• Keine Ergebnisse gefunden

i I I b ÓS I I t i l &Oacute

N/A
N/A
Protected

Academic year: 2022

Aktie "i I I b ÓS I I t i l &Oacute"

Copied!
102
0
0

Wird geladen.... (Jetzt Volltext ansehen)

Volltext

(1)Ó t I d I I i l I l i S i 6 Ó t Ó t t t I I l t q l B l 0 E J q. 0 4 I t l t t Ó l ¶ 0 t g l I 1 ¢ l q t t 0 l t I 0 9 $ I [ t t. i I I b ÓS I I t i l Ó } i } l I f t I 0 l 0 t l I t I g J I Ó¶ l i t g t ¢ ÓÓ b 6 g I 0 t Ó Ü ÓÓ i l 0 I l I t ? i I I I 4 Q 6 i t t g l 6 g E l I t t I S I j b I 0 t 6 I E S 4 b f O0 I. I l i g l l i l I t I 4 0 i 0 6 Ú I t t 0 Ól l t t I g J I t t I 0 I $ I t I d I t ( t t t l I 0 t I B 0 I I l J I t t t l I f i Ó t t I I Ó 6 t l t I t E g 0 t b l l t OI 6 t Ó b g j I 6 O. t g i Ó l t i l I J S i E J i 0 f t ¢ Ó I I t Ó Ó I I l l t t 6. l B J q j I I l t g I q i l t t b I I t y t Ó } I I t J 0 C I Ó. I 6 t f $ t S Ó I g 4 Ó L g i S I b t t 0 h I I P I I l I f t I. t I i t l I j i j t t l l I t 0 t t b q g l C t I 6 l á C I I Ó 6 ! t I I t 6 i I t Ót P l t t 0 Ó t l t B i j I I 4 C t Q OI. I l T 0 i t i ¢ t I g F ¶ f I I g I I $ E g I I i 0 t 0 j j I I I I I 0 i i l i I C Ó¶ J j l J t { 6 4 g b t i Ó I t t D j q t. TERM A. t C 0 t 0 0 S b 4 I I t t t t q t ¢ t y I I I t I I I t g E C I. I Ó I 0 I t t i t q t t 6 t I t t t I j t t I t Ó I 6 q b l I i. S I l I I t I I t l 2 t I i t I 0 1 i I t t Q I I t I t t I I I 0 l g l t Q E q I i I l t l t t Ó 0 J O 0 I 6 I P } l t 0 I l q I I 3 I t I I Ó l ( t 0 t j 4 ) l Y I t ( C Q i g i t 6 t t t 0 C t t t I I 0 I I t y 6 t 0 S Ó O Ó b I t 0 t l U I Óq I I t 6. 0 Ó 6 C t I t l t I d $ d i b Ü I l I I I g l t l g S C l J C I I I d 6 i Í 4 t 1 t C r I I t t I t t i I I I $ l I Ól I I 0 t. S t 2 } I i I I i l I l i t g Ó S á I g I e t I t b 6 ¶ i t I 0. t t I t Ú l l $ I ¢ b ] l 0 j I i I t t I k g B I I I t l b I U. l l t l 0 f t b 0 I f J I I S t f E I I $ t l 0 l I I q 0 J I g. Ó l I S I k l t q l 0 $ I [ g I I 4 I t t g I 6 t l I t I t I l. l I 0 l t { g t q l l j t ( t l f j I 6 i t t l f I 6 i ¢ l I 0. I I I $ I 6 t i I t 0 S 0 i J L I I l l 4 t I S I g i Ó I I I Ó. I 0 C J 0 l l f I t I ! I 6 t 0 ( i 6 l k J I I t I l ¶ Ó I I f. III. Ccmnunications the ZCPR3. Sy8tem U8er. for. Written by. Richard Copyright. ,'. t f Ó a Ó b 6 3 0 l I t Ó 0 ( 0 I ) I C t l I t g C t i 0 $ 9 l t I t t I I I I g 4 I t 6 t 0 l I I l l t 4 t t. á 4 l ) ( i f i I I E Ó e I J l t 0 t t I 6 t t 0 I S J t C 6 0 t I ! l I t t 3 l 4 Q l I E I t t I 6 O t i i b. k i i Ó f g q t ( f D i t 0 1 S t g l i t t t 8 i J 0 I t C l t g Ó t 0 I $ t l I g g t t t t l Í l 4 I I $ S l S q i V ÓI I g I t l I I t 3 t l 0 á ! t I I ¢ ! t Ó0 ( 0 Q I l t Ó6 t f i a k t t 0 0 l $ Q f t Ól l l I b. b S ¶ I 0 I I E g t I Ó I g l t t t l l f t t 0 g J t i t f Qt 0 I I l { 0 t t I t i k t t I 6 I t b S I l l Ó I I I C I 0 I 0 t I I I b 0 b b I t I i Ó t Q t Ó} I Ó q t C I I t g l $ I } t t q I I D l I Ó g C I I I l l t. l C I l $ S I i l l I I ! b C I 0 I I t I I t i 0 ¿ I B i t I I t I I I j I t I l I f k i l 6 l t l j l f i B j. Conn. 1985 g I 6 I ( f ! ! I l t l t C d C l 0 $ I I t 0 t I l I I g b I l ¢ I 6 t i g B l 6 I i ( t I t Ó I t I 0 I S 4 t 0 t t I f I ! I t I I t l ÓI I b t I i t I Óf I l l t t l q t t I I j I ÓI t l l l Q l 4 f I S g 6 I 6 I t t b J t l f t l C I l I ¢ i $ C ( I l 0 I g l I t I l » $ I I l 0 j f t q 4 Ó t I 9 I t l t I i f Qt 0 I I S 4 Ü t. i q g t q B Ó t t I q Ó $ S C l I I E t l Ó } I É E 6 I I I Ó b l L I t i b t 6 j b C Ó l S 0 t C t S I 0 I I l. 0 C I b t I I b f t I i l i I Ó I 6 0 l t l l 4 I Ó I j O t l i I I 6 I t t I 0 l i t l i I I g l t I g t I 0 l. I I f d f g $ I t I l $ S I i } 0 i t I g 6 l l Ó I I 6 I g I 0 I t t q J t t t I t g l t l S D 0 I I $ I I I 0 t } l t I G I Ó I Q $ J g i i t 0 i f i 6 ? I ¶ S l I q t t t t l l f I I t t I g l t I g I I ¢ l Ó l i t i ! ) J t 4 I I € 8 C ÓI t I i i I i t g I 0 I 4 l t 6 I S i i i 0 8 l I t f 6 ( 0 b I S l t Q j f I t t I I I l t l. Richard Ó f I 0 I 0 I 0 I b S t t I I Ó I l 0 } t I J l I i t t ¢ t b t l j g 6 Ó t I O I l i ¢ t l t $ i 8 l I E I Ó 6. I I y t t S t t t l I O q 6 t l l I j G t 6 g 4 f I I t E l I g I f I I l 0 I i I b l I I t I l g [ l Ó I I t I. Ó I b t l I t Ó I b I I t I t 4 I ¶ 0 t I f l I f i S I q P 0 i I I I C t t b t t I l t i I t B t C l t t i t 6. I C I t t t t l t l I C I t t 4 Ó I l J 6 I J I f t l l I i I 6 ] g 0 1 6 t I l 0 b t i 0 i I t g l t 0 I I 6 I. 0 t I g t I l B l g Ó t G I t 4 I 6 0 1 t Í l j ( 0 I L i l t t l I I 6 I i t t L l i S b t b I I C I t t J I l. Ó t 0 I D t i l I g I i l 6 I t Ó I I J I $ f I S I 0 t t I l t g t 0 ] I l I t f b t t I Ü t J t S I I t I I 0. Conn. 6 I 6 b I Ó t I l t t 6 I E t 0 B I t t 0 3 t 0 t l g I ¶ t t l 6 I i I I I 4 I C I l Ól I 4 6 f I i t k I l g I i l 0 t I 0 t t t t t l l l t l g S g 6 i á I I I ¢ E I t I l 0 l 0 I t 4 0 Ó I f I t f t t I S I I I i I S l Ó I l b D S J B Gl 0 I I I t Ó I i i d i t I t I I 0 I 0 I q l I C I 6 t t t t Üt 0 l ¶ S I t ¶ t D i t g t t t t I I b { l f i j I J E Q b I S I I t t ( I C 6 g I I l I I 4 I t I k I C t t t ¢ t l Ód i t I I l t I i [ S I 0 t I t f I I b l t t Q V l t t Q t I 6 I g Ó l 0 I 0 l l l t l } l O 0 8 t t I Ó I S l 0 t t t l Ó l Ó I 0 I g l L Ó I I t g I I t f I l C t i t C i l I I l Ól l C t Q I t l l l l t t J 6 I Ó I D t I I 0 I S t j 0 I Ót. I l l t I I l I S i I Q f 4 t 6 i 4 t 0 ( g l t I i i 6 j l 4 y I f t 6 ¢ Ó i 4 t L l I t I á t t I S t I q Ót l I E J S I t J t I I t i i Ói I l t I t I t } t I t l I I 8 t f f l 6 l I t i S l l d I t i l l I t I I t t I. t } t I J Ó ( i j I l t l I I L f t t t j C I I l I I t I t t t Ó 6 Q l I l ( l i l I t l $ S I j t I 6 l y t l.

(2) 1985 No part of Riehard L. Conn. Document and program Copyright reproduced document be by in any manner or inay any means this without written consent of the publisher. Contact Echelon, Inc., 101 First Street, Los Altos, CA 94022 for further details..

