.ds X X .ds Y Y .ds Z Z .TL An Introduction to the Berkeley Network .AU Eric Schmidt .AI Computer Science Division Department of Electrical Engineering and Computer Science University of California, Berkeley Berkeley, California 94720 .sp May 1979 (revised November 1996) .AB This document describes the use of a network between a number of .UX machines on the Berkeley campus. This network can execute commands on other machines, including file transfers, sending and receiving mail, remote printing, and shell-scripts. .PP The network operates in a batch-request mode. Network requests are queued up at the source and sent in shortest-first order to the destination machine. To do this, the requests are forwarded through a network of inter-connected machines until they arrive at their destination where they are executed. The time this requires depends on system load, inter-machine transfer speed, and quantity of data being sent. .PP The network enforces normal .UX security and demands a remote account with a password for most commands. Information can be returned to the user in files, for later processing, or on the terminal for immediate viewing. .AE .SH Introduction .PP A network between a number of .UX machines on the Berkeley campus has been implemented. This document is a brief introduction to the use of this network. Information which is specific to the local network has been gathered into Appendix A. The new user should read both this introduction and Appendix A in order to learn to use the network effectively. .PP This document is subdivided into the following sections: .ds c Copying Files over the Network .ds d Listing Requests in the Network Queue .ds e Removing Requests from the Network Queue .ds f Sending Mail over the Network .ds g Reading Mail over the Network .ds h Using the Lineprinter over the Network .DS Use of the Network 1) \*c 2) \*d 3) \*e 4) \*f 5) \*g 6) \*h 7) Net Prototype Command Setting Defaults How to Specify Remote Passwords Appendix A: The Network at Berkeley Appendix B: Getting Started \(em An Example .DE .PP This manual is written in terms of three mythical machines, named \*X, \*Y, and \*Z. Specific names at Berkeley are in Appendix A, along with more local information. .SH Use of the Network .PP The network provides facilities for issuing a command on one machine (the .I local machine) which is to be executed on another (the .I remote machine). Network commands are available to transfer files from one machine to another, to send mail to a user on a remote machine, to retrieve one's mail from a remote account, or to print a file on a remote lineprinter. These commands are described below, as is the more general .I net command which allows users to specify the name of some command or shell script to be executed on a remote machine. Network requests are queued on the local machine and sent to the remote machine, forwarded through intermediate machines if necessary. .PP Most of the network commands require that you have an account on the remote machine. If a remote account is not needed for a particular command, it will be noted in the following discussion. The first example introduces procedures and responses which are applicable to all network commands. .sp 1.5 .NH \*c .PP Suppose that you have accounts on both the \*X and \*Y machines and that you are presently logged into the \*X machine. If you want to copy a file named `file1' from your current directory on machine \*X to machine \*Y (the .I remote machine), use the command: .DS % netcp file1 \*Y:file1 .DE The net will make a copy of `file1' in your login directory on the \*Y machine. (The `\*Y:' will not be part of the filename on the \*Y machine.) In order to verify your permission to write into the \*Y account, the .I netcp command will prompt you with: .DS Name (\*Y:your-name): .DE You should respond with your login name on the Y machine, followed by a carriage-return. If you have the same login name on both machines, just type a carriage-return. Next a password will be requested: .DS Password (\*Y:remote-name): .DE Now type in your password followed by a carriage-return (you must type it even if your passwords are the same on both machines). The .I netcp command will make a copy of your `file1' in a queue destined for the \*Y machine, and will then return you to the shell. .PP Likewise if you wanted to transfer a file named `scan.p' from \*Y to \*X, .DS % netcp \*Y:scan.p scan.p .DE would place that file in your current directory on \*X. .PP The network will ``write'' you when it has executed your request (if you are still logged in), or will ``mail'' you a message (if you are not). You may use the .B \-n .R option (described later) to disallow the interruption and thus force mail to be sent. A typical message might look like this: .DS Message from \*Y:your-name at time ... (command: netcp file1 \*Y:file1, R: 0, sent April 1 18:03, took 10 