| ==Phrack Inc.== |
|
|
| Volume Three, Issue 27, File 3 of 12 |
|
|
| <><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><> |
| <> <> |
| <> Introduction to MIDNET <> |
| <> ~~~~~~~~~~~~~~~~~~~~~~ <> |
| <> Chapter Seven Of The Future Transcendent Saga <> |
| <> <> |
| <> A More Indepth Look Into NSFnet <> |
| <> National Science Foundation Network <> |
| <> <> |
| <> Presented by Knight Lightning <> |
| <> June 16, 1989 <> |
| <> <> |
| <><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><> |
|
|
|
|
| Prologue |
| ~~~~~~~~ |
| If you are not already familiar with NSFnet, I would suggest that you read: |
|
|
| "Frontiers" (Phrack Inc., Volume Two, Issue 24, File 4 of 13), and definitely; |
| "NSFnet: National Science Foundation Network" (Phrack Inc., Volume Three, |
| Issue 26, File 4 of 11). |
|
|
|
|
| Table Of Contents |
| ~~~~~~~~~~~~~~~~~ |
| * Introduction |
| * The DOD Protocol Suite |
| * Names and Addresses In A Network |
| * Telnet (*NOT* Telenet) |
| * File Transfer |
| * Mail |
|
|
|
|
| Introduction |
| ~~~~~~~~~~~~ |
| MIDNET is a regional computer network that is part of the NSFnet, the National |
| Science Foundation Network. Currently, eleven mid-United States universities |
| are connected to each other and to the NSFnet via MIDnet: |
|
|
| UA - University of Arkansas at Fayetteville |
| ISU - Iowa State University at Ames |
| UI - University of Iowa at Iowa City |
| KSU - Kansas State University at Manhattan |
| KU - University of Kansas at Lawrence |
| UMC - University of Missouri at Columbia |
| WU - Washington University at St. Louis, Missouri |
| UNL - University of Nebraska at Lincoln |
| OSU - Oklahoma State University at Stillwater |
| UT - University of Tulsa (Oklahoma) |
| OU - University of Oklahoma at Norman |
|
|
| Researchers at any of these universities that have funded grants can access the |
| six supercomputer centers funded by the NSF: |
|
|
| John Von Neuman Supercomputer Center |
| National Center for Atmospheric Research |
| Cornell National Supercomputer Facility |
| National Center for Supercomputing Applications |
| Pittsburgh Supercomputing Center |
| San Diego Supercomputing Center |
|
|
| In addition, researchers and scientists can communicate with each other over a |
| vast world-wide computer network that includes the NSFnet, ARPAnet, CSnet, |
| BITnet, and others that you have read about in The Future Transcendent Saga. |
| Please refer to "Frontiers" (Phrack Inc., Volume Two, Issue 24, File 4 of 13) |
| for more details. |
|
|
| MIDnet is just one of several regional computer networks that comprise the |
| NSFnet system. Although all of these regional computer networks work the same, |
| MIDnet is the only one that I have direct access to and so this file is written |
| from a MIDnet point of view. For people who have access to the other regional |
| networks of NSFnet, the only real differences depicted in this file that would |
| not apply to the other regional networks are the universities that are served |
| by MIDnet as opposed to: |
|
|
| NYSERnet in New York State |
| SURAnet in the southeastern United States |
| SEQSUInet in Texas |
| BARRnet in the San Francisco area |
| MERIT in Michigan |
|
|
| (There are others that are currently being constructed.) |
|
|
| These regional networks all hook into the NSFnet backbone, which is a network |
| that connects the six supercomputer centers. For example, a person at Kansas |
| State University can connect with a supercomputer via MIDnet and the NSFnet |
| backbone. That researcher can also send mail to colleagues at the University |
| of Delaware by using MIDnet, NSFnet and SURAnet. Each university has its own |
| local computer network which connects on-campus computers as well as providing |
| a means to connecting to a regional network. |
|
|
| Some universities are already connected to older networks such as CSnet, the |
| ARPAnet and BITnet. In principal, any campus connected to any of these |
| networks can access anyone else in any other network since there are gateways |
| between the networks. |
|
|
| Gateways are specialized computers that forward network traffic, thereby |
| connecting networks. In practice, these wide-area networks use different |
| networking technology which make it impossible to provide full functionality |
| across the gateways. However, mail is almost universally supported across all |