(3) P R E F A C E. The Communication System. the TERM describes and the various operational concept is overviewed herein, commands in detail. are described The release of the TERM System differs from the initial information presented in this document in the following ways:. This. document. III. III. o. the T3FILER program is not yet complete TERM protocol is not implemented - the KERMIT the and CIS protocols are not - implemented the Batch transfer option under MODEM7 is - not implemented. III. o. following programs are not provided and the information presented on them is subject to. the. change. o. the. (moreso than the other. cormands):. T31XJ TM1ASTER T3SERVER. selection of niodeins under T3SEI1MOD (the is not yet complete. T3MODCAP.MCP). file. second release (phase 2) of the TERM System is planned This initial release in which these features will be included. (phase I) is presented due to user desire, and Echelon will the second release without any additional charge to distribute who System. placed original orders for the TERM all users The documentation on these features is subject to change since design changes may be later made during final implementation and testing. Minor documentation changes and feature changes may be made System commands as well. to the other TERM The creationof theTERM System has taken over a year, and this effort has been on the order of the creation of the ZCPR3 System Take time to study thoroughly this document itself. and the supplied the TERM examples before installing System and adapting to your applications. Thank you for your interest and support.. III. A. III. III. it. III. III. Richard 5 August. Conn 1985.

(4) I I i S f l i l l l t I t 4 t É I l L i f I I t t t t t i t k ¢. t q l J 5 l P i l t l S t I l t t l t l Í t t t ) I } l } j É I. k i I t l l I I } I l l l l l I t l t l I L C i i i j k É l 1 t. t I \ t i 4 ? ( I f I f t l t ) t l i I l t i | i l t ( I l l É. I l I I F I I ? I S l t l l t t k t ( l { k S I j S t i I ¢ t L. I S l i É I I t ) L I I I l l I t I ( t r i I I i I ( I t i t ). L t I g I L i I l I I t i l ? k t i I \ q t i t ¢ I f I f l I b. k I É I P f I } ) t ) t I i b t t I l t i t l I ¢ l ( $ { K t l. f I ( 6 I t h 1 I I l t I I ¶ l 1 i t l t i : I ¢ I q L I t ! l. t l f ¢ l l i \ I t I I i I l É t I t \ t l I l ( I f t 4 É I i. i i I i ¢ á t t I l ) l J K I t t É } l t } t I q I ( | { P t I. i E É t t I I I ¶ É j l ) 1 $ I l t t t t l f L I l i l É f I $. ! l t l i I É t I l ) I i I g I l k I É l t t i ¢ l f t É i ( I. i I ¢ l l I I t j t F t j I b I i l ) t l É t t l I t I i \ 1 k. I I É i i K I t : t i I g i J i ) t $ I t I l t t t i ( E ( I b. TERM A. i ( f t I i l 1 I l i I t I I I ) I i t t i } L l 4 t f ¢ t t É. I i I á l i i t t É t l I t i t ) i I t l J l I t I t t ( I i b. t k 1 l l t t I l t S I Ó I t I I t 1 t t $ I i I 1 t 1 f É l I t l t t j ! t t l l ) l t i l t t t K { I l I l t t É I i i L f. I ( I ) I \ i l t I l b I I ) I t I ) i k ) ) I } f t I t l ¢ i. \ ¢ t I i I i I t l i l k ) I l I t 4 I l É ) i } I } i t t l I. I Í l l F i 0 t I I I | ) I t l ( 4 i b I i ! k l I I l { t l l. É f $ I t I ( t t t q l I l I t t I t I ) I t 1 l I t I t I ( t. I ¢ I S $ t I L f I I i ¢ t I k 4 b ) ¶ l ( I t ) l t l t I ¢ I. t ( i I i i l l t I ¢ t } I I l t I ¢ i É i i I l t I I t t t ). i ¢ L i I ¢ $ l I t I ( i I $ ) I L P I I i ) t I l l I b I l I. É ( i ( ( { É g I 4 i I t t t l t I t t k I I t I I l t l i t t. ( t F [ I t l l ! É I t l i I I I l t I t { ¶ I l i l h 1 k l i. t i i É t S I t t ( I ) f l I } f l I t I t ) b J k ) t 1 \ ) l. ( I É ( l t ¶ l k t i I t k I É I l ¢ k l É l i É t f I E $ l I. III. Communications System the ZCPR3 User. for. Written by. Richard. Marketed and Echelon, 101. Distributed by: Inc. First Street. Los Altos, CA 415/948-3820 Z-Node Central: 415/489-9005. 94022. t ) É } l i I l i t I i t ¢. t t t J I i t t t { t t t t. l j I l ) t I $ t C g l l t. l g I l i t i t É l t t l ¢. ( I P b t l I t I l i ( I Ó. j ¥ I l ¢ r k t K t I k t i. Richard. 1985. Copyright I k l l I t b t t t $ I l ¢ :. Conn. t I t l É l f i I t t t t ¢. f g á ) ¢ t ) t \ } t t I t. t i I l t l t } ¢ t i t } t. i É t I { I l l t l É t I t. L ) t g I l t t I l k l É l. \ t i k l i I J t } I E I t. I I $ I I P t } t i I l i C. I l i I t j l b $ I t t i P. S I I i i } h i l $ ( t É I. i t E k ! i t ) ¢ t \ } 1 t. t t | t t t I I $ I I g t I. i t ¶ I \ P l I l l g I Í b. $ 4 ) l t I t I l b I t i l. t I l l I I h I i I t ) k S. I t 1 t t I t I I J k l l l. t t I t t I l I t l I E I I. f ¢ I I \ Í t i I I I l L ). Conn I t I i É i t I t I $ t \ I. I l l h 1 f l t ¢ \ F l t B. 1 ! t t t t l ( I $ t i Í l. I f t I I I i t i l É i t g. É i ¢ l l t É t k i i j i t. ::::::::::::::::::::::::::::: :::::::::::::::::::::::::::n ::::::::::::::::::::::::::::: :::m::::::::::::::::::n::: ::::::::::::::::::::::::::::: ::::::::::::::::):::::::::::: :::::::::::::::::::)::::::)::. i É l i 1 ¢ | É I É t I 1 I. : :. : :. k I t t É t I i I 1 I I t t I t t \ l I i t t i I t É l l I i { t 3 l ¢ I S { ( F i { ¢ t i | i j t i t t t E t i t l l : :. t I t I I i k k. I F S i 6 i i i l l I i 1 6 I l i. I { I P ( l l t ( l t t É i I l i I ) t ) t l ? t i. l f y i t l 1 Í I l I I I ) i I I I } É t I i I t i. t l t ( I t t i t t t ¢ É I k I l I I t b l t I { l. 4 k l I I i f t f h l L \ i J 1 I S j É } É } t t l. l ( t } ( i | t t É l I t I I h t | l t E l l L l (. I t ( i I é f i \ á É I I t I t ? b ) t I I ! t t I. b i t i t S l l t I I k É i ¶ ¢ l t I I f I t l } t. É § i t l ¢ I i I i t { f b É ( ) i i t J l I t P I. I f t { L t I l t I I $ É K t I É G t É $ i P t } É. I f t f j l t I I I i ( g t l l I i I t t I I t l (. I E I t t ) ¢ É I I i É i i I I f l t I ) l I É 1 t. P I i l ) I t I I L t i } i t I t É i l I l l l t l. t t i t t $ I i f ¢ i t É i l I t i I I g } i l I I. I S f I I ( l } t $ é L I I É j l I K l b i ? t t t. j } t i t i I l t I l I i i t É t i t [ g l l I I l. ¢ { l ( i t f I t t { l i \ l l l I } L g I ! l b l. E k É t i I ¢ t h É l ¢ I l I I I i l l ( I j ; I É. t f l g ¶ { t I 1 ) t t I l I k i i t l g l ) t I É. l ( I t t ( l l É l t f I b t { l j k ( l t ) t r I. í l I É $ É t ( $ t I ¢ t l t É | t I I l l 3 k j j. I l I q l ( É l É i 1 I I t I I t g I I } t I I I !. h C É ¢ É t t C ( ) i k t i I t i l k 4 É ( I I } l. t l I i k I \ S P t $ I I l I I I t t l J I I t J l. g l I t I $ l l I t I b l t t É I I ( I t l } t ¢ I. I t É ¢ i É f { { t I i h i i I É k t É : f t t I ¶. t l t t i L t ( t t l t l \ I i t Í $ t \ I { I É I. I t I t \ l t t t i t t É i t i | ; l ) ! t t l i É. I I É t t l I ¢ f $ É I ( l f l I I } I I $ t \ f l. l t t t I S h l ( É 1 t t ¢ I I l t t ) t i t t I t.

