The Anarchist Cookbook (36 page)

Read The Anarchist Cookbook Online

Authors: William Powell

Tags: #Reference, #Handbooks & Manuals

BOOK: The Anarchist Cookbook
3.15Mb size Format: txt, pdf, ePub

Users must consult local documentation for specifics at their sites.

Names and Addresses In A Network

In DOD Protocol Suite, each network is given a unique identifying number. This number is

assigned by a central authority, namely the Network Information Center run by SRI,

abbreviated as SRI-NIC, in order to prevent more than one network from having the same

network number. For example, the ARPAnet has network number 10 while MIDnet has a

longer number, namely 128.242. Each host in a network has a unique identification so other

hosts can specify them unambiguously. Host numbers are usually assigned by the

organization that manages the network, rather than one central authority. Host numbers

do not need to be unique throughout the whole Internet but two hosts on the same

network need to have unique host numbers.

The combination of the network number and the host number is called the IP address of

the host and is specified as a 32-bit binary number. All IP addresses in the Internet are

expressible as 32-bit numbers, although they are often written in dotted decimal notation.

Dotted decimal notation breaks the 32-bit number into four eight-bit parts or octets and

each octet is specified as a decimal number. For example, 00000001 is the binary octet

that specifies the decimal number 1, while 11000000 specifies 192. Dotted decimal

notation makes IP addresses much easier to read and remember.

Computers in the Internet are also identified by hostnames, which are strings of

characters, such as "phrackvax." However, IP packets must specify the 32-bit IP address

instead of the hostname so some way to translating hostnames to IP addresses must

exist.

One way is to have a table of hostnames and their corresponding IP addresses, called a

hosttable. Nearly every TCP/IP implementation has such a hosttable, although the

weaknesses of this method are forcing a shift to a new scheme called the domain name

system. In UNIX systems, the hosttable is often called "/etc/hosts." You can usually

read this file and find out what the IP addresses of various hosts are. Other systems may

call this file by a different name and make it unavailable for public viewing.

Users of computers are generally given accounts to which all charges for computer use are

billed. Even if computer time is free at an installation, accounts are used to distinguish

between the users and enforce file protections. The generic term "username" will be used

in this file to refer to the name by which the computer account is accessed.

In the early days of the ARPAnet which was the first network to use the TCP/IP

protocols, computer users were identified by their username, followed by a commercial

"at" sign (@), followed by the hostname on which the account existed. Networks were not

given names, per se, although the IP address specified a network number.

For example, "knight@phrackvax" referred to user "knight" on host "phrackvax." This did

not specify which network "phrackvax" was on, although that information could be

obtained by examining the hosttable and the IP address for "phrackvax." (However,

"phrackvax" is a fictitious hostname used for this presentation.)

As time went on, every computer on the network had to have an entry in its hosttable for

every other computer on the network. When several networks linked together to form the

Internet, the problem of maintaining this central hosttable got out of hand. Therefore,

the domain name scheme was introduced to split up the hosttable and make it smaller and

easier to maintain.

In the new domain name scheme, users are still identified by their usernames, but hosts

are now identified by their hostname and any and all domains of which they are a part. For

example, the address "[email protected]" specifies username

"KNIGHT" on host "UMCVMB". However, host "UMCVMB" is a part of the domain

"MISSOURI" " which is in turn part of the domain "EDU". There are other domains in

"EDU", although only one is named "MISSOURI". In the domain "MISSOURI", there is

only one host named "UMCVMB".

However, other domains in "EDU" could theoretically have hosts named "UMCVMB"

(although I would say that this is rather unlikely in this example). Thus the combination of

hostname and all its domains makes it unique. The method of translating such names into

IP addresses is no longer as straightforward as looking up the hostname in a table.

Several protocols and specialized network software called nameservers and resolvers

implement the domain name scheme.

Not all TCP/IP implementations support domain names because it is rather new. In those

cases, the local hosttable provides the only way to translate hostnames to IP addresses.

The system manager of that computer will have to put an entry into the hosttable for

every host that users may want to connect to. In some cases, users may consult the

nameserver themselves to find out the IP address for a given hostname and then use that

IP address directly instead of a hostname.

I have selected a few network hosts to demonstrate how a host system can be specified

by both the hostname and host numerical address. Some of the nodes I have selected are

also nodes on BITnet, perhaps even some of the others that I do not make a note of due a

lack of omniscient awareness about each and every single host system in the world :-)

Numerical BITnetHostnameLocation
18.72.0.39ATHENA.MIT.EDUMass. Institute of

Technology MIT26.0.0.73SRI-NIC.ARPADDN Network Information Center

-36.21.0.13MACBETH.STANFORD.EDUStanford

University

?

36.21.0.60PORTIA.STANFORD.EDUStanford

University

?

128.2.11.131ANDREW.CMU.EDUCarnegie

Mellon

Univ.

ANDREW128.3.254.13LBL.GOVLawrence

Berkeley

Labrotories

LBL128.6.4.7RUTGERS.RUTGERS.EDURutgers

University

?

128«9.99.1CUCARD.MED.COLUMBIA.EDUColumbia

University

?

128.102.18.3AMES.ARC.NASA.GOVAmes

Research

Center

[NASA]

-128.103.1.1HARVARD.EDUHarvard University HARVARD128.111.24.40HUB.UCSB.EDUUniv.

Of Santa Barbara ?128.115.14.1LLL-WINKEN.LLNL.GOVLawrence Livermore Labratories

-128.143.2.7UVAARPA.VIRGINIA.EDUUniversity

of

Virginia

?