| gateways, so that a person at a BITnet site can send mail messages to a |
| colleague at an ARPAnet site (or anywhere else for that matter). You should |
| already be somewhat familiar with this, but if not refer to; |
|
|
| "Limbo To Infinity" (Phrack Inc., Volume Two, Issue 24, File 3 of 13) and |
| "Internet Domains" (Phrack Inc., Volume Three, Issue 26, File 8 of 11) |
|
|
| Computer networks rely on hardware and software that allow computers to |
| communicate. The language that enables network communication is called a |
| protocol. There are many different protocols in use today. MIDnet uses the |
| TCP/IP protocols, also known as the DOD (Department of Defense) Protocol Suite. |
|
|
| Other networks that use TCP/IP include ARPAnet, CSnet and the NSFnet. In fact, |
| all the regional networks that are linked to the NSFnet backbone are required |
| to use TCP/IP. At the local campus level, TCP/IP is often used, although other |
| protocols such as IBM's SNA and DEC's DECnet are common. In order to |
| communicate with a computer via MIDnet and the NSFnet, a computer at a campus |
| must use TCP/IP directly or use a gateway that will translate its protocols |
| into TCP/IP. |
|
|
| The Internet is a world-wide computer network that is the conglomeration of |
| most of the large wide area networks, including ARPAnet, CSnet, NSFnet, and the |
| regionals, such as MIDnet. To a lesser degree, other networks such as BITnet |
| that can send mail to hosts on these networks are included as part of the |
| Internet. This huge network of networks, the Internet, as you have by now read |
| all about in the pages of Phrack Inc., is a rapidly growing and very complex |
| entity that allows sophisticated communication between scientists, students, |
| government officials and others. Being a part of this community is both |
| exciting and challenging. |
|
|
| This chapter of the Future Transcendent Saga gives a general description of the |
| protocols and software used in MIDnet and the NSFNet. A discussion of several |
| of the more commonly used networking tools is also included to enable you to |
| make practical use of the network as soon as possible. |
|
|
|
|
| The DOD Protocol Suite |
| ~~~~~~~~~~~~~~~~~~~~~~ |
| The DOD Protocol Suite includes many different protocols. Each protocol is a |
| specification of how communication is to occur between computers. Computer |
| hardware and software vendors use the protocol to create programs and sometimes |
| specialized hardware in order to implement the network function intended by the |
| protocol. Different implementations of the same protocol exist for the varied |
| hardware and operating systems found in a network. |
|
|
| The three most commonly used network functions are: |
|
|
| Mail -- Sending and receiving messages |
| File Transfer -- Sending and receiving files |
| Remote Login -- Logging into a distant computer |
|
|
| Of these, mail is probably the most commonly used. |
|
|
| In the TCP/IP world, there are three different protocols that realize these |
| functions: |
|
|
| SMTP -- (Simple Mail Transfer Protocol) Mail |
| FTP -- (File Transfer Protocol) sending and receiving files |
| Telnet -- Remote login |
|
|
| How to use these protocols is discussed in the next section. At first glance, |
| it is not obvious why these three functions are the most common. After all, |
| mail and file transfer seem to be the same thing. However, mail messages are |
| not identical to files, since they are usually comprised of only ASCII |
| characters and are sequential in structure. Files may contain binary data and |
| have complicated, non-sequential structures. Also, mail messages can usually |
| tolerate some errors in transmission whereas files should not contain any |
| errors. Finally, file transfers usually occur in a secure setting (i.e. The |
| users who are transferring files know each other's names and passwords and are |
| permitted to transfer the file, whereas mail can be sent to anybody as long as |
| their name is known). |
|
|
| While mail and transfer accomplish the transfer of raw information from one |
| computer to another, Telnet allows a distant user to process that information, |
| either by logging in to a remote computer or by linking to another terminal. |
| Telnet is most often used to remotely log in to a distant computer, but it is |
