throbber
Introduction to the
`Internet for Engineers
`
`RAYMOND GREENLAW
`Armstrong Atlantic State University
`
`ELLEN HEPP
`University of New Hampshire
`
`ORRADRE LIBRARY
`SANTA CLARA UNIVERSITY
`SANTA CLARA, CALIFORNIA
`
`awe
`filed VicGraw-Hill
`Boston Burr Ridge, IL Dubuque, [A Madison, WI New York San Francisco
`St. Louis Bangkok Bogota Caracas Lisbon London Madrid MexicoCity
`Milan New Delhi
`Seoul Singapore
`Sydney ‘Taipei
`“Toronto
`
`|
`|
`
`
`
`Page 1 of 20
`
`LG/HUAWEI EXHIBIT 1110
`
`Page 1 of 20
`
`LG/HUAWEI EXHIBIT 1110
`
`

`

`
`
`Tt
`6109. 819
`EtS|
`a7
`1979
`
`sine
`
`WCB/McGraw-Hill
`A Division ofThe McGraw-Hill Companies
`
`INTRODUCTION TO THE INTERNET FOR ENGINEERS
`
`Copyright ©1999 by The McGraw-Hill Companies, Inc. All rights reserved. Printed in the
`United States of America, Except as permitted under the United States Copyright Act of 1976,
`no partof this publication may be reproducedordistributed in any form or by any means, or
`stored in a data base or retrieval system, withoutthe prior written permission ofthe publisher.
`
`This book is printed on acid-free paper.
`
`1234567890 DOC/DOC 9432109
`
`ISBN 0-07-229143-5
`
`Vice president/Editor-in-chief: Kevin T. Kane
`Publisher: Thomas Casson
`Executive editor: Eric M. Munson
`Marketing manager:
`John T: Wannemacher
`Project manager: Ayry Hill
`Senior production supervisor: Heather D. Burbridge
`Freelance design coordinator: Mary Christianson
`Coverimage: The lmage Bank
`Supplement coordinator: Matt Perry
`Compositor:
`Techsetters, Inc.
`‘Typeface:
`10/12 Janson
`Printer: R. R. Donnelley & Sons Company
`
`Library of Congress Cataloging-in-Publication Data
`Greenlaw, Raymond
`Introduction to the Internet for engineers/Raymond Greenlaw,
`Ellen Hepp.
`p.
`cm.
`Includesindex.
`ISBN 0-07-229143-5
`1. Internet (Computer network).
`retrieval system).
`I. Hepp, Ellen.
`TKS105,.875.157G744 1999
`004.67’8—de2 1
`
`2, World Wide Web(Information
`II. Title.
`
`hetp://www.mhhe.com
`
`98-32297
`
`
`
`
`
`Page 2 of 20
`
`Page 2 of 20
`
`

`

`
`||
`TK
`5|09. 819
`oT
`| G44
`1474
`
`||| |
`
`{|
`
`To Laurel and Celeste.
`
`To Mark, Andrew, Elisa, and Crissy.
`
`
`
`Page 3 of 20
`
`Page 3 of 20
`
`

`

`
`
`JaoafFonsS—
`“9moOOm>
`
`Preface
`
`Electronic Mail
`
`Jump Start: Browsing and Publishing
`The Internet
`
`The World Wide Web
`
`Search Topics
`Telnet and FTP
`
`HTML
`
`Internet Service Providers
`
`Text Editing
`Pine Mail Program
`Basic UNIX
`
`HTML Tags
`My URLs
`
`Glossary
`Bibliography
`Index
`
`XV
`
`31
`
`87
`
`127
`161
`187
`
`201
`
`251
`
`257
`
`263
`
`273
`
`283
`
`289
`
`299
`ag
`319
`
`
`
`vii
`
`Page 4 of 20
`
`Page 4 of 20
`
`

`

`types
`
`
`
`Messagecomposition.
`
`(MIME)
`
`Page 5 of 20
`
`
`
`
`
`Basice-mailfacts.
`
`
`
`Mailerfeatures,
`
`
`
`
`
`E-mailaddresses,passwords,anduserids.
`
`
`
`E-mailmanagement.
`
`E-mailadvantagesanddisadvantages.
`
`
`
`
`E-mailinnerworkings.
`
`
`
`Messagecomponents,
`
`
`
`
`
`MultipurposeIntemetMailExtensions
`
`OBJECTIVES
`
`
`
`thischapter:
`
`
`
`
`
`
`
`1.1_Introduction
`
`
`
`
`
`Electronicmail,ore-mailasitismostcommonlyreferredto,isthesubject
`
`
`
`
`
`
`
`
`
`ofthischapter.Ourgoalsaretoacquaintnewuserswiththefundamental
`
`
`
`
`
`
`
`
`
`beenworkingwithe-mailforafewyears,andtopointoutafewsubtletiesto
`
`
`
`
`
`
`
`
`
`principlesofe-mail,toreinforcethesebasicsforintermediateuserswhohave
`
`
`
`
`
`
`
`
`
`
`
`
`
`moreexperiencedusers.Thefollowingtopics,amongothers,arediscussedin
`
`
`
`
`
`
`
`
`
`Page 5 of 20
`
`

