docs/unix-phil
view unix-phil.ms @ 22:4c21f5b8d716
wrote about problems of MH (ch04)
author | meillo@marmaro.de |
---|---|
date | Tue, 02 Mar 2010 12:24:30 +0100 |
parents | ca929b042039 |
children | f0511a56416e |
line source
1 .\".if n .pl 1000i
2 .de XX
3 .pl 1v
4 ..
5 .em XX
6 .\".nr PI 0
7 .\".if t .nr PD .5v
8 .\".if n .nr PD 1v
9 .nr lu 0
10 .de CW
11 .nr PQ \\n(.f
12 .if t .ft CW
13 .ie ^\\$1^^ .if n .ul 999
14 .el .if n .ul 1
15 .if t .if !^\\$1^^ \&\\$1\f\\n(PQ\\$2
16 .if n .if \\n(.$=1 \&\\$1
17 .if n .if \\n(.$>1 \&\\$1\c
18 .if n .if \\n(.$>1 \&\\$2
19 ..
20 .ds [. \ [
21 .ds .] ]
22 .\"----------------------------------------
23 .TL
24 Why the Unix Philosophy still matters
25 .AU
26 markus schnalke <meillo@marmaro.de>
27 .AB
28 .ti \n(.iu
29 This paper discusses the importance of the Unix Philosophy in software design.
30 Today, few software designers are aware of these concepts,
31 and thus most modern software is limited and does not make use of software leverage.
32 Knowing and following the tenets of the Unix Philosophy makes software more valuable.
33 .AE
35 .\".if t .2C
37 .FS
38 .ps -1
39 This paper was prepared for the seminar ``Software Analysis'' at University Ulm.
40 Mentor was professor Schweiggert. 2010-02-05
41 .br
42 You may get this document from my website
43 .CW \s-1http://marmaro.de/docs
44 .FE
46 .NH 1
47 Introduction
48 .LP
49 Building a software is a process from an idea of the purpose of the software
50 to its release.
51 No matter \fIhow\fP the process is run, two things are common:
52 the initial idea and the release.
53 The process in between can be of any shape.
54 The the maintenance work after the release is ignored for the moment.
55 .PP
56 The process of building splits mainly in two parts:
57 the planning of what and how to build, and implementing the plan by writing code.
58 This paper focuses on the planning part \(en the designing of the software.
59 .PP
60 Software design is the plan of how the internals and externals of the software should look like,
61 based on the requirements.
62 This paper discusses the recommendations of the Unix Philosophy about software design.
63 .PP
64 The here discussed ideas can get applied by any development process.
65 The Unix Philosophy does recommend how the software development process should look like,
66 but this shall not be of matter here.
67 Similar, the question of how to write the code is out of focus.
68 .PP
69 The name ``Unix Philosophy'' was already mentioned several times, but it was not explained yet.
70 The Unix Philosophy is the essence of how the Unix operating system and its toolchest was designed.
71 It is no limited set of rules, but what people see to be common to typical Unix software.
72 Several people stated their view on the Unix Philosophy.
73 Best known are:
74 .IP \(bu
75 Doug McIlroy's summary: ``Write programs that do one thing and do it well.''
76 .[
77 %A M. D. McIlroy
78 %A E. N. Pinson
79 %A B. A. Taque
80 %T UNIX Time-Sharing System Forward
81 %J The Bell System Technical Journal
82 %D 1978
83 %V 57
84 %N 6
85 %P 1902
86 .]
87 .IP \(bu
88 Mike Gancarz' book ``The UNIX Philosophy''.
89 .[
90 %A Mike Gancarz
91 %T The UNIX Philosophy
92 %D 1995
93 %I Digital Press
94 .]
95 .IP \(bu
96 Eric S. Raymond's book ``The Art of UNIX Programming''.
97 .[
98 %A Eric S. Raymond
99 %T The Art of UNIX Programming
100 %D 2003
101 %I Addison-Wesley
102 %O .CW \s-1http://www.faqs.org/docs/artu/
103 .]
104 .LP
105 These different views on the Unix Philosophy have much in common.
106 Especially, the main concepts are similar for all of them.
107 But there are also points on which they differ.
108 This only underlines what the Unix Philosophy is:
109 A retrospective view on the main concepts of Unix software;
110 especially those that were successful and unique to Unix.
111 .\" really?
112 .PP
113 Before we will have a look at concrete concepts,
114 we discuss why software design is important
115 and what problems bad design introduces.
118 .NH 1
119 Importance of software design in general
120 .LP
121 Why should we design software at all?
122 It is general knowledge, that even a bad plan is better than no plan.
123 Ignoring software design is programming without a plan.
124 This will lead pretty sure to horrible results.
125 .PP
126 The design of a software is its internal and external shape.
127 The design talked about here has nothing to do with visual appearance.
128 If we see a program as a car, then its color is of no matter.
129 Its design would be the car's size, its shape, the number and position of doors,
130 the ratio of passenger and cargo transport, and so forth.
131 .PP
132 A software's design is about quality properties.
133 Each of the cars may be able to drive from A to B,
134 but it depends on its properties whether it is a good car for passenger transport or not.
