CONTENTS CHAPTERS: 1- FEATURES OF TH! 375 ..-l.-......llll.I..Ill.l.l....l.ll.‘..l 1 2. ACCESSORIES AND OPTIONS FOR YOUR SYSTEM tresecssssntnnassaanns 3 STANDARD ACCESSORIES - Cables, System Dump, Manuals SOFTWARE PACKAGES - Standard Software 3- PART NA"EB mn FUNCTIONS .II.I.I'IIII.IIlI.I..I.I.I.III..I.I 7 PART LIST DEVICE CONNECTORS DRIVE SELECT LIGHY FLOPPY / TAPE DRIVE SLOT FAN ODUTLET AND AILR INLETS FUSE HOLDER AND FUSE HANDLE 1IPL INDICATOR RESET BUTTON POWER CONNECTOR POWER SWITCH AND LIGHT ‘. BEFORE OP‘RATION .I-ll.lll.I..l.l.l...ll.ll'l.ll.-ll'...lll. 13 UNPACKING THE 375 BASIC ASSEMBLY POWER-UP AND PROCESSOR ACTIVATION 5- OPERATIONOFYOUR 375 .I.ll.ll.lll.l..lll..l.ll.llllll‘.llll 15 INTRODUCTION TO THE SYMMETRIX OPERAYING SYSTEM STARTING THE OPERATING SYSTEM A SAMPLE SESSION WITH SYMMETR1X: A BAS1C TUTORIAL The Shell, Creating and Moditying Files: Use of the Editor, Simple Commands, Directories, Using the language tools: Sample Pragrams, Multitasking with the Shell, Communication Between Users: Write and Mail, Localhost, UUCP and Remote Sites, Games, UN1X Tutorials. SHUTTIING DOWN SYMMEIRLIX 6. USE OF THE INTERNAL FLOPPY OR TAPE DRIVE teesesssscasanassas 29 INTERNAL FLOPPY DISK DRIVE MECHANISH Cleaning the Floppy Drive Heads, The Use o+ Floppy Disks, Formatting a Floppy Disk, Reading Other Floppy Formats, Reading and Writing Floppies:The Use o+ TAR, PRELEM NERW! II ix THE 373 OWNER’S MANUAL TABLE OF CONTENTS Creating a Floppy with a Filesystem, External Floppy Drives, Floppy Error Messages THE INTERMAL T1TAPE DRIVE MECHANISH Cleaning the Tape Drive Heads, The Use ot tapes, Formatting a rape, Reading and Writing Tapes:lhe Use of TAR, Internal Drive Device Name, External Tape Drives and Other 5CSI Devices, Tape Error Messages 7. TROU‘LEBHOOTING 2 a8 2N ES NS00 ABDNBRRNEESNSHNNOOENSSEEERARSDOEEDEEES 37 NO POWER LIGHT (GREEN LED) NO ROM MONITOR BANNER MESSAGE: SYSTEM WILL NOT BOOT SYSTEM WILL NOT COMPLETE BOOT SERUENCE SYSTEM PAUSES AFTER PRINTING SYMMETR1X RELEASE BANNER SYSTEM PANIC AND BOOT ERROR MESSAGES ROM MONITOR DOES NOT RESPUND SYSTEM WILL NOT RUM MULTIUSER TERMINAL WILL NOT RESPOND PRINTER WILL NOV RESPUOND FLOPPY DOES NDOT READ/WK1TE TAPE DOES MUT READ/WRITE 8. REPAIRS AND "AINTENANCE S & BE R S % RS S8 E RS S8 S0 ASE S S PN T EN DS SN A S 41 APPENDIX: APPENDIX A- DEFINITION OF TERMS S 8 2 8B 8620 AN 0 0SSN Ne S SNe TS ESSEE DS 43 STANDARD T(ERMS NETWORK INTERFACE AND 1N1ERFACE NAMES SYSTEM DEVICES AND DEVICE NAMES 5C31 Devices, 31-3I66 Devices, Parallel levices, Serial levices, Uther Devices STANDALONE SYSTEM DEVICES AND DEVICE NAMES APPENDIX B. THE 373 ROM MONITOR .cceansscensecccasasacscsacansnass 49 INTRODUCTION MONITOR EMVIRONMENT RESETTING THE 375 MONITOR COMMAMD SYNTAX STACK ENVIRONMENTY MONITOR COMMANDS Print Register/Memory Contents, Alter Register/Memory Contents, Alter MMU Contents, Alter CPU Configquration Register, Other Register/Memory CDmmands’ Fost Cottpmpiel gfl% MEMORY DIAGMOSTICS Subtest Patterns, Subtest Sequences TEST FAILURES MONITOR EXCEPTION TRAPS IPL INDICAYOR S’? BOOTSTRAP ERROR MESSAGES X PRELIM REV 11 THE 379 OWNER'S MANUAL TABLE OF CONTENTS APPENDIX C. STARTING AND STOPPING THE 375 .cscccesccccsncsnsses 39 RESETTING THE 375 LOADING SYMMETRIX (THE BOOTSTRAP PROCEDURE) SHUTTING DOWN SYMMETRIX APPENDIX D. ERROR INDICATIONS AND DIAGNOSTICS ..cssccecsssanses 6I SYSTEM BOUYT ERROUORS ROM Level Bootstrap Errors - ST-596 lntertace, ROM Level Bootstrap trrors - SCSI Intertace, First-Level Bootstrap kErrors, First-Level Bootstrap Errors - S(CSI Disk Urives OTHER DEVICE ERRORS AND D1AGNUSTICS SYSTEM PANIC MESSAGES Hardware Failure, Resource Limitations, Coincident Panics, Software Consistency Check Panics SYSTEM ADVISORY MESSAGES OPERATLONS MESSAGES UTILITY ERROR MESSAGES APP!NDIX E. .Y‘Tm ADJUSTMENT S 22 5 6085880088888 00SE80S8880ESSSESTDSS 71 ADDING / DELETING USERS ACCOUNT ACCESS - File Permissions, Root or Superuser ACcess SYSTEM NAME DESIGNATION SETTING UP THE LOCAL MAIL SYSTEM CHANGING THE DATE AND TIME SYSTEM CONFIGURATION:PATCHING THE KERNEL APPENDIX F. ROUTINE SYSTEM MAINTENANCE .ccsecccscnsancsancannsa 727 FILESYSTEM BACKUPS Dump Volumes, Schedule o+ lLumps, lDump Frocedures, Floppy Dump Procedures, SCS{ fape dump procedures, An Alternative Dump Schedule, Dumping ot Individual Files RESTORING FROM DUMPS Restoring a File or Set ot File, Restoring a Filesysten, rull Restoration of Filesystems, Partial Restoration of Filesystems EXHAUSTION OF DLDISK SPACE gS' DRIVE CONFIGURATION AND PARTITION1ING Disk Geometry: S1-3¥86 Intertace, Disk Geometry:S5SCS1 Interface, ST-566 Disk Specification: Disktab, Formatted / Unt+ormatted Storage, q, ST-586 Disk Configuration! Disktab, Bad-Sector Space Requirements, Disk Layout Considerations, Recording an ST-506 Disktab Entry: Disklabel and Format THE USE OF FORMAT Formatting Floppy Diskettes, rormatting a Winchester DbDrive PRELIM REV I1I + THE 373 OWNER'S MANUAL CREAVIMG / MUOVIMG / MERGING FILESYSTEMS Creating a Filesystem, Moving a Filesystem, Merging Filesystems, Shrinking Filesystems MONITORING SYSTEM PERFORMANCE ACCUOUNTING RESOURCE CONTROL FILES WHICH NEED PERIODIC ATTENIION APPENDIX G. SYSTEM AND FILE RECOVERY ...vcvcnncccncncsccaccssna 97 FILESYSTEM CONSISTEMCY Reboot and Fsck, Interactive Fsck, Locating Lost Files INDIVIDUAL FILE LOSS RESTORAL BAD SECTOR MAPPIMG AND BAD144 Bad Sector Information, Badl44 Usage, Locating Affected Files, Badl44 Examples, Bad144 Error Handling MINOR DISK HARDWARE FAlLURE 10 5o+t Errors, Hard Errors, Bad Sector Errors, Lost Track Errors, Chronic Drive Failure, Recovery +from Bad Sector Errors, Recovery for Laost I'rack Errors TUYAL LOS5 OF DISK CONTENYTS Kestoring +rom Floppies, Restoring +rom fape, Restoring [ncremental bDumps fi.e:,"\"(v i~ e G "fé' .‘)’ ,ufi/'u’“iflq "Tr»?\ ,/‘7 € ! N N APPENDIX H. INTERNET NETWORK CONFIGURATION AND USE ....cvecenes 109 THE INMTERNET NETWORK FPRUTOCUOL LAYERS IP: The Internet lransport Layer, rcrP: The Tranmsmission Control Protocol, SMTP: The Simple Mail Trans+er Protocol, Hardware Link Level Laver NETWORK NAMING AND ADDRESS CONVENTIONS Internet Machine Names, [nternelt addresses, Internet Network Names NETWORK FILES The /etc/hosts File, The /etc/hosts.equiv File, The /etc/networks File, fhe /.rhosts File CReATING A NETWORK ADDING A NEW MACHINE T0D AN EXISTING NETWORK ENABLING A NETWORK INFERFACE Network Status and l4config, Metwork Configuration and ILfcontig, Ifconfig Error lIndications INTERFACE ERRUR MESSAGES TESTING NETWORK CONNECTIONS Localhost Test, Telnet Test, Netstat and Facket lntormation SERVICES, DAEMUONMS AMD ALL rHAT Daemons: The lnvisible FProcesses, Services: rIhe vrand Daemaon-God COMMON NETWORK COMMANDS FTFP: The File lTranster Frogram, RSH, RCP and RLUGIN PRELEM NER TABLE OF CONTENTS II THE 375 OWNER'S MANUAL TABLE OF CONTENTS APPENDIX II sERI“ co"“uNIcATIONs S & 8 8 8 QSR SESONNENSBEAERSSEERREESS 123 SERIAL COMMUNICATIONS HARDWARE SIGNAL DESCRIPTIUNS Data Signals, DIK and LCD Signals, RTS and C1S Signals, Safe [gnorance, Uriginal Detinition, Hardware Flow Contral CONNECTING TO A TERMINAL OR UITHER DLIE Serial Connection of DIE, lerminal Configuration, Baud Rate CONNECTING A SERIAL PRINTER UR FLOTIER SERIAL CUMMUNICATIONS AND 1P The /etc/remote File, The Usage o+ lip CONNECTING 10 MUDEMS AND DTHER DCE Modem Control, Auto-Answer Modems, Auto-Dial Modems, Auto-Dial Modems and rfiP, Auto-Dial Modems and UUCP CONNECTING TO OTHER COMPUTERS Connecting Two 375 Computers, 375 Connections and TIP, 373 Connections and SLIP, 375 Cannections and UUCP APPENDIx Jl uucp ADJU'TMENT S & 8880098880088 0008808088060sEa00CRBEEEDDES 137 REMOTE AND LOCAL SYSTEMS ACTIVE AND POLLED (PASSIVE) SITES CONNECTING UUCP SITES Serial Port Requirements, Modem and autodialer support, Modem Dip Switch Configuration, UUCP Protocol Support SITE NAMES AND UUCP Login Name, Site Name DIRECTORIES AND UUCP MAJOR SUBDIRECTORIES AND FILES UF THE UUCP SYSTEM System Binaries, UUCP Programs, tThe UUCP Spoal Directory UUCP MAJOR FILE DESCRIFT1UN Device Information: Use ot the L-devices File, L-devices I'ypes, L-devices Dialer Listing, UUCP LocationsiL-dialcodes, ’ Sitename MappingilL.aliases, Remote Command Execution:L.cmds, System [dentification: Use at the L.sys File, L.sys!Time Field, Device Fields:L.sys, ACU Devices, DIR Devices, TCP and Uther Netwark Devices, Expect/Send, UUCICO:The UUCP Transter Program, Status of Jaobsiuuqg, Accessibility Information:USERFILE CONNECTING TO AN EXISTING UUCP NETWORK (PASSIVE) CONNECTING TO AN EXISTING UUCP NETWORK (ACTIVE) SETTING THE SITENAME FOR THE UUCP SYSTEM HOW TO DEBUG UUCP CONNECTIONS:UUCICO AUTOMATIC POLLING OF REMOTE SITES SECURITY - UUCP and the Root Account SOME ROUTINE CHECKS ON UUCP FILES ROUTINE UUCP ADMINISTRATION SEFILE: Sequence Check File, TM: Temporary bata Files, ST8T: System Status Files, LCK: Lock Files, Shell Files PRESET UUCP DEFINLTLUONS IM UUCP.H PRELIM REV I1I xiii THE 373 OWNER'S MANUAL TABLE OF CONTENTS APPENDIX K. USE OF THE SERIAL LINE INTERNET NETWORK INTERFACE . 16&% SERIAL LIME CHECK-OUT SLIP SETUP - Contiguration of /etc/hosts POINT~TO-POINT CONNECTIOM Slattach and Sldetach, Connection DEBUGGING TERMINATION OF CONNECTION APPENDIX L. ETHERNET HARDWARE AND LAYOUT Tsesecrsecannssanssens 169 ETHERNET HARDWARE AND LAYOUT ?-Pin ETHERNET Port lntertace, 15~-Pin EfHERNET Cable Connector TAPS, TRANSCEIVERS AND ETHEKNE1 CABLE LAYOUT SUE (Heartbeat), Thick ETHERNET Cable and Transceiver Layout, Frhin EIHERMET Cable and fransceiver Layout, Multiport Transceivers, Transceiver LED Fower Indicator DETECTIUN OF EFfHERMEY BY rHE SYSTEM ETHERNET INSTALLATIUOM Single-User Setup of ETHERNE1, Loss of Carrier, Collision Errors, Loss of Bufters, Overtlow, Under+low, Autoboot to Multiuser, Disabling the ETHERNEYT ETHERNET COMMANDS ETHERMET ADDRESS IDENTIFICATION APPENDIX M. PARALLEL PRINTER PORT ....ciecsacccscncacscsacnanceeas 177 PRINTER CONNECTOR PRINTRONIX PRINTERS LINEPRINTER CONF1GURATION - Lineprinters and FPrintcap APPENDIX N. THE SCSI INTERFACE AND USE «ececcsansnencnacsocccnsens 181 SCS1 CONMNECTOR PINOUT SASI AND SCSI ANS1 SCSI STANDARDS SCBI DEVICE DEFINILTIONS CONF1GURING SCS1 DEVICES SC3I Winchester Drives, 3CS1 lTape brives APPENDIX O. ST386 WINCHESTER AND FLOPPY INTERFACES cvcvececeecs.. 183 ST-5¢6 WINCHESTER INTERFACE (OFTIONAL) Winchester Drive Connector, Winchester Drive Configuration, Supported Drives:iDisktab, Connecting a Winchester Drive FLOPPY DRIVE INTERFACE (UP [ IUNAL) Floppy Connector, Floppy DbDrive Configuration, Standard Floppy Drives, Higher Density and 8-Inch Flappy Drives xiv PRELIM REV I1I THE 378 OWNER'S MANUAL TABLE OF CONTENT® APPENDIX P- SHTP AND SEND"AXL % € 8 55 S 5808038 ETEGN0EEEEEs0EsANSES 189 SENDMALL FLLES STANDARD CONFIGURAT10N F1LES Sendmail and a UUCP Site, Sendmail and an ETHERNE1 Site, Sendmail and a ETHERNET/UUCP Relay Host INSTALLING THE SENDMAIL F1LE PERSUNAL ALIAS FORWARDING SENDMAIL STATUS FILES Statistics and Sendmail, The System Log, The Mail Gueue ROUTINE MAINTENANCE Forcing the 6Glueue, Errors on Mailing a Message MODIFYING SOME SENDMAIL PARAMETERS Ignoring the Sendmail.fc File, Overriding Sendmail Options, Delivery Mode, Daemon Made, Defining Gueue Intervals, Read timeouts, Message timeouts, Forking During Gueue Runs, Load Limiting, Log Level For Syslog, Temporary file modes HOW TO READ A CONFIGURATION FILE Configuration File Syntax, Rule Definitions and Macro Detinitions, Special Macros, Special classes CONFIGURATION DEFIN1TIONS APPENDIX €. SUPPORTED TERMINALS, COMPUTERS AND EMULATORS ...... 203 APPENDIX R. 3735 INTERNAL ARCHETECTURE AND SCHEMATICS .ciesscees 211 POWER-UFP ROM SHUFFLE INTERRUP I VECIUR ASSIGNMENTS FHYS1CAL ADDRESS ASSIGNMENYS INTERRUP I PRIORITFY LEVELS NOTES ON THE SCHEMATICS Sheet Al MMU/CPU/ CU Section, Sheet B: EPROM and Butf+er Section, Sheet C!: Hardware Refresh and DMA caontrol, Sheet D! DRAM Sections ftor 2 MB or 8 MB RAM, Sheet E:! Parallel and SCSI [/0, Sheet F! Serial 1/0, Sheet HI Interrupt Contral, Sheet K: Board Interface, Sheet N! I[/0 Board APPENDIX T. RECOMMMENDED REFERENCE MANUALS AND TEXTS ccccsveeae 229 RECOMMENDED REFERENCE MANUALS Applications and System Sottware, Hardware and Peripherals RECOMMENDED TEXTS: APPLICATIONS AND SYSTEM SOFTWARE UNIX System Description, UNIX System Introduction UNIX SYSTEM USAGE The APL Programming Language, fhe Assembler Programming Language, The BASIC Programming Language, The C Programming Language, The FORTRAN Programming Language, rhe ICON Pragramming Language, The LISP Programming Language, PREEM RER. Ly XV THE 373 OWNER'S MANUAL TABLE OF CONTENTS The Fascal Programming Language, The TEX Text Formatter RECOMMENDED TEXTS: HARDWARE AMD PERIPHERALS Series 329099 Microprocessor, Computer Maintenance xv¥ PRELEM REW II CHAPTER 1 FEATURES OF THE 375 The 375, with over 1,00¢ programs and over 3,800 files, has many fealtures which make it the small, portable, and powsrful system needed for modern cow- putation. Among its manvy notable features are! * Series 32009 Supermicrocomputer System. lehiHz (No Wait States). * 4.2BSD UNIX/3SYMMETRIX Software Environment. * C, FORTRAN 77, and Pascal Conmpilers. * BAZSIC, ICON, APL, LISP, and Assembler Language Translators. * Debugqgers. * Four-User System With Parallel Printer Interface. ¢ Reconfigurable Mass Storage Software. * LLarge Processor Main Memnorwy. * Hardware Floating Point. * Battery Back=d-Up Time-of-Day Clock. * Virtual Menorwy. * Up to a 1& Million Byte Program Size. * Serial Line IP (SLIP). * Optiocnal ETHERNET Intertace and TCP/IF Network Protocols. * Optional SCSI (Small Computer System Intecface). * Optional SYMMETRIX Configurable Kernel Software FPackage {or sSpeciralized Device Drivers. * Optional Main Memory Expansion. * Optional Drive Memory Expansian. PRELIM REV II b CHAPTER 2 ACCESSORIES AND OPTIONS FOR YOUR SYSTEM Your 375 system comes lopaded with standard accessories and software, as well as optional equipment to further extend its performance. A brief description of each of these features follows. 1.1. STANDARD ACCESSORIES Each 373 comes with connection cables, a complete system duwup, and ingtruction manuals. You should make sure that all the equipment has been included by comparing each item with the shipping list. 1.1.1. Cables Symmetric provides cables to connect the 3r5% to customer- provided peripherals: A, one male-to-female RS5232 cable B. ane 128VAC power cable C. one parallel Centronics ribbon cable D. one ETHERNET draop cable (ETHERNET optiaon only) See Chapter 3 for equipment descriptions and functions. A. RS232 Connection Cable: The 375 comes with one R5232 male-to-female cornnection cable, tor use in cannecting one terminal to the machine. 'he terminal con- nector must be a female DB2IS5-type connector.ll1ll All RSZ232 ports it the system are configured as OCE (Data Communications Equip- ment). Thus, only null wmodens or other cables thal reverse si1g- nals are needed to cornnect modems or the DCE ports of aother com- puters to 375 RIS232 ports. See Appendix I tor wmore information. B. Power Cable: The power ctable provided is used to connect Lhe 370 system to a power soutrce. The power range wmust be IJ-1ZBVAC. WARNLING! e NOT USE WITH POWER S0URCES WHICH ARE NOT 128VAC. Usk UF ANY OTHER VOLTAGES OR VOLTAGE ADAPTIRS MAY SERIDUSBLY DAMAGE YUUR SYS- [111I4 the terminal has a temals DB2EP connector (as 1in a non~ARNSl styled terminall, a standard R32352 cable (male-to-mal=s) may be substituted toar the table provided. PRELIM REV II 3 THE 3735 OWNER'S MANUAL ACCESSORIES AND OPTIONS TEM AND UQTID YOUR WARRPAMIY.IL 2] C. Ribbon Cable: A ribbon rable is also provided to connect Lhe parallel port to a Centronicae-styled parallel printer intertace. Sinmply plug the small connector into the parallel conneclior on the bottom o+ the rear panel of the 3749, Consult Appandix bl D. ETHERNET Drop Cable (ETHERNET option only) The ETHERMNET option includes a drop cable for your ETHERNET con- nector whichk interfaces the computer Lo vour ETHERNEYl transci- evear, Consult Appendix L and H for more informatioan. 1.1.2. System Dump The 375 also comes with & complete system dump of the wmachine for system recovery pPUurposes. Please keep it in a safe place. Rou- tire back-ups of wvour svstem are strongly recommended. Consult Appendi» F awnd G for more information. 1.1.3. Manuals The Symmetric 375 Owner’s Manual describes the basics ot opera- tion of the 375 and its related special procedures. Ith addition, the on-line manual command man(?) details the operation, funcltion, and syhtax of system prngrams and software. 1.2. SOFTWARE PACKAGES Symmetric Computer Systems provides =zach 378 with a large number of software packages, such as the 4,.2B3D 3IYMMETRIX operating system, lanquages and compilers, as well as other user-contributed sofiware and public-dowmain ports.l.3] 1.2.1. Standard Software Symmetric Computer Svstems Corporation provides integral software with each 375 system, including the SYMMEIRIX operating sSYys- tem and & variety of lenguage tools and applications programs. Each of these groups is outlined below: r21Contact the factory for instructions on using voltages other than 1 28VAC. {31411 software produced by Symmetric Compuler Systems or through contract and licensing arrangements by other software vendars for Symmetric Camputer Systems is supported by Svmmetric, q PRELIM REV II THE 373 OWNER'S MANUAL ACCESSORIES AND OPFTIONS A. SYMMETRIX Operating Systems: The 373 contains a version of the Berkeley 4.2/7/4.3B5D UNIX operating system called SYMMEIRIX. SYMMETRIXK, with over 1duy programs and 360@ +files, supporls a general timesharing environ- ment and standard UMIX utilities and language products, as well ag advanced netwarking and distributed-use facilities, Sendmail, yuce, SLIe, and TCP/ (P (far ETMHERNEf models) are thaoroughly implemnented. Editore, databases, scientidic libraries, gales, and ather standard UNIX utilities are included. Un-line manuals aid for rapid examination ot documentalion. All standard UNIX utilities and 4.d user-contributed utilities are included with SYMMETRIX. ln all, over 39 MByles o0t software, including language tools, arrive on the 379 READY I'U Usk. The system can also be configured {or use wilth specialized device drivers through the wuse of the SYMMETRIX Configurable Kernel SoStwarerPabhageygs=. For example, on may wish to canfigure the parallel port to control Lthe wmutors of a robotic arw, and Lhe device driver to accept simple conmmands to change arm positian,. The ability to contigure the operating system greatly extends the flexibility of the 373, and permits novel applicatiaons 1in research and developwent. B. Language Tools: SYMMETRIX is provided with a large suile of language tLools, such as C, Pascal, FORTRAN 77, Assembler, LISP, [CON, BASIC, and AFL. A briet description of each of these language tools follows. Information on the use of Lhese languayes may be obtained fram standard progaramming texts (gee Appendix T Jfor a list of recow- mendedd texts) . Cansult Chapter S tor sample programs utilizing these language tools. (o84 The SYMMETRIX C coumpiler is a complets imnplementation o1 the Ritchie/Kernighan bock on C. [t is derived fFram Lthe B=11 Laboralories porlable C compiler, and is highly coun- patible with Berkeley VAX C. All data types except tloalt and double are bitwise l1dent- ical tao Vax convention (includinyg structure element alignment). Float and double {ypes have 1lekEE standard tloating-point farmat, thich is dittrerent than the VAX. All data tvype sizes, byvle order, and alignuenis (includ- ing arguments) are the same as that used an the VAX, allowing for highly transportable code. (See cc(l) {for more information). FORTRAN 77: SYMMETRIX FORTRAN 77 is & optimizing cowpiler siwmilar to Berkeley 4.3B35D £77. It supports high-speed floating point operations as well as cowmmon subexpression and loop unrolling optimizations. It is intercallable wilh both C PRELIM REV II 5 THE 373 OWNER'S MANUAL ACCESSORIES AND OPTIONS and Pascal. (See 4$77(1) {or more intormalion). Assembler: Assembles the instruction cade for the MIILHYY micropro- Cessor. (Bee asg(l) {for more intormalion). Pascal: SYMMETRIY FPascal is an iwmplementation ot Wirth’'s FPascal 1 angquage, The compiler is5 a porlk of Berkeley Pascal. It iz intercallable with C and FORTRAN 77, (See pc(l) {or more information.) LISP: The SYMMETRIX LISP interpreter is the university impli- mentation of FRANMZ LISP developed to run on the 32009 architecture, FLONUMS and BIGNUMS are supported,. (See lisp(1l) for more information). ICON: SYMMETRTIX ICON is an object-oriented interpreter which bridges conventional lanquages, such as C and Pascal, with unconventional languages such as LISP and AFL. (See icon(1l) for more information). BASIC: SYMMETRIX BASIC is an inlterpreter using the MBASIC syntax as well as select UNIX commands. It contains trace, immediate execule and other comwmon {features. (See basic(1l) for more information). APL: SYMMETRIX APL is an interprelive version of lverson’s APL lanauage., [t is compatible with both VAKX and PDP 11 ver - sions of Purdue ARL, (52 apl(l) {for more intormation). 6 PREEEMIRENMEYIII CHAPTER 3 PART NAMES AND FUNCTIONS This section describes the various parts of the 375 and details each part’s related functions. 1.1. PART LIST The 375 system uses Lthe following parts in its operations (Clock- wise from left): @ [ J Handle Release Button YMMETRI ALWILUE LIS = = = X Drive Insertion Slot Handle i 2 % ° / AN Pover Light (green) Drive Select Light (red) Reset Button IPL Indicator - Y STS86 Winchester \ D o e W Connectpn 1o ® . L ] P [} r @ roeviwndt sdeviiiy b taeviia teviniy? ens .({:::::::::F Idewiity Fan Qutlet D Z € > ETHERNET Connector sdeviy . L3 Printer Connector Cannectar Flaoppy Connectors —=h - w Fuse Holder™ Power Connector Power Switch sen . * . L — . . WAUIIEInAE 4 U 5 4 by Rrmmelil Competa Sraiams \ ! T é 6CS1 connector (optional) Air Inlet The mzjor parts and their operation are described in the tollowing sectiorn. 1.2. DEVICE CONNECTORS External hardware wmay be connected to the systemn via the connectors located an the rear of the 3/3. lhese connectors can link the unit to PRELIM REV II 7 THE 373 OWNER'S MANUAL PART NAMES up to four RS232 serial lines and one Centronics parallel line. The Centronics parallel port is contigurable for general use. Flaoppy and 5T596 Winchester ports (optional) permit connection with one Winchester drive and up to three floppy drives. An ETHERNEI connector (optianal) permits contact with an ETHERNET system. A SCS1 (Small Computer System Interface) connector faptional) permits the use of up to seven select SCS1 devices. Each of these device connectors is labeled o correspond to its SYMMETRIX device file name, (see Appendix A for system devices and dev- ice names). Al RS232 CONNECTORS Four RS232 connectors on the rear ot the 3735 may be used to link the unit to a variety of devices, such as modems, terminals, and printers. The RS232 connectors are standard DB25S connectors. The uppermost DB255 connector labeled "/dev/cansole" differs from the other sockets in that DCD is permanently driven at a high levelj the other sockets assert DCD only when in use. Printers with serial interfaces may be connected to any of the "/dev/tty" ports to the 375 with standard RS232 cables. Consult Appendix I. PRINTER CONNECTOR One Berg-styled 26-pin connector labeled "/dev/1p" is located on the rear of the 3/5. This socket allows for the connection of a stan- dard parallel printer to the unit. One may use the parallel Centron- ics ribbon cable provided by Symmetric, or purchase one from a retail computer supply store. Consult Appendix M, FLOPPY CONNECTOR (OPTIONAL.) Up to three Shugart-styled disk drives (either +ive-inch or three- inch) may be added to the 375 via the optional 34-pin Berg-styled "Daisy-chain" floppy tonnector labeled "/dev/{+d"” and located on the rear of the machine.[11] Consult Appendix 0. ST396 WINCHESTER CONNECTORS (OPTIONAL) One external STS594é Winchester device can be added to the system via the optional 20 and 34-pin connectors provided +or this purpose. The connectors are labeled "/dev/wdl" and located over the power module on the back of the machine.l2] Consult Appendix O. [1]lKeep cable length under 1 meter to reduce electronic noise interterence. [Z2]JKeep cable length under 1/2 meter to reduce electronic noise interfer- ence. PRELIM REV I1I THE 373 OWNER'S MANUAL PART NAMES NOTE: The two topmost connectors on the far left o+ the back panel are used to connect an external STS#& Winchester Hard disk drive. The single 34-pin connector beneath the hard disk connectors permits the addition of floppy drives. Don’t confuse these connectors. E. ETHERNET CONNECTOR (OPTIONAL) A ten-megabit ETHERNEY transceiver may be connected to the optional ETHERNET connectar labeled "end" with a drop cable.t3) See Appendix L for instructions on ETHERNET installatian. F. SCSI CONNECTOR (optional) The B¥-pin Berg-styled 5CS1 (Small Computer System 1lntertace) “"Daisy-chain" connector permits the interfacing ot up to seven SCSI devices {(or less, depending on the number o+ internal 8C81 devices gptionally placed in the 3735). Consult Appendix N for further information. 1.3. DRIVE SELECT LIGHT The drive-select light is a red LED indicator light located on the front panel of the 3/S5. It is illuminated when the internal hard disk is selected for operation. It will flash when the system reads or writes to files on the disk. This select light indicates how active the disk is at any time. This light should turn on atter the reset button is held dawn. I+ the light never turns on, the disk or disk controller may be broken. 1.49. FLOPPY / TAPE DRIVE SLOT For those who have the internal +loppy drive installed in the machine, the black bezel of the floppy disk drive is the largest feature on the 375’s front panel. A horizontal slit and moveable lever allow +for insertion and recommended flaoppy media appropriate ta your drive. Floppy disks may be inserted by raising the lever and inserting the floppy 1in the slit. Make sure the edge with the head aopenings is inserted +irst, and the +loppy label is tacing upwards. FPush the +loppy caompletely into the slot until it +tirmly stops. lurn the lever gently. 1+ the door does not claose easily, remove the +loppy and try again. Reverse the process Lo remaove the floppy. Instead of the floppy drive, one may have a tape drive internally installed in the 3/5. The tape drive slot permits the insertion of recommended tape media appropriate to your drive. Insert the tape to automatically load. Press the button (or turn the lever) to eject the tape. [31Keep drop cable length under 20 meters to reduce electronic noise in- terference. PRELIM REV II 9 THE 375 OWNER'S MANUAL PART NAMES The small red light near the door slit indicates that the drive is selected. This light will flash when a tloppy or tape is being written or read.f4] This light should remain of+ when the reset button is held down. If the light should turn onh, the disk controller ar drive may be broken. See Chapter 6 for more intformation. 1.3. FAN OUTLET AND AIR INLETS The fan circulates air throughout the 375 to Prevent overheating. The inlet vents are located on the bottom of the case. The hot air is expelled out of the top section o+ the machine. At no time should either the fan outlet or air inlet be blocked, else damage to the machine may occocur. Do not stick anything into the tan while it is operating. The system operates best in the temperature range of 16-27 degrees Centigrade t(69-8¢g degrees Farenheit). High humidity and dust can damage your machine and should be avoided. 1.6. FUSE HOLDER AND FUSE Une 1.5 amp 25¢ volt {use is located on the back o+ the 375, next to the power connhector, to protect the unit from small power surges. ALWAYS TURN OFF THE POWER BEFUORE CHECKING THE FUSE. To open the cow- partment which contains the fuse, remove the power cable and insert a tlat-bladed screwdriver in the groove between the power cable sovcket and the fuse compartment. rhe correct fuse Capacity for replacement is indicated on a label near the tuse compartment. The slandard replace- ment fuse must have an input voltage Capacity ot L.5Amps (slow blow), and a 25@VAC rating.[5] The power voltage is routinely set top FE-~132VAC, but can be set internally to allow for 189-249VAC operation. Either S8Hz or &agHz power is acceptable. No power supply modifications are necessary, since the power supply works in the 43-438Hz range. 1.7. HANDLE The 375 may be carried +from pPlace to place by its comtortable han- dle. The handle also serves to Prop up the front of the system, allowing easy access to the front panel and the floppy drive. The handle may be adjusted by simultaneously Pressing both Handle Release Buttons, located on each side of the machine, and moving the handle to any desired angle, Releasing the buttons Wwill cause the handle to remain secured at the selected position. [4INeither the tloppy drive lever nor the tape eject button should be moved or touched when the drive light is on or when the drive is in use, lest the data stored on the media be destroved. £511+ the system has been moditied to take 188-248VAC, use a l.49Amp slow blow fuse, with a 2SBVAC rating. 