of a message that is printed out 
with the top command; normally, the first five lines are printed.

RETURN VALUES
     If mail is invoked with the -e option, the following exit values are 
returned:
     0    the user has mail
     1    the user has no mail

FILES
     /usr/spool/mail/*  mail directory
     ~/mbox                   your read mail
     ~/.mailrc                file giving initial mail commands
     /tmp/R#            temporary for editor escape
     /usr/lib/Mail.help*      help files
     /usr/lib/Mail.rc  system initialization file
     Message*     temporary for editing messages


To invoke the message program your system uses, you would type the 
command's name (for this example, we are using mail, which is used on 
UNIX BSD systems).  Add the address(es) of the recipient(s).  (This 
example message is going to two people.)  Then press return.

--> mail carver@herhost.org glynn@hishost.edu

You are then prompted to enter a subject.
After entering a subject, press return. 

--> mail carver@herhost.org glynn@hishost.edu
Subject: Proposal

Then you can type a message.

--> mail carver@herhost.org glynn@hishost.edu
Subject: Proposal
Hi Sue and Ed, 
Haven't heard from you two about the report
draft.  Have you finished reviewing it yet?
Please pay particular attention to the sampling
strategy described in Chapter 3.
 
Thanks,
Ben

To send a message using this system, you would type a blank line.

--> 

To read mail using mail on a UNIX system, type mail and press return.  
You will see the sender and subject of each message you have received.  

3 carver@herhost.org  Re: Report
-->

To display a message on the screen, type print.


--> print 3
Received: from herhost.org by nnsc.nsf.net id
From: Susan Carver <carver@herhost.org>
Date: Weds, 10 Oct 90 10:41:37 EDT
Ben,
So far I have only minor changes--it looks
good!  I should be finished tomorrow.
Sue
-->

You can reply to a message by typing r.

--> print 3
Received: from herhost.org by nnsc.nsf.net id
From: Susan Carver <carver@herhost.org>
Date: Weds, 10 Oct 90 10:41:37 EDT
Ben,
So far I have only minor changes--it looks
good!  I should be finished tomorrow.
Sue
-->

To delete it, type d .

-->

You can move among your messages by typing a plus  sign (+) followed 
by a number?you will move forward that many messages.
Or type a minus sign (-) followed by a number to move backward that 
many messages.

Message 1
Received: from nnsc@nsf.net by labs.bbn.com id
From: Ed Glynn <glynn@hishost.edu>
Date: Weds, 10 Oct 90 12:51:39 EDT
Ben,
I think it's fine except that I think the
budget for film is too low by 20%.
Ed
-->

Commands such as print and delete can be given a list of message 
numbers to act upon.  In UNIX mail, the command delete 1 2 deletes 
messages 1 and 2, while the command delete 1-5 deletes messages 1 
through 5.      (Click the arrow to continue.)

Received: from nnsc@nsf.net by labs.bbn.com id
From: Ed Glynn <glynn@hishost.edu>
Date: Weds, 10 Oct 90 12:51:39 EDT
Ben,
I think it's fine except that I think the
budget for film is too low by 20%.
Ed
-->

You can quit in two ways:  
     (1) by typing q.  You will not be able to retrieve deleted messages.  
Messages that you have read but not deleted will go to your "mbox" file.  
     (2) by typing x.  This leaves your messages unchanged; deleted 
messages can be retrieved.
                              (End of Sample Session)


Interest Groups

Network interest groups include
bulletin boards ("bboards") and mailing lists.  Messages are distributed 
to people who share an interest but may not know each other.  Ask your 
system administrator what groups are available to you.

Three important, organized sources of
interest groups are available to people who can exchange mail with the 
Internet:  Internet mailing lists, BITNET LISTSERV, and USENET news.  
There is a lot of overlap between them.

See Net Etiquette for some guidelines for using interest groups 
successfully.

Each Internet mailing list has a moderator or coordinator.  You must ask 
to be put on the list by sending an electronic mail message to the 
moderator.  Internet mailing lists are not highly automated.  The only 
problem is how to distinguish the moderator from the list.
             
A list of Internet mailing lists (about five hundred kilobytes in size) is 
available by anonymous FTP from the Internet host nisc.sri.com at SRI 
International, Menlo Park, California.  Use these commands:
             
        cd netinfo
        get interest-groups

The interest-groups list is also available by
electronic mail from the CSNET Info-Server.  (The file will be split into 
messages of less than fifty kilobytes when sent to you.)  Send a 
message to info-server@sh.cs.net with the following text:

        request: info
        topic: interest-groups

BITNET LISTSERV is a highly automated program that automatically 
sends electronic mail messages and subscribes and unsubscribes users 
in response to formatted messages.  LISTSERV programs run on many 
BITNET hosts.  A subscribe message can be sent to any LISTSERV 
program?it will be forwarded to the correct host.  For a complete list 
of LISTSERV lists, send the command list global to any LISTSERV.
             
Telnet is a program that allows a computer user at one site to work on 
a computer at another site.  It is the Internet standard protocol for 
remote terminal connection service.   
             
Telnet requires Internet access (that is, you must be on a network that 
gateways to the Internet).  Unlike FTP and electronic mail, telnet 
exposes you to the commands and programs of the remote host.
             
For example, you can use the telnet command to run a program in your 
directory on a supercomputer hundreds of miles away.
             
Remote Login?Telnet

Telnet is a program that allows a computer user at one site to work on 
a computer at another site.  It is the Internet standard protocol for 
remote terminal connection service.   

Telnet requires Internet access, that is, you must be on a TCP/IP 
network that gateways to the Internet.  Unlike FTP and electronic mail, 
Telnet actually exposes you to the commands and programs of the 
remote host.

For example, you can use the telnet command to run a program in your 
directory on a supercomputer hundreds of miles away.
     
In most cases, the traveller must make arrangements beforehand to use 
telnet on a remote host.  Some interactive programs allow any network 
traveller to log in with no password or a password that is advertised.  
Sometimes the password is "anonymous" and the password can be 
"guest."  The type of activity allowed with anonymous telnet is 
restricted. 
 Telnet Manual for UNIX

This is the UNIX (see BSD) manual entry for telnet.
             
telnet - user interface to the TELNET protocol
             
Syntax: telnet [host[port]]
             
The telnet interface is used to communicate with another host using 
the TELNET protocol.  If telnet is invoked without arguments, it enters 
command mode, which is indicated by the prompt, telnet>.  In this mode, 
telnet accepts and executes the commands listed below.  If it is 
invoked with arguments, it performs an open command (see below) with 
those arguments.
             
Once a connection is opened, telnet enters input mode.  The input mode 
is either character-at-a-time or line-by-line, depending on what the 
remote system supports.  In character-at-a-time mode, text is sent to 
the remote host as it is typed.  In line-by-line mode, text is echoed 
locally and only completed lines are sent to the remote host.  The 
local-echo-character, initially ^E.  turns the local echo on and off, 
which is useful when you want to enter passwords without them 
echoing to the screen.
In either mode, if the localchars toggle is true (the default in line 
mode), then the user's quit, intr, and flush characters are trapped 
locally and sent as TELNET protocol sequences to the remote side.  
Options such as toggle autoflush and toggle autosynch flush previous 
terminal input, as in quit and intr, in additon to flushing subsequent 
output to the terminal until the remote host acknowledges the TELNET 
sequence.

To issue telnet commands when in input mode, precede them with the 
telnet escape character, initially the control character followed by a 
right bracket (^]).  When in command mode, use the normal terminal 
editing conventions.

The following commands are available:

open host [ port ]  Opens a connection to the named host.  If the no port 
number is specified, telnet attempts to contact a TELNET server at the 
default port.  The host specification may be either a host name or an 
Internet address specified in the dot notation.  For further information, 
see hosts(5) and inet(3n).

close Closes a TELNET session and returns to command mode.

quit Closes any open TELNET session and exits telnet.

z Suspends TELNET. This command only works when the user is using 
the csh(1).

mode type  The type is either line, for line-by-line mode, or character, 
for character-at-a-time mode.  The local host asks the remote host for 
permission to go into one or the other mode. The remote host enters the 
requested mode if it is capable of it.

status  Shows the current status of telnet. This includes the peer one 
is connected to, as well as the state of debugging.

display [ argument... ]  Displays all, or some, of the set and toggle 
values (see below).

? [ command ] Accesses on-line help.  With no arguments, telnet prints 
a help summary.  If a command is specified, TELNET prints the help 
information for that command.

send argument(s) Sends one or more special character sequences to the 
remote host.  One or more of the following arguments can be specified:

escape  Sends the current telnet escape character (initially the control 
character followed by a right bracket, ^]).

synch Sends the TELNET SYNCH sequence.  This sequence causes the 
remote system to discard input that was previously entered but that it 
has not yet read.  This sequence is sent as TCP urgent data and may not 
work if the remote system is a 4.2 BSD system.  If it does not work, a 
lower case r may be echoed on the terminal screen.

brk Sends the TELNET BRK (Break) sequence, which may have 
significance to the remote system.

ip Sends the TELNET IP (Interrupt Process) sequence, which causes the 
remote system to abort the currently running process.
 ao  Sends the TELNET AO (Abort Output)sequence, which causes the 
remote system to flush all output from the remote system to the user's 
terminal.

ayt Sends the TELNET AYT (Are You There) sequence.  The remote 
system may or may not respond.

ec Sends the TELNET EC (Erase Character) sequence, which causes the 
remote system to erase the last character entered.

el  Sends the TELNET EL (Erase Line) sequence, which causes the remote 
system to erase the line currently being entered.


ga Sends the TELNET GA (Go Ahead) sequence.  Often this sequence has 
no significance to the remote system.

nop Sends the TELNET NOP (No OPeration) sequence.

? Prints out help information for the send command.

set argument value Sets a telnet variable to a specific value.  The off 
value turns off the function associated with the variable.  The current 
values of variables can be displayed with the display command. The 
following variables that can be specified:

echo Toggles between local echoing of entered characters, and 
suppressing echoing of entered characters when in line-by-line mode.  
The value  is initially ^E.

escape Enters the telnet command mode when you are connected to a 
remote system.  The value is initially the control character followed by 
a left bracket (^[).

interrupt Sends a TELNET IP sequence (see send ip above) to the remote 
host if telnet is in localchars mode (see toggle localchars below) and 
the interrupt character is typed.  The initial value for the interrupt 
character is the terminal's intr character.

quit Sends a TELNET BRK sequence (see send brk above) to the remote 
host if telnet is in localchars mode (see toggle localchars below) and 
the quit character is yped.  The initial value for the quit character is 
the terminal's quit character.

flushoutput Sends a TELNET AO sequence (see send ao above) to the 
remote host if telnet is in localchars mode (see toggle localchars 
below) and the flushoutput character is typed.  The initial value for the 
flush character is the terminal's flush character.

erase Sends a TELNET EC sequence (see send ec above) to the remote 
system if telnet is in localchars mode (see toggle localchars below), 
and if telnet is operating in character-at-time mode.  The initial value 
for the erase character is the terminal's erase character.

kill Sends a TELNET EL sequence (see send el above) to the remote 
system if telnet is in localchars mode (see toggle localchars below) 
and if telnet is operating        in character-at-a-time mode.  The initial 
value for the kill character is the terminal's kill character.

eof Sends this character to the remote system if telnet is operating in 
line-by-line mode and this character is entered as the first character 
on a line.  The initial value of the eof character is the terminal's eof 
character.

toggle arguments . . .  Toggles (between true and false) flags that 
control how telnet responds to events.  More than one argument may be 
specified and the current value of these flags can be displayed with the 
display command.  Valid arguments for the toggle command are the 
following:

localchars        Causes the flush, interrupt, quit, erase, and kill 
characters to be recognized locally and transformed into appropriate 
TELNET control sequences if this flag is set to true.  (See set above).  
The appropriate TELNET control sequences are: ao, ip, brk, ec, and el, 
respectively.  For more information see the send command.  The initial 
value for this toggle is true in line-by-line mode, and false in 
character at-a-time mode.

autoflush        Causes the telnet command to not display any data on the 
user's terminal until the remote system acknowledges (via a TELNET 
Timing Mark option) that it recognized and processed the following 
TELNET sequences: ao, intr, or quit. Both autoflush and localchars must 
be true for autoflush to work in this manner.  The initial value for this 
toggle is true if the terminal user did not specify stty noflsh.  
Otherwise it is false.  For further information, see stty(1).

autosynch Causes the TELNET SYNCH sequence to follow the TELNET 
sequence that is initiated when either the intr or quit character is 
typed.  The autosynch flag works in this manner when both the 
autosynch and localchars are true.  This procedure should cause the 
remote system to begin throwing away all previously typed input until 
both of the TELNET sequences have been read and acted upon.  The 
initial value of this toggle is false.

crmod Toggles carriage return mode.  When this mode is enabled, most 
carriage return characters received  from the remote host are mapped 
into a carriage return followed by a line feed.  It is useful only when 
the remote host sends carriage returns but never line feeds.  The initial 
value for this toggle is False.

debug Toggles socket level debugging which is useful only to the 
superuser.  The initial value for this toggle is false.

options Toggles the display of internal telnet protocol processing that 
deals with TELNET options.  The initial value for this toggle is false.

netdata Toggles the display of all network data (in hexadecimal 
format).  The initial value for this toggle is false.

