BSD 3 development
[unix-history] / .ref-BSD-2 / doc / net / netintro.n
CommitLineData
6e2776b2
ES
1.ds X X
2.ds Y Y
3.ds Z Z
4.TL
5An Introduction to the Berkeley Network
6.AU
7Eric Schmidt
8.AI
9Computer Science Division
10Department of Electrical Engineering and Computer Science
11University of California, Berkeley
12Berkeley, California 94720
13.AB
14This document describes the use of a network
15between a number of
16.UX
17machines on the Berkeley campus.
18This network can execute commands on other machines,
19including file transfers, sending and receiving mail,
20remote printing, and shell-scripts.
21.PP
22The network operates in a batch-request mode.
23Network requests are queued up at the source and sent in shortest-first
24order to the destination machine.
25To do this, the requests are forwarded through a network
26of inter-connected machines until they arrive at their destination
27where they are executed.
28The time this requires depends on system load, inter-machine transfer speed,
29and quantity of data being sent.
30.PP
31The network enforces normal
32.UX
33security and
34demands a remote account with a password for most commands.
35Information can be returned to the user in files, for later
36processing, or on the terminal for immediate viewing.
37.AE
38.SH
39Introduction
40.PP
41A network between a number of
42.UX
43machines
44on the Berkeley campus has been implemented.
45This document is a brief introduction to the use of this network.
46Information which is specific to the local network has been
47gathered into Appendix A.
48The new user should read both this introduction and Appendix A in order
49to learn to use the network effectively.
50.PP
51This document is subdivided into the following sections:
52.DS
53Introduction
54Use of the Network
55 1) Network File Copy
56 2) Net Queue List
57 3) Net Queue Removal
58 4) Sending Network Mail
59 5) Reading Network Mail
60 6) Network Lineprinting
61 7) Net Prototype Command
62Setting Up Defaults
63The Log File
64Acknowledgements
65Appendix A: The Network at Berkeley
66Appendix B: Getting Started \(em An Example
67.DE
68.PP
69This manual is written in terms of three mythical machines,
70named \*X, \*Y, and \*Z.
71Specific names at Berkeley are in Appendix A,
72along with more local information.
73.SH
74Use of the Network
75.PP
76The network provides facilities for issuing a command on one
77machine (the
78.I local
79machine) which is to be executed on another (the
80.I remote
81machine).
82Network commands are available to transfer files from one machine
83to another, to send mail to a user on a remote machine,
84to retrieve one's mail from a remote account,
85or to print a file on a remote lineprinter.
86These commands are described below, as is the more general
87.I net
88command which allows users to specify the name of some command
89or shell script to be executed on a remote machine.
90Network requests are queued up on the local machine and sent to the remote
91machine, forwarded through intermediate machines if necessary.
92.PP
93Most of the network commands require that you have an account on
94the remote machine.
95If a remote account is not needed for a particular command,
96it will be noted in the following discussion.
97The first example introduces procedures and responses which are applicable
98to all network commands.
99.sp 1.5
100.NH
101Network File Copy
102.PP
103Suppose that you have accounts on both the \*X and \*Y machines and that you are
104presently logged into the \*X machine.
105If you want to copy a file named `file1' from your current
106directory on machine \*X to machine \*Y (the
107.I remote
108machine), use the command:
109.DS
110% netcp file1 \*Y:file1
111.DE
112The net will make a copy of `file1' in your login directory
113on the \*Y machine.
114(The `\*Y:' will not be part of the filename on the \*Y machine.)
115In order to verify your permission to write into the \*Y account, the
116.I netcp
117command will prompt you with:
118.DS
119Name (your-name):
120.DE
121You should respond with your login name on the Y machine,
122followed by a carriage-return.
123If you have the same login name on both machines, just type a carriage-return.
124Next a password will be requested:
125.DS
126Password (remote-name):
127.DE
128Now type in your password followed by a carriage-return.
129The
130.I netcp
131command will make a copy of your `file1' in a queue destined
132for the \*Y machine, and will then return.
133.PP
134Likewise if you wanted to transfer a file named `scan.p' from \*Y to \*X,
135.DS
136% netcp \*Y:scan.p scan.p
137.DE
138would place that file in your current directory on \*X.
139.PP
140The network will ``write'' you when it has executed
141your request (if you are still logged in),
142or will ``mail'' you a message (if you are not).
143You may use the
144.I mesg
145(I) command to disallow the interruption and thus force mail to be sent.