12 PRELIM REV II THE 373 OWNER'S MANUAL PART NAMES 1.8. IPL INDICATOR The IPL (Interrupt Priority Level) indicator flashes the interrupt priority level aperating on the system during standard aperation. he success or failure of various selt-test programs is also tlashed during the bootstrap procedures and ROM Monitar operation (see Appendix B). 1.9. RESET BUTTON The reset button allows the user o unconditionally restart the 375. rhis is typically dane when the machine is initially turned on. However, it can be used to clear a stuck condition caused by hardware or software prablems that have temporarily stopped the S/3.1681 The reset button is the LAST recourse of a stuck machine. 1.19. POWER CONNECTOR The power connector is located in the rear ot the 375. Check to see that the power switch is in the OFF position before attaching the power cord that is supplied with the 375. 1.11. POWER SWITCH AND LIGHT The power switch is a rocker switch located on the back panel of the 375. Pressing the switch to the ON poasition will TURM ON the 35 and illuminate the green LED indicator on the +ront panel. Pressing the switch to the OFF position will TURN OFF the 3/3 and extinguish the LED. Care should be taken to see that the SYMMETR1IX operating system (it activated) is properly shut down before power is terminated to prevent any loss ot active files. Rapid or +trequent power cycling ( i.e. turn- ing the machine on/of+t quickly) should be avoided to extend the life ot system hardware. [6]1Care should be taken in the use ot this switch, as it results in the complete annihilation of software residing in processor memary. The fsck(8) command should generally be run ftallowing unnatural termination of SYMMETTRIX (see Appendix G for details). PRELIM REV I1I 11 CHAPTER 4 BEFORE OPERATION Before operating your new 375, you should follow these short and simple steps to aid you in setting up your machine. 1.1. UNPACKING THE 373 1. Open the top of the shipping carton by slitting the tape with a knife or scissors. Keep the carton, in case any service problems arise. 2. Remove the manuals and cables from the top of the machine. Pull the 375 out of the box. It is wrapped in a static-free plastic bag. Remove the machine from the bag and set on a desk top with both air inlet and fan outlet unblocked. 3. Remove the cardboard floppy disk drive insert (there is no insert if an tape drive is installed) and save with the rest of the shipping materials. If there are any dents or bulges on the unit, do not turn aon the power. Contact the supplier and the shipping agency at once for instructions and/or service. 1.2. BASIC ASSEMBLY 1. Place the 375 on a clean, dry, level surtace. All air intakes and the fan exhaust port must be clear of aobstructions. 2. Use the enclosed power cord Lo connect the 375 to a 128VAC line power saocket. DO NOT USE ANY OTHER VOLTAGE. USE OF ANY UTHER VOLTAGE WILL VOID YOUR WARRANTY.I[11 I+ you live in an area with an unstable power supply, purchase of a UPS (Uninterruptable FPower Supply) is strongly recommended. 3. Use the male-to-femalel2] RS232 cable to connect a 9699 baud ANSI terminal to the port on the back of the machine labeled *s/dev/console.” Other terminals may be connected to the other Lty ports, using RS232 cables. Consult Appendix I. 4. A parallel line printer may be& connected to the socket labeled "/dev/1p" using the Centronics printer cable provided. Be sure to align the red line on the cable with the black dot on the wmachine before plugging in the cable. Consult Appendix M. f11Check with the supplier for other voltage reguirements. {21 If the terminal requires a male-to-male cable, a standard RSZ232 cable nay be substituted. PRELIM REV I1I 13 THE 373 OWNER'S MANUAL BEFORE OPERATION 1.3. POWER-UP AND PROCESSOR ACTIVATION 1. When the 375 is properly connected, turn on the power. The green power LED and the red hard disk drive select LED should be 1lit,. 2. The system should begin the autoboot sequence. On a standardly con- figured machine, this will take about four minutes. A specially con- figured or fully loaded machine may take longer.[3] See Appendix C on *Bootstrap Procedures" {for further information. 3. The system will eventually respond with the login(l) prompt: login: You may now log in to the machine as the "owner" of the account: login! owner Refer to Chapter 7 on "Troubleshooting" should any other message appear. 4. You are now ready to use your 375 computer. Read Chapter S on "Starting the Operating System" for more information on the SYMMEIRIX operating system. {331t is strongly recommended that machines with many larqge drives and oth- er devices be shut-down only as needed. 14 PRELIM REV I1I CHAFTER 3 OPERATION OF YOUR 373 1.1. INTRODUCTION TO THE SYMMETRIX OPERATING SYSTEM SYMMETRIX is a virtual-memory operating system derived primarily from the University of California at Berkeley 4.2/4.3BSD version of UNIX. SYMMETRIX has incorporated other optimizations of 4.2BSD as well, in order to make it fast and easy to use. SYMMETRIX, the flexible and efficient system for the NS32009 Series microprocessor used in the 375, is noted for its virtual memory features. The operating system allows programs up to l&é-megabytes in size to be run on machines with only a fraction o+ the real memory actu- ally used in the system. SYMMETRIX does this by re-assigning the sec- tions of real memory to ditt+erent parts of the actual program as needed to make the program run. This "pay as you g9o" effect allows memory to be assigned only when necessary. When the number of sections (or pages) of used memory exceeds the size of real memory, they are moved tao the disk drive, and brought back to real mewmory as required. This is called Ypaging"” to the disk. Virtual memory can be thought of as a strategy which keeps the most frequently accessed objects in real memory (which can be referenced within 568 nanoseconds), and less frequently accessed objects on the disk (reference time in 39-190 milliseconds). With extremely large programs, more of the program will end up on the disk than in memory, resulting in a slower response time. However, unlike nonvirtual computers, the program will still continue to run, degrading the system only in a "fair" way. The virtual memory features also allow programs to beqin execution immediately, while the system is still loading code. A program is 9iven only the memory it needs to run, and not necessarily the amount of memory equivalent to its entire size. SYMMETRIX includes a number of programs and utilities for the user, all bundled with the system (see Chapter Z). Several thousand files come on the standard base system. The makers of SYMMETRIX intended a system which was immediately usable, without the need for buying or writing a large number of software packages. For users new to UNIX, the next three sections will introduce basic UNIX concepts. A new user should not only work through these sections, but also refer to Appendix T {for suggested works on the many aspects of this system. PRELIM REV I1I 135 THE 373 OWNER'S MANUAL OPERATION OF YOUR 3793 1.2. STARTING THE OPERATING SYSTEM To start the system, plug in a terminal (as described in Chapter 4) and turn onh the power to the 373. The system automatically boots up atter checking itself thoroughly.[1]1 Wait for login: to appear.[2] The log9in(l) message allows you to access the system. After the login banner appears, type: login: owner <{carrjage return> This will cause SYMMETRIX to identify you as the "owner®" o+ the account, and allow you to interact with the system. The system will respond with TERM = (vt22@): It is inquiring as to the terminal type.[31 I+ your terminal is not a VT220 styled terminal {such as an Esprit Opus 220 or Dec VIZ22¢), use Appendix @ to locate the abbreviated name of your terminal and type this in followed by a carriage return. (f your terminal is not in the list, type dumb into the keyboard. SYMMETRIX should respond with a prompt mes- sage system-name % indicating that you have {finished starting up the system. 1.3. A SAMPLE SESSION WITH SYMMETRIX: A BASIC TUTORIAL SYMMETRIX is a powerful system with hundreds of commands. It cannot be learned all at once due to the numbers of utilities and options. On-line documentation, through the man command, and papers on certain areas such as UUCP and Sendmail are provided. Appendix T also lists many useful text which may be studied. This section briefly covers sim- ple system commands. 1.3.1. The Shell When you "log in" to the 375, a command processor program is created for you. These programs are called "shells," since they insu- late a user from the arcane details of the SYMMETRIX operating sys- tem. The standard shell is called the csh(1).[4]1 Each command is 1] For information on the bootstrap procedure, see Appendix C. L21If it does not appear, consult Chapter 8 on "Troubleshooting.” [3]A terminal type other than the {199 may be specified by modifying either the "/etc/ttytype" file or the ".login"* file. f4)The cmh(1l) command processes the C shell, while the sh(l) command processes a Bourne shell. 16 PRELIM REV II THE 375 OWNER'S MANUAL OPERATION OF YOUR 375 requested by the shell with a prompt. The prompt on the “root* account is: system-name % The shell takes a line of text typed by the user and tries to execute it as a command. I+ there is no such command, the shell responds accordingly. Thus typing will cause the message: foo: Command not found. to appear on the screen. You may read about a particular UNIX command by use of the man(l) command. This command prints the on-line manual referencel5] for SYMMETRIX on the screen. For example, should you type: system-name % man man the instructions from the manual on the wman command will be printed. Any UNIX command contained in the manual may be referenced by typing The standard shell may be personalized by editing the *".cshrc” file. Aliases for commands may be installed, prompts may be modi- fied, and options in editing and other applications may be specified. See csh(l) and sh(l) for further information. Some nice commands for +inding intormation exist on the system. The apropos(i) command will reference a set ot related programs, tiles or commands, while whereis(l) will locate a particular command or file. 1.3.2. Creating and Modifying Files: Use of the Editor A file is a listing of commands or text which may have opera- tions performed on it by the operating system. Files may be as sim- ple as a few sentences, or as complex as a compiler or operating sys- tem. One of the ways to create a file is by using an editing system. There are several editors available on SYMMETRIX. Ex is the root of the family of editors:exdt)l}),edéditi}), ahuivill) .ExEx is also a superset of ed(l1), the standard editor. Edit is a simplified version oéded andxg¢x, and is more convenient for the casual userViVi andoveve [51The number indicates the manual section where the command appears. PREREMINREREY] 17 THE 373 OWNER'S MANUAL OPERATION OF YOUR 373 are powerful display-based editors[al,. To create a file of text, one invokes the name of the appropri- ate editor and a file name, either a totally new file name for a new file, or a current +file name if one wishes to modify an existing file. For example, should vyou wish to create a file using the vi editor, simply type: system-name % vi filel The editor will set up the file environment named "“+ilel," within which you may work. Once within this file environment, one must use the command syn- tax for generating text. Typing an “"a”" for "append” will allow you to type anything into the file. These commands will not be written on the screen, but they affect they the editing process nonetheless: {type an "a"> Now 1 can type some text... ~ To get back to the command sytax level, type an "escape" character. One can move around the displayed text while in the command mode by typing "-n for "up, " "return" {for "down," "space" {or forward space and "backspace" for backspace. Insertion and deletion can be accomplished using "i® for insert and "dw" for delete word or "dd* for delete line. Once you have finished typing into your file, type "escape" and wq to "write” and "quit"” your file. You have now created your own {file, This is only an EXTREMELY basic lesson in vi. All these edjitors have many powerful features useful in software development, as well as the obvious uses in word processing. Consult the online manual and Appendix T. There are many books available on all of these edi- tors. The document Edit: A tutorial provides a detailed introduc- tion to edit, and assumes no previous knowledge of the operating sys- tem or editors. An Introduction to Display Editing with Vi details the vi editor and =mome of its more interesting {teatures. The Ex Reference Manual is a complete manual on the features used in ex {as well as vi). 61 EMACS, another display based editor, is also available. 18 PRELIM REV II THE 3753 OWNER'S MANUAL OPERATION OF YOUR 373 1.3.3. Simple Commands The shell can be used to run some sSimple commands. The 1m(1) caommand will list all files associated with that account in the current directory. Typing system-name % 1wu in the "owner" account reveals: tilel file2 Another command, cat(l) (for concatenate) allows the user to viewl(?7] and create files. For example, typing results in a listing of the text contained in the file: line 1 of filel line 2 of filel... and so forth The cat command is useful in linking many files together. The com- mand system-name % cat filel {filez will produce a listing of text as follows: line 1 of filel line 2 of filel... etc. line 1 of file2 line 2 of file2... etc. Many other arguments may be used with the cat program. For example, you can it to merge two files into one file with the command The *>* character is short for "direct my output to the file instead o+f the terminal’s screen." If, after this command, we type cat newfile, we will get a file containing the text: line 1 of filel line 2 of filel... etc. line I of file2 line 2 of fileZ2... etc. £71Using ctrl-8 (the stop character) will cause the output to your screen to be suspended. To resume 1/0, simply type a ctrl-a. PREREMINEREYI 19 THE 373 OWNER'S MANUAL OPERATION OF YOUR 373 Other useful commands are the cp(1) (copy) and mv(i) (move) commands. The cp command allows you to copy the contents of an old file into a new file, without altering the contents of the pld file. The mv com- mand, however, allows you to rename a file by moving the entire con- tents of the pld file to a new file. Executing the commands wmv newfile file and cp file anotherfile followed by 1ls, we will see: anotherfile file filel file2 The rm(1l) command allows us to remove files. Typing rm anothertile file followed by a 1ls results in: filel file2 We are back to where we started, 1.3.4. Directories SYMMETRIX is modularized, so that all the +files and programs contained on the system can be traced down and accessed in an orderly wWay. It is arranged in a branching hierarchy, with the "root” at the top, and subdirectories below. The user can move up and down this hierarchical tree by use of the cd(1) (change directory) command. For example, should you wish to move from a personal directory (the "home" directory) to a personal subdirectory, you would type A ls would result in only the files of the subdirectory listed. One can move back to the main personal directory by typing cd /usr/accauntname. Simply typing cd will get you back to your main personal directory from anywhere. Check the cd(1), mkdir(1l) (make a directory), andmdaddi{tll) (remove a directory) commands for further information. You can always {ind out where ypu are located oh the tree with the pwd(l) (print working directory) command. If you are in the "owner"” account the system-name % pwd command will result in: /usr/owner 1.3.3. Using the language tools: Sample Programs One can use theatat program to input simple programs, since this command, when given no arguements, reads from the terminal directly. The following sample programs have been written in C, Pascal, FORTRAN 77, Assembler, LISP, ICON, BASIC, and APL. Each program demonstrates the use of the C, Pascalf8], FORTRAN 77, and Assembler compilers, and 20 PRELIM REV Il THE 373 OWNER’S MANUAL OPERATION OF YOUR 373 the LISP, ICON, BASIC and AFL interpreters. The compilers translate the program into an executable form. Une may then run the program by typing the executable +filename. The interpreters are invoked directly by typing the interpreter name before the program. Appendix T contains a list of reference texts {or each languaqe. A. A Sawmple C Program One may impliment the following C program by typing the set of commands: cat >prog.c main(){ printf{"hello world from C\n"); 3 {type a ctrl D here> This results in the creation ot a file, "prog.c". The C compiler is invoked with the command €c prog.c -o prog The program is run by typing the executable filename prog result- ing in the output: hello world from C Consult cc(l) for further information. B. A Sawmple Pascal Program One may impliment the {following Pascal program by typing the set of commands: cat >prog.p praogram hello(output); begin writeln(’hello world from Fascal’) end {type a ctrl D here> The Pascal compiler is invoked with the command pc prog.p -o prog The program is run by typing the executable {ilename ‘prag’, resulting in the output: hello world from Pascal {8]1Both a Pascal compiler and Pascal interpreter are available on the 3/5. Refer to pi(l) for information on the interpreter. PRELIM REV II 21 THE 373 OWNER'S MANUAL OPERATION OF YOUR 375 cl 22 Consult pc(l) for further information. A Sample FORTRAN Program One may impliment the following FORTRAN program by typing the set of commands: cat >prog.+ print 1o 19 format (*hello world {rom FORTRAN’) end {type a ctrl D here> The FORTRAN compiler is invoked with the command +77 prog.+ -o prog The program is run by typing the executable +{ilename ‘prog’, resulting in the output: hello world from FORTRAN Consult #77(1) for further information. A Sample Asssambler Program One may impliment the following Assembler program by typing the set of commands: cat >prog.s _main: addr 290, tos movd $msq, tos movqgd %1, tos bsr _write adjspb $-12 ret 2] msg: .asciz "hello world from Assemblergd {type a ctrl D here> The Assembler is invoked with the commands as -o prag.o prog.s 1d ~o prog /lib/crt®.o prog.o -lc The program is run by typing the executable +filename "prog," resulting in the output: hello world from Assembler Consult as(l1l) and ld(1l) for further information. PRELIM REV I1I THE 373 OWNER'S MANUAL OPERATION OF YOUR 3735 H. PRELIM REV II A Sawmple LISP Program One may impliment the following LISP program by typing the set of commands: t;zfiun hello (prins "hello world from LISP")) (hello) resulting in the output: hello world from LISP Consuli limp (1) for further intormation. A Sample ICON Program One may impliment the following ICON program by typing the set ot commands: cat >hello.icn procedure main() write "hello world from ICON" end {type a ctrl D here> icant hello.icn hello i resulting in the output: hello world from ICON Consult icon(l) for further information. A Sample BASIC Program One may impliment the following BASIC program by typing the set of commands: basic 19 print *hello world {from BASIC® run resulting in the output? hello world from BASIC Consult basic(i) for further information. A Sample APL Program APL is an unusual language in that it requires a specitic termi- nal equipped with the symbols required for implimentation. 23 THE 373 OWNER'S MANUAL OPERATION OF YOUR 375 However, the interpreter comes with an option which will translate character sets to the necessary symbols and back again, One may impliment the following APL program by typing the set of commands: apl delta hello delta quad quote <- ‘hello world from APL’ delta resulting in the output: hello world from APL Consult apl(l) for further information. 1.3.6. Multitasking with the Shell The UNIX environment is structured to run many tasks and com- mands simultaneously. Following any command with an & signals the system to immediately return a praompt, while continuing to process the command: system-name % command & Thus, you do not have to wait for a time-consuming process to be com- pleted before resuming any other work. Another way to push a job or process intop the background is by stopping the job (using a ctrl Z ) and then using the shell command far background: system-name % bg One may return to the job by typing: system-name % $q9 These commands are 4requently used to run a compiler, document pro- cessaor program, aor other lengthy programs in the background while working on another +file with the shell or editor. (See ah(l) and csh(l) for more information on shell commands). 1.3.7. Communication Between Users: Write and Mail Often, it is imperative that messages be sent between people on the same machine, whether they are both logged in to the system or not. SYMMETRIX allows people to communicate directly via the writetl) command. For example, i+ both lynne and bill are currently logged on to the 375, all lynne has to do to bother bill is type: system-name % write bill Hi Bi11! 24 PRELIM REV I1I THE 375 OWNER'S MANUAL OPERATION OF YOUR 373 Bill will receive a message on his console: Message from systemname!lynne on ttyl at 10:55 ... Hi Bill! He can then write back to 1lynne by typing "write Ilynne." The transmission can be terminated by typing a cterl-D. Now, suppose bill was not currently logged in to Lthe 3/5, but lynne wished to leave a messaqge. She would then use the mail (1) facilities!: system-name % mail bill Hi Bill! Various options +or mail are invoked by typing: i The letter is sent by typing a ctrl-D. When bill logs into the system, he will get a message on his console: You have mail. To read his mail, he would type: system-name % mail The mail facility will print out a 1list of messages. Typing the number of the message will cause it to be printed out on the screen. Other options are listed by typing: ? The local mail setup instructions are discussed in Appendix E. Remote mailing facilities, such as UUCP, are more complex. Cansult Appendix J and P {for further information. 1.3.8. Localhost “{ pcalhost” is a program which can demonstrate how one navigates thraough the layers of sotftware in a network using your own 3/5. It is often used to test local network sof tware independent of the hardware and for specialized software. To simulate what a network does, you can simulate a remote lpgin into your system again through the use of localhost. system-name % localhost is followed by the statement: PRELIM REV I1 23 THE 373 OWNER'S MANUAL OPERATION OF YOUR 373 Last login: date on ttyl system-name % you have just logged into "owner" from "owner." I+ you inquired as to who is currently logged into your machine, by use of the who(i) com- mand, vyou would get the responsel owner ttyl date time owner ttyp® date time You are now logged into a fictitious tty port called "ttyp@" on the same machine. This may seem trivial, but the point is that networks work on this simple principle, whether you talk to a remote machine or perpetually 1lo9in to the same machine. Localhost is the simplest example of the TCP/IP networking protocols. It utilizes theloSao® local loopback interface (network interface) to reflect outward-bound *packets” back into the system. The local loopback interface is used in network testing and the mail system. To logout of this new port, type: system-name % logout You are now back in the owner account on ttyl again. There are other interfaces which are much more complex: Serial Line IP (SLIP) and ETHERNET. See Lhe related Appendices {or further information. For information on the Internet networking protocols and +amily (inet(4)), consult Appendix H. 1.3.9. UUCP and Remote Sites The 375 is equipped to allow people to communicate with each other, not only aon the machine in use, but also through other machines which are on the local network. One older communications network is the UUCP (UNIX to UNIX Copy) system. This network involves correct configuration of many files and can be very complex. Appen- dix J should be consulted. 1.3.19. Games No computer system would be quite complete without games. The 375 offers a variety of computer games located in the "/usr/games” directory. Some of these games are very {amiliar, and some are dif- ferent. Trek is a version of Star flrek; Rogue is a screen-oriented “video" game based on the popular Dungeons and Dragonsy Mille is an adaptation of the popular European card game; Fortune utters random one-line jokes and sayingsi and so forth. Any of these games may be accessed by typing the name of the program: system-name % trek 26 PRELIM REV I1I THE 373 OWNER'S MANUAL OPERATION OF YOUR 373 * ¥ ¥ STAR TREK ¥ ¥ ¥ what length of game: 1.3.11. UNIX Tutorials The session just worked through is only a very basic tutorial of UNIX. However, this system has a g9reat deal to offer; much mare than can be covered in this short section. You are strongly encouraged to learn more about UNIX by reading the other recommended texts listed in Appendix T. These books offer the basics of day-to-day use, ment preparation, system tools, and language tools. 1.4. SHUTTING DOWN SYMMETRIX After completing your work on the 375, you must "log of+" tem: system-name % logout This command terminates your session with the computer. Tao turn off the system, either thshabdowowS8lg8) ohabkiIBI8) may be run.[91 Both of these commands write the files to the disk, ensuring that no file loss occurs. These commands must be run as docu- SYS~— commands thus root. Before executing either command, make sure no aother people are working on the machine. After the ROM monitor "¥" prompt appears, be turned off. [?IRefer to Appendix C for details on the shutdown procedure. PREREMINEREYI the power can CHAPTER 6 USE OF THE INTERNAL FLOPPY OR TAPE DRIVE 1.1. THE INTERNAL FLOPPY DISK DRIVE MECHANISM The standard 375 computer comes wWwith an internal large-capacity +loppy disk drive. The floppy disk drive bezel is located on the front of the 375. The following types of floppy drives may be installed oan your machine: Drive Type Size (SCS Fmt/Stnd Fwmt) # tracks 1 MByte 88K /728K 88 track 1.6 MByte 1.44 MByte/l.2 MByte high-density 4 MByte 3.6 MByte/3 MByte very high-density For information on the insertion of floppies and the operation aof the drive, see Chapter 3. The correct floppy size and type depend on your particular drive. The following is a list of basic floppy media specitications: Floppy Media Specitications 1. 5-1/4 Inch 1 MByte Floppy Double-Sided Double Density Soft Sectored 96 TPI 2. 95-1/94 Inch 1.6 MByte Floppy Double-Sided Double Density Soft Sectored 96 TPI High-Density Designation 3. 3-1/2 inch 4 MByte floppy Double-Sided Quadruple-Density Soft Sectored 135 TPI Very High-Density Designation Obviously, 95-1/4 inch floppies and 3-1/2 inch floppies cannot be inter- changably wused on a drive. In addition, {loppy media for the 1.2MB high-density floppy drive and for the IMB standard +floppy drive are chemically incompatible and cannot be used interchangably. However, all the software commands for reading, writing and formatting these floppies PRELIM REV 11 29 THE 373 OWNER'S MANUAL INTERNAL FLOPPY / TAPE DRIVE 32 are still the same. Follow the manufacturer’s instructions on which floppy type to use. It is strongly recommended that either the cardboard insert sup- plied with the system or a blank floppy disk be left inside the floppy disk drive slot when not in use. Do not leave the drive empty and either unlocked oar locked. THE FLOPPY DRIVE MAY BE DAMAGED BY TURNING THE LEVER WITHOUT AN INSERTED FLOPPY, THUS VOIDING YOUR WARRANTY. 1.1.1. Cleaning the Floppy Drive Heads Cleaning of the magnetic heads of the disk drive is strongly recommended, in order to improve data reliability. A standard clean- ing disk from a retail compuler store is usually acceptable. Consult the floppy disk drive manual for more intormation. 1.1.2. The Use of Floppy Disks Floppy disks wmay be used to transfer files between systems, retain backup dumps of the internal hard disk, or stored as ordinary filesystems. In each of these cases, the structure ot information on the disk will be different. The tar(l) command may assemble a group of files to be written as a single stream of data onto the disky this is usually the quick- est way to transfer a few small files between systems. The dump(8) command is a methodical attempt to backup and write the internal hard disk data onto multiple floppiesi this is the stan- dard way to do a system backup (see Appendix F on system backups). Dump may also be used to perform incremental backups by copying only files which have been madified since the last dump. The floppy can also be used as a UN1X tilesystem, and hence is visible as a group of ordinary files and directories. 