?  Displays the legal toggle commands.

Restrictions   In line-by-line mode, the terminal's EOF character is only 
recognized and sent to the remote system when it is the first character 
on a line.

Telnet

-->

Type telnet followed by the name of the host that you want to access.  
If the connection is successful, you will see a message to that effect 
from telnet, followed by the opening screen provided by the remote 
host, in this case the Boston University library catalog.  

	      WELCOME TO THE BOSTON
	      UNIVERSITY LIBRARIES
	         AND TO TOMUS
	       THE ONLINE CATALOG

-->

You are now connected to the remote host, so you must use commands 
that are understood by that system.

--> find author twain
Your search:FIND AUTHOR TWAIN
Items found:197 at ALL BOSTON UNIVERSITY LIBRARIES
Press RETURN to see them, or type HELP, then press the key marked 
RETURN.

-> 

Leave the remote host by using the host's quit command (in this case 
that command happens to be quit), or by using your system's telnet 
"escape" keys.  You may have been told what this is when you first 
entered telnet (control-] may work).

(End of sample session.)

File Transfer

?  File Transfer Protocol (FTP)

?  Downloading Macintosh Files
 
The File Transfer Protocol (FTP) is the Internet standard protocol for 
moving files from one computer to another.  You can use the ftp 
command to copy computer files containing a variety of kinds of 
information, such as software, documentation, or maps.  FTP is the 
name not only of the protocol, but usually also of the program the user 
invokes to execute it (e.g., by typing ftp host.bbn.com).  FTP is available 
on several operating systems.

File Transfer Protocol (FTP)
           
Anonymous FTP, like Telnet, requires access to the Internet .  Unlike 
Telnet, anonymous FTP is widely available.  Anyone can become an 
Internet traveller by giving the command ftp host, for example, ftp 
cs.fredonia.edu.  When the remote host prompts with login:  and 
password:  (or something similar?details vary on different types of 
computers) the traveller types "anonymous" for the login name and 
"guest" for the password.
             
After logging in, the traveller remains in a program with a restricted 
set of commands.  Files on the remote host are usually protected so 
that visitors cannot change or delete them.

   Manual for FTP under UNIX

This is the UNIX (see BSD) manual entry for ftp.
             
ftp - file transfer program
             
Syntax: ftp [-v] [-d] [-i] [-n] [-g] [host]
             
The ftp command is the user interface to the ARPANET standard File 
Transfer Protocol.  The program allows a user to transfer files to and 
from a remote network site.

The client host with which ftp is to communicate may be specified on 
the command line.  If the client host is specified on the command line, 
ftp immediately attempts to establish a connection to an FTP server on 
that host; otherwise, ftp enters its command interpreter and awaits 
instructions from the user.  While ftp is awaiting commands from the 
user, it provides the user with the prompt:  ftp>.  
The following commands are recognized by ftp:

!     Invokes a shell on the local machine.

$ macro-name [ args ]   Executes the macro macro-name that was 
defined with the macdef command.  Arguments are passed to the macro 
unglobbed.

account [ passwd ]  Supplies a supplemental password required by a 
remote system for access to resources once a login has been 
successfully completed.  If no argument is included, the user is 
prompted for an   account password in a non-echoing input   mode.

append local-file [ remote-file ]   Appends a local file to a file on the 
remote machine.  If remote-file is not specified, the local file name is 
used in naming the remote file.  File transfer uses the current settings 
for type, format, mode, and structure.

ascii   Sets the file transfer type to network ASCII.  This is the default 
type.

bell  Arranges for a bell to sound after each file transfer command is 
completed.

binary    Sets the file transfer type to support binary image transfer.

bye   Terminates the FTP session with the remote server and exits ftp.

case  Toggles the remote computer's file name case mapping during 
mget commands.  When case is on (default is off), the remote 
computer's file names are written in the local directory with all 
letters in upper case mapped to lower case.

cd remote-directory   Changes the working directory on the remote 
machine to remote-directory.

cdup   Changes the remote machine working directory to the parent of 
the current remote machine working directory.

close   Terminates the FTP session with the remote server and returns 
to the command interpreter.

 cr    Toggles the carriage return stripping during ascii type file 
retrieval.  Records are denoted by a carriage return/linefeed sequence 
during ascii type file transfer.  When cr is on (the default), carriage 
returns are stripped from this sequence to conform with the UNIX 
single linefeed record delimiter.  Records on non-UNIX remote systems 
may contain single linefeeds; when an ascii   type transfer is made, 
these linefeeds may be distinguished from a record delimiter only when 
cr is off.
delete remote-file  Deletes the file remote-file on the remote machine.

debug [ debug-value ]   Toggles the debugging mode.  If an optional 
debug-value is specified, it is used to set the debugging level.  When 
debugging is on, ftp prints each command sent to the remote machine, 
preceded by the string q-->.

dir [ remote-directory ] [ local-file ]   Prints a listing of the directory 
contents in the directory, remote   directory, and, optionally, places the 
output in local file.  If no directory is specified, the current working 
directory on the remote machine is used.  If no local file is specified, 
output comes to the terminal.
disconnect   A synonym for close.

form format   Sets the file transfer form to format.  The default 
format is file.
get remote-file [ local-file ]   Retrieves the remote-file and stores it 
on the local machine.  If the local filename is not specified, it is given 
the same name it has on the remote machine.  The current settings for 
type, form, mode, and structure are used while transferring the file.
hash  Toggles the hash-sign (#) printing for each data block 
transferred.  The size of a data block is 1024 bytes.

glob  Toggles filename expansion for mdelete, mget, and mput.  If 
globbing is turned off with glob, the file name arguments are taken 
literally and not expanded.  Globbing for mput is done as in csh(1).  For 
mdelete and mget, each remote filename is expanded separately on the 
remote machine and the lists are not merged.  Expansion of a directory 
name is likely to be different from expansion of the name of an 
ordinary file.  The exact result depends on the foreign operating system 
and ftp server, and can be previewed by entering:  mls remote files.  
Neither mget nor mput is meant to transfer entire directory subtrees of 
files.  That can be done by transferring a tar(1) archive of the subtree 
(in binary mode).

lcd [ directory ]   Changes the working directory on the local machine.  
If no directory is   specified, the user's home directory is used.

ls [ remote-directory ] [ local-file ]   Prints an abbreviated listing of 
the contents of a directory on the remote machine.  If remote-directory 
is left unspecified, the current working directory is used.  If no local 
file is specified, the output is sent to the   terminal.

macdef macro-name   Defines a macro.  Subsequent lines are stored as 
the macro macro-name; a null line (consecutive newline characters in a 
file or carriage returns from the teminal) terminates macro input 
mode.  There is a limit of 16 macros and 4096 total characters in all 
defined macros.  Macros remain defined until a close command is 
executed.

The macro processor interprets dollar signs ($) and backslashes (\) as 
special characters.  A dollar sign ($) followed by a number (or numbers) 
is replaced by the corresponding argument on the macro invocation 
command line.  A dollar sign ($) followed by an i signals the macro 
processor that the executing macro is to be looped.  On the first pass, 
$i is replaced by the first argument on the macro invocation command 
line.  On the second pass it is replaced by the second argument, and so 
on.  A backslash (\) followed by any character is replaced by that 
character.  Use the backslash (\) to prevent special treatment of the 
dollar sign ($).
mdelete remote-files Deletes the specified files on the remote 
machine.  If globbing is enabled, the specification of remote files will 
first be expanded using ls.

mdir remote-files local-file Obtains a directory listing of multiple 
files on the remote machine and places the result in local-file.

mget remote-files Retrieves the specified files from the remote 
machine and places them in the current local directory.  If globbing is 
enabled, the specification of remote files will first be expanding using 
ls.

mkdir directory-name Makes a directory on the remote machine.

mls remote-files local-file Obtains an abbreviated listing of multiple 
files on the remote machine and places the result in local-file.

mode [ mode-name ]  Sets the file transfer mode to mode name.  The 
default mode is  the stream mode.

mput local-files  Transfers multiple local files from the current local 
directory to the current working directory on the remote machine.

nmap [ inpattern outpattern ] Sets or unsets the filename mapping 
mechanism.  If no arguments are specified, the filename mapping 
mechanism is unset.  If arguments are specified, remote filenames are 
mapped during mput commands and put commands which are issued 
without a specified remote target filename.  If arguments are 
specified, local filenames are mapped during mget commands and get 
commands which are issued without a specified local target filename.

This command is useful when connecting to a non-UNIX remote 
computer with different file naming conventions or practices.  The 
mapping follows the pattern set by inpattern and outpattern.

Inpattern is a template for incoming filenames (which may have 
already been processed according to the ntrans and case settings).  
Variable templating is accomplished by including the sequences $1, $2, 
..., $9 in inpattern.  Use a backslash (\) to prevent this special 
treatment of the dollar sign ($) character.  All other characters are 
treated literally, and are used to determine the nmap inpattern variable 
values.  For example, given inpattern $1.$2 and the remote file name 
mydata.data, $1 has the value mydata, and $2 has the value data.
The outpattern determines the resulting mapped filename.  The 
sequences $1, $2, ...., $9 are replaced by any value resulting from the 
inpattern template.

The sequence $0 is replace by the origi nal filename.  Additionally, the 
sequence [seq1,seq2] is replaced by seq1 if seq1 is not a null string; 
otherwise it is replaced by seq2.  For example, the command nmap 
$1.$2.$3 [$1,$2].[$2,file] yields the output filename myfile.data for 
input filenames myfile.data and myfile.data.old, myfile.file for the 
input filename myfile, and myfile.myfile for the input filename .myfile.  
Spaces may be included in outpattern, as in the exam ple: nmap $1 |sed 
"s/  *$//" > $1 .  Use the backslash (\) to prevent special treatment of 
the dollar sign ($), left bracket ([), right bracket (]), and comma (,).

ntrans [ inchars [ outchars ] ] Sets or unsets the filename character 
translation mechanism.  If no arguments are specified, the filename 
character translation mechanism is unset.  If arguments are specified, 
characters in remote filenames are translated during mput commands 
and put commands which are issued without a specified remote target 
filename.  If arguments are specified, characters in local filenames are 
translated during mget commands and get commands which are issued 
without a specified local target filename.

This command is useful when connecting to a non-UNIX remote 
computer with different file naming conventions or prac tices.  
Characters in a filename match ing a character in inchars are replaced 
with the corresponding character in outchars.  If the character's 
position in inchars is longer than the length of outchars, the character 
is deleted from the file name.

open host [ port ]  Establishes a connection to the speci fied host FTP 
server.  If an optional port number is supplied, ftp attempts to contact 
an FTP server at that port.  If the auto-login option is on (default), ftp 
automatically attempts to log the user in to the FTP server (see below).

prompt  Toggles interactive prompting.  Interactive prompting occurs 
during multiple file transfers to allow the user to retrieve or store 
files selectively.  If prompting is turned off (default), any mget or 
mput transfers all files.

proxy ftp-command  Executes an ftp command on a secondary control 
connection.  This command allows simultaneous connection to two 
remote ftp servers for transferring files between the two servers.  The 
first proxy command should be an open, to establish the secondary 
control connection.  Type the command proxy?  to see other ftp 
commands executable on the secondary connection.  The following 
commands behave differently when prefaced by proxy:

open will not define new macros during the auto-login process

close will not erase existing macro definitions

get and mget transfer files from the host on the primary control 
connection to the host on the secondary control connection

put, mput, and append transfer files from the host on the secondary 
control connection to the host on the primary control connection.  Third 
party file transfers depend upon support of the ftp protocol PASV 
command by the server on the secondary control connection.

put local-file [ remote-file ] Stores a local file on the remote machine.  
If remote-file is unspecified, the local file name is used in naming the 
remote file.  File transfer uses the current settings for type, format, 
mode, and structure.

pwd Prints the name of the current working directory on the remote 
machine.

quit  A synonym for bye.

quote arg1 arg2 ... Sends the arguments that are specified, verbatim, to 
the remote FTP server.  A single FTP reply code is expected in return.

recv remote-file [ local-file ] A synonym for get.

remotehelp [ command-name ] Requests help from the remote FTP 
server.  If a command-name is specified it is supplied to the server as 
well.

rename [ from ] [ to ] Renames the file from on the remote machine, to 
the file to.
reset Clears the reply queue.  This command re-synchronizes 
command/reply sequencing with the remote ftp server.  If the remote 
server violates the ftp protocol, resynchronization may be neccesary.
rmdir directory-name Deletes a directory on the remote machine.

runique Toggles storing of files on the local system with unique 
filenames.  If a file already exists with a name equal to the target 
local filename for a get or mget command, a .1 is appended to the name. 
If the resulting name matches another existing file, a .2 is appended to 
the original name.  If this process contin ues up to .99, an error 
message is printed, and the transfer does not take place.  The generated 
unique filename will be reported.  Note that runique will not affect 
local files generated from a shell command (see below).  The default 
value is off.

send local-file [ remote-file ] A synonym for put.

sendport  Toggles the use of PORT commands.  By default, ftp attempts 
to use a PORT com mand when establishing a connection for each data 
transfer.  If the PORT command fails, ftp uses the default data port. 
When the use of PORT commands is disabled, no attempt is made to use 
PORT commands for each data transfer.  This is useful for certain FTP 
implementations which do ignore PORT commands but, incorrectly, 
indicate that they have been accepted.

status  Shows the current status of ftp.
struct [ struct-name ] Sets the file transfer structure to struct-name.  
By default stream structure is used.

sunique Toggles storing of files on a remote machine under unique file 
names.  The remote ftp server must support the ftp protocol STOU 
command for successful completion of this command.  The remote 
server reports the unique name.  Default value is off.

tenex Sets the file transfer type to that needed to talk to TENEX 
machines.
trace Toggles packet tracing.

type [ type-name ]  Sets the file transfer type to type name.  If no type 
is specified, the current type is printed.  The default type is network 
ASCII.

user user-name [ password ] [ account ] Identifies the user to the 
remote FTP server.  If the password is not specified and the server 
requires it, ftp disables the local echo and then prompts the user for it.  
If an account field is not specified, and the FTP server requires it, the 
user is prompted for it also.  Unless ftp is invoked with auto login 
disabled, this process is done automatically on initial connection to the 
FTP server.

verbose Toggles the verbose mode.  In verbose mode, all responses from 
the FTP server are displayed to the user.  In addition, if verbose is on, 
statistics regarding the efficiency of a file transfer are reported when 
the transfer is complete. By default, verbose is on.