(5) T. I. 2.. The TERM. TERM. A. B. L. C O N T. O F. E. E N T. S. III System...................................1-l Coneepts...............................2-1. Basie Use of Menus vs. III. Command 2.1. Lines....................2-1 2.2. Applications Environments........................2-2 2.3. Remote Access Systems and ZCPR3..................2-3 2.4. Input/Output Packages on a Remote Access System..2-4 2.4.1. "Normal" User Environment.................2-4 2.4.2. "Privileged" User Environment.............2-6 2.4.3. SYSOP Environment.........................2-6 2.4.4. Booting Environment.......................2-6 2.4.5. User-to-üser Environrnent..................2-7 2.4.6. Summary of Console Devices................2-7 Time Logging 2.5. on a Remote Access System...........2-8 Comm 2.6. 2.7. Result Codes....................................2-10. Sets........................................2-9. 3.. Summary.......................................3-1 Communication....................................3-3 3.1.1. T3FILER...................................3-4 3.1.2. T3FLUSH...................................3-7 3.1.3. T3SEND...................................Á3-8 3.1.4. T3TERM...................................Á3-9 3.1.5. T3TERMB..................................3-10 3.1.6. T3TEST...................................3-11 Telephone Controi...............................3-12 3.2.1.. Command. 3.1.. 3.2.. 3.2.2. 3.2.3. 3.2.4.. T3ANSWER"................................3-12 T3DIAL* .3-13 T3HANGUP*................................3-14 0 0 * 0 0 0 * * 0 0 0 6 0 e 0 0 0 0 0 e e 0 0 0 e » 0 0 © e . » O. T3INIT*..................................3-15 3.3. Access Control..................................3-16 3.3.1. T3LOGCHG.................................3-16 3.3.2. T3LOGCK..................................3-17 3.3.3. T3LOGIN..................................3-18 3.4. Command File Processing.........................3-23 3.4.1. T3DO.....................................3-23 3.4.2. T3MONRPT.................................3-27 3.4.3. T3VIEW...................................3-27 3.5. Communications Server...........................3-29 3.5.1. T3MASTER.................................3-29 3.5.2. T3SERVER.................................3-32 3.6. Editors.........................................3-33 3.6.1. EDCST....................................3-33 3.6.2. EDTMC....................................3-35 3.6.3. EDTXD....................................3-35 3.6.4. EDXLT....................................3-36 3.7. Miscellaneous...................................3-38 3.7.1. 4. Examples of T3NOTE...................................3-38 Use of the TERM System................4-1 4.1. Initia1ization...................................4-1 4.2. Calling a Computer...............................4-1 4.3. Answering the Te.lephone..........................4-3 4.4. Transferring. III. Files...............................4-5. i.

(6) 5.. Installation..........................................5—1 5.1. Installation Instructions........................5-1 5.2. T3INS............................................5-2 5.2.1. Key Variables.............................5-3 5.2.2. Variables that modify the Corm. Set........5-3 for T3NOTE......................5-4 for T3LOGIN.....................5-5 5.3. T3SELMOD.........................................5-5 5.4. Discussion of Sample Modem Overjay...............5-6 Sample Telephone 5.2.3. Variables 5.2.4. Variables. 5.5. Discussion of. Interface. Overlay.5-8. APPENDICES. A.. References............................................A—1 ZCPR3 and Z-System...............................A-l A.2. CP/M.............................................A-2 A.3. Other............................................A-2 A.4. Addresses of Some Publishers.....................A-2 Supported Devíces by T3MODCAP I.I.....................B-1 B.1. Ampro Little Bd..................................B-2 B.2. Apple-Cat........................................B-2 B.3. Apple Mountain...................................B-2 B.4. Big Board A.l.. B.. B.5. B.6. B.7. B.8. B.9.. I......................................B-2 2719.........................................B-2 Datapoint 1560...................................B-3 CCS. QX-1O......................................B-3 MM1OO......................................B-3 H89........................................B-3 H1OO......................................B-3 Interfacer 3/4..................................B-3 Kaypro..........................................B-4 MicroDecision,R1................................B-4 MicroDecision,R2................................B-4 Phillips P200OC.................................B-4 SDS Z80-SIO.....................................B-4 Seattle SCP400/0................................B-4 Seattle SCP400/1................................B-5 Seattle SCP400/2................................B-5 Seattle SCP400/3................................B-5 Super Quad/Six..................................B-5 Superbrain......................................B-5 System Support 1................................B-5 Televideo TS-802................................B-5 TRS-80 Model. Epson Hayes Heath B.1O. Heath. B.1l. B.12. B.13. B.14. B.15. B.l6. B.17. B.l8. B.19. B.20. B.21. B.22. B.23. B.24. B.25. B.26. TRS-80 Model B.27. TRS-80 Model B.28. TRS-80 Model B.29. US Robotics S1OO................................B-6 B.30. ZORBA...........................................B-6 C. Listíngs of Sample Overlays...........................C-l. I..................................B-5 II.................................B-5 III................................B-5 IV.................................B-5. D.. Sample Modem C.l. Overlay.............................C-l C.2. Sample Telephone Interface Overlay...............C-4 Distribution Files....................................D-l I N D E X.........................................Index-l. ii.

(7) TERM. Introduction. I.. The. TERM. III. III. System. system which runs under the Zis a communications SYstem (the ZCPR3 command with, optionally, the ZRIXJS processor TERM CP/M BDOS replacement). consists of over twenty which provide the capabilities: following programs. III. TERM. III. o. interactive communication. o. reliable. o. control of an auto-dial/auto-answer. o. access control for remote system applications (the user's system can be set up to be dialed into by outside users). o. rapid and easy reconfiguration of the communications environment for different applications. file transfer remoteeomputers. with remotecomputer. between. the user's. systsm. computer. and. modem. with ZCPR3 and provides the Z-System capability that can be adapted to a user with wide variety of needs and can be used in conjunction with his other Z-System tools. The TERM III programs return their result codes (which indicate the success or failure of their operation) TERM in a manner which can be examined using the IF command. III and be employed in menus aliases that provide programs can commands and applications which are tailored to a environments user's specific needs. TERM provided by a Zprograms rely upon the environment Some aspects System for III support. support include: of this TERM. is integrated III a communications. o. All screen-oriented displays obtain terminal-specific information from the ZCPR3 TCAP.. o. of the programs return result codes (via the Program Error Message in most cases) through the ZCPR3 Environment Descriptor.. o. File references. Many. reference o. Path searches. required. o. forms or. can. (DIR. be. or. direct. prefixed with the. ZCPR3. DU).. ROOT. Messages and other attributes are used extensively.. accesses. of the. directory. are employed as ZCPR3. environment. large number of features were built into the TERM of use and inorder to provide the user with Ease requirements. adaptability to different communications flexibility of A. III. System. l. 1.

(8) Introduction. TERM. III. use and An. user-friendliness of the design. are also key elements the outline of features of the TERM III System follows: 1.. Interactive Comnunieations o terminal rnode - the user "feels" like he is direct}y connected to the remote computer via a terminal rnode the screen is divided, with o conversation incoming characters printed in the top half and outgoing characters printed in the bottom half o translation tables - all incoming and outgoing characters pass through translation tables, masking of supporting parity transmissions, o o o. o. o. 2.. selected characters (such as escape sequences), and using different character sets (such as EBCDIC) strings can be macro tables - ten predefined. transmitted at will printer output - displayed characters can be queued to the printer buffer load and dump - displayed characters can be stored in a rrternory buffer and dumped to disk, printer, or the remote computer be XON/XOFF recording - displayed characters can stored in a disk file, using XON/XOFF handshaking to ensure no loss of data dynamic setting and displaying of environment variables for ease of selection of features. File Transfer several. communications protocols available, including with Checksum, XMODEM with crc, and KERMIT o batch file transfer (sending lists of files using wild cards) available with some protocols o comnunications server - remote system access and control from the user's system without the need for the user to issue commands to the remote system directly o. XMODEM. 3.. Mod«n o. o o o. Control answer the telephone and drop into the Z-System environment with a result code (phone rang or user abort) dial the telephone based on mnemonics or specific telephone numbers rotary dialing - dial all numbers in a directory in sequence until one answers multiple telephone nuñber directories. file. l-2.

(9) TERM. Introduction 4. Access Control o UJGIN program o selecting the based on the. 5. Environment o use of o o. attributes of a user's environment user's ID; attributes include:. search path - ZCPR3 System Segments loaded corrunand line startup - various Environment Descriptor data - wheel byte and quiet flag loading a TCAP entry based on the user's ID command. o. III. Configuration. Sets (Ccmmunications Sets) which define the aspects of an environment and can be quickly loaded as needed screen-oriented editors to create and tailor Corm Sets easily procedure with automated program installation Comm. installation. configuration. files. TERM System was designed to meet the communications the serious Z-System user, and knowledge of the Z-System of The reader is is required to make effective use of TERM referred to ZCPR3: The Manual for a detailed discussion of ZCPR3 and to Echelon, Inc., and its newsletters and other supporting See the References for information on the Z-System. activities appendix for more information. This document is designed to provide the reader with System are information on how the programs in the TERM intended to be used under a Z-System. includes information on and System and how TERM the basic concepts of the TERM ZCPR3 can work together. Details on each program in the TERM System are presented, including details on installation. The information in this document is presented with the assumption that the reader is currently using ZCPR3 and is familiar with many of its fundamental concepts. The use of aliases, menus, flow control commands (IF, ELSE, FI), and the command See the search path should be understood by the reader. references for help in finding information on these and other The. needs. III. III.. III. topics.. i-3. It. III. III. III.