| actually a general-purpose communications protocol. I have found it incredibly |
| useful over the last year. In some ways, it could be used for a great deal of |
| access because you can directly connect to another computer anywhere that has |
| TCP/IP capabilities, however please note that Telnet is *NOT* Telenet. |
|
|
| There are other functions that some networks provide, including the following: |
|
|
| - Name to address translation for networks, computers and people |
| - The current time |
| - Quote of the day or fortune |
| - Printing on a remote printer, or use of any other remote peripheral |
| - Submission of batch jobs for non-interactive execution |
| - Dialogues and conferencing between multiple users |
| - Remote procedure call (i.e. Distributing program execution over several |
| remote computers) |
| - Transmission of voice or video information |
|
|
| Some of these functions are still in the experimental stages and require faster |
| computer networks than currently exist. In the future, new functions will |
| undoubtedly be invented and existing ones improved. |
|
|
| The DOD Protocol Suite is a layered network architecture, which means that |
| network functions are performed by different programs that work independently |
| and in harmony with each other. Not only are there different programs but |
| there are different protocols. The protocols SMTP, FTP and Telnet are |
| described above. Protocols have been defined for getting the current time, the |
| quote of the day, and for translating names. These protocols are called |
| applications protocols because users directly interact with the programs that |
| implement these protocols. |
|
|
| The Transmission Control Protocol, TCP, is used by many of the application |
| protocols. Users almost never interact with TCP directly. TCP establishes a |
| reliable end-to-end connection between two processes on remote computers. Data |
| is sent through a network in small chunks called packets to improve reliability |
| and performance. TCP ensures that packets arrive in order and without errors. |
| If a packet does have errors, TCP requests that the packet be retransmitted. |
|
|
| In turn, TCP calls upon IP, Internet Protocol, to move the data from one |
| network to another. IP is still not the lowest layer of the architecture, |
| since there is usually a "data link layer protocol" below it. This can be any |
| of a number of different protocols, two very common ones being X.25 and |
| Ethernet. |
|
|
| FTP, Telnet and SMTP are called "application protocols", since they are |
| directly used by applications programs that enable users to make use of the |
| network. Network applications are the actual programs that implement these |
| protocols and provide an interface between the user and the computer. An |
| implementation of a network protocol is a program or package of programs that |
| provides the desired network function such as file transfer. Since computers |
| differ from vendor to vendor (e.g. IBM, DEC, CDC), each computer must have its |
| own implementation of these protocols. However, the protocols are standardized |
| so that computers can interoperate over the network (i.e. Can understand and |
| process each other's data). For example, a TCP packet generated by an IBM |
| computer can be read and processed by a DEC computer. |
|
|
| In many instances, network applications programs use the name of the protocol. |
| For example, the program that transfers files may be called "FTP" and the |
| program that allows remote logins may be called "Telnet." Sometimes these |
| protocols are incorporated into larger packages, as is common with SMTP. Many |
| computers have mail programs that allow users on the same computer to send mail |
| to each other. SMTP functions are often added to these mail programs so that |
| users can also send and receive mail through a network. In such cases, there |
| is no separate program called SMTP that the user can access, since the mail |
| program provides the user interface to this network function. |
|
|
| Specific implementation of network protocols, such as FTP, are tailored to the |
| computer hardware and operating system on which they are used. Therefore, the |
| exact user interface varies from one implementation to another. For example, |
| the FTP protocol specifies a set of FTP commands which each FTP implementation |