146A typical message might look like this:
147.DS
148Message from your-name on \*Y Machine
149(command: netcp file1 \*Y:file1, sent April 1 18:03, took 10 min 3 sec)
150-------
151.DE
152The message includes the time you sent the command on machine \*X.
153.PP
154The network response will tell you if it was unable to execute the
155remote command successfully by returning an error message some time later.
156If, for example, you type the wrong password, you will get the response
157.DS
158Message from your-name on \*Y Machine
159Error: Cmd: netcp file1 \*Y:file1 Message: bad login/password your-name
160------
161.DE
162.PP
163The
164.I netcp
165command is actually a generalization of the
166.UX
167.I cp
168command, similar to
169.I uucp\fP\(dg.
170.FS
171\(dg See the
172.UX
173Programmers Manual (Version 7 only).
174.FE
175Its syntax is:
176.DS
177\fBnetcp\fR [\fB\-l\fI login\fR] [\fB\-p\fI password\fR] [\fB\-n\fR] [\fB\-f\fI] fromfile tofile\fR
178.DE
179where
180.I fromfile
181and
182.I tofile
183can be local or remote files
184(if both are remote, they must be on the same machine).
185A filename which is not a full pathname
186is either from the current directory on the local machine
187or your login directory on the remote machine.
188The
189.B
190\-l
191.R
192and
193.B
194\-p
195.R
196options may be used to specify your remote login name and password
197on the command line.
198If the password contains shell meta-characters, it must be in quotes.
199(These options are useful in shell scripts,
200but be sure to make the shell script readable only
201by yourself if you've got passwords in it!)
202The
203.B
204\-n
205.R
206option prevents any confirmation or error messages from being returned.
207The
208.B
209\-f
210.R
211option forces prompting for a remote user name and password,
212even if they are set by other options or are in the ``.netrc'' file
213(see ``Setting Defaults'' below).
214.PP
215Transferred files may or may not have the correct file protection mode;
216use the
217.I chmod
218(I) command to reset it.
219When files are to be brought from a remote machine,
220they are created zero-length at the time the command is issued;
221when they arrive, they assume their true length.
222.LP
223Examples:
224.RS
225.TS
226l l.
227% netcp\ \ file1\ \ \*Y:file1 copy `file1' from the current directory to \*Y
228% netcp\ \ \*Y:file1\ \ file1 copy `file1' from \*Y to the current directory
229% netcp\ \ \*Z:file1\ \ \*Z:file2 \fIcp\fP command on remote machine
230% netcp\ \ \*X:lex.c\ \ \*Y:lex.c copy from \*X to \*Y (one of \*X or \*Y must be local)
231% netcp\ \ \*Y:subdir/file1\ \ file1 copy from a sub-directory
232% netcp\ \ file1\ \ file2 an error\(em use the \fIcp\fP command
233.TE
234.RE
235.sp 1.5
236.NH
237Net Queue List
238.PP
239To see where your command is in the queue, type
240.DS
241% netq
242.DE
243a typical output of which looks like:
244.DS L
245.cs R 23
246 LocalName(Remote) Mach Length Code Time Command
247yourname(yourname) \*Y 100 b99999 Mar 23 18:05 netcp file1 \*Y:file1
248.cs R
249.DE
250The format is similar to that of the
251.I lpq
252command.
253The files are sent one at a time, in the order listed.
254If
255.I netq
256tells you the queue is empty, your request has been sent already.
257The queues for different destinations are totally separate.
258.DS
259% netq \*Y
260.DE
261will list just the queue destined for the \*Y machine.
262.I Netq
263summarizes requests from other users.
264The command
265.DS
266% netq \-a
267.DE
268will print the requests from all users.
269.sp 1.5
270.NH
271Net Queue Removal
272.PP
273If you want to cancel your net request, and ``b99999''
274(see the
275.I netq
276example above) is your ``Code,'' use the command
277.DS
278% netrm b99999
279.DE
280which will remove the request (if it hasn't already been sent).
281Furthermore,
282.DS
283% netrm \-
284.DE
285will remove all your net requests in the queues on the local machine
286(you must have made the request in order to remove it).
287.sp 1.5
288.NH
289Sending Network Mail
290.PP
291To send mail to remote machines, use the
292.I mail
293command with the remote account prefixed by the destination machine's
294name and a `:'.