1.1.2.1. Formatting a Floppy Disk In order to use a floppy, it must contain appropriate timing information. This is done using the disk formatter program fdfor- mat (8). All blank floppies must be formatted before the fFfirst use. The standard {ormat and device name {or ANY internal 375 floppy drives is as follows: # sectors/track device name Five 1249 Byte /dev/{d@a or /dev/r+déa The procedure for formatting a floppy is as follows: 1. Place an unformatted floppy in the floppy drive slot with the labeled end towards vyou. PRELIM REV II THE 373 OWNER'S MANUAL INTERNAL FLOPPY / TAPE DRIVE 2. Turn the lever to the "locked" position. 3. Type the following command: system-name % /etc/+dformat The computer will count up the number of tracks formatted until you reach the appropriate number of formatted tracks for your drive type. It will then be ready for another floppy. Simply type "n" to quit. One can also run the floppy formatter in standalone mode. For information on this procedure, see format(8) and wd(4) for more information. 1.1.2.2. Reading Other Floppy Formats Floppy disks are available in a variety of formats. These disks may differ not only in the arrangement of data, but also in the the actual disk media format. fhe following are +flappy for- mats which can be read on the 375 computer: size # sectors/track device name who BOOK S 18249-byte tdev/ fdda, /dev/ridad 5CS 720K 9? S512-byte /dev/+ddb, /dev/r+dbg 1B In addition one can read 49-track floppies in the MS/DOS for- mat commonly generated by personal computers, such as the IBM PC, by use of the wmmget(l) command. Simply insert the floppy tao be read and type! SYMMETRIX also supports the various common combinations of both single-sided and double-sided disk drives, including the 8@-track drive, 4@-track drive, 80-track drive reading 4&8-track +loppies, with either 1. five 1924 byte sectors per side 2. nine 512 byte sectors per side, or 3. eight 512 byte sectors per side. In addition, SYMMETRIX has the ability to read arbitrary soft- sectored +floppies. I+ a disk is ot an unknown media {ormat, all combinations of sector size may be tried to determine that parame- ter, followed by a successively larger number of sectors per track, until the format is faound. See wd(4) for further infarma- PREREMIREREYI 31 THE 373 OWNER'S MANUAL INTERNAL FLOPPY / TAPE DRIVE tion on how to read non-standard formats.(1] Data format (the differences between TAR, {filesystem, and dump formats) wmay be determined by using each format’s unique utility. For example, tar tv will work only i+ the disk is in TAR format, restore -t will work only i+ it is in dump {ormat, and fuck will determine it it is in filesystem {format. 1:1:8:, 3, Reading and Writing FloppiesiThe Use ot TAR Theatat)i) command saves, restores, and allows the listing of multiple files on a floppy or other media.f{2] A TAR (Tape Archive) disk may be read by inserting the disk and typing: system-name % tar xv A listing of the files on a TAR disk made by inserting the disk and typing: system-name % tar tv A TAR format disk may be written by inserting a formatted diskette into the floppy disk drive and issuing the command: system-name % tar cv filel +ile2 file3 ... {filen where filel ... filen are the pathnames of +files to be written onto the floppy. The "c" option indicates that tar(3) should Wwrite (create) a disk while the "v" option reports it’'s progress as it writes each {file out. One may quickly copy the contents ot a +floppy onto another formatted floppy through use of the cpfd(8) (copy floppy) command. Simply insert the floppy to be read and type: system-name % cpfd Insert floppy to be read and hit return > Cafter reading the floppy it will prompt:)> Insert formatted floppy to be WRITTEN and hit y and return It is important to note that sincéeaktar only uses one floppy at a time, it cannot record more than the contents of that floppy {either 899K, 1.44 MBytes, or 3.6 MBytes). Since the TAR format requires extra space for filename and crc, allow at least 190-59K for overhead when computing multivolume sets of TAR diskettes. {1JApple, Commodore, Heathkit and other manufacturers’ systems that use ei- ther hard sector floppies or GCR formats generate disks that are unreadable by the hardware of this system. [21The tar(l) command defaults to the internal +Joppy drive unless a tape drive is present or if otherwise specified. 32 PREREMINEWNEWI THE 3735 OWNER'S MANUAL INTERNAL FLOPPY / TAPE DRIVE 1.1.2.4. Creating a Floppy with a Filesystem 1.1.3. One may wish to create on a floppy a UNIX filesystem contain- ing a group of files and directories. This can be done with the mkfn(8) command: system-name % /etc/newfs /dev/£fd9 {loppy This command will write an empty filesystem data structure onto the diskette. Such a filesystem may be checked for consistency with the fsck(8) command: The user can gain access to the file structure on the +loppy by mounting the floppy onto an existing directory in the UNIX {filesystem. This is typically done by the superuser with the mount (8) command: system—name % mount /dev/{+d@ /mnt This command would associate the directory */mnt® with the root directory of the floppy. Files fog, bar and bletch on the floppy could then be read with the pathnames "/mnt/fooc”*, "/mnt/bar”*, and “"/mnt/bletch®*. If the user wishes to mount another floppy, the user should first use the umount(B8) command to release the currently mounted floppy: WARNING: It is impossible to dismount a floppy if there are any open files at the time the umount command is issued. This includes the case where the current working directory (see pwd(l)) is on the +floppy (the command shell itself will hold the directory open). Generally, it is best not to cd the "/mnt" filesystem. FAILURE TU UNMOUNT THE FLOPPY MAY HAVE DIRE COUONSEWUENCES FOR BOTH THE SYSTEM AND THE USER’'S FLOPPIES. UNIX has clever algo- rithms which try to speed up or postpone disk transfers, and the system has no knowledge of when and i+ the media has been removed. External Floppy Drives Normally, only the internal floppy drive will be used on the 375. This unit is the lowest-numbered floppy, normally accessed with the device name /dev/+d#. Higher-numbered floppy drive units may be sel ected with the names “/dev/+dl", "/dev/+d2", and "/dev/+d3". Con- sult Appendix A and wd{q4) for the device naming caonventions of the system and its standalone utilities. PRELIM REV II 33 THE 373 OWNER'S MANUAL INTERNAL FLOPPY / TAPE DRIVE The tar command normally assumes that the device that should be written to or read +from is the tape drive (/dev/rmt8). On units without tapes, this device name is symbolically linked to the device name /dev/fd¥ so that the tar command will det+ault to using the internal floppy. Symbolically linking is accomplished by typing In -8 /dev/fd¥ /dev/rmi8 to link sdev/4d@ to /dev/rmt8. Another tar command option allows you to specify diftferent +loppy drives or tape drives or ordinary filenames. For example, to list the contents of a TAR disk on drives & and 1 respectively, the following commands may be used: system-name % tar tvf sdev/£d@ system-name % tar tvf /dev/fdil 1.1.4. Floppy Error Messages Error messages from the {loppy devices are ijidentical to the hard disk error messages described in Appendix G. 1.2. THE INTERNAL TAPE DRIVE MECHANISM The 375 can be fitted with a streaming tape drive. The +ollowing drives may be installed in your machine: drive type size cassette S5OMB cassette &9MB cartridge (3M) &69MB cartridge (3M) 1235MB Follow the manufacturer’s instructions on the correct tape type needed. See Chapter 3 on inserting/ejecting tapes. Obviously, cassettes and cartridges cannot be used interchangably. However, all the software commands for reading and writing tapes remain the same. Follow the manufacturer’s instructions on which tape type to use. 1.2.1. Cleaning the Tape Drive Heads Cleaning of the magnetic heads of the tape drive is strongly recommended, in order to improve data reliability. Gently rub the heads very LIGHTLY with denatured alcohol on a g-tip on a to vyearly interval. Consult the tape drive manual tion. gquarterly for more informa- 34 PRELIM REV Il THE 3785 OWNER'S MANUAL INTERNAL FLOPPY / TAPE DRIVE 1.2.2. The Use of Tapes Tapes, like floppy disks, may be used to transfer t+iles between systems and retain backup dumps of the internal hard disk. In each of these cases, the structure of inforwmation on the disk will be different. The tar(l) command may assemble a graoup of files to be written as a single stream of data onto the disk; this is usually the quickest way to transfer a few small files between systems. The dump (8) command is a methodical and lengthy way o+ automatically seq- menting and writing the internal hard disk filesystems onto multiple floppies; this is the standard way to do a system backup (see Appen-. dix F on system backups). 1.2.2.1. Formatting a Tape You do not need to specially {tormat tapes. They automati- cally format as you write. 1.2.2.2. Reading and Writing Tapes:The Use of TAR Theatdtll) command saves, restores, and allows the listing of multiple files on a floppy or other media.l31 A TAR (Tape Archive) tape may be read by inserting the tape and typing: system-name % tar xv This command reads the first TAR +file on the tape and then automatically rewinds the tape. When you do not want the tape to rewind, but wish to read a second tar file from the tape, use the no rewind device name /dev/nrmti with tar: system-name % tar xvf /dev/nrmtil You are now positioned at the end of the +irst TAR tile. To read the next one, vyou would again type the TAR commands above. If you wished to skip over the tape to the second TAR +tile, you could write the faollowing: system-name % tar tf /dev/nrmtl > /dev/null You have thrown away the output of the ftirst TAR {ile to /dev/null and have read the second. To proceed further down your tape, Yyou continue analagously. A listing of the files on a TAR disk made by inserting the disk and typing: [31The tar(l) command defaclts to the internal tape drive unless otherwise specified. PRELIM REV I1I1 33 THE 373 OWNER’S MANUAL. INTERNAL FLOPPY / TAPE DRIVE system-name % tar tv A TAR tape may be written by inserting a tape into the drive and issuing the command: system-name % tar cv fileil file2 +ile3 ... filen where filel ... f+ilen are the pathnames ot {files to be written onto the tape. The "c" option indicates that tar(3) should write (create) a disk while the "v" option reports it's progress as writes each file out. It is important to note that since tar only uses one tape at a time, it cannot record more than the contents of that tape. Since tapes are normally guite large, this usually is not a prob- lem. However, should vyou place many TAR files onh a tape, there will be a file mark written between each TAR file each time tar is used to write a file with the no rewind device name. One should plan accordingly. 1.2.3. Internal Drive Device Name The internal device name for any tape drive is "/dev/rmti." How- ever, specific device names for different types of tape drives are specified in Appendix A. The internal tape drive is the detault drive on all tar commands. 1.2.4. External Tape Drives and Other SCSI Devices Normally, the internal tape drive is the default drive on your machine. However, other SCSI tape drives and devices may be accessed through the SCSI interface on the back of vyour unit. fhe internal drive device name is!: /dev/rmti Consult Appendix A for the device naming conventions of the system and its standalone utilities. Consult Appendix N for external SCSI device use. 1.2.3. Tape Error Messages Error messages from the tape devices are discussed in Appendix B of this manual. 36 PRELIM REV II CHAPTER 7?7 TROUBLESHOOTING The following is a list of possible solutions should problems arise in using your 3I75. Always remember to check all cords and connectors before use. Make sure that your power supply is reliable, as fluctuations may cause seri- ous problems (see “"System Precautions” in this manual). Consult the factory it serious problems persist. 1.1. NO POWER LIGHT (GREEN LED) 1. Check to see that the power cord is firmly inserted in back ot the 37s5. 2. Check the fuse under the fuse holder cover and replace if necessary (see "Fuse Halder and Fuse" in Chapter J3). 1.2. NO ROM MONITOR BANNER MESSAGE: SYSTEM WILL NOT BOOT 1. Attempt to reboot by hitting the reset button. 2. Check all cables, plugs, and terminals for proper connections. A broken or damaged cable will result in improper operation. 3. Check hard disk select light (red LED). This should light &0 seconds after power is applied. If it doesn’t light, press the reset button on the back of the machine. If it continues to fail, contact the factory. 4. Check console for system banner message "Symmetric 32016...". Should the system stop without comment after this message, the system’s microprocessor chipset may be damaged. Contact the sup- plier. 1.3. SYSTEM WILL NOT COMPLETE BOOT SEQUENCE i. Attempt to reboot by hitting the reset button. 2. Check consble message for boot error failure. A boot error message may indicate a disk drive or other failure. See Appendix D for further information. 3. Check cables at rear of internal disk drive, extreme shock during shipment may have dislodged them. 4. Should the bootstrap procedure stop completely before the disk check or return a # sign, the appropriate files may be missing or in error. See Appendix G. PRELIM REV II 37 THE 373 OWNER'S MANUAL TROUBLESHOOTING 1.4. SYSTEM PAUSES AFTER PRINTING SYMMETRIX RELEASE BANNER 1. Check CPU board to see if microprocessor chip cluster or PALS have been dislodged from sockets by shipment or shock. 1.3. SYSTEM PANIC AND BOOT ERROR MESSAGES 1. A NOROOTDEV or iinit panic on booting the system indicates a failure in reading the Winchester drive. See Chapter 6 {for {further infarmation. 2. A supervisorabort or intlevelabort message on booting may be caused by overheating. Check the temperature and ventilation. Should either chronically reoccur, contact the factory. 3. A hard disk error message indicates disk drive problems. Consult Appendix G for information on hard and soft disk errors. q. A stray interrupt ignored message implies an interrupt control failure. If it constantly reoccurs, contact the factory. S. Far futher information, other panic messages, device errors, and boot errors are detailed and diagnosed in Appendix D of the manual. 1.6. ROM MONITOR DOES NOT RESPOND 1. Check tp see that the terminal is plugged into the "/dev/console" port. 2. Check the RS5232 cable for correct type and proper ’> The monitor prompt indicates it is ready to echo and execute an interac- tive monitor command. The various monitor commands and their use are PRELIM REV II 49 THE 373 OWNER’S MANUAL THE 373 ROM MONITOR Symmetric 32000 Monitor (autoloading /vmunix, press RESET to halt) loading /boot {loading C bootstrap from disk> 7784 +19098+298%9 Boot: /vmunix {C bootstrap loads default system> 1493594+18432+42336 {unix loaded> RELEASE 4 SYMMETRIX (copyr. 1986) Symmetric Computer Systems 4.2 BSD UNIX #258: Sun Jan 4 96:903:90 PST 1987 root@scs-eng: fusr/src/sys/S37SREV3 {unix coming up > real memory @x200090 (2048K) {kernel Pxads8g@(842K) + user Ox15+800 (1406K) } using 192 buffers containing 2088%6 bytes of memory, swap 3980K Automatic reboot in progress,,, char- acters are ignored. The backspace key may be used to edit delete) previously typed input. Commands may be aborted at any time by typing the escape =346 ¥ Al A2 V [bwdl:" Fill memory from Al to A2 with byte, word, or dou- bleward value V. d Al N: Dump (print) °‘N’' bytes of memory starting at Al. The data is formatted as for the load command input. NOTE: although the data is printed in 8-digit groups, these are not really doublewords, as the order of the bytes is from the least significant to the most signiticant. = Single step: execute the current instruction. g Start the program (with the current pc). h: Help command. Prints syntax and usage of commands (not yet implemented). 1 1 A_DDDDDRpCC: Load bytes DD... starting at address A. Bytes are represented in hex ascii, up to 16 data bytes (32 hex characters) per line. The line is terminated by a8 check sum byte, which is the two-digit hex ascii representation of the 8 bit sum of the data bytes on the line. I+ the transmitted checksum does not match the computed checksum,the message E CRC is printed with the value of the computed checksum. i: Start the binary image Iloader. The image loader reads a header, data bytes, and then a one-byte checksum from the serial line. The header consists of a 32-bit starting address and a 32-bit length value. These parameters are sent as 8-bit bytes, least significant byte first. The length parameter specifies the number of data bytes,to be transferred as 8-bit binary bytes. The check sum is also transferred as an 8-bit byte. , {bs’>, and control/s have no special meaning in this mode. PREBREMINEREYI 33 THE 3735 OWNER'S MANUAL THE 373 ROM MONITOR v Al L: Compute and print the 32-bit checksum of the "L" bytes beginning at address "Ai." : Do a nonsequential fetch step, using NS32882 MMU. 1: Run test 1. This test probes the RAM configuration at every 4k interval, up to 2~23 bytes. It probes by writing and reading double words of both value | and value -1, t2 A N: Run test 2 starting at address A for N bytes. This test runs the memory diagnostics described in the diagnhostics section. t3: Run the processor cluster diagnostics.Note that all of the chip set (CPU,MMU,FPU, ICU) must be present. This test runs the processor diagnostics mentioned in the diagnostics section (not yet implemented). i eeel Ignore "...". Q: Silently run a command (i.e. don’'t echo). The Boot command b has many options and deserves special mention. The format for this memory command is as follows: b fF DNCI: This command reads the boot block off the disk drive at the begining of RAM memory and executes it. The parameters have special meanings: F: How to boot the system. F consists of the +ollow- ing:® & instructs the system to be booted as "mul - tiuser.” 2 instructs the system to be booted as “singleuser.” 3 prompts and 4 instructs that the "miniroot” be booted. D: The device type. @ means "wd," 1 means SCSI, 2 means SCSI reel tape rmt3’3 means SCSI cst, an€ 4 means "enet." N: The drive number (for wd) or the target number (for SCSI). 2 [ 4 gy Cc: The cylinder number (for wd) or the blpock address (for SCSI) or record size (for SCSI reel tape). If F or D are present, pass them to the boot block as bootstrap flags and boot device in r? and ré respectively. If N is present, boot from the Nth drive in place of the default drive zerao (note: drive three is the floppy). If C is present, select the Cth cylinder to read the boot block in. Note that N and C are also passed in r5 and r4 respec- tively to the boot block. Note also that all parameters are in hex. 4 PRELIM REV I1I THE 375 OWNER'S MANUAL THE 373 ROM MONITOR 1.7. MEMORY DIAGNOSTICS The t2 command starts test two, the memory test sequence. There are 8ix subtests which are run in sequence. After the last subtest has run, the sequence is restarted. The memory test itself uses no RAM at alil. I+ a failure is found, RAM locations on the stack are temporarily used by the formatted output routines. If the range selected for testing includes the stack, spurious errors may be reported, but only if actual errors were present. The first error reported will always be a real error. Memory Test 1: Address Parity This test computes even parity for each word address. The parity Dbit is then extended to form 16 bits of zeroes or ones, and the exclusive-or of this value and the current pattern is written with word context. The words are then checked on a seconhd pass. Memory Test 2: Increasing Addresses This test writes the exclusive-or of the pattern and the address with doubleword context +or each doubleword address. The addresses increase upwards from the base and are checked on a second pass. Memory Test 3. Decreasing Addresses This test is like the previous one, except that the addresses are written from the highest down. The second pass is the same, however, checking lower addresses first. Memory Test 4: Double Words Test 4 writes each pattern into each doubleword. Memory Test 3: Even Words The lower word of each pattern is written to each even word. Memory Test 6: Even Bytes The lower byte of each pattern is written to each even byte, 1.7.1. Subtest Patterns Each of the subtests cycles through seven patterns. The applica- tion of the pattern is dependent on the subtest involved. The pat- terns are enumerated in Table 1I1. 1.7.2. Subtest Sequences Each subtest prints its name as it starts. The names are enumerated in Table III. PRELIM REV 11 33 THE 375 OWNER'S MANUAL THE 3735 ROM MONITOR 36 Table II: Subtest Memory Test Patterns No. Fattern Function 1. DADBIADD all zeros 2. AR R R EEE R all ones 3. aaaaaaaa adjacent bits different q. 55555555 adjacent bits different 3. 11224438 a different high in each byte 6. eeddbb?? a different low in each byte 7. 3IPa’c?36 miscellaneous bits Table III: Subtest Memory Tests Segquence Names, No. Name Context Test 1. parity words parity(address) xor pattern 2. addr -> doubles address xor pattern, low to high 3. addr <- doubles address xor pattern, high to low q. doubles doubles pattern 3. e. words even words pattern 6. e. bytes even bytes pattern 1.8. TEST FAILURES When a test fails, a message is printed with the following +ormat: Failure(=addr=xor=test=mem) =AAAA=XXXX=TTT Ir=MMdiM The error message may have the following components: AAAA The address containing incorrect data. XXXX The pattern providing the current test variation. TTTT The expected contents of memory. MMMM The actual contents of memory. 1.9. MONITOR EXCEPTION TRAPS The monitor, by default, catches processor exception traps. When it catches a trap, it prints an E and a name from the following list of trap names: NVI Non-vectored interrupt. PRELIM REV II THE 373 OWNER'S MANUAL THE 373 ROM MONITOR NMI Non-maskable interrupt (can also be MMU memory breakpoint). ABT Memory management unit memory cycle abort. FPU Floating point unit exception. ILL Illegal instruction. 8sVC System call (svc) instruction encountered. vz Integer division by zero occurred. FLG Flag bit in PSR is set and flag instruction executed. BPT Breakpoint (bpt) instruction encountered. TRC Execution completes and trace bit of PSR is set. UND Undefined instruction. After printing one of the above messages, the monitor prints a # prompt and accepts commands fraom the terminal. Register contents at the time of the trap can be printed and/or modified. When the monitor starts up interactively (e.9. two resets), it uses an SVC instruction to build the initial stack frame, thus it generates an E 8VC message. 1.16. IPL INDICATOR The LED indicator on the back panel displays (during UNIX opera- tian) the Interrupt Priority Level and Software Interrupt status. The Interrupt Priority Level for UNIX is a number (1-7) which describes the priority level of masked interrupts. If the indicator is set at 7, even the highest priority interrupts are disabled, while if it is set at 1, only the very lowest priority interrupts are disabled. When the indica- tor is unlit (i.e. priority @), all interrupts are enabled. See Appen- dix R. The left decimal point is used during UNIX operation to indicate that a software interrupt is pending. The software interrupt facility is used to run network message processing. The blinking rate of the indica- tor demonstrates how much network activity is present. The monitor uses the IPL indicator differently during an reset/s/autoboot sequence. The indicator successively increases in value as it resets and autoboots “/vmunix*. After the system prints the banner, the IPL indica- tor resumes it’s normal function. Should the system freeze during either reset or autoboot sequence, the indicator may show where the difficulty may be found. If the indicator is frozen, the specified test has PRELIM REV II 57 THE 373 OWNER'S MANUAL THE 373 ROM MONITOR 38 failed: - Cannot execute instructions +from ROM. 1 Failed address inversion (ROM to RAM). 2 Failed stack RAM test. 3 Stuck printing out first message on terminal. q Waiting for disk controller or disk drive. S Failed in bootstrap. ) Missing working FPU/MMU. 7 Invalid operation of operating system After system starts operating, the IPL indicator shows the current interrupt priority level (1-7) of the system. 1.11. BOOTSTRAP ERROR MESSAGES If unable to read the bootstrap or system off the disk, the monitor will print an error and attempt to retry. Falling retrys, it will enter the monitor interactively so that the operator may clear the condition and manually retry. These messages wmay be found at the beginning of Appendix D. PRELIM REV I1I APPENDIX C STARTING AND STOPPING THE 373 1.1. RESETTING THE 373 Normally upon power-on, the system reboots itself automatically. I+ this fails tao occur, or if the user wishes to use the ROM monitor interactively, one may reset the 375 by pressing the reset button located on the back of the machine (see Chapter 3 on parts and their locations). One press will cause the machine to autoboot. Two presses spaced by three seconds will place the monitor in interactive mode. (See Appendix B for further details on the ROM monitor). 1.2. LOADING SYMMETRIX (THE BOOTS8TRAP PROCEDURE) The 3735 is designed to autoboot upon power-on. Should the machine become stuck, it may be reset as above, whereupon it will commence booting the SYM- METRIX operating system. The bootstrap procedure is a three-step automatic operation, whereby the ROM monitor loads a small machine language program (usually from the first sector of the disk up to the next seven sectors), which then lpads a larger intermediate bootstrap from succesive sectors, which ‘'n turn loads a larger and more complex C program, which finally loads the system and starts it. Similarly, the operating system will continue to load programs which are linked to still other programs. The automatic boaotstrap sequence, requiring no interference from the user, is listed in Table 1I. The system will come up in the multi-user mode. However, it may be necessary to bring up the system in single-user mode. Note: if the system can- not come up multiuser because of various conditions that require manual inter- vention, it will abort the autoboot sequence and end up in single-user mode. This is typically dane when maintenance aof the system is required, reducing the risk of further damage to the system while engaged in a delicate repair operatian. The system may be forced up under single-user with the monitor command b 2. See Table II. Should you have a failure with the bootstrap pro- cess, consult Chapter 7 "Troubleshooting". 1.3. SHUTTING DOWN SYMMETRIX SYMMETRIX may be shut down in three ways, depending on the immediacy of the situation. If the system is in multi-user mode, the operator must log in as "root" before implementing any of these commands (this is not necessary if the system is in single-user mode). The suggested procedure is to use the shutdown (8) command. This command will repeatedly warn other users on the sys- tem of the shutdown in progress, and then gracefully bring down the system with all files intact. It will even maintain a log of system shutdowns for administrative purposes. Common usage of this command is: system-name shutdown -h +5 *"Shutdown in S minutes® PRELIM REV I 59 THE 373 OWNER’S MANUAL STARTING AND STOPPING THE 375 Symmetric 32000 Monitor (autoloading /vmunix, press RESET to halt) loading /boot {loading C bootstrap from disk> 7784+ 1998+29898 Boot: /vmunix (C bootstrap loads default system> 149584+18432+42336 {unix loaded> RELEASE 4 SYMMETRIX (copyr. 1986) Symmetric Computer Systems 4.2 BSD UNIX #396: Sun Aug 9 @99:32:47 PDT 1987 root@eng: /usr/src/sys/S375REV3 ram memory ZO48K (Ox200000) (kernel 682K user 1366K> 182 buffers containing 204K end at Ix900209 , {optional ETHERNET located> wd® at Oxfffco9 , {winchester drive located> sba® at @xfffooo , sbad: cpul cst2 {optional SCSI located> swap 2.9M {allocated swap space> engiinit {optional ETHERNET initialized> Automatic reboot in progress,,, Table I: Bootstrap Sequence. 60 PREL.IM REV 1II THE 375 OWNER'S MANUAL STARTING AND STOPPING THE 373 {user presses reset once’> Symmetric 32009 Monitor (autoloading /vmunix, press RESET to halt) loading /baoot (loading C bootstrap from disk> 7784+1988+29890 Boot!: /vmunix {user presses reset again> Symmetric 32086 Monitor 375(bill) 12/25/84 23:21:14 * <{manitor prompts> ¥ b 2 {user types command and > loading /boot 7784+19988+29890 Boot: /vmunix 149584+18432+42336 RELEASE 4 SYMMETRIX (copyr. 1986) Symmetric Computer Systems 4.2 BSD UNIX #258: Sun Jan 4 @8:03:680 PST 1987 root@scs-engi/usr/src/sys/S375REV3 real memory 9x200999 (2048K) {kernel #xaP8o9 (&42K) + user @x15+899 (1486K) ) using 182 buffers containing 298896 bytes of wemory, swap 3996K erase "~H, kill U, intr ~C # {unix runs the shell program in single-user mode?