| must understand and process. However, these are usually placed at a low level, |
| often invisible to the user, who is given a higher set of commands to use. |
|
|
| These higher-level commands are not standardized so they may vary from one |
| implementation of FTP to another. For some operating systems, not all of these |
| commands make equal sense, such as "Change Directory," or may have different |
| meanings. Therefore the specific user interface that the user sees will |
| probably differ. |
|
|
| This file describes a generic implementation of the standard TCP/IP application |
| protocols. Users must consult local documentation for specifics at their |
| sites. |
|
|
|
|
| Names and Addresses In A Network |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| In DOD Protocol Suite, each network is given a unique identifying number. This |
| number is assigned by a central authority, namely the Network Information |
| Center run by SRI, abbreviated as SRI-NIC, in order to prevent more than one |
| network from having the same network number. For example, the ARPAnet has |
| network number 10 while MIDnet has a longer number, namely 128.242. |
|
|
| Each host in a network has a unique identification so other hosts can specify |
| them unambiguously. Host numbers are usually assigned by the organization that |
| manages the network, rather than one central authority. Host numbers do not |
| need to be unique throughout the whole Internet but two hosts on the same |
| network need to have unique host numbers. |
|
|
| The combination of the network number and the host number is called the IP |
| address of the host and is specified as a 32-bit binary number. All IP |
| addresses in the Internet are expressible as 32-bit numbers, although they are |
| often written in dotted decimal notation. Dotted decimal notation breaks the |
| 32-bit number into four eight-bit parts or octets and each octet is specified |
| as a decimal number. For example, 00000001 is the binary octet that specifies |
| the decimal number 1, while 11000000 specifies 192. Dotted decimal notation |
| makes IP addresses much easier to read and remember. |
|
|
| Computers in the Internet are also identified by hostnames, which are strings |
| of characters, such as "phrackvax." However, IP packets must specify the |
| 32-bit IP address instead of the hostname so some way to translating hostnames |
| to IP addresses must exist. |
|
|
| One way is to have a table of hostnames and their corresponding IP addresses, |
| called a hosttable. Nearly every TCP/IP implementation has such a hosttable, |
| although the weaknesses of this method are forcing a shift to a new scheme |
| called the domain name system. In UNIX systems, the hosttable is often called |
| "/etc/hosts." You can usually read this file and find out what the IP |
| addresses of various hosts are. Other systems may call this file by a |
| different name and make it unavailable for public viewing. |
|
|
| Users of computers are generally given accounts to which all charges for |
| computer use are billed. Even if computer time is free at an installation, |
| accounts are used to distinguish between the users and enforce file |
| protections. The generic term "username" will be used in this file to refer to |
| the name by which the computer account is accessed. |
|
|
| In the early days of the ARPAnet which was the first network to use the TCP/IP |
| protocols, computer users were identified by their username, followed by a |
| commercial "at" sign (@), followed by the hostname on which the account |
| existed. Networks were not given names, per se, although the IP address |
| specified a network number. |
|
|
| For example, "knight@phrackvax" referred to user "knight" on host "phrackvax." |
| This did not specify which network "phrackvax" was on, although that |
| information could be obtained by examining the hosttable and the IP address for |
| "phrackvax." (However, "phrackvax" is a ficticious hostname used for this |
| presentation.) |
|
|
| As time went on, every computer on the network had to have an entry in its |
| hosttable for every other computer on the network. When several networks |
| linked together to form the Internet, the problem of maintaining this central |
| hosttable got out of hand. Therefore, the domain name scheme was introduced to |