`

`
`
` !Priorto1990.
`
`
`
`
`
`ago,peoplecannowreceiveandsende-mailto:
`
`
`
`
`
`
`
`
`
`onepredicted.Incontrasttothesimplicityofe-mailfunctionsashortwhile
`
`
`
`messageviatheInternetgrowninwaysthatnotoanotheruser.E-mailhas
`
`
`
`
`
`
`
`it.E-mailbeganasasysteminwhichanindividualusercouldsendaplain-text
`
`
`
`
`
`
`
`
`
`eithertheycouldnotfunctionwithout
`
`
`
`
`
`
`
`
`
`informationtotheintendedrecipient.
`
`
`
`1.2_E-Mail:AdvantagesandDisadvantages.
`
`
`
`mentationofthecorrespondence.Furthermore,fromtheuserpointofview,
`
`
`
`
`
`
`
`
`
`
`
`hereinrelationtoatelephonecall;e-mailis.alotlessexpensivethanaphone
`
`
`
`
`
`
`
`
`
`
`
`howtoselectanISP.)
`
`using.
`
`
`
`
`
`detailinAppendixC.)Thebasicconceptscarryoverdirectlytomostmailers.
`
`
`
`
`
`
`
`sticktoagenericdescriptionofe-mail.(ThePinemailprogramiscoveredin
`
`
`
`
`
`programs(synonymsincludemailers,mailclients,andmailapplications),wewill
`
`
`
`
`
`
`
`Mailclientsareprogramsthatareusedtomanage,read,andcomposee-
`
`
`
`
`
`
`
`
`
`
`
`
`
`motivationsforincludingthistopicatthebeginningofthistext.Youwillfind
`
`
`
`
`
`
`
`CHAPTER1ElectronicMail
`
`
`
`
`
`
`
`
`
`
`
`
`
`either,itstillfaroutdistancesavailability.e-mailintermsofitsworldwide
`
`
`
`
`
`
`
`wherehasaccesstoe-mail.Althoughthetelephoneisnottrulyuniversal
`
`
`
`
`
`Page6 of 20
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`1.2.2Disadvantages
`
`
`
`
`
`Despitealloftheadvantages,weshouldbearinmindthatnoteveryoneevery-
`
`heardofit,useditoccasionally,orfeltTodaymanypeopleallovertheworldhavebeenexposedtoe-mail—theyhave
`
`
`
`
`
`
`
`
`Generality—E-mailisnotlimitedtotext;itallowsthetransferofgraphics,
`
`
`
`programs,andevensounds.
`
`
`
`
`
`
`
`Global—Everincreasingly,peopleandbusinessesallovertheworldare
`
`usinge-mail.
`
`
`
`
`
`
`
`systemswillnotifythesenderifane-mailmessagewasundeliverable.
`
`
`
`
`
`
`
`
`
`Reliable—Althoughmessagesareoccasionallythisisrare.Manymaillost,
`
`
`
`aone-pagetypicallydeliverydocument:bothdocumentswillhavethesame
`
`
`
`
`
`
`
`
`inwhichcasetheusermighthavetofindanalternativewayofgettingthe
`time.Therearesomemailsystemsthatcannothandleverylargemessages,
`
`
`
`
`
`
`
`
`
`resources.Youcankeepanelectroniccopyofamessageforyourown
`
`
`
`correspondencedoesnotneedtobeprinted,usinge-mailsavesonnatural
`
`records.
`
`sendinga100-pagerequiresnomoreeffortorcostsendingdocumentthan
`
`
`
`
`
`
`
`
`Printable—Ahardcopyiseasytoobtain.However,sinceagreatdealof
`
`timescallednow),amessagecaneasilybeprintedtoprovideconcretedocu-
`
`
`
`
`callandnearlyasfast.And,likepostalmail(snailmailors-mailasitissome-
`
`
`
`
`
`Inexpensive—Onceyouareon-line,thecostofsendingamessageis
`
`small.
`
`network.
`
`jobs,andthoseinacademia.Thewords“inexpensive”and“efficient”areused
`
`
`
`
`
`Speed—E-mailisfast,basedonthespeedoftheunderlyingcommunication
`
`theearlydaysoftheInternet,e-mailemergedasaninexpensiveandefficient
`
`
`
`meansofcommunicationbetweenresearchers,scientists,peopleinhigh-tech
`
`
`
`
`E-mailisoneofthemostpopularservicesavailablethroughtheInternet.In
`
`
`
`
`
`
`
`
`
`canbeinformalorformal.E-mailmakespublishinganddiscussingvery
`
`
`
`forstationeryandstamps.Sendingamemoorshortnoteiseasy.Amessage
`
`
`
`
`easy,forexample,intheformsofmailinglistsandnewsgroups.
`
`ServiceProviders(ISPs)providetheirownmailclients.(AppendixAdiscusses
`
`
`
`
`
`
`
`
`
`Convenience—Therearenotripstothepostoffice,andnoneedtosearch
`
`Thishasmadeusinge-mailmucheasierandmoreefficient.Afewpopular
`
`
`
`arenotassophisticatedassomestand-alonemailclients.ManyInternetMostWbbrowserscomewithabuilt-inmailapplication,althoughatpresentthese
`
`
`
`
`
`
`
`
`
`
`mail,Theseprogramshavebecomeverysophisticatedinthelastfewyears.
`
`
`
`
`
`
`mailclientsareElm,Eudora,mail-tool,mailx,MicrosoftExchange,andPine.
`
`
`
`
`
`
`
`
`
`
`alimitednumberofpeoplewithwhomtheycouldcommunicate.Nowthat
`
`
`
`
`Asintheearlydaysofthetelephone,theoriginalusersofe-mailonlyhad
`
`
`
`e-mailismoreprevalent,someoftheadvantagesofusingitareclear.
`
`1.2.1Advantages‘
`
`mailprogramsarecontinuouslybeingintroduced.Additionally,ifyouswitch
`
`
`
`
`
`employerwilluseadifferente-mailsystemthantheoneyouarecurrently
`
`
`
`
`companiesatsomepointinyourcareer,thereisagoodchanceyournew
`
`
`
`Itisimportanttograspthefundamentalsofe-mail,sincenewandimprovede-
`
`
`
`
`
`
`
`
`
`
`directlytoacomputerprogramprovesusefulsubscribingtoamailinginclude
`
`
`
`
`
`list,submittingapaperorformelectronically,accessingandremoteInternet
`
`
`
`
`
`Thislastpointisworthelaborating.Examplesinwhichsendingamessage
`
`
`
`
`
`servicessuchasfiletransferandgopher.
`
`
`
`*Computerprograms.
`
`
`
`*Manyusersatonce.
`
`
`
`
`
`usesofe-mailthroughoutthebook.Sincetherearesomanydifferente-mail
`
`
`
`
`
`
`
`
`
`
`
`E-mailinfiltratesmanyareasoftheInternet,whichisoneoftheprimary
`
`
`
`
`
`*Nearlyanycountryintheworld.
`
`*Oneofmillionsofcomputerusers.
`
`
`
`
`
`
`
`4.2E-Mail:AdvantagesandDisadvantages
`
`Page 6 of 20
`
`
`