135 It also depends on its properties if it is a good choice for a rough mountain area.
136 .PP
137 Requirements to a software are twofold: functional and non-functional.
138 Functional requirements are easier to define and to verify.
139 They are directly the software's functions.
140 Functional requirements are the reason why software gets written.
141 Someone has a problem and needs a tool to solve it.
142 Being able to solve the problem is the main functional requirement.
143 It is the driving force behind all programming effort.
144 .PP
145 On the other hand, there are also non-functional requirements.
146 They are called \fIquality\fP requirements, too.
147 The quality of a software is about properties that are not directly related to
148 the software's basic functions.
149 Quality aspects are about the properties that are overlooked at first sight.
150 .PP
151 Quality is of few matter when the software gets initially built,
152 but it will be of matter in usage and maintenance of the software.
153 A short-sighted might see in developing a software mainly building something up.
154 Reality shows, that building the software the first time is only a small amount
155 of the overall work.
156 Bug fixing, extending, rebuilding of parts \(en short: maintenance work \(en
157 does soon take over the major part of the time spent on a software.
158 Not to forget the usage of the software.
159 These processes are highly influenced by the software's quality.
160 Thus, quality should never be neglected.
161 The problem is that you hardly ``stumble over'' bad quality during the first build,
162 but this is the time when you should care about good quality most.
163 .PP
164 Software design is not about the basic function of a software;
165 this requirement will get satisfied anyway, as it is the main driving force behind the development.
166 Software design is about quality aspects of the software.
167 Good design will lead to good quality, bad design to bad quality.
168 The primary functions of the software will be affected modestly by bad quality,
169 but good quality can provide a lot of additional gain from the software,
170 even at places where one never expected it.
171 .PP
172 The ISO/IEC 9126-1 standard, part 1,
173 .[
174 %I International Organization for Standardization
175 %T ISO Standard 9126: Software Engineering \(en Product Quality, part 1
176 %C Geneve
177 %D 2001
178 .]
179 defines the quality model as consisting out of:
180 .IP \(bu
181 .I Functionality
182 (suitability, accuracy, inter\%operability, security)
183 .IP \(bu
184 .I Reliability
185 (maturity, fault tolerance, recoverability)
186 .IP \(bu
187 .I Usability
188 (understandability, learnability, operability, attractiveness)
189 .IP \(bu
190 .I Efficiency
191 (time behavior, resource utilization)
192 .IP \(bu
193 .I Maintainability
194 (analysability, changeability, stability, testability)
195 .IP \(bu
196 .I Portability
197 (adaptability, installability, co-existence, replaceability)
198 .LP
199 These goals are parts of a software's design.
200 Good design can give these properties to a software,
201 bad designed software will miss them.
202 .PP
203 One further goal of software design is consistency.
204 Consistency eases understanding, working on, and using things.
205 Consistent internals and consistent interfaces to the outside can be provided by good design.
206 .PP
207 We should design software because good design avoids many problems during a software's lifetime.
208 And we should design software because good design can offer much gain,
209 that can be unrelated to the software main intend.
210 Indeed, we should spend much effort into good design to make the software more valuable.
211 The Unix Philosophy shows how to design software well.
212 It offers guidelines to achieve good quality and high gain for the effort spent.
215 .NH 1
216 The Unix Philosophy
217 .LP
218 The origins of the Unix Philosophy were already introduced.
219 This chapter explains the philosophy, oriented on Gancarz,
220 and shows concrete examples of its application.
222 .NH 2
223 Pipes
224 .LP
225 Following are some examples to demonstrate how applied Unix Philosophy feels like.
226 Knowledge of using the Unix shell is assumed.
227 .PP
228 Counting the number of files in the current directory:
229 .DS I 2n
230 .CW
231 .ps -1
232 ls | wc -l
233 .DE
234 The
235 .CW ls
236 command lists all files in the current directory, one per line,
237 and
238 .CW "wc -l
239 counts the number of lines.
240 .PP
241 Counting the number of files that do not contain ``foo'' in their name:
242 .DS I 2n
243 .CW
244 .ps -1
245 ls | grep -v foo | wc -l
246 .DE
247 Here, the list of files is filtered by
248 .CW grep
249 to remove all that contain ``foo''.
250 The rest is the same as in the previous example.
251 .PP
252 Finding the five largest entries in the current directory.
253 .DS I 2n
254 .CW
255 .ps -1
256 du -s * | sort -nr | sed 5q
257 .DE
258 .CW "du -s *
259 returns the recursively summed sizes of all files
260 \(en no matter if they are regular files or directories.
261 .CW "sort -nr
262 sorts the list numerically in reverse order.
263 Finally,
264 .CW "sed 5q
265 quits after it has printed the fifth line.
266 .PP
267 The presented command lines are examples of what Unix people would use
268 to get the desired output.
269 There are also other ways to get the same output.
270 It's a user's decision which way to go.
271 .PP
272 The examples show that many tasks on a Unix system
273 are accomplished by combining several small programs.
274 The connection between the single programs is denoted by the pipe operator `|'.
275 .PP
276 Pipes, and their extensive and easy use, are one of the great
277 achievements of the Unix system.
278 Pipes between programs have been possible in earlier operating systems,
279 but it has never been a so central part of the concept.
280 When, in the early seventies, Doug McIlroy introduced pipes for the
281 Unix system,
282 ``it was this concept and notation for linking several programs together
283 that transformed Unix from a basic file-sharing system to an entirely new way of computing.''