| split up the hosttable and make it smaller and easier to maintain. |
|
|
| In the new domain name scheme, users are still identified by their usernames, |
| but hosts are now identified by their hostname and any and all domains of which |
| they are a part. For example, the following address, |
| "KNIGHT@UMCVMB.MISSOURI.EDU" specifies username "KNIGHT" on host "UMCVMB". |
| However, host "UMCVMB" is a part of the domain "MISSOURI" " which is in turn |
| part of the domain "EDU". There are other domains in "EDU", although only one |
| is named "MISSOURI". In the domain "MISSOURI", there is only one host named |
| "UMCVMB". |
|
|
| However, other domains in "EDU" could theoretically have hosts named "UMCVMB" |
| (although I would say that this is rather unlikely in this example). Thus the |
| combination of hostname and all its domains makes it unique. The method of |
| translating such names into IP addresses is no longer as straightforward as |
| looking up the hostname in a table. Several protocols and specialized network |
| software called nameservers and resolvers implement the domain name scheme. |
|
|
| Not all TCP/IP implementations support domain names because it is rather new. |
| In those cases, the local hosttable provides the only way to translate |
| hostnames to IP addresses. The system manager of that computer will have to |
| put an entry into the hosttable for every host that users may want to connect |
| to. In some cases, users may consult the nameserver themselves to find out the |
| IP address for a given hostname and then use that IP address directly instead |
| of a hostname. |
|
|
| I have selected a few network hosts to demonstrate how a host system can be |
| specified by both the hostname and host numerical address. Some of the nodes I |
| have selected are also nodes on BITnet, perhaps even some of the others that I |
| do not make a note of due a lack of omniscent awareness about each and every |
| single host system in the world :-) |
|
|
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
| Numerical Hostname Location BITnet |
| --------- -------- -------- ------ |
| 18.72.0.39 ATHENA.MIT.EDU (Mass. Institute of Technology) ? |
| 26.0.0.73 SRI-NIC.ARPA (DDN Network Information Center) - |
| 36.21.0.13 MACBETH.STANFORD.EDU (Stanford University) ? |
| 36.21.0.60 PORTIA.STANFORD.EDU (Stanford University) ? |
| 128.2.11.131 ANDREW.CMU.EDU (Carnegie Mellon University) ANDREW |
| 128.3.254.13 LBL.GOV (Lawrence Berkeley Labrotories) LBL |
| 128.6.4.7 RUTGERS.RUTGERS.EDU (Rutgers University) ? |
| 128.59.99.1 CUCARD.MED.COLUMBIA.EDU (Columbia University) ? |
| 128.102.18.3 AMES.ARC.NASA.GOV (Ames Research Center [NASA]) - |
| 128.103.1.1 HARVARD.EDU (Harvard University) HARVARD |
| 128.111.24.40 HUB.UCSB.EDU (Univ. Of Calif-Santa Barbara) ? |
| 128.115.14.1 LLL-WINKEN.LLNL.GOV (Lawrence Livermore Labratories) - |
| 128.143.2.7 UVAARPA.VIRGINIA.EDU (University of Virginia) ? |
| 128.148.128.40 BROWNVM.BROWN.EDU (Brown University) BROWN |
| 128.163.1.5 UKCC.UKY.EDU (University of Kentucky) UKCC |
| 128.183.10.4 NSSDCA.GSFC.NASA.GOV (Goddard Space Flight Center [NASA])- |
| 128.186.4.18 RAI.CC.FSU.EDU (Florida State University) FSU |
| 128.206.1.1 UMCVMB.MISSOURI.EDU (Univ. of Missouri-Columbia) UMCVMB |
| 128.208.1.15 MAX.ACS.WASHINGTON.EDU (University of Washington) MAX |
| 128.228.1.2 CUNYVM.CUNY.EDU (City University of New York) CUNYVM |
| 129.10.1.6 NUHUB.ACS.NORTHEASTERN.EDU (Northeastern University) NUHUB |
| 131.151.1.4 UMRVMA.UMR.EDU (University of Missouri-Rolla) UMRVMA |
| 192.9.9.1 SUN.COM (Sun Microsystems, Inc.) - |
| 192.33.18.30 VM1.NODAK.EDU (North Dakota State Univ.) NDSUVM1 |
| 192.33.18.50 PLAINS.NODAK.EDU (North Dakota State Univ.) NDSUVAX |
|
|
| Please Note: Not every system on BITnet has an IP address. Likewise, not |
| every system that has an IP address is on BITnet. Also, while |
| some locations like Stanford University may have nodes on BITnet |
| and have hosts on the IP as well, this does not neccessarily |
| imply that the systems on BITnet and on IP (the EDU domain in |
| this case) are the same systems. |
|
|
| Attempts to gain unauthorized access to systems on the Internet |
| are not tolerated and is legally a federal offense. At some |
| hosts, they take this very seriously, especially the government |
| hosts such as NASA's Goddard Space Flight Center, where they do |