> Table II: Single-User Mode Boot Sequence. system-name Broadcast message from root... 20:13 *Shutdown in 5 minutes” Broadcast message from root... 20:17 Shutdown in 3 minutes Broadcast wessage from root... 20:209 Shutdown NOW... It is also possible to shutdown the system without warning with either the reboot(8) or the halt(8) commands. The halt command simply halts the sys- tem and does not reboot, while the reboot comwmand can also be used for other processes, such as disk consistancy checks. Either command will shut down the system immediately, saving the state (by use of the sync(8) cowmmand) of all files. It is not recommended to use the -n and -q options of the halt or reboot commands. The *-n°* option will not save files. The "-q’" aoption shuts down the system without shutting down current processes. These options should only be used in the case of fire or other disaster, as it may result in some damage to the filesystems on the disk drives if used incorrectly. PREREMINEREYI 61 The software synDpsis intro(2) 1-1. it APPENDIX D ERROR INDICATIONS AND DIAGNOSTICS SYMMETRIX system provides error messages in cases where hardware or problems prevent normal system operation. Cuntained here is a brief of error messages that may arise and procedures for correction (see for further information on these error messages). 8YSTEM BOOT ERRORS The operating system may produce error messages onh the console if cannot be booted. In order to boot the system, the camputer must go through both the ROM and the first-level bootstrap layers. Each of these bootstrap layers have characteristic error messages. All bootstrap errors are recorded in the "/etc/dmesg’ +file. 1.1.1. ROM Level Bootstrap Errors - ST-5966 Interface For drives which use the ST-586 Western Digital interface (and not the SCSI interface), characteristic error messages may result. In the ROM bootstrap level, the ROM loads the first level bootstrap, by reading the first track of the disk drive. This track is knhown as "track #." If the ROM cannot find or read this track it will print the message where XXXXX is one of the disk drive error conditions listed below:i1] abort Drive/controller cannot complete command. badblk Bootblock contains a marked badblock (should not occur). id crc Error in finding a valid sector mark. no_dam Can find sector but not find associated data. no_id Track seems to be unformatted. trogg Drive refuses to find track 9. uncorr Uncorrectable error in bootblock data. [11 For further information see the Western Digital WD1&82-5 manual, Sec- tion 5.3, on the description of the error status register. PRELIM REV II 63 THE 373 OWNER'S MANUAL ERROR INDICATIONS AND DIAGNOSTICS The most common error which occurs at this level is the no_id error. This error may be corrected by using the FIXIT floppy or tape delivered with your 373 to reformat track . See Appendix G +or specific instructions on track ¢ recovery. Should an abport error occur, the hard disk drive may be physi- cally damaged. Contact the supplier if it constantly recurrs. All the other error messages should not occur. If one does arise, it generally indicates a transient condition. Try to reboot the system. 1.1.2. ROM Level Bootstrap Errors - SCSI Interface For drives which use the SCSI interface and not the ST-586 interface, different ROM level bootstrap messages may occur. In this case If the ROM cannot find or read this track it will print the mes- sage boot error (XXXXX) no sense No error detected. This should not appear. recovrd err An error occurred but system recovered. For informa- tional purposes only. not ready The unit is off-line or has no power. medium err Flaw or error on media or other recorded data. hardware err Hardware error such as controller failure, device failure or parity error. Clear device conditions by switching off and on again. illegal raost Illegal parameter in the Command Descripter Block or a data parameter such as Set Mode. Device does not understand bootstrap SCSI commands. unit attntn The unit has been off-line, reset or the media changed since the unit last accessed. This should not appear. data protect Cannot write to media due to presence of a write- protect condition on unit. This should not appear. blank check Reading non-recordable media, such as the clear tape leader, copy abort Error using copy command. This should not occur. aborted cmd SCSI device unable to process command. Usually a tem- porary condition. Retry. 64 PREREMINEREYI THE 373 OWNER'S MANUAL ERROR INDICATIONS AND DIAGNOSTICS egual Caomparison command reports two units contain exactly the same data. This should not occur. valume ovfl Reading end of media marker on sequential data. miscompare Comparison commanhd reports two units do not contain exactly the same data. This should not occur. reserved Future expansion error message. This should not occur. 1.1.3. First-Level Bootstrap Errors The first-level bootstrap is much more thorough in error message printout. There are three kinds of error messages: drive errors, control ler errors, and drive content errors. See wd(4) for mwmore infaormation on the disk contraller. Seabaké)X4d4) for general informa- tion on the SCSI bus adapter and SCSI devices. Specific SCS[ devices are listed in Appendix A. A. Drive errors, the most cowmwmon, occur when the drive flags an error condition: wdg: read error: sector XXX, status @xYY error @xZZ wddg:! write errori: sector XXX, status @xYY error OxZZ wd@: recal status @xYY error @xZZ wd¥: reading label, status @xYY error OxZZ Respectively, these messages arise when reading a block, writing a block, locating the start of the drive, and reading the drive’s pack label. Both status and error registers are returned as hex humbers. These errors will be cited as "soft" or "hard" errors. A soft error is a spurious error which is detected by the disk caontroller but does not readily reoccur, thus allowing the information to be retrieved. A hard error indicates the information has been cor- rupted. A sector which has frequent soft errors or any hard error should be mapped out and the information placed in a new location on the disk. Procedures for recovery ot disk contents and dele- tion of bad sectors is discussed in Appendix [ aof this manual. B. Controller errors occur when the software finds inconsistant behavior by the disk controller: wd initialization error wd: transfer of partial sector These errors should never occur. The first messaqge indicates a lack of controller initialization. The second message indicates incomplete transfer of the sector from controller to memory. An overheated machine can cause these messages. Check to see if the PRELIM REV 11 (1] THE 373 OWNER’'S MANUAL 66 machine is cool, the air vents are unobstructed, and the oputside cover is correctly positioned. I1f these messages continue, tact the factory. ERROR INDICATIONS AND DIAGNOSTICS con- C. Disk content errors occur when the disk drive is not correctly configured: wdstrategy - I/0 out of filesystem boundaries wdstrategy - transfer starts in midsector wd@: error in bad-sector file wdd: bad disk label The first two messages are conditions which cannot arise, implying that the +first-level bootstrap or standalane utility program has become corrupted. The third message indicates an error in the bad sector mapping file. This can be corrected with the badi144(8) pro- gram from the FIXIT floppy or tape. The fourth message indicates that the disk’s pack label is inconsistent and probably unusable. This can be corrected with the disklabel program disklabel (8) from the FIXIT floppy or tape supplied with the machine. See Appendix for detailed disk error recovery procedures. 1.2. OTHER DEVICE ERRORS AND DIAGNOSTICS When errors occur on peripherals or in the system, a warning diag- nostic is printed on the console. All device errors are recorded in the "fetc/dmesg" log. Error messages from system devices and respective drivers are described in intro(4) of the on-line manual. 1.3. SYSTEM PANIC MESSAQGES their The operating system has a nhumber o+ terminal error conditions that cause the system to crash and reboot itself. These "panic" messages appear on the console as: Panic messages arise when hardware +ails, resources overload, or software is inconsistent. All panhic messages are recorded i "/usr/adm/shutdownlog" file. 1.3.1. Hardware Failure Failure in the internal hardware of the machine may cause n the these messages. Cantact the supplier if any of these errors consistently reoccur, A. MMU failure or bad memory chip: supervisorabort (pc XXX, addr YYY, msr intlevelabort (pc XXX, addr YYY, msr ZZ PRELIM REV II G THE 373 OWNER'S MANUAL ERROR INDICATIONS AND DIAGNOSTICS freepageisnt These errors may occur sporadically. Should one occur repeatedly Wwith the same addresses during or after execution of a specific program, check the software involved. B. Disk error on demand paging of a program: 10 err in swap A bad area of the disk may have developed. Use the badl4d pro- gram., See Appendix G for further information. C. Disk error on reading first file on the disk: NOROOTDIR A serious error requiring the reloading of the entire disk parti- tion. See Appendix G on disk recovery procedures. D. MMU or CPU unscheduled NMI error: Check the power supply and temperature of the machine. E. Illegal instruction in the operating system (memory errar): This should never occur. Contacl the factory if this error con- tinhues to appear. 1.3.2. Resource Limitations Resource limitation errors are very rare, since the operating system resources are very large, and it is difficult to exhaust the tables. Any unusual system applications concurrently run should be carefully examined. The resource limitation errors are as follows: Timeout Out of timeout structures. no imt Out of mountable filesystems (i.e. filesystem excess). noinitpage Not enough memory to start the first process. PRELIM REV II &7 THE 373 OWNER'S MANUAL ERROR INDICATIONS AND DIAGNOSTICS 1.3.3. Coincident Panics Coincident panics occur on reboot or panic processing, These can arise if a panic occurred to a process that just context- switched, leaving the new process with the problem. The two panics which may occur are: s]leep wakeup I+ these panics appear with other panic or error messages, ignore them. Should either bf these panics appear without any other error messages repeatedly, contact the factory. 1.3.4. Software Consistency Check Panics Inconsistency in the software of the operating system itself may cause a consistency check panic. Occasionally, these show up when a memory error occurs in a system table, or as the result of a disk 68 error condition. The check panics are: alloclistpage {reebadpagetype setrun badabortinstr freeswaptwice setspti badclearpte treeusedpage sptiswapout badcopypte idleclearpage swapbadcount badcopyu iinit swapbadpte badcstshare init died swapinsert baddownshare initmemalloc swapint badpagefarswap initmemu swapinu badpagein swaplockpage badpageinpt inccom cang swaphobackup badpageinptpte iput swapnomount badpageswapout itrunc swaphnotext badphysadr kfreepage swappage badprocswapout kfreepagetwice swapremove badscanmap no procs swaptext badsptshare nopagepte swtch badswappage noprocswapout swtchu not locked badswtchu hosharepte swtchupte badunlockmempage noswappage timeout ttrstr arg badupshare noswapspace ttyrub badxattach notextptr umount blkdev pageinptlevel unknownabort changemapnopagein pageinu unlock err for u. clearbadpte physioclock unlockpage ctlearbadptpte psig unsharemnap clearptecount psig action update copybadpte remque vbmap doswapio setbadpte wdbadmemn dup iodone setbadptpte wdcontrol exit setmapnopagein xblast tilepte2 setrg xdorm freebadowner xunlock PRELIM REV I1I THE 373 OWNER’S MANUAL ERROR INDICATIONS AND DIAGNOSTICS 1.4. SYSTEM ADVISORY MESSAGES The operating system occasionally prints unsolicited advisory mes- sages regarding the filesystem on the console and other terminals, These messages are always prepended with the name of the filesystem in qQues- tion. All these messaqges are recorded as they occur in the “"/etc/dmesg/" lo9. The most common system advisory message is the "out ot space” mes- sage: filesystem full This occurs when you run out of space on the root or usr filesystem. Removal of some files will cause it to go away. Compilation or process- ing of an extremely large program may result in the /. filesystem full message (note the "/" designation for root). Should this constantly occur, you may construct a link to the tmp directory. As root, type rmdir /tmp In -5 /usr/twmp Simple lack of space will result in the messaqge: /usr: filesystem full Removal of some files will cause it to go away. You may also wish to upgrade your hard drive to a greater capacity. Other messages generated by the operating system are: bad block bad free count out of files out of inodes _.Bad block and _bad free count refer to filesystem integrity problems solved by D8 w2 D% D1@ D1 w3 D2 FULL level number date opr size [<] Nov 24, 1982 bud 137K 3 Nov 28, 1982 jwh 29K 2 Nov 29, 1982 w+ j 34K S Nov 39, 1982 1g9m 19K 4 Dec 1, 1982 dbb 22K 1 Dec 2, 1982 crk 49K 3 Dec 4, 1932 hrh 15K 2 Dec 35, 1982 ddo 25K 5 Dec &6, 1982 dmr 135K 4 Dec 7, 1982 wh j 19K 1 Dec 9, 1982 ken 118K 3 Dec 13t, 1982 rrh 13K 2 Dec 12, 1982 rrh 26K S Dec 13, 1982 rrh 14K 1 Dec 17, 1982 msp 71K 3 Dec 18, 1982 dib 13K [ Dec 22, 1982 z22 133K Table I: A Sample Tower-of-Hanoi Dump Seguence. 1.2, RESTORING FROM DUMPS 82 The restore(8) command can be used to incrementally restore dumps onto the system. This command can be used for restoring an entire sys- tem, filesystem, file or set of files, The syntax for this command is restore key name 1.2.1. Restoring a File or Set of File The steps below outline how to restore a file or a set of files from a dump. 1. Insert first floppy or tape dump volume in drive and lock. 2. Use thedd¢d)ll) command to change to the directory to where the root of given filesystem is located. 3. Type the interactive restore command: restore i PREL IM REV I1I THE 373 OWNER'S MANUAL ROUTINE SYSTEM MAINTENANCE This command will read the first volume of the dump and find the directary information on all files within the filesystem. This information is then placed in a shell-like interface that that allows the user to move around the directory tree selecting files to be extracted. 4. Use the following commands to restore the files: 1m: List files. cd dir: Change directory. add file: Files or directories to be restored. extract: Sequence through marked "add" and dump and extract them. pwd: Print the full pathname of the current working direc- tory. delete file: Files or directories which are deleted from the list of files and directories to be extracted. verbose: Lists inode numbers and extracted file information. help: List a summary of the available commands. quit: Restore immediately exits, even if the extraction list is not empty. 3. To end the session, type an exit. As an example, the +following commands restore the tile "/usr/bill/foo" off of the /usr dump volume. cd /usr restore i add bill/faog extract exit 1.2.2. Restoring a Filesystem Filesystems may be restored by two methods: 1. Using the level © dump to completely overwrite the filesystem. 2. Using any other level dump to interactively overwrite portians of the filesystem. The level @ restore is only done when reformatting and restoring an entire filesystem. Restoration of individual files in a filesystem PRELIM REV II 83 THE 373 OWNER'S MANUAL ROUTINE SYSTEM MAINTENANCE from other level dumps are then accomplished by examining the modi+ti- cation dates of the dump level volumes. These commands are typically used when retormatting and instal - l1ing a new drive or when performing routine filesystem maintenance, such as moving or merging a filesystem or when repartitioning a disk. 1.2.3. Full Restoration of Filesystems Follow the following procedure for a level & restore. 1. Use thprewést{8)8) command to create the filesystem. See the sec- tion on "Filesystems". 2. Mount the filesystem by typing mount /dev/devicename filesystem For example, to mount the /usr +filesystem on the internal drive, type: mount /dev/wd@h /usr 3. Change directory to the root of the filesystem. 4, Type the restore command with the "r" option: restore The "r" option instructs the that the dump volume be read and loaded into the current directory. This should not be done lightly as this command may only be used to restore a complete level & dump tape onto a clear filesystem or to restore an incremental dump tape after a full level zero restore. For example, to restore the /usr filesystem from a level @& dump the following would be typed: cd /usr restore r 1.2.4. Partial Restoration of Filesystems Partial restoration of filesystems is typically done to update level @ restored filesystems with higher level dumps. This results in a more thorough and timely restoration. 84 PRELIM REV I1 THE 373 OWNER'S MANUAL ROUTINE SYSTEM MAINTENANCE The “x" option can extract the named files from the tape. I+ the named file matches a directory whaose contents had been written onto the tape, then the directory is recursively extracted. The owner, modification time, and mode are restored (if possible). If no file argument is given, then the root directory is extracted, which results in the entire content of the tape being extracted. The steps involved are the same as for the level & restore. The example below outlines how to incrementally restore the /usr filesys- tem from a higher-level dump which had been restored from a level @ dump in the previous example. restore x This option will prompt for the insertion of volumes in chronological order. 1.3. EXHAUSTION OF DISK SPACE Exhaustion of user file space is certain to occur periodically. The three commands du(l), df(1) and gquot(8) all summarize disk usage an the system. The only immediate mechanism for controlling exhaustion of disk space is the removal of offending files by either the owher ar the system superuser. If this consistantly happens, acquiring wmore disk space may be the only answer. 1.4. DRIVE CONFIGURATION AND PARTITIONING The information on drive configuration and partitioning for Si-5¢6 drives is contained in the "/etc/disktab* +ile. This {+ile is described in disktab(3). The information describing the drive must be entered into the /etc/disktabfile for all ST-586 drives to be used. A typical ST-5¢06 disktab entiry looks like this miniscribe83iMiniscribe 6985 85Mb: ty=st886:\ sedl@24:nt#8:nsH?: ncHl1924:\ tpad?’92:0add:\ cpb#HA320: 0b#136:\ ipcH/3728:0cHd:\ tpd¥gioddg: \ ipefigiaeldi N IpfHBIofHL:\ rpgddogidi\ iph#392498:0h#196: PREREMINEREYRI 8y THE 373 OWNER'S MANUAL ROUTINE SYSTEM MAINTENANCE This disktab entry contains all the information required by the system for correct formatting and sectoring. I+ any of these entries are incorrectly entered, error messages will arise. 1§ the drive to be added is not in the current "/etc/disktab" file, then an entry must be created before use. €SI drives do not require the disktab entry. All the information on the drive is automatically read by the SCSI controller. Disk geometry also need not be calculated except for informational purposes. 1.4.1. Disk Geometry: ST-59&6 Interface The physical parameters of the drive or "disk geometry"” must be calculated before writing a nhew disktab entry. Physical parameters include Sector Size, the number of Sectors per Track, the number of Tracks per Cylinder, and the number of Cylinders on a drive. Sector Size and Sectors per Track are fixed by Lhe STS5@6 standard and optim- ized for the 3735. These nhumbers are always used for every drive. Sector Size! 1924 Bytes per Sector. Sectors per Track: 9 Sectors per frack. The number of Tracks per Cylinder corresponds to the number of magnetic heads in the disk drive used to store information. Some drives have a dedicated "servo" head. This head does not store gen- eral information but does store timing information critical to the drive. Other drives put this servo information within the data and use all heads for data. You must examine the drive manual from the manufacturer to determine how timing information is stored. The typical number of Tracks per Cylinder ranges between 2-16. The number of Cylinders corresponds to the number of different locations to which the heads may be positioned. The typical number of Cylinders ranges between 200-1825 Some disks require special signal processing by the disk con- troller when accessing the inner cylinders of the disk. These parame- ters are called "Reduced Write Current" or RWC and "Write Precompen- sation". These special conirols are specitied by the drive manutac- turer and activated by the controller when accessing cylinders above a specified number. This number is typically called the "Write Precompensation Number". These controls can compensate for the greater bit density ot smaller curcumference tracks. Thus, there is less chance of generating an error when writing to the disk. I¥ this number is not mentioned, this wusually means that no precompensation 1is to be used. Set the Precompensation Cylinder to 1924 in this case. If the drive has more than eight heads, internal Write FPercompensation is required by the ST-586 intertace. In this instance, the parameter may be ignored. 86 PRELIM REV II THE 373 OWNER’S MANUAL ROUTINE SYSTEM MAINTENANCE 1.4.2. Disk Geometry:SCSI Interface The SCSI disk geometry can be calculated as for the ST-586 drives with two exceptions. 1. The size of Cylinders and Sectors is not limited by the intertace but only by the given drive itself. 2. The Write Precompensation feature is handled automatically by the interface. 1.4.3. ST-306 Disk Specification: Disktab In the "/etc/disktab" file, one would enter the information for a new drive type. The first line in the table would handle the basic geometry of a drive. For example, the first line for a common 1O MByte ST-3586 drive can be written and parsed quickly: microsci imsciimicroscienceiMicroscience 12Mb ty=st506:\ is5eHl10294:intHAInsH? I nCH3IBG6: wpH1B249:\ The first four fields are monickers for the drive type. In this case, the drive may be called by the name "microsci,” "msci” or "microsci- ence."” As many of these names, separated by pipes, may be added as desired. The forth field tells what the actual drive name is and the size (either formatted or unformatted depending an the manufacturer). The labels which must always be the same are as follows: ty=stS5gs8: St-5¢86 interface. seNlg24: 1924 bytes per Sector. Other fields depend on the drive type: nt#4: 4 Tracks per Cylinder. ne#?: ? Sectors per Track. neN3gs: 306 Cylinders per Drive. wpllgz24: Write Precompensation begins at 1824 (no WP in this case). Only used for ST-586 drives. 1.4.4. Formatted / Unformatted Storage To calculate the total bytes of intormation storable on this drive, multiply the nt, ns, nc and se numbers tagether. The total tor this particular drive would be 396%4%9%1924 or 11,280,384 bytes of infarmation. This is the absolute amount of information stored on the drive. PRELIM REV I1I 87 THE 375 OWNER'S MANUAL ROUTINE SYSTEM MAINTENANCE The 1¢ MByte drive has been calculated to have over 11 MBytes of storage space. This is due to the differences in disk format used by different manufacturers. As a consequence, drive size varies accord- ing to specifications. Drives are specified as "unformatted" or "formatted."” When the drive is unformatted, nho overhead caused by the format of the disk controller is taken into account. In order to read and write sectors reliably, landmarks are placed by the disk controller. These land- marks reduce the space available. Thus, the unformatted drive size of the 1@ MByte drive would actually be 12.5 MBytes. Formatted drive size is dependent on the type of format used. The more commonly used 256 or 512 byte Sector Sizes reduced the size of the 12.5 MByte unformatted space to 19 MBytes. A significant amount of infomation is needed to manage the disk contents, so the actual amount used for data is always less than the total. 1.4.5. ST-386 Disk Configuration: Disktab The second part of the disk description in thdidksabab file is the partition table of the drive. This section specifies how the drive is to be divided into manageble contiguous qgroups. Consult Appendix A on device names to understand the naming of the parti- tions. Partitions are described by pL, where L is a letter from a to h. The offset for the partition is described by oL, where L is again a letter $from a to h. The partitions are always in wunits of Sectors and the offset always in units of Cylinders. The Cylinder offset is an absolute cylinder offset from the beginning of the drive to the beginning of the partition. Thus, the given partition starts on this cylinder with the first Track (track #9) and the first sector (sector He) . The last Sector of a partition is determined by the size of the partition and the Cylinder offset of the beginning of the partition. Many of the partitions have a specific funcltional use. Partition A (pa): Default root file system +or automatic boot. Partition B (pb): Default swap partition of the system. Partition C (pc): By convention, spans the entire drive. Used to gain access to the spare sectors used when the drive suffers damage to sectors In other areas of the disk. Partition D (pd): Optional partition. Partition E (pe): By convention, used to hold an alternate root file system. Also may be an optional partition. ae PREREMIREREYI THE 373 OWNER'S MANUAL ROUTINE SYSTEM MAINTENANCE Partition F (pf). Optional Partitiaon. Partition G (pg): Contains the “miniroot*® (small root) +ilesystem. Used to gquickly restructure the disk drive without interfering greatly with the operation of the operating system. Also may be an optional parti- tion. Partition H (ph): By convention, the /usr filesystem where most user files and space on the disk reside. For the 19 MByte ST-506 drive, the partition sectian may look like this: :pakdo32:padg: \ cpb#12PBIobHLIIZIN ipcHlidlbiocHo:\ ipd#diodégd:\ tpedd:oedd:\ ipfRO:ofHDIN poHgi ogHe: \ iphi#4248:o0h#1&5: Thus, this drive has a root partition of 4.9 MBytes , a swap parti- tion of 1 MBytes and a /usr partition of 4.9 megabytes. 1.4.6. Bad-Sector Space Regquirements In the previous example, it you add up the sizes and cowpare them to the total size (e.g. partition €C), vyou will find that the last five cylinders of the drive appear to be unused. These cylinders are used by the system software to replace other sectors of the drive that may go bad with use. The size of this "bad-sector" spare area is dependant on the drive used. Bad~Sector area size is calculated by multiplying the number of Sectors per Track with the number of Tracks plus 126. In the example above, one would need 126+4%9 or 162 Sectors to contain the bad sec- tor area of the disk. To calculate Cylinders, divide this number by the number of Sectors. Thus, 162/494%9 results in 5 cylinders. See bad144(8) for more information on bad sector handling. 1.4.7. Disk Layout Considerations In planning the sizes ot the partitions +or a new drive type, ohe cah can either tailor it to need or imitate the sizes aof a simi- lar drive that is supported. Tailoring drive partition sizes is out of the scape of this document. Inexperienced systems administrators should choose partition sizes in the proportions of the nearest sup- ported drive aof a given size. PRELIM REV 11 89 THE 373 OWNER'S MANUAL ROUTINE SYSTEM MAINTENANCE 1.4.8. Recording an ST-35966 Disktab Entry: Disklabel and Format A new disktab entry or changes to the existing entries wmay be recorded by the system through the disklabel (8) command. This com- mand should only be run if a currently attached and specified drive requires this entry. The disklabel command can be used to examine or rewrite the disk label on a drive. When writing the label, it can be used to change the drive identification, the disk partitions on the drive, ar to replace a damaged label or bootstrap. The disk label and bootstrap are located aon block ¥ of each disk. This information is used by the system disk driver and by the bootstrap program to determine how to program the drive, This command may used to examine the label on the named disk drive. For example, the following command: disklabel wdl will list the disk information on the wdl drive. The second form of the command will to write the new disktab entry on the designhated drive. For example, if the drive on wdl is a Miniscribe 85 MByte drive, the following command would be used: disklabel wdl miniscribe8S Consult the on-line manual for more information on the use o+ diskla- bel. For changing the organization of data on a hard disk or initial- izing an unformatted uisk, the format(8) command is used. 1.5. THE USE OF FORMAT The format(8) program is used to write the appropriate timing and other necessary information on a hard drive or floppy diskette. Format - ting drives is mandatory prior to recording data. S5CS1I tapes do not require formatting prior to use. 1.%.1. Formatting Floppy Diskettes Floppy diskette formatting may be accomplished by the user-level pragram fdformat(8). Consult Chapter 6 for information on flappy format types and the use of this program. 