(10) TERM. Concepts. 2.. TERM. III. Ba8ic. III. Concepts. This. chapter discusses several concepts that are fundamental to the design of the TERM III System. The reader must understand these ideas in order to use TERM effectively. III these surnmary, concepts are: In o Use of Menus vs Command Lines o Applications Environments o Remote Access Systems and ZCPR3 Packages on a Remote o Input/Output o Time Logging on a Rernote Access o Comm Sets Codes o Result. 2.1.. Use. of. Menus. Command. vs. Access System System. Lines. Most of the TERM provide the user with the programs option of issuing commands III from a menu or directly from a command line. The key functions of these programs can be invoked by either method, and the method employed generally depends on the user's application. Command lines are useful when menus or aliases are employed. For instance, the TERM System can be set up to perform operations like this:. III. Dial the Telephone. If. answered Log into. it. end Test System. if. If. for System. for File F2 (*) File available Get File F2 from System X. F2. Note lack end. if. Hangup. of File. the Telephone. else Note. if. (*). X. else. end. X. (*) File FI to System (*) transfer failed Note failure of transfer (*). Send. If. Number. failure. F2. X. {*). (*). (*). (*). above corresponds to one line of pseudo-code listed The Z-System to ZCPR3. is used as the executive for the Those lines marked with an processing of this command stream. asterisk (*) are performed by TERM III System commands. This command sequence could have been invoked by a menu, alias, or command file (ZEX or SUB) under the Z-System. Command lines are also handy when the user is at the ZCPR3 command level and wants to issue a command to perform a function Each. command. 2-l.

(11) Concepts. TERM. III. the remote system while staying at the command level for his next command. The fojjowing scenarios illustrate this (steps done using TERM System commands are marked with an asterisk): on. III. Scenario. I:. User wants. to send. file. to remote system. Send. command to display dir on remote system (*) Look at results (*) Based on results, send command to change name (") of a file on the remote system duplicates be sent the name of the to Send the local file (*). if it. file. Scenario. 2: User wants. Send. to get. to display. command. file. a. dir. Look at results (*) Look for disk with enough Get the remote to the. on remote. a. remote system szsystem. ("). for file target disk (*). room. file. 2.2.. from. Applications EnvirOnments The. TERM. mind: o. III. System. use as a users. with. o. o. was. designed. with three applications in. Access System (RAS) dial into this system, interact and transfer prograns into and Remote. it,. out of use as an originating Comrnuncations System the user dials out to other computers and corrununicates with them, performing functions which include file transfers use as a Configuration System the user configures the attributes of the other two types of systems. it. Each type of system requires only some of the files that The other files can be omitted, make up the TERM System. savings a resulting in in disk space and an increase in security (the users of the RAS cannot run programs that can do damage). Some files associated with these systems are:. III. Remote. Access Systems (Z-NODES} the telephone - to answer hang the telephone up to T3INIT (optional) to init the interfaces T3LCGCHG a allow user to change his password - to terminal definition or log T3IAGIN - to log users in T3NOTE of users - to send activity T3SERVER and receive files to T3ANSWER T3HANGUP. Systems Used T3DIAL T3INIT. to Call Out the telephone, answer the - to dial phone, and hang up the phone - (optional) to init the interfaces 2-2.

(12) TERM. Concepts T3TERM or T3TERMB T3MASTER. Systems Used T3INS T3LCGCK T3TEST EDCST EDTMC EDTXD EDXLT. 2.3.. Remote. III. to communicate - T3FILER. or. T3SERVER) - to communicate (with to Establish Environments in programs install Corm SetsIÁX3IN.TXT - to check syntax of files - to test MODEM.BIN seginents - to Comn Set editor - Macro Names Editor - Telephone Editor Directory Table Editor Translation -. Access Systems and. ZCPR3. and the TERM System can integrate to create a The aspects of such an (RAS). System Remote Access secure include: which enhance security integration its accessed o Path search can restrict the commands by a user o Disallowing the DU form and permitting the DIR only automatically form of directory reference provides password protection on directories ZCPR3 cormands pay attention to the Wheel o Many byte, and privileged functions are disabled the Wheel byte is turned off ZCPR3. III. if. commands are resolved by searching along a command COM be Only those path. files along the path rnay the Hence, by carefully placing harmless commands in directories along the path, the user is not granted access to commands which could do damage. ZCPR3 allows the user to access directories by disk-user The references disk-user references feature can be or by name. disabled, leaving only the name. This presents the SYSOP with two major advantages: o named directories can have passwords associated with them, and these passwords must be given in order to complete the directory reference which are named can be accessed; o only directories hence, but does a directory contains files not have a name, the files in cannot be accessed The PATH and LDR commands are used to change the path and the load different named directories (or environment descriptors). Access to these commands by a normal user has the EX)tential Consequently, the TERM System of causing damage. provides these functions a program called T3IÁGIN which performs and more without requiring a PATH or LDR command to be available. When T3LOGIN executes, its only inputs from the user are a and password. searches through a LOGIN.TXT name user processing environment definition commands and looking for a user When a match name match. is found, the environment is - password T3LOGIN from the LOGIN.TXT configured by as instructed Aspects of the ZCPR3 environment which can be configured by ZCPR3. search executed.. if. it. III. file,. It. file.. T3LCGIN. include:. 2_3.

(13) Concepts. TERM. o o. o o. III. the cormand search path which system segments (including named directory FCPs, RCPs, and lOPs) are loaded in files, the user's environrnent whether DU forms are allowed whether the Wheel byte is set. Consequently, the user can freely access and run T3LCGIN at Who he logs both login time and any time during his session. in The other ZCPR3 the attributes of his environment. as determines used at cold of LDR, which is programs (with the exception boot time) used to manipulate the user's environment can be remved.. still. 2.4.. Input/Output. Packages. a Remote. on. Access System. Input/Output Packages (lOPs) are segments of the Z-System which contain groups of Input/Output device drivers for the A Z-System Console, Reader, Punch, and List logical devices. may be implemented with or without lOPs. For a Remote AccesS System, lOPs provide a convenient mechanism to further enhance the operation and security of the system as a whole. Different I/O environments are required for different types of communications applications of a Z-System. Sorne of the eotnrrion I/O environments include: o c). o o o. the environtnent of a "normal" user of a RAS the environment of a "privileged" user of a RAS the environment of a SYSOP calling into his RAS the "booting" environment when a RAS is cold-booting the user-to-user environment when a person is dialing into a Z-System that is attended by its owner, and the two people are going to work together through the Z-System. 2.4.1. "Normal" User Environment user is one which should not be allowed access to These that can disrupt the operation of the Z-System. "dangerous" corrtrnands but may be physieally removed from the RAS, certain classes of users, such as a SYSOP who is dialing into his need them. The Z-System may system to perform maintenance, provides mechanisms which combine to protect the two convenient by the "normal" user: "dangerous" commands from execution A commands. o. "normal". comtnand. search. path. it. o. for. "normal" user can be set up does not include the directory in such a way that commands "dangerous" the containing and the the DU (Disk/User) form may be disabled, "dangerous" comnands may be placed a directory which in has a name and password associated with or a directory which does not have a name the. a. it. the. The TERM Z-System's. program III environment. T3LOGIN has the ability to configure based on the user's name and password.. 2-4.

(14) TERM. Concepts. III. accepts as inputONLY auser name andpassword, and, the pair is verified, then an environment can be established. Passwords can be omitted from user names in the LCGIN.TXT file, permitting T3LOGIN to support commands like "T3LOGIN INIT." T3LCGIN can be viewed not only as a program to control access to environment the system, but also as a general-purpose controller, where operational environments are related to a single keyword. may be wise to employtwo copies of T3LOGIN for this typeof It application so that users cannot log in using user names like INIT; one T3LOGIN controls access, and a second (under a different name) controls the environment via keywords. T3LOGIN has the ability to affect the entire Z-System, including the command search path and the named directory Consequently, T3LOGIN is intended to be one of the segment. when should be a user dials into a RAS and programs run first available publically to all users. T3LOGIN establishes the user's environment, and the user can later change his environment (assuming commands are properly that al! of the "dangerous" protected) only by running T3IRGIN and providing a different user. if. T3LOGIN. it. and password. communications environment of the "normal" user of a RAS which is one in no device selection on the part of the user is allowed, the printer is not available (typing a ^P does nothing), and the console is timed and monitored for loss of carrier. An lOP can accomodate this by containing a NULL device (which a performs a simple return rather than outputting a character) as REMOTE) the which monitors printer and a console device (call elapsed user's carrier detect line and monitors time counter. an The Input/Output Package (lOP) can contain a List device named NULL and a console device named REMOTE, and T3LOGIN has the these by devices name. to select ability The console device REMOTE may be extended to include a monitor for activity from a CRT. This monitor would look for a special character to come in from the CRT and switch the lOP name. The. it. console to another device. This other console device, called (forREMOTE Monitor), ties this CRT to the modem being used by the caller. This tie-in could take avariety of forms, with two common forms being: REMOTEM. 1. the CRT and could come and output. in parallel. 2. the. modem. from would. could. share the I/O; le, input either the CRT or the modem, go to both the CRT and modem. could dominate the I/O; le, input could only from the CRT and output would go to both the CRT and modem CRT. come. REMOTE could a further extension, look for two different CRT, REMOTEM1, from the and which provides for the inputs select shared I/O of the first case (above), or REMOTEM2, which provides for the CRT-dominated í/O of the second case. As. 2-5.

