perm filename NET.DOC[NET,MRC]2 blob
sn#352668 filedate 1978-04-22 generic text, type C, neo UTF8
COMMENT ā VALID 00005 PAGES
C REC PAGE DESCRIPTION
C00001 00001
C00002 00002 Network software MRC 4/22/78
C00004 00003 Network software on [NET,MRC]
C00013 00004 Other network software
C00015 00005 Generating a new host table
C00017 ENDMK
Cā;
Network software MRC 4/22/78
Before even trying to read this document or understand any
of the user mode network software, you should be familiar with
what's in NIC 7104, ARPAnet Protocol Handbook (at least the protocol
for the program you're looking at). Also, I maintain two loose-leaf
binders containing an essentially complete set of the current
network protocols (above and beyond 7104); they are much bulkier to
carry than a 7104 but are also kept up to date manually so as to be
the "final word" on the protocols.
IMPSER, the IMP service routine in the monitor, is documented
in IMPSER.DOC[S,SYS].
Now that you understand all of this completely, you're now ready
to read the rest of this document.
Network software on [NET,MRC]
[NET,MRC] is the directory for most of the network sources.
ARPAWO CKY An amusing poem about the ARPAnet.
DCSTAT MID The Datacomputer status reporter. ICP's to socket 703 at
CCA, slurps up everything sent at it, types it, and exits.
DFTP MAC The Datacomputer file transfer program. A hacked up
version of the Tenex program.
DSCSER MID Discard (socket 11) server. This is a black hole server;
it gobbles down input without sending anything back.
DYTSER MID Day/Time (socket 15) server. This sends the results of a
DAYTIME monitor command and closes the connection.
ECHSER MID Echo (socket 7) server. This echoes back input.
FNGSER MID FINGER (socket 117) server. This sends the results of a
FINGER monitor command and closes the connection.
HOST MID The host table search/print subsystem; accepts a string
and prints details of all hosts and nicknames which match
the string.
HOST MSG A collection of announcements relevant to hosts entering
and leaving the network.
HOSTAB MID Pretty-prints a columnized host table listing of official
names and details.
HOSTS TXT This is the source for the host table, in the form of a
MIDAS .INSRT file.
HOSTS1 This is a BATCH/NOW command file which recompiles the host
table and sends the updated host table to the ITS sites at
MIT as well.
HOSTS1 BIN This is the binary equivalent of the host table. Every
subsystem which uses NETWRK's host name scanning routines
reads this file and will lose without it.
HOSTS1 DMP This program generates commands to compile a new binary
file.
HOSTS1 MID This file .INSRT's HOSTS.TXT and generates a core image
which sorts the data, writes HOSTS1.BIN, then creates a
HOSTS1.DMP (just a tiny remnant of the core image made
by HOSTS1.MID).
IMPDWN MID Brings down the NCP.
IMPSTA MID The real-time IMP status report program. On displays,
the information is updated every second.
IMPUP MID Brings up the NCP.
LAVSER MID Load average (socket 371) server. Sends load average
statistics of our system to interested Tenices.
LINSER MID Text message (socket 17) server. This sends the results
of a R LINS monitor command and closes the connection.
NET MSG This contains various network liaison messages other than
host changes.
NETGEN This is a command file to recompile the network software
which uses NETWRK, in case NETWRK changes.
NETWHO MID This is an RS EXEC user program who report who is on at
another site for all users or for a particular user.
NETWRK MID This is the library of magical network routines which
almost everything uses. A FAIL version exists in
NETWRK.FAI[SUB,SYS] and should be updated in parallel
with this file. This is a .INSRT file and the
subroutines and assembly options can be easily determined
from the comments.
NFTSER MID This is our (ha ha) new protocol FTP server.
OTLSER MID Old protocol TELNET (socket 1) server.
RSEXEC MID Special TELNET to the TIP RSEXEC server.
RSSER MID Subset RS EXEC (socket 365) server. This is the server
for network who and network links.
SEND MID A temporary network send program until MAIL knows to use
ITS-style instead of Tenex-style headers for network sends.