? [ command ] A synonym for help.
Command arguments which have embedded spaces may be quoted with 
quotation (") marks.

Aborting a file transfer  To abort a file transfer, use the terminal 
interrupt key (usually <CTRL/C>).  Sending transfers are halted 
immediately.  Receiving transfers are halted by sending a ftp protocol 
ABOR command to the remote server, and discarding any further data 
received.  The speed at which this is accomplished depends upon the 
remote server's support for ABOR processing.  If the remote server does 
not support the ABOR command, an ftp> prompt appears when the 
remote server has completed sending the requested file.
The terminal interrupt key sequence is ignored when ftp has completed 
any local processing and is awaiting a reply from the remote server.  A 
long delay in this mode may result from ABOR processing, or from 
unexpected behavior by the remote server, including violations of the 
ftp protocol.  If the delay results from unexpected remote server 
behavior, the local ftp program must be killed by hand.

File-naming conventions  Files specified as arguments to ftp commands 
are processed according to the following rules:

1)  Standard input is used for reading and standard output is used for 
writing when the file name is specified by an en dash (-).
2)  If the first character of the file name is a vertical line (|), the 
remainder of the argument is interpreted as a shell command.  The ftp 
command then forks a shell, using popen(3) with the argument supplied, 
and reads (writes) from the stdout (stdin).  If the shell command 
includes spaces, the argument must be quoted, as in ""| ls -lt"".  A 
particularly useful example of this mechan ism is: "dir |more".
3)  If globbing is enabled, local file names are expanded according to 
the rules used in the csh(1) (compare to the glob command).  If the ftp 
command expects a single local file, such as put, only the first 
filename gen erated by the globbing operation is used.
4)  For mget commands and get commands with unspecified local file 
names, the local filename is the remote filename and can be altered by 
a case, ntrans, or nmap setting.  The resulting filename may then be 
altered if runique is on.

5)  For mput commands and put commands with unspecified remote file 
names, the remote filename is the local filename and may be altered by 
a ntrans or nmap setting.  The resulting filename can then be altered by 
the remote server if sunique is on.

File transfer parameters      Many parameters can affect a file transfer. 
The type can be ascii, image (binary), ebcdic, or local byte size (for 
PDP10's and PDP-20's generally).  The ftp command supports the ascii 
and image types of file transfer and local byte size 8 for tenex mode 
transfers.
The ftp command supports only the default values for the remaining 
file transfer parameters: mode, form, and struct.

The .netrc file   The .netrc file contains login and initialization 
information used by the auto-login process.  It resides in the user's 
home directory.  The following tokens are recognized; they may be 
separated by spaces, tabs, or new-lines:

machine name  Identifies a remote machine name.  The auto-login 
process searches the .netrc file for a machine token that matches the 
remote machine specified on the ftp command line or as an open 
command argu ment.  Once a match is made, the subse quent .netrc 
tokens are processed, stop ping when the end of file is reached or 
another machine token is encountered.

login name  Identifies a user on the remote machine. If this token is 
present, the auto-login process initiates a login using the specified 
name.

password string Supplies a password.  If this token is present, the 
auto-login process supplies the specified string if the remote server 
requires a password as part of the login process.  Note that if this 
token is present in the .netrc file, and if the .netrc is readable by 
anyone other than the user, ftp aborts the auto-login process.

account string  Supplies an additional account password.  When this 
token is present, the auto login process supplies the the remote server 
with an additional account pass word if the remote server requires it.  
If it does not, the auto-login process initiates an ACCT command.

macdef name Defines a macro.  This token functions like the ftp macdef 
command.  A macro is defined with a specified name; its con tents 
begin with the next .netrc line and continue until a null line (consecu 
tive new-line characters) is encoun tered.  If a macro named init is 
defined, it is automatically executed as the last step in the auto-login 
process.

Options

-d  Enables debugging.
-g  Disables file name expansion.
-i  Disables interactive prompting during multiple file transfers.
-n  Disables autologin during an initial connection. If auto-login is 
enabled, ftp will check the .netrc file in the user's home directory for 
an entry describing an account on the remote machine.  If no entry 
exists, ftp will use the login name on the local machine as the user 
identity on the remote machine, prompt for a password and, optionally, 
an account with which to login.

-v  Displays all responses from the remote server as well as all data 
transfer statistics.

Restrictions Correct execution of many commands depends on proper 
behavior by the remote server.  An error in the treatment of carriage 
returns in the 4.2BSD UNIX ascii-mode transfer code has been 
corrected.  This correction may result in incorrect transfers of binary 
files to and from 4.2BSD servers using the ascii type.  Avoid this 
problem by using the binary image type.

FTP

-->

Type ftp followed by the address of the host you want to access.  The 
ftp program will respond with a message.  If the connection 
was successful, you will see a response like the one above.
(Click the arrow to continue.

-->  ftp nic.near.net

Connected to nic.near.net.
220 nic.near.net FTP server ready.

Then you will normally be prompted to give a name and a password.  If 
the system allows anonymous ftp, the name will often be "anonymous" 
and the password may be "guest" or you may be asked to use your 
username as a password.  Again you will get a response.
(Click the arrow to continue.)

The "list" command (ls) causes the remote computer to print a list of 
available subdirectories and files.  Below is an exercise that will show 
you how to change directories and transfer a file from a subdirectory.  
The commands you will type are printed in bold italics.

ftp> 

After you are logged in, you can issue a few commands, such as ls to 
list the contents of the current directory.    (Click the arrow to 
continue.)

The "list" command (ls) causes the remote computer to print a list of 
available subdirectories and files.  Below is an exercise that will show 
you how to change directories and transfer a file from a subdirectory.  
The commands you will type are printed in bold italics.

ftp> 

To see the ftp commands available to you, type ?  at the "ftp>" prompt.  
(The list of commands shown here is incomplete.) 

The "list" command (ls) causes the remote computer to print a list of 
available subdirectories and files.  Below is an exercise that will show 
you how to change directories and transfer a file from a subdirectory.  
The commands you will type are printed in bold italics.

ftp> 

Type the "status" command to check your file type.

The "list" command (ls) causes the remote computer to print a list of 
available subdirectories and files.  Below is an exercise that will show 
you how to change directories and transfer a file from a subdirectory.  
The commands you will type are printed in bold italics.

ftp>

To ftp text files, including files that end in ".txt" or ".ps", your file type 
should be ASCII.   This is the default.  (The ASCII setting is the same as 
TEXT.)   (Click the arrow to continue.)

The "list" command (ls) causes the remote computer to print a list of 
available subdirectories and files.  Below is an exercise that will show 
you how to change directories and transfer a file from a subdirectory.  
The commands you will type are printed in bold italics.

ftp>

If you intened to ftp non-ascii files, including compressed files that 
end in ".Z" or object files, set your file type to binary. The "binary" 
setting is the same as "image."  (Click the arrow to continue.)

ftp> 

The cd command is used to change directories on the remote host.

ftp>  cd info-sources
250 CWD command successful.

The get command is used to copy a file from the remote host to your 
system.  Type get and the name of the file you want.  You will be told 
when the transfer is complete.

ftp> cd info-sources
250 CWD command successful.

ftp> get README

PORT command successful.
150 Opening ASCII mode data connection for README (1042 bytes).
226 Transfer complete.
1071 bytes received in 0.02 seconds (52 Kbytes/s).  

ftp> 

Leave ftp and close the connection by typing quit at the ftp prompt.  
(End of sample session.)
     
Downloading

Over the Internet you can reach archives of Macintosh files.  You can get 
Macintosh files such as HyperCard stacks, tools, fonts, games, tips, 
desk accessories, cdevs, inits, demos, and applications from these 
archives.  Before the files can be run on your Macintosh, you must ftp 
them and then process them.  Here is a general description of how to 
get files from an archive to your Mac.  See your system administrator 
or ask a Macintosh user group for more information.

In summary, there are generally five steps to pulling files from 
Macintosh archives:


1. Transfer to your computer with ftp 
    (using a text-only option).

2. If necessary, combine the parts.

3. Transfer to your Macintosh.

4. Run BinHex 4.0 and/or StuffIt to convert 
    the .hqx files into either Macintosh files 
    or compressed Macintosh files (or use a   
   Unix program such as mcvert or xbin
    before transferring the file to your 
    Macintosh.)

5. If a file is compressed, use the  
    appropriate decompression program   
   (usually StuffIt, or UnStuffIt) to 
   decompress it.  

Step 1, ftp

First, ftp to a site that has Macintosh files, 
such as rascal.ics.utexas.edu or the info-mac directory at sumex-
aim.stanford.edu.  (Note that sumex may not be available for anonymous 
ftp during west coast business hours.)  On sumex, use the account name 
"anonymous" (lower-case) and enter any password.  Type ls to see a list 
of directories, and type cd to a directory of Macintosh files. (on sumex, 
type cd info-mac).  Type ls again to see a list of subdirectories, and 
type cd with the name of a subdirectory that interests you.  Type ls 
again to see the filenames.

Choose a file and ftp it (using ftp's get [filename] command?with a 
statement like get disinfectant.hqx).  An ftp transfer using a text-only 
option should work, since the files are normally in text format.

Step 2 

Some files are large and have been split into smaller pieces so that 
they can be more easily mailed.  You must join them together. hqx files 
can be edited as text; therefore, you can use any word processor or the 
append command on your host to stitch the pieces together. There are 
some files in the info-mac/util directory on sumex that do this step 
for you (unity and united).

Step 3 or 4, decode binhex file

Most files are stored in BinHex 4.0 (text) format.  The common practice 
is to label such files with .hqx extensions.  To take these files and use 
them on your Macintosh, you must first run them through a program that 
will convert them from .hqx format.  On Unix systems, you can use the 
mcvert program, stored as /unix/mcvert.shar.  You can also do the 
conversion on your Macintosh after you transfer the file.  On the Mac, 
use either BinHex 4.0 or StuffIt.  In Stuffit, choose "Decode Binhex file" 
from the "Other" menu.  Ask your system administrator what is the best 
method to use on your system.     

Step 3 or 4, transfer the file to your Macintosh

Ask your system adminstrator what method you should use to do this?
such as kermit or ftp.

Step 5, unstuffing

Many files have been compressed to save space.  You will know they 
have been compressed when the filename (after converting to Macintosh 
format) ends with a .sit, .cpt, .sea, or .pit extension.  You should use 
StuffIt (or Unstuffit) to convert .sit and .pit compressed files into 
uncompressed Macintosh files.  (With .pit files you need to set a special 
StuffIt option to decompress them, since they are not in the usual 
StuffIt format.)  The other types, .cpt and .sea, are becoming 
increasingly common as Compactor gains in popularity.  Both Compactor 
and Stuffit are in the /util directory on info/mac.

In Stuffit, the name of the file you clicked on will appear in a window.  
Select it and then click extract at the bottom of the screen.  Then 
select the new file(s) that appear in the window, and click the Save All 
button on the right.  Stuffit will create the new file(s) (while 
preserving the stuffed .sit file). 

These are some of the kinds of resources available on the Internet.  

  ?  INTERNET RESOURCE GUIDE

  ?  COMPUTING CENTERS

  ?  LIBRARY CATALOGS

  ?  DATA ARCHIVES

  ?  WHITE PAGES

 ?  MISCELLANEOUS


Internet Resources

These are some of the kinds of resources available on the Internet.  

  ?  INTERNET RESOURCE GUIDE

 ?   COMPUTING CENTERS


  ?  LIBRARY CATALOGS


  ?  DATA ARCHIVES


  ?  WHITE PAGES


 ?  MISCELLANEOUS
     
Internet Resource Guide

The Internet Resource Guide is an online 
book that describes many services available on the Internet.  You can 
transfer the resource guide via ftp from the 
subdirectory info-sources on the machine nnsc.nsf.net (see the next 
card).  The IRG is also distributed electronically by the NSF Network 
Service Center (NNSC).  If you wish to receive additions to the IRG in 
electronic mail messages, send a note to resource-guide-
request@nnsc.nsf.net, and specify whether you would like them in 
PostScript format, text format, or whether you want to receive notices 
that additions are available for ftp.  