284 .[
285 %T Unix: An Oral History
286 %O .CW \s-1http://www.princeton.edu/~hos/frs122/unixhist/finalhis.htm
287 .]
288 .PP
289 Being able to specify pipelines in an easy way is,
290 however, not enough by itself.
291 It is only one half.
292 The other is the design of the programs that are used in the pipeline.
293 They have to interfaces that allows them to be used in such a way.
295 .NH 2
296 Interface design
297 .LP
298 Unix is, first of all, simple \(en Everything is a file.
299 Files are sequences of bytes, without any special structure.
300 Programs should be filters, which read a stream of bytes from ``standard input'' (stdin)
301 and write a stream of bytes to ``standard output'' (stdout).
302 .PP
303 If the files \fIare\fP sequences of bytes,
304 and the programs \fIare\fP filters on byte streams,
305 then there is exactly one standardized data interface.
306 Thus it is possible to combine them in any desired way.
307 .PP
308 Even a handful of small programs will yield a large set of combinations,
309 and thus a large set of different functions.
310 This is leverage!
311 If the programs are orthogonal to each other \(en the best case \(en
312 then the set of different functions is greatest.
313 .PP
314 Programs might also have a separate control interface,
315 besides their data interface.
316 The control interface is often called ``user interface'',
317 because it is usually designed to be used by humans.
318 The Unix Philosophy discourages to assume the user to be human.
319 Interactive use of software is slow use of software,
320 because the program waits for user input most of the time.
321 Interactive software requires the user to be in front of the computer
322 all the time.
323 Interactive software occupy the user's attention while they are running.
324 .PP
325 Now we come back to the idea of using several small programs, combined,
326 to have a more specific function.
327 If these single tools would all be interactive,
328 how would the user control them?
329 It is not only a problem to control several programs at once if they run at the same time,
330 it also very inefficient to have to control each of the single programs
331 that are intended to work as one large program.
332 Hence, the Unix Philosophy discourages programs to demand interactive use.
333 The behavior of programs should be defined at invocation.
334 This is done by specifying arguments (``command line switches'') to the program call.
335 Gancarz discusses this topic as ``avoid captive user interfaces''.
336 .[
337 %A Mike Gancarz
338 %T The UNIX Philosophy
339 %I Digital Press
340 %D 1995
341 %P 88 ff.
342 .]
343 .PP
344 Non-interactive use is, during development, also an advantage for testing.
345 Testing of interactive programs is much more complicated,
346 than testing of non-interactive programs.
348 .NH 2
349 The toolchest approach
350 .LP
351 A toolchest is a set of tools.
352 Instead of having one big tool for all tasks, one has many small tools,
353 each for one task.
354 Difficult tasks are solved by combining several of the small, simple tools.
355 .PP
356 The Unix toolchest \fIis\fP a set of small, (mostly) non-interactive programs
357 that are filters on byte streams.
358 They are, to a large extend, unrelated in their function.
359 Hence, the Unix toolchest provides a large set of functions
360 that can be accessed by combining the programs in the desired way.
361 .PP
362 There are also advantages for developing small toolchest programs.
363 It is easier and less error-prone to write small programs.
364 It is also easier and less error-prone to write a large set of small programs,
365 than to write one large program with all the functionality included.
366 If the small programs are combinable, then they offer even a larger set
367 of functions than the single large program.
368 Hence, one gets two advantages out of writing small, combinable programs.
369 .PP
370 There are two drawbacks of the toolchest approach.
371 First, one simple, standardized, unidirectional interface has to be sufficient.
372 If one feels the need for more ``logic'' than a stream of bytes,
373 then a different approach might be of need.
374 But it is also possible, that he just can not imagine a design where
375 a stream of bytes is sufficient.
376 By becoming more familiar with the ``Unix style of thinking'',
377 developers will more often and easier find simple designs where
378 a stream of bytes is a sufficient interface.
379 .PP
380 The second drawback of a toolchest affects the users.
381 A toolchest is often more difficult to use for novices.
382 It is necessary to become familiar with each of the tools,
383 to be able to use the right one in a given situation.
384 Additionally, one needs to combine the tools in a senseful way on its own.
385 This is like a sharp knife \(en it is a powerful tool in the hand of a master,
386 but of no good value in the hand of an unskilled.
387 .PP
388 However, learning single, small tool of the toolchest is easier than
389 learning a complex tool.
390 The user will have a basic understanding of a yet unknown tool,
391 if the several tools of the toolchest have a common style.
392 He will be able to transfer knowledge over one tool to another.
393 .PP
394 Moreover, the second drawback can be removed easily by adding wrappers
395 around the single tools.
396 Novice users do not need to learn several tools if a professional wraps
397 the single commands into a more high-level script.
398 Note that the wrapper script still calls the small tools;
399 the wrapper script is just like a skin around.
400 No complexity is added this way,
401 but new programs can get created out of existing one with very low effort.
402 .PP
403 A wrapper script for finding the five largest entries in the current directory
404 could look like this:
405 .DS I 2n
406 .CW
407 .ps -1
408 #!/bin/sh
409 du -s * | sort -nr | sed 5q
410 .DE
411 The script itself is just a text file that calls the command line
412 a professional user would type in directly.