| not mind telling you so at the main prompt when you connect to |
| their system. |
|
|
| However, some nodes are public access to an extent. The DDN |
| Network Information Center can be used by anyone. The server and |
| database there have proven to be an invaluable source of |
| information when locating people, systems, and other information |
| that is related to the Internet. |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
| Telnet |
|
|
| ~~~~~~ |
| Remote login refers to logging in to a remote computer from a terminal |
| connected to a local computer. Telnet is the standard protocol in the DOD |
| Protocol Suite for accomplishing this. The "rlogin" program, provided with |
| Berkeley UNIX systems and some other systems, also enables remote login. |
|
|
| For purposes of discussion, the "local computer" is the computer to which your |
| terminal is directly connected while the "remote computer" is the computer on |
| the network to which you are communicating and to which your terminal is *NOT* |
| directly connected. |
|
|
| Since some computers use a different method of attaching terminals to |
| computers, a better definition would be the following: The "local computer" is |
| the computer that you are currently using and the "remote computer" is the |
| computer on the network with which you are or will be communicating. Note that |
| the terms "host" and "computer" are synonymous in the following discussion. |
|
|
| To use Telnet, simply enter the command: TELNET |
|
|
| The prompt that Telnet gives is: Telnet> |
|
|
| (However, you can specify where you want to Telnet to immediately and bypass |
| the the prompts and other delays by issuing the command: TELNET [location].) |
|
|
| There is help available by typing in ?. This prints a list of all the valid |
| subcommands that Telnet provides with a one-line explanation. |
|
|
| Telnet> ? |
|
|
| To connect to to another computer, use the open subcommand to open a connection |
| to that computer. For example, to connect to the host "UMCVMB.MISSOURI.EDU", |
| do "open umcvmb.missouri.edu" |
|
|
| Telnet will resolve (i.e. Translate, the hostname "umcvmb.missouri.edu" into an |
| IP address and will send a packet to that host requesting login. If the remote |
| host decides to let you attempt a login, it prompts you for your username and |
| password. If the host does not respond, Telnet will "time out" (i.e. Wait for |
| a reasonable amount of time such as 20 seconds) and then terminate with a |
| message such as "Host not responding." |
|
|
| If your computer does not have an entry for a remote host in its hosttable and |
| it cannot resolve the name, you can use the IP address explicitly in the telnet |
| command. For example, |
|
|
| TELNET 26.0.0.73 (Note: This is the IP address for the DDN Network Information |
| Center [SRI-NIC.ARPA]) |
|
|
| If you are successful in logging in, your terminal is connected to the remote |
| host. For all intents and purposes, your terminal is directly hard-wired to |
| that host and you should be able to do anything on your remote terminal that |
| you can do at any local terminal. There are a few exceptions to this rule, |
| however. |
|
|
| Telnet provides a network escape character, such as CONTROL-T. You can find out |
| what the escape character is by entering the "status" subcommand: |
|
|
| Telnet> status |
|
|
| You can change the escape character by entering the "escape" subcommand: |
|
|
| Telnet> escape |
|
|
| When you type in the escape character, the Telnet prompt returns to your screen |
| and you can enter subcommands. For example, to break the connection, which |
| usually logs you off the remote host, enter the subcommand "quit": |
|
|
| Telnet> quit |
|
|
| Your Telnet connection usually breaks when you log off the remote host, so the |
| "quit" subcommand is not usually used to log off. |
|
|
| When you are logged in to a remote computer via Telnet, remember that there is |
| a time delay between your local computer and the remote one. This often |
| becomes apparent to users when scrolling a long file across the terminal screen |
| nd they wish to cancel the scrolling by typing CONTROL-C or something similar. |
| After typing the special control character, the scrolling continues. The |
| special control character takes a certain amount of time to reach the remote |