Internet Resource Guide

How to Get and Use the 
Internet Resource Guide

To get The Internet Resource Guide over the Internet, use the command 
ftp nnsc.nsf.net and then cd resource-guide.

The resource-guide directory hierarchy is organized by chapter and 
section.  Each chapter has its own subdirectory (resource-
guide/chapter.#), and each section has two files in that directory, one 
for PostScript (section#-#.ps) and one for plain text (section#-#.txt).  

So, to retrieve section 1 of chapter 1, you should ftp the files:

resource-guide/chapter.1/section1-1.ps  (Postscript)

resource-guide/chapter.1/section1-1.txt  (Text)

To simplify retrieval of entire chapters and chapter updates, or of the 
entire IRG, you can ftp compressed tar files.  These include a the entire 
guide in text format (resource-guide-txt.tar.Z), in PostScript format 
(resource-guide-ps.tar.Z), or as a plain text file (wholeguide.txt).  
There are also files of individual chapters in both formats.  The most 
recent changes to a chapter are in a file named
chapter#-changes.tar.Z.  These include Postscript and text versions of 
the most recently updated sections.

resource-guide/chapter1-changes.tar.Z

Nitty-Gritty Information about PostScript, ftp, Compress, and tar files.

A Note about PostScript Documents

PostScript is a formatting language used to prepare documents for 
printing on advanced printers such as Apple LaserWriters.
PostScript files contain ASCII characters only, but are virtually 
unreadable because the text of the document is interspersed with
numerous formatting commands and numeric symbols for printers' 
characters that are not part of the ASCII character set.

Do not attempt to print PostScript files unless you have a printer that
is specifically designed for PostScript.

How to Use the ftp Command

You can ftp the resource guide files from nnsc.nsf.net with a standard 
anonymous ftp connection:

           ftp nnsc.nsf.net

You will see a "banner" and be promted for your login:

        Connected to nnsc.nsf.net.
        220 nnsc.nsf.net FTP server (Version      5.59 Mon May 14 13:48:21 
EDT 1990) ready.
        Name (nnsc.nsf.net:yourname):

You should type anonymous, and then use the password guest.  The 
password will not be displayed on your terminal.

        Name (nnsc.nsf.net:name): anonymous
        Password (nnsc.nsf.net:anonymous):
        331 Guest login ok, send ident as password.
        230 Guest login ok, access restrictions apply.
        ftp>

    3)  Change directory to the "resource-guide" directory:

         ftp> cd resource-guide

    4)  To get a listing of the files in the resource-guide directory, give 
the "dir" command (usually equivlent to the "ls" command on Unix 
systems).

            ftp> dir *
            ...
            chapter.1/section1-1.ps
            etc.

        section1-1.ps is in the chapter.1 directory.  Use the "cd"
        command again.

            ftp> cd chapter.1

How to Uncompress and Extract the tar.Z Files

Do not attempt to use the tar.Z files unless you have the Unix 
"compress" and "uncompress" commands and the "tar" command on your 
host computer, and your operating system is compatible with Berkeley 
Unix.

    1)  Use the "uncompress" command to 
         replace the compressed "Z" file
         with a copy of the file as it was before 
         "compress" was used:

         uncompress -v chapter1-ps.tar.Z
         chapter1-ps.tar.Z:  -- replaced with chapter1.tar

        The result is "chapter1-ps.tar".

    2)  Use tar -xvf to replace the tar 
         file with the set of directories and files 
         in the original file.

         tar -xvf chapter1.tar
         x copyright.ps, 5931 bytes, 12 tape blocks
         x copyright.txt, 945 bytes, 2 tape blocks
            etc. ...

This creates a new directory, chapter.1, with the files:

            copyright.ps
            copyright.txt
            intro.ps
            intro.txt
            section1-1.ps
            section1-1.txt
            etc. ...

Then you throw away the files you don't want?either the ".ps" files or 
the ".txt" files ?and print the files that remain.

For more information about the action of these commands, consult the 
manual for your Unix system, or give the commands "man compress" and 
"man tar" for online documentation.                   

Computational resources are centers or machines that serve users who 
have special computing requirements.  A good example of such a 
resource is a supercomputer center.

Air Force Supercomputer Center at Kirtland AFB

Arizona:  University of Arizona Supercomputing Center

BRL: US Army Ballistic Research Laboratory

Berkeley: University of California Information Systems and Technology

Calgary:  SuperComputing Services, The University of Calgary 

CERPASS:  Center for Experimental Research in Parallel Algorithms, 
Software and Systems

Cornell National Supercomputer Facility: Center for Theory and 
Simulation in Science and Engineering

NCAR:  National Center for Atmospheric Research

NCSA:  National Center for Supercomputing Applications

NCSC:  North Carolina Supercomputing Center 

NERSC: National Energy Research Supercomputer Center 

NPAC: Northeast Parallel Architectures Center 

OSC:  Ohio Supercomputer Center 

PSC:  Pittsburgh Supercomputing Center

SDSC:  San Diego Supercomputer Center

Texas:  University of Texas System Center for High Performance 
Computing 

UCLA Office of Academic Computing

Air Force:  consulting@ddnvx1.afwl.af.mil

Cornell:  psfy@cornellf.tn.cornell.edu

NCAR:  scdinfo@ncar.ucar.edu

UCLA:  calloac@oac.ucla.edu

Arizona:  kgrmc@asuacad.bitnet or kgbat@asuacad.bitnet

NCSC:  info@flyer.ncsc.edu

Texas:  g.smith@chpc.utexas.edu

CERPASS:  cerpass@isi.edu

Calgary:  super@uncacdc.bitnet

Berkeley:  consult@cmsa.berkeley.edu (CMS) or 
consult@lynx.berkeley.edu (Cray)

BRL:  crimmins@brl.mil

SDSC:  consultant@sdsc.edu

NCSA:  consult@ncsaa.ncsa.uiuc.edu

NERSC:  consultant@nersc.gov

NPAC:  npac@nova.npac.syr.edu

OSC:  oschelp@osc.edu

PSC:  consult@a.psc.edu


Computing Centers

Many libraries allow access to their catalogs via the Internet.  Such 
catalogs can be useful for finding books not available at a local library 
or to check citations or references.  Some catalogs also support more 
extended reference facilities.

Please note that online catalogs often have a limited number of ports; 
users are asked not to abuse their access.
 
ARLO, The Library Catalog for the University of Colorado at Colorado 
Springs

Boston University (TOMUS)

Univ. California and California St. (MELVYL)

Cleveland Public Library Catalog

Colorado Alliance of Research Libraries  

Emory University Libraries Online Public Access Catalog  

Florida Center for Library Automation

HOLLIS: Harvard Online Library Automation System

U. Illinois at Chicago NOTIS/LUIS

Info-Lib

InfoTrax

MAGIC?Michigan State University Libraries

MIRLYN, The University of Michigan's Online Catalog  

Northwestern University LUIS Online Catalog

Research Libraries Information Network (RLIN)

U. New Mexico Gateway 

Penn State University Library Information and Access System (LIAS)

U. Pennsylvania Libraries

URSUS, University of Maine System Library Catalog

U. Utah Library Card Catalog System

U. Wisconsin Madison and Milwaukee Campuses Network Library System 
(NLS)

Boston University (TOMUS)
library.bu.edu (128.197.4.200)

California (MELVYL)
melvyl.ucop.edu (31.1.0.1)

RLIN rlg.stanford.edu (36.54.0.18)

Colorado 
pac.carl.org (192.54.81.128)

Florida 
nervm.nerdcufl.edu

MIRLYN, U. Michigan  
cts.merit.edu (35.1.1.6)

New Mexico 
bootes.unm.edu (129.24.8.2)

Emory University Libraries 
emuvm1.cc.emory.edu (128.140.1.4)

MAGIC: merit.msu.edu (35.8.2.56) or magic.msu.edu (35.8.2.99)

Info-Lib: umd5.umd.edu

InfoTrax: infotrax.rpi.edu (128.113.1.31)

ARLO:  arlo.colorado.edu (128.198.26.129)

Pennsylvania: pennlib.upenn.edu

Wisconsin: nls.adp.wisc.edu (128.104.198.20)

U. Utah:  lib.utah.edu

NW: pacx.acns.nwu.edu (129.105.49.2)

URSUS: ursus.maine.edu (130.111.64.1)

Cleveland: clevxe.cpl.org 

U. Illinois:  uicvm.uic.edu (128.248.2.50)

Penn State:  lias.psu.edu (128.118.25.13)

HOLLIS:  hollis.harvard.edu (128.103.60.31)

Data Archives

The Internet is home to a wide variety of data archives.  In this section 
we try to list the more important and the more uncommon archives.  In 
particular, we do not  list  archives of mailing lists, other than those 
that do software distributions.  Such archives can be located by asking 
the maintainers of the mailing lists.

Archie Archive Server Listing Service

COSMIC

Dartmouth Dante Database 

Gene-Server

IBM Supercomputing Program Data Base

INFO-SOUTH Latin American Information System

IuBio Archive for Molecular and General Biology 

LiMB (Listing of Molecular Biology Databases)

Matrix of Biological Knowledge Archive-Server

MBCRR: The Molecular Biology Computer Research Resource

MEMDB: Medieval and Early Modern Data Bank

University of North Carolina at Chapel Hill INFO Service

NED (NASA/IPAC Extragalactic Database)

NETLIB Mathematical Software Distribution System

PENpages

SDDAS: Southwest Research Data Display & Analysis System

SERVICE Mail Server?DDN NIC 

SIMBAD

SIMTEL20 Software Archives

Unidata weather data program 

VxWorks Users Group Archive 

Washington University Public Domain Archives 

Gene Server: email "SEND HELP" to: genbank-server@uhnix2.uh.edu, 

Molecular Biology Databases: limb@lanl.gov

SIMBAD: simbad@cfa.harvard.edu

SIMTEL20 : 26.2.0.74

SDDAS: espsun.space.swri.edu

Wash.: wuarchive.wustl.edu (128.252.135.4)

Matrix: email "SEND HELP" to: genbank-server@uhnix2.uh.edu, 

COSMIC:  e-mail to: cosnic@uga.bitnet or
service@cossack.cosmic.uga.edu

IUBIO Biology Archive: iubio.bio.indiana.edu

PENpages:  psupen.psu.edu (128.118.36.5)

Dante: eleazar.dartmouth.edu (129.170.16.2)

MEMDB: 4212001@rutmvs1.rutgers.edu

NETLIB: netlib@mcs.anl.gov

VxWorks: thor.atd.ucar.edu (128.117.81.51)

IBM:  send mail to: listserv@uicvm.cc.uic.edu,
containing "get supersft help" 

SERVICE: e-mail to service@nic.ddn.mil 
with "HELP" in subject line

Unidata:  unidata.ucar.edu

Archie:  quiche.cs.mcgill.ca (132.206.3.30) login as archie.

MBCRR:  mbcrr.harvard.edu

NED:  ipac.caltech.edu

Chapel Hill INFO:  info.acs.unc.edu  
username: info

INFO-SOUTH: sabio.ir.miami.edu (129.171.32.26)

White Pages

The Internet supports several databases that  contain basic information 
about users, such as e-mail addresses, telephone numbers, and  postal  
addresses.  These databases can be searched to get information about 
particular individuals.  Because they serve a function akin to the 
telephone book, these databases are often referred to as "white pages."  
(The names of the resources are followed by the addresses to use for 
remote login.)
  
NASA Ames Research Center Electronic Phone Book

DDN Network Information Center WHOIS Service 

NYSERNet/PSI White Pages Pilot Project 

CREN/CSNET User Name Server "ns"

Knowbot Information Service

This section lists diverse Internet resources that defy better 
categorization.

Chiron: Linotype Postscript Typesetter

CIAC (Department of Energy Computer Incident Advisory Capability)

FAST?A Computer Network Broker for Standard Electronic Parts

Geographic Name Server

MOSIS Chip Fabrication Server 

Nest - A Network Simulation Testbed 

PROPHET

Vax Book 

Chiron:  joe@wjh12.harvard.edu

CIAC:  email to ciac@tiger.llnl.gov or ciac@lll-crg.llnl.gov

Geographic:
martini.eecs.umich.edu 

Nest:   columbia.edu (10.3.0.89)

PROPHET:  e-mail to prophet-help@bbn.com

FAST:  e-mail "REQUEST: INFORMATION 
TOPIC: INTRODUCTION 
REQUEST: END" to fast@isi.edu 

Vax Book 
decoy.uoregon.edu (128.223.32.19)

MOSIS:  e-mail to: mosis@mosis.edu 

Miscellaneous Resources

This section lists diverse Internet resources that defied better 
categorization.

Chiron: Linotype Postscript Typesetter

Department of Energy Computer Incident Advisory Capability (CIAC)

Geographic Name Server
port 3000 on martini.eecs.umich.edu

MOSIS Chip Fabrication Server 

Nest - A Network Simulation Testbed 
columbia.edu (10.3.0.89)

PROPHET

FAST - A Computer Network Broker for Standard Electronic Parts

Vax Book 
DECOY.UOREGON.EDU (128.223.32.19)

These are information centers (NICs) for networks in the Internet and 
outside it. 