413 Making the program flexible on the number of entries it prints,
414 is easily possible:
415 .DS I 2n
416 .CW
417 .ps -1
418 #!/bin/sh
419 num=5
420 [ $# -eq 1 ] && num="$1"
421 du -sh * | sort -nr | sed "${num}q"
422 .DE
423 This script acts like the one before, when called without an argument.
424 But one can also specify a numerical argument to define the number of lines to print.
426 .NH 2
427 A powerful shell
428 .LP
429 It was already said, that the Unix shell provides the possibility to
430 combine small programs into large ones easily.
431 A powerful shell is a great feature in other ways, too.
432 .PP
433 For instance by including a scripting language.
434 The control statements are build into the shell.
435 The functions, however, are the normal programs, everyone can use on the system.
436 Thus, the programs are known, so learning to program in the shell is easy.
437 Using normal programs as functions in the shell programming language
438 is only possible because they are small and combinable tools in a toolchest style.
439 .PP
440 The Unix shell encourages to write small scripts out of other programs,
441 because it is so easy to do.
442 This is a great step towards automation.
443 It is wonderful if the effort to automate a task equals the effort
444 it takes to do it the second time by hand.
445 If it is so, then the user will be happy to automate everything he does more than once.
446 .PP
447 Small programs that do one job well, standardized interfaces between them,
448 a mechanism to combine parts to larger parts, and an easy way to automate tasks,
449 this will inevitably produce software leverage.
450 Getting multiple times the benefit of an investment is a great offer.
451 .PP
452 The shell also encourages rapid prototyping.
453 Many well known programs started as quickly hacked shell scripts,
454 and turned into ``real'' programs, written in C, later.
455 Building a prototype first is a way to avoid the biggest problems
456 in application development.
457 Fred Brooks writes in ``No Silver Bullet'':
458 .[
459 %A Frederick P. Brooks, Jr.
460 %T No Silver Bullet: Essence and Accidents of Software Engineering
461 %B Information Processing 1986, the Proceedings of the IFIP Tenth World Computing Conference
462 %E H.-J. Kugler
463 %D 1986
464 %P 1069\(en1076
465 %I Elsevier Science B.V.
466 %C Amsterdam, The Netherlands
467 .]
468 .QP
469 The hardest single part of building a software system is deciding precisely what to build.
470 No other part of the conceptual work is so difficult as establishing the detailed
471 technical requirements, [...].
472 No other part of the work so cripples the resulting system if done wrong.
473 No other part is more difficult to rectify later.
474 .PP
475 Writing a prototype is a great method to become familiar with the requirements
476 and to actually run into real problems.
477 Today, prototyping is often seen as a first step in building a software.
478 This is, of course, good.
479 However, the Unix Philosophy has an \fIadditional\fP perspective on prototyping:
480 After having built the prototype, one might notice, that the prototype is already
481 \fIgood enough\fP.
482 Hence, no reimplementation, in a more sophisticated programming language, might be of need,
483 for the moment.
484 Maybe later, it might be neccessary to rewrite the software, but not now.
485 .PP
486 By delaying further work, one keeps the flexibility to react easily on
487 changing requirements.
488 Software parts that are not written will not miss the requirements.
490 .NH 2
491 Worse is better
492 .LP
493 The Unix Philosophy aims for the 80% solution;
494 others call it the ``Worse is better'' approach.
495 .PP
496 First, practical experience shows, that it is almost never possible to define the
497 requirements completely and correctly the first time.
498 Hence one should not try to; it will fail anyway.
499 Second, practical experience shows, that requirements change during time.
500 Hence it is best to delay requirement-based design decisions as long as possible.
501 Also, the software should be small and flexible as long as possible
502 to react on changing requirements.
503 Shell scripts, for example, are more easily adjusted as C programs.
504 Third, practical experience shows, that maintenance is hard work.
505 Hence, one should keep the amount of software as small as possible;
506 it should just fulfill the \fIcurrent\fP requirements.
507 Software parts that will be written later, do not need maintenance now.
508 .PP
509 Starting with a prototype in a scripting language has several advantages:
510 .IP \(bu
511 As the initial effort is low, one will likely start right away.
512 .IP \(bu
513 As working parts are available soon, the real requirements can get identified soon.
514 .IP \(bu
515 When a software is usable, it gets used, and thus tested.
516 Hence problems will be found at early stages of the development.
517 .IP \(bu
518 The prototype might be enough for the moment,
519 thus further work on the software can be delayed to a time
520 when one knows better about the requirements and problems,
521 than now.
522 .IP \(bu
523 Implementing now only the parts that are actually needed now,
524 requires fewer maintenance work.
525 .IP \(bu
526 If the global situation changes so that the software is not needed anymore,
527 then less effort was spent into the project, than it would have be
528 when a different approach had been used.
530 .NH 2
531 Upgrowth and survival of software
532 .LP
533 So far it was talked about \fIwriting\fP or \fIbuilding\fP software.
534 Although these are just verbs, they do imply a specific view on the work process
535 they describe.
536 The better verb, however, is to \fIgrow\fP.
537 .PP
538 Creating software in the sense of the Unix Philosophy is an incremental process.
539 It starts with a first prototype, which evolves as requirements change.
540 A quickly hacked shell script might become a large, sophisticated,
541 compiled program this way.