min 3 sec) ------- .DE The message includes the current time, the time you sent the command on machine \*X, and the exit code of the command (zero normally means success). .PP The network response will tell you if it was unable to execute the remote command successfully by returning an error message some time later. If, for example, you type the wrong password, you will get the response .DS Message from \*Y:your-name at time ... (command: netcp file1 \*Y:file1, sent April 1 18:03, took 10 min 3 sec) Error: bad login/password your-name ------ .DE .PP The .I netcp command is actually a generalization of the .UX .I cp command, similar to .I uucp\fP\(dg. .FS \(dg See the .UX Programmers Manual (Version 7 only). .FE Its syntax is: .DS \fBnetcp\fR [\fB\-l\fI login\fR] [\fB\-p\fI password\fR] [\fB\-n\fR] [\fB\-q\fR] [\fB\-f\fR] \fIfromfile tofile\fR .DE where .I fromfile and .I tofile can be local or remote files. A filename which is not a full pathname is either from the current directory on the local machine or your login directory on the remote machine. The .B \-l .R and .B \-p .R options may be used to specify your remote login name and password on the command line. If the password contains shell meta-characters, it must be in quotes. (These options are useful in shell scripts, but be sure to make the shell script readable only by yourself if you've got passwords in it!) The .B \-n .R option forces any responses from the remote machine to be mailed rather than written to you. The .B \-f .R option forces prompting for a remote user name and password, even if they are set by other options or are in the ``.netrc'' file (see ``Setting Defaults'' below). Finally, the .B \-q .R option prevents any confirmation messages from being sent back to you, if there were no errors, the exit code of the command is zero, and the command had no output. .PP Transferred files may or may not have the correct file protection mode; use the .I chmod (I) command to reset it. When files are to be brought from a remote machine, they are created zero-length at the time the command is issued; when they arrive, they assume their true length. Unlike .I cp, .I netcp does not allow the .I tofile to be simplified to a directory, if the files have the same name. .LP Examples: .RS .TS l l. % netcp\ \ file1\ \ \*Y:file1 copy `file1' from the current directory to \*Y % netcp\ \ \*Y:file1\ \ file1 copy `file1' from \*Y to the current directory % netcp\ \ \*Z:file1\ \ \*Z:file2 \fIcp\fP command on remote machine % netcp\ \ \*X:lex.c\ \ \*Y:lex.c copy from \*X to \*Y % netcp\ \ \*Y:subdir/file1\ \ file1 copy from a sub-directory % netcp\ \ file1\ \ file2 an error\(em use the \fIcp\fP command .TE .RE .sp 1.5 .NH \*d .PP To see where your command is in the queue, type .DS % netq .DE A typical output of which looks like: .DS L .cs R 23 From To Len Code Time Command \*X:your-name \*Y:remote-name 100 b99999 Mar 23 18:05 netcp file1 \*Y:file1 .cs R .DE The format is similar to that of the .I lpq command. The files are sent one at a time, in the order listed. If .I netq tells you the queue is empty, your request has been sent already. The queues for different destinations are totally separate. .DS % netq \*Y .DE will list just the queue destined for the \*Y machine. .I Netq summarizes requests from other users. The command .DS % netq \-a .DE will print the requests from all users. .sp 1.5 .NH \*e .PP If you want to cancel your net request, and ``b99999'' (see the .I netq example above) is your ``Code,'' use the command .DS % netrm b99999 .DE which will remove the request (if it hasn't already been sent). Furthermore, .DS % netrm \- .DE will remove all your net requests in the queues on the local machine (you must have made the request in order to remove it). .sp 1.5 .NH \*f .PP To send mail to remote machines, use the .I mail command with the remote account prefixed by the destination machine's name and a `:'. ``\*Y:schmidt'', for example, refers to an account ``schmidt'' on the \*Y machine. The full sequence is illustrated below: .DS % mail \*Y:schmidt \ \ \ \ {your message to user ``schmidt'' } {control-d} .DE This will send to user ``schmidt'' on the \*Y machine the text you type in. As with intra-machine mail, the message is terminated by a control-d. .PP You do not need an account on a remote machine to send mail to a user there. .ne 9v .sp 1.5 .NH \*g .PP It is also possible to read your mail on remote machines. From the \*X machine, the command .DS % netmail \*Y .DE sends a command to the \*Y machine to take any mail you may have and mail it back to you. As a precaution, the mail on the remote machine (\*Y in this example) is appended to the file ``mbox''. Netmail has \fB\-l\fP, \fB\-p\fP, \fB\-n\fP and \fB\-f\fP options just like .I netcp. If a machine is not specified, the default machine\(dg is used. .FS \(dg (see ``Setting Defaults'' below) .FE If the .B \-q .R option