| computer which is still scrolling information. Thus response from the remote |
| computer will not likely be as quick as response from a local computer. |
|
|
| Once you are remotely logged on, the computer you are logged on to effectively |
| becomes your "local computer," even though your original "local computer" still |
| considers you logged on. You can log on to a third computer which would then |
| become your "local computer" and so on. As you log out of each session, your |
| previous session becomes active again. |
|
|
|
|
| File Transfer |
| ~~~~~~~~~~~~~ |
|
|
| FTP is the program that allows files to be sent from one computer to another. |
| "FTP" stands for "File Transfer Protocol". |
|
|
| When you start using FTP, a communications channel with another computer on the |
| network is opened. For example, to start using FTP and initiate a file |
| transfer session with a computer on the network called "UMCVMB", you would |
| issue the following subcommand: |
|
|
| FTP UMCVMB.MISSOURI.EDU |
|
|
| Host "UMCVMB" will prompt you for an account name and password. If your login |
| is correct, FTP will tell you so, otherwise it will say "login incorrect." Try |
| again or abort the FTP program. (This is usually done by typing a special |
| control character such as CONTROL-C. The "program abort" character varies from |
| system to system.) |
|
|
| Next you will see the FTP prompt, which is: |
|
|
| Ftp> |
|
|
| There are a number of subcommands of FTP. The subcommand "?" will list these |
| commands and a brief description of each one. |
|
|
| You can initiate a file transfer in either direction with FTP, either from the |
| remote host or to the remote host. The "get" subcommand initiates a file |
| transfer from the remote host (i.e. Tells the remote computer to send the file |
| to the local computer [the one on which you issued the "ftp" command]). Simply |
| enter "get" and FTP will prompt you for the remote host's file name and the |
| (new) local host's file name. Example: |
|
|
| Ftp> get |
| Remote file name? |
| theirfile |
| local file name? |
| myfile |
|
|
| ou can abbreviate this by typing both file names on the same line as the "get" |
| subcommand. If you do not specify a local file name, the new local file will |
| be called the same thing as the remote file. Valid FTP subcommands to get a |
| file include the following: |
|
|
| get theirfile myfile |
| get doc.x25 |
|
|
| The "put" subcommand works in a similar fashion and is used to send a file from |
| the local computer to the remote computer. Enter the command "put" and FTP |
| will prompt you for the local file name and then the remote file name. If the |
| transfer cannot be done because the file doesn't exist or for some other |
| reason, FTP will print an error message. |
|
|
| There are a number of other subcommands in FTP that allow you to do many more |
| things. Not all of these are standard so consult your local documentation or |
| type a question mark at the FTP prompt. Some functions often built into FTP |
| include the ability to look at files before getting or putting them, the |
| ability to change directories, the ability to delete files on the remote |
| computer, and the ability to list the directory on the remote host. |
|
|
| An intriguing capability of many FTP implementations is "third party |
| transfers." For example, if you are logged on computer A and you want to cause |
| computer B to send a file to computer C, you can use FTP to connect to computer |
| B and use the "rmtsend" command. Of course, you have to know usernames and |
| passwords on all three computers, since FTP never allows you to peek into |
| someone's directory and files unless you know their username and password. |
|
|
| The "cd" subcommand changes your working directory on the remote host. The |
| "lcd" subcommand changes the directory on the local host. For UNIX systems, |
| the meaning of these subcommands is obvious. Other systems, especially those |
| that do not have directory-structured file system, may not implement these |
| commands or may implement them in a different manner. |
|
|
| The "dir" and "ls" subcommands do the same thing, namely list the files in the |
| working directory of of the remote host. |
|
|
| The "list" subcommand shows the contents of a file without actually putting it |
| into a file on the local computer. This would be helpful if you just wanted to |
