AIX 5L System User's Guide Communications and Network
Total Page:16
File Type:pdf, Size:1020Kb
Bull AIX 5L System User’s Guide Communications and Network AIX ORDER REFERENCE 86 A2 25EF 02 Bull AIX 5L System User’s Guide Communications and Network AIX Software October 2002 BULL CEDOC 357 AVENUE PATTON B.P.20845 49008 ANGERS CEDEX 01 FRANCE ORDER REFERENCE 86 A2 25EF 02 The following copyright notice protects this book under the Copyright laws of the United States of America and other countries which prohibit such actions as, but not limited to, copying, distributing, modifying, and making derivative works. Copyright Bull S.A. 1992, 2002 Printed in France Suggestions and criticisms concerning the form, content, and presentation of this book are invited. A form is provided at the end of this book for this purpose. To order additional copies of this book or other Bull Technical Publications, you are invited to use the Ordering Form also provided at the end of this book. Trademarks and Acknowledgements We acknowledge the right of proprietors of trademarks mentioned in this book. AIXR is a registered trademark of International Business Machines Corporation, and is being used under licence. UNIX is a registered trademark in the United States of America and other countries licensed exclusively through the Open Group. The information in this document is subject to change without notice. Groupe Bull will not be liable for errors contained herein, or for incidental or consequential damages in connection with the use of this material. About This Book This book describes the following communications applications: Mail, Message Handler (MH), Transmission Control Protocol/Internet Protocol (TCP/IP), Basic Networking Utilities (BNU), and Asynchronous Terminal Emulation (ATE). It provides overviews, concepts, and procedures on receiving and sending mail and messages, transferring files (ftp command), printing files from and to a remote system, running commands on other systems, communicating between local and remote systems, and customizing the communications environment. Who Should Use This Book This book is intended for end users who need information on communications applications and services for the operating system. Highlighting The following highlighting conventions are used in this book: Bold Identifies commands, subroutines, keywords, files, structures, directories, and other items whose names are predefined by the system. Also identifies graphical objects such as buttons, labels, and icons that the user selects. Italics Identifies parameters whose actual names or values are to be supplied by the user. Monospace Identifies examples of specific data values, examples of text similar to what you might see displayed, examples of portions of program code similar to what you might write as a programmer, messages from the system, or information you should actually type. Case–Sensitivity in AIX Everything in the AIX operating system is case–sensitive, which means that it distinguishes between uppercase and lowercase letters. For example, you can use the ls command to list files. If you type LS, the system responds that the command is ”not found.” Likewise, FILEA, FiLea, and filea are three distinct file names, even if they reside in the same directory. To avoid causing undesirable actions to be performed, always ensure that you use the correct case. ISO 9000 ISO 9000 registered quality systems were used in the development and manufacturing of this product. About this Book i Related Publications The following books contain related information: • AIX 5L Version 5.2 System User’s Guide: Operating System and Devices • AIX 5L Version 5.2 System Management Guide: Communications and Networks ii System User’s Guide: Communications and Networks Table of Contents About This Book . i Who Should Use This Book . i Highlighting . i Case–Sensitivity in AIX . i ISO 9000 . i Related Publications . ii Chapter 1. Introduction to Communication Concepts . 1-1 Mail Applications . 1-2 mail . 1-2 mh . 1-2 bellmail . 1-3 Networking Applications . 1-5 Network Introduction . 1-5 System Hardware and Software Communication Support for End Users . 1-5 User and Application Communications Functions . 1-5 Communicating with Other Operating Systems . 1-6 Host Emulation Applications . 1-7 Emulators Introduction . 1-7 TCP/IP Commands for Emulation . 1-7 BNU Commands for Emulation . 1-7 Asynchronous Terminal Emulation (ATE) . 1-8 Communications System Commands . 1-9 Displaying Your Login Name . 1-9 Displaying Your System Name . 1-9 Determining Whether Your System Has Access . 1-9 Displaying Information about Logged–In Users . 1-10 Chapter 2. Mail Overview . 2-1 Storing Mail . 2-2 System Mailbox . 2-2 Default Personal Mailbox . 2-2 dead.letter File . 2-2 Folders . 2-2 Receiving and Handling Mail . 2-3 Starting the Mail Program . 2-3 Displaying the Contents of Your Mailbox . 2-4 Reading Mail . 2-6 Deleting Mail . 2-7 Exiting Mail . 2-8 Organizing Mail . 2-8 Viewing Mail Help Information . 2-12 Getting Mail Help Information in the Mail Program . 2-12 Getting Mail Help Information by Using Manual Pages . 2-12 Creating and Sending Mail . 2-13 Addressing Mail . 2-13 Starting the Mail Editor . 2-17 Editing a Message . 2-18 Displaying a Message While in the Mail Editor . 2-19 About this Book iii Exiting the Mail Editor without Sending the Message . 2-19 Adding a File and a Specific Message within a Message . 2-20 Changing or Adding to the Heading Fields of a Message . 2-21 Reformatting a Message in the Mail Editor . 2-23 Checking for Misspelling in the Mail Editor . 2-23 Sending Mail . 2-24 Replying to Mail . 2-25 Forwarding Mail . 2-26 Sending a Vacation Message Notice . 2-27 Sending and Receiving Secret Mail . 2-28 Customizing the Mail Program . 2-29 Enabling and Disabling Mail Options . 2-30 Changing the Prompt for the Subject and Carbon Copy (Cc:) Fields . 2-31 Creating an Alias or Distribution List . 2-31 Changing the Number of Message Headers or Message Text Lines Displayed in the Mail Program . ..