`

`
`
`
`
`acceptablewhencomparedwithalternatives.
`
`
`
`maynothavereadtheirmail.
`
`CHAPTER1ElectronicMail
`
`
`
`14.1Userids
`
`
`
`yourpassword.
`
`hashadwithe-mail.
`
`
`
` 2Asanhistoricalnote,wepointoutthatSpamwasameatproductoriginallyfedtosoldiersin
`
`
`
`
`
`
`theadvantagesofe-mailaregreat,andthedisadvantages,althoughreal,are
`
`
`
`
`
`
`
`thanaletterandnotasintrusiveasaphonecall.Ane-mailresponsecanbe
`
`mailtoeitherusingthetelephoneorwritingaletter.E-mailislessformal
`
`
`
`
`
`associatedwithanycommunicationmechanism,manypeoplepreferusinge-
`
`
`
`
`
`ponderedandformulated,ifnecessary,orsentbackrightaway.Onthewhole,
`
`
`
`ofpronounsthroughoutthebook,or(3)using“she”tocompensateforyearsofoveruseof
`
`
`
`
`singular.Thisseemstobeabettersolutionthan:(1)usinghe/she,(2)alternatingthegender
`
`
`
`
`
`
`
`Inthisbook,weusethepronouns“their,”“them,”and“they,”evenwherethecorrectusageis
`
`
`
`
`
`
`
`
`skitinwhichJohnCleese(customer)asksEricIdle(waitress}whattheyhaveonthemenufor
`
`
`
`
`
`Spam,”andsoontothepointeveryoneisfinallyreadytoscreamiftheyhearthattheword
`
`
`
`
`breakfast.“She”thenratdesoffendlesscombinationsof“eggsandSpam,”“Spam,eggs,and
`
`
`
`
`
`
`hasacult-likefollowing,Theuseofspamfore-mailwastakenfromthefamousMontyPython
`
`
`
`
`WorldWarIL.Spamiscommerciallyavailableandcelebratedits50thbirthdayin1997.Spam
`
`
`
`
`Funk—Anothermorerecentnegativedevelopmentinvolves“junke-mail,”
`
`
`
`
`
`
`
`messagethatyouwouldnotwantthewholeworldtosee.Itissimplefor
`
`
`Misdirection—Withe-mail,youareyourownworstenemy.Itisfarmore
`
`
`
`Thereareprogramsthatcanbeusedonsomesystemstocheckwhenaper-
`
`
`
`
`
`Noresponse—Amildfrustrationsometimesassociatedwithusinge-mailis
`
`
`
`
`
`Theprocessofsendingjunke-mailtolotsofsitessimultaneouslyisknown
`
`
`
`
`
`
`
`
`
`problem.Someon-lineservicesprovidehelpindealingwiththisunwanted
`Forgery—E-maildoesnotprecludeforgeries,thatis,someoneimpersonat-
`
`
`
`
`
`
`someonetopassonyourmessage,callede-mailforwarding,toanotherparty.
`
`
`
`
`
`
`Interception—Itispossible,althoughunlikely,thateavesdroppersare“listen-
`
`
`
`
`
`
`anegativereaction.They?maynothavereceivedyourmessage,orthey
`
`
`
`
`
`Despitedisadvantages,areforthemostpartthesameasthosethewhich
`
`
`
`
`notimmediatelyassumethatalackofaresponsefromsomeoneindicates
`
`
`
`
`sonlastreceivedane-mailmessage.Althoughe-mailishighlyreliable,do
`
`
`
`
`
`basis.However,thisoccursusingregularpostalmailaswell.dealingwithrecipientswhodonotreadandrespondtotheire-mailonaregular
`
`
`
`
`
`
`
`
`
`
`e-mail,andthereareWebsitesthatsuggeststrategiesforcopingwithspam.
`
`
`
`
`
`
`
`priatee-mailissometimesreferredtoasspamr’andisbecomingaserious
`
`
`
`orunsolicitedcommerciale-mail.Thisfloodingofundesirableorinappro-
`
`
`
`
`ingin”one-mailcorrespondence.Asaruleofthumb,neversendane-mail
`
`
`likelythatyouwillaccidentallysende-mailtoanunintendedrecipientthan
`
`
`
`
`
`
`Overload—E-mailcanalsobetooconvenientandresultinafloodofmail.
`
`ingthesender,sincethesenderisusuallynotauthenticatedinanyway.
`
`
`
`
`
`asspamming.Pleaseavoidthistypeofabuseofthee-mailsystem.
`
`
`
`
`
`
`
`
`
`itisforsomeoneactuallytointerceptyoure-mail.
`
`
`
`
`3.Describeonegoodandonebadexperiencethatyouorsomeoneyouknow
`
`
`
`1.Writeaparagraphortwoaimedatsomeonewhowasaroundbeforethe
`
`
`
`5.Haveyoueverreceivedspam?Ifso,whatwasthenatureofthemessage?
`
`
`youmustknowtoaccessacomputersystemareyouruseridorloginnameand
`
`
`
`
`
`tiontouserids,passwordselection,ande-mailaddresses.Thissectionshouldbe
`
`
`
`
`mayalreadyhaveanInternetServiceProviderandusee-mail,orperhapsyou
`
`
`
`
`
`Beforecontinuingwithoure-maildiscussion,itisworthdevotingonesec-
`
`
`
`areastudentwhohasanaccountonacampuscomputer.Theimportantitems
`
`
`
`concatenationoftheword
`
`
`
`
`Synonymsforuseridareusernameandaccountname.Useridismerely“user”andtheabbreviation“id,”standingforiden-the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`walters.Suchuseridsaremucheasiername,pblucas,whileNickMichaelWalters’name,torememberthansomethinglikePonetteBethLucas’useridmightbeherfirsttwoinitialsjoinedbyherlastuseridmightbehislast
`
`youhaveachoice,pickasdescriptiveanameaspossible,butonethatisalso
`
`
`
`
`easytotypeandassociatewithyou.Insomecases,thesegoalsaremutually
`
`
`
`
`
`
`
`
`
`
`
`same.However,significantine-mailoneiseasiertoreadandmaybeshowsabitmorerespectforMaryLamb,mlamb,orlamb.Notethatuppercaseorlowercaseisnormallynotnames.Thatis,MaryLambandmary1ambaretreatedthe
`
`
`
`P13245.VeryfewpeoplewillbeabletoputanametogetherwithP13245.If
`
`
`
`theaccountowner.IfyournameisSteveVillage,donotpickausernameof
`
`
`
`
`Steve,sincethereareseveralmillionStevesintheworld,andsuchauserid
`
`
`2.Writeaparagraphexplainingyourvisionofthefutureofe-mail.
`
`1.3Userids,Passwords,andE-MailAddresses
`
`
`EXERCISES12E-Mail:AdvantagesandDisadvantages
`
`
`
`Theparamountissueforyouistogetaccesstoacomputersystem.You
`
`
`
`
`tification.Youruserididentifiesyoutothecomputer.
`
`
`
`
`
`Inmostsettings,useridshavesomemnemonicmeaning.Forexample,
`
`
`IfyournamewereMaryH.Lamb,loginnameswouldbemhamb,.*sensible
`
`
`
`particularlyusefulfornewcomputerusers.
`
`
`
`
`
`adventofcomputers.Describeyourideaaboute-mailforthefuture,including
`
`
`
`
`1.3.Userids,Passwords,andE-MailAddresses
`
`
`
`byitselfwouldnotuniquelyidentifyyou.
`
`4.Whatisane-mailbomb?
`
`exclusive,butkeeptheminmind.
`
`
`howandwhyyouseeitbecomingpopularanduniversal.
`
`is.
`
`again.
`
`
`
`masculinepronouns.
`
`Page7 of 20
`
`Page 7 of 20
`
`