295``\*Y:schmidt'', for example, refers to an account ``schmidt'' on the \*Y machine.
296The full sequence is illustrated below:
297.DS
298% mail \*Y:schmidt
299\ \ \ \ {your message to user ``schmidt'' }
300{control-d}
301.DE
302This will send to user ``schmidt'' on the \*Y machine the text you type in.
303As with intra-machine mail, the message is terminated by a control-d.
304.PP
305You do not need an account on a remote machine to send mail to a user there.
306.ne 9v
307.sp 1.5
308.NH
309Reading Network Mail
310.PP
311It is also possible to read your mail on remote machines.
312From the \*X machine, the command
313.DS
314% netmail \*Y
315.DE
316copies your mail on the \*Y machine to a file ``mbox.\*Y''
317in your login directory on the \*X machine.
318The previous contents of ``mbox.\*Y'' are lost.
319Readmail has
320\fB\-l\fP, \fB\-p\fP, \fB\-n\fP and \fB\-f\fP options just like
321.I netcp.
322If a machine is not specified, the default machine\(dg is used.
323.FS
324\(dg (see ``Setting Defaults'' below)
325.FE
326When you login on the remote machine, the mail will still be there,
327as if it was never read.
328.sp 1.5
329.NH
330Network Lineprinting
331.PP
332Remote lineprinters can be used with the
333.I netlpr
334command:
335.DS
336\fBnetlpr\fR [\fB\-m\fI machine\fR] \fIfile1 file2 ... filen\fR
337.DE
338which sends the files its arguments represent to the lineprinter on
339.I machine.
340It will prompt you for an account and password.
341The \fB\-l\fR, \fB\-p\fR, \fB\-n\fR and \fB\-f\fR options may be supplied,
342as in the
343.I netcp
344command.
345Copies of the files are not made in the remote account.
346.sp 1.5
347.NH
348Net Prototype Command
349.PP
350The above commands all use one more general command\(emthe
351.I net
352command which has the following form:
353.DS
354.ds a \fR[\fP
355.ds b \fR]\fP
356\fBnet \*a\-m\fI machine\*b \*a\fB\-l\fI login\*b \*a\fB\-p\fI password\*b \*a\fB\-r\fI file\*b \*a\fB\-\*b \*a\-n\*b \*a\-f\*b\fI command\fR
357.DE
358.I Net
359sends the given command to a remote machine.
360The machine may be specified either with the
361.B
362\-m
363.R
364option or in the ``.netrc'' file
365(for the specific names, see Appendix A).
366If not specified, a default is used.
367\fB\-l\fP, \fB\-p\fP, \fB\-n\fP and \fB\-f\fP are as explained above for the
368.I netcp
369command.
370The \fB\-r\fP option indicates the local
371.I file
372which will receive the output (the standard output and standard error files) of
373.I command
374when it is executed on the remote machine.
375By default this output is written or mailed to you.
376Thus, for example, to find out who is on the \*Y machine when you are
377logged in on the \*X machine,
378execute the following command:
379.DS
380% net \-m \*Y "who"
381.DE
382which will run the
383.I who
384command on the \*Y machine;
385the response will be written or mailed to you.
386Similarly,
387.DS
388% net \-m \*Y \-r resp "who"
389.DE
390will take the output (result)
391and return it to you in file `resp' on the local machine.
392If instead you want the result of the
393.I who
394command to remain on the \*Y machine the command
395.DS
396% net \-m \*Y "who >resp"
397.DE
398will create a file `resp' in your login directory on the \*Y machine.
399It is a good idea to put the command in quotes, and it
400.I must
401be in quotes if I/O redirection (<, >, etc.) is used.
402.PP
403If you do not specify the remote machine explicitly (or in the ``.netrc''
404file, explained below), the default machine will be used (see Appendix A).
405.PP
406The
407.B
408\-
409.R
410option indicates that standard input from the
411local machine is to be supplied to the command executing remotely
412as standard input, thus
413.DS
414% net \-m \*Y \- "mail ripper"
415\ \ \ \ { message to ripper }
416{control-d}
417.DE
418is equivalent to
419.DS
420% mail \*Y:ripper
421\ \ \ \ { message to ripper }
422{control-d}
423.DE
424.PP
425The net command also has other options not documented here.
426See the
427.UX
428Programmer's Manual sections for more details.
429.SH
430Setting Defaults
431.PP
432Instead of repeatedly typing frequently-needed options
433for every invocation of the various network commands, the user may supply
434in his login directory a file ``.netrc'', which contains the repeated
435information.