542 Its lifetime begins with the initial prototype and ends when the software is not used anymore.
543 While being alive it will get extended, rearranged, rebuilt (from scratch).
544 Growing software matches the view that ``software is never finished. It is only released.''
545 .[
546 %O FIXME
547 %A Mike Gancarz
548 %T The UNIX Philosophy
549 %P 26
550 .]
551 .PP
552 Software can be seen as being controlled by evolutionary processes.
553 Successful software is software that is used by many for a long time.
554 This implies that the software is needed, useful, and better than alternatives.
555 Darwin talks about: ``The survival of the fittest.''
556 .[
557 %O FIXME
558 %A Charles Darwin
559 .]
560 Transferred to software: The most successful software, is the fittest,
561 is the one that survives.
562 (This may be at the level of one creature, or at the level of one species.)
563 The fitness of software is affected mainly by four properties:
564 portability of code, portability of data, range of usability, and reusability of parts.
565 .\" .IP \(bu
566 .\" portability of code
567 .\" .IP \(bu
568 .\" portability of data
569 .\" .IP \(bu
570 .\" range of usability
571 .\" .IP \(bu
572 .\" reuseability of parts
573 .PP
574 (1)
575 .I "Portability of code
576 means, using high-level programming languages,
577 sticking to the standard,
578 and avoiding optimizations that introduce dependencies on specific hardware.
579 Hardware has a much lower lifetime than software.
580 By chaining software to a specific hardware,
581 the software's lifetime gets shortened to that of this hardware.
582 In contrast, software should be easy to port \(en
583 adaption is the key to success.
584 .\" cf. practice of prog: ch08
585 .PP
586 (2)
587 .I "Portability of data
588 is best achieved by avoiding binary representations
589 to store data, because binary representations differ from machine to machine.
590 Textual represenation is favored.
591 Historically, ASCII was the charset of choice.
592 In the future, UTF-8 might be the better choice, however.
593 Important is that it is a plain text representation in a
594 very common charset encoding.
595 Apart from being able to transfer data between machines,
596 readable data has the great advantage, that humans are able
597 to directly edit it with text editors and other tools from the Unix toolchest.
598 .\" gancarz tenet 5
599 .PP
600 (3)
601 A large
602 .I "range of usability
603 ensures good adaption, and thus good survival.
604 It is a special distinction if a software becomes used in fields of action,
605 the original authors did never imagine.
606 Software that solves problems in a general way will likely be used
607 for all kinds of similar problems.
608 Being too specific limits the range of uses.
609 Requirements change through time, thus use cases change or even vanish.
610 A good example in this point is Allman's sendmail.
611 Allman identifies flexibility to be one major reason for sendmail's success:
612 .[
613 %O FIXME
614 %A Allman
615 %T sendmail
616 .]
617 .QP
618 Second, I limited myself to the routing function [...].
619 This was a departure from the dominant thought of the time, [...].
620 .QP
621 Third, the sendmail configuration file was flexible enough to adopt
622 to a rapidly changing world [...].
623 .LP
624 Successful software adopts itself to the changing world.
625 .PP
626 (4)
627 .I "Reuse of parts
628 is even one step further.
629 A software may completely lose its field of action,
630 but parts of which the software is build may be general and independent enough
631 to survive this death.
632 If software is build by combining small independent programs,
633 then there are parts readily available for reuse.
634 Who cares if the large program is a failure,
635 but parts of it become successful instead?
637 .NH 2
638 Summary
639 .LP
640 This chapter explained the central ideas of the Unix Philosophy.
641 For each of the ideas, it was exposed what advantages they introduce.
642 The Unix Philosophy are guidelines that help to write valuable software.
643 From the view point of a software developer or software designer,
644 the Unix Philosophy provides answers to many software design problem.
645 .PP
646 The various ideas of the Unix Philosophy are very interweaved
647 and can hardly be applied independently.
648 However, the probably most important messages are:
649 .I "``Do one thing well!''" ,
650 .I "``Keep it simple!''" ,
651 and
652 .I "``Use software leverage!''
656 .NH 1
657 Case study: \s-1MH\s0
658 .LP
659 The last chapter introduced and explained the Unix Philosophy
660 from a general point of view.
661 The driving force were the guidelines and references to
662 existing software were given only sparsely.
663 In this and the next chapter, concrete software will be
664 the driving force in the discussion.
665 .PP
666 This first case study is about the mail user agents \s-1MH\s0
667 (``mail handler'') and its descendent \fInmh\fP (``new mail handler'').
668 In this document, the name \s-1MH\s0 will be used for both of them.
669 A distinction will only be made if differences between
670 them are described.
673 .NH 2
674 Historical background
675 .LP
676 Electronic mail was available in Unix very early.
677 It is out of matter that in the beginning mail was only
678 transferred within one machine.
679 This chapter is about a mail user agent (\s-1MUA\s0),
680 which provides functions to read, compose, and organize mail,
681 but (ideally) not to transfer.
682 .PP
683 The first \s-1MUA\s0 on Unix was \f(CWmail\fP.
684 It was a small program that either prints the own mailbox file
685 or appends text to someone elses mailbox file,
686 depending on the command line arguments.
687 .[
688 %O http://cm.bell-labs.com/cm/cs/who/dmr/pdfs/man12.pdf
689 .]