STASER MID Network status (socket 17) server. This sends the results
of a R HOSTAT monitor command and closes the connection.
This server is good for testing the net here since it uses
lots of sockets.
SUAI TXT The local online copy of our writup in the NIC's ARPAnet
Resource Handbook.
SUPDUP C The source of the UNIX version of SUPDUP. This is the place
where it is documented to live for people to steal copies.
SUPDUP CMD A SNAIL command command file (LOAD @SUPDUP) which makes a
SUPDUP with DDT in the right place (this is for the winning
flushable DDT feature).
SUPDUP DOC The official description of the SUPDUP protocol. This is
more up-to-date than RFC 734, and eventually will replace
RFC 734.
SUPDUP MID SUPDUP user program. This is a TELNET which uses the SUPDUP
display protocol, as documented in RFC 734. Note that making
a SUPDUP requires MACROS.MID[1,MRC] for the hairy macro
library.
SUPSER MID SUPDUP (socket 137) server.
SUTIP TXT The local online copy of the TIP's write in the ARPAnet
Resource Handbook.
SYSSER MID SYSTAT (socket 13) server. This sends the results of a WHO
monitor command and closes the connection.
TALK MID RS EXEC user program for outgoing network links.
TELNET MID TELNET user program. This implements the standard TELNET
protocol (both old and new protocols); the default mode is
new protocol.
TELSER MID New protocol TELNET (socket 27) server.
TIMES MID Reports results from the time servers of various places.
TIMSER MID Network time (socket 45) server. Several places get their
system time upon reloading from us, since we have a reliable
clock.
TOC PUB A PUB source file for the table of contents for the protocol
handbooks that I maintain (the large white books).
TSTSER MID Terminal test (socket 23) server. Outputs the printing
ASCII characters in consecutive order endlessly.
ULOGR MID This is the user mode RFC logger. It wakes up when an
"interesting" (ie, odd local socket between 1 and 377)
RFC arrives and tries to fire up RFCnnn.DMP[NET,SYS]
(where nnn is the socket number) as a phantom. A file
by that name claims to be a binary of a server for that
socket. Normally loggering is done in the monitor by
the exec mode logger, so this program is usually
unnecessary except as a debugging tool.
Other network software
[NET,SYS] is the directory for the network server binaries, the IMP
interface diagnostics sources, and a few user program sources.
The FTP server lives on FTPSER[NET,SYS].
The FTP user lives as an assembly switch in TELNET[NET,SYS]. Note that
the user TELNET obtained by this source file is NOT the current user
TELNET.
Tovar's NGP server is NETGRF.FAI[NET,SYS] and it .INSERT's several random
files on [NET,SYS].
An NGP user can be generated by setting the NGP assembly switch in the old
TELNET program. It's on SYS as "TELGRF".
The MAIL user program lives on MAIL.FAI[MAI,SYS].
DEA has a special TELNET called DDHACK which does neat things to the Data
Disc displays. As of this writing, it lives on DDHACK.FAI[I,DEA].
The IMSSS server lives on IMSSSS[IMS,MRC] and its binary is
IMSSSS.DMP[NET,SYS].
The IMSSS user lives on IMSSS[IMS,MRC] and its binary is on SYS:.
Dialnet sources live on [DCP,MRC].
Generating a new host table
First, make the edits you want to HOSTS.TXT[NET,MRC]. Make sure all edits
are syntactically correct. The file should NOT be formatted with an E
directory. There are a whole set of instructions on page 1 of HOSTS.TXT
saying how to install everything, and on page 2 as to what all the entries
should look like and such rules as there are for things.
The host table should then be compiled and installed at MIT. The easy way
to do this is to say BATCH/NOW @HOSTS1. Finally, a message should be sent
to INFO-HOSTS%AI and INFO-NET%SAIL saying what changes were made.
To do things more manually, you can EXECUTE HOSTS1.MID and then save the
resulting core image (note the EXECUTE). If there is a HOSTS1.DMP already
you can run that, and it will recompile itself, delete its REL file, and
save itself all in one fell swoop. Don't forget to send the updates to
MIT (they send us updates that they make).