1.5.2. Formatting a Winchester Drive The format(8) program is used to format any drive type listed in the /etc/s/disktab file. This program may also be manually run by entering the description parameters of the drive. k44 PREREMIREREYI THE 373 OUWNER'S MANUAL ROUTINE SYSTEM MAINTENANCE The format program may be used to reformat portions of drives, such as a track. The formatter may either be run as a standalone program, or as an ardinary utility. It can be run as a standalone pragram from the ROM monitor in case of disaster (in the case when UNIX is shut down). Ta run this program from the ROM monitor, follow these steps: 1. Load ‘he bootstrap with the file specification parameter (3): b 3 controllertype driveunitnumber 2. When the prompt “Bpot:" comes back, type: Boot: format to load the format program +rom “"/stand"” on the root tilesystemn. The format program defaults to the internal Winchester drive. The controller types are as +ollow: ST-5¥6 cantroller type. SCSI Reel Tape. SCSI Cassette Tape. ETHERNET controller type. PLUNG The drive unit number depends on the controller type. For a floppy drive, the command would be: b3g3s To specit+y any other devices type the device name betfore the format name (i.e. devicename: faormat). The formatter will then print its banner and begin asking a series of gquestions about the drive to be faormatted. Examples are outlined fully in the on-line manual. CREATING / MOVING / MERGING FILESYSTEMS Filesystems are occasionally altered by moving them to another par- tition or merging them with an existing tilesystem. A tilesytem may also be created for special use. For ST-59P6 drives, the /etc/disktab file must be appropriatly con- figured BEFORE any of these operations SCSI drives are examined directly by the SCSI controller. PRELIM REV I1I ?1 THE 373 OWNER'S MANUAL ROUTINE SYSTEM MAINTENANCE 1.6.1. Creating a Filesystem The newfs(8) command permits the construction ot a new +ilesys- tem. It will avtomatically look up the type of disk a filesystem is being created on in the disk description file /etc/disktabif the SCSI controller if it is a SCSI disktype. It will then calculate the appropriate parameters to use in calling mkfs(8), and build the +file system by forkingmkhhés. I it is a root partition, it will also install the necessary bootstrap programs in the initial 8 sectors of the device. The -n option prevents the bootstrap programs from being installed. The -N option causes the file system parameters to be printed out without actually creating the +file system. Use this option BEFORE creating a filesystem to make sure the parameters are correct. Other options are described in the on-line manual. 1.6.2. Moving a Filesystem Follow these steps for moving a filesystem to an unoccupied par- tition: 1. Dump the filesystem to be moved, using the dump(8) command and the procedures for dump discussed in Section 777, 2. Change directory to the root of the partition. Create a new filesystem on the unoccupied partition by typing: An example of a +ilesystem partition name would be "wd@a.” 3. Mount the filesystem using the mount(8) command: mount partitionname directory Directory would be the directory where the filesystem would be mounted (i.e. mount /dev/fd¥ /mnt mount floppy as directory /mnt) 4. Use the restore(8) command. to restore the filesytem onto the new partition. 1.6.3. Merging Filesystems Merging filesystems is not frequently done when there is large disk storage available. I[f filesystems must be merged, follow this procedure. To merge a filesystem into another existing one, use the tar(l) command to append it to the other filesystem. 92 PRELIM REV II THE 3735 OWNER'S MANUAL ROUTINE SYSTEM MAINTENANCE 1.6.4. Shrinking Filesystems If the filesystem must be shrunk, one should dump the original and restore it onto the new filesystem using the procedure outlined above. This method will not work if the 1ilist on the smaller filesystem is smaller than the maximum allocated inode on the larger. I+ this is the case, reconstruct the +ilesystem +rom scratch on anaother filesystem using tar(1), and then dump it. If the root filesystem is shrunk, more than one drive should be used to decrease risk of damage. If the root filesystem is damaged, consult Appendix G on Recovery Procedures. 1.7. MONITORING SYSTEM PERFORMANCE The systat(l) program provided with the system is designed as an aid in monitoring systemwide activity. The default "pigs" mode runs a dynamic ps(i). systemwide virtual activity can be investigated by run- ning in the “vmstat(i)" mode. The vmstat mode outlines job distribu- tion, virtual memory load, paging and swapping activity and disk and cpu utilization. Ideally, there should be few Dblocked (b) jobs, little paging activity, available bandwidth on the disk devices (most disks peak out at 3¢-35 tps in practice), and high (above &8%) user CPU wutilization (us) . I+ the system is Dbusy, then the count of active jobs may be large, and several jobs may be blocked (b). I+ the virtual memory load is high, then paging will be occurring (po will be non-zera) and free memory (fre) will be low (less than 5¢ pages). Running in the vmstat mode when the system is busy enables ohne to find imbalances on the system by noting abnormal job distributions. It many processes are blocked (b), then the disk subsystem is overloaded or imbalanced. If there are several non-dma devices or open tty lines that are "ringing" or user programs that are doing high-speed non-buffered input/output, the system time may 9o high (&68-78 percent or higher). It is often possible to pin down the cause of high system time by looking to see if there is excessive context switching (cs), interrupt activity (in) or system call activity (sy). I+ the system is heavily loaded the system may be torced to swap. This will probably be accompanied by a noticeable reduction in system performance and pauses when interactive jobs, such as editors, swap out. 1.8. ACCOUNTING The SYMMETRIX operating system optionally records two kinds of accounting information: connect-time accounting and process-resource accounting. The connect-time accounting information is stored in the file "/usr/adm/wtmp", which is summarized by the program ac(8). Fhe process-time accounting information is stored in the file “"fusr/adm/acct”" and analyzed and summarized by the sa(8) program if it is enabled. PRELIM REV 11 93 THE 373 OWNER'S MANUAL ROUTINE SYSTEM MAINTENANCE Procedures based on the information provided by these commands allow for accurate accounting of computing time. A convenient way to do this is to give commands to the clock daemon "/etc/cron," to be executed every day at a specified time. This is done by adding lines to "/usr/adm/crontab”. A typical crontab entry may look like this: F,19,20,30,49,50 X ¥ ¥ ¥ /etc/dmesg - >>/usr/adm/messages B,15,39,45 % ¥ ¥ % /usr/lib/atrun This entry specifies that /usr/adm/messages and /usr/lib/satrun will be called at 1€ and 15 minute intervals, respectively. See cron(8) for more information. 1.9. RESOURCE CONTROL Resource control in the current version of the SYMMETRIX operating system permit control over the number of files and amount of disk space ech user may use on each +filesystem. In addition, the resources con- sumed by any single process can be limited by the mechanism of setrlimit(2). Resource control is generally not pertormed on small sys- tems, but is available if many users have account access. To use the disk quota facility, the system must be configured with "options QUOTA", ilesystems may then be placed under the gquota mechan- ism by creating a null file guotas at the root of the filesystem, run- ning gquotacheck(8), and moditying /etc/fstab to show that the {ilesystem is read-write with disk guotas (rq). The quotaon(8) program may then be run to enable qgquotas. Individual guotas are applied by using the quota editor edguota(8). Quotas may be enforced with "soft" and "hard" limits. Consult quota(l) for further information. 1.1%. FILES WHICH NEED PERIODIC ATTENTION The following +Ffiles require periodic attention or are system specific: /etc/fstab How disk partitions are used. /etc/disktab Disk partition size. /etc/printcap Printer data-base. /etc/gettytab Terminal type definitions. /etc/remote Names and phone numbers of remote machines +or tip(1). /etc/group Group memberships. 94 PRELIM REV II THE 373 OWNER'S MANUAL /etc/wmotd /etc/passwd /etc/rc.local /etc/inetd.conf /etc/hosts /etc/networks /etc/services /etc/host.equiv /etc/ttys /usr/lib/crontab /usr/lib/aliases Jusr/adm/acct /usr/adm/shutdownlog Jusr/adm/wtmp /usr/adm/messages /usr/l1ib/uucp/LOGFILE /usr/l1ib/uucp/SYSLOG PRELIM REV II ROUTINE SYSTEM MAINTENANCE Message of the day. Password +ilej; each account has one line. Local system restart script; runs reboot; starts daemons. Local internet servers. Host name data-base. Network name data-base. Network services data-base. Host under same adwinistrative control. Enables and disables ports. Commands that are run periodically. Mail forwarding and distribution groups. Raw process account data. Log of system reboots. Login session accounting. Log of error messages. Log of UUCP activity,. Log of UUCPF activity. 95 APPENDIX G SYSTEM AND FILE RECOVERY Occasionally, due to power loss, hardware faillure, accidents or other such occurrances, disk files or filesystems may be damaged beyond use. THESE FILES USUALLY CAN BE RECOVERED 1F NORMAL BACKUP AND FILESYSTEM MAINTENANCE HAVE BEEN PERFORMED AS RECOMMENDED. See Appendix F on dump and restore pro- cedures. 1.1. FILESYSTEM CONSISTENCY One of the most commonly used programs for filesystem maintenance is the fsck(8) program. The purpose of fsck is to check far and restore filesystem consistency by preening a standard set of filesystems or a specified file system. 1.1.1. Reboot and Fsck Upon autobooting, SYMMETRIX always runs the program /etc/fscki(8) in the script rsetc/rc, reading the table s/etc/fstab to determine which file systems to check. This information is used to inspect groups of disks in parallel, taking maximum advantage of i/o0 overlap to check the filesystems as quickly as possible. Normally, the root filesystem will be checked on pass 1, followed by the other filesys- tem partitions on subsequent passes. This procedure may be changed by editing the fstab file. At this time, fsck checks for and repairs a limited number of inconsistencies: Unreferenced inodes. Link counts in inodes too large. Missing blocks in the free list. Blocks in the free list also in +iles. Counts in the super-block wrong. These are the only inconsistencies which will be repaired by the system automatically. For each corrected inconsistency, the system identifies the filesystem corrected, the inconsistency itsel+, and prints the number of files and used and free blocks. PREREMIRER 'II 97 THE 373 OWNER'S MANUAL SYSTEM RECOVERY 1.1.2. Interactive Fsck I+ ¢#sck encounters any other inconsistencies during the reboot processs, it will exit with an abnormal return status and force the system into single-user mode. Once in this mode, fsck must be run interactively!: # fsck This command will now audit and interactively repairs inconsistent conditions for filesystems. If the file system is inconsistent the operator is prompted +for concurrence before each correction is attempted. However, a a number of the corrective actions will result in some loss of data. The amount and severity of data lost may be determined from the diagnostic output. The default action far each consistency correction is to wait for the operator to respond yes or no. The following inconsistencies require manual correction: 1. Blocks claimed by more than one inode or the free list. 2. Blocks claimed by an inode or the free list outside the range of the filesystem. 3. Incorrect link counts. 4. Directory size not of proper format. 5. Rad inode format. 6. Blocks unaccounted for anywhere. 7. File pointing to unallocated inode in directory. 8. Inode number out of range in directory. Q. More blocks for inodes than there are in the filesystem. 19. Bad free block list format. 11. Total free block and/or free inode count incorrect. 1.1.3. Locating Lost Files The $fsck(8) program also is charged with locating orphaned files (files which have lost their name) . It then connects tLthese lost files into the "/lost+found" and the "fusr/lost+found” directories. I+ t+ile loss does occur, these directories can be checked and the contents of the unnamed files examined. (The and the commands are very useful for this task). 98 PRELIM REV I1I THE 375 OWNER'S MANUAL S8YSTEM RECOVERY The only restriction on this procedure is that the directory "lost+found” must preexist in the root of the filesystem being checked and must have empty slots in which entries can be made. This is accomplished by wmaking lost+found, copying a number of files to the directory, and then removing them before fsck is executed. 1.2. INDIVIDUAL FILE LOS8 RESTORAL If a missing file cannot be located, or it a file has been damaged, it must be restored from a dump. See Appendix F on dump and restore procedures for files. 1.3. BAD SECTOR MAPPING AND BAD144 Bad sector mapping of a hard drive is done by the use of the com- mand badi44. It inspects the information stored on a disk that is used by the disk drivers to implement bad sector forwarding. It also can be used to scan the disk to find new errors and optionally map them out. The format ot the information is specified by DEC standard 144. 1.3.1. Bad Sector Infaormation The bad sector information is located in the first 5 even num- bered sectors of the last track of the disk pack. There are five identical copies of the information, described by the dkbad struc- ture. Replacement sectors are allocated starting with the tirst sector before the bad sectar information and working backwards towards the beginning of the disk. A maximum of 126 bad sectors are supported. The position of the bad sector in the bad sectar table determines which replacement sector it corresponds to. The bad sectors must be listed in ascending order. The bad sector intormation and replacement sectors are conven- tionally anly accessible through the "c" filesystem partition of the disk. If that partition is used +for a tfilesystem, the user is responsible for making sure that it does not overlap the bad sector information or any replacement sectors. 1.3.2. Badi44 Usage Badl44 is always invoked with a device name (i.e. wdg) or a filesystem name. It reads the first sector of the last track of the correspanding disk and prints out the bad sectar information. It may also be invoked giving a serial number for the pack and a list ot bad sectors, and will then write the supplied information onto the same location. Note, however, that badi44 does not arrange for the speci- fied sectors to be marked bad in this case. It is necessary to reboot before the change will take effect. The following formats may be used to invoke badl44: PREREMINEW® II 9?9 THE 373 OWNER'S MANUAL SYSTEM RECOVERY badi44 disk [ snho [ badsectors 1 1 badi44 -a [ -c 1 disk badsectors badi4a4 -5 [ -¢ 1 disk badi144i -s disk Disk indicates the drive name to be examined. The sno option is the serial number of the drive or disk cartridge and badsectors are the bad sectors to be examined. A descripion of the other options fol- low: -a: specify a list of sectors to insert into the bad sector table. The order in which the sectors are listed determines which sec- tors are used for replacements; i+ new sectors are being inserted into the list on a drive that is in use, care should be taken that replacements for existing bad sectors have the correct con- tents. -5 Scan the disk for new bad sectors and return a list o+ {found sec- tor numbers. -8! Find bad sectors and maps them out unconditionally. -c: Copy the bad sectors. 1.3.3. Locating Affected Files The program showbadblocks(8) will automatically locate and list all the +files which may have been affected by sector damage. This program runs the badl144 program in the wd@a and wd@9h partitions and uses icheck -bn and ncheck -1 to locate which files have underlying bad sectors. Other partitions may be appended to this program as needed. However, the more partitions examined, the longer the pro- gram takes. After the affected files are listed, one may restore these files from earlier dumps. See Appendix F on "Restoring from Dumps". 1.3.4. Badid44 Examples The badl44 program can be used Lo list the bad sectors currently mapped by the system: badid44 -5 wds A bad sector listing looks like this: bad block information at sectur 44496 in /dev/rwd@c: cartridge serial number: 13875(18) sn=2044, cn=45, nh=2, snh=l sn=3915, cn=87, tn=@, sn=¢g 100 PREREN AER II THE 3785 OWNER'S MANUAL 8YSTEM RECOVERY sn=3916, ch=87, tn=d, sn=l sn=3%917, cn=87, tn=@, sn=2 sn=3918, cn=87, tn=¢, sn=3 sn=391%9, cn=87, tn=@, sn=4 sn=3920, cn=37, tn=H, sn=35 sn=3%921, cn=87, tn=@, sn=é& sh=3922, cnh=8/, tn=¢, sn=. sn=3923, cn=87, tn=@, sn=8 The first field "sn" is the Sector Number of the bad sector. The "cn" field is the Cylinder Number, the "tn" field is the Track Number and the "st" field is the Sector Number of the Track examined. The first line 1in the bad sector listing indicates one bad sector. The following 9 lines indicate an entire bad track (? sectors in sequence) . The badi44 program can also be used to add one or more new sec- tors to the map and allocate an empty new sectar in place of each old sector. badld44 -3 wd@ <(sector number> {(sector number> ... Alterations of the bad sector map will not take effect until after the system is rebooted. 1.3.5. Badli44 Error Handling On the 373, the standard bootstrap drivers used to boot the sSys- tem do not understand bad sectors, handle ECC errors, or the special BSE (bad sector) errors ot ST9566 type disks. This means that none of these errors can occur when reading the files /boot and /vmunix to boot. Sectors #-15 of the disk drive must also not have any o+ these errors. The drivers which write a system core image on disk after a crash do not handle errors;i; thus the crash dump area must be free of errors and bad sectors. 1.4. MINOR DISK HARDWARE FAILURE Occasionally a damaged spot may develop on a hard drive or on floppy or tape media. These spots are classified as either "soft" or “hard." Soft and hard erraors are reported on the console. Techniques for recovery are applicable to both hard drives and floppy or tape media. However, a physically bent or damaged +floppy or tape may not be repairable through software recovery technigues. It is best to keep all important floppy or tape media in a clean, protected environment. PREL.IM REV II 181 THE 373 OWNER'S MANUAL SYSTEM RECOVERY 1.4.1. Soft Errors Soft errors indicate temporary disk malfunctions in information transfer. These errors cause the system to retry the transfer, pos- sibly resulting in system slowdown. Usually, soft errors are spurious and untraceable, but occasion- ally chronic sott erraors relating to a specific disk sector occur. In the rcase of the hard disk, these errors may be eliminated by the following procedure: 1. Run the badil44 command with the "-c" (copy) option. badiqq -S -c badblocknumbers See the previous section on badlAa4. 2. Reboaot the system usinpebebbd8)8). See Appendix € for Ffurther information on reboot. In the case of floppy or tape wmedia soft errors, the entire floppy or tape should be copied onto a new one and the old one dis- carded. 1.4.2. Hard Errors Hard errors are considered much more serjous, since the informa- tion oOn the sectors is permahently lost. They fall into three cata- gories: bad sector errors, lost track errors, and chronic drive failure. Appendix D outlines various error messages in detail. 1.4.2.1. Bad Sector Errors Bad sector errors are the most common hard error. The most common bad sector error messages are. uncorr: Sector has corrupted data. id crc: Sector has corrupted identification field. no dam: Sector has corrupted timing field. 1.4.2.2. Lost Track Errors Lost track errors are identified by the no_id error message. This indirates that either a disk controller or disk drive error caused up to an entire track (9 sectors in sequence) to be lost. 192 PRELIM REV II THE 373 OWNER'S MANUAL SYSTEM RECOVERY 1.4.2.3. Chronic Drive Failure Chronic drive errors occur when the disk drive itself# is either inoperative or missing. The two common error messages which indicate these conditions are abort and trggg. An abort can indicate physical damage has oaccurred to the drive. The_trgddg error usually indicates a transient condition which a reboot will clear. 1.4.3. Recovery from Bad Sector Errors The bad sectar errors_uncorr, id_crc, and_no_dam indicate that the sector infarmation is not retrievable and that the sector on the drive is damaged. Bad sector recovery consists of the following steps: 1. List the bad sectors using 2. Map out the bad sectors using the commands: b.d144 -8 di.k BN e See the previous section on "Badl44". 2. Reboot the system to encode the new bad sector map. 3. Locate the affected files using showbadblocks and implement the backup procedure for file recovery. See Appen- dix F for information on "Restoring from Dumps” 4. Execute the program fsck to restore filesystem consistency. See the previous section on "Fsck”. The following commands would map out bad sectors 2644 and 3915 on the /usr partition: badil4q -a wdSh 2944 3913 PRELIM REV XI 193 THE 373 OWNER'S MANUAL SYSTEM RECOVERY I+ the bad sector numbers are continually inconsistent or the number of bad sectors is very large and doesn’t go away after using badl144, there may be bad power in your area. If, upon reformatting an uvnused section of the drive such as the swap space from single- user mode, rebooting and scanning for bad sectors, you still have bad sectors in that space, then it is undoubtedly bad power. An uninter- ruptable power supply (UPS) may be required. Less frequent problems may be an incorrectly configured drive or a failing controller board or drive. 1.3. TOTAL LOSS OF DISK CONTENTS In cases where the hard disk drive has become too damaged for sys- tem software to recover it may be necessary to start from ground zero. The system must then be restored from the original dump of the system. Either a floppy dump with FIXIT floppy or tape with bootstrap will be used according the the internal drive type purchased. A few warnings before proceeding: 1. 14 you have hardware problems, you may need to consult the supplier as there 1is NO guarantee that the hardware problems will go away if vyou reload the software. For example, a head crash on a hard disk is still a head crash and will not be corrected by reloading the software. Check the symptoms before reloading. 2. The system software is very well tested. (t does not spontaneously destroy software on the hard drive. Those who think that reloading the software is a cure for all ills may be disappointed. Do not undertake this lightly. Do this only when necessary. 1.5.1. Restoring from Floppies The FIXIT floppy and dump (or a more current dump done by the user) permits the recovery of the system with little file loss. The FIXIT floppy contains all standalone programs necessary to recover the disk drive. It also has a complete UMIX operating system for the convenience of the user. This +loppy allows users to repair the sys- tem by using the commands documented earlier even if crucial files such as "/vmunix" are atfected on the hard disk. 1. Enter the ROM monitor (hit reset twice). 2. Insert FIXIT floppy in slot and lock. 3. At the "¥" prompt, locad the bootstrap by typing: ¥ b2 & 3 194 PRELIM REV II THE 3735 OWNER'S MANUAL SYSTEM RECOVERY 4. 19, PREREM RER. Read the instructions in the HOW_TO_RESTORE_FROM_FLOPPIES +ile. If you have no online instructions, proceed further. Reformat the drive using /etc/format. Consult Appendix E. You don’'t need to do this if all you want to do is reload the software on your old internal drive. I+ you are using a whole new drive, read Appendix 0 on adding ST- 586 drives or Appendix N on SCSI drives. You will nheed to know if it is in the disktab entry and will most detinitely have to format it. Run the initroot program by typing: This program will make a new filesystem on the root partition of the internal Winchester, and load the contents of the FIXIT +loppy onto the Winchester swap partition, then halt. This frees the floppy drive so you cah restore the root off af +loppies. For example, an internal rodime requires the com- mand: initroat rodime The initroot program will halt and return to the ROM mwonitor. To continue, type: ¥* b3 Boot: wd@b:vmunix to the monitor. This will boot the system off the swap parti- tion. I+ you have an older CPU board type, use the vmunix.rev? +ile. Insert the first volume of the root dump in the floppy drive and lock. Restore the / filesystem by running the restoreroot progranm. Type restoreroot This program will extract the root oft ot a series of +loppy dumps and then reboot on the newly restored root. Feed it fresh volume floppies until it is satiated. II 193 THE 3735 OWNER’S MANUAL S8YSTEM RECOVERY 11. Insert the first volume of the /usr dump in the floppy drive and lock. 12. Restore the /usr filesystem by running the restoreuser pro- Qr-am. Type This program will extract the /usr filesystem off of a series of 137.1.1.1 {Class B address’> 192.12.1.1 {Class C address> At this time, only very large network installations are beginning to +face the limitations of 32-bit addresses inherant in the TCP/IP design. PREL IM REV I1I 111 THE 373 OWNER'S MANUAL INTERNET CONFIGURATION" 1.3.1. Internet Network Names The rules for network names follow the same rules as that {+or internet machine names. A typical list of network names would look like this: scshet Ibl-physicsnet pseudonet 1.4. NETWORK FILES The internet network consists of a set of files which are referred to by various utilities on the machine. Among the most important are the /etc/hosts, /etc/hos .equiv, /etc/networks, and the /.rhosts files. 1.4.1. The /etc/hosts File The /etc/hosts file relates the internet machine name to the selected internet address. The format of this {file is internet-address internet-machine-name aliases A sample /etc/hosts file should look like this: # loopback 127.9.9.1 localhost # local ethernet 137.9.9. 1 lady lynnes-little-375 137.86.6.2 fatso stevesbigcray 137.6.9.3 nova llnl-research-pdps 137.9.9.4 kiudge micropidgeon # s5lip network 135.9.0.1 slip-lady 135.¢.9.2 slip-fatso 135.9.96.3 slip-test Comments are prepended with an #. Certain internet address numbers are considered "reserved"” for certain types of functions. an the 375 computer, localhost, the loval loopback interface, is traditionally given a Class A address host number of 127. This address cannot be used for any other net- work address. The other addresses in this example may be of any class. The only required consistency is that the machine address class interface with a network of the same class. 112 PRERENM NEW: II THE 375 OWNER'S MANUAL INTERNET CONFIGURATION" 1.4.2. The /etc/hosts.equiv File The /etc/hpsts.equiv file equates machines within a network. This permits remote transactions, such as rlogin and rsh to be con- ducted between machines identified in this database without the need for password checks IF the individual has identical login account names on each machine. The format is a simple database list! internet-machine-name A sample /etc/hosts.equiv file should look like this: localhost lady {atso nova kludge slip-lady slip-fatso slip-test 1.4.3. The /etc/networks File The /etc/networks file contains information on the network name and identifier. Each network has the following format for identifi- catian: internet-network-name interriet-network-number aliases A typical /etc/networks file should look like this: arpanet 192 arpa scshet 137 sCS slipnet 135 slip 1.4.4. The /.rhosts File . i tile. When the /etc/hosts.eguiv file is missing, the root .rhosts file is used as the default +file. An entry in the host.eguiv +ile defaults to permit access by all accounts except root. the /.rhost file includes root. They are typically kept the same. The /.rhosts file is similar to that of the /etc/hosis / A .rhosts file may also be kept in an individual account direc- tory. This file is then a series of private mappings of networks which are equivelent. For example, should steve on fatso have an account on lady called moustache, the .rhosts file in his account would look like this: PRELIM REV II 113 THE 373 OWNER'S MANUAL INTERNET CONFIGURATION" lady moustache The private .rhosts {file permits easier communciations across machines with different login names. 1.9. CREATING A NETWORK To create a network between machines, an internet address and net- work name must be invented. 1. Decide on unique internet machine names. 2. Decide on the classification (A, B or ©C) of the internet network address. Most networks use class C. 3. Configure the /etc/hosts file with the names and addresses. 4. Configure the /etc/.rhoslts file to list internet machine names within the network that should have equivelent root access. 5. Configure the /etc/networks file to name a new network. 6. Configure the /etc/host.equiv if desired. All the machines on this new network must have appropriately configured files. 1.6. ADDING A NEW MACHINE TO AN EXISTING NETWORK To add a machine to an existing network, follow the steps above, using the extant network name and internet address. 