`

`
`
`
`
`«Beatleastfivecharacterslong.
`
`
`
`
`
`
`
`
`
` sound.Agoodpasswordshould:
`
`exceptyoushouldbeabletologintoyouraccount.
`
`»Containanumber.
`
`
`
`
`
`«Possessuppercaseandlowercaseletters.
`
`
`
`thenewpasswordasecondtimeforverification.Whenyoutypeapassword,
`
`
`
`
`
`
`
`
`
`theonlyonewhoknowsthepasswordtoyourcomputeraccount,andnoone
`
`
`
`
`
`
`
`
`
`
`
`
`
`donesimplytocheckthatyouarewhoyousayyouare.Intheory,youare
`
`
`
`
`
`
`
`CHAPTER1ElectronicMail
`
`
`
`1.3.2Passwords
`
`
`
`
`
`
`
`selectingagoodonethefirsttimearound.
`
`
`
`
`
`userid.Also,manyuserskeepthesameuseridforyears,soitisworthwhile
`
`
`
`Whatwerecommendisthat,ifpossible,yougeta“vanityplate”foryour
`
`
`
`
`
`platedependsonlyuponwhenyouarriveatthecounterandsignyourcheck.
`
`
`
`
`
`
`
`obtainalicenseplateforyourcar,thesequenceofsymbolsyougetforyour
`
`
`
`
`
`
`
`wouldalsowork.
`
`
`
`1.3.3E-MailAddresses
`
`Ped
`
`tobemetasasecuritymeasure.Afterall,ifyourpasswordisawordinthe
`
`
`inordertobeallowed.Thatis,thecomputersystemrequirestheseconditions
`
`
`
`
`
`
`
`
`Sincedictionariesareeasilyaccessibleon-line,thisisnotashardasitmight
`
`
`dictionary,aprogrammermightbeabletowriteaprogramthattriestobreak
`
`
`
`
`
`
`
`
`
`intoyouraccountbysimplytestingeverywordinthedictionaryasapassword.
`Onmostcomputersystems,yourpasswordwillhavetomeetbasiccriteria
`
`
`
`
`
`
`
`
`
`
`
`
`
`Thefirstimportantpointtobeawareofisthatthesuffixfollowingthe@sign
`
`
`name.Inthiscase,MariaisacomputersciencemajorattheUniversityof
`
`
`getsmoregeneralfromlefttoright.Thatis,csisasubdomainofcolorado,
`
`
`
`coloradoisasubdomainofedu,andeduspecifiesa(generic)top-leveldomain
`
`
`
`
`
`
`Colorado.Ifmariahadherowncomputercalledtennis,thee-mailaddress
`
`cases,itmaybenecessarytoappendanumbertoyourname.Forexample,
`
`
`SusanSmith14identifiesthefifteenthSusanSmithonasystem(assuming
`
`
`
`
`
`
`
`SusanSmithorSusanSmith0identifiesthefirst).
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Thetextbeforethe@(pronounced“at”)Therearesomeexceptions,butthisformatcoversmostcommonaddresses,theusernameofthesign*specifies
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`nameandlastnamecombinedwillprobablynotuniquelyidentifyyou.Insuch
`
`
`
`
`
`Ifyouhaveacommonnameorarepartofalargeorganization,yourfirst
`
`
`
`username@hostname.subdomain.domain
`
`
`
`
`
`Thebasicformofane-mailaddressis
`
`
`
`
`TheirbehaviorisakintothatofaDivisionofMotorVehicles.Whenyou
`handinguserstheirnextavailableletterornumbercombinationasauserid.
`
`
`
`
`
`
`InternetServiceProviderssometimesperformtheunfortunatepracticeof
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`passwordifthesystemforcesfileonpasswords,sothatyoucannotquicklyreuseorswitchbacktoapreviousyoutochangepasswords.Avoidwritingdown
`
`
`
`
`
`passwords,especiallyinon-linefiles.
`
`
`
`
`
`
`
`
`
`
`
`1.3Userids,Passwords,andE-MailAddresses
`
`
`
`
`
`itisnotechoedonscreen.Modernsystemsusuallykeepanindividualhistory
`
`
`Yourpasswordisasecretcodethatauthenticatesyoutothecomputer.Thisis
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`«Containanonalphabeticalsymbolsuchas&,%,or!.
`
`
`
`
`
`addresstoe-mailaddress.Mostaddresseshaveeitheroneortwodots.For
`
`
`
`
`Thenumberofperiods(aperiodispronounced“dot”)variesfrome-mail
`
`
`
`
`
`
`
`ments.Takeforexample:
`
`maria@tennis.cs.colorado.edu
`
`maria@cs.colorado.edu
`
`typingintheoldpassword,typinginthenewpassword,andfinallytypingin
`
`
`
`promised.Onmostsystems,changingpasswordinvolvesrunningaprogram,
`
`
`
`
`
`themregularly.Anotheralternativeistosetagoodpasswordandstickwithit.
`
`
`
`
`
`intoamultiusersystem,pickfairlyeasy-to-rememberpasswordsandchange
`
`
`
`
`
`Youshouldchangeyourpasswordimmediatelyifyouthinkithasbeencom-
`
`
`
`
`
`
`
`
`
` 4“The@wasselectedinJuly1972byRayTomlinsonatBolt,Beranek,andNewman,Inc.Ac-;
`
`
`
`
`cordingtoWhereWizardsStayUpLate,HafnerandLyon,page192:“gottherefirst,soIgot
`
`
`
`hadtheadvantageofmeaning“at”thedesignatedinstitution.Hehadnoideahewascreating
`
`
`
`
`
`
`tochooseanypunctuationIwanted,”the@sign.”TheTomlinsonsaid.“Ichosecharacteralso
`
`aniconforthewiredworld.
`
`hardtoremember.Oneschoolofthoughtisifyouaregoingtobelogging
`
`
`
`
`
`MuL()aif,andv*p*!CA.Thedrawbacktotheseexamplesisthattheyarealso
`Caseissignificantinpasswords.Hard-to-guesspasswordsare0G&$jaNp,
`
`
`
`
`
`
`‘Thisaddresshasatop-leveldomainofcom.Thecomstandsfor“commercial.”
`
`
`
`
`Thesubdomainentity,andmarkisacom-wheelabratorisacommercial
`puteruserwhoworksatWheelabrator.
`
`mark@wheelabrator.com
`
`Page 8 of 20
`
`
`
`
`
`
`
`example,considerthefollowinge-mailaddress:
`
`focusonthesuffixfollowing@.
`
`
`
`Considerafewsamplee-mailaddressesbeforewemakeanygeneralstate-
`
`
`
`
`
`
`
`canlocatethatindividual'smailbox.Wehaveindividual,whilethetextafterthe@signindicateshowthecomputersystemSlreadycovereduserids,soletus
`
`Page 8 of 20
`
`
`