  ?  BITNET NIC

  ?  CREN/CSNET CIC

  ?  DDN NIC (Defense Data Net NIC)

  ?  NNSC (NSF Network Service Center)

  ?  OCEANIC 

  ?  SPAN NIC    

Geographic:
martini.eecs.umich.edu 

Nest:   columbia.edu (10.3.0.89)

Vax Book 
decoy.uoregon.edu (128.223.32.19)

Network Information Centers


Miscellaneous Resources

This section lists diverse Internet resources that defied better 
categorization.

Chiron: Linotype Postscript Typesetter

Department of Energy Computer Incident Advisory Capability (CIAC)

Geographic Name Server
port 3000 on martini.eecs.umich.edu

MOSIS Chip Fabrication Server 

Nest - A Network Simulation Testbed 
columbia.edu (10.3.0.89)

PROPHET

FAST - A Computer Network Broker for Standard Electronic Parts

Vax Book 
DECOY.UOREGON.EDU (128.223.32.19)
               
BITNET Information Center

BITNIC provides and coordinates user 
support,  information, and administrative services for BITNET, 
including:

?    BITNEWS, an electronically distributed
      newsletter.

?    On-line BITNET documentation 
      accessible via LIST-SERV and 
      NETSERV server.

?    On-line and telephone assistance for 
      campus BITNET support staff and 
      organizations seeking BITNET 
      membership.

Network Access:

Subscribe to BITNEWS by sending electronic mail to LISTSERV@BITNIC 
(on BITNET) with any subject and the text: SUBSCRIBE BITNEWS your-
name

Obtain a list of files available by sending mail with any subject and the 
text: SENDME NETINFO INDEX

Order a file by sending mail with any subject and the text SENDME 
filename filetype using the filename and filetype of the file as shown 
in NETINFO INDEX.

Address:
           BITNET Network Information Center
           EDUCOM
           Suite 600
           1112 Sixteenth Street, NW
           Washington, DC 20036

Email: 
          bitnet@bitnic (on BITNET)
          bitnet%bitnic@cunyvm.cuny.edu 
              (on Internet)

Phone: (202) 872-4200

Who Can Use the BITNET

The BITNIC services are supported by dues  from the BITNET member 
organizations, 
and their primary purpose is to assist BITNET members.  The on-line 
newsletter and files are, however, available to all who can access 
BITNET with electronic mail.
               
CREN/CSNET CIC

The CREN/CSNET Coordination and Information Center provides 
technical and information support for members of CREN/CSNET.

The CIC staff also maintains the following automated services, which 
can be accessed by electronic mail from CSNET hosts, and also from all 
other hosts that can exchange mail with the Internet.

The Info-Server: info-server@sh.cs.net

This automatic program distributes documents in response to specially 
formatted messages.  Info documents are also available to Internet 
users through standard anonymous ftp login.

For instructions about this and other services, send a message to info-
server@sh.cs.net with "HELP" in the body of the message.

Email/ftp: info-server@sh.cs.net

Provides file transfer service to hosts that do not have access to the 
Internet. (In beta test.)

Status: info-server@sh.cs.net

The status report on the availability of exceptional CSNET systems can 
be retrieved from the Info-Server.

The User Name Server: registrar@sh.cs.net

This is a central database containing information about CSNET sites 
and users, which is maintained on the CIC Service Host, sh.cs.net.  
Users on other sites may send specially formatted messages by 
electronic mail, or may access the User Name Server by dial-up modem 
on (617) 491-2777.  Internet users may telnet to sh.cs.net and log on as 
ns, no password required.

Fixaddr: fixaddr@relay.cs.net (or fixaddr@sh.cs.net) 

This program is a helpful first step in converting mailing lists to up-
to-date domain-style addresses.  Send a message with a mailing list in 
the body of the message.

The list should contain one address per line, in the form "user@domain", 
for example, "groucho@cs.fredonia.edu".  Fixaddr will convert nicknames 
into official names.  It checks both the DDN NIC host table, and the 
Internet domain servers, using the MX option for off-Internet hosts.  It 
knows about non-domain-style names that have disappeared from the 
NIC table.

Nslookup: nslookup@sh.cs.net

For hosts that do not have access to domain servers.  Send a message 
with domain names or IP addresses, one per line, in the body of the 
message.  The nslookup program sends back a message containing all 
the domain nameserver records (not just the MX ones) for the named 
domains.

Network Access

Unlimited

Address:

CREN/CSNET Coordination and Information Center (CIC)
BBN
10 Moulton Street
Cambridge MA 02138

Email: cic@sh.cs.net

Phone: (617) 873-2777

Who Can Use the Resource/Restrictions

Open to all Internet users.

Miscellaneous Information

Karen Roubicek, Manager
Charlotte Mooers, User Services                 

DDN Information Center

The DDN Network Information Center (NIC) assists Defense Data 
Network (DDN) users and potential subscribers in obtaining information 
about the DDN and the Internet.
  
The NIC provides the following databases  and information servers:

?    WHOIS registry of users, hosts, domains, and networks

?    NIC/QUERY browsing system

?    TACNEWS server

?    SERVICE electronic mail server

The NIC provides host name translation tables, maintains domain 
system server files, assigns IP network numbers and autonomous 
system numbers, registers network users, and issues MILNET TAC 
access cards.  The NIC is the site of the DDN Security Coordination 
Center (SCC).  The NIC is also the source of DDN documents and the 
complete Internet Request For Comments (RFC) series and index.

The NIC maintains a toll-free hotline from 6:00 a.m. to 5:00  p.m. 
(Pacific time) at 1-800-235-3155 or (415) 859-3695.  Users  
experiencing problems with TAC login, or who have requests for NIC 
services, are encouraged to call.

The NIC has numerous publicly accessible information files available in 
the following public directories:

            ?    NETINFO:

            ?    RFC:  PROTOCOLS:

            ?    SCC:

            ?    IEN:

            ?    DDN-NEWS:

Each directory has an index.   Files are available  for anonymous ftp 
and, in most cases, are accessible via the automatic mail server 
SERVICE@NIC.DDN.MIL.

The NIC shadows IETF information in the publicly  accessible IETF: and 
INTERNET-DRAFTS: directories.

Network Access

?   FTP to nic.ddn.mil (192.67.67.20) to  
     retrieve NIC files.

?   Telnet to nic.ddn.mil to use  servers  or  
     run WHOIS program.

?  Send electronic mail to   
    service@nic.ddn.mil to receive 
    information via the mail server.

?  By user Kermit server to retrieve NIC files

Address:
       SRI International
       Network Information Systems Center    
       Room EJ291
       333 Ravenswood Avenue
       Menlo Park, CA 94015

E-mail: nic@noc.ddn.mil (for general user questions or document 
requests)

Phone: 1-800-235-3155 or (415) 859-3695

Who Can Use the DDN NIC

All services are available to users of the DDN.   Many services are 
available to  Internet users.  Some services are available via electronic 
mail to users of networks that gateway to the Internet.

Miscellaneous Information

NIC role mailboxes for further assistance:

NIC@NIC.DDN.MIL           
General user assistance and document requests

REGISTRAR@NIC.DDN.MIL     
User registration and WHOIS updates

HOSTMASTER@NIC.DDN.MIL    
Host, domain, network changes and updates

SCC@NIC.DDN.MIL           
DDN network security information

ACTION@NIC.DDN.MIL        
NIC computer operations

SUGGESTIONS@NIC.DDN.MIL   
Comments on NIC services and publications

SERVICE@NIC.DDN.MIL       
Automatic mail service

Who Can Use the DDN NIC

All services are available to users of the DDN.   Many services are 
available to Internet users.  Some services are available via electronic 
mail to users of networks that gateway to the Internet.

Miscellaneous Information

NIC role mailboxes for further assistance:

nic@nic.ddn.mil           
General user assistance and document requests

registrar@nic.ddn.mil     
User registration and WHOIS updates

hostmaster@nic.ddn.mil    
Host, domain, network changes and updates

scc@nic.ddn.mil           
DDN network security information

action@nic.ddn.mil        
NIC computer operations

suggestions@nic.ddn.mil   
Comments on NIC services and  publications

service@nic.ddn.mil       
Automatic mail service



NNSC

The NSF Network Service Center provides information services and 
technical assistance to NSFNET end-users.  Information and documents 
(available online or printed) cover topics such as resources (the 
Internet Resource Guide), contacts at the midlevel networks and at 
local campuses and institutions (the Internet Managers' Phone Book), 
and network status reports.  When prospective or current users do not 
know whom to call concerning their questions about NSFNET use, they 
should contact the NNSC by electronic mail at nnsc@nnsc.nsf.net or by 
telephone at (617) 873-3400.

Online information is available via ftp and from the Info-Server, an 
automated program which distributes documents in response to 
specially formatted  messages.  For  instructions about the info-server, 
send a message to info-server@nnsc.nsf.net with "HELP" in the body of 
the message.

Address:
            NNSC
            BBN Systems & Technologies 
            10 Moulton Street
            Cambridge, MA 02138

Email: nnsc@nnsc.nsf.net

Phone: (617) 873-3400

Who Can Use the NNSC

NNSC services are geared toward users of NSFNET, however the staff 
will provide assistance, either directly or by referring questions to a
more appropriate source for information, to users with general 
Internet-related questions or problems.

Miscellaneous Information

To receive copies of the NNSC newsletter (the NSF Network News) or 
other publications, please send a message to nnsc@nnsc.nsf.net.

OCEANIC

OCEANIC, the Ocean Network Information Center primarily supports the 
World Ocean Circulation Experiment (WOCE) research program. Examples 
of OCEANIC content are:

?    WOCE program information

      ?    Summaries of research projects with  
           emphasis on data collection

      ?    WOCE Field Program plans,   
            resources and maps

      ?    WOCE administrative information

?    Directories of oceanographic datasets:

      ?    Holdings of major data centers

      ?    Directories of datasets of special 
            interest to WOCE

?    A WOCE data-tracking system:

      ?    Datasets planned, being collected, 
            being analyzed, and in data centers.

?    A library of data products.

OCEANIC also includes:

?    A searchable directory of oceanographers on Internet, SPAN, 
Telemail (Omnet and Kosmos), and Bitnet.

?   A searchable international oceanographic 
    research ship schedules.

OCEANIC is self-explanatory and menu-driven. Though intended to work 
with simple terminals, to view graphical material, you must use a 
terminal-emulation program compatible with the Tektronix 4010 
standard.

Network Access:

Internet:  telnet to host delocn.udel.edu (128.175.24.1) and login with 
username INFO.  No password is required.

SPAN: use SET HOST DELOCN, and login with username INFO.  No 
password is required.

TELEMAIL/ OMNET (Domestic USA): Use command GOTO SONIC.

Users in Alaska should use Telenet/Omnet network  address 909014 
and follow the instructions above.

International direct: The preferred method is via the international 
packet-switched network address: 
311030200612?if your national system  requires  a  twelve-digit 
address

31103020061200?if your national system  requires a fourteen-digit 
address

Some national systems require two zeroes  in  front  of  the address.  
You may need to experiment.

You will connect directly into OCEANIC.  No  password is required.

International TELEMAIL/Omnet:   You   may   connect via 
Telemail/Omnet at one of these addresses: 

311090900003?if your local network requires a twelve-digit address

31109090000300?if your local network requires a fourteen-digit 
address
(NOTE: Users in Canada should use Datapac  network address 
1311090900014.)

You will get  a  Telenet  "@"  prompt  after  entering  this address.
              @ MAIL
              Username?      your username
              Password?      your password
              Once you are signed on to TELEMAIL:
              Command?       GOTO SONIC

Direct Dial-up: You may access OCEANIC  directly using  a modem (up to 
2400 baud, set at 7,1,N).  Dial (302) 645-4204.  Login with user name 
INFO.  No password is required.


Address:
            University of Delaware
            College of Marine Studies
            Lewes, DE 19958
            Attention: Katherine A. Bouton

Email: 
           Internet - bouton@delocn.udel.edu,
               SPAN - DELOCN::BOUTON,
           Telemail - K.BOUTON/Omnet

Phone: (302) 645-4278

Who Can Use OCEANIC

No restrictions. All oceanographers and  meteorologists  are welcome.

Miscellaneous Information

            Telefax: (302) 645-4007
            Telex:   7407728 WDIU UC

System Manager: Walt Dabell
            (302) 645-4225
            Internet:  walt@delocn.udel.edu
            Span:      DELOCN::WALT

      
SPAN_NIC

The Space Physics Analysis Network (SPAN) Information Center 
supports an interactive database system which can be accessed by 
logging in to the SPAN NIC host. The  information  in  the  database is 
grouped into six categories:

(1)  SPAN information  section:  General  Information about SPAN, 
Administration structure of SPAN, History of SPAN

(2)  Query SPAN database of NODEs:  Complete information about a 
particular node, Listing of nodes by a particular field, Complete listing 
of all nodes in  the  database

(3)  INTERmail syntaxes: How to send mail from SPAN to other users on 
other Networks and vice versa including SPAN to X.25 hosts; SPAN to 
NASAmail; GSFCmail; Telemail; OMNET; SPAN to Internet; SPAN to 
BITNET & EARN; SPAN to NSFNET; SPAN to JANET;  SPAN to MFEnet; 
JUNET; UUCP; ACSnet

(4)  Important NEWS briefs: This section  changes periodically to 
broadcast to the general SPAN public things that are happening on 
SPAN.