436The ``.netrc'' file is typically used to specify login names
437on remote machines, as well as other options.
438An example of such a file is given below:
439.DS
440default \*Y
441machine \*Y, login dracula
442machine \*Z login dracula
443.DE
444.LP
445This example sets the default machine to \*Y
446so that for net commands where a remote machine is not explicitly specified
447the command will the executed on the \*Y machine.
448The second and third lines indicate
449for the \*Y and \*Z machines a login name of ``dracula''
450should be used to network commands.
451The complete list of options is:
452.sp 1
453.TS
454center box;
455cB s s s
456l l l l.
457 .netrc Options
458Option Parameter Default Comment
459_
460\fBdefault\fP mach. name See App. A provides default remote machine
461\fBlogin\fP name localname login name for remote machine
462\fBpassword\fP password (none) password for remote login name
463\fBcommand\fP command (none) default command to be executed
464\fBwrite\fP yes/no yes if possible, write to user
465\fBforce\fP yes/no no always prompt for name and password
466.TE
467.sp 1
468.PP
469In setting up the ``.netrc'' file, if the ``default'' option is present,
470it must be the first line of the file.
471Input is free-format.
472Multiple spaces, tabs, newlines, and commas
473serve as separators between words.
474The information for each machine starts with the word
475``machine'' and the machine name and continues
476one or more lines up to another machine indication
477(or the end of the file).
478Double quotes (") must surround passwords with blanks or special
479characters in them.
480.PP
481If your ``.netrc'' file has a password in it, the file should be set
482mode 0600 with the
483.I chmod
484(I) command to prevent other people from reading it.
485The system managers do not recommend putting the passwords
486in the ``.netrc'' file
487or in shell-scripts with the \fB\-p\fP option (even with mode 0600)
488as an illicit super-user could read your ``.netrc'' file
489and gain direct access to all your remote accounts.
490If you put a remote password in a file, you must be prepared to change
491.I ALL
492your passwords if a security breach occurs on any net machine.
493The surest way to prevent this inconvenience is to not put your
494remote passwords in a file at all!
495.SH
496Log File
497.PP
498The file ``/usr/net/logfile'' has a trace of the most recent
499requests and responses, each line of which is dated.
500Lines indicating ``send'' show the file name sent;
501lines indicating ``rcv'' show commands executed on the local machine (C: ),
502their return code (R: ), and their originator.
503For example, on the \*Y machine, the logfile:
504.DS
505.cs R 23
506Feb 28 10:29: rcv \*X: neil (neil) R: 0 C: netcp design \*Y:design
507Feb 28 10:43: sent to \*Z: tuck (z00466, 136 bytes, wait 2 min 3 sec)
508Feb 28 11:05: rcv \*X: bill (bill) R: 0 C: netcp structures \*Y:structures
509.cs R
510.DE
511shows three entries.
512In this example, there are two
513.I netcp
514commands sending files from the \*X machine to \*Y, each from a different user.
515The single command sent was originated here by ``tuck'' and is 136 bytes long;
516the command that was sent is not listed.
517The command
518.DS
519% netlog
520.DE
521will print the last few lines of this file.
522Its prototype is
523.DS
524\fBnetlog \-\fInum\fR
525.DE
526where
527.I num
528is an integer will print the last
529.I num
530lines from the file.
531.SH
532Acknowledgements
533.PP
534Special thanks go to
535Bob Fabry, Bill Joy, Vance Vaughan, Ed Gould, Robyn Allsman,
536Bob Kridle, Jeff Schriebman and Ricki Blau of Berkeley,
537and Dave Boggs of X\s-2EROX\s0 P\s-2ARC\s0
538for their help in making this network possible.
539.bp
540.ce
541.I "Appendix A"
542.sp 2
543.ce
544The Network at Berkeley
545.sp 2
546.NH 0
547The Configuration (April 1, 1979)
548.sp
549.R
550.TS
551center box;
552cB s s s
553l l l l l.
554 The Current State of the Berkeley \s-2UNIX\s0 Network
555Machine Internal Connected Baud Default
556Name Name To Rate Machine
557_
558A A C 1200 C
559C C A, D, E, Cory 1200 A
560D D C, SRC 1200 C
561E E C 1200 C
562SRC S D 1200 D
563VAX V Cory 1200 Cory
564Cory Y C, VAX 1200 VAX
565.TE
566.de bo \" a few box macros
567.sp -1
568\L'\\$1v'\
569\l'\\$2n\(ul'\
570\L'-\\$1v'\
571\l'-\\$2n\(ul'
572..