is specified (like .I netcp) no message is sent back if there is no mail. .PP Netmail also takes a .B \-c .R option: .DS % netmail\ \-c\ \*Y:username .DE which turns the command into a ``mail check'' command. A message is sent back telling the user whether the specified username has mail. No password is required. As above, the .B \-q .R option suppresses the message if there is no mail. This command was designed to be put in C shell ``.login'' files. .sp 1.5 .NH \*h .PP Remote lineprinters can be used with the .I netlpr command: .DS \fBnetlpr\fR [\fB\-m\fI machine\fR] [\fB\-c\fI command\fR] \fIfile1 file2 ... filen\fR .DE which sends the files its arguments represent to the lineprinter on .I machine. It will prompt you for an account and password. The \fB\-l\fR, \fB\-p\fR, \fB\-n\fR and \fB\-f\fR options may be supplied, as in the .I netcp command. If the .B \-c .R option is specified, a different printing .I command (default is ``lpr'') can be specified; see Appendix A for the list of printers allowed. Copies of the files are not made in the remote account. .sp 1.5 .NH Net Prototype Command .PP The above commands all use internally one more general command\(emthe .I net command which has the following form: .DS .ds a \fR[\fP .ds b \fR]\fP \fBnet \*a\-m\fI machine\*b \*a\fB\-l\fI login\*b \*a\fB\-p\fI password\*b \*a\fB\-r\fI file\*b \*a\fB\-\*b \*a\-n\*b \*a\-q\*b \*a\-f\*b\fI command\fR .DE .I Net sends the given command to a remote machine. The machine may be specified either with the .B \-m .R option or in the ``.netrc'' file (for the specific names, see Appendix A). If not specified, a default is used. \fB\-l\fP, \fB\-p\fP, \fB\-n\fP, \fB\-q\fP and \fB\-f\fP are as explained above for the .I netcp command. The \fB\-r\fP option indicates the local .I file which will receive the output (the standard output and standard error files) of .I command when it is executed on the remote machine. By default this output is written or mailed to you. Thus, for example, to find out who is on the \*Y machine when you are logged in on the \*X machine, execute the following command: .DS % net \-m \*Y "who" .DE which will run the .I who command on the \*Y machine; the response will be written or mailed to you. Similarly, .DS % net \-m \*Y \-r resp "who" .DE will take the output (result) and return it to you in file `resp' on the local machine. If instead you want the result of the .I who command to remain on the \*Y machine the command .DS % net \-m \*Y "who >resp" .DE will create a file `resp' in your login directory on the \*Y machine. It is a good idea to put the command in quotes, and it .I must be in quotes if I/O redirection (<, >, or other syntax special to the shell) is used. .PP If you do not specify the remote machine explicitly (or in the ``.netrc'' file, explained below), the default machine will be used (see Appendix A). .PP The .B \- .R option indicates that standard input from the local machine is to be supplied to the command executing remotely as standard input, thus if defaults for the login name and password are set up correctly as described below, .DS % net \-m \*Y \- "mail ripper" \ \ \ \ { message to ripper } {control-d} .DE is equivalent to .DS % mail \*Y:ripper \ \ \ \ { message to ripper } {control-d} .DE .PP The net command also has other options not documented here. See the .UX Programmer's Manual sections for more details. .SH Setting Defaults .PP Instead of repeatedly typing frequently-needed options for every invocation of the various network commands, the user may supply in his login directory a file ``.netrc'', which contains the repeated information. The ``.netrc'' file is typically used to specify login names on remote machines, as well as other options. An example of such a file is given below: .DS default \*Y machine \*Y, login dracula machine \*Z login dracula, quiet yes .DE .LP This example sets the default machine to \*Y so that for net commands where a remote machine is not explicitly specified, the command will then be executed on the \*Y machine. The second and third lines indicate for the \*Y and \*Z machines a login name of ``dracula'' should be used to network commands, and to assume the ``quiet'' option on all commands destined for the \*Z machine. The complete list of options that may follow the machine indication is: .sp 1 .TS center box; cB s s s l l l l. .netrc options for each machine Option Parameter Default Comment _ \fBlogin\fP name localname login name for remote machine \fBpassword\fP password (none) password for remote login name \fBcommand\fP command (none) default command to be executed \fBwrite\fP yes/no yes if possible, write to user \fBforce\fP yes/no no always prompt for name and password \fBquiet\fP yes/no no like the \fB\-q\fR option .TE .sp 1 .PP In setting up the ``.netrc'' file, if the ``default'' option is present, it must be the first line of the file. The information