(15) Concepts. TERM. III. 2.4.2. "Privileged" User Environment of allowing the SYSOP to flexible to the pointEACH USER. define a different environment for Consequently, be each there can as many classes of privileged users as desired, class having different capabilities and Z-System environments. have command-search path A and namedFor example, T3LOGIN. is. class can another class can have command-search path while l The B and named-directory SYSOP himself can have a third set 2. comnand-search path and named-directory set. The lOP can further support this by providing another type REMOTENT of REMOTE console device. This console (call for No Timeout) Remote is like the one before, except that the elapsed time is not monitored. Consequently, one or more classes of privileged users can be established which have no time restriction on the RAS. directory set. one. it. 2.4.3.. SYSOP. Environment. can enter the system as a remote or a local user in (call or direct line). It is a logical extension of the concepts presented above to allow for one or more SYSOP As a minimum, would environments. the local SYSOP environment CRT) which does not assign the console to a device (call monitor the elapsed time or carrier and have the ability to SYSOP The. SYSOP. it. reboot. the. REMOTENT. problem. Also, the remote system. as the console so that time for the SYSOP.. 2.4.4. Booting. environment limits would. would use not be a. Environment. good way to ensure that a Z-System environment is properly each have a Z-System in the time logs is to initialized user This can environment cold boot when a user hangs up on the which of disrupt a modem in the extreme, however, text all is normally sent during the cold boot process is sent to the modem. For this reason, is recommended that the output console driver which is employed during cold boot be a NULL No output console (like the NULL printer). is sent to the modem. The cold boot sequence could consist of the following steps: A. if. it.. it. console output driver which is null system segments, and have the lOP come up with a NULL console output driver 3. set up environment attributes as desired and change the path to not include directories which (we are now in "dangerous" cornmands contain a "normal" user mode); T3IRGIN could be used do this as an environment controller (like to "T3IÁJGIN INIT") 4. run T3ANSWER to answer the phone; the console input driver should allow the local CRT to abort T3ANSWER he so the SYSOP can take control desires 1. use 2. load. BIOS. if. 2-6.

(16) III. TERM. Concepts. (even the after T3ANSWER terminates should log in, or this rriay be skipped for the SYSOP, but the environment for theT3IÁJGIN SYSOP may not be properly established is skipped) 6. exit to the Z-System from T3IEGIN or delay and then reboot login failed (abort command be a delay/reboot sequence) T3LCGIN could from 5. run. T3LCGIN. SYSOP. if. if. of T3LQGIN in step 5 results in the complete establishment of the user's environment based on his user name The. execution. and password.. 2.4.5. User-to-User. Environment. user may wish to configure his host computer to allow another person to call in and interact with him through the one An lOP console device for this scenario would be similar system. REMOTEMI (both consoles share equally) or REMOTEM2 (the user's to console only provides input and both consoles view the output) except that the modemcarrier wouldbe monitored and output to and input from the modem would be suspended the carrier was dropped. problems with modem interaction on loss This prevents of carrier from occurring. A. if. 2.4.6.. Summary. The. lOP. of Console Devices provides. a. ZCPR3, the BIOS. l.. flexibility. not. found. under conventional. of device I/O in the BIOS. While designing found the need for the lOP to be pronounced. Relying on for all the device I/O support was too restrictive:. implementations. I. the. had to tight on space BIOS. fit. on. the. system. tracks, so. it. 2. the BIOS had no hooks to provide for rnore than console, four reader, four punch, and four devices. was. four. list. By. realized: 1.. implementing the lOP concept, several advantages. were. buffer of IK or 2k outside the BIOS which contained drivers would remove these all of the(or I/O device but the simplest drivers of them) from the all BIOS, thereby shrinking the BIOS, and simultaneously provide more space in which to implement more complex device drivers 2. the I/O Byte of CP/M need no longer be employed; the lOP jump table can be a mirror of the BIOS jump table with extensions to provide for other mechanisms to select the devices (such as by NAME rather than bit-field in a. a byte) 3. more than to each. four physical device drivers can be assigned logical device. 2-7.

(17) Concepts. TERM. III. The lOP conceptcanbeextendedand employed ina Z-System As outlined which supports TERM in this section, the lOP for such a system can support devices such as the following:. III.. printer. NULL REMOTE. o. console monitors the carrier detect or otherwise restart8 the. line and reboots system. carrier is lost. if. the. monitors an elapsed time counter and reboots the or otherwise restarts the system time elapses the CRT line for one or more command o monitors characters, and invokes one or more other devices based on these corrurands REMOTEM1 con3ole the carrier detect line like REMOTE o ínonitors c) may or may not monitor elapsed time from the CRT and modem in o input comes parallel and goes to the CRT and modem o. if. in parallel. REMOTEM2 o. console. like. REMOTEMI, CRT. REMOTEM3. but. input. only. comes. from the. console. but carrier drops, input from and output to the modem is s: unply ignored (only the CRT is active when the modem carrier drops) REMOTENT console but does not monitor elapsed o like REMOTE, o. CRT. like. console o. no. if. RE6KYI'EM1,. tine. monitoring;. CRT. input and output. only. should serve to This list is by no means complete, but ideas what reader on give the some initial types of device drivers he would like to set up in his lOP.. it. 2.5.. Time Logging. on. a Remote. Access System. System programs serve to replace BYE, a p©ptüar used program to run Remote Access Systems, in its entirety. Almost. The one aspect of bye which has not been addressed by TERM SYstem programs is that of user time directly logging. is frequently desirable to track the amount of tirrte. a user spends on a system and to kick him off after an hour. Time logging can be shown by the following pseudo code: The. TERM. It. III. III. 2_8. i.

(18) TERM. Concepts At user login, start the Throughout the session,. timer. III. it. timer and reset to zero periodically check the. user logs out, turn off the tinier If the the timer expires, break the connection, If optionally pause for a period of tine, turn. off. the. timer. then, must be polled throughout the user's done by some aspect of the resident session, this is best This segment of the system (such as BYE). system or an executive such as during a check moments, should the timer at quiescent wait for output. The solution proposed in this document for the implementation of the timer is as a part of an I/O Package. This I/O Package (lOP) would provide a device driver which uses the Modem The REMOTE device as a console and monitors the timer. but there are other discussed above is one such implementation, function (or printer record possibilities. The console record lOP function, for that matter) of the can be used to turn the and when a user Hence, logs in, a part of the timer on off.command would be user's default line to turn on the timer ("RECORD ON" command) and CONSOLE to select the correct MODEM device ("DEV CONSOLE TMODEM" command, where TMODEM is the Modem RECORD CONSOLE a by For the with timer controlled directives). sake of security, T3L'CGIN can perform the same functions as the The. timer,. and. DEV. 2.6.. and. RECORD. Comm. commands.. Sets. All programs in the. TERM System Comm Sets. At a Comm Set. III. which communicate. with. a. each. remote computer use installation time, program is loaded with (the built-in Comm Set) that what to do when is invoked. The options at invocation are: 1. load the Corm Set named on the comnand line 2. load a Comm Set from disk 3. use the built-in Corm Set. tells it. it. Al! programs used for communication, such as T3FILER and contain a Comm Set within themselves (the built-in Comm Upon Set). execution, these programs examine certain flags in Comm Set, and may perform one of the following three Comm this Set selection functions: 1. load a Corm Set specified on the conunand line 2. no Corm Set is specified on the command line, load a Corm Set specified in the built-in Comm the IIDAD (Initial Load) flag is set in Set T3TERM,. if. if Corm Set built-in j-f no Comm Set l-S spec1f/ed on use the built-in Comm Set if is not set the. 3.. At. this point, the. communication Comm Set is. program called the. Comm Set which Comm Set used Comm Set.. is default the. 2_9. the the. command ILOAD. líne, flag. is present within the This for the session.. ..

(19) TERM. Concepts. If. III. Set is explicitly naiued on the command line (2) and (3) are overridden. a options Additionally, I), ZCPR3 Comm Set is loadedby searching along command search the path or by logging into a specific directory, as per a flag in The the Comm Set which was installed in the body of the program. Comm chapter on Installation discusses the Set loading options in more detail. The Comm Set is a data block (stored in a of type CST file which contains details on the or stored directly in a program) Some of these details are: communications environment. a. Comm. (option. o. o o. o o o o o o. Input Translation Table - all incoming characters this table and possibly translated into other characters as indicated (parity can be dropped, EBCDIC can be translated to ASCII, lower—case to upper_case, etc) an Output Translation Table - all outgoing characters are passed through this table the Macro Buffer - contains ten text strings which can be transmitted by striking a single digit from certain programs the Exit Character - the character used to attract the attention of the host TERM program the Break Character the character IIIused to tell the TERM program to send a break if can III the Echo Flag - instructs the TERM program to III echo outgoing characters to the user commands and options for various TERM III programs commands which control the Corm Set loading as an. it. described above names of various TERM. Comm Sets commands.. Editor 2.7.. Result. are passed through. are. III. further described. programs. and data. in the section. on. files Comm. Set. Codes. return Result Codes in the examined by ZCPR3 tools and forní of messages The "Program Error" message is the most common acted upon. and Result Code returned, can be conveniently picked up by the ERROR code command For example, IF in most applications. be easily employed an the alias in following can sequences like or menu: Many. of the. ZCPR3. TERM. programs III which can. be. it. Corrunand TERM "ERROR IF commands. III. :. Comrnand. succeeded. ELSE eomnands. :. Command. failed. FI. :. End. 2-10. of IF.

(20) TERM. Concepts. III. One good practical example of this is with T3DIAL, the program used to dial the telephone: : T3DIAL FRED Dial the indicated number : RCP/M "ERROR Answered IF : T3FILER T FRED Enter T3FIIJER with Comm Set FRED.CST : ELSE No Answer : ECHO NO ANSWER Say so FI. The T3LOGIN program can return a large number of result and these codes are determined by the ID of the user that logged The "Program code in. Error" can be set as before, just T3LCGIN but so can the Register values. can make radical changes depending system the environment, to on the user's ID. See the detailed description of the T3LCGIN program for more details.. codes,. 1 1.