(5)  Access SPAN Library of documents: Have  document e-mailed to 
you; Request document be postal mailed to you

(6)  How to access other Network Information Centers (NICs)

Network Access

Host Information

Internet:

      6.132 (6276)
      NSSDC
      128.183.10.59
        NSSDC.GSFC.NASA.GOV

      6.133 (6277)
      NSSDCA
      128.183.10.4
        NSSDCA.GSFC.NASA.GOV

NSSDC is a VAX 11/780.  NSSDC is a VAX 8650.

To connect to the SPAN NIC via DECNET, type:

SET HOST NSSDCA <CR> and log in as user SPAN_NIC. You can also set 
host to NSSDC.

To connect to the SPAN NIC via the Internet, telnet  to either system 
and log in as SPAN_NIC.

Dial-in and Telenet access are also availalble.  Contact the SPAN NIC 
for details.


Address:
             SPAN Network Information Center
            SPAN Operations Center
            NASA/Goddard Space Flight Center
            Code 630.2
            Greenbelt, Maryland  20771

Email: NETMGR@NSSDCA.GSFC.NASA.GOV  
           [Internet]
               NSSDCA::NETMGR [SPAN]

Phone: 301-286-7251 or FTS 888-7251

Who Can Use the SPAN NIC

All services are available to users of SPAN and the  DECnet Internet.   
Users who are part of the Internet are also welcome to use this 
service.

Miscellaneous Information

For further assistance:

Linda Porter, Acting SPAN Operations Manager? for SPAN policy issues.
SSL::PORTERL  or
PORTERL@SSL.MSFC.NASA.GOV

Pat Sisson, SPAN Security Manager?for security  related matters.  
NSSDCA::SISSON or SISSON@NSSDCA.GSFC.NASA.GOV

Dave Peters SPAN Internetwork Manager?for interworking issues.  
NSSDCA::PETERS or  PETERS@NSSDCA.GSFC.NASA.GOV

To receive hardcopy of SPAN documents.   NSSDCA::REQUEST or
REQUEST@NSSDCA.GSFC.NASA.GOV
               
Books about the Internet

Douglas E. Comer. Internetworking with TCP/IP: Principles, Protocols 
and Architecture.  Prentice Hall:  Englewood Cliffs, New Jersey. 1988.

Donnalyn Frey and Rick Adams. !%@:: A Directory of Electronic Mail 
Addressing and Networks.  Second Edition, O'Reilly and Associates: 
Sebastopol, California., 1990.

Charles Hedrick. "Introduction to the Internet Protocols" Rutgers 
University Computer Science Facilities Group, Piscataway, New Jersey. 
1988.  

Ed Krol. Hitchhiker's Guide to the Internet (RFC 1118).  University of 
Illinois, Urbana:   Urbana-Champaign, Illinois. 1989.

Tracy L. LaQuey. Users' Directory of Computer Networks.  Digital Press: 
Bedford, Massachusetts. 1990.

John S. Quarterman. The Matrix: Computer Networks and Conference 
Systems Worldwide.  Digital Press: Bedford, Massachusetts. 1990.

Andrew S. Tanenbaum. Computer Networks, Second Edition. 1988






               
Book Review

by Craig Partridge

Douglas E. Comer. Internetworking with TCP/IP: Principles, Protocols 
and Architecture.  Prentice Hall:  Englewood Cliffs, NJ, 1988.

This book is designed to be a comprehensive introduction to the TCP/IP 
protocol suite used on NSFNET and numerous other networks.  Comer 
successfully manages to explain almost every aspect of TCP-IP 
networking, from how packets are routed to how hostnames get looked 
up.

The book is intended both as an introduction for the advanced 
undergraduate and as a reference for professionals.  Often that 
constitutes an unhappy mix of readers: the undergraduate gets buried by 
technical details while the professional finds little intellectual 
substance amidst the introductory text.

Comer, however, manages to make this mix work.  The text is easy to 
read and avoids the mathematics and heavy technical jargon that 
frustrates the beginner; at the same time, it offers the professional a 
useful reference that at least touches on all aspects of TCP-IP 
networking.  The bibliography is quite good and at the end of each 
chapter Comer points the reader towards additional reading.

               
Book Review

by Craig Partridge

Donnalyn Frey and Rick Adams. !%@:: A Directory of Electronic Mail 
Addressing and Networks.  Second Edition, O'Reilly and Associates: 
Sebastopol, Calif., 1990.

Imagine this scenario: Your colleague at Prairie View A&M says she has 
an electronic mail account but doesn't know what network it is on.  You 
want to figure out if you can send mail to her.  This useful book is 
designed to help answer your questions.

The book is organized into several parts.  One section is a listing of 
networks, such as NSFNET, JUNET, and SPAN, showing the area each 
network serves, and the services it supports.   Another section indexes 
companies by name and by their domain names (Prairie View A&M is 
pvamu.edu).  A third section indexes geographic regions along with their 
affiliated networks.  Other sections try to help users figure out what 
those e-mail error messages mean.
All this information is packed into 285 easy-to-read pages.  The 
directory is a
convenient reference to have in your office.






               
Book Review

by Karen Roubicek

Tracy L. LaQuey. The Users' Directory of Computer Networks.  Digital 
Press: Bedford, Mass, 1990.

Today's widespread analogy that likens computer networking to the 
highway system logically leads to the observation, made by Tracy 
LaQuey, that the network traveler needs a roadmap to get around.  
LaQuey intends theUser's Directory of Computer Networks  to be the 
tool that helps network users understand the communications paths, 
see how they connect, locate resources (machines, services, or people) 
that they need, and understand some basic networking concepts.

The Directory is a descendant of a 1987 volume of the same title 
published by the University of Texas, and edited by Carol Englehardt 
Kroll, which was subsequently revised by LaQuey.  The current directory 
is divided into chapters that discuss specific networks, such as the 
DECnet Internet and the Internet, essays on the Domain Name System, 
the OSI Directory Service (X.500), Electronic Mail, and an organizational 
index.  In this volume, LaQuey includes several more networks and has 
expanded the narrative about each network.

Network Overviews

This book successfully pulls together a lot of information in a 
consistent and coherent presentation.  Most chapters (several of which 
have subchapters that describe component networks of an internet) 
provide descriptions that answer the same key questions about each 
network:  What is the topology?  What protocols are supported?  What 
services are provided?  What are the membership requirements?  How 
is the network administered?  What are the usage guidelines?  The 
descriptions don't go into great technical depth, but that's not the 
editor's goal.  LaQuey provides maps and extensive lists of hosts, 
contacts, and network numbers for reference purposes, but the reader 
comes away from a chapter chiefly with a useful overview of each 
network and a basic understanding of where each fits into the big 
picture.

The essays in the final chapters are particularly helpful for users who 
have a limited amount of networking experience.  John Quartermann 
presents a good summary of the complex issues of electronic mail, and 
provides a bibliography
for those readers who want a more extensive treatment of email.  Mic 
Kaczmarczik includes a useful set of tables designed to help users 
construct and send messages between many of the networks described 
in the directory.

Paul Mockapetris contributed the chapter on domains.  In a succint 
three and a half pages,
he does a neat job of summarizing the important concepts of the 
domain name system and describing why the reader should care about 
them.  A list of domain names is included.

The OSI X.500 chapter contains more detail than the other essays and is 
less conversational in tone.  The focus here is more on the technical 
specifics of the OSI Directory and is aimed at a more technically 
sophisticated audience.

The final chapter, List of Organizations, is a valuable cross-reference 
that gives the reader a picture of the connectivity of over five thousand 
organizations.

A shortcoming of theDirectory  is one that is typical of all books 
dealing with an area that is developing as quickly as networking?some 
percentage of the data is automatically outdated as soon as the text is 
given to the publisher.  However, even if specifics change over time, 
such as contact names, the information that remains serves as a 
starting for finding the most current information.

The User's Directory  is impressive for several reasons.  It presents a 
huge quantity of information in a straightforward and comprehensible 
way.  LaQuey has done an excellent job of editing that doesn't make the 
user feel overwhelmed by a subject that can actually be quite 
overwhelming to those not immersed in network technology.   LaQuey's 
efforts at collecting and verifying information are apparent, and her 
diligence proves worthwhile.  This reference guide will occupy a 
prominent place on the bookshelves of the masses of network users 
who need the information that LaQuey has compiled.  

               
Book Review

by Craig Partridge

John S. Quarterman. The Matrix: Computer Networks and Conference 
Systems Worldwide.  Digital Press: Bedford, Mass. 1990.

This book chronicles the existing worldwide networks and discusses 
the history of networking.  It is an indispensable reference, 
representing the networking community's first complete look at itself.

The first part of the book is an extended introduction.  It presents the 
basic concepts in networking, the history of many of the protocol 
suites, how networks are used, and who's-who listing of standards and 
bodies.  The second half of the book lists all known computer networks, 
from the United States and Europe (with dozens of networks) to 
Thailand (TSCnet) and Costa Rica (CATIENET).  The coverage is 
extraordinarily thorough.  Much of the information comes from private 
communication, and many of the networks are very small (a dozen nodes 
or less).






               
Book Review

by Craig Partridge

Andrew S. Tanenbaum. Computer Networks, Second Edition, 1988.

Please note:  This is a review of the first edition of this book.  

Andrew S. Tanenbaum.Computer Networks, Prentice-Hall, Inc. (1981)

This book is . . . the introductory text most often recommended by 
specialists in the computer networking field.  One of its great merits 
is its comparative approach.  Using examples from SNA and DECnet, as 
well as TCP/IP and OSI, Tanenbaum offers a breadth of coverage that 
few writers can match.

Nonetheless, the book shows its age.  It takes a more favorable view of 
protocol layering than is currently in vogue and, because it was written 
while many transport protocols, such as TCP, were still being 
developed, it contains little about what has been learned in the past 
several years concerning transport-level problems.  The book also 
offers no discussion of the problems of external data representations 
such as ASN.1.  Despite these shortcomings, Computer Networks  is 
still a good general reference book.  Rumor has it that a second edition 
is due out this year.







Click on an underlined word to see a definition.

1822

ACK

Acknowledgement

ANSI

AppleTalk

ARP

ARPANET

Authority Zone

Autonomous Confederation

Autonomous System

Backbone

Bandwidth

Baseband

Baud

BBN	Bolt Beranek and Newman Inc.

BITNET

Broadband

Broadcast

BSD

Catenet

CCITT

Checksum

Client

Connection

COS	Corporation for Open Systems

CREN	Corporation for Research and Educational Networking

CSMA/CD	 Carrier Sense Multiple Access with Collision Detection

CSNET

DARPA 	Defense Advanced Research Projects Agency

Datagram

DDN 	Defense Data Network

EARN

EGP 	Exterior Gateway Protocol

Electronic Mail

Ethernet

email

FDDI	 Fiber Distribution Data Interface

Field

File Server

Fragment

Frame

FTAM	File Transfer, Access, and Management

FTP	File Transfer Protocol

Gateway

GOSIP	Government OSI Profile

Header

HELLO

Host

ICMP	Internet Control Message Protocol

IEEE 802

IEN	 Internet Engineering Notes   

IMP	 Interface Message Processor

Internet Address

Internet

ISDN	Integrated Services Digital Network

ISO	International Standards Organization

Layer

LAN	 Local Area Network

LocalTalk

Mail Bridge

Mail Gateway

MAN

MAP

Message

MILNET	MILitary Network

MTU	

NBS	National Bureau of Standards.  

Network

Network Address

NFS	Network File System

NIST	National Institute for Standards

NIC	Network Information Center

NOC	Network Operations Center

NNSC NSF Network Service Center

NSF National Science Foundation

NSFNET	National Science Foundation Network

NTP	Network Time Protocol

ODA	Office Document Architecture

OSI	Open Systems Interconnect 

OSI Reference Model

Packet

Packet Switch

PAD

PING

Protocol

PSN	Packet Switch Node

RDP	Reliable Datagram Protocol

RFC-733

RFC-822

RFC	Request for Comment

RIP	Routing Information Protocol

Route

rcp 	Remote copy

rlogin 	Remote login

Server

SMTP	Simple Mail Transfer Protocol  

SNA	Systems Network Architecture

SNMP

Source Address

SPAG

Switch

T1

TCP/IP

TELENET

Telnet

TOP	Technical/Office Protocol

TP-4/IP

TTL	Time To Live

UDP	User Datagram Protocol

UUCP	UNIX-to-UNIX-CoPy

X.25

X.400

X.500

XNS	Xerox Network Services



















1822

A hardware protocol used to connect an 
Internet host to a packet switch on the  
ARPANET and MILNET.  This protocol is  
also called AHIP (Asynchronous Host Interface Protocol).  The number 
1822 comes from the BBN (Bolt Beranek and Newman) report that 
defined the interface for the original ARPANET.

      
ACK

Short for acknowledgement.

               
Acknowledgement

A type of message sent to indicate that a block of data arrived at its 
destination without error.  A negative acknowledgement (NACK) 
indicates that the block of data was not correctly received.