1.7. ENABLING A NETWORK INTERFACE A network interface is a named device in the kernel that accepts and emits packets on a given network. The 375 has three types of inter- faces available for use in a network: 1. The "localhost" local loopback interface lo#@. 2. The "serial line internet protocol” or SLIP interface sl@ and sll. 3. The optional "ETHERNET" interfacenSny. See Appendix K on S3SLIFP and Appendix L on ETHERNET for more information on these interfaces. 1.7.1. Network Status and Ifconfig The ifconfig(B8) program for network intert+aces is somewhat anal- gous to the stty(8) program +or ttys. The command ifconfiqg interface 114 PRELIM REV 11 THE 373 OWNER'S MANUAL INTERNET CONFIGURATION" displays the current contiguration for a network interface: interface internet-address flags=idnum 1.7.2. Network Confiquration and Ifconfig Through ifconfig, the lo®, s19 and sll, and en®, interfaces can be enabled, disabled, and set far various functions. The format for this program command is as follows: ifconfig interface internet-address optional-parameters Ifconfig is used to assign an address to a network interface and/or configure network interface parameters. The command is always run at boot time to define the network address of each interface present on a machine. The information is placed in the /etc/rc.local file. Théfaeobnbhkgig program may also be used to redefine the system interface address or status characteristics. This is usually done PRELIM REV I1I 113 THE 373 OWNER'S MANUAL INTERNET CONFIGURATION" 116 for maintenance or network diagnostic purposes. The following parameters may be set with itfconfig: up: Identify an interface as "up" and available for use the systemn. down: Identify an interface as "down" and not available for use by the system. Used to disable an active network inter- face. trailers: The default trailer link level encapsulation in transmis- sion. Messages are encapsulated in a wmanner which minim- izes the number of memory to memory copy operations per- formed by the receiver. -trailers: Disable trailers. arp: Enable the use ot the Address Resolution Protocol in map- ping between network level addresses and link level addresses (default). This is currently implemented for mapping between DARPA Internet addreses and 18Mb/s Ether- net addresses. -arp: Disable the use of the Address Resolution Protocol. Only the super-user may modify the configuration of a network inter- face. To enable the sl1¢ interface, uncomment (remove the "H" +rom) the line in the /etc/rc.local file: /etc/slattach tty3 myname othermachine and reboot the system. To enable ethernet, uncomment the line in the /etc/re.local file: /etc/ifconfiq en® 'hosthname’ and reboot the system. As an example, suppose lynne wished to turn off the en¥ inter- face for some routine maintenance. She can either comment out the end line in the /etc/rc.lopcal file and reboot the system or she can type the following command: Since she is wise beyond compare, she did the expedient thing and typed the correct 1ifconfig command. The ifconfig command, if used PRELIM REV I1I THE 373 OWNER'S MANUAL INTERNET CONFIGURATION" properly, can make these network interfaces very simple to use. 1.7.3. Ifconfig Error Indications The ifconfig command will also indicate if an interface is not caonnected. For example, the command ifconfig sl11 when there is no sll interface present will result in the output: ifconfig: ioctl (SIODCGIFFLAGS):no such interface Théocb&t2X2) program reparts that an error has occurred in attempting this command. The "SIOCGIFFLAGS" statement (Socket IO Get Interface Flags) reports that the interface does not exist. There are many ioctl messages which can indicate of problems in the network such as the requested address is unkhown or the user is not privileged and attempted to alter an interface’s configuration. 1.8. INTERFACE ERROR MESSAGES Error messages on the appropriate network intertace are covered in en(d4), s1¢(4) and lo(4). 1.9. TESTING NETWORK CONNECTIONS Betore nhetwork connections may be declared operational, they should be checked out by using a few simple network programs. 1.9.1. Localhost Test The very simplest interface is the 108 interface. Typing localhost should result in a login on a pseudo-tty to this system. This just tests local network software configuration. 1.9.2. Telnet Test The telnet(l) command is the next step in testing the network interface configuration. This command uses the TELNET protocol. The command telnet without arguements results in entering command mode. In this mnode, it accepts and executes telnet commands. The command mode is identi- fied by the change of the prompt {from the machine name to "telnet>.® PRELIM REV I1 117 THE 373 OWNER'S MANUAL INTERNET CONFIGURATION"® Once in this mode, telnet can be used with different options. open host [ opptionalport 1} Open a connection to the named host. close Close a TELNET session and return to command mode. quit Close any open TELNET session and exit. z Suspend the session (same as cntrl-2). escape [ esc-chr 1 Set a different telnet escape character. status Show the current status of telnet. options Toggle viewing ot TELNET options processing. Nobt ot+ten used. crmod Toggle carriage return mode. Not often used,. Get help. Prints a help summary with no arguement. The telnet command with arguements: telnet host optionalport perform an open command automatically. For example, steve wishes to test the network interface with telnet. He first decided to connect to his own system: telnet fatso which resulted in the message: frying... Connected to fatso. Escape character is *~1°7. 4.2BSD UNIX (fatso) login: Using the name of any machine in the_/etc/hosts file should work h telnet. I+ a machine 1is not in this +file or in the hosts.eguiv file, the message would be: hostname: host unknown. 118 PRELIM REV 11 THE 373 OWNER'S MANUAL INTERNET CONFIGURATION® Check both these files carefully if this message appears. If the other machine cannot be contacted, either by having the connection timeout or by not accepting a connection, then the /etc/hosts and /etc/hosts.equiv files should be checked on that machine carefully. The telnet command is intentionally meant to be simple for test- ing purposes. The rlogin(l) command is the standard mechanism used to communicate locally with hosts. 1.9.3. Netstat and Packet Information The netstat(l) command can be used to determine the status of network communications. This command has many options. The twDp most common are the -i (interface statistics) option and the -g (protocaol statistics) option. The _~-i option can be used to determine it anvy hardware level problems are occuring in packet transmission. The -g option indicates if there is any hardware or software misconfigura- tion which results in protocol errors or anomalies. frhe command netstat -i should result in the output: Name Mtu Network Address Ipkts Ierrs Opkts Oerrs Collis eng 15808 137.9.96 lady 2599 g 13152 %] 1 log 1536 127.8.6 localhost 12594 <] 125684 | ] [ sl 1996 135.98.8 slip-lady %] [%] 8157 & g "Mtu® is the maximum packet size that can be sent on that interface. "Ipkts™ and “Ierrs" stand for "incoming packets" and "incoming errors”. "Opkts” and "Oerrs®" stands for "outgoing packets® and "out- goinhg errors". “Collis" simply means the number of collisions of packets which have occured. There should be very few errors and collisions occurring during hormal usage. If they are very large, check the cables for any kinks or damage. In the case oi the end interface, check the tap caretully for SE@E and correct operation. See s1(4) and en({d4) +or more informa- tion. Obviously, the lo® packet numbers +for Ipkt and Opkt should always be equivalent. The command: netstat -s PRELIM REV II 119 THE 373 OWNER'S MANUAL INTERNET CONFIGURATION" 1.10. gives status information for each protocol link. The information is extensive and can be used for debugging purposes. SERVICES, DAEMDNS AND ALL THAT All these protocol layers and intertaces are dealt with by the sys- tem in a complex and layered manner which is not generally seen by the outside world. This is definitely preferable to a transpareni system which blurts out arcane information on every process. The processes which handle these matters are known as daemons. The program which supervises the daemons is the services program. 1.19.1. Daemons: The Invisible Processes 1. 1.11. A daemon is a process that is not intended to be used by the outside world but only by the system in accomplishing some task. In fact, most daemons are not even noticed by most people in the course of routine work, yet they are very important. The name daempn is a play on Maxwell’'s daemon, who would merrily put hot molecules in one box and cool molecules in another box, thus (?) violating the Second Law of Thermodynamics.(11 There are many daemon processes which exist. For example, the internet daewmon intercepts incoming calls. There are telnet daemons and lineprinter daemons and a whole plethera of daemons yet unseen. 19.2. Services: The Grand Daemon-God The /etc/services(5) database is a dispatch table containing information on all the daemons and the protocol used. The /etc/inetd.canf file is the internet server configuration database. These +files are not generally aliered. I+ the protocols on a site have changed from the assigned protocol number to a different one, contact the site administrator for the correct configuration. COMMON NETWORK COMMANDS Once the system has been fully tested using localhost and telnet, more complex and interesting commands may be used. These commands require that all previous file configuration has been correctly done. 1. 11.1. FTP: The File Transfer Program The ftp(l) program, the most common file transfer program, is the user interface to the ARFPANET standard File Transfer Protocol. The program facilitates transfer of +files to and from a remote {13 The proof fails when the daemon acquires so much energy in rapid colli- sions from highly vibrating molecules that it must radiate the energy as heat, thus affecting the system. See Feynman’s "Lectures on Physics, Volume I.," I suppose 129 you just can’t get something for nothing. PRELIM REV II THE 373 OWNER'S MANUAL INTERNET CONFIGURATION" network site. I+ the hostname is specified in the command, ftp will immediately attempt to establish connection. I1f no hostname is specitied, than it will enter a command interpreter and prompt with a *"ftp>." There are many mode arguements which may be invoked. Using the "R will list the arguements available. The statement "7 command- name” will list information on a specit+ic command. 1.11.2. RSH, RCP and RLOGIN The "r-commands" are specitic to UN1IX and are basically cleaned up versions of various programs used in file transfer and remote file manipulation. Usage ot any of these cowmands requires that all internet files be appropriately configured before use. 1.11.2.1. RSH The rsh(l) command establishes a remote shell which can be used to execute commands without the need to login. rsh host commands For example, the command The remote accountname may be different if the aption _-~1 accountname is used with this command. However, this account name must be equivalent to the local account. There is no password praompt. Omitting the command sequence will result in detaulting to rlogin. Interactive commands, such as roguef{&) and vi(1l) should not be run with this command. Use rlogin(l) instead. 1.11.2.2. RCP The rcp(l) command remotely copies files or directories between machines transparently, it the set file permissions are the same. The command PRELIM REV I1I 121 THE 375 DWNER’'S MANUAL INTERNET CONFIGURATION" 122 copies /pathnames/filel into /pathname/+fileZ. Files may be transferred from a remote to a local system, from a local to a remote system, or between two remote systems IF permissions are appropriately set. The hostname need not be specified if it is the local hostname. For example, a third party file transfer from fatso to lady would look like this!: The -r option permits the transfer of directories recur- sively. The directory /guest could be transferred in its entirety by typing: 1.11.2.3. RLOGIN The rlogin(l) command permits remote logins between machines. The command to login is typically the following: rlogin remotehostname The rembte machine hostnames are defined in the /setc/hosts.equiv, UOne may also use a private .rhosts fdle which contains a hostname and a username: lady lynne fatso steve nova bill 1+ the person using rlogin has the appropriate permissions set on each machine, than the command will automatically login to the requested account. I+ permissions are not set appropriately, than it will prompt for a password and a login name. An example of this command is: PRELIM REV 1I APPENDIX I SERIAL COMMUNICATIONS The SYMMETRIX operating system permits simultaneous support of system use from the console terminal as well as from other peripherals. Terminals may be connected to any serial port (located on the back of the machine), but will remain inactive until their presence is mentioned to SYMMETRIX. The 373 is automatically configured for terminal connection in the "/dev/tty" directory and the "/etc/ttys" file (see ttys(3)). The serial ports may be used for ter- minals, printers, plotters, modems or other designated serial devices or they may be unused altogether. They may also be used to connect other computers to the 375 system. 1.1. SERIAL COMMUNICATIONS HARDWARE The four DB25S connectors on the rear of the 375 link the unit to a variety of devices, such as modems, terminals, and printers. These con- nectors use the RS232 serial communications protocol. They are labeled, from top to bottam, "/dev/console”, "/fdev/ttyl", "sdev/ttyl", and “/dev/tty3". The uppermpost DB25S connector labeled "/dev/console! differs +from the other sockets in that DCD is permanently driven at a high level. Table I lists connections and functions. 1.2. SIGNAL DESCRIPTIONS The 375's four serial ports are wired as Data Communications Equip- ment or DCE. In other words, the serial ports are wired as if the com- puter actually was a modem. Serial ports can be connected to terminals or other Data Terminal Equipment (DTE) with simple flat cables that connect "like-numbered" pins. These are called "straight-thru" cables. Modems or other DCE equipment reqguire more complex cables with interposed pins. These are called "twisted"” or "inverted" cables. Nomenclature in the R5-232 world is with respect to the DTE. Thus, Transmitted Data (TXD) means data transmitted FROM the terminal to the computer. TXD is an OUTPUT on the DTE side and an INPUF on the DCE side. The 375's four serial ports have two data and four modem control signals used faor special controls over serial communications. These are transmit data (TXD), recieve data (RXD), data terminal ready (DTR), data carrier detect (DCD), request to send (RTS), and clear to send (CTS). Table II lists these signhals, which can be grouped into three groups: PRELIM REV II 123 THE 373 OWNER'S MANUAL SERIAL COMMUNICATIONS Pin Signal Signal Functiaon H I/0 Name 2 Input TXD Transmitted data from peripheral to computer. 3 Output RXD Received data from computer to peripheral. q Input RTS Reguest to send from peripheral to computer. 3 Output CTS Clear to send from computer to peripheral. 6 Output DSR Data set ready (wired to DCD internally). 7 N/A N/A Signal ground (or return). =] Output DCD Data carrier detect from computer to peripheral. 29 Input DTR Data terminal ready from peripheral to computer. Table I: R3232 Pin Connections signals that convey data, port activation control signals, and modem or flow control. 1.2.1. Data Signals Two signals convey data to and from the computer. The computer recieves data FROM the terminal with the TXD signal. The computer sends data TO the terminal on the RXD signal. 1.2.2. DTR and DCD Signals The DTR line on all ports is an input line used to sense that the external device is ready to communicate with the computer. By default the line is ignored, because many devices and cables used to cannect said devices do not implement the protocol. If DTR line processing is enabled the system will force closed the terminal part until this line is active, until such time a pro- cess waiting to open the port may indeed open it. The DCD line on all ports is an output line used to indicate that the port has been opened and is in use by a process. This feature is always enabled. On the console, it is always forced active by hardware. Thus, the console port is always open. 124 . PREREM NEW II THE 3735 OWNER’S MANUAL SERIAL COMMUNICATIONS DTE(normally, a terminal) Name DCE (computer) Signals that convey data: Table I1: RS232 Signal bDiagram These lines are frequently used by modems to indicate the pres- ence of a incoming call and actuate answering the call (for this rea- son, DCD is internally connected to DSR data set ready -- for modeums or terminals that monitor a different line). However, there are some RS-232 devices that wuse these signals for flow control -- usually calling it DTR flow contral. This method of flow control is NOT supported on the 375 serial ports, as it con- tradicts the use of these signals for modems. In such cases where such devices are found, they usually can be jumpered for XON/XOFF flow cantrol oar RTS/CTS, either of which will work on this systems ports. 1.2.3. RTS and CT8 Signals The RTS line on all ports is an input line used to sense that the DTE has data to be sent to the computer. the Crs line an all ports is an output line used to indicate that the D1E may send data to the computer. These signals were originally designed +for the older "halt- duplex” modems. These modems would anly transmit in one direction at a time, and would suspend transmission alternately on a side. Une wauld request the ability to transmit, and then transmit when the path was clear (which is where the names come from). These modems are nhow obselete, but the signals are still available. Many devices have altered the use of these signals to provide optional hardware {low control. The 375's serial parts will work three modes with these sig- nals: Safe Ignorance, Original Definition, and Hardware Flow Control. PRELIM REV II 123 THE 373 OWNER'S MANUAL SERIAL COMMUNICATIONS 1.2.3.1. Safe Ignorance The default arrangement on all serial ports is one of Sa+te Ignorance. RTS is 1ig9nhored, and CTS is activated when the serial port is open. 1.2.3.2. Original Definition Another mode of operation is one that conforms to the Origi-~ nal Definition in a useful sense. In this case, CT5 is active when the serial port is open and has data to transmit. RTS is sensed to determine when to send data by the computer on RXD. Data will only be sent from the computer to the terminal when RTS is active, This mode is never used for terminal connections since these signals only control the terminal’s signal I'XD, but is provided to support connection to obsolete half-duplex modems. In this case, all the signals are swapped for the modem, which is of course DCE. 1.2.3.3. Hardware Flow Control Finally, we have a flow control mode of operation. The CTS signal is active when the serial port is open and able to receive more data from the TXD line. I+ data is sent when CI1S is not active in this mode, it may be dropped. [ data is sent when CTS is active it will certainly be received and will not be dropped. RTS is sensed to determine when to send data by the computer on RXD. Data will only be sent from the computer to the terminal when RTS is active. This mode of operation is used to connect computers to other computers, or in general other devices that obey these rules. 1.3. CONNECTING TO A TERMINAL OR OTHER DTE Connecting terminals and DTE is a two-step procedure. First, the correct cable must be connected to the proper terminal, with the correct signals. Secondly, the terminal must be configured for use on the syg- tem. 1.3.1. Serial Connection of DTE To connect a port to a terminal, the correct cable is mandatory for success. ANSI terminals, such as DEC VIIgd or VT228 and Wyse 85, require a male-to-female cable. One cable of this type was supplied with the system. For ASCII terminals, such as TV1925, Freedom 189 or Wyse 5@, a male-to-male cable is required. RXD, TXD and GND must be connected with the cable for basic operation. 126 PRELIM REV I1I THE 373 OWNER’S MANUAL SERIAL COMMUNICATIONS Connecting DTR will allow the system to automatically close the terminal (e.qg. log off) when the terminal is powered off. If this teature is enabled, the terminal has the appropriate signal oh the DTR pin. Some terminal printers use the LDCD line to turn on the printer when the serial port is opened. Most terminals do not use the RIS and CTS lines +or +41low con- trol. However, sometimes the RTS and CrS lines are configured in unusual ways by terminal manutacturers. This can be the source of “mystery"” problems in serial communications. [t is wise to read the specifications provided by the terminal manufacturer closely. Table III shows the wiring description of a terminal cable. 1.3.2. Terminal Configuration Terminals may be connected to the serial RS232 ports. These ports are designated as the console and ttyD where D is the minor device number ranging from 1-3. The serial port lines are labeled, reading fraom the top to bottom: /dev/console /dev/ttyl /dev/tty2 /dev/tty3 The "/etc/ttys" file contains intormation that is used by vari- ous routines to initialize and control the use of terminal special files. This file may be customized to the needs of individual system Terminal Computer Signal Pin # Pin # (aka DLCD) DCD (aka DSR) NN BARUNK NONDGOLS WK o [ z a ® =] — EY Table III: Terminal Cable Description PRELIM REV 11 127 THE 373 OWNER'S MANUAL SERIAL COMMUNICATIONS 128 users. A typical ttys file may look like this: console "/etc/getty std.v6g@" vt22¢ on secure ttyl "fetc/getty std.vedad" vit229 on # office tty2 "/etc/getty std.o694" vt228 on # home ttyd3 "/etc/getty di1299" " dialup on # S555-¢94¢9 ttypo none network off ttypl hone network off ttyp2 hone network o++ ttyp3 none network off ttyp4 none network of+ ttypS none hetwork off ttypé none network off ttyp? rnone network off ttyp8 none network of+ The first entry is the designated terminal line cited in "rdev/tty." The "ttyd3" tfterminal indicates that the tty3 port is dedicated to a modem line. Dial-up terminals should be wired so that the carrier is asserted only when the phone line is used. The "ttypN" terminal lines are “pseudo-terminals.” rhese termi- nal lines are accessed by programs within the system. All pseudo- ttys should be designated as unavailable ("off") for terminal login. The second entry specifies the program that "/etc/init" must run to service the line and the characteristics of the terminal line. The program identified is typically getty(8), the terminal mode set program. However, any desired command, such as a daemoh process, may be chosen. Other identified characteristics may include the baud rate speed, parity (even/odd/naoparity), size of character (7/8 bits), and the presence of a delay character for or <(1+4>. These charac- teristics are fully described in gettytab(8). The third entry identifies the type of terminal normally associ- ated with that tty line, as found in the termcap($5) data-base file. The fourth entry indicates whelther the tty line is accessible to a terminal for login purposes ("on") or disabled +4or other devices or programs ("off"). In other words, the {nit(8) program is only exe- cuted if the tty is "on". An RS-232 terminal port is often disabled ("off") for DUCP, SLIP, dialup and serial devices, The ‘"“secure" status indicates rpoot log9in is permitted. This entry may be +ollowed by comments. Comments are delimited by ‘#’ and new line. If the terminal line wmust be disabled for other use, the tty should be labeled as "off" and the init(8) process terminated with the kill(1) command: kill -1 1 I+ a special file for the "/dev/tty" line is inaccessible when "init” PRELIM REV II THE 373 OWNER'S MANUAL SERIAL COMMUNICATIONS tries to create a process for it, a message will be printed on the consale and an attempt to reopen the terminal will bccur every minute. The warning message will be reprinted every 1¥ minutes, All tty devices have been contiqured tor the system prior to ship. L+ these files are damaged or destroyed, they must be remade through the use of the MAKEDEV(8) command. 1.3.3. Baud Rate The baud rate (or character transmission speed) ot a terminal may be selected from the gettytabi(8) file and placed in the "/etc/ttys" file for standard usage. Some of the typical selections are as follows: std.2698: 9600 baud. Standard setup. DizZgg: 1288 baud dialup. Resets to 389 baud upon >. D3gd: 394 baud dialup. Resets to 12¢06 baud upon . da3ea: 369 baud. Resets to 1200 baud upon . Resets to 1598 baud upon <{break?>. Resets to 118 baud upon . Some of these speed selections allaoaw a choice of terminal speeds. The speed rate can then be switched to the next one in the sequence by hitting a "break." Hawever, the terminal is always set initially to the first speed indicated, as cited above. 1.4. CONNECTING A SERIAL PRINTER OR PLOTTER Serial printers and plotters are typically DTE. However, the printer or plotter manual must be carefully checked before cable connec- tion. Some terminal printers also use the DCD line to turn on the printer when the serial port is opened. Read the previous sections to select the appropriate cables and signals. Thprpntoapap file is currently set for one serial printer connected to "/dev/tty3." An entry for a secondary serial printer in this file would be as follous: slpiserial line printer:\ IplES6:pwHBD: lp=/dev/tty3:fsHlé:br#l20g:\ tsd=/usr/spoal/slpdilt=/usr/adm/lpd-errs: See Appendix M on the Parallel Printer interface for a detailed descrip- tion of the printcap file. To send output to this printer, use the command: 1p -Pslp to interface a serial printer to any other port, edit the printcap +ile PRERENM REW LI 129 THE 373 1.35. 130 OWNER'*S MANUAL SERIAL COMMUNICATIONS by changing the tty type. To avoid any conflicts on this serial line, change the appropriate tty device in the "/etc/ttytype” file to be "off". SERIAL. COMMUNICATIONS AND TIP The tip(l) command is used in serial communications to establish a full-duplex connection to another machine. With this command, one can then login on a remote machine and transfer files across machines. 1.35.1. The /etc/remote File The /etc/remote file used by tip outlines how the remote system is to be reached and the mode of operation while in contact with the system, The structure of /etc/remote is similar to that of the termcapt3) file in that each line in the file provides a description for a single system, The +irst type of entry describes a computer system. The second entry describes a device such as a tty port or modem. The last entry is used for programs such as tip(1). When tip is invoked with only a phone number, it looks for an entry of the form "tipbaudrate," where the baudrate is the baud rate with which the connection is to be made. The | separates alternative descriptive names. There are many attribute parameters: at=: Auto call unit (ACU) type. br#: The baud rate. The default baud rate is 388 baud. cm=: Initial connection message sent to the remote host. cu=: Call unit if making a phone call. The default is the "dv" +ield. di=: Disconnect message sent to the host when a disconnect is reguested by the user. du: This host is on a dial-up line. dv=: Device to use for the tty. The tip program attempts to perfarm an exclusive aopen on the device to insure anly one user at a time has access to the port. —_el=: Characters marking an end-of-line. The default is NULL, "~" escapes are only recognized by tip after one of the charac- ters in "el," or after a carriage-return. PRELIM REV 11 THE 3735 OWNER'S MANUAL SERIAL COMMUNICATIONS ts=1: Frame size for transfers, used in buffering writes on receive operations. The default Frame size is equal to BUFS12Z. hd: The host uses half-duplex communication, local echo should be per+ormed. ie=: Input end-of-file marks. The default is NULL. oe=: Output end-of-file string. The default is NULL. When is transferring a file, this string is sent at end-of-file. pa=: Parity type. The default is even parity. pn=: Host phone numberi(s). If the telephone number field con- tains an @ sign, tip searches the file /etc/phones +ile for a list of telephane numbers; te=: The list of capabilities is continued in the named descrip- tion. A typical /etc/remote file should look like this: mysystem!iCRAY 3IXM:\ PN=6126248831 tc=UNIX-1260: tty3-260Firaw ttvy3 at Y4698 baud:\ tdv=/dev/tty3:br#9608:el="UC S QA D: ie=%%:0e="D:ta: tip2498: tc=UNIX-2499: UNIX-3@6:\ :dv=/dev/tt73:e1=“D“U"C“S“Q“U@:du:at=hayes:ie=#$%:oe=“D:brfl 399 1.5.2. The Usage of Tip Ufice the /etc/remnte file is correctly configured, tip may invaked. The two typical formats for tip are as follows: tip -v -speed system-name tip -v -speed phone-number The options are fairly straight-forward: -v: Display tip variables .hen invoked. Uptional -speed: The bauld rate selected. Typically 96é6¢8 +or direct line. system—name: The system to be contacted. phone-number: PRELIM REV 11 The phone number to dial. 131 THE 373 OWNER'S MANUAL SERIAL COMMUNICATIONS Upon invoking tip, typed characters are transmitted to the remote wmachine. The ™~ symbol signifies an escape. The escape sequences commonly used with tip are ~gntrl-0 for exit and ~! for escape to a shell, Files can be transmitted from local to remote sites with escapes. See tip(1) for further information on escape sequences. The ~s sets a variable for tip. These variables may be used to control its operation and may be placed in a file in the home direc- tory. For more information on tip variables, see tipct1). 