(21) Cormand. 3.. TERM. Surmary. Cnd. III. Simmary. This chapter and the chapter on installation present all of the The programs System. which make up the TERM are programs grouped into functional areas and alphabetized within these sections:. III. o Communication Control o Telephone o Access Control Processing o Command o Cormunications Server o o Miscellaneous o. File. Editors. Installation. Each. program Program Syntax. in the following fashion:. is presented. Name. ¥. Brief Description. and Notes Discussion Result Codes Returned Examples of Use. Quantities placed in [J's are optional. COMMAND loption [filenamel). can take. these. forms:. COMMAND CCNÍMAND. COMMAND. while can. For example,. option option filename. íoptionl [filenamel of these:. COMMAND. be. any. CCMMAND COMMAND COMMAND COMMAND. option. filename. option filename. Notes: commands whose names are followed by an asterisk (*) require a DC Hayes Smartmodem to operate. These commands and T3INIT. are T3ANSWER, T3DIAL, T3HANGUP, 2. All commands be executed may with the form "COMMAND and documentation summary //" to print3. an IDCOM built-in supplied except for T3INS.COM with the All files be TERM before System must installed use by running T3INS on them. 4. All commands respond to the Quiet Flag. 5. The form "^c" is used consistently throughout this document to represent the two-character sequence consisting of a caret followed by a letter. Some commands require this twocharacter sequence to be used in order to obtain control 1.. Those. III. 3-1.

(22) Cormand. Sumnary. TERM. III. character sequence to be used in order to obtain control characters, where ^c (without the quotes) represents a control character (like ^A). 6. The term host computer refers to the computer Erorn The employed by the user. the host computer, out user dials The the example. computer remote computer dialed into by for is the user.. P. 3_2.

(23) Ccmriand. 3.1.. Swmary. TERM. - Comminication. III. Communication. which are System programs This section covers TERM mode, a employed for user communication (via terminal covered The mode, in programs conversation or file transfer). this section are:. III. T3FILER Suppcmts Terminal. Conversation. Mode,. and. Mode,. File. Transfer. T3FLUSH. T3SEND. from the remote incoming characters Simply flushes received system until no characters for a certain are period of tiine. Sends T3TERM. a corrunand. line to the remote system. Terminal. Mode. Supports. Terminal. Mode. Supports. simple. Supports. and Conversation. Mode. T3TERMB T3T£ST. character. Terminal Mode Terminal Mode is the "normal" a user and a remote computer. Terminal Mode is more involved. think.. I/O between System,. of communication Under the TERM than what one would means. III normally. For each outgoing character, the following sequence of takes place: from the user Input the character I. 2. Send through the Output Translation Table and then to the modem 3. local echo is on, Send the character to the console Queue the character on) to the printer on) Store the character in the memory buffer For each incoming character, the following sequence of events takes place: 1. Input the character from the modem Send 2. through the Input Translation Table and then to the console 3. Queue the character on) to the printer on) Store the character in the memory buffer The three communications T3FILER, T3TERM, and programs, T3TERMB, do not all possess the same features for incoming and The following table sumrnarizes: outgoing character processing. events. it. If. (if. (if. it. (if. Program T3FILER. Available Features PlerrKjrY Printer Buffer Y Y. T3TERM T3TERMB. Conversation. (if. N Y Y. N. Mode. Conversation Mode is the split-screen communication and T3TERMB available in the T3FILER, T3TERM, programs. 3_3. mode The.

(24) Comnand. Stumary. - Ccmnunication. TERM. III. characters. coming in from the remote computer appear in the upper half of the screen, and the characters typed by the user appear Each half of the display uses eight (8) in the lower half. lines, and wrap-around from top to bottom occurs. While the user is communicating in this fashion, the following commands are available to him: Command. Comnents. Exit Char Issue ^0. Menu. Command. distribution. Set Transmit. Line. (^E is used programs) Feed. in the. option. this option is on, each RETURN typed is sent as CRLF; if off, is sent as CR; this is for who are in a normal mode terminal. If. by the user each RETURN remote users ^R ^X ^Y ^Z. Clear Clear Clear Clear. screen the 8 SEND lines the 8 RECEIVE lines both sets of lines. Exit Character While in the Terminal or Conversation Modes, the Exit Character is used to bring up a program's prompt, thereby The Y allowing the user to issue a command to the program. command (available in T3FILER, T3TERM, and T3TERMB) can be used for proves to be inconvenient to change the Exit Character if the editor being used or some such reason.. it. 3.1.1. T3FILER Syntax (Form T3FILER Ioption [filenamel) Option (Select only one): C Mode Enter Conversation - Enter F Menu Transfer File - Enter Main M Menu - Enter Terminal Mode T Filename: Name of Comm Set to load SYñtax (Form .2_)_: T3FILER Isroptions tEilenamejl SROptions (Select only one): R - Receive File. l):. File (Select zero or more, immediately Suboptions or S): after 1..6 - Select Protocol B Batch File Transfer - Completion Alarm - Monitor Transfer - Quiet Transfer (only Diagnostics) Filename: Name of file to send or receive; DIR or DU form allowed S. Send. R. PKJDEM7. C. M. Q. Brief Description: T3FILER is used. for. normal. 3_4. communication. and. to send and.

(25) Comnand. Suimary. - Cormunication. TERM. III. (like aModes terminal interface) and are available for (split-screen) communication, and six file transfer protocols are available for sending and receiving files. The Main Menu provides a group T3FILER contains two menus. The File of commands similar to those provided under T3TERM. Transfer menu allows option selection for the transfer and sending and receiving files. receive files. Conversation. Terminal. Discussion and Notes: The following commands are available from the Main Menu in T3FILER. The user types the Exit Character from Terminal or modes Conversation This causes in order to issue these commands. Once at the command prompt, thecommandprompt to appear. the the screen and displays the menu. space bar or ^R refreshes Command. 0..9 @. Corntnent Send. 0..9 text of Macro to 9 is transmitted (thru the translation tables) to the remote. Macro Text The. Send. O. computer Exit Char. Exit character is sent to the remote computer (this provides the ability to send the Exit character) Mode Enter Conversation This is the split-screen mode Toggle Local Echo All characters typed by the user are sent to his screen along with the characters coming in from the rernote computer Menu Enter File Transfer Get new Comm Set This allows a Corm Set to be loaded Hang up Telephone and exit to Z-System List macros This provides a listing of the macros contained in the current Corm Set Toggle Printer All characters displayed are sent to the LST: device this toggle is enabled Exit to T3DIAL (Telephone Control System) Control is transferred to T3DIAL; T3DIAL can hang up the phone, dial new numbers, and answer the phone Receive a File Receive a using the current settings of the protocol and options The. C. E. F G H. L P. Q. R. if. file. 3-5.

(26) Comnand. Sumnary. Cornmand. TERM. III. Coment Send. S. File. a Send. using the current settings of a the protocol and options Enter Terminal Mode Tool) File Handler (File Manipulation Contrcñ is transferred to a tool like VFILER Exit to Z-System Set Exit Character The Exit character can be changed to any desired 7-bit character Exit and Run ZCPR3 corruriand The user is prompted for a command line, which is run before control returns to Z. T V X Y. Z. The. - Coimunication. following. commands. file. are. available from the File Transfer. menu: Comnand. 1..6 B. C. M. Q. Comment. Select Toggle. File Transfer. Protocol File Transfer File Transfer function allows wild cards to be used in sending files using the MODEM7 protocols Toggle Completion Alarm The Completion Alarm rings a bell when the transfer is finished Toggle Monitor of File Transfer The Monitor function displays the data being transferred is as Quit to Caller (Terminal Mode, Return to the section Mode, Conversation Main Menu) of T3FILER Menu was from which the File Transfer Menu entered, the Transfer File le, from Terminal Mode, Q returns was entered the File to Terminal Mode, while Menu was entered Transfer from the Main Q Menu, returns to the Main Menu Receive a File Receive a file using the options selected; wild cards may be used, depending on the protocol and other options selected MODEM7 Batch The MODEM7 Batch. it. if. if. R. S. X. Send. File. a Send. file Exit to Z-System a. using. the options. selected. 4 (XON/XOFF) Only file transfer protocol the uses The other five protocols do Translation Tables in the Comm Set. not use the Translation Tables. As with the other T3FILER programs used for communication, contains a Comm Set within itself (the built-in Comm Set). Upcm T3FILER examines certain flags in this Comin Set, and execution,. 3-6.