ANSI	

American National Standards Institute.  This organization is 
responsible for approving U.S. standards in many areas, including 
computers and communications.  Standards approved by this 
organization are often called ANSI standards (e.g., ANSI C is the version 
of the C language approved by ANSI).  ANSI is a member of the 
International Standards Organization (ISO).
               
AppleTalk	

A networking protocol developed by Apple Computer for communication 
between Apple Computer products and other computers.  This protocol 
is independent of what network it is layered on.  Current 
implementations exist on Localtalk (a 235-kilobit/second local area 
network (LAN)), and Ethertalk (a 10-megabit/second local area 
network).
               
ARP

Address Resolution Protocol.  This protocol is used to dynamically bind 
an Internet address to a low-level physical network address.  It is 
often used on local area networks (LANs) such as Ethernet.
          
ARPANET

One of the first heterogeneous-host packet switching networks 
developed for the Advanced Research Projects Agency of the 
Department of Defense (see DARPA).  The ARPANET became operational 
in 1968; it was the proving ground for many of the protocols and 
concepts in today?s Internet.

Authority Zone

The part of a domain name that a single name server resolves.  For 
example, if the server spooler .bbn.com is responsible for resolving all 
machine addresses in the domain bbn.com, then its authority zone is 

george.random.com would not be in its authority zone. 

 Autonomous Confederation

A group of independent computer systems that trust each other 
regarding routing (see route) and reachability information.  Members of 
an autonomous confederation will believe information provided by other 
members of the confederation in preference to information received 
from systems that are not part of the confederation.
               
Autonomous System

A collection of networks controlled by one administrative authority.  
The gateways within this system are expected to trust one another and 
to share and update routing information (see route) among themselves 
by any mutually agreeable protocol.  A core gateway must also be 
designated to share routing information with other autonomous 
systems via EGP.

Backbone

A  central high-speed network connecting independent subnetworks.  
Today, the NSFNET provides a backbone network for regional networks 
such as NEARnet, CSNET, and BARRNet.

Bandwidth

The frequency width of a communications channel, usually measured in 
hertz, kilohertz, or megahertz.  For example, one channel on a satellite 
transponder might have a bandwidth of six megahertz, thereby enabling 
it to carry a television signal.  Sometimes, this term is applied to how 
much digital information a channel can carry, usually in conjunction 
with fully digital communications lines.  For example, a T1 line might 
be said to have a bandwidth of 1.544 megabits/second;  however, it 
would be more correct to say that a T1 line can carry or transmit 1.544 
megabits/second.
               
Baseband

A transmission medium where digital signals are sent without 
complicated frequency shifting.  In general, only one communication 
channel is provided at a time on a baseband system.  Ethernet is a 
baseband network.  

Baud

The number of symbols that may be sent over a communications channel 
per second.  Each symbol may be an arbitrary analog signal, and it may 
represent more than one bit of information.  For example, a 
communications channel transmitting at 2400 baud, with each symbol 
containing four bits, is capable of sending 9600 bits per second (this is 
in fact the way V.32 9600-baud modems work).
               
BBN

Bolt Beranek and Newman Inc., a 
diversified high-technology company 
in Cambridge, Massachusetts, was awarded the original contract to 
build the ARPANET and has been extensively involved in Internet 
development.  Today, BBN is responsible for managing the NNSC, CSNET, 
and NEARnet among others.  This stack is brought to you by the NNSC 
staff at BBN (Hi Mom!).

               
BITNET

Because It?s Time Network.  An academic and research network 
connecting approximately 2500 computers in thirty-two countries.  
This network provides interactive electronic mail, and file transfer 
services via a store-and-forward methodology based on IBM NJE 
protocols.  BITNET traffic and Internet traffic are exchanged via 
several gateway hosts.  This network is now part of the Corporation for 
Research and Educational Networking (CREN).


Broadband

A transmission medium where multiple digital channels are frequency 
multiplexed onto a single cable.  This type of network requires 
relatively complicated electronics, but is capable of carrying voice, 
data, and video all on the same medium.  Cable television systems are 
examples of broadband networks.

               
Broadcast

A technique used to send packets to all hosts on a network.  Broadcasts 
are often used in conjunction with ARP and RARP protocols on local 
area networks.
         
BSD

Berkeley Source Distribution.  This acronym is used to describe the 
versions of the UNIX operating system and its utilities developed and 
distributed by the University of California at Berkeley.  "BSD" is usually 
preceded by the version number of the distribution, e.g., "4.3 BSD" is 
version 4.3 of the Berkeley UNIX distribution.  Many Internet hosts run 
BSD software, and it has been the ancestor of many commercial UNIX 
implementations such Sun OS and Sequent?s Dynix.
               
Catenet

A term coined to describe the communications structure created when 
packet switched networks are connected by gateways.  The term 
internet without a capital I is now more commonly used. 

CCITT

Comit? Consultatif International de T?l?graphique et T?l?phonique 
(International Consultative Committee on Telephone and Telegraph).  
This organization is part of the United Nations International 
Telecommunications Union (ITU) and is responsible for making 
technical recommendations about telephone and data communication 
systems.  X.25 is an example of a CCITT recommendation.  Every four 
years CCITT holds plenary sessions where they adopt new standards; a 
session is planned for 1992.
               
Checksum

A computed symbol whose value is dependent upon the entire contents 
of a message or packet.  This value is usually 
sent along with the message when it is transmitted.  The receiving 
system computes a new checksum based upon the received data and 
compares this value with the one sent with the packet. If the 
two values are the same, the receiver has a high degree of confidence 
that the data was received correctly.

Client

A computer system or process that requests a service of another 
computer system or process.  A workstation requesting the contents of 
a file from a file server is a client of the file server.
               
Connection

An agreement between two processes or hosts to pass information 
along a specified protocol path without further exchanges of addressing 
information.	

COS

Corporation for Open Systems.  An international non-profit organization 
made up of computer users and vendors.  This organization?s mission is 
to provide ways of testing OSI implementations.
               
CREN

Corporation for Research and Educational Networking.  This 
organization was formed in October, 1989, when BITNET and CSNET 
were combined under one administrative authority.  CREN is now 
responsible for providing networking service to both BITNET and CSNET 
users.
               
CSMA/CD

Carrier Sense Multiple Access with Collision Detection (phew!).  This is 
a characteristic of a local area network (LAN).  When multiple users 
have access to the network for transmitting data, the network avoids 
transmitting data from more than one user at a time, so that they avoid 
running into each other.  Ethernet works this way.
               
CSNET

Computers and Science Network.  A network that was established to 
provide mail forwarding and Internet connectivity to computer (and 
now other) science researchers.  This network primarily provides 
electronic mail service via dial-up lines, although X.25 and Internet 
services are available from sites that are suitably connected.  This 
network is now part of the Corporation for  Research and Educational 
Networking (CREN). 

DARPA

Defense Advanced Research Projects Agency.  An agency of the U.S. 
Department of Defense responsible for the development of new 
technology for use by the military.  DARPA (formerly known as ARPA) 
was responsible for funding much of the development of the Internet 
we know today.  The New York Times business section called DARPA 
"America?s answer to Japan?s MITI."
               
Datagram

A packet whose routing (see route) and interpretation is independent of 
other packets being sent by that host.  Every datagram must contain a 
destination address, since it cannot rely on addressing information 
sent by previous packets.  Datagrams are a connectionless form of 
communication, and are the basic building blocks of the internet 
protocol (IP?see TCP/IP).

        
DDN

Defense Data Network.  A worldwide operational communications 
network serving the US Department of Defense composed of ARPANET, 
MILNET, and other portions of the Internet, used to connect military 
installations.  It is run by the Defense Communications Agency (DCA).

       
EARN

European Academic Research Network.  A network connecting European 
university and research institutions providing electronic mail and 
remote job entry facilities.  This network uses BITNET protocols and 
connects to BITNET in the U.S.

EGP

Exterior Gateway Protocol.  This protocol is used by a gateway 
representing an autonomous system to export to other gateways 
information concerning networks and gateways contained within that 
system. 

Electronic Mail

A system whereby a computer user can exchange messages with other 
computer users (or groups of users) via a communications network.  
Electronic mail is one of the most popular uses of the Internet.

Ethernet

A 10-megabit/second standard for local area networks (LANs), initially 
developed by Xerox, and later refined by Xerox, DEC, and Intel.  All hosts 
are connected to a coaxial cable where they contend for network access 
according to the CSMA/CD protocol.  

Email (or E-mail)

Shortspeak for electronic mail (q.v.).
               
FDDI

Fiber Distribution Data Interface.  A newly emerging standard for a 
fiber-optic local area network (LAN) running at 100 megabits/second.

Field

In computer messages, data files, and programs, a field is a group of 
characters that is treated as a unit.  For example, each TCP/IP packet 
contains fields for addressing and routing information (see route).

Internet users may encounter fields in the header of an electronic mail 
message.  The fields are lines that begin with a field-name followed by 
a colon and a space.  To: and From: are the only required header fields, 
but there are optional standard fields for the user, and fields that are 
added by the mail delivery system.  The format of email messages is 
defined in RFC-822.  
               
File Server

A computer whose principal purpose is to store files and provide 
network access to those files.
               
Fragment

A piece of a packet.  When a gateway is forwarding a maximum size IP 
(see TCP/IP) packet to a network that has a smaller maximum packet 
size, it is forced to break up that packet into multiple fragments for 
transport on the new network.  These fragments will be  reassembled 
by the IP layer at the destination host (or possibly by an intermediate 
gateway under some circumstances).
               
Frame

An assembly of bits at the Data Link layer of the ISO protocol stack.  
This collection of bits begins with some bits used for header 
information, and ends with some checksum bits used for error 
detection and/or correction.  All bits between the header and the 
checksum are data.      

FTAM

File Transfer, Access, and Management.  An application layer protocol 
for moving and manipulating files.
               
FTP

File Transfer Protocol. A protocol permitting a user on one Internet 
host to access and transfer files to another host over a network, such 
as the Internet.  FTP is usually the name not only of the protocol, but 
also of the program the user invokes to execute the protocol (e.g., ftp 
host.bbn.com).  This protocol is usually layered on top of TCP and IP 
(see TCP/IP).  FTP is available on several operating systems.  You can 
use the ftp command to copy computer files that contain a variety of 
information, such as software, documentation, or maps.  


Gateway

A computer used to connect together one or more networks.  This 
computer is seen as a host by the networks to which it is connected, 
but is capable of forwarding packets from one network to another.   
Gateways are also responsible for providing and receiving routing 
information to other gateways in the Internet so that they will know 
the best routes for sending packets between networks.  One may think 
of a gateway as a packet switch with whole computer networks as its 
communication links.

       
GOSIP

Government OSI Profile.  GOSIP is a collection of ISO specifications for 
mixed-vendor networks for use by the government.  Government 
networks are mandated to support GOSIP in the not-too-distant future. 
               
Header

The header is information that appears at the top of an electronic mail 
message.  See field.
   
HELLO

An inter-packet switch protocol used in the NSFNET to determine 
shortest delay routing (see route).  This protocol is only used among 
packet switches that trust each other.
               
Host

A computer that allows users to communicate with other host 
computers on a network.  Individual users communicate by using 
application programs, such as electronic mail, TELNET, and FTP.
               
ICMP

Internet Control Message Protocol.  This protocol is an integral part of 
the Internet Protocol (IP?see TCP/IP). The protocol is used to exchange 
error and control information among IP hosts.  For example, a gateway 
that is sent an IP datagram for which it is not the best route would 
send an ICMP redirect packet back to the originating host to inform it 
of the best route.  ICMP implementations also provide fault isolation 
capabilities such as packet echo.

IEEE 802

The IEEE standards for local and metropolitan area networks (see LAN 
and MAN).  This class of standards is further broken down by type of 
network, each of which is specified by digits after a decimal point.  For 
example, the Ethernet standard is 802.3; IBM Token Ring is IEEE 802.5.

IEN

This stands for Internet Engineering Notes.   


IMP

Interface Message Processor.  This was the name for the original 
packet switches used in the ARPANET and MILNET.   Today, the term 
Packet Switch Node or PSN is in more common usage.

Internet Address

A thirty-two-bit number that uniquely identifies an Internet host. This 
address is typically represented in eight-bit numbers (octets) 
separated by dots, e.g., 128.89.1.132.  An Internet address consists of a 
network number and a host number, and may be a class A, B, or C 
address.  A class A network address is formatted as N.H.H.H, providing 
seven bits of network number and twenty-four bits of host number (e.g., 
26.0.0.117 indicates host 117 on net 26).  A Class B network address is 
formatted as N.N.H.H, providing fourteen bits of network number and 
sixteen bits of host number (e.g.,128.89.1.132 indicates host 1.132 on 
net number 128.89).  A Class C network address is formatted as N.N.N.H, 
providing twenty-two bits of network number and eight bits of host 
address (e.g.,192.1.14.28 indicates host 28 on network number 
192.1.14).  

The Internet is the interconnection of many networks throughout the 
world that speak the same language, namely the TCP/IP protocol suite.  
Internet with a capital I refers specifically to that internet that 
contains NSFNET, MILNET, and DDN.