1.6. CONNECTING TO MODEMS AND OTHER DCE As stated earlier, the serial ports are set as if the computer is a modem. Thus, since both the computer and the device are DCE, the result- ing "twisted" cable exchanges the signals appropriately, Table 1V shows the wiring description of a modem cable. Most modems are connected with a male-to-male cable. Check the manual on your modem carefully. RXD, TXD and GND must be connected with the cable for basic opera- tioh of a modem or other DCE. Connecting DTR and DCD will permit the system to automatically answer and thangup the phone when the modem is enabled for auto answer function. This feature needs to have been enabled by the system (see above). Only obselete Bell 202 half-duplex modewms require use o+ the RYS CTS lines. They are available in the mudes discussed abave. Note: some modems require DSR to be connected instead of bpco, in those cases the Sottom entry in Lhe table should begin with 6 instead of 24, 1.6.1. Modem Control The modewmctl (B) program is used to initialize modem control function on the serial ports. Fhe command modemctl will result in status information on the serial ports with regards to DTR and flow control RTS: console -dtr -rts tty3 dtr -rts Modem control parameters may also be defined or changed in the modemctl tty dirfunction rtsfunction 132 PRELIM REV I1 THE 373 OWNER'S MANUAL SERIAL COMMUNICATIONS Modem Computer Signal Pin # Pin & 2 3 TXD 3 2 RXD 4 S RTS S5 49 cCTs 7 7 GND 8 29 neo 28 (6) 8 DTR Table IV: Modemn Cable Description The dtrfunction parameter second argument is either "dtr" or " - dtr". The +first choice indicates that the serial port will wait on open for the DTR line to be asserted, and the second choice indicates that the serial port will disregard the DTR line entirely. The_ritsfunction parameter is either "rts" or "-rts". The Ffirst choice 1indicates that the serial port will wait before sending any mare characters for the RTS line to be asserted, and the second choice indicates that the serial port will disregard the RTS line entirely. This program can be run at any time by the superuser to change serial port status. 1.6.2. Auto-Answer Modems Auto-answer mnmodems are like the ordinary serial devices described earlier, using the standard modem cable for connection. However, the DTR signal asserted by the system enables the modem to anto-answer a call. Should someone call when DTR is asserted, the modem will answer the phone and emit the answer tone over the phone line. Should a call be made when DIR is not asserted or is de- asserted when someone is on the line, then it hangs up the phone. The system asserts DTR at the modem conhnector when the port is being opened, but does not complete the opening ot the port until LCD is asserted by the modem. While the DIR signal indicates that the phone wmay be answered, it is the DCD signal which permits the pro- grams to operate and communication to occur. Should DCD terminate, all the programs on the port will be killed. This results in the closure of the port, deassertion of DIR, and a hanhgup signal ta the phone line. To enable the auto-answer mode, the /etc/rc file must be modi- fied. Simply add at the end of the file the line! PRELIM REV I1I 133 THE 373 OWNER'S MANUAL SERIAL COMMUNICATIONS modemctl ttynum dtr -rts This line tells UNIX to monitor the DTR line and wait {for the DTK signal on the tty labeled "ttynhum.” This corresponds to monitoring the DCD line on the modem. UNIX always asserts DCD {and the modem asserts DTR) when the device is being opened. The "-rts" option indicates that flow control is disabled. To disable the auto-answer mode, use the opposite line in the /etc/rc file: modemctl ttynum -ditr -rts The system is no longer monitoring the DRT line for assertion. 1.6.3. Auto-Dial Modems The modemctl program must be used for out-bound modem communica- tion. The port must first be disabled so that UNIX may not use it while the modem is in use. fo disable the line, change the /etc/ttys file so that the line is "of+." ttyd3 "/etc/getty diZeg” dialup off run the kill command to take eftfect: kill -1 1t Two-way autodial capability is not supported at this time. 1.6.3.1. Auto-Dial Modems and TIP To set up autodial capability for use with TIP, modify the /etc/remote file appropriately. 1.6.3.2. Auto-Dial Modems and UUCP Contiguration of modems for UUCP is discussed in Appendix J. 1.7. CONNECTING TO OTHER COMPUTERS To connect another computer to a serial port, it must be determined whether the other computer is either DFE or DCE, and which, if any, of the modem control signals are reqguired. This intformation determines the praper cable connection. 134 PRELIM REV I1I THE 373 OWNER'S MANUAL SERIAL COMMUNICATIONS 1.7.1. Connecting Two 373 Computers Two 375 computers are DCE. Thus, use the modem cable described above. The serial port on each computer should have DTR enabled. RTS anmd CTS handshaking are also enabled for hardware +flow control. The /etc/rc file should contain the following line: modemctl]l ttynum dtr rts 1.7.1.1. 373 Connections and TIP To set up 375 connections for use with TIP, mwmodity the /etc/remote file appropriately. 1.7.1.2. 379 Connections and SLIP Configuration ot 37?5 cowputers with SLIP is discussed in Appendix K. 1.7.1.3. 373 Connections and UUCP UUCP connections and file configuration is discussed in Appendix J. PRELIM REV II 135 APPENDIX J UUCP ADJUSTMENT This appendix is a brief introduction to setting up the uucp(l) utility on the 3795, Sample files and a paper on UUCP implementation are on-line in /fusr/1ib/uucp. One should also read the UUCP implementation and setup papers by D.A. Nowitz in Volume 2 of the UNIX Programmer’'s manual. Appendix I an Serial Communications must be read before implementation. The most common error with UUCP is an incorrect serial communications line set~-up so READ APPENDIX I FIRST. 1.1. REMOTE AND LOCAL SYSTEMS UUCP allows computers to transfer data files, mail and executable programs from one site to another. The "remote" system is the site you wish to access, and the "local" system is the site (such as your com- puter) which will attempt to access this remote system. 1.2. ACTIVE AND POLLED (PASSIVE) SITES When transferring information, UUCP requires at least one site to have the ability to contact other sites. This "one-directional®" transfer of information results in the designhation of "active" and "polled" sites. An "active" site is capable of contacting another sys- tem via UUCP while a "polled" site is not. lnstead, the polled site must rely on the active sites to call (or poll) it. "Polled" is synoni- mous with "passive". At least one site must be active in order for data transfer to accur. A polled system must be regularly cantacted by an active system, while two active systems may contact each other as needed. For example, a typical UUCP network connection may designate the local system as active and the remote system as passive, allowing the local site to poll the remate site. 1.3. CONNECTING UUCP SITES Systems may be connected into the UUCP network by the use of modens or direct-connect terminal ports, The active system must have either an autodial modem or a directly connected R5-232 line to the remote system. If a modem is used, the remote system must have a dial-up port. PRELIM REV II 1327 THE 373 OWNER'S MANUAL uucep 1.3.1. Serial Port Regquirements An active site requires that at least o©0ne dedicated terminal port be provided for the use of UUCP to contact other systems. When using modems, one terminal port per outgoing autodial modem must be provided. (UUCP may use ahy number of autodial modems, although one is usually sufficient). An active site may also contact other UUCP sites without modems or phone lines, by directly wiring the machines Logether via serial ports, This direct-connect mode allows one system to orginate the UUCP connection while the other listens +for the connection. A direct-connect UIJCP contact allows the user to transfer intormation at the fastest transfer rate available (usually 969¢ baud). However, linking many machines in this way ties up ports which may be used +4or other functions. Thus, if vyou have many different systems to con- tact, it is strongly recommended that autodial modems be used, since one modem port can be used to connect to all systems. A polled site requires either a dial-up port or an RS-232 line from an active system. On the polled system, logging in on an account set up +for UUCP causes it to run a communcations protocol program instead of a shell. Fhus, modems and direct-connect terminal lines may also be used as ordinary system terminals on the polled systems. 1.3.2. Modem and autodialer support Most modems allow several combinations of baud rate, and provide autodial and autoanswer facilities as well. The L-devices "dialer" entry lists the appropriate designation for all of these modems. See Section 1.7.1.2 for more information. Theuadcdco program now has code to place and receive calls an the same device, it that modem has both autodial and autpanswer sup- port. The "acucntrl" dialing facility is currently unsupported. 1.3.3. Modem Dip Switch Configuration Some modems have dip switches which must be set {or UUCP betore use. The mast common switch setting for Haves 1208 baud modems and Haves-compatible 1206 baud modems is (+rom switch one to switch eight): up up down downh up Uup up wee dOwh The switch one setting "up” means it is listening to DIR. This set- ting is also used for TIP. US Robotics Courier 249¢ baud autodialing modem are defined as "hayes.," However, the baud rate must be specified as 2499 baud. The 138 PRELIM REV I1I THE 373 OWNER'S MANUAL uuceP switch setting is defined as "@" {for "of+" and b tor "on." the switch setting +for dialout anly an this particular maodem is (from switch one to switch ten): g9 11118108 For dialins/dialout capability, the switch settings are as follows: g 8112881280 For information on the dip switch configuration of other modem types, check the wmodem manual. Experimentation with the mwmodewm is also a time-honoured technique for determining the switch configuration. Incorrect switch contiguration is one of the most common errors in UUCP setup. 1.3.4. UUCP Protocol Support The UUCP software currently offers different protocols +for send- ing and receiving data. The protocol commonly used throuqghout the UUCP community, the "g9" protocol code, has a maximum throughput of around 988¢ baud, regardless of the physical medium. This UUCP protocol does not utilize LAN's and high speed car- riers well. The use of checksums and short data packets are of lit- tle use when the protocol is layered above another reliable protocol such as TCP or X.25. fr'wo new protocaols have been added to provide far this. The protocols now available to UUCP are: 1. The "g9" protecol--standard UUCP protocol used for dialup or hardwired lines. 2. The "t' protocol, optimized for use on TCP/IP carriers. 3. The "+" protocol, optimized for use on X.25 PAD carriers. The "t" protocol is similar to the standard "9" protocol except that the channel is assumed to be free from errors, thus eliminating the use of checksums and permitting the transfer of {files without packetizing. The "+" protocol relies on the flow control of the data stream. It is meant for use over links that can be guaranteed to be free from errors, specifically X.25/PAD links. The checksum is calculated over whole files only. If a transport fails the receiver can request retransmissions. This protocol uses a 7-bit data path only, S0 it may be used on carriers that do not handle 8-bit data paths tran- sparently. These protocols are selected by means of the options mentioned below. In all cases with autodial modemns, the "g9" protocal is PRELIM REV II 139 THE 373 OUWNER'S MANUAL UUCP selected by default. Other protocol types are selected only if one has an unusual UUCP connection. I+ a different protocol must be used, the system manager or the connecting party can be relied on to supply the appropriate changes to use the correct protocol. 1.4. SITE NAMES AND UUCP The name of a site is important since it provides a means o+t iden- tifying a machine, and consequently, that machine’s users. There are two kinds of names used within the UUCP system; loginnames and sitenames. 1.4.1. Login Name It is important that the loginnames used by a remote machine to call into a local machine is not the same as that o+ a rnormal user o+ the local machine. Each loginhame corresponds with a line in /etc/passwd. This account can be created with theaut8)X8) account pro- gram. The login account is frequently called uucp. __lgglgflgmennabeblnanynwadilogmginannmeMaNun;itétegigévenehcuilif~ ferent system that calls it a loginname with the machine name embed- ded, such as Usysl or Usys2. Thus, one can easily tell from a who listing, or a last(l) command if a uucp connection is in progress or has recently occurred as well as which system is being contacted. Login accounts for use by uucp should be give the group daemorn, a shell of /usr/lib/uucp/uucico, and have a home directory of /usr/spool/uucppublic. Due to security constraints, it is not recommended that vucp be run as root. 1.4.2. Site Name Each machine in a UUCP network is given a unique sitename. The —-Sitename identifies the calling machine to the called machine. A sitename can be up to 14 characters in length. 1t is use+ul to have a sitename that is unique in the first 7 characters, to be compatible with earlier implementations o+ UUCPF. It is desirable that the sitename will convey this uniqueness and perhaps a real warld iden- tity to the rest of the network. Short or commonly used sitenames are particularly annoying to other public sites as they lead to problems in site designation. Use a long, specific and unique sitename! The site name can be set with the SETSITENAME command (section 149 PRELIM REV I1I THE 373 OWNER’'S MANUAL uuce 1.5. DIRECTORIES AND UUCP There are several directories which are designated as specitic to certain UUCP files and programs. All of these directories contain files which are accessed by UUCP. /fusr/lib/uucp The directory where low level binaries, site information, and dialing information are stored Jusr/bin The directory in which the user utilities reside. /usr/spaool /uucppublic A directory where files can almost always be sent. This should be UUCP's home directory and writable by evervyone. /etc The directory in which system programs and utilities reside. /usr/spoal The top level spool directarvy. /usr /spool /uucp/XTHMP The directory where temporary +iles will be stored by uwuxgt. /usr/spool /uucp/CORRUPT The elephant’'s graveyard direcliory where cor- rupted "C." and "D." +iles go to die. /udndspepbiduapsAVRDD (T The directory where debugging traces are stored by uwugico when debugging is remotely enabled or enabled by a signal. /udndepapdbdivapehCKCK The directory where lock files are kept. TIP(1) and other programs may need to be modi- tied if this is changed as the lock files are shared. /Jusr/spool /uucp/L0G The directory where the log files are placed if "LOGBYSITE" is defined in “"uucp.h." Currently not supported. /Jusr/spool /uucp/STST The directory where the rembte system status tiles "STST" are stored. 1.6. MAJOR SUBDIRECTORIES AND FILES OF THE UUCP SYSTEM There are three major directories that are used by the UUCHF system as distributed. These are: /usr/lib/uucp This directory contains the system binaries and system control +iles. /usgn¢éspepdodddapcp This spool directory is used to store transfer requests and data. PREREM NE® I 141 THE 373 OWNER’S MANUAL 142 1.6.2. UucpP /usr/bin This directory contains the user-level pro- qrams. 1.6.1. System Binaries The following files are reguired for execution, and should reside in the system directory /usr/lib/uucp. L-devices L-dialcodes L.alianes L.cmds L.Bysys SEQF USERFILE uucico uuclean uuxqt The files the first Contains entries for all devices that are to be used by UUCP. Contains dialing abbreviations. Contains site name aliases. Contains the list of commands that can be used by a remote site. Contains site connection information foar each system that can be called. The seguence numbering and check +file. Remote system access rights. The actual transfer programn. A utility to clean up after UUCP. Executes commands received from remote sys- tems. in this directory can contain comments, Put a "#" as character on a line. Lines may be continued by placing a "\" as the last character of a line. This is helpful in making the files wmore readable, fhe "acucntrl" praogram used to control calling remote systems is not supporied. UUCP Programs The directory /usr/bin contains the d b 'Y -\ t. Table 11: FPreset Class Detinitions. 209 PRELIM REV 11 THE 373 OWNER'S MANUAL SMTP AND SENDMAIL Path fhe pathname of the mailer Flags Special +lagqs {or this mailer Sender A rewriting set for sender addresses Recipient A rewriting set +or recipient addresses Argv An arqument vector to pass to this mailer Eol The end-ot-line string +or this mailer Maxsize 'he maximum nessage length to this mailer Table 111: Mailer Fields. The htemplale is macro expanded before inser-— tion into the message. The mtlags are mailer flags outlined in the online manual omeadmabdil O_Dagptionvalue: Set configuration option o to a value. Values may be strings, integers, boolean or a time interval. The options are discussed online sendmail. Tusers: Permit trusted users to override sender addresses. Usually root, UUCF and network. P_Pname=num: Set a precedence for a message class. Special delivery would have a high number or pre- cedence. Junk mail would have a low (or nega- tive) numnber or precedence. Negative numbers don’t return error messages. 1.19.3. Special Macros Sendmail configuraltion +iles incorporate special detined macros. These macros are always a lower case letter and si9gnaled by Smacro in the file. See sendmail for more infarmatian. 1.19.4. Special classes The class $=wW is defined as the set of aill names Lhe host is known by. This can be used to delete local hositnames. 1.11. CONFIGURATION DEFINITIONS: The following sendmail detinitions are preset. DEBUG: Debugging information. LOG: Informational syslog. QUEUE: Queuing ability. PRELIM REV 11 201 THE 375 OWNER'S MANUAL 202 SMTP: DAEMON: UGLYUUCP: NOTUNIX: H_ACHECK: H_EOH: H_FORCE: H_TRACE: H_RCPT: H_FROM: User and server SMTP. Daemon ability. Not set. Assumes unreasonable UUCP Not set. Assumes unreasonable UNIX Not set. Deletes existing headers. Signals end o+ header and beginning Stamp the header message every time Timestamp. Receipient address. Specify a sender. SMTFP AND SENDMAIL connections. conhnections. o+ message. examined. PRELIM REV II APPENDIX @ SUPPORTED TERMINALS, COMPUTERS AND EMULATORS This list of terminals, computers and terminal emulators is derived +rom the /etc/termcap(3) file. Popular terminals have many termcap entries with special functions as well as the basic entry listed here. Examine the termcap file for specialized terminal Ffunctions. Most manutacturers of terminals specit+y the device as +ollowinhg a specitic standard, such as "vtZ220" styled terminals (for the DEC VI2Z28 termi- nal type). Check the manufacturers specifications 1+ the terminal is not listed in this file. It is very likely that it emulates the termcap of a wmore papular terminal type. Abbreviation Terminal Model Apple Computers applell Apple 11 plus apple~-89 Apple II with smarterm 8¢ column lisa Apple Lisa Xenix console display (white on black) mac Macintash with MacTlTerminal Ann Arbor Terminals: aaa Ann Arbor Ambassador LSI ADM Terminals: adm2 L5I ADM 2 adms LSI ADM 3 adm3a LS1 ALM Ja adm3a+ LSI ADM Sa plus admS LS1 ADM 5 admll LSL ADM 11 admiz LSI AbM 12 admz22 LSI ADM 22 adm31 LS1 ALM 31 adma?2 LSI ADM 42 Anderson Jacobson Terminals: ajs32 Anderson Jacobson 832 aj83g Anderson Jacobson 839 ajsSle Anderson Jacobson 519 Ampex Terminals: PRELIM REV 1I 203 THE 373 OWNER'S MANUAL dialogueB8¢ ampexJdiy ADDS Terminals: a?8gy regent regent 16¢ regent 2@ regent2s regentdd regentd4g+ regented regent209 viewpoint viewptséd vpoeg BBN Terminals: bitgraph Beehive Terminals: microbee superbee bh3m HDS Terminals: avt cleg cl198 CIT Terminals: citigt citg8g citSeg citc Data General Terminals 4966853 dgs134 dg299 Datamedia Terminals: dmi1549 dml3S21 dm2599 dm3@25 204 Ampex Dialogue 8¢ Ampex AZIlY ADDS Consul 989 ADDS Regent Series ADDS Regent 199 ADDS Regent 209 ADDS Regent 235 ADDS Regent 49 ADDS Regent 49+ ADDS Regent &¥ ADDS Regent 200 ADDS Viewpoint ADDS Viewpoint &9 ADDS Viewpoint 99 EBN Bitgraph Terminal Micro Bee Series Beehive Super Bee Beehive 111M HDS Corncept AVT HDS Concept 199 HDS Concept 168 Citoh 1@1 Citoh 89 citoh S5@@ Citoh fast VT199 Data General 66853 Data General &134 Data General Dasher 299 Datamedia 1529 Datamedia 1521 Datamedia 2569 Datamedia 3¥25a SUPPORTED TERMINALS PRELIM REV I1I THE 373 OWNER'S MANUAL SUPPORTED TERMINALS dm3845 Datamedia 3¢43a dt3g Datamedia dt8g/1 dmchat dmchat version ot Datamedia 25409 DTC Terminals: dtc DTC 382 dtc3¥ds DTC SYPs DEC Terminals: pro35Sg DEC Pro Console dwl DECwriter I dw2 DECwriter 11 dnw3 DECwriter IIX dw3 LAL1ZY dwa DECwriter IV gtd4g DEC GT4¢9 gt42 DEC GT42 gigi DEC Gigi Terwminal vtSE DEC VTSy viS@h DEC VT58h visS2 DEC VvTS2 viésl DEC VTé1L vsldgt DEC V3199 vt igg DEC VT1igg viig2 DEC VT1lg2 vt125 DEC VTi2S vti132 DEC VT132 vt228 DEC V1226 or V1Zz6¢ Series Esprit Terminals vt22¢ Esprit Opus 224 Freedom Terminals: +196 Freedom 194 flid-v Freedom 119 + 2089 Freedom 20y Hazeltine Terminals: esprit Hazeltine Esprit hl109g Hazeltine 1969 h142@ Hazeltine 1420 hi1589 Hazeltine 15d9 hl1518 Hazeltine 1516 h1S528 Hazeltine 1520 h1552 Hazeltine 13552 h2888 Hazeltine 20086 PRELIM REV I1I 2095 THE 208 373 OWNER'S MANUAL Heathkit/Zenith Terminals and Computers hi19 Heathkit/Zenith h29 Heathkit/Zenith higy Heathkit/Zenith h1@8bw Heathkit/Zenith Hewlett-Packard Terminals and Computers: SUPPORTED TERMINALS hi? 29 z~-1¥¥ PC with Color Monitor z-18¢g PC hplig HF 116 Computer hp15da HF 139A hp23%92 HF 2392A hp262l HP 24621 hp2626 HP 2626 hp264da HP 2649A hp2640b HF 264X Series hp264S HP 2645 hp2648 HP 2648A Graphics Terminal IBM Terminals and Computers ibm 1BM 31€1-10 ibm31l6&l IBM 316i-11 ibm3163 1BM 3163 ibmpc IBM PC/IX ibmx 1BM FPC Xenix Console Display ibmec (BM PC Xenix Colaor Console Display Microterm Terminals microterm Microterm Act IV microtermS Microterm Act V mime Microterm Mime | mime3a Microterm Mime 1 emulating 3a mimeZa Microterm Mime Za Perkin Elmer Terminals: owl FPerkin Elmer 1299 fox Perkin Elmer 1189 pe35@ Bantam Perkin Elmer 355¢ SQume Terminals qumeS Hume Sprint H gqume 142 RQume 142 gvtigl Glume 1¢1 $31¢ Special Radio Shack Computers trs2 Radio Shack trs-8¢ Model I1 using P&1 CP/M trs8g radio shack trs-8¢ btodel I trs189 Radio Shack Model 108 PREREM NEW II THE 373 OWNER'S MANUAL SUPPORTED TERMINALS Teleray Terminals: tigal Teleray 1861 L3798 leleray J3S/99 L3800 Teleray 3840 tig leleray 1# Special Tektronix Terminals: tekddl? rektronix 4914 tekd4g13 Tektronix 4613 tekd4giqg lektronix 4914 tekd@g1s Tektronhix 4615 tekd4d23 Tektranix 4923 tekd4g2s Tektronix 4824/4025/4827 tekdla? Tektronix 4187 Graphics Terminal with Memory tekd4114 Tektronix 4119 Series tekd4l113 Tektronix 41135 Color Graphics, $ Line Dialog Area tekd419S Tektronix 4185 tekd4lls Tektronix 4113 tekdl12s Tektronix 41295 tekd44g4 fektronix 4444 Texas Instruments Terminals: ti Tl Silent Z&883/733/735 tiz45 TI Silent 745 tigeod L Omni 8YY ti931 TI 931 Teletype Terminals: tty33 Model 33 leletype tty3s” Model 37 reletype ttyagd Teletype Dataspeed 46/2 tty4a3 Model 43 Teletype tty4424 Teletype 4424M blit Teletype 4869 Televideo Terminals: tvioiz 0ld Televideo tvio2o Old Televideo tviolo+ Televideo 91g+ tvi?ilb New Televideo 912 tvi?28b New Televideo 92¢ tviozq Televideao 924 tvi?25 Televideo 925 tviosy Televideo 959 Visual Terminals: vSg vizyg PREREM NEW® Visual 59 Visuval 269 207 THE 373 OWNER'S MANUAL 2¢8 vigs Wyse Terminals wyse3Q wyse?S wy8S Other Terminals: 1629 1649 abm3y abm85s aed cdi ct32 d132 datapoint delta digilog epdag ep4s8 falco 90149 ilee i499 ifmr infotonkKAS it2 mdilig modgraph mod2 nec omran soroc sorocld4g tecd4o@ tecS59¢ teletec terminet 1209 Visual 55 Wyse 59 Wyse 75 Wyse 895 Diablo 1&29 Diablo 164y ABM 89 Kimtron ABM 85 AED 512 CDI 1280 Southwest Technical Products Datagraphix 132A Datapoint 3369 Delta Data 590 Digilog 333 Execuport 4999 Execuport 4689 Falco TS-1 Graphon GO-149 General Terminal Infoton 499 Intormer D394 Infoton KAS SUPPORTED TERMINALS crgz (+ormerly lnt+oton 169) Intertec Data Systems lntertube ¥ Cybernex mdl-119 Modgraph terminal Emulating V119g@ Modgraph GX-1¢9Y NEC 35Hz2¢ Omron BEOZ2S5AG6 Soroc 126 Soroc IR149 TEC Scope TEC S99 Teletec Datascreen GE Terminet (209 PRELIM REV I1 THE 375 OWNER'S MANUAL terminel364 veagdg ve3dg3 vCc3g3a x 1768 x1728 x1758 xitex %183 zenl3y zenSg Terminal Emulators compucolor compucolarZ hi9k hp236 ibm-apl kermit kermitamn mska2l/ pckermit pckermitllg terak xterm xterms SUPPORTED TERMINALS GE Terwminet 349 Volker-Craig 484 Valker-Craig 385 Volker-Craig 3Y3A xerox 1704 Keraox 17209 Xerox 1754 Xitex SCT-198 Cybernex XL-83 Zentec 39 Zentec 5@ Compucalor Emulator Compucolar (f Enulator Heathkit Emulation provided by Kermit (no Abt) HP 236 [(nternal rerminal Emulator 1BM APL Terminal Simulator Standard Kermit Standard Kermit Flus AM MsS-DUS Kermit 2.2/ far the I8BM PC UCB 1BM PC Kermit 1.2 ucs IBM PC Kermit 1.20 Terak Emulating bLatamedia 15920 Xterm ferminal Emulator (X Windaow System) Xterm lTerminal Emulator (Small X Window System) Other Workstatons and Computers amiga ansi.sys apollo basis kaypro masscomp mt7g hansi.sys plasma ps399 sanyosSs sSun ST PRELIM REV II Amiga ANSI Computer PC-DOS 3.1 ANSI.SYS Apollo Workstations BASIS 18383 Computer Kaypro 11 Masscomp Bitmap Morrow MTZ?¢ PC~-DOS Public Domain NANSL.SYS Flasma Panel Display Picture System 399 Sanyo MBC-355X FC Compatible Suh dMicrosystems Workstation Console Atari SY 209 1.1. ROM is APPENDIX R 373 INTERNAL ARCHITECTURE AND SCHEMATICS POWER-UP ROM SHUFFLE initially located at ¥ at power-on reset,. it to location 9x899Y8F where it stays. on returning to the ROM monitor. The monitor See Appendix B for moves instructions 1.2. INTERRUPT VECTOR ASSIGNMENTS Vectored interrupts can be used in the design of unusual device drivers and other specific hardware design. The priocrity level of the machine at a specific time is monitored by the IPL indicator dix B). Interrupt vector assignments are outlined 1.3. PHYSICAL ADDRESS ASSIGNMENTS in Table I. Standard physical address assignments of hardware on (see Appen- the 375 CPU PRELIM REV 11 are outlined in Table II,. Note that PIA is shared with lp, rtc and SCSI Table I: Device Interrupt Vectors Vector (hex) Device Type 19 Icu device failure 11 Serial timer interrupt 12 Ethernet packet interrupt 13 Disk and SCS5I controller interrupt 14 &322 controller interrupt 15 Icu software interrupt 16 Serial @ receiver interrupt 17 Serial @ transmitter interrupt i8 Serial 1 receiver interrupt 19 Serial 1 transmitter interrupt 1A Serial 2 receiver interrupt 1B Serial 2 transmitter interrupt 1C Serial 3 receiver interrupt 1D Serial 3 transmitter interrupt 1E Reserved NA 1F Reserved NA 20-2F Reserved NA 211 THE 373 OWNER'S MANUAL INTERNAL ARCHITECTURE devices. Also, the counter timer ot the 2681 unit @ is used to refresh the DRAM while the counter timer of the 2681 unit | is used for the con- text switch clock pf UNIX. Table II: Physical Device Address Assignments Address (hex) Size in Bytes(dec) Device Type IxIAGAAS 8192K RAM Memory Ox80009@ 8K ROM Memory BxFFFAZY &4 R1&522 PIA ( Ix 799209 16 AMD 7990 LANCE ETHERNET Controller (eng@ ) PxFFF208@ 32 SN2681 Serial Unit & ( OxFFFCOQO 16 WD1og2-5 Disc Controller ( IxFFFagd 32 SN2681 Serial Unit 1 ( OxFFFEg9 9 WD33C93 SCSI Contraller ( gxFFFEGD 2 Interrupt Control 1.4. INTERRUPT PRIORITY LEVELS The 375 pals permit the computer to write at an address (in hexide- cimal) a byte which specifies the processor priority level. The proces- sor priority level is the level at which a specified interrupt is not acknowledged. For example, at level 7, no interrupts wills be ack- nowledged by the processor. At level @, all interrupts will be ack- nowledged. Vectored interrupt priority levels are outlined in Table III. Priority levels can be temporarily disabled to permit work on specific areas without disabling all interrupts. For example, when ser- vicing a terminal port, one should disable interrupts at priority level 3, thus permitting higher level interrupts like the ethernet and clock to continue. A software interrupt may be scheduled by writing the value "9" into the interrupt control unit. The software interrupt can be cleared by writing the value "2" into this unit. In both of these cases, the current priority level will be modified. An IPL of & will blank the IPL LED on the back panel. The presence of &a software interrupt will then be indicated only by the blinking of the decimal point. 