for each machine starts with the word ``machine'' and the machine name and continues one or more lines up to another machine indication (or the end of the file). Input is free-format. Multiple spaces, tabs, newlines, and commas serve as separators between words. Double quotes (") must surround passwords with blanks or special characters in them. .SH How to Specify Remote Passwords .PP For the commands which require the password for the account on the remote machine, there are a number of ways to specify the password: .IP 1) letting the command ask you, as in the .I netcp example in Section 1, .IP 2) specifying it with an alias (if using the C shell), .IP 3) putting it into the current environment if the local machine is running .UX Version 7, .IP 4) specifying it on the command line with the .B \-p .R option, .IP 5) storing it in the ``.netrc'' file, described in the previous section. .PP These can be ranked in order of security, from 1 = greatest security to 5 = lowest security, from the point of view of security of passwords from unauthorized use by other users and possibly an illicit super-user. Each is described in turn: .IP 1) If you make no effort to specify the remote password elsewhere, the network commands will prompt you with: .DS Password(mach:username): .DE Type your password, followed by a carriage return. This is the most secure mode of specifying passwords. If the net command is executed in the background (i.e. with ``&'') then the command can't read the password from your terminal and one of options 2-5 below must be used. .IP 2) The alias feature of the C shell can be used to specify the remote password. The command .DS % alias\ netcp\ netcp\ \-l\ godzilla\ \-p\ $pass .DE in the ``.cshrc'' file, followed by .DS % set\ path=your-passwd .DE right before using the network will set for subsequent .I netcp commands the login name ``godzilla'' and password ``passwd''. This alias command must be given everytime you login (see the .UX Programmers Manual section for the C shell (csh (1)) for more information about .I alias. Do .I not put this alias command in your ``.login'' file. .IP 3) If running on a Version 7 .UX system, the password can be put in the current environment. The command (to the C shell) .DS % setenv\ MACH\fImch\fR\ \(ganetlogin\ \-m\ \fImch\fR\(ga .DE or (to the default Version 7 ``Bourne'' shell) .DS % MACH\fImch\fR=\(ganetlogin\ \-m\ \fImch\fR\(ga % export MACH\fImch\fR .DE will prompt you for a login name and password for the remote machine .I mch and put an encrypted copy of the password in your environment. (Note the back-quotes to the shell.) Subsequent network commands will find it in your environment and not prompt you for it. These encrypted passwords are invalidated after the user logs out. Type ``man netlogin'' for more information on the .I netlogin command. .IP 4) Each net command takes a .B \-p .R option on the command line to specify the password. These are usually put in shell command scripts. These shell script files should have file mode 0600 \- use the chmod(I) command to set the mode. .IP 5) The remote password can be specified in the user's ``.netrc'' file. If passwords are present, the ``.netrc'' file must have mode 0600 (as in #4 above). .LP The system managers recommend options 1-3 and warn against 4 and 5. Should someone break into your account on one machine, and you use option 4 or 5, you will have to change your passwords on all net machines for which your passwords have been stored in shell script files or in the ``.netrc'' file. .SH Log File .PP The file ``/usr/spool/berknet/logfile'' has a record of the most recent requests and responses, each line of which is dated. Lines indicating ``sent'' show the file name sent; lines indicating ``rcv'' show commands executed on the local machine (C: ), their return code (R: ), and their originator. For example, on the \*Y machine, the logfile: .DS .cs R 23 Feb 28 10:29: rcv \*X: neil (neil) R: 0 C: netcp design \*Y:design Feb 28 10:43: sent tuck to \*Z (z00466, 136 bytes, wait 2 min 3 sec) Feb 28 11:05: rcv \*X: bill (bill) R: 0 C: netcp structures \*Y:structures .cs R .DE shows three entries. In this example, there are two .I netcp commands sending files from the \*X machine to \*Y, each from a different user. The second command sent was originated here by ``tuck'' and is 136 bytes long; the command that was sent is not shown. The command .DS % netlog .DE will print the last few lines of this file. Its prototype is .DS \fBnetlog \-\fInum\fR .DE where .I num is an integer will print the last .I num lines from the file. .SH Acknowledgements .PP Special thanks go to Bob Fabry, Bill Joy, Vance Vaughan, Ed Gould, Robyn Allsman, Bob Kridle, Jeff Schriebman, Kirk Thege and Ricki Blau of Berkeley, and Dave Boggs of X\s-2EROX\s0 P\s-2ARC\s0 for their help in making this network possible. .bp .ce .I "Appendix A" .sp 2 .ce The Network at