`

`
`
`U.S.military
`
`
`
`internationalentity
`
`
`
`nonprofitorganization
`
`
`
`networkingorganization
`
`
`
`
`
`U.S.governmentagency
`
`BI
`
`
`
`DomainNameMeaning
`
`education
`
`
`
`commercialbusiness
`
`
`
`Internetuse.
`
`paulallen
`
`
`
`
`
`1.3.4DomainNames
`
`characters.
`
`CHAPTER1ElectronicMail
`
`
`
`
`
`1.3Userids,Passwords,andE-MailAddresses
`
`za
`
`us
`
`uk
`
`nl
`
`ip
`
`hk
`
`fr
`
`es
`
`de
`
`cl
`
`ca
`
`au
`
`DomainName
`
`SouthAfrica
`
`
`
`UnitedStates
`
`
`
`UnitedKingdom
`
`TheNetherlands
`
`Japan
`
`HongKong
`
`France
`
`
`
`Spain(Espaiia)
`
`Germany
`
`Chile
`
`Canada
`
`Australia
`
`
`
`
`
`
`youcancommunicateyoure-mailaddressandcanrecordsomeoneelse's.The
`
`
`
`nomorethan63characterslong.Allfieldscombinedmusttotallessthan256
`
`
`
`
`firstaddressexampleisreadas“mariaatcsdotcoloradodotedu,”andthe
`
`
`
`
`
`
`
`
`schemethatfollowstheboundariesofcountriesandorganizations,ratherthan
`
`
`
`
`
`
`
`
`
`
`total,includingallcountrycodes,thereareabout150top-leveldomainoftop-leveldomainnamesisanartifactoftheearlyyearsoftheInternet.Innames.
`
`
`
`
`decisioninvolveseconomicsandpoliticsasmuchastechnology.Thenumber
`
`
`
`
`
`
`
`
`
`
`
`
`
`namesintheUnitedStatesarecom,edu,gov,States,andtheyarelistedinTable1.1.ThebigsevenCurrentlyonlyasmallnumberoftop-leveldomainnamesexistintheUnitedgenerictop-leveldomainint,mil,net,andorg.In
`
`
`
`
`
`
`
`
`
`
`States,thesearecalledcountrycodes,asamplingofwhichaddition,everycountryhasitsowntop-leveldomainname.IntheUnitedareshowninTable1.2.
`
`
`
`meansthatadministratorsdonotfacetheimpossiblealocalauthority(anditsbackup)isresponsibleforlocalInternet:distributedassignmentandthoseofnetworks.TheDNSrepresentsakeyfeatureofthesuccessoftherecordkeepingofadatabase,sothatinformation.Thistaskoftryingtomaintain
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`namespace(DNS).Itisimportanttorealizethatthisisadistributednaming
`
`
`
`domainnames.Inthefigure,weshowaverysmallfragmentofthedomain
`
`
`
`
`
`oneenormouscentraldatabasethatwouldbeachokepointandwouldstrangle
`
`
`Itiseasytotrackdownalistingofallcountrycodeson-line.
`
`
`
`TABLE1.1TheGenericTop-LevelDomainNamesUsedintheUnitedStates.
`secondoneisreadas“markatwheelabratordotcom.”
`
`
`
`
`
`
`Agivenfieldinane-mailaddress,thatis,apartseparatedbydots,canbe
`
`
`
`
`Howaree-mailaddressesreadoutloud?Thisisimportanttoknowsothat
`
`
`
`
`
`
`
`Thereareproposalstoexpandthenumberoftop-leveldomainnames.The
`
`Figure1.1providesaconvenientwayofviewingorganizationofthethe
`
`
`
`
`
`
`
`toleftinane-mailaddress.ForTraversingapathfromtheroottoaleafcorrespondstogoingfromrightexample,theuserkimwouldhaveane-mail *
`
`
`
`
`
`TABLE12ASmallSamplingofCountryTop-LevelDomainNames.
`
`
`FIGURE1.1ASmallFragmentofDomainNameSpace.
`
`
`
`
`ImagineFigure1.1asaninvertedtree,withthetopcirclebeingtheroot.
`
`
`Page 9 of 20
`
`Page 9 of 20
`
`
`
`
`