(27) Comnand. Surmary. it may perform functions:. TERM. - Commnication one. of the following. three. Comm. Set. III. selection. 1. load a Corm Set specified on the comnand line 2. no Comm Set is specified on the comnand line, load a Comm Set specified in the built-in Comm the ILOAD (Initial Load) flag is set in Set the built-in Comn Set 3. no Comm Set is specified on the cominand line, the ILOAD flag use the built-in Comm Set is not set. if. if. if. if. the Comm Set which used Set for the session. Comm Set.. this Ec)int,. At. is the default. Comm. the. Codes. Result. Returned: one or more. is present within T3FILER This Comm Set is called. Error message transfers are performed using one of the If file six protocols, the success or failure of the last transfer is reflected in the Program Error message (IF ERROR can be used to detect the status of this message). If no file transfer is done, the Program Error message is not affected. Program. Examples o.f, Use: T3FILER Terminal Mode; either use the built-in Comm -- Enter Set or load the default Comm Set (T3.CST) from disk T MYCST T3FILER Enter Terminal Mode using the Corm Set MYCST.CST -S T3FILER FILE.TXT Send FILE.TXT using the default protocol and other. --. T3FILER. -3.1.2.. settings. R2CM. FILE.TXT Receive FILE.TXT using protocol 2; toggle Completion Alarm and Transfer Monitor from the default. T3FLUSH. SYtítax: T3FLUSH. Options: None M. nn. Ioptionsj Set timeout for 10 seconds Monitor characters received Set timeout for nn (decimal. while. T3FLUSH runs number) seconds. Brief Description: T3FLUSH is used to flush incoming characters from the modern T3FLUSH line. run until the user aborts it, by striking the will ^E) defined Character (normally Exit in the default Comm Set, or characters no received are for a certain number of seconds. until Discussion. and Notes: uses the default Comm Set to determine the Exit Character. This Comm Set is installed by T3INS. Unlike T3FILER T3FLUSH and T3TERM, always uses its built-in Comm Set as the default Comm Set. In the Input character translation is performed by T3FLUSH. interest of keeping T3FLUSH as small as possible, CST ILOAD T3FLUSH. 3-7.

(28) Coímand. Sumnary. (Initial. must be T3INS.. Load. - Comnunication. of. TERM. III. disk) is not supported. T3FLUSH with the proper input translation table by. Comm. installed. Set from. T3FLUSH T3SEND was T3FLUSH. is usually used in conjunction with T3SEND, where used to send a command to a remote system and first used is to wait for the remote system to settle down sending (stop characters to the user) after receiving this command. T3SEND sends an XMODEM command For instance, to the if T3FLUSH remote system, can then be executed to receive the characters sent by and starts waiting transfer to begin). The. stops sending characters until XMODEM from for activity the user (le, the file. XMODEM. time specified. may not necessarily equate to seconds on Each system. particular unit, for example, inay be closer in value to two seconds (le, T3FLUSH 2 would wait for 4 seconds), depending on the overhead imposed by the Z-System's BIOS. a. Result Codes Returned: Examples of Use: T3FLUSH. None. M. characters for -- flush incoming characters T3FLUSH. 10. secs or user. abort; monitor. 2. flush characters for secs or user abort -- XMODEM FILE.TXT;T3FLUSH M3 the comnand FILE.TXT" to the line "XMODEM -- send remote system and then flush and rucmitor the incoming characters until 3 secs or user abort 2. T3SEND. S. S. 3.1.3.. T3SEND. Syntax: T3SEND. Text: The. text. text to. be. sent. Brief Description:. sends text on the command. T3SEND. specified. to the remote system This text is to the remote system. EILE.TXT". line, as in "T3SEND XMODEM S. Discussion. and Notes: method to send text to a remote provides a convenient bothering invoke computer without one of the inain interactive to (T3TERM, T3FILER, communications etc). can be used programs commands be T3FLUSH issued which to allow to in conjunction with the from menu the and a both remote system local system affect or T3SEND. It. alias.. translation tables in the Comm Set within T3SEND used. In order to keep T3SEND as small as possible, are CST ILOAD load of Comm Set from disk) is not supFKjrted. (initial Comm The built-in Set is the only Comm Set used by T3SEND. T3SEND must be installed with the proper output translation table The. output. by T3INS.. T3SEND. enter the characters. sends cmtput may. all be. from. characters. translation send. by. table entering 3_8. line, so they upper-case. Control the two-character "^c". the as. command.

(29) TERM. - Comunication. Coímand. followed by. such as "^M" (caret sequence, " ^ ^ " s e nd s a s ng e " ^ " e i. M). to send. III. a RETURN.. i. ·uj. o. Result Codes Returned: Examples of Use: T3SEND. MODEM. -T3SEND. send. None. R FILE.TXT^M "XMODEM R FILE.TXT^M". is caret followed by. (^M X6K)DEM. to the remote system. M). FILE.TXT^M;T3FLUSH M3;T3FILER R FILE.TXT S FILE.TXT^M" to the remote system, send to be received pause and wait for no characters for three seconds, and then use T3FILER to receive the FILE.TXT (^M is caret followed M) by S. "XMODEM. --. file. 3.i.4.. T3TERM. Syntax: T3TERM. loption Kilenamelj. (Select only one): C mode conversation - Enter M menu - Enter T Enter terminal mode Filename: Name of Comm Set to load. Options. Brief Description: T3TERM programs of is one of thetwobasic communications T3TERMB System. is the other. T3TERM allows the the TERM user to communicate interactively with the remote computer in one of two modes: (I) Terminal Mode, which appears like normal terminal communication, and (2) Conversation Mode, which is split-screen, allowing both the remote and local systems to send and receive simultaneously with the displays being kept separate.. III. Discussion and Notes: The following commands are available from within T3TERM. The from Terminal user types the Exit Character or Conversation modes This causes the command in order to issue these commands. prompt to appear. Once at thecommand prompt, the space baror ^R the and the menu. refresh display screen will Cormand. 0..9 @. B. Comment Send Send. Macro Text 0..9 Exit Char Toggle Buffer Load (with optional status insg) The inernory buffer can be loaded from disk modem load occurs via this command; or inodem, from the number of 256-byte pages remaining in the memory buffer may be displayed this option is enabled Mode Enter Conversation. if. C. if. 3-9.

(30) Commíd Sumnary. - Cormunication. TERM. III. Buffer to Disk, Modem, or Printer The contents of the memory buffer are sent to a disk file, out to the modem, or to the printer Toggle Local Echo (all outgoing characters typed by the user are echoed back to him). D. Dump. E G. Get. Set up Telephone and exit to Z-System List macros Toggle Printer Exit to T3DIAL (Telephone Control System) Enter Terminal Mode Tool) File Handler (File Manipulation Exit to Z-System Set Exit Character Exit and Run ZCPR3 command. H. new. Corm. Hang. L P Q. T V X Y Z. the section for a more detailed explanation on T3FILER of the comnands. Note that T3FILER does not support the Buffer Load and Dump Buffer cormands. Note that T3TERM allows a buffer load from modem or disk and a buffer dump to modem, printer, or disk. the load is from a modem, the number of 256-byte pages remaining in the buffer may be displayed in the upper right-hand corner of the screen. The presenee of this display is controlled by a flag in the Comm Set, and this display is enabled by running the Comm Set Editor (EDCST) Corm on the desired Set and setting this flag. See. If. Result Codes Returned: Examples cj.f, Use:. None. T3TERM. --. Enter. T3TERM. --. C. Enter. T3TERM. ---. either use built-in Comm Set Set from disk if ILOAD is enabled. Mode; a Comm. Conversation Set or load. Mode; a Comm. T MYCST. Enter. T3TERM. Terminal. M. Enter. T3TERM. 3.1.5.. Terminal or load. --. M. T3TERMB. Mode. either use built-in Comm ILOAD Set from disk is on. if. after loading. either use default Corrun Set Menu;. built-in. the Corm. Comn. Set. Set or load. C1.CST. Enter. Menu. after loading. Syntax:. [option [fiÁenamell (Select only one): M Enter Menu - Enter T Terminal Mode Filename: Name of Comm Set to load T3TERMB. Options. 3-10. Corm. MYCST.CST. Set CI.CST.

(31) Comnand. Brief Description: T3TERMB supports T3TERM, and offers functions.. it. Discussion The. TERM. - Ccmmnication. Swmary. of thecommands larger memory buffer. subset. a a. III. availableunder for buffer load. and Notes:. available under. commands. Command. T3TERMB. are:. Comments. Buffer Load from Buffer to Disk. B. Toggle. D. Dump. E. Toggle Echo Get Corm Set Hang up Telephone and Enter Terminal Mckíe Exit to Z-System Change Exit Character. G H. T X. Y. Modem. exit to Z-System. See the section on T3FILER for a more detailed explanation the cormands. of Note that the Buffer Load function loads only from the modem into memory and Dump Buffer dumps only to disk. Under T3TERM, Buffer Load loads from modem or disk, and DumpBuffer dumps to modem, disk, or printer. the option is set in the default Comm Set (use EDCST to set the Buffer Load status display flag), Buffer Load may display the number of 256-byte pages remaining in the memory buffer.. If. Result Codes Returned: Examples of Use:. None. T3TERMB. -T3TERMB. 3.1.6.. --. Enter Terminal Mode; either use the built-in Set or load the default Corm Set from disk. Comm. T MYCST. Terminal. Enter. Mode,. loading. the. Comm. Set. MYCST.CST. T3TEST. Syntax: T3TEST. Brief Description: T3TEST is a very simple Terminal Mode program. Its primary purpose is to act as a test program for the MODEM interface of the user's system. Discussion. and Notes: acts. T3TEST simply only command. The the Z-System.. is. ^E,. Result Codes Returned: Examples of Use:. No Comm Set is used. as a Terminal Mode. which exits T3TEST and returns control to. None. T3TEST. --. Run. T3TEST. and. exit with. 1. l. ^E.