573.de zt \"generate up to 4 lines of centered text.
574.ll \\$2n+\\n(.iu \"$2 is width of field in n's
575.sp \\$1 \"$3,$4,$5,$6 are text lines
576.ce 4 \"$1 is prespace amount in V's
577\\$3
578\\$4
579\\$5
580\\$6
581.ce 0
582.ll
583.sp -4-\\$1
584..
585.KS
586.LP
587.nf
588.sp
589.nr v 4 \" vertical dimesion of box (in v's)
590.nr h 14 \" horizontal dimenstion of box (in n's)
591.in (\n(.lu/2u)-10n
592.bo \nv \nh
593.zt 1.5 \nh A
594.in +7n
595.in -\w'|'u/2u
596.sp +3v
597\L'4v'
598.sp +4v
599.in +\w'|'u/2u
600.in -35n
601.bo \nv \nh
602.zt 1.5 \nh Cory
603.in +14n
604.sp +1
605\l'14n\(ul'
606.in +14n
607.sp -2
608.bo \nv \nh
609.zt 1.5 \nh C
610.in +14n
611.sp +1
612\l'14n\(ul'
613.in +14n
614.sp -2v
615.bo \nv \nh
616.zt 1.5 \nh D
617.in -56n \" back to start on left, draw boxes
618.sp +8v
619.bo \nv \nh
620.zt 1.5 \nh VAX
621.in +28n
622.bo \nv \nh
623.zt 1.5 \nh E
624.in +28n
625.bo \nv \nh
626.zt 1.5 \nh SRC
627.sp -8v
628.in -56n \" back to start on left, draw vert lines
629.in +7n \" next vert Cory-VAX
630.in -\w'|'u/2u
631.sp +3
632\L'4v'
633.sp +4
634.in +\w'|'u/2u
635.in -7n
636.sp -8v
637.in +28n \" next vert C-E
638.in +7n
639.in -\w'|'u/2u
640.sp +3
641\L'4v'
642.sp +4
643.in +\w'|'u/2u
644.in -7n
645.sp -8v
646.in +28n \" next vert C-SRC
647.in +7n
648.in -\w'|'u/2u
649.sp +3
650\L'4v'
651.sp +4
652.in +\w'|'u/2u
653.sp 5
654.in 0
655.fi
656.KE
657.LP
658If a path exists from the local machine to the requested remote
659machine, the network will forward the request to the correct machine.
660Thus Cory users may communicate with A, D and E,
661as well as C and VAX (with a degradation in speed
662because of the intermediate machine).
663.NH
664Documentation
665.PP
666The network commands
667.I
668(net, netq, netrm, netlog, netcp, netmail, netlpr)
669.R
670are all documented in the
671.UX
672Programmers Manual
673under NEW on the Cory and VAX, and under NET on the Computer Center
674machines.
675For example,
676.DS L
677 % man new netq {on Cory or VAX}
678or
679 % man \-net netq {on CC machines}
680.DE
681will print the
682.I netq
683manual section.
684.PP
685There are two more documents available:
686.DS
687Network System Manual
688System Description \- Berkeley Net
689.DE
690The Manual is intended for the systems staff who will maintain the network.
691The Description details
692the history of the project, discusses the design, and list future plans.
693.PP
694There is an up-to-date news file:
695.DS L
696 % news net {on Cory and VAX machines}
697or
698 % help net {on CC machines}
699.DE
700which prints news about the network, dated and with the most recent news first.
701.PP
702The
703.UX
704Programmer's Manual, section I, has information on the
705.I
706chmod, cp, mail, mesg, who, and write
707.R
708commands mentioned in the text.
709Also, the
710.I help
711command has information about file protections:
712.DS L
713 % news access {on the Cory machine}
714or
715 % help permissions {on the CC machines}
716.DE
717.NH
718Features at Berkeley
719.IP a)
720There is a built-in character limit
721of 100,000 characters per single transmission, which cannot be overridden.
722Longer files must be split into smaller ones in order to be sent.
723.IP b)
724The 1200 Baud links (over which the network sends requests) seldom transmit
725any faster than 50 characters per second,
726and can slow to a fraction of that in peak system loading periods.