You may see "internet" with a small "i."  This can refer to any network 
built out of the TCP/IP protocol suite, or it might refer to networks 
using other protocol families that are composites of smaller networks. 

Internet

               
ISDN

Integrated Services Digital Network.  A public digital network designed 
to integrate voice and non-voice traffic.  This system is intended to be 
a  replacement for our current analog telephone systems, and as such is 
being standardized by the CCITT.    
               
ISO

International Standards Organization.  The international body 
responsible for establishing multivendor networking  standards.

      
Layer

Communication networks for computers may be organized as a set of 
more
or less independent protocols, each in a different layer (also called 
level).  The lowest layer governs direct host-to-host communication 
between the hardware at different hosts; the highest consists of user 
applications.  Each layer builds on the layer beneath it.  For each layer, 
programs at different hosts use protocols appropriate to the layer to 
communicate with each other.

TCP/IP has five layers of protocols, and OSI  
has seven.  The advantage of different layers of protocols is that the 
methods of passing information from one layer to another is specified 
clearly as part of the protocol suite, and changes within a protocol 
layer are prevented from affecting the other layers.  This greatly 
simplifies the task of designing and maintaining communication 
programs.

LAN

Local Area Network.  A data network intended to serve an area of only a 
few square kilometers or less.   Because the network is known to cover 
only a small area, optimizations can be made in the network signal 
protocols that permit data rates in the 10-megabyte-per-second to 
100-megabytes-per-second range today.  Wide-area communication is 
accomplished by connecting LANs together via metropolitan area 
networks (MANs) or wide-area networks (WANs).  Both Ethernet and 
FDDI are local area networks.
               
LocalTalk

A local area network (LAN) protocol developed by Apple Computer.  This 
network is designed to run over twisted pairs of telephone wire and has 
a data rate of 235 kilobits/second.  All Macintosh computers contain a 
LocalTalk interface.
               
Mail Bridge

A mail gateway that forwards electronic mail between two or more 
networks while ensuring that the messages it forwards meet certain 
administrative criteria.  A mail bridge is simply a specialized form of 
mail gateway that enforces an administrative policy with regard to 
what mail it forwards.
               
Mail Gateway

A network host that forwards electronic mail between two or more 
possibly dissimilar networks.  In the process of forwarding the mail, 
the gateway may have to reformat addresses and mail headers to 
conform with the electronic mail standards of the destination network.  
               
MAN

Metropolitan Area Network.  A data network intended to serve an area 
approximating that of a large city.  Such networks are being 
implemented by innovative techniques such as running fiber cables 
through subway tunnels.

MAP

Manufacturing Automation Protocol.  A protocol stack developed by 
General Motors following the OSI model that guarantees access to each 
host within a certain maximum time.  At the upper layers, it includes 
many of the OSI standards.  At the lower layers, it is based upon Token 
Bus (IEEE 802.4).

      
Message	

"Message" has multiple meanings:

1)  A user-defined collection of data sent 
     over a network.  

2)  A piece of text displayed on a terminal 
     screen that was sent by a user or a 
     program. 

3)  A collection of data sent from one 
     computer programming entity to 
     another. 


MILNET

MILitary NETwork.  This network was created in 1984 from parts of the 
original ARPANET.  The military users wished to have an operational 
production network, while the research community wished to have a 
network on which to continue experimenting in networking.  Therefore, 
the military users were placed on MILNET, the research users were 
placed on ARPANET, and the two networks were connected with mail 
bridges and gateways.  Today, MILNET is one of the class A networks in 
the Internet.   

MTU

Maximum Transmission Unit.  The largest  number of bits that a 
network permits to be transmitted as one packet.



NBS

National Bureau of Standards.  This organization, which was part of the 
U.S. Department of Commerce, was responsible for establishing 
standards in the United States.  It has since become the NIST.
               
Network

A computer network is a group of computers that can communicate 
electronically.  Networks can be composed of computers in a single 
building (Local Area Networks or LANs), or computers thousands of 
miles apart (Wide Area Networks or WANs).  The Internet is a 
worldwide collection of computer networks that can intercommunicate.  
The system manager and computer center staff at your site can provide 
information about your local network.

  
Network Address

A number or group of numbers that uniquely specifies a host on a 
network.  For example, 128.89.1.178 is the network address for 
nnsc.nsf.net.  Also, informally, an electronic mail address.  For 
example,  nnsc@nnsc.nsf.net is the network address for the NSF 
Network Service Center (NNSC).

NFS

Network File System.  This acronym describes a protocol developed by 
Sun Microsystems to allow a computer system to access files over a 
network as if they were on its local disks.  This protocol has been 
incorporated in products by more than two hundred companies, and is 
now a de facto Internet standard.


NIST

This stands for the National Institute for Standards and Technology 
(see NBS).

NOC

Network Operations Center.  A location from which the operation of a 
network or internet is monitored.  This center also usually serves as a 
clearinghouse for problems and efforts to resolve those problems.

NSF

National Science Foundation.  A government agency whose purpose is to 
promote the advancement of science.  NSF funds science researchers, 
scientific projects, and infrastructure to improve the quality of 
scientific research.  The NSFNET, funded by NSF, is an essential part of 
academic and research communications.

NTP

Network Time Protocol.  A protocol built on top of TCP (see TCP/IP) 
that assures accurate local time-keeping with reference to radio and 
atomic clocks located on the Internet.   This protocol is capable of 
synchronizing distributed clocks within milliseconds over long time 
periods.

ODA

Office Document Architecture.  This emerging standard defines ways in 
which text, graphics, and facsimile documents can be moved over a 
multivendor network.

OSI

Open Systems Interconnect.  Usually used as shorthand for the Open 
Systems Interconnection Reference Model (OSI Reference Model).  

OSI Reference Model

A seven-layer structure designed to describe computer network 
architectures and the way that data passes through them. This model 
was developed by the ISO in 1978 to clearly define the interfaces in 
multivendor networks, and to provide users of those networks with 
conceptual guidelines in the construction of such networks.

Packet

A collection of data sent as a unit along a packet network.  Packets are 
self-contained; each packet has its own source address and destination 
address and cannot exceed a maximum size.  Long messages are broken 
up into multiple packets for transmission over the network.

Packet Switch

See PSN.

PAD

Packet Assembler/Disassembler.  A network host designed to interface 
terminals to a packet network.

PING

Packet Internet Groper.  A program that sends packets to a remote host 
on the Internet and looks for replies.  This program works via the 
echoing facility provided by the ICMP protocol and is a way to 
determine if an Internet host is reachable from your host.		

Protocol

A mutually agreed procedure for communicating information between 
two parties.  Standard protocols are the basis for all computer 
communication.

PSN

Packet Switch Node.  A dedicated computer whose purpose is to accept, 
route, and forward packets in a packet switched network.

RDP

Reliable Datagram Protocol.  An Internet standard protocol for reliably 
sending datagrams between user programs.  This protocol is like UDP, 
but guarantees delivery and does retransmission as necessary.  This 
protocol is built on top of IP (see TCP/IP) and uses IP for datagram 
delivery.

RFC-733

An obsolete version of the Request for Comments (Standard for the 
format of ARPA Internet Test Messages, August 16, 1982) that 
specifies the format of electronic mail messages.  See RFC-822.

RFC-822

The current version of the Request for Comments that specifies the 
format of electronic mail messages.

RFC

Request for Comments.  RFCs are the principal documents used on the 
Internet to propose new protocols and services.  These documents are 
published as electronic documents on nic.ddn.mil  by the DDN NIC.

RIP

Routing Information Protocol.  A routing (see route) protocol provided 
in the Berkeley UNIX (see BSD) operating system, that permits a group 
of hosts located on a local network to share routing information.  This 
function is provided by the program routed.

Route

A path from one Internet host to another.

rcp

Remote copy.  A program and protocol provided in  the Berkeley UNIX 
operating system (see BSD) that permits files to be copied from one 
computer to another by an extension to the syntax of the UNIX cp (copy) 
command.  This protocol is largely implemented among UNIX machines, 
but the protocol is general enough that non-UNIX machines may use it.  
However, rcp does not provide the word-length adaptability and 
flexibility that the FTP protocol does.

rlogin

Remote login.  A program and protocol provided in Berkeley UNIX (see 
BSD) that permits a user on one computer to log in to another computer.  
This protocol is largely implemented among UNIX machines, but the 
protocol is general enough that non-UNIX machines may use it.  For 
example, Excelan ANNEX terminal concentrators permit users on dumb 
terminals to use the rlogin protocol to communicate with Internet 
computers.

Router

A device that chooses routings for packets.  This is a generic term and 
applies to such diverse devices as bridges (which pass packets from 
one physical LAN to another with almost no interpretation) and WAN 
gateways (which pass packets from one wide area network to another, 
doing fragmentation and reassembly as necessary). 

Server

A computer system or process that provides a service for other 
computer systems or processes to access.  A supercomputer can be 
thought of as a computation server.  A program that provides Internet 
File Transfer Protocol (FTP) access to local files is usually called an 
FTP server.

SMTP

Simple Mail Transfer Protocol.  This Internet standard network protocol 
is used to move electronic mail messages from one host to another.

SNA

Systems Network Architecture.  A proprietary networking architecture 
used by IBM and IBM-compatible mainframe computers.  Because of its 
widespread use, SNA is a de facto standard.  While it can use packet 
switched networks for transport, SNA is largely a circuit-switching 
rather than a packet-switching technology.

SNMP

Simple Network Monitoring Protocol.  This Internet standard protocol is 
used  by a network monitoring center to gather information regarding 
the status of hosts on its network or on the Internet.

Source Address

The network address of the host that originates a packet.

SPAG

Standards Promotion and Applications Group.  This European 
organization collaborates with COS to promote testing procedures and 
techniques for OSI products.

Switch

A computer responsible for routing (see route) packets in a packet 
switched network.  

T1

A communications service over leased lines and microwave links that 
runs at 1.544 megabytes per second.  The major links of the NSFNET are 
T1.  Faster services such as T3 (45 megabytes per second) are 
available, although they are not yet off-the-shelf products.  The 
NSFNET is in the process of upgrading to T3, and plans much higher 
transmission rates for the future.

TCP/IP

Transmission Control Protocol/Internet Protocol.  A Department of 
Defense standard protocol suite encompassing both network and 
transport level protocols.  While the terms TCP and IP specify two 
protocols, common usage of the two terms together has come to 
represent the entire DoD protocol suite based upon these protocols, 
including Telnet, FTP, UDP, and RDP.  Technically, this is incorrect 
usage, because other protocol stacks can be layered on top of TCP and 
IP that provide similar services, but are not part of the DoD standard 
protocols (e.g., TP-4/IP, FTAM on TCP, etc.).  Ideally, one should only 
use TCP/IP to mean the TCP protocol layered on top of the IP protocol.

TELENET

A commercial wide-area packet switching X.25 network.

TELNET

Telnet is a program that allows a computer user at one site to work on 
a computer at another site.  It is the Internet standard protocol for 
remote terminal connection service.   

Telnet requires Internet access, that is, you must be on a TCP/IP 
network that gateways to the Internet.  Unlike FTP and electronic mail, 
Telnet actually exposes you to the commands and programs of the 
remote host.

For example, you can use the telnet command to run a program in your 
directory on a supercomputer hundreds of miles away. 

TOP

Technical/Office Protocol.  A protocol stack for office automation 
developed by Boeing following the OSI model.  This protocol is very 
similar to MAP except at the lowest levels, where it uses Ethernet 
(IEEE 802.3) rather than Token Bus (IEEE 802.4).

TP-4/IP

The ISO protocol suite that performs the same functions as TCP/IP.  
TP-4 provides reliable, connection-oriented data streams using 
datagrams.  This protocol also handles error detection, synchronization, 
and retransmission, just as TCP does.

TTL

Time To Live.  A field in a datagram designed to prevent packets from 
looping indefinitely in the Internet.  Because routing information 
changes dynamically, two or more gateways may occasionally forward 
packets to each other in a loop, since each believes the other is the 
best route to the destination.  A packet is initially sent with a nonzero 
TTL field, and each gateway that forwards that packet decrements the 
value in that field.  Once the value reaches zero, a loop is assumed and 
the packet is discarded.  

UDP

User Datagram Protocol.  The Internet standard protocol for sending 
datagrams between user programs.  This protocol neither guarantees 
delivery nor does it require a connection.  As a result it is lightweight 
and efficient, but requires the application to do all error processing 
and retransmissions.  This protocol is built on top of IP and uses IP for 
datagram delivery (see TCP/IP).

UUCP

UNIX-to-UNIX-CoPy.  This was initially a program run under the UNIX 
operating system (see BSD) that permitted one UNIX system to send 
files to another UNIX system via dial-up phone lines.  Today, the term is 
more commonly used to describe the large international network made 
up of these machines using the UUCP protocol to pass netnews and 
electronic mail.

X.25

A standard networking protocol suite approved by the CCITT and ISO.  
This protocol suite defines standard physical, link, and networking 
layers only (layers 1 through 3).  X.25 networks are in use throughout 
the world.

X.400

The CCITT standard for electronic mail.  X.400 systems are in use in 
Europe, Canada, and several U.S. commercial installations.

X.500

The CCITT standard for electronic mail directory services.

XNS

Xerox Network Services.  A proprietary networking architecture 
developed by Xerox.