(32) Command. 3.2.. - Telephone control. Summary. Telephone. TERM. III. Control. The. used (300. TERM covered System programs in this section are III A DC Hayes Sínartmodem the telephone control interface. to 1200), or compatable, is jrequired to run these programs. or The programs covered in this section are: T3ANSWER. T3DIAL--. Answer the telephone. the telephone, answer the telephone, -- Dial hang telephone, the and initialize up T3ANSWER, (performs the. functions of. and T3INIT). T3HANGUP, T3HANGUP. T3INIT--. Hang. up the telephone. -- Initialize modem 3.2.1.. the comnunication. speed and the. T3ANSWER 0. Syntax: T3ANSWER. Brief Description: T3ANSWER is used to answer the telephone. T3ANSWER ways that will terminate: 1. When the telephone rings 2.. When. the user types. a. There. are. two. ^C. and Notes: Discussion The Program Error message is returned The T3ANSWER terminated. following pseudo-code T3ANSWER's Program Error message can be used. T3ANSWER; IF ER;. :. Run. :. cinds;. :. ELSE;. :. cinds; FI. :. Check for Error Do these eomnands Toggle IF Dc) these commands. to indicate illustrates. why how. T3ANSWER Message. if. user aborts. if. phone. rings. In the environment of a Remote Access System (Z-NODE), may be used in the following command sequence:. T3ANSWER. T3ANSWER; IF "ER; DEV. C. MODEM;. T31£GIN; FI. T3ANSWER. :. Run. :. the phone If Define the. : :. Run. rang console... to be the the T3LQGIN program. 3-12. PIODEM.

(33) Cownand. Result. TERM. - Telephone Control. Summary. III. Codes. Returned: Program Error Program Error message is SET T3ANSWER; Program Error message telephone rings. Examples of Use:. (ERROR). is. RESET. if. (No. the user aborts ERROR) the. if. T3ANS'NER. Run. --. T3ANSWER. 3.2.2. T3DIAL Syntax: T3DIAL [option [filenameR Options (Select one only): NAME Dial the indicated name from the telephone /A Answer the telephone Hang /H up the telephone the rnodem Initialize IM the menu Enter /N# Dial the indicated telephone nuñber IR Rotary dial through the telephone directory Filename:. directory. II. of the telephone directory to load; default telephone directory (T3.TXD) is loaded Name. if. ,. none,. the. Brief Description:. interface to the telephone. It can up the telephone, and dial the telephone. Rotary dialing (di.aling all numbers in a telephone directory until one answers or all numbers are exhausted) is T3DIAL provides the main the telephone, hang answer supported.. Discussion and Notes: "T3DIAL IN NUMBER" dials the indicated telephone number. Commands modem, the user's such as the comma (pause) command to DC by Smartmodem, may be included in the Hayes recognized the telephone number. "T3DIAL IM FILE" enters a menu with the indicated telephone (FILE) loaded. directory T3.TXD and "T3DIAL NAME" loads the telephone directory NAME "T3DIAL the the FILE" loads dials indicated indicated name. telephone (FILE) and dials the indicated name directory. file. file. file. T3DIAL T3DIAL The. FRED Z-NODE1. Z-NODES. of. telephone. name. a a. --. : :. Dial Dial. FRED from T3.TXD Z-NODE1 from Z-NODES.TXD. number. is the first word in the text telephone directory entry (each. description for particular entry has a text description and a number). "T3DIAL IR" dials thru all entries in the telephone directory fileT3.TXDuntil one answers. "T3DIAL IR FILE" dials thru all entries in the indicated telephone directory file (FILE). until is. one answers. a "T3DIAL NAME" or "T3DIAL IR" form is used and received, the Program Error Message is set. Example:. If. 3_13. no. answer.

(34) Comnand. Sutmary. - Telephone Control. T3DIAL IF ER; cmds;. :. FRED;. :. ELSE; crnds;. Dial Test. TERM. Error. Comnands. :. Toggle. {. Corrünands. IF. FI. or. T3DIAL IR IF ER; cmds;. :. LOCALBBS;. : : :. ELSE; crrtds;. :. FI. from T3.TXD. FRED. :. Find Test. III. Message. if if. no. answer. answer. answer in LOCALBBS.TXD Error Message Conunands no answer Toggle IF Commands answer an. if. if. T3DIAL can, by itself, perform the functions of T3ANSWER, and T3INIT: T3DIAL /A = T3ANSWER T3DIAL /H = T3HANGUP T3DIAL II = T3INIT "T3DIAL /A" is used and the user aborts via ^C, the Program Error Message is set (IF ER test can be done). EDTXD is used to create and edit Telephone Directory (TXD). T3HANGUP,. If. files. Result. Codes ERROR. Returned:. if. is set. Program Error message T3DIAL fails to get an answer.. o.f. U8e:. Examples T3DIAL. is entered;. Menu. T3DIAL-- FRED. FRED. T3DIAL-- FRED. T3.TXD. is loaded. is dialed from T3.TXD. FRIENDS. FRED is dialed from FRIENDS.TXD T3DIAL-- IN 555-1212 dials the telephone number 555-1212 -T3DIAL IR BBS dials over all numbers in BBS.TXD until -- rotary is dialed one answers or the last number. 3.2.3.. T3HANGUP. Syntax: T3HANGUP. Brief Description: telephone. The. is hung up.. and Notes: error messages are. Discussion No. Result Codes Returned: Examples of Use:. returned.. None. T3HANGUP. --. Hang. up the telephone. 3-14.

(35) Command. Surmary. - Telephone Control. TERM. III. 3.2.4. T3INIT Syntax: T3INIT fspeedl Speed: Speed is a number from 1 to 7, indicating communications link. The EKjssible speed values. I 2. 300 1200 2400 4800 9600 19200. the speed of the are:. - 38400 support all of the Exjssible speed Not all installations will T3INIT values. table showing the available speed // prints ainstallation. values for your particular 3 4 5 6 7. Brief Description: T3INIT. the speed (baud rate) of the communications link the DCHayes Smartmodem. Depending on how the initializes modem driver was set up, speeds up to 38,400 baud can be selected (usually used in direct computer—to-computer links). sets. and. Discussion. If. menu.. Run. for. a. and Notes: the speed is "T3INIT. particular. not specified,. //" to find. out. the user is prompted. what the. installation.. Result Codes Returned: None Examples of Use: T3INIT Menu appears T3INIT-- 2 Select speed 2. --. 3-15. with. a. valid speed values are.

(36) Suímary 3.3.. - Access Control. TERM. III. Access Control. The TERM System can be configured to support a Remote which is a computer system that users dial Access System (RAS), RBBS, such RCP/M, into, as an etc. The T3LOGIN program is used a to control access to Remote Access System. T3LOGIN prompts the a valid user name user for a user name and password, and, password T3LOGIN pair is entered, establishes the user's under a Z-System and returns control to the operating environment a valid system. user name - password pair is not entered T3LOGIN runs an Abort command, which is after three tries, read by defined at installation time or in the LOGIN.TXT. III. if. If. file. T3IÁJGIN. When. T3LOGIN executes, prompts the user for a user name and password, and then reads through an ASCII text (referred to as LOGIN.TXT in this documentation), processing commands and looking for a user name - password pair which matches the input from the user. is most important that theLOGIN.TXT contain valid commands and options, and the program T3LOGCK is provided to perform such an analysis on LOGIN.TXT. T3LOGCK is run by the he allows T3LCGIN SYSOP before to process the LÁJGIN.TXT file, and T3I£GCK syntactic and semantic analysis will perform a complete T3LOGCK of the LOGIN.TXT generates a report on its findings, and this report can be sent to the console or to the console and printer. The program T3LCGCHG is provided to allow the user to change edits the LOGIN.TXT his password and/or terminal definition. for a particular user, leaving the rest of the LOGIN.TXT. it. it. file. file. It. file.. It. file. file intact. 3.3.1.. T3LOGCHG. Syntax: or or SID: USER:. T3IÁJGCHG T3LCGCHG T3LOGCHG. SID user1,pass]. System File Name ID (1..4) which is used user narne from the indicated System File Any. valid user. The. password associated. PASS:. to identify the. Name. name. with that user. name. Brief Description: T3LOGCHG allows a user to change his password and/or terminal definition at any time. the form "T3LOGCHG" is used, the user is prompted for his If (which he can input as USER,PASS or just user), and, user name he will be prompted he did not specify a password, for his "T3LOGCHG form SI!)" or "T3LOGCHG password The (without echo). USER" and the causes the user to be prompted for his password, "T3IÁX3CHG USER,PASS" and password. both accepts form user name password and user name match, theuser is presented the If with his current user n.-me, password, and terminal definition and. if. 3-16.

Referenzen

ÄHNLICHE DOKUMENTE

9 UNLESS OTHERWISE SPECIFIED DIMEl'TSIONS ARE IN INCHES.. ANGLU CLASS OF

11 Although these symposium stories do not take place on the road, it is important to note the similarities because Luke and Plato do not just share the same road to meaning

Käesolevas alapeatükis kirjeldan, kuidas tekkis muusikali loomise idee, annan ülevaate sündmuse vormi leidmisest ja projekti vajalikkusest ning selle eesmärkidest.. Muusikali

gen wurde, soll Ihme vnd den seinigen gleich andern feinen erblichen Gudtern vermuge darüber habenden Erbverschreibung vnd Consirmation, alß wehre eS denselben

Figure 21: Proportion of total household consumption expenditure attributed to miscellaneous goods and services by population group of household head.. According to the survey,

The uncertainties on the t ¯ t and Z+jets cross sections are the dominant uncertainties among the predictions of cross sections for the background processes as well as the

бождается от окруж аю щ ей её тело м атеринской бактерии, которая разлагается к тому врем ени автолизом.. Они имеют сл егк а матово-жёлтый цвет и

Benötigt: £ jeweils im halben Klassensatz: M 1 talk & swap sheet; M 4 feedback sheet £ jeweils im Klassensatz: M 2 Modelltext; M 3 listening grid4. £