| inspect a file. You could interrupt it before it reached the end of the file |
| by typing CONTROL-C or some other special character. This is dependent on your |
| FTP implementation. |
|
|
| The "delete" command can delete files on the remote host. You can also make |
| and remove directories on the remote host with "mkdir" and "rmdir". The |
| "status" subcommand will tell you if you are connected and with whom and what |
| the state of all your options are. |
|
|
| If you are transferring binary files or files with any non-printable |
| characters, turn binary mode on by entering the "binary" subcommand: |
|
|
| binary |
|
|
| To resume non-binary transfers, enter the "ascii" subcommand. |
|
|
| Transferring a number of files can be done easily by using "mput" (multiple |
| put) and "mget" (multiple get). For example, to get every file in a particular |
| directory, first issue a "cd" command to change to that directory and then an |
| "mget" command with an asterisk to indicate every file: |
|
|
| cd somedirectory |
| mget * |
|
|
| When you are done, use the "close" subcommand to break the communications link. |
| You will still be in FTP, so you must use the "bye" subcommand to exit FTP and |
| return to the command level. The "quit" subcommand will close the connection |
| and exit from FTP at the same time. |
|
|
|
|
| Mail |
| ~~~~ |
| Mail is the simplest network facility to use in many ways. All you have to do |
| is to create your message, which can be done with a file editor or on the spur |
| of the moment, and then send it. Unlike FTP and Telnet, you do not need to |
| know the password of the username on the remote computer. This is so because |
| you cannot change or access the files of the remote user nor can you use their |
| account to run programs. All you can do is to send a message. |
|
|
| There is probably a program on your local computer which does mail between |
| users on that computer. Such a program is called a mailer. This may or may |
| not be the way to send or receive mail from other computers on the network, |
| although integrated mailers are more and more common. UNIX mailers will be |
| used as an example in this discussion. |
|
|
| Note that the protocol which is used to send and receive mail over a TCP/IP |
| network is called SMTP, the "Simple Mail Transfer Protocol." Typically, you |
| will not use any program called SMTP, but rather your local mail program. |
|
|
| UNIX mailers are usually used by invoking a program named "mail". To receive |
| new mail, simply type "mail". |
|
|
| There are several varieties of UNIX mailers in existence. Consult your local |
| documentation for details. For example, the command "man mail" prints out the |
| manual pages for the mail program on your computer. |
|
|
| To send mail, you usually specify the address of the recipient on the mail |
| command. For example: "mail knight@umcvmb.missouri.edu" will send the |
| following message to username "knight" on host "umcvmb". |
|
|
| You can usually type in your message one line at a time, pressing RETURN after |
| each line and typing CONTROL-D to end the message. Other facilities to include |
| already-existing files sometimes exist. For example, Berkeley UNIXes allow you |
| to enter commands similar to the following to include a file in your current |
| mail message: |
|
|
| r myfile |
|
|
| In this example, the contents of "myfile" are inserted into the message at this |
| point. |
|
|
| Most UNIX systems allow you to send a file through the mail by using input |
| redirection. For example: |
|
|
| mail knight@umcvmb.missouri.edu < myfile |
|
|
| In this example, the contents of "myfile" are sent as a message to "knight" on |
| "umcvmb." |
|
|
| Note that in many UNIX systems the only distinction between mail bound for |
| another user on the same computer and another user on a remote computer is |
| simply the address specified. That is, there is no hostname for local |
| recipients. Otherwise, mail functions in exactly the same way. This is common |
| for integrated mail packages. The system knows whether to send the mail |
| locally or through the network based on the address and the user is shielded |
| from any other details. |
|
|
|
|
| "The Quest For Knowledge Is Without End..." |
| _______________________________________________________________________________ |
|
|