1.3. NOTES ON THE SCHEMATICS The schematic sheets for the CPU board of the 375 computer +follow. Starred signal lines indicate signals that are available to the compan- ion card optionally installed under the main CPU card. 212 PREREM RER II THE 373 OWNER'S MANUAL INTERNAL ARCHITECTURE Priority 72! = ——---m oo e e e uhdefined intl4 gxle undefined intl3 Bx1l+ interrupt controller failuredxly timer and modemctl vector gx11 Priority 6: = —--mreem e e e - - ethernet vector gx12 Priority S: = =—----serec e e e disk and scsi interrupt Bx13 Priority 4: = —--smer e e e - parallel 1lp IO port vector @x14 Priority 3! = - cmmm e e e e serial port @ RX vector gxlé serial port 1 RX vector gx18 serial port 2 RX vector Pxla serial port 3 RX vector gxic Priority 2: = == eer e e - serial part § TX vector gx17 serial port 1 TX vector Gx19 serial paort 2 TX vector Bx1lb serial port 3 TX vector Bgxid Ariority 1: 000 @ memeem e e sottware network packet intrpt %15 Priority &I = ——---r—em e e Table III: Vectored Interrupts Priority Levels 1.5.1. Sheet A: MMU/CPU/TCU Section Examining Sheet A on the MMU/CPU/TCU section, one should note the following: 1. The reset switch (located on the 1/0 board) provides the master signal to the 7415132 Schmidt trigger SR latch. Either this switch or the power-up circuit (AC? and ARS) institute the reset of the CPU board. 2. Device A4 provides for RAM/ROM inversion shortly after reset. ROM is decoded at address ¢ until it is referenced at 9x3000090, after which RAM is decoded at address © and the ROM is decoded at Ix 3099949 . 3. €4 is an internal sychronizer to satisty setup and hold require- ments. PRELIM REV I1 213 THE 373 OWNER'S MANUAL INTERNAL ARCHITECTURE 1.3.2. Sheet B: EPROM and Buffer Section Examining Sheet B on the EPROM and Buffer section, one should note the following: 1. IC B4 is the master device decoder for the 3735 CPU board. 2. IC's BS and B&6 latch the low order lé-bits of address (high order is latched by bus masters), while BS and Bé buffer the data bus. 3. B8 and B? are the odd and even monitor EFPROMS, respectively. 1.5.3. Sheet C: Hardware Refresh and DMA control Examining Shkeet C on the hardware refresh and DMA control, one should note the following: 1. C4 and Co6 implement a basic control loop for the bus arbiter to implement refresh , while the actual multimaster arbitration is actually done on the companion card. 2, C13 and C14 are used for RAS/CAS 9generation by the processor and are synchronous to it’'s clock rate. 3. €15 enables the companion board to take over control of the DRAM array at will. The companion board can run asynchronously to the CPU board with other DRAM access strategies (like static CAS) without changes to the CPU board. 4. C8 guarantees minimum regquirements for CAS precharge and RAS recovery surrounding refresh events. 3. C? is an optiornal refresh counter far obselete DRAMS that don’t do CAS before RAS refresh. 1.5.4. Sheet D: DRAM Sections for 2 MB or 8 MB RAM Examining Sheet D on the DRAM sections for 2 MB or 8 MB RAM, one should note the following: 1. D2 buffers the row address onto the multiplexed DRAM address bus. 2. D6 latches the column address at the same time as RAS is active, but drives the multiplexed bus as CAS becomes active. D6 also distributes the RAS signal to the DRAMS, as D4 distributes CAS. 3. Both D4 and D6 handle CAS before RAS refresh conditions, and com- panion board memory reqguests. 1.5.3. Sheet E: Parallel! and SCSI 1/0 Examining Sheet E on the parallel and SCSi 1/0, one should note the following: 214 PRELIM REV I1I THE 373 OWNER'S MANUAL INTERNAL ARCHITECTURE 1. E1 is a PIA that controls the lineprinter, rtc, and SCSI func- tions. This greatly interacts with the I/0 board. 2. E2 is the S5CSI protocol controller that works the SCSI bus. 1.5.6. Sheet F: Serial 1/0 Examining Sheet F on the serial 1/0, one should note the follow- ing: 1. Two dual UARTS (F1,F2) and associated level converters (FIL3-91) provide serial I1/0 for the 375. This sectian heavily interacts with the interrupt control section. 1.5.7. Sheat H: Interrupt Control Examining Sheet H on the interrupt control, one should note the following: 1. H1 and H2 latch interrupts are sent simultaneously to both H3 and H4. 2. H3 computes priority, implements software interrupts and drives the diagnostic LED (IPL indicator). 3. H4 determines the interrupt vector for the highest priority inter- rupt that has been latched. 1.5.8. Sheet K: Board Interface Signal descriptions and reference designations for disk con- troller, and connector locations are on this sheet. 1.3.9. Sheet N: 1I/0 Board This sheet outlines the back panel PCB. This board handles relaying of signals to the outside cabinet, diagnostic LED indicator, lineprinter drivers and the battery backed up real-time clock. PREREM NEW II 213 H Ji-4 AL Je-7 ([ 4 - - ConTL s BuS , Acs, v s - — 1. + j 724 Ac/2 iy - 1/14F74 Vitarra | : PRV u.m st ano- ———w= TO x| 0 4 2= L L (€ saevion) wfi A 0 1/274F 14 o P o ST + 215 % ¢ 21, % .1 i2f = 19 s 24]acy |8 . 7 i b @ IEELEINE S PP A LI . LA L 20 & A4 Ad c4 43s P vz 1 ) asy b € 1 NAT ¢ ! . 42 e T (293 /] |l € s R 1% ¢ i >z e /LLT»I.E o3z h*lmlqi»l.l.l/ Azl Tlan goy |28 R%Y ) H B —— { 3 4\ 4& /|n4m|TJ=o Ts H|O|N|:J \__£30 1o T |29 RSTR \ . fl P - pA (\hll&.l&l.\; ITid W.“ NTY Al /|b\.N|||\hZ = 3> +oLDN B > wl B a (LA & PP} B ASPELL: 48 s $1_ pibA\ < M & g o o 74Foa B 27 s & — | 44 _ 1ion ) 2 Aip WD ¢ < E 2 L 4 o RALE rra ol 4T b}, ioh}il HLPASN \ w Q v — 4% ?Fs I‘qufl\.uflllj /In.m..ln s For |38 FLTN ] (.ll.lT s i- " 6 (/\- P 3.7 4ch are T v i Mvflunmduflm/l/ AL N 2l e £5TA/apT\Y aue . J U YTEREEE e T A m s L e = Arvspen | + Al ¢ A o P PRLE PP JF £ LI 1A AN RN 3% o/aN ) =4 AN i 52 WFEN %D Aty e + ! 2 pavy P e 7 N ZEENTE s FT TN — \ (I S T MIEILIRF/ N ATY i1 Pl R N [ZELA) ADsK 73 3 PPN Abrt PO e n Zeren S N N P T R ey o \____ADiw_ /8 T N = [ ACY .4 Rl IV “M.wflz\).fl/ )— AN PR ] < PYER N ) 401 T4 J N ADY Loy ary |42 s73 (LA SRS | - Al P N comiry 7% ) AT e EP N T 428 S lpe grgfALST2 N N "4‘1;'\ puggb—W——— N\ AD7 146 P 42 P R b4 [ — % ~iDAN ] ML ‘d= i e v N AD6 17 FYEEL: ] qQ e Rus acs 2] — 1 e Hoe DN 405 a6 sre} —l , ; o jb__CTTE N /|;...2|0|\|.-J;X P - 2 18] e T |44 PAN . | PV SERrTTER S e 1 —9$ ~ N 22 Pl mey[Rls ERY h___ ADe (7] AT Z2omnp T Avi o b AT 2 Zo AN I o | N H ‘—\10l T v ‘RS (\l’J A7 N ADS 2e A% ATP} P .u. aer | A2 mmxjr.l,J r'“lw.l.vuul\ e 422 34, 2 p- e N (L2 TN 1 3 PP 474 2% ’ : s Dpl 406 28 04 1 — L DREN N ——————1 409 \ ADS 23 ~—d 5T e b — 46 pP7 Aw A7 e szz00 s NE. 424 aca'—- N3 SZol6 Ll ’ “ .wfi flum %uw NSP2O8R ) W 2 M 22 . 4C:9 y — ~ N < k ace acs | PART of 22.f {— ¢ MamoAL Al = REsS&Y LN fill J s sre (o} 1o ARS AL SN uw ¢ MN £ woa . WorkS: (vai8ss orvstwiSe wpgciF.EP) | £f 374 A ] o—¢ o 4 974 1 AU COrazTvES ARE . \l\. 25y 3 J ° 2/ arusmn 2 444 BES STOR 4RL 1K ONeS, SN @ _ ~ E?l\f.-xl PR CtevirRy wer pakrs a8 K178 8L, ' H (5 RzToN e e e e H - /4 7413192 A8 P FoPu bk Py —I - IL S 4 T 12'9 M TR Mib Do wer NovE v DuA. BrIPAGS (avaciTors SBOCATED Wil Tulss (Fot 8 § 34 &&v #oiy L SEE SHEET B Fok CadViddyaned oF NorFs 2V 3,344 4 SYMMETRIC COMPUTER SYSTEMS' et E APTROVED OV P N.\h Dave ‘;\.\Q wvers §31-87 NS 2208/ Cru /MmN TCu SECTION @u Pacsecr S[375 = Z 4N~3 g . IRWrn T=esen Sio/% Ad8revd NO/4DIAS FI42478 3 woddT 98-8-9 creere gV amure e g ~on e Qrv0Z M4 SWILSAS AILNANOD DILINNAS [ PAIVEE A7 le-ze ol \NIIEIE $/ ol gory \3d0gd 3/ 4 Sy Y \NTrersD 9/ [} \WI3aa ( \Meovd L/ 3 \39g "I'llll J ¥ \N3ITTIE §/ 14 ory YZéie ez L# \wirors3 " \rTacig b1 »d |5 T2y Y Yo Y \"37335 of » TV (—__isad__ ,M e arr ke 2 SEY ] Y 914 o/ vz v \VIFl_ 1l 7 waTH | 4, L IN L 8- we, 4 zd /7 .M “n ? sev ) /61%: 7 e aar < 957 wezd 4 25 | £9 ¢/ o ol 5 grv ;ou-_ i ol 337 7] PEPTTIR T%nlm . fit PR N 74 759 5/ w0 [3 [ xid \m~irgd ™ 4209/ M7 R ¢ L Nmazead rLEST 9L r [ NY”EE ] W s#r3Tel —L—2 w-.s.. = ]Il I|I'||I/ \lll-'ll ,['J ¢4 wu TENFTIZ TR ”“ T ey (NI P LI T o - ET AN grs_z/y,, . |8 v 1y " ow Z Tav o v —_—— —— e ’ , LY AN dZ7 §! o9 ol I3 23v 47 Iz o5 AYCErTITE AETERNIE S 7 i IZT2A "y 2 '3 H 3 5| 5 ravy ery 3 RN ZZINETE M ERTAN ey 4] 4o 2N DY K YT v 7] | —] N TR o i s I vy 29y iz 5 | d — visir ot [#7 \WIrowd3 g.c @ Lav r t [ NM #.QWH _THIo.lv¢ 0. —————————1 By ——— T v iva_ b}, é I B 110 29 g6 Q1 n” 2y [ gz I,th;\- a1 «g s 2 gev setsrpl ! % \nFaraq bLESTIL T EETR = aaw ¥ ) > 77d__41].° y __ gsv AN PR T2 TR , | ————1 i | S \II | 7z 7], o I EL ver_zil' . T ecv sy ] \||I|l - P |||1 \IIII —avd 97, T ecw LEETA M T T gy 3 _#0d 9/ | = cav ] [ oY 5 gsa 71" M BT AT o 1AM E T ey 1 | 197 LS 4 v 1 g4 -" TEETIR sza sl o [F__vav iy b YT aw Zz #c 7 ) LI MY LR T ’ 42z 9’y _se2 9 LA E.Lan e 4 b! gy gra L/ d iy ray 5 N KR AL A & rd¥ ] 3 S ST 75:4 5! T siav z o = . 37 of P . kn - ’ nH:[t .-«HI.LL o7 >d 279 - Z N - L L / Sd ICH SIS ) snF yiP02 - / srad Jacr \ - AII' I s~d ajr CoLRENT SPISES OW MUX ARE OVE To Timal DELAY Ty C12. ~ 8 NT Feox fl?flplfiHu REMOWWE uMPERS AT X1 ¢ X3, SGLECT w2 AS BC NSTEAD ©oF AB cce ’ » el — ———— 3 o /4 /¢4 fd j7¢# |G /e ‘4 /4 4 1 24 o H H Vee + 2 Ie o7 15 AM? b _AMb L L .. L - Qo 12212 T6: PN T L R4 Rk e CET =X (CB R LLiz R LC3 RIS 7 NOTE: PINS 3 TWli 10 40 18 448 nor ) o5 u-ln“;P\ Cowmtcras ou Co. e €9 ““ Ui any 7 7 7 17 17 7 7 7 7 _ o \I.IUF M ¢/ c4 cs ce c7 c8 (12 3 cre 2 o3 wwlfl%\ Iy 91 P :N._ ae 22 Avp to»v-/ 4% 3 N-n TO 4+ €— - ! 13 PAL 2o1p FRom ub-g i tOLOEN I o Y2 74674 X2 fliatas _ FRom Jo.3 )y RTIMERON o M» ®c la o’ . s 2f, s s 2f. s ls 2{ P K o5, C6 A 7. FRom £1-15 > o 0 - =44 nuon 4> @ b2 £25) 5 o ciz-s2 -+ 13 [ 13 o, " 4 s FRom AL-32 \VNL.hE vfiu L~ FRom AT-33 " - .1 3 -le [Z12 H. >.Gp — 70 Ci2-9 5 < T Vi Tecvs FRom 43-8 H— £sro 13 12 ’ I/4 T4FCS 2 4 Ci ve14r0a /\Ci Cl ver4roe To Jo-3 g RFSHN " 10 7 F; < ifb 74Foq s 13 To Ji-s5 HLDAO\ LL74F T4 Fb = G Sia 1 . FRomA A7-3; ) 4Loaon 0 2 » 3 |2 d > 8 a8 UN Xl ea hA Lol . T4F 164 FROM A3..S V Flix J > hmnvtl L ‘—fi‘o—\;\\_ifi _— 7 [ Ne ol hd el > 70 E1-25 JITIN cas\ L To -l & mvr | > 70 p¢-7 y 1/2 74F 74 y Flom As-4 wan . Ve rer0s + 3 MUY _ 4 Cjz) 4mafes Floers As-3 £\ 1{C5 =4, RASN(P) (13 2. eam %74Fch o 1 ~NC ] _\ e BAS\ (e 14 ul.0||.1.||lv Te D4-2 “ (] ci3 ¢ PreCr) 10 —Q_, f1em = H Feom c7-p yPER\ q|Ci2 > %P 14 ” ne RASLEN ] o —&——> Te oru ‘ Y 3 £ s [} Rowgur o 2 4 _Row\ V4 74Fc8 ' ¢|u P 1 PR e RowEsh ()2 Lo g8 5 Tosz-1, D48 Ci4 cid coes S 4]0 Cor 21> 2 spet 1, 2 -2 e g _CouER g5 Qo 11aE2 3 7o pres 18 Y _\::r_J TRRARAEA trs“. Cs s | I | 74mi57 * it Rev 3,3A¢ 4 Lo +—Ho %, SYMMETRIC COMPUTER SYSTEMS ——— Crre nsw scas Nonld baanad onswner £ 48 Flong Apoig Y : ", 2 zh? ot g-77-8% sevaso 3.22-87 I~ 3 AN FRone cy-g )— 12 my ~N ¢ T3 Yirerre ne SELBLT AN HARDWARE REFRESHN § DMA ConTLol FRom a3.¢ y—24¥> _njcnr } 5] Cize o £ ] /4 14 POy V4 74F 08 rec s “\\\q fil. Im!ll WIS G et WA Golasrert , ins . e - - W T d WIBAn e U Sie/3 4230/ UG WZ -NOILDFS v T2 18-22-§ arver - Y v Prd swssves - grrcmser prpe—— y-vo eV Nt Pyt o N\geVY 1- - , SWALSAS ¥INANOD DLINNAS nIIMANI AN IR T A - by - 1TSY. T (m.\ y-un ..“* fl as_.n IQ.I.I' quw 8§ iZy J £ 3 8 2 £ .m z {7 A TN N E) 7 ELLENM DA - - - B, ] z bl ] fl.n, am :M M M m X M M M“ L L Frr ) ~ 3G A=dsy) S 44 M“M:u * L qu.t..,.n,u.JJJ 4 hl-J R % [ T 3 cm - < = 2 T IS \HeSY7 ¢ ry} $73 7 a S Q\Im {7-$> <4 Zfl N o hd - 3 x H] z s k4 sy —u ) NCTEYE) L7 L e x“ Mm N m 3 lm x .M x X 144 £l .SV cwised € 4 \~J5037 * Lt 4 " S 2 T 3 P ad < i ™ 2 «_/ Inj%e] ¥ 2 5 & v 2 19 RANTI Lol A AvTsy) 2 i SN '.al/xmuth Mm I“ 3 M M 1 v g1 __Swv Ndsed LY >3890 * ] t LI —] i ] ] w ” - o1 w Ly |E1_2 2y er7=2 wd . ; ! ozr SANNL faaN T p - s [ IR 1aid rIHI_ w X Y oy TW Ul S USE N ¥ —4 §39 fi PIZN wivs LI QM ‘ ) a8 VA 7T A E\r/ 0PI T Eg AN ] 7 e St ? . bav N ASH "Nt PN L < 1! TR M *\ \ Moy —N + - Nery L CREvT T T SVTSINL — L4 143 253a ~v4 423 DL IS I M | | (T 7R @ a Ny 2 AT lwflult LAY I ray NSy § I T ooz -+ Piall 714 0 I zar ’ o733 33% .,mu; > 4 243 l-tuzo.:r V T 1 2 usfl.lfl » > » NI ‘03 n‘fl\l btdd 2 bt 2a u\,l?ll.) SERBEREEEE ~F-Raa] e LM t«m y tm— “ v L P - - N {1 .h T E PN TT T r3kid :ulw.l.wn‘l/ S 8IM TV Ee ’ TR Zir i 22|22 (b2 w_m? ! vUE . d \¥» Sy 3 hid 8 pymmyr M“ — . mdsn.,u &C 0"~MLT~ZO T A F Tyt L] T u” = R I,M vm. AW W m H M’fi%fl WI% dg'a e b2a 0«1.‘._ _..: m |8 F 5 O} O} OEOE G - MyasrTm H..rv.«..m.-.«.v.,-...nm 24|l.:z|-) 27a ™ R K’ B Zwy LTI R I B S c o 2 P m— IIEEIRE: o ¥ ¢ O} OE P OE 5 X MBI ] wESTHL [ vy — MW W fl m W - by R .W h“ QI\ r\ui N Wil 7] ] 4+— t”\: N.fluan. < ~p b= 2 o = * SHEIIN HOIH A i T 7] 3 b AT T3 b ] TR 20N ¥ . ® L imd N ey I 2 9/ ve 7 g T gy Y ] w YN mavd bW 8y | Iny N 47— ! 2 LT & Y — Iy a5 o CiaY H ZEN i1t 3TN [+ X vy o] [ LI ey ol T g Il'II.'II/ _TIW iyt 1N T 8 Sy =] [z FRRTIANN ) I e #ar PON woys IS — T - - Y 3wy [ 3 VEEETTER + —t- 5 N - d > add y "z 8 . vy o _JT - [ 4 Nnr 1230 vt 574 s BT 31°¢ 91— Ld ez v/ “r dig Vs +|r 19ag - 62 SN@ 10U4N0)D o woxs - L sog v, " 8 \ —< N S sng G > bus » ) 2 BUs h —— JATA 8vS P ConTRoL Bys P —- FRoAN N\, c9 Lt 954 Diw - 4 B d 20 D7 b:5 #h-+ DC28 [§) 47 8, a4 L e A Fant B 1n b B | MET dhr AIGE 4k 40, i ame 2 . ame N [ M7 thin M348 - e i e e i WYY i i i N 42 4 ’ 1 a X 403 o Mn 01 o lia__aus 4] 2 aws )m ;lfl fl As Ma thre ML . |® i 2. WY E_amz [ ¢ [___dm3: Y= 4 5 HIGH I R 3 R N LD & ww 5 ”u 6 Auws [ 5] [z amr N _.w e 3 ¥ |Sa .-.m VA NI N T ¢ 2l E—T Al O BT B B O 1Y A Sk (e N\ Ave 3. w2 . e - e adiex]i N am3’ 13 3 ¥ < m i 3 LI AT N Ras ]y 7953 N a3 1 3 ¥ 25 T i SRS 3 [4-78Y (k.w'.lfi Al m d < - 2 a a A3 - 7 - B amt’ 4l —_~ 3T i w, “ L Y pes NECDENT] PR IR AR NS AR A O S | 0 X bee 31 0P . mm N A S o . - pEL RIS | podgogogonraroonoas i L | D= = N : . q 51 a2 At w &\ / 23 % [ _wic . s ozl & 8 5 3 0% & 406 i1, sl ery ( was\n 2 23,054 13 wisng LY o <] & <« «f <« « <« <« LIS P arl aue 4 K I"Az1 3 214 3 wazv 1 NITYRYY D2 i AwS Ay T o 10,13 4 wesn' CEE BELOW [ __A?S 1315 o asll amz 4 Lt A g De 118 5 Ragp\' 492 2 -w 0 Al Amy Azo0 ] 2ei10 [,4 .4 ¢ gasy\ ] Dc2t thes PCS2 (5] v gl Bed N - L2 Hleg W 4y Augp \twnz/.- 7 12,1 7 hsu:. be— ¢ [ AIGT Phre ATSC 2 reiszes JRESW\ L ¢ o 9] |8 masi¥ In M35 thru MHO w 9 \@ " 48 .3 | 84 el 2 AMT' ,0 18] |3 M7 thra N2 & 'S .fl Row\ A0y 5 amas_ PN x N \_ . 4 VAA 4 As’ [ Ay - k4 N ngrd“ 14 ‘535 ¢ (.llhxfl. )i A8 ML bhra MS . x W ” [ 2] i _ Ame PR3 N L 1 4 x S - “+— + ~AA— SNTTITIM i LOW + |% [Sxla}d 20, i0 PAL 20L70 %, - Ab 3 by .ufl 8” X 423 _ 1) Caszwr 6 [ caszaN NELLLNR R Y P8 5 2 & } 3 3 @98} XS 7 7] ¥ ~ amd’ 5 I s T 3 E: Slaz H 2z 7| B . cassun 73 I ERTTTER NPT P T Y f 8 5 5o or¢ 5 SYINWU \__RFSH\ © 3 17 cesgmn 4] [7 caszac /fi'filt i3 3 3 3§ 3§ “x 4 T caspmN i3 4 (ALY see NELL.E RSN 3 Py I * £ W w g m m Sw WM—— ¢ * - PYYTT) -~ 1 3 3 cs-8 >— TG ZAMENCITETRS i3] (scasey [R5 R dmp S 8 3 F 3§ § 5 % i el Y /ll‘l||l H N LOE\S ¢ M casiiN 1 ] n&:./. “m n_n 2ad N casy ? I Cas2iN /0 7 CAsS2WN \ A2y’ 8 2 CasaLN\ [ a LA23ILN el aial tdmd bz o o] tlezg spe2) tfery aliz) thz CASER\ / e SE €9\ JDa-u> ARl 1 4 Leee - 2D4-9 — S T R I B o~ Fa 08 08 8 § § § § 7 ! L /oLs s34 0P - ) nnw\\\/\ — MRl phra Mibe il WEPY e jAI= D jere MIL-2 HiGH CASENN' —e— L2814 bhrw MI2e10 WEAV - w M- 7 beea M- CASIMN —o— 141 1b brra A4D-10 WELN —= M33-2 ¢hee tA4A8-2 CASBHN — MSY-jb bors prbd-ib WEDN o= 443 frra ML4-2 Lev 4 CASPLY —w Mi-ib bhey MB-tb RASPN —e— Mi-3 thes Mib-B Low CABLLN — MIT- 16 bhew 21416 RASIN —o— p4iTe 9 $bra p493-9 m<§§m‘_vn_fi fiozvc‘—umn m/\m.—'mzm CASTULN o= MI¥-j} doru sado-i( RASTN —e— MII. P thom m4ag-9 1 =T cecaney £48 CASBLY —o iA44-1b jhra MSo-ip RAIBY —o— pMA4L-D ibin Mb4-3 hnddiilaided care g-19-59 . eevass 3-33- DEAM SECTION - BM BYTE PEIEsT €/875 s o e B 14 wTe me m w—Chanr—- TLr A4 Ty v ama em e e Z o rmnm v SLE/E U ilc3e X261 INIL-WIY P o/ IS LTl € ovoum V'S weacen vE-0g -9/ wve IreoN 2vn 48 G v SWILSAS IUININ0D DIILI W AS Vs iendy | l | 1, 38 4 4 g $° 474 +r ) Nieyr zeo AN éms € Alflml« bl .: %hn 77 4v¢ rsob——s ol [ D MDY ry; 16< FA JoaTlee Eus - | 4 20 7\ ) A/D s 1 = 2 3 2 vJ ———— <8 26 25 ; 3 21 4 /5 " 92 " n £ |8 : : T T2 & |3 acd £ R we s |5 S 10 114 ¥ S L [} " ’" " A - ) . [-Y 2 - 7 ¢ rm uw. 1" blm glm 12l 12|l 13 > 8 Ya g m NC 2 « m A= Consock 129 - : > ; . Con [Z Axous /989 1848 1488 1408 ¢ Fce N Fcl s ITYS 1o = 40 zo P ’ P F2 W/t 8\&».! LY Rap# 1244 4] cex 2] Lxc2 234 22 v T - F7 [ /1 (J % I < A N & 12 k4 £rsa A NN A ol ST e rerz LAY ] P L P lu.a ) ( fi LIS ) oy o0 | \_ 28 17 ~n? 0 "¢ reoz Wil B r1 gl 27 e T4 P -8 24 o8 r - / T e = rz bt o AAL LIS sl 21 P74 A D18 16 lze Prez \ PPE 2« {V\n 2] 12 A 20\ ' hid 2 oe \2 2w 20N 7y wan 2 - Rom TRTNE oy 2 e (Stezear 3,1 TeczEnn 7] \ 2 37 CERTADIN cEv Inren IMm 2L Ne /lk 7 A48 4 Inran IP6 b= NC . L A3 P 1¢ Rrby y \ Agp & L Lo N2 y A 420 5 A2 103 4 TSy y AFS Es 4 dd 4 crss3 AL RN PPN I T 22 S NSRS W pcos ) YT 1 e YIT] AL 78— - 4> Irs = NC \ o 4 Py Ire m-awzn ressl Txp1 T 7208 To Wrs f Wy o2 R7S 4 H7 pazr os s or 2733 orsl? 258 Cox g T] tEETUT M . oTAS Q ) 4 . p I TN T0 Co-i » ors sdr opels LJ LraT - « crd il TETIR oré mfl Mnnwfluu \ ‘ 15 rE&oys\ ) ore \ 4 Zagovs ) e LLL LA KeV 3,34 (4 y TS AN vl ZARDII\Y . K 2 T. ne oz alonf Laaaalll d et 2 14 7 oers £-/8-09 weeec-0-8p | ) S N\ 3.¢804 mind SERIAL I/0 { REFRESH CLOCK o s, Gy wid & Prostcr s/srs ~ S v S w—— Gaste , SNr G L ams * vt R B wS e - e H fl S45/% id8royy L il alebdend SLINDAII LINIXTLN/ 1 . L0 32-€ aresre VO-L7-b nve " VT wneven .8 aBAO YNl awe 7 SWILUSAS DIINdWo) DIXLINWAS g ¥ ) ve ‘e VE-; ]+ M& ] 51 4 INZI7Z 3 I —— L J4L2I 3 - 3 \B¥/Tvg b —( ¥s-5r ¥l 33 » NOZINZT X - voz 2 w » OXiN3 — - 7] N T77] 7] ¢H [3 I 2 g ' K of \1§xL [ H > fi r 7= 7 [ Tl g M 3 £ NfAdwxl ) §7d 5] gz | \1IxL oz 7 s o7 \Z2harxd I’ gzd a2/ FH L \Téxd 1T I § [ \TAoa»1 ) d gsd I ] I T, @Al d 79d 1) 23AT [F T 71 U 7 f gsa X ’ , ' gH 4 -4 oz [ ZoH Ngmesg 4 r77; [ z 713 7 Sls 1 L] + VN-_ It ._N % w - M N x S E T - Wll.llflk\\u woys \Me e~ ( \nImy/ 1 M: <~ Hi IM v IN . 5 [ \Tery 9/ . §1-13 0L =— v t SITTAED — “wiad | ) 2 f€ % ? NSIZTA T L \gAay»¥ J shie 2] \Tory &/ K NZAoyrY | MG &/ suor [A \¥7I09W 0 [3 \Bhay>y | N PX [ \las 12 3 NTAZIxy do 1wvd P eH m louJul;. a2 ™ —— 4 - ¥l AEZ 2N %7 YT -T fVE T3 word ™ \oisy Y] 2 2ra Y I g oy As/g (se-6r y o148y [ s §27 ) NINIALL §T | A - N YL 1z z g7d fi niga T2 | a8 P N ETTY . -_ _ 2! .0 LH \FoZiI276 m.uk. Td yosd ) — bE-TF wOUS b3 < $-Z3 woyd an? o~ - ., > AN - - \ $N8 T0P.4r0 2 \ - - sng riva $48 2day ADDR 3ys CPY ouTiInE ( CEF DES) B—"TuTA s h ) ) » ConTROL BUS m e 3 [ w‘ SEL'CT¢D suts N j 7 ¢ 7 fl 7 7 7 fi 77 f s 3 3+ g - Qo « Vigininivinieinig(w|aldigizf wluX siaideio(niBdiniqll] e NHEHHNHESHEHHE R H BRI HEH R HHE R - S g ; z i 3 SiGNAL GNP ot A Bt At A A A b A .HGH.,Z.,;H :::::T : : WWWVWWVVNVVWY VWY WW ¥ Ww W W W W N W N W W W w N N . JITTTYTVTYVYYTYY (TYTYYTY [ TTTYTYTTYTYYYVYTITTY TYYYYY TTY. I J5 NOTE . DISC CONTROLLER USES Pind 37 FoR DRQ SiSNAL. MUST BB CUT FOR sk WITH OTHER (USTOM BOARDS zamm“moocrccmb F2opr SHT w_v _ . [Z] # (asrecise) 00 (ure2comiBer W€ DENSTES DRECT SockgT ) 3 _ _ v INTERFACE £aass CPY BoARD TO ETHEZNST Sefad SE& >y " 4 & v ETHERNGET LOG'C DiAGRAM Fol FUNCT AL (NTREEMCE * W J 33 2 ) [ - - LSt QRuty ] = Xl T RCP R Kce f ) 100af - 22, PPN N\ ! ! ! Rx1 ‘ L] ;-4 e nu. mmv nOu R.\wnu>; 4 k8 Geve) SYMMETRIC COMPUTER SYSTEMS was paillh APROVES W . aener S4P s §-20-09 esvase §.32-87 Wostr o powkd wTERFACA Paciect 3/01f TR 0w w—— Gt + = -« o & S - = — we29vd Cuveg 0/T —— ) P - omon o SHNRUCAS FTLNIWCT DIBUT AT Z Ady | ANTTIREOD Ve OV IS 4 o ] P 4 3 3z d_.vllw ! » v s . o [T H 0 z A T’ H 3 . T 3 v — Y o 5 & ] q“.-“cu v 9 o [4 AN e Tl 1sg B v b [t §n e (139 i o] [T Ee | FRRTAT: WO hd IR CIENTPT 3Ty e [ = SRCE LW I BNl §7 DL ELO0emC] GYPIECT WD 7 B e R Ry A 3 PR P L) P L DA TS S S T e d 2N Bpwem YYwee 3206 FEsvET S e P FRUFY S FiEs LR T LI ¥ A3 2Ar svews BPT 62T ¥ 052 Tu mom-oWi B JFRiiTE € IO s> WO 1 8] RPN EeOF 0,3 m0 LS T SETVE Pel e KN O KuDF oS Jpvew ¢ T O 15 1 Ry Yy € Lweg “WMANS M ’ [I§ > and g [ ‘1 \7!—\1! e G =3 130 N3 [ .w-\l~./b T €, T 624 »7] p ¢ - £ ——— ¢ T . Ol Vet wow 4 2 R e ~-M“ Y DM el — ' Qver &y, 2Fasraent| 9iN{ & .nnr\v < —} -+ o i 3 NI \Bring 5y [H Tas T304 e — o ] ou_nn ar ry [N 18 [N = [7I .—. « \fi_ +< D ra— e a——rae M LJe a~J§ . O 3 1w “vRws -t =y - - Pl —— ] 1] o} ¢ H o et e ME 7 \m/—. 13 . ) Fasooe] SIF - rht u» ey < 40||nl'|x u.l..&\l v ML € u/«& e 73 NA u. ‘,“ “ e < A__ _n" AR - \u.__/T. [Y3 0 fl: 3 ) + S Alvx - “ o Je T s c/fi\fl e §, ¢ swea w28 £ r «t O 5 <™ (3 v 2 30 ——{w 50T > ] A 1 sienves Jaaef| RI 3||||&A. =z 0 ad e = B¢ e & R 4, 3 g 9 1o ~J o | ' 3 IVVI!. P A—1 3 < [ 5.3 “ R O AT s L 0 ) e N e Ty =< [er-m] ®IP i eir/ed €ir/d — Wvaovid 21907 13Nz23pl3 e SW3LSAS A3LNSCT DIYLINNAS 7 raz N RSP o~ IresTel SN I ety BIETIN TeLsTh, gz ang = Swe vy aSvR sv2 B oD ANZIDD %] WNEMOZ EGEG] B —RNGS TYNDIS ‘amvod PERPENIC R RN oors W s siel (8] k) N % DCE 3056 A swzagEI TITSNGAE JINIZIT §0 L SNSISAIANOD T A3 NO FAsWAT wERe< smvwnon (7] MM 1in 2 5soTDY IS QEwCE @2 wE TSR 3NN ¢ €37wisn 2auvons k4 SrEISEAANGT 2 pEE W 3SR don 3 g [0 wc14RIANCT T ATE - 530 cival N3 \s¥3 ~3 vy LERGE RES] w2\ NEAON AT RS3E, AERmSER . j — E roL zz hdd LT 17 N PEETRD ass” J lfll TEObbL QY Ay FEE s N | L2 e Vadgeies =M 5 o— _— 3 , #eeys 1T [ o7 PP \PIVEAE (s o . \orva ) fLUfM e ” £ + Nersizres | #2 7z xdw v Is IR _wfl 57 “ fTfifl»J i3 . . roer 1 iz P 51 + WAagody 2T H v €/ — LrresAYaL €/ + RN ¥i — ¢ —=qve v AR /NG SqY “mg oi 2we b-var it LE A1l . +7va frva mN&n‘.—WH Zyva toye ows Si-%ar N NN P & [} by 4 S o ¥ - w wleofnlsluwfweln]e AEE + - yTer | | v AT TN [ T S a a5/ ALY i i [ +-€ SYMMETRIX Configurable Kernel Software Package. $100 Q~CALC.ceeacasn s eeesvecssccassscsscsssessssacsasse 97150 INGRES BilNAIY. .42 % 0 e eeeesoccossscssvscsescnss 5 20 EMACS Binary and SOUILCEe. . 2@ ceeeeesscansanes 9 20 SPICE Binary.. i oy il e eeeneneaeanaes S 15 TOP BlNAIY. . @ sl e v e eereesncsncsensaecas 5 15 GDB Binary and Source.. il 2, it iieeenees $ 20 Software Loaded on 50 MByte Cassette Tapes..... add $15 * x kKK Contact our sales department about specialized software requirements or software such as the TEX typesetting program. The Symmetric 375 Computer Extended Price List[l] April 1, 1987 The Standard 375: Ethernet and Non-Ethernet The Symmetric 375 portable computer can place the software and hardware power of a VAX[2] on your desktop with OVER 3009 FILES at your fingertips at a very affordable price. ALL 375 computers feature the 4.2 BSD SYMMETRIX/UNIX{[3] virtual memory operating system, 4 RS-232 ports, one Cen- tronics parallel port configurable for general use, external ST506 inter- faces for floppy and hard drives, 64-bit floating-point hardware, 2 MB of RAM, a 5@ MB hard disk, languages; utilities, and applications packages. The 375 comes either with or without an ETHERNET interface: The Symmetric 375 Computer with ETHERNET Quantity Price single $9450, $8495 prepaid Quantity Price single $5558, $4995 prepaid Customizing your 375: Hardware Options Certain hardware options are available to customize your 375 system for your personal needs at a reasonable price. A. Winchester Disk Drive Options The standard 375 comes with a 58 MB Winchester disk drive. However, the 375 can be ordered with larger drives internally installed: 85 MB Winchester Disk Option...... $1100 96 MB Winchester Disk Option...... $1450 149 MB Winchester Disk Option...... $2750 [1] Prices at the time of manufacture. Shipping costs and sales tax not included. Prices subject to change without notice. [2] VAX is a trademark of Digital Equipment Corporation. [3] UNIX is a registered trademark of AT&T Bell Laboratories. We also offer external Winchester drives whiqh-can be connected to the external Winchester disk drive port without hardware modification.[4] 50 MB External Winchester Disk.... $1040 85 MB External Winchester Disk.... $1590 96 MB External Winchester Disk.... $2090 140 MB External Winchester Disk.... $3540 B. RAM Option The standard 375 comes with 2 MB of RAM memory, but can be expanded to 8 MB at the time of order: 8 MB RAM OptiON.eceececcoasecseass. $2800 C. SCSI and Streaming Tape Options SCSI (Small Computer Systems Interface) can be installed on your 375. SCSI tape drives and extra tapes are also available.[5] We can even replace the floppy drive with a tape drive to ease the burden of lengthy back-ups. SCSI Tape Interface Option......... $ 600 50 MB Cassette Streaming Tape Drive: External Unit.eeeeeececassseees $ 850 In Place of Floppy Drive....... $ 475 50 MB Cassette Tap€S....eeessssees.. $ 13.50 each Customizing your 375: Optional Software Packages The "SYMMETRIX Confiqurable Kernel Software Package" allows you to spe- cially configure your 375 computer for the addition of device drivers. The "IDBG/DBG Software Package" contains National Semiconductor's ISE (in sys- tem emulator) for 32080 design purposes while Q-CALC[6] is an extensive spreadsheet package. Berkeley INGRES (a relational database) and GNU EMACS (a text editor) are also available for a copying fee. Contact our sales department for more information. SYMMETRIX Configurable Kernel Software Package. 5 100 IDBG/DBG Software Package....c.eececesecncnecccons $1800 O-CALC. . ..ceeceasecsccsossssssssscscscsnsssasocccscs $ 750 INGRES (binary), EMACS (binary and source)..... $ 20 each [4] With case, power supply, fan and connector cable. [5] All tape drives are SCSI compatible and do not work without the SCSI hardware. Each drive comes with one tape. [6] Q-CALC is a trademark of Quality Software Products. The Symmetric 375 Computer Extended Price Listf1] November 15, 1986 The Standard 375: Ethernet and Non-Ethernet The Symmetric 375 portable computer can place the software and hardware power of a VAX[2] on your desktop with OVER 3009 FILES at your fingertips at a very affordable price. ‘ALL 375 computers feature the 4.2 BSD SYMMETRIX/UNIX{3] virtual memory operating system, 4 RS-232 ports, one Cen- tronics parallel port configurable for general use, external ST506 inter- aces for floppy and hard drives, 64-bit floating-point hardware, 2 MB ot RAM, a 58 MB hard disk, languages, utilities, and applications packages. The 375 comes either with or without an ETHERNET interface: The Symmetric 375 Computer with ETHERNET Quantity Ppice ——— o —— ———— ——— s o —— 7 O ——_— ot single $6450, $8495 prepaid single $55508, $4995 prepaid Customizing your 375: Hardware Options Certain hardware options are available to customize your 375 system for your personal needs at a reasonable price. A. Winchester Disk Drive Options The standard 375 comes with a 50 MB Winchester disk drive. However, the 375 can be ordered with larger drives internally installed: 85 MB Winchester Disk Option...... $1200 96 MB Winchester Disk Option...... $1358 140 MB Winchester Disk Option...... $2758 [1] Prices at the time of manufacture. Shipping costs and sales tax not included. Prices subject to change without notice. [2] VAX is a trademark of Digital Equipment Corporation. [3] UNIX is a registered trademark of AT&T Bell Laboratories. We also offer external winchester drives which .can be connected to the external Winchester disk drive port without hardware modification.[4] 50 MB External Winchester Digk.... $1340 86 MB External Winchester Disk.... $19490 96 MB External Winchester Disk.... $2090 140 MB External Winchester Disk.... $3540 RAM Option The standard 375 comes with 2 MB of RAM memory, but can be expanded to 8 MB at the time of order: 8 MB RAM OptioN..cecececesneeeess. 528008 SCSI and Streaming Tape Options SCSI (Small Computer Systems Interface) can be installed on your 375. SCSI tape drives and extra tapes are also available.[5] We can even replace the floppy drive with a tape drive to ease the burden ot lengthy back-ups. SCSI Tape Interface Option......... $ 600 50 MB Cassette Streaming Tape Drive: External Unit....ceeecens cesenn $ 850 In Place of Floppy Drive....... § 475 50 ME Cassette TapeS...........00+. 5 13.58 each Customizing your 375: Optional Software Packages The "SYMMETRIX Configurable Kernel Software Package" allows you to spe- cially configure your 375 computer for the addition of device drivers. The " iDBG/DBG Software Packaye® contains National Semiconductor's ISE (in sys- tem emulator) for 32000 design purposes while Q-CALC[6] is an extensive spreadsheet package. Berkeley INGRES (a relational database) and GNU EMACS (a text editor) are also available for a copying fee. Contact our sales department for more information. SYMMETRIX Configurable Kernel Software Package. S 100 IDBG/DBG Software PacKkage....eeeeeecessenesasss 51800 Q-CALC....... cesecccas teeecesosnecnenas ceeeseass. $ 750 INGRES (binary), EMACS (binary and source)..... $ 20 each [4] With case, pBwer supply, fan and connector cable. [5] All tape drives are SCSI compatible and do not work without the S5CS1 hardware. Each drive comes with one tape. [6] Q-CALC is a trademark of Quality Software Products. R WA K £ copbi ook