Berkeley .sp 2 .NH 0 The Configuration (March 1, 1980) .sp .R .TS center box; cB s s s s l l l l l. The Current State of the Berkeley \s-2UNIX\s0 Network Machine Internal Run Default Other Name Name By Machine Name(s) _ A A Computer Center C B B Computer Center D C C Computer Center A D D Computer Center C E E Computer Center C Ing70 I I\s-2NGRES\s0 Group IngVAX Ingres IngVAX J I\s-2NGRES\s0 Group Ing70 Image M Sakrison ESVAX ESVAX O EE-CE Research CSVAX SRC S Survey Res. Cent. D CSVAX V CS Research Cory Cory Y EECS Dept. CSVAX EECS40 Z EECS Dept. ESVAX .TE .sp 3i .LP If a path exists from the local machine to the requested remote machine, the network will forward the request to the correct machine. Thus Cory users may communicate with all the other machines on the network as well as C and CSVAX (with a degradation in speed because of the intermediate machine(s)). The links between Ing70\-IngVAX, Ing70\-CSVAX, A\-C, C\-D, C\-E, and B\-D run at 9600 Baud, the other links run at 1200 Baud. .NH Documentation .PP The network commands .I (net, netq, netrm, netlog, netcp, netmail, netlpr, netlogin) .R are all documented in the .UX Programmers Manual. For example, .DS L % man netq .DE will print the .I netq manual section. .PP There are two more documents available: .DS Network System Manual Berkeley Network Retrospective .DE The Manual is intended for the systems staff who will maintain the network. The Retrospective is my Master's report and details the history of the project, discusses the design, and lists future plans. .PP There is an up-to-date news file: .DS L % news net or % help net or % cat /usr/net/news {if those fail} .DE which prints news about the network, dated and with the most recent news first. .PP The .UX Programmer's Manual, section I, has information on the .I chmod, cp, mail, who, .R and .I write commands mentioned in the text. Also, the .I help command has information about file protections: .DS L % news access {on the Cory machine} or % help permissions {on the CC machines} .DE .NH Features at Berkeley .IP a) There is a built-in character limit of 100,000 characters per single transmission, which cannot be overridden. The limit is 500,000 characters between the I\s-2NGRES\s0 machines. Longer files must be split into smaller ones in order to be sent. .IP b) The 1200 Baud links between machines seldom transmit any faster than 50 characters per second (for 9600 Baud links, 350 characters a second), and can slow to a fraction of that in peak system loading periods. This is due to an expansion of the data packets to accomodate a seven-bit data path, wakeup time on the machines, and the packet sent in acknowledgement. Heavy file transfer is faster by magnetic tape. .IP c) On the CSVAX, IngVAX, and ESVAX the net commands are all in `/usr/ucb'. Your search path on these VAX's should be set to include the directory `/usr/ucb'; otherwise you will have to prefix all net commands by `/usr/ucb', as in `/usr/ucb/netcp'. .IP d) Limited Free Commands .RS .PP Users who do not have accounts on remote machines may still execute certain commands by giving a remote login name of ``network'', and no remote password. The commands currently allowed are: .KS .TS l l l l l. bpq netlog rcs vpq whom epq netq rcslog w write finger ps rcsq where yank lpq pstat trq who .TE .KE .LP The .I lpr command is allowed on the I\s-2NGRES\s0 machine. Also, .I mail to remote machines and .I netlpr between Computer Center machines do not require a remote account. The EECS40 machine allows no free commands (but allows the sending of mail). .PP .LP For example, to execute an .I lpq command on the A machine, the user would type: .DS % net\ \-l\ network\ \-m\ A\ ``who'' .DE .RE .IP e) If no machine name specification is in the front of a full path name, the first four characters are checked and the machine is inferred from that if possible. In the command .DS % netcp file1 /ca/schmidt/file1 .DE the second file name is equivalent to ``C:file1'', if you are ``schmidt'' on the C machine. .IP f) The network can only send files in one direction at a time. Thus confirmations can slow down heavy file transfer. If you regularly use a shell script to transfer a set of files, the .B \-q .R option to .I netcp will improve transfer time. .IP g) The network creates a heavy load on the system and thus is expensive to run. If general user throughput is adversely affected, a charge will be implemented on the Computer Center machines. .IP h) When transferring files, quota overflow will result in a partial copy, so you should check the space requirements of the file being sent. .IP i) The Computer Center ``A'' machine's phototypesetter is usable from other network machines. If on one of the B-E machines, you do not need an account on the A machine. You simply type .DS % troff\ \-Q\ other-options\ file(s) .DE instead of the normal .DS % troff\ other-options\ file(s) .DE The