`

`+Useaprogramspeciallydesignedforlocatingpeople.Thisusuallyworks
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Sinceyouknowhiscompanyisnotanonprofit,youguesscominsteadof
`
`
`
`locatesomeone,anumberofdifferentmethodsareavailablefordetermining
`
`
`
`
`
`guessesaboutanyone’se-mailaddress.Forthosetimeswhenyoucannot
`
`
`
`
`
`
`
`
`org.Similarprinciplesandaspeckleoflogiccanbeusedtomakeinformed
`
`
`
`youneedtosendthesamemessage.Forexample,youmaywanttosenda
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`yourclubmembers’e-mailaddresses.Thentotoeveryoneinyourbowlingclub,simplyaddressingyoure-mailmessagetomembersofaclassoraspecialinterestgroup.Tosendamessageyoumightselectanaliasof1ubandlistall
`
`
`
`
`
`
`clubwillresultineveryonereceivingacopyofthemessage.Obviously,this
`
`
`
`
`
`Ane-mailaliasgroupofpeoplecanalsobeestablishedforaavholetowhom
`
`
`
`
`
`someone'se-mailaddress.
`
`wouldbe
`
`denellio@hoopsters.com
`
`owncompanycalledHoopsters.Aneducatedguessastohise-mailaddress
`
`
`
`
`e-mailaddress.Forexample,pictureofFigure1.1inmind,itshouldbefairlyeasyforyoutoguesssupposeyouknowthatFrankDenelliohashisOnceyouknowthebasicprinciplesbehinde-mailaddressesandyouhavethesomeone's
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`selecttheaddressMOMandthemailerwouldyourmother’sinserte-mailaddress
`
`
`
`
`
`
`
`(ormakeitavailableforyoutoinsert).Ifyouhavetotypeintheaddress,typing
`
`
`
`
`MOM.Then,everytimeyouwanttosende-mailtoyourmother,youwould
`
`
`MOMclearlyismuchfaster.Conceptually,
`
`
`
`
`
`
`
`1.3.5E-MailAddressDeterminations
`
`addressof
`
`CHAPTER1ElectronicMail
`
`kim@cs.colorado.edu
`
`
`
`ane-mailaddress
`
`
`
`LoisLane@aol.com
`
`
`
`
`
`book”or“nicknamefeature”bythemailer.Forexample,ifyourmotherhas
`
`
`
`
`
`
`
`1.3.Userids,Passwords,andE-MailAddresses
`
`
`
`
`
`MOMgetsreplacedbyLoisLane@aol.com
`
`andyoufrequentlye-mail,youmaywanttosetupanalias,sendhersuchas
`
`
`
`+Askthepersondirectly.
`
`
`
`
`
`
`
`
`
`bestforfindingnetworkorsitesupportstaff.
`
`
`
`*Gothroughyourbrowser.Forexample,NetscapeNavigatorincludesa
`
`
`
`
`
`“People”buttonthatprovidesaccesstoagroupofwhitepagedirectories.
`
`
`
`
`
`Whitepagesarelikeon-linephonebooks.
`
`
`
`
`
`
`aliases.Someoneelse’saliasofc1ubmightonlyaffectthee-mailthatyousend;suchaliasesincludethemembersoftheirsoftballadistributionlistorprivatedistributiontoaslist.Thealiaseswehavebeendiscussingisveryconvenient,becauseyoudonothavetolookupthee-mailaddressesofeveryonewhoisintheclub.Thistypeofaliasissometimesreferredareknownas/ocalorprivate
`
`
`
`Inadditiontosettingupalocalalias,asystemwideorpublicaliascanalso
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`team.
`
`
`
`
`
`
`
`
`
`beestablished.Thesearealiasesthatareusablebyeveryoneonanysystem
`
`+Useaprogramsuchasfingertoverifyaguessedaddress.Butbeawarethat
`
`
`*UseasearchenginetodeterminetheprimaryWbserverforthesiteororga-
`
`
`+Useasearchengine,suchasYahoo!,andsubmitaqueryonthatperson’sname.
`
`
`
`
`
`
`
`nizationwherethepersonislocated.Thenlookfordirectoryinformation
`
`
`
`
`
`
`
`
`
`asasecuritymeasure,manysitesdisallowexternalfingering.
`onthesite’sWebpagesbyusingasearchoptionatthatsite.
`
`
`
`
`
`
`
`
`
`
`
`
`
`andtheircorrespondentsagainstchange.Thethatcansende-mail.Theprimaryuseofapublicaliasistobuffertheownerpublicaliasshouldbeselected
`
`
`
`
`
`
`
`
`
`
`
`
`
`administratormightdecidethatitwouldbehelpfultomakeiteasyorconvenientexample,systemtouseanalias,suchastolocatesomeone.Forthe
`andcomments.Eventhoughyoupersonallydonothavebi11designatedas
`
`
`
`
`
`canbeexpectedtochangeover
`
`
`tobeasstableaspossibleandtopointtime.Asecondaryuseofapublicaliasistotherealdeliveryaddress,which
`
`analias,themailerwilldeterminethatamessagesenttobi11isapublicalias
`
`
`
`
`bil),forhimself,sothatanyoneonthesystemcaneasilymailhimquestions
`
`
`
`
`
`
`
`remembernamethatyoucreate.Themailclientassociatesthealiaswitha
`
`
`
`
`
`addresscanbesetupwithinyourowne-mailsystem.Analiasisaneasy-to-
`
`
`
`mailaddressistoocumbersome
`
`
`
`Havingaddress,youmayfindthattoremember.Inthatcase,analiasforthedeterminedanindividual’se-mailthee-
`
`
`
`
`
`aliases,buttheyaresimilarandaretypicallycalledsomethinglike“address
`
`
`
`
`
`particulare-mailaddress.Eachmailerhasitsownprocedureforsettingup
`
`
`
`
`
`1.3.6LocalandSystemwideAliases2
`
`
`
`
`
`
`
`
`
`localaliasforyourcollegeroommateBillPatterson.Theclientwillcheckyour
`
`
`
`
`
`aliasasoneofyourlocalaliases?Assumethatyouhaveestablishedbi]asa
`
`
`
`
`listofnicknamesandmakeanappropriatesubstitutionifoneexists.Otherwise,7
`
`
`
`
`andwheretodeliverleavingittootherpartsofthemailsystemtodiscoveriftheaddressisvalidthemessage.Since,inthiscase,bi11isdefinedlocally,
`
`
`
`
`theclientwilltakethenameatfacevalueandsendthemessageonitsway,
`
`
`
`
`andwilldirectyourmessagetothecorrectaddress.
`
`
`
`
`Onequestionis,Whathappensifyouhavealreadydesignatedaparticular
`
`Page 10 of 20
`
`Page 10 of 20
`
`
`