690 It was a program that did one job well.
691 This job was emailing, which then was very simple.
692 .PP
693 Later, emailing became more powerfull, and thus more complex.
694 The simple \f(CWmail\fP, which knew nothing of subjects,
695 independent handling of single messages,
696 and long-time storage of them, was not powerful enough anymore.
697 At Berkeley, Kurt Shoens wrote \fIMail\fP (with capital `M')
698 in 1978 to provide additional functions for emailing.
699 Mail was still one program, but now it was large and did
700 several jobs.
701 Its user interface is modeled after the one of ed.
702 It is designed for humans, but is still scriptable.
703 \fImailx\fP is the adaption of Berkeley Mail into System V.
704 .[
705 %A Gunnar Ritter
706 %O http://heirloom.sourceforge.net/mailx_history.html
707 .]
708 Elm, pine, mutt, and today a whole bunch of graphical \s-1MUA\s0s
709 followed Mail's direction.
710 They are large, monolithic programs which include all emailing functions.
711 .PP
712 A different way took the people of \s-1RAND\s0 Corporation.
713 In the beginning, they also had used a monolitic mail system,
714 simply called \s-1MS\s0 for ``mail system''.
715 But in 1977, Stockton Gaines and Norman Shapiro
716 came up with a proposal of a new email system concept \(en
717 one that honors the Unix Philosophy.
718 The concept was implemented by Bruce Borden in 1978 and 1979.
719 This was the birth of \s-1MH\s0 \(en the ``mail handler''.
720 .PP
721 Since then, \s-1RAND\s0, the University of California at Irvine and
722 at Berkeley, and several others have contributed to the software.
723 However, it's core concepts remained the same.
724 In the 90s, when development of \s-1MH\s0 slowed down,
725 Richard Coleman started with \fInmh\fP, the new mail handler.
726 This was in 1997.
727 His goal was to improve \s-1MH\s0, especially in regard of
728 the requirements of modern email.
729 Today, nmh is developed by various people on the Internet.
730 .[
731 %T RAND and the Information Evolution: A History in Essays and Vignettes
732 %A Willis H. Ware
733 %D 2008
734 %I The RAND Corporation
735 %P 128\(en137
736 %O .CW \s-1http://www.rand.org/pubs/corporate_pubs/CP537/
737 .]
738 .[
739 %T MH & xmh: Email for Users & Programmers
740 %A Jerry Peek
741 %D 1991, 1992, 1995
742 %I O'Reilly & Associates, Inc.
743 %P Appendix B
744 %O Also available online: \f(CW\s-2http://rand-mh.sourceforge.net/book/\fP
745 .]
747 .NH 2
748 Contrasts to monolithic mail systems
749 .LP
750 All \s-1MUA\s0s are monolithic, except \s-1MH\s0.
751 This might not be true,
752 but it reflects the situation pretty well.
753 .PP
754 While monolithic \s-1MUA\s0s gather all function in one program,
755 \s-1MH\s0 is a toolchest of many small tools \(en one for each job.
756 Following is a list of important programs of \s-1MH\s0's toolchest:
757 .IP \(bu
758 .CW inc :
759 incorporate new mail
760 .IP \(bu
761 .CW scan :
762 list messages in folder
763 .IP \(bu
764 .CW show :
765 show message
766 .IP \(bu
767 .CW next\fR/\fPprev :
768 show next/previous message
769 .IP \(bu
770 .CW folder :
771 change current folder
772 .IP \(bu
773 .CW refile :
774 refile message into folder
775 .IP \(bu
776 .CW rmm :
777 remove message
778 .IP \(bu
779 .CW comp :
780 compose a new message
781 .IP \(bu
782 .CW repl :
783 reply to a message
784 .IP \(bu
785 .CW forw :
786 forward a message
787 .IP \(bu
788 .CW send :
789 send a prepared message
790 .LP
791 \s-1MH\s0 has no special user interface like monolithic \s-1MUA\s0s have.
792 The user does not leave the shell to run \s-1MH\s0,
793 but he uses \s-1MH\s0 within the shell.
794 \s-1MH\s0's mail storage is (only little more than) a directory tree
795 where directories are mail folders and files are mail messages.
796 Working with \s-1MH\s0's toolchest is much like working
797 with Unix' toolchest:
798 \f(CWscan\fP is like \f(CWls\fP,
799 \f(CWshow\fP is like \f(CWcat\fP,
800 \f(CWfolder\fP is like \f(CWcd\fP,
801 \f(CWrefile\fP is like \f(CWmv\fP,
802 and \f(CWrmm\fP is like \f(CWrm\fP.
803 .PP
804 The context of the Unix tools is mainly the current working directory,
805 the user identification, and the environment variables.
806 \s-1MH\s0 extends this context by two more items:
807 The current mail folder, similar to the current working directory,
808 for which \f(CWfolder\fP provides the functionality of
809 \f(CWpwd\fP and \f(CWcd\fP.
810 And the current message, relative to the current mail folder,
811 which enables commands like \f(CWnext\fP and \f(CWprev\fP.
812 In contrast to Unix' context, which is chained to the shell session,
813 \s-1MH\s0's context is meant to be chained to a mail account.
814 But actually, the current message is a property of the mail folder,
815 which is mainly a legacy.
816 This will cause problems when multiple users work
817 in one mail folder simultaneously.
818 .PP
819 Using a monolithic program with a captive user interface
820 means ``entering'' the program, using it, and ``exiting'' the program.