troff command is executed on the local machine and the phototypesetter instructions are sent to the A machine. You will be sent mail both when the file is queued and when it is finally typeset. To see your place in the .I troff queue, type: .DS % trq .DE on any Computer Center machine. There is a command .DS % trrm\ code .DE (where .I code is the code from the .I trq command) to remove queue files before they have been typeset. .I Trrm must be executed on the same machine from which the job was submitted. .RS .PP If you are on a non-Computer Center machine, you may use the .I nettroff command: .DS % nettroff\ options\ file(s) .DE which is similar to the ``troff \-Q'' command earlier. You will need an account on the A machine and the .I trrm command doesn't work from a non-Computer Center machine. .PP If using .I nettroff, no more than 15 pages may be sent to the typesetter. If using .I troff more than 15 pages may be sent only if the .B \-s .R option is specified (see troff(1) for more information). The network will not transfer any file longer than 100,000 characters to the A machine. (It is best to aim for files of 25,000 characters or less)\(dg. .FS \(dg Characters from .I troff\fR's output, not the user's source files. It is our general experience that .I troff outputs roughly twice as many characters as are in the source file (before any .I eqn or .I tbl preprocessing.) .FE For more information, type .DS L man troff {on the Computer Center machines} or man nettroff {on the other machines} .DE The .I nettroff command is not supported by the Computer Center. .RE .IP j) The .I netlpr command allows ``epr'', ``bpr'', and ``vpr'' as alternate lineprinters (using the \fB\-c\fP option). .NH Bugs in systems at Berkeley (As of March 1, 1980) .IP a) If you are on the Computer Center machines using obsolete shells (/usr/pascal/sh, /usr/pascal/nsh) and have a ``.profile'' or ``.shrc'' file to change your shell prompt, you must make sure that you don't turn on ``prompting'' for non-interactive shells. This will interfere with the net commands. You should use this shell command to change your prompt: .DS ${prompt?prompt=P} .DE where ``P'' is the prompt desired. This will avoid the problem. .IP If you set the variable .I time in the C shell, extraneous time stamps may appear in response messages. The correct way to set the variable .I time in the C shell is .DS if ($?prompt) then set time=\fInum\fP endif .DE where .I num is the time interval in seconds. .IP b) The file mode should be preserved by .I netcp and it should be possible to default the second file name to a directory as in cp(I). .IP c) Various response messages are lost. This includes ``fetching'' files when the file being retrieved never arrives. I suspect this has something to do with unreliable delivery of error messages, but this is not reliably reproducible. .IP d) The network makes no provision for errors in transit on intermediate machines, such as ``No more processes'' or ``File System Overflow''. While these occur only rarely, when they do, no message or notification is sent to anyone. .IP e) The network commands are too slow on heavily-loaded instructional machines. The .I net command has to read the password file, ``.netrc'' file and the ``/var/run/utmp'' file. .IP f) The queue files are normally sent shortest-job first. Unfortunately, under heavy loading the queue-search becomes too expensive and the network will choose the next file to send from the first 35 queue entries it finds in the queue directory, so the user should not depend on the requests being sent shortest-first. .IP g) Comments and bug discoveries are encouraged and can be sent by local or remote mail to ``csvax:schmidt''. .bp .ce .I "Appendix B" .sp 2 .ce Getting Started \(em An Example .sp .LP The best way to start out is to follow this example. Suppose you're a Cory user, and you have accounts on the A and CSVAX machines. .IP 1) Add a file ``.netrc'' (mode 600) to your login directory, as in the following example: .DS L default CSVAX machine A login \fIyourNameOnA\fP machine CSVAX login \fIyourNameOnCSVax\fP .DE (If ``default'' occurs, it must be the first line of the file.) .IP 2) Make sure that .RS .IP a) if you are on one of the VAX's, you have in your search path the directory `/usr/ucb'. Otherwise, on those machines you will have to prefix all commands by `/usr/ucb/' (e.g. `/usr/ucb/netcp'). .IP b) on the Computer Center machines, if you choose to set your shell prompt, you have done so correctly (details in Appendix A). .RE .IP 3) Then type .DS L % net\ ``who'' % netq .DE which will send a .I w command to the CSVAX; some undetermined time later you will have written (or mailed) to you the output from the command executed on the CSVAX machine. .IP The adventuresome may try: .DS L % net\ \-m\ A\ ``who'' .DE with the effect of being routed more slowly through an intermediate link in the net.