128.148.128.40BROWNVM.BROWN.EDUBrown

University

BROWN128.163.1«UKCC.UKY.EDUUniversity

of

Kentucky

UKCC128.183.10.4NSSDCA.GSFC.NASA.GOVGoddard Space Flight Center [NASA]-

128.186.4.18RAI.CC.FSU.EDUFlorida

State

University

FSU128.206.1.1UMCVMB.MISSOURI.EDUUniv.

of

MissouriColumbia

UMCVMB128.208.1.15MAX.ACS.WASHINGTON.EDUUniversity

of

Washington

MAX128.228.1.2CUNYVM.CUNY.EDUCity

University

of

New

York

CUNYVM129.10.1.6NUHUB.ACS.NORTHEASTERN.EDUNortheastern

University

NUHUB131.151.1.4UMRVMA.UMR.EDUUniversity

of

Missouri

Rolla

UMRVMA192.9.9.1SUN.COMSun Microsystems, Inc. -192.33.18.30VM1.NODAK.EDUNorth

Dakota State Univ. NDSUVM1192.33.18«0PLAINS.NODAK.EDUNorth Dakota State Univ.

NDSUVAX

Please Note: Not every system on BITnet has an IP address. Likewise, not every system

that has an IP address is on BITnet. Also, while some locations like Stanford University

may have nodes on BITnet and have hosts on the IP as well, this does not necessarily imply

that the systems on BITnet and on IP (the EDU domain in this case) are the same systems.

Attempts to gain unauthorized access to systems on the internet are not tolerated and is

legally a federal offense. At some hosts, they take this very seriously, especially the

government hosts such as NASA's Goddard Space Flight Center, where they do not mind

telling you so at the main prompt when you connect to their system.

However, some nodes are public access to an extent. The DDN Network Information

Center can be used by anyone. The server and database there have proven to be an

invaluable source of information when locating people, systems, and other information that

is related to the Internet.

Telnet

Remote login refers to logging in to a remote computer from a terminal connected to a

local computer. Telnet is the standard protocol in the DOD Protocol Suite for

accomplishing this. The "rlogin" program, provided with Berkeley UNIX systems and some

other systems, also enables remote login.

For purposes of discussion, the "local computer" is the computer to which your terminal is

directly connected while the "remote computer" is the computer on the network to which

you are communicating and to which your terminal is *NOT* directly connected.

Since some computers use a different method of attaching terminals to computers, a

better definition would be the following: The "local computer" is the computer that you

are currently using and the "remote computer" is the computer on the network with which

you are or will be communicating. Note that the terms "host" and "computer" are

synonymous in the following discussion.

To use Telnet, simply enter the command: TELNET

The prompt that Telnet gives is: Telnet>

(However, you can specify where you want to Telnet to immediately and bypass the

prompts and other delays by issuing the command: TELNET [location].)

There is help available by typing in ?. This prints a list of all the valid

subcommands that Telnet provides with a one-line explanation.

Telnet> ?

To connect to another computer, use the open subcommand to open a connection

to that computer. For example, to connect to the host "UMCVMB.MISSOURI.EDU",

do "open umcvmb.missouri.edu"

Telnet will resolve (i.e. Translate, the hostname "umcvmb.missouri.edu" into an

IP address and will send a packet to that host requesting login. If the remote

host decides to let you attempt a login, it prompts you for your username and password. If

the host does not respond, Telnet will "time out" (i.e. Wait for a reasonable amount of time

such as 20 seconds) and then terminate with a message such as "Host not responding."

If your computer does not have an entry for a remote host in its hosttable and it cannot

resolve the name, you can use the IP address explicitly in the telnet command. For

example,

TELNET 26.0.0.73 (Note: This is the IP address for the DDN Network Information

Center [SRI-NIC.ARPA])

If you are successful in logging in, your terminal is connected to the remote host. For all

intents and purposes, your terminal is directly hard-wired to that host and you should be

able to do anything on your remote terminal that you can do at any local terminal. There

are a few exceptions to this rule, however.

Telnet provides a network escape character, such as CONTROL-T. You can find out what

the escape character is by entering the "status" subcommand:

Telnet> status

You can change the escape character by entering the "escape" subcommand:

Telnet> escape

When you type in the escape character, the Telnet prompt returns to your screen and you

can enter subcommands. For example, to break the connection, which usually logs you off

the remote host, enter the subcommand "quit":

Telnet> quit

Your Telnet connection usually breaks when you log off the remote host, so the "quit"

subcommand is not usually used to log off.

When you are logged in to a remote computer via Telnet, remember that there is a time

delay between your local computer and the remote one. This often becomes apparent to

users when scrolling a long file across the terminal screen and they wish to cancel the

scrolling by typing CONTROL-C or something similar. After typing the special control

character, the scrolling continues. The special control character takes a certain amount of

time to reach the remote computer which is still scrolling information. Thus response from

the remote computer will not likely be as quick as response from a local computer. Once

you are remotely logged on, the computer you are logged on to effectively becomes your

"local computer," even though your original "local computer" still considers you logged on.

You can log on to a third computer which would then become your "local computer" and so

on. As you log out of each session, your previous session becomes active again.

File Transfer

FTP is the program that allows files to be sent from one computer to another.

"FTP" stands for "File Transfer Protocol".

When you start using FTP, a communications channel with another computer on the

network is opened. For example, to start using FTP and initiate a file transfer session with

Other books

The Stars Shine Bright by Sibella Giorello
Martha by Diana Wallis Taylor
Forager by Peter R. Stone
Bloody Mary by Carolly Erickson
A Wayward Game by Pandora Witzmann
Bossy Request by Lacey Silks
Beard on Bread by Beard, James
The Spirit Ring by Lois McMaster Bujold