821 Using toolchests like \s-1MH\s0 means running programs,
822 alone or in combinition with others, even from other toolchests,
823 without leaving the shell.
826 .NH 2
827 Discussion of the design
828 .LP
829 The following paragraphs discuss \s-1MH\s0 in regard to the tenets
830 of the Unix Philosophy Gancarz identified.
832 .PP
833 .I "``Small is beautiful''
834 and
835 .I "``do one thing well''
836 are two design goals that are directly visible in \s-1MH\s0.
837 Gancarz actually presents \s-1MH\s0 as example under the headline
838 ``Making UNIX Do One Thing Well'':
839 .QP
840 [\s-1MH\s0] consists of a series of programs which
841 when combined give the user an enormous ability
842 to manipulate electronic mail messages.
843 A complex application, it shows that not only is it
844 possible to build large applications from smaller
845 components, but also that such designs are actually preferable.
846 .[
847 %A Mike Gancarz
848 %T unix-phil
849 %P 125
850 .]
851 .LP
852 The various small programs of \s-1MH\s0 were relatively easy
853 to write as each of them is small, limited to one function,
854 and has clear bounderies.
855 For the same reasons, they are also good to maintain.
856 Further more, the system can easily get extended.
857 One only needs to put a new program into the toolchest.
858 This was done when \s-1MIME\s0 support was added
859 (e.g. \f(CWmhbuild\fP).
860 Also, different programs can exist to do the basically same job
861 in different ways (e.g. in nmh: \f(CWshow\fP and \f(CWmhshow\fP).
862 If someone needs a mail system with some additionally
863 functions that are nowhere available yet, he best takes a
864 toolchest system like \s-1MH\s0 where he can add the
865 functionality with little work.
867 .PP
868 .I "Data storage.
869 How \s-1MH\s0 stores data was already mentioned.
870 Mail folders are directories (which contain a file
871 \&\f(CW.mh_sequences\fP) under the user's \s-1MH\s0 directory
872 (usually \f(CW$HOME/Mail\fP).
873 Mail messages are text files located in a mail folder.
874 The files contain the messages as they were received.
875 The messages are numbered in ascending order in each folder.
876 This mailbox format is called ``\s-1MH\s0'' after the \s-1MUA\s0.
877 Alternatives are \fImbox\fP and \fImaildir\fP.
878 In the mbox format all messages are stored within one file.
879 This was a good solution in the early days, when messages
880 were only a few lines of text and were deleted soon.
881 Today, when single messages often include several megabytes
882 of attachments, it is a bad solution.
883 Another disadvantage of the mbox format is that it is
884 more difficult to write tools that work on mail messages,
885 because it is always neccessary to first find and extract
886 the relevant message in the mbox file.
887 With \s-1MH\s0 mailboxes, each message is a self-standing item,
888 by definition.
889 Also, the problem of concurrent access to one mailbox is
890 reduced to the problem of concurrent access to one message.
891 However, the issue of the shared parts of the context,
892 as mentioned above, remains.
893 Maildir is generally similar to \s-1MH\s0's format,
894 but modified towards guaranteed reliability.
895 This involves some complexity, unfortunately.
897 .PP
898 .I "``Avoid captive user interfaces.''
899 \s-1MH\s0 is perfectly suited for non-interactive use.
900 It offers all functions directly and without captive user interfaces.
901 If users want a graphical user interface, anyhow,
902 they can have it with \fIxmh\fP or \fIexmh\fP, too.
903 These are graphical frontends for the \s-1MH\s0 toolchest.
904 This means, all email-related work is still done by \s-1MH\s0 tools,
905 but the frontend issues the appropriate calls when the user
906 clicks on a button.
907 Providing easy-to-use user interfaces in form of frontends is a good
908 approach, because it does not limit the power of the backend itself.
909 The frontend will anyway only be able to make a subset of the
910 backend's power and flexibility available.
911 But if it is a separate program,
912 then the missing parts can still be accessed at the backend directly.
913 If it is integrated, then this will hardly be possible.
915 .PP
916 .I "``Choose portability over efficiency''
917 and
918 .I "``use shell scripts to increase leverage and portability'' .
919 These two tenets are indirectly, but nicely, demonstrated by
920 Bolsky and Korn in their book about the korn shell.
921 .[
922 %T The KornShell: command and programming language
923 %A Morris I. Bolsky
924 %A David G. Korn
925 %I Prentice Hall
926 %D 1989
927 %O \s-1ISBN\s0: 0-13-516972-0
928 .]
929 They demonstrated, in one chapter of the book, a basic implementation
930 of a subset of \s-1MH\s0 in ksh scripts.
931 Of course, this was just a demonstration, but a brilliant one.
932 It shows how quickly one can implement such a prototype with shell scripts,
933 and how readable they are.
934 The implementation in the scripting language may not be very fast,
935 but it can be fast enough though, and this is all that matters.
936 By having the code in an interpreted language, like the shell,
937 portability becomes a minor issue, if we assume the interpreter
938 to be widespread.
939 This demonstration also shows how easy it is to create single programs
940 of a toolchest software.
941 Most of the single programs comprise less than a hundred lines of
942 shell code.
943 Such small software is easy to write, easy to understand,
944 and thus easy to maintain.
945 Being a toolchest improved the possibility to only write some parts
946 and though create a working result.
947 Expanding the toolchest without global changes will likely be
948 possible, too.
950 .PP
951 .I "``Use software leverage to your advantage''
952 and the lesser tenet
953 .I "``allow the user to tailor the environment''
954 are ideally followed in the design of \s-1MH\s0.
955 Tailoring the environment is heavily encouraged by the ability to
956 directly define default options to programs, even different ones
957 depending on the name under which the program was called.
958 Software leverage is heavily encouraged by the ease it is to
959 create shell scripts that run a specific command line,
960 build of several \s-1MH\s0 programs.
961 There is few software that so much wants users to tailor their
962 environment and to leverage the use of the software, like \s-1MH\s0.
963 Just to make one example:
964 One might prefere a different listing format for the \f(CWscan\fP
965 program.
966 It is possible to take one of the other distributed format files
967 or to write one yourself.
968 To use the format as default for \f(CWscan\fP, a single line,
969 reading
970 .DS
971 .CW
972 scan: -form FORMATFILE
973 .DE
974 must be added to \f(CW.mh_profile\fP.
975 If one wants this different format as an additional command,
976 he needs to create a link to \f(CWscan\fP, for instance titled
977 \f(CWscan2\fP.
978 The line in \f(CW.mh_profile\fP would then start with \f(CWscan2\fP,
979 as the option should only be in effect when scan was called as
980 \f(CWscan2\fP.
982 .PP
983 .I "``Make every program a filter''
984 is hard to find in \s-1MH\s0.
985 The reason therefore is that most of \s-1MH\s0's tools provide
986 basic file system operations for the mailboxes.
987 \f(CWls\fP, \f(CWcp\fP, \f(CWmv\fP, and \f(CWrm\fP
988 aren't filters neither.
990 .PP
991 .I "``Build a prototype as soon as possible''
992 was again well followed by \s-1MH\s0.
993 This tenet, of course, focuses on early development, which is
994 long time ago for \s-1MH\s0.
995 But without following this guideline at the very beginning,
996 Bruce Borden may have not convinced the management to ever
997 create \s-1MH\s0.
998 In Bruce's own words:
999 .QP
1000 [...] but [Stockton Gaines and Norm Shapiro] were not able
1001 to convince anyone that such a[n \s-1MH\s0-like] system
1002 would be fast enough to be usable.
1003 I proposed a very short project to prove the basic concepts,
1004 and my management agreed.
1005 Looking back, I realize that I had been very lucky with my first design.
1006 Without nearly enough design work,
1007 I built a working environment and some header files
1008 with key structures and wrote the first few \s-1MH\s0 commands:
1009 inc, show/next/prev, and comp.
1010 [...]
1011 With these three, I was able to convince people that the structure was viable.
1012 This took about three weeks.
1013 .[
1014 %O FIXME
1015 .]
1017 .NH 2
1018 Problems
1019 .LP
1020 \s-1MH\s0, for sure is not without problems.
1021 There are two main problems: one technical, the other about human behavior.
1022 .PP
1023 \s-1MH\s0 is old and email today is very different to email in the time
1024 when \s-1MH\s0 was designed.
1025 \s-1MH\s0 adopted to the changes pretty well, but it is limited.
1026 For example in development resources.
1027 \s-1MIME\s0 support and support for different character encodings
1028 is available, but only on a moderate level.
1029 More active developers could quickly improve there.
1030 It is also limited by design, which is the larger problem.
1031 \s-1IMAP\s0, for example, conflicts with \s-1MH\s0's design to a large extend.
1032 These design conflicts are not easily solvable.
1033 Possibly, they require a redesign.
1034 .PP
1035 The other kind of problem is human habits.
1036 When in this world almost all \s-1MUA\s0s are monolithic,
1037 it is very difficult to convince people to use a toolbox style \s-1MUA\s0
1038 like \s-1MH\s0.
1039 The habits are so strong, that even people who understood the concept
1040 and advantages of \s-1MH\s0 do not like to switch.
1041 Unfortunately, the frontends to \s-1MH\s0, which can provide familiar look'n'feel,
1042 are not very appealing in contrast to what monolithic \s-1MUA\s0s offer.
1044 .NH 2
1045 Summary \s-1MH\s0
1046 .LP
1047 flexibility, no redundancy, use the shell
1051 .NH 1
1052 Case study: uzbl
1054 .NH 2
1055 History
1056 .LP
1057 uzbl is young
1059 .NH 2
1060 Contrasts to similar sw
1061 .LP
1062 like with nmh
1063 .LP
1064 addons, plugins, modules
1066 .NH 2
1067 Gains of the design
1068 .LP
1070 .NH 2
1071 Problems
1072 .LP
1073 broken web
1077 .NH 1
1078 Final thoughts
1080 .NH 2
1081 Quick summary
1082 .LP
1083 good design
1084 .LP
1085 unix phil
1086 .LP
1087 case studies
1089 .NH 2
1090 Why people should choose
1091 .LP
1092 Make the right choice!
1094 .nr PI .5i
1095 .rm ]<
1096 .de ]<
1097 .LP
1098 .de FP
1099 .IP \\\\$1.
1100 \\..
1101 .rm FS FE
1102 ..
1103 .SH
1104 References
1105 .[
1106 $LIST$
1107 .]
1108 .wh -1p