`

`
`
`
`
`useridgenerationfollowsthesesequentialrules:
`
`
`
`
`
`
`
`
`
`
`
`(c)First,middle(ifthereisone),andlastinitial,or
`
`
`
`
`
`
`
`(a)Lastname,or
`
`
`
`(b)Firstinitial,lastname,or
`
`
`
`
`
`s
`
`startsat2.
`
`
`
`
`
`
`
`(d)First,middle(ifthereisone),andlastinitial,followedbyacounterthat
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`9.Acomputeralgorithm(whichisreallyjustasetofspecificrules)forautomatic
`
`
`
`
`
`
`
`
`
`Explain.
`
`
`
`
`
`biggiesmall,StevenTyler,andEddieVedder?
`
`
`
`
`
`
`
`
`
`7%.(Thisproblemrequiresdiscretemathematics.)Ifyouareallowedtohave
`
`
`
`
`
`
`
`
`
`
`
`softwareautomaticallydistributesthemessagetoeachnameonthelist.
`
`
`
`
`
`
`
`CHAPTER1ElectronicMail
`
`
`
`nottothesystemadministrator.
`
`
`
`andpatterson.
`
`
`
`foryou.Thisway,ifsomeoneistakinganeducatedguessatyoure-mail
`
`
`
`
`
`tionwithlowercaseletters?Now,supposeweallowdigits(0-9),aswellas
`
`
`
`
`
`
`
`
`
`youre-mailtobi11willwindupbeingsenttobi11@bjology.ucla.eduand
`
`
`
`
`Allen,JohnnyAllen,JosephAllen,JosephMikeAllen,MarkAllen,Marcus
`
`
`
`1.4MessageComponents
`
`
`
`
`
`
`
`operatorsusesuchalgorithms?
`
`BillPattersonmightbeassignede-mailaliasesofbi11p,bil]patterson,bp,
`
`
`
`
`address,chancesarethatitwillmatchoneofyoursystemaliases.Forexample,
`
`
`
`
`
`
`
`
`10.Onyourcomputersystem,whatisthedefaultpasswordanewuserisas-
`
`
`signed?Howlongdoyouhavebeforeitmustbechanged?Howfrequently
`
`Sometimes,itisusefulforthesystemadministratortosetuppublicaliases
`
`
`
`
`
`
`
`
`theautomaticuseridgeneratingalgorithm?Whydoyousupposecomputer
`
`
`
`
`
`Allen,RobertJohnAllen,JillKendraAllen?Doyouseeanyproblemswith
`
`receivedbyanindividual,whowouldthenforwardthemessage,themailing
`
`
`
`
`
`
`
`
`
`notjustthoselistedinthetext.Aretheyalltwoletterslong?Howmany
`
`addressestheire-mailtothenameofthelist.Insteadofthemessagebeing
`
`
`
`
`
`
`
`
`
`
`usinge-mail.Puttogetheralistofal/top-levelcountrycodedomainnames,
`
`allowsausertosendamessagetoawholegroupofpeople.‘Tosendmessagestoeachpersononthelist,thesender
`
`
`
`
`
`theresultisaprivatedistributionlistthat
`
`
`
`
`
`
`
`11.Thisexerciseshouldmakeyouawareofthenumberofcountriescurrently
`
`Whenasystemadministratorestablishesaglobalaliasforalistofaddresses,
`
`
`
`
`
`
`
`
`mustthepasswordbechanged?Arethereanyrulesyoumustfollowin
`
`choosingapassword?
`
`
`
`
`
`
`
`differentcountriescouldyoulocate?
`
`6.Whatusernameswouldyousuggestforthefollowingrockstars:
`
`
`
`
`
`
`UniversityofArizona.Whataretwoinformedguessesastowhathise-mail
`
`addressmightbe?
`
`ChristinaAmphlett,MickJagger,Jewel,NatalieMerchant,AlanisMorissette,
`
`
`
`
`
`
`
`
`
`
`
`
`14.Testoutanyprogramsavailabletoyoufortrackingdownane-mailaddress.
`
`
`
`
`EXERCISES13Userids,Passwords,andE-MailAddresses
`
`13.AmechanicalengineeringprofessornamedBarryMarkMesserworksatthe
`
`
`
`
`
`
`
`
`
`e-mailaddress.
`
`
`
`
`
`Usethemtolocateanoldacquaintance.Reportyourfindings.
`
`
`
`
`
`
`
`
`
`passwordsarethere?Whatifwealsoallowuppercaselettersincombina-
`
`
`
`passwordsconsistingofonlyfivelowercaseletters,howmanypossible
`
`
`
`
`
`
`1.4MessageComponents
`
`8.Would“concertpromoter”beagoodpasswordforaconcertpromoter?
`
`
`
`
`
`
`
`Letusbeginbylookingatasamplee-mailmessage.Ofcourse,inmost
`
`
`
`e-mailclients,beforeyouseethemessage,youseealistofthemessages
`
`
`
`
`systemsallowpasswordsofupto31characterslong.)
`
`
`ane-mailmessage.Hopefully,afewitemswetouchonwillbenewtoyou.
`
`uppercaseandlowercasedifferentpasswordsarepos-letters.Howmany
`
`
`
`
`sibleoflengthsfive,six,andsevencharacters?(Factoid:Someoperating
`
`
`
`
`
`
`
`
`
`handleonthebasics.Nevertheless,itisworthconsideringwhatcomprises
`
`
`
`Youmayhavealreadybeenusinge-mailforawhileandhaveaprettygood
`
`*Date.
`
`showing
`
`
`
`*Size(bytes).
`
`
`
`*Sendername.
`
`
`
`*Subjectline(usuallytruncated).
`
`
`
`
`
`JohnAllen,EleanorAllen,KendraAllen,ShirleyAllen,JohnAllen,JohnK.
`
`
`
`
`
`
`
`
`
`
`
`differentcomponents.Figure1.2depictsasamplee-mailmessage.
`
`firstpeopleaddedtothesysteminsequence,whatuseridswouldtheyhave:
`
`
`
`
`
`
`
`
`viewedthemessageSometimes,additionalsymbolsareusedtoflagwhetherornotyouhavealready(seeFigure1.4).Ourgoalhereistoexplainamessage’s
`
`Notethatallaccountnamesarelowercase.Ifthefollowinguserswerethe
`
`
`
`
`
`
`
`
`
`
`
`,
`
`Page 11 of 20
`
`
`
`
`
`
`
`12.Listthreeadditionalmethods(notgiveninthetext)oftrackingdownauser's
`
`
`
`
`
`
`
`
`
`Page 11 of 20
`
`
`