727This is due to an expansion of
728the data packets to accomodate a seven-bit data path,
729wakeup time on the machines, and the packet sent in acknowledgement.
730Heavy file transfer is faster by magnetic tape.
731.IP c)
732On the VAX the net commands are all in `/usr/new'.
733Your search path on the VAX should be set to include the directory `/usr/new';
734otherwise you will have to prefix all net commands by `/usr/new',
735as in `/usr/new/netcp'.
736.IP d)
737Limited Free Commands
738.RS
739.PP
740Users who do not have accounts on remote machines may still execute
741certain commands by giving a remote login name of ``network'',
742and no remote password.
743The commands currently allowed are:
744.KS
745.TS
746l l l l.
747finger pstat trq whom
748lpq rcs w write
749netq rcsq where yank
750ps rcslog who
751.TE
752.KE
753.LP
754Also,
755.I mail
756to remote machines and
757.I netlpr
758between Computer Center machines do not require a remote account.
759.RE
760.IP e)
761If no machine name specification is in the front of a full path name,
762the first four characters are checked and the machine
763is inferred from that if possible.
764In the command
765.DS
766netcp file1 /ca/schmidt/file1
767.DE
768the second file name is equivalent to ``C:file1'', if you are ``schmidt''
769on the C machine.
770.IP f)
771There is a file ``VAX:/usr/net/net.users'' of users who
772will get mail specifically about the network.
773If you would like to be on it, send mail to ``VAX:schmidt''.
774.IP g)
775The network creates a heavy load on the system and thus is expensive to
776run. If general user throughput is adversely affected, a charge will be
777implemented on the Computer Center machines.
778.IP h)
779When transferring files, quota overflow will result in a partial copy,
780so you should check the space requirements of the file being sent.
781.NH
782Bugs in systems at Berkeley (As of April 1, 1979)
783.IP a)
784On the Computer Center machines,
785if the ``mail'' command prints an error message such as ``Can't send to ...'',
786try using the ``sendmail'' command in place of ``mail'' with the
787same arguments.
788.IP b)
789The C shell on the Computer Center machines has a bug where background
790C shell scripts can't find home directories, and thus do not read
791the ``.netrc'' file.
792.IP c)
793On the Computer Center machines,
794if you change your shell prompt,
795obsolete shells may print the prompt incorrectly,
796interfering with
797.I netcp.
798In the Pascal shell (/usr/pascal/sh):
799.DS
800${prompt?prompt=P}
801.DE
802for example, is the correct way to to set a shell prompt to ``P''.
803In the C shell (/bin/csh), it is
804.DS
805if $?prompt then
806 set prompt=P
807 endif
808.DE
809.IP d)
810On the Computer Center machines, you may not
811.I netrm
812net queue files created by
813.I netlpr
814or the remote versions of
815.I troff
816and
817.I trrm.
818.IP e)
819The file mode should be preserved by
820.I netcp.
821.IP f)
822Comments and bug discoveries are encouraged and can be sent by
823local or remote mail to ``schmidt'' on the VAX machine.
824.bp
825.ce
826.I "Appendix B"
827.sp 2
828.ce
829Getting Started \(em An Example
830.sp
831.LP
832The best way to start out is to follow this example.
833Suppose you're a Cory user, and you have accounts on the A and VAX machines.
834.IP 1)
835Add a file ``.netrc'' (mode 600) to your login directory, as in
836the following example:
837.DS L
838default VAX
839machine A login \fIyourNameOnA\fP
840machine VAX login \fIyourNameOnVax\fP
841.DE
842(If ``default'' occurs, it must be the first line of the file.)
843.IP 2)
844Make sure that
845.RS
846.IP a)
847if you are on the VAX, you have in your search path the directory `/usr/new'.
848Otherwise, on the VAX you will have to prefix all commands by `/usr/new/'
849(e.g. `/usr/new/netcp').
850.IP b)
851on the Computer Center machines, if you choose to set your shell prompt,
852you have done so correctly (details in Appendix A).
853.RE
854.IP 3)
855Then type
856.DS L
857% net w
858% netq
859.DE
860which will send a
861.I w
862command to the VAX;
863some undetermined time later you will
864have written (or mailed) to you the output from the command
865executed on the VAX machine.
866.IP
867The adventuresome may try:
868.DS L
869% net \-m A w
870.DE
871with the effect of being routed more slowly through an intermediate link in the
872net.