`

`
`
`usinga24-hourclock.
`
`
`
`brieflytofamiliarizeyouwiththeterminology.
`
`
`
`
`
`
`
`
`
`Whilemostpartsofthemessageareself-explanatory,wewillmentionthem
`
`
`
`
`
`
`
`
`
`themessageinamailclientfolderandthenlookatthefilewithanordinary
`
`
`
`
`
`
`
`
`
`
`
`
`
`displayyoucanseetheselinesifyousavethatinformation.Sometimesextra
`
`
`
`
`
`
`
`
`
`informationispartofthee-mailmessage,butclientmaynotbesettothemail
`
`
`
`
`
`
`
`
`
`
`
`
`
`mailclientwilldisplayslightlydifferentheaderinformation.Often,header
`
`
`
`
`
`
`
`
`
`Greeting{
`HiGuys,
`
`Header
`
`
`
`To:shiller@aol.com
`
`
`
`Subject:beandip
`
`
`
`Ce:wong@sport.middlebury.edu
`
`Text
`
`haveto,Tak.
`
`--Alex
`
`Signature
`
`
`
`
`
`AlexT.Diaz|office:(401)437-2134
`
`
`
`
`
`332ToastLane|messages:(401)437-0012
`
`
`
`EastProvidence,|fax:(401)437-2137
`
`
`
`
`
`
`
`Thefirstfivelinesofthemessagearereferredtoasthee-mailheader.Each
`
`
`
`
`
`
`
`Date:Wed,18Jun199711:00:46-0400(EDT)
`
`
`
`
`
`
`
`
`
`FIGURE12ASampleMessage.E-Mail
`
`14
`
`
`
`14MessageComponents
`
`
`
`haveto,Tak.
`
`HiGuys,
`
`
`
`Theopening
`
`15In.
`
`todowith“beandip.”
`
`June18,1997,at11amEasternDaylightTime(EDT).Timeisrepresented
`
`
`
`
`
`Diaz,whoseaddressisalex@eng.ephs.edu,sentthemessageonWednesday,
`
`
`
`
`
`TheFromfieldindicateswhosentthemessageandwhen.InthiscaseAlex
`
`
`
`
`night.Canoneofyoupickupanothercaseofitonyour,
`
`wayhome?IthinkLukeisonhisbiketodaysoyoumight
`
`
`
`Someoneaccidentallyfinishedofftheblackbeandiplast.
`
`
`
`texteditororjustprintthemessageout.Theheaderwehaveshownisactually
`
`
`
`
`
`
`mation,suchaspartsoftheroutethemessagetooktoreachyourcomputer
`
`anabbreviatede-mailheader.Thefillbeaderincludessomeadditionalinfor-
`
`
`
`
`
`
`
`
`
`
`
`andtheuniquemessageidassociatedwiththisparticularmessage.i
`
`
`
`iscalledthegreetingofthemessage.Moreformalmessagesareaddressedlike
`
`
`
`
`
`off-linelettersandusuallybeginwithDear.
`
`
`Themaincontentiscalledthetextofthemessage.
`
`
`
`elsewascopiedonthemessage.
`
`
`
`
`
`whenyoudonotwantoneormoreoftherecipientstoknowthatsomeone
`
`
`
`
`
`KEEEREEEREEEEEEEEEEEEEEEEEEEEEEEEEEKREEEKEEKEREREEEEEEEEEE
`
`
`themessagewasalsodeliveredtothee-mailaddress
`
`wong@sport.middlebury.edu
`
`REEKEEEEREKEEAREKEEREEKEEEREREEEREEEEEEEEEEREREEEEREEETEEEEEEEEE
`
`
`RhodeIsland02915|alex@eng.ephs.edu
`IftheBecfeaturewasused,wewouldnotseeitintheheading.Becisused
`
`
`
`
`
`
`forblindcarboncopy.Additionalcopiesofthemessagemayhavebeensentout.
`
`
`
`OnefieldthatdoesnotappearthatisworthmentioningisBec,whichstands
`
`
`
`
`
`
`
`wayhome?IthinkLukeisonhisbiketodaysoyoumight
`
`
`
`
`
`night.Canoneofyoupickupanothercaseofitonyour
`
`Someoneaccidentallyfinishedofftheblackbeandiplast
`
`
`
`
`
`
`onlyseeingtheSubjectfield,wecanassumethemessagewillhavesomething
`
`
`
`
`
`TheSubjectfieldprovidesahintastowhatthemessageisabout.Here,after
`
`
`
`recipientisshi]ler@aol.com.
`
`
`
`
`
`
`
`TheCcfieldtellsusthatthemessagewascopied”“carbontoanotheruser.
`
`
`
`
`
`TheTofieldspecifiestowhomthemessagewassent.Inthiscase,the
`
`
`
`
`
`
`
`
`
`
`
`
`wewouldseeareferencetoPacificDaylightTime(PDT)ratherthanEDT.
`Ingeneral,theDatefieldwillincludeareferencetothetimezonethesender
`
`
`
`
`
`
`
`
`
`
`
`From:AlexDiaz<alex@eng.ephs.edu>WedJun1811:00EDT1997
`
`
`
`
`
`Sincee-mailissentthroughouttheworld,areferencebythemailertoGMT
`
`
`
`
`(GMT).Greenwich,England,isthelocationwheretimeiskept.standard
`
` CHAPTER1ElectronicMail
`
`
`
`
`
`
`—0400.ThistellsusthatEDTisfourhoursbehindGreenwichMeanTime
`
`
`
`
`TheDatefieldrepeatsthedateandincludesaninterestingfeature:the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`letsusdeducewhentheusersentthemessageinrelationtoourlocaltime.themessagewassentat3pmGMT.Ifthemessagehadbeen
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`sentfromClaremont,California,Inthisexample,insteadofEastProvidence,RhodeIsland,
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`bottom,followedbythenamesofothermessage.Thoserecipientsoftheletter.Inourexample,usedtogeneratetheextracopy,hencefamiliarwithbusinessletterswilloftenseea“cc:”attheLongagowhenaduplicatemessageneededtobesent,paperwastheterm“carboncopy”foraduplicatecarbon
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`15
`
`Page 12 of 20
`
`Page 12 of 20
`
`
`

`

`
`
`
`
`
`
`youarecomposingyoure-mailoutsidethemailer,usingasimpletexteditor.
`
`
`
`
`
`
`
`
`
`signatureis.
`
`
`
`1.5MessageComposition
`
`
`
`
`
`Themannerinwhichyoucomposeane-mailmessagemayvaryfromonemail
`
`
`
`
`
`21.Willyoure-mailprogramallow“random"signatures?Explainwhatarandom
`
`
`
`
`
`
`
`
`
`
`
`encounteredinane-mailmessage.Compareandcontrastthem.
`
`
`
`
`
`
`
`
`
`
`
`20.Printoutthemostinterestingandthe“ugliest"signaturesyouhaveever
`
`
`
`
`
`
`
`
`
`
`
`18.DoesyourmailclientsupperttheBccfeature?
`
`
`
`
`
`
`
`
`
`
`
`dardtoomitthegreetingandsignaturealtogether.
`
`
`
`
`
`toyourself.
`
`Section1.9.
`
`
`
`EXERCISES14MessageComponents
`
`
`
`
`
`theTofield?Isthealiasautomaticallyexpandedbythemailer?
`
`CHAPTER1ElectronicMail
`
`
`
`Thefinalpartofthemessageisknownasthesignature.
`
`
`
`
`
`--Alex
`
`
`
`
`
`17.Printoutane-mailmessageyoureceivedandlabelthedifferentparts.
`
`
`
`
`
`
`
`
`
`
`
`19.IfyouCeyourselfonamessagetwice,doyougett

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket