Communication Protocol Channel Utilization and The

Total Page:16

File Type:pdf, Size:1020Kb

Communication Protocol Channel Utilization and The COMMUNICATION PROTOCOL CHANNEL UTILIZATION AND THE DESIGN OF THE MAX2 DATA LINK PROTOCOL by KENNETH LEE B.Sc, The University of British Columbia, 1985 A THESIS SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF SCIENCE in THE FACULTY OF GRADUATE STUDIES (Department of Computer Science) We accept this thesis as conforming to the required standard. THE UNIVERSITY OF BRITISH COLUMBIA September 1991 © Kenneth Lee, 1991 In presenting this thesis in partial fulfilment of the requirements for an advanced degree at the University of British Columbia/ I agree that the Library shall make it freely available for reference arid study. I further agree that permission for extensive copying of this thesis for scholarly purposes may be granted by the head of my department or by his or her representatives, it is understood that copying or publication of this thesis for financial gain shall not be allowed without my written permission. Department of 6U)Mpu.Tr>(l (t-\Ui^ The University of British Columbia Vancouver, Canada Date $Ej)T£-M6F-ft. 1901 DE-6 (2/88) ABSTRACT In this thesis, we first surveyed and analyzed the Kermit, XMODEM, YMODEM, and ZMODEM file transfer protocols. A number of theoretical channel utilization equations were then developed that would predict the effective utilization, and hence effective throughput, of stop and wait protocols and streaming protocols. A series of experiments were performed that measured the effective throughput of the protocols at various baud rates and error rates and showed the utilization equations to be within ±5% of the measured values. Based upon these results, a full-streaming communications protocol, MAX2, was designed. A subset of the MAX2 protocol was then implemented and tested at different baud rates and error rates. These results were within ±1.5% of the theoretical values and showed that the MAX2 protocol to be more efficient than the Kermit, XMODEM, YMODEM, and ZMODEM protocols at all baud rates and error rates when using comparable maximum packet sizes . These results also indicated that in order to achieve maximum effective throughput, the packet size must change as the communication channel's error rate changes. ii TABLE OF CONTENTS Abstract • 11 List Of Tables vi List Of Figures vii List Of Graphs vm Acknowledgement x 1. Introduction 1 1.1 Motivation and Objectives 1 1.2 Outline 2 2. Protocol Survey 4 2.1 Introduction 4 2.2 Kermit 4 2.2.1 Introduction -4 2.2.2 Classic Kermit 5 2.2.3 Extended Length Packet Extension 8 2.2.4 Sliding Window Extension .9 2.3 XMODEM 10 2.3.1 Introduction 10 2.3.2 XMODEM (Original) 10 2.3.3 XMODEM-CRC H 2.3.4 XMODEM-1K 12 2.4 YMODEM 12 2.5 ZMODEM 13 2.6 Summary 15 2.7 Conclusion 18 3. Protocol Channel Utilization 19 3.1 Introduction 19 3.2 Analysis 19 3.2.1 Uniform Deterministic Error Distribution 20 3.2.2 Poisson Error Distribution 21 3.3 Channel Utilization Equation For Stop and Wait Protocols .22 3.4 Channel Utilization Equation For Streaming Protocols 25 3.4.1 Selective Retransmission 26 3.4.2 Go Back N 28 3.5 Equation Verification 31 3.5.1 Experiment Description 32 3.5.2 Uniform Byte Error Distribution Experiments 34 3.5.3 Random Bit Error Distribution (BLACK30) Experiments 36 3.6 Summary 37 3.7 Conclusion 39 iii 4. MAX2 Protocol 40 4.1 Introduction 40 4.2 Specification 41 4.2.1 Encoding Algorithms 41 4.2.1.1 Hex Encoding 41 4.2.1.2 Network Control Character Encoding 42 4.2.1.3 Full Control Character Encoding .42 4.2.1.4 Eighth Bit Character Encoding .42 4.2.2 Checksum Types 42 4.2.3 Packet Format .43 4.2.3.1 SOH Field 44 4.2.3.2 SEQ Field 44 4.2.3.3 TYPE Field 44 4.2.3.4 LEN Field 44 4.2.3.5 DATA Field 45 4.2.3.6 CHECK Field .45 4.2.4 Packet Types 45 4.2.4.1 ABORT Packet 46 4.2.4.2 ABORT-A Packet 47 4.2.4.3 ACK Packet 47 4.2.4.4 ACK-C Packet 47 4.2.4.5 CHANNEL Packet 47 4.2.4.6 CONNECT Packet .48 4.2.4.6.1 PSIZE Field 49 4.2.4.6.2 BSIZE Field 49 4.2.4.6.3 SSIZE Field 50 4.2.4.6.4 CHECK Field 50 4.2.4.6.5 ENCODE Field 50 4.2.4.6.6 CTL Field 51 4.2.4.6.7 8TH Field 51 4.2.4.6.8 DUPLEX Field 52 4.2.4.7 DATA-BLOCK Packet 52 4.2.4.8 DATA-REPLY Packet 53 4.2.4.9 DATA-STREAM Packet 53 4.2.4.10 DISCONNECTED Packet 53 4.2.4.11 DISCONNECTING Packet 53 4.2.4.12 FEEDBACK Packet 54 4.2.4.13 NAK Packet 54 4.2.4.14 NAK-A Packet 54 4.2.4.15 NAK-C Packet 55 4.2.4.16 PAUSE Packet 55 4.2.4.17 PROBE Packet 55 4.2.4.18 RESUME Packet 55 4.2.4.19 TIMEOUT Packet 56 4.2.5 Protocol Description 56 4.2.5.1 CONNECT Phase 57 4.2.5.2 DATA Transfer Phase 58 4.2.5.3 DISCONNECT Phase 60 iv 4.3 Implementation .61 4.4 Throughput Experiments 62 4.4.1 Random Bit Error Distribution (BLACK30) Experiments 62 4.5 Summary 64 4.6 Conclusion 67 5. Conclusion 68 6. Bibliography 71 APPENDIX 1. Theoretical Utilization Graphs, Uniform Error Distribution 73 APPENDIX 2. Theoretical Throughput Graphs, Uniform Error Distribution 78 APPENDED 3. Measured Throughput Graphs, Uniform Error Distribution 83 APPENDIX 4. Percentage Difference Graphs, Uniform Error Distribution 91 APPENDED 5. Theoretical Utilization Graphs, Random Error Distribution 99 APPENDIX 6. Theoretical Throughput Graphs, Random Error Distribution 108 APPENDK 7. Measured Throughput Graphs, Random Error Distribution 117 APPENDED 8. Percentage Difference Graphs, Random Error Distribution 120 v LIST OF TABLES Table 1. Protocol Survey Feature Summary 17 Table 2. Percentage Difference of Measured Utilization Relative to Theoretical Utilization For Uniform Byte Error Distributions Produced By BLACK10 34 Table 3. Percentage Difference of Measured Utilization Relative to Theoretical Utilization For Random Bit Error Distributions Produced by BLACK30 37 Table 4. MAX2 Checksum Types and Field Values 43 Table 5. MAX2 Packet Types .46 Table 6. MAX2 CONNECT Packet Data Field Types 49 Table 7. MAX2 ENCODE Field Values 51 Table 8. MAX2 Packet Types Recognized By MAX2SEND and MAX2RECV . 61 Table 9. MAX2 Percentage Difference of Measured Utilization Relative to Theoretical Utilization For Random Bit Error Distributions Produced by BLACK30 63 Table 10. MAX2 Average Measured Throughput Comparison At Random Bit Error Rates Produced by BLACK30 .64 Table 11. MAX2 Protocol Feature Summary 66 Table 12. Protocol Overhead Summary 68 vi LIST OF FIGURES Figure 1. Kermit Repeat Encoding Algorithm 6 Figure 2. Kermit Eighth Bit Encoding Algorithm 6 Figure 3. Kermit Control Prefix Encoding Algorithm 7 Figure 4. Classic Kermit Packet Format 7 Figure 5. Extended Length Kermit Packet Format 9 Figure 6. XMODEM DATA Packet Format 11 Figure 7. XMODEM-CRC DATA-CRC Packet Format 11 Figure 8. XMODEM-1K DATA-IK Packet Format 12 Figure 9. ZMODEM Data Packet Format .14 Figure 10. ZMODEM Control Packet Data Field 15 Figure 11. ZMODEM Control Packet Formats 15 Figure 12. Utilization Equation For Stop and Wait Protocols 24 Figure 13. Utilization Equation For Half-Duplex Streaming Protocols (Selective Retransmission) 27 Figure 14. Utilization Equation For Full-Duplex Streaming Protocols (Selective Retransmission) , 27 Figure 15. Utilization Equation For Half-Duplex Streaming Protocols (Go Back N) 30 Figure 16. Channel Utilization For Full-Duplex Streaming Protocols (Go Back N) 30 Figure 17. Throughput Test Computer Configuration 31 Figure 18. BLACK30 Random Number Generator .36 Figure 19. Example of MAX2 Hex Encoding 41 Figure 20. MAX2 Packet Format 44 Figure 21. MAX2 CONNECT Packet Data Field Format 48 Figure 22. MAX2 RESUME Packet Data Field Format 56 vii LIST OF GRAPHS Graph 1. Theoretical Utilization At 2400 Baud And Uniform Error Distribution 74 Graph 2. Theoretical Utilization At 4800 Baud And Uniform Error Distribution 75 Graph 3. Theoretical Utilization At 9600 Baud And Uniform Error Distribution 76 Graph 4. Theoretical Utilization At 19200 Baud And Uniform Error Distribution 77 Graph 5. Theoretical Throughput At 2400 Baud And Uniform Error Distribution 79 Graph 6. Theoretical Throughput At 4800 Baud And Uniform Error Distribution 80 Graph 7. Theoretical Throughput At 9600 Baud And Uniform Error Distribution 81 Graph 8. Theoretical Throughput At 19200 Baud And Uniform Error Distribution 82 Graph 9. Measured Throughput At 2400 Baud And Uniform Error Distribution 84 Graph 10. Measured Throughput At 4800 Baud (#1) Uniform Error Distribution 85 Graph 11. Measured Throughput At 4800 Baud (#2) Uniform Error Distribution 86 Graph 12. Measured Throughput At 9600 Baud (#1) Uniform Error Distribution 87 Graph 13. Measured Throughput At 9600 Baud (#2) Uniform Error Distribution 88 Graph 14. Measured Throughput At 19200 Baud (#1) Uniform Error Distribution 89 Graph 15. Measured Throughput At 19200 Baud (#2) Uniform Error Distribution 90 Graph 16. Percentage Difference At 2400 Baud Uniform Error Distribution 92 Graph 17. Percentage Difference At 4800 Baud (#1) Uniform Error Distribution 93 Graph 18. Percentage Difference At 4800 Baud (#2) Uniform Error Distribution 94 Graph 19. Percentage Difference At 9600 Baud (#1) Uniform Error Distribution 95 Graph 20. Percentage Difference At 9600 Baud (#2) Uniform Error Distribution 96 Graph 21.
Recommended publications
  • Macwise Version 19 User's Manual
    [email protected] www.CarnationSoftware.com www.MacWise.com MacWise Version 19 User's Manual You can use Command F to find what you are looking for in this document. Introduction Terminal Emulation MacWise emulates ADDS Viewpoint, Wyse 50, Wyse 60, Wyse 370, Televideo TV 925, DEC VT100, VT220 and Prism terminals. Supports ANSI color. Esprit III color is also supported in Wyse 370 mode. MacWise allows a Macintosh to be used as a terminal -- connected to a host computer directly, by modem, or over the Internet. The emulators support video attributes such as dim, reverse, underline, 132-column modes, protected fields and graphic characters sent from the host computer, as well as enhanced Viewpoint mode. Features include phone list and dialer for modems, on-screen programmable function keys, connection scripts and more. Connectivity 1. Built in Modem 2. Telnet / TCP/IP 3. SSH Secure Shell 4. Serial ports via USB to Serial adaptor . 5. Also communicates directly with the Mac unix shell Telnet Telnet settings are under the Connection Menu. Select "Telnet" to enable telnet. Select "Telnet Connection..." to enter your Host IP address, port number and terminal type. =============================== KERMIT ================================ NOTE: If you are running Mac OS 10.13 or later, you need to also use Kermit. (There should be a check mark on "Kermit" under the Connection Menu.) Kermit is installed automatically when Mac OS 10.13 or later is detected. You can re-install kermit any time by selecting Kermit Installer from the Help Menu in MacWise. Echo Kermit Characters ( under the Connection Menu ) This is normally enabled when Kermit is enabled.
    [Show full text]
  • A Kermit File Transfer Protocol for the Apple II Series Personal Computers : John Patrick Francisco Lehigh University
    Lehigh University Lehigh Preserve Theses and Dissertations 1986 A Kermit file transfer protocol for the Apple II series personal computers : John Patrick Francisco Lehigh University Follow this and additional works at: https://preserve.lehigh.edu/etd Part of the Electrical and Computer Engineering Commons Recommended Citation Francisco, John Patrick, "A Kermit file transfer protocol for the Apple II series personal computers :" (1986). Theses and Dissertations. 4628. https://preserve.lehigh.edu/etd/4628 This Thesis is brought to you for free and open access by Lehigh Preserve. It has been accepted for inclusion in Theses and Dissertations by an authorized administrator of Lehigh Preserve. For more information, please contact [email protected]. A KERMIT FILE TRANSFER PROTOCOL FOR THE APPLE II SERIES PERSONAL COMPUTERS (Using the Apple Pascal Operating system) by John Patrick Francisco A Thesis Presented to the Graduate Committee of Lehigh University in Candidacy for the Degree of Master of Science 1n• Computer Science Lehigh University March 1986 This thesis is accepted and approved in partial fulfillment of the requirements for the degree of Master of science.• (date) Professor in Charge -------------- --------------- Chairman of the Division Chairman of the Department • • -11- ACKNOWLEDGEMENTS It would be somewhat of an understatement to say this project was broad in scope as the disciplines involved ranged from Phychology to Electrical Engineering. Since the project required an extensive amount of detailed in­ formation in all fields, I was impelled to seek the help, advice and opinion of many. There were also numerous t friends and relatives upon whom I relied for both moral and financial support.
    [Show full text]
  • CS5865 Laboratory #1 Notes File Transfer Protocols
    1 CS5865 Laboratory #1 Notes File Transfer Protocols - An Overview Dr. B.J. Kurz XMODEM (Ward Christensen, 1970), one of the earliest ‘industry standard’ file transfer protocols in the public domain. HDX operation, character (byte)-oriented, fixed-length 128-byte blocks, 8-bit characters (bytes), 8-bit BCC = sum-mod256, stop-wait ARQ, block counts, binary data capability. Poor error detection capability, typically 95%. data block format: SOH/count/1’s compl. count/ user data/BCC control block format: ACK or NAK (or C), EOT Several later versions of XMODEM are in use: XMODEM-CRC same as regular XMODEM above except uses 8-bit BCC = CRC-8 (some implementations use 16-bit BCC = CRC-16). Better error detection capability, typically 99.97% (for CRC-8). Some versions negotiate the error character generation method: the sender first tries sum- mod256 BCC, then switches to CRC-8 BCC after three unsuccessful attempts indicated by NAKs from the receiver. XMODEM-1K same as XMODEM-CRC except uses 1024-byte blocks for better throughput (fewer line- turn-arounds), but slightly degraded error detection performance. WXMODEM a sliding-window version of XMODEM. Group size is fixed as 4 blocks. Much improved throughput. FDX capable lines needed if continous-ARQ error recovery used. YMODEM (Chuck Forsberg) a variation of XMODEM-1K. Supports two block lengths of 128 bytes and 1024 bytes, uses 2-byte CRC-16, excellent error detection capability, typically 99.99%. KERMIT (Frank de Cruz, Columbia Univ. Comp. Center, N.Y), most popular file transfer protocol, copyrighted, over 200 implementations for various systems. This is a comprehensive 2 remote communications package including terminal emulators, storage-to-storage transfer, not only a file transfer protocol.
    [Show full text]
  • RS-232 Full Modem Interface (8-Wire) Module for Protection Relay, IED, and Substation Automation Reference Design
    TI Designs RS-232 Full Modem Interface (8-Wire) Module for Protection Relay, IED, and Substation Automation Reference Design TI Designs Design Features The worldwide electric-power infrastructure is a set of • Can be Configured as DTE or DCE Interface interconnected assets for power generation, • Galvanic Isolation Using Digital Isolators With transmission, conversion, and distribution commonly Modular Options of 2-, 4-, or 8-Wire Interface referred to as "the grid". Protection relays and IEDs (DTE) used in the grid measures a number of electrical • Operates With Single 5.6-V Input parameters. These parameters are collected by • 9-Pin D-Sub Connectors Provided for Easy automation systems for analysis. Data from the IEDs Interface to External DTE or DCE can be collected locally or remotely. For remote • Isolated Power Supply Generated Using SN6501 communication, modems (DCE) are used, which can Transformer Driver be dial-up, GSM, or radio modems. Modems are interfaced to IEDs using an RS-232 interface. The RS- • Tested for the Following Data Rates: 1200, 2400, 232 interface includes data, control, and status 4800, 9600, 19200, and 115000 bps signals. Control and status signals can be hardware or • Tested for ESD ±8-kV Contact Discharge software based. To maintain the data integrity in a • Tested for Surge ±1-kV Common Mode noisy grid environment, galvanic isolation is provided between IEDs and modems. This TI design Featured Applications demonstrates the hardware flow control method for DTE or DCE. This TI design also demonstrates • DTE
    [Show full text]
  • Altair CP/M 2.2AT Ver 1.1 IOBYTE Implementation
    Altair CP/M 2.2AT Ver 1.1 CP/M 2.2AT supports an Altair 8800 computer with both an Altair and Tarbell floppy controller installed. Drives A & B are Altair drives 0 & 1. Drives C & D are Tarbell drives 0 & 1. The boot drive is always Altair drive 0. The Altair controller can be either the 8" or the 5.25" (mini-disk) controller as selected by conditional assembly. The BIOS uses track buffering to improve disk performance. Compared to a non-buffered BIOS, perfor- mance of program with substantial disk I/O improves by 25% to 75%. For the Altair drives, the same disk layout used by the original versions of Altair CP/M 1.4 and 2.2 is used. For the Tarbell controller, the standard IBM SSSD soft-sectored format is used. This BIOS provides full IOBYTE support to allow use of a variety of standard Altair I/O boards. See IOBYTE below. During cold boot, the BIOS looks for a Teletype on the console port and if detected (based on baud rate), subsequently follows any CR to the console device with a NULL to give the Teletype carriage time to reach the left margin. The send null flag (SNDNULL) is located immediately following the MODE and IOBYTE in memory so it can be over-ridden if needed. This BIOS adds a disk select timeout for the Altair 8" floppy so if a non-present or empty drive is select- ed, it will eventually timeout. To still allow the operator time to insert a disk, close the door, and wait for the drive enable one-shot to expire, the default timeout is set to seven seconds.
    [Show full text]
  • Flow Control and ARQ Media Access Physical
    Data Link Layer The Data Link layer can be further subdivided into: Computer Networks application 1. Logical Link Control (LLC): provides flow and error control transport • different link protocols may provide different services, e.g., Ethernet doesn’t provide reliable network delivery (error recovery) Lecture 26: 2. Media Access Control (MAC): framing and LLC MAC Flow Control and ARQ media access physical Link Layer Services Flow Control Flow Control: What is flow control? • pacing between adjacent sending and receiving nodes • receiver telling sender to slow down Error Control: Why do you need flow control? • errors caused by signal attenuation, noise • ARQ: receiver detects presence of errors and asks sender for retransmission Flow control protocols at data link layer (single hop): • FEC: receiver identifies and corrects bit error(s), • XON/XOFF without resorting to retransmission • Stop & Wait Protocol • Sliding Window Protocol Reliable delivery between adjacent nodes • seldom used on low bit error links (fiber, some twisted pair) Similar issues and mechanisms apply at the • plays an important role in wireless links with high error rates transport layer (end-to-end) • Q: why do we need both link-level and end-end reliability? XON/XOFF Stop and Wait (S&W) Protocol ! : propagation After sending a packet, sender must wait for delay SR acknowledgment (ACK) before sending the next packet sender receiver Sender Receiver S R round-trip Algorithm: time (rtt) t • S sends stream of data Time ! : propagation • R sends XOFF, S stops transmission pkt
    [Show full text]
  • Effect of Sliding Window Techniques Over a Performance of Tcp/Ip Networks
    EFFECT OF SLIDING WINDOW TECHNIQUES OVER A PERFORMANCE OF TCP/IP NETWORKS ABBAS ABEDI JANUARY, 2018 EFFECT OF SLIDING WINDOWS TECHNIQUES OVER A PERFORMANCE OF TCP/IP NETWORKS A THESIS SUBMITTED TO THE GRADUATE SCHOOL OF NATURAL AND APPLIED SCIENCES OF CANKAYA UNIVERSITY BY ABBAS ABEDI IN PARTIAL FULLFILLMENT OF a REQUIREMENTS FOR THE DEGREE OF MASTER OF SCIENCE IN THE DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING JANUARY, 2018 ABSTRACT EFFECT OF SLIDING WINDOWS TECHNIQUES OVER A PERFORMANCE OF TCP/IP NETWORKS ABEDI, Abbas M.Sc., Department of Electronics and Communication Engineering Supervisor: Asst. Prof. Dr. Barbaros PREVEZE January 2018 The communication channels have a variety of features in the communication system and networks, particularly wireless channels. It is used in transmissions between two nodes and deals with high error rates. Such errors that occur frequently which are not easy to be avoided, have the greatest effect on the performance of a network. So, it must be concluded that error rates are for different network conditions with use of different types of sliding windows techniques. In this thesis, error correcting techniques have been investigated based on a retransmission technique they used. One of the famous retransmission techniques is sliding windows technique, which it has three sub-algorithms called: stop and wait, selective repeat, and go back N. In this work, selective repeat and go back N algorithms were taken into account, but a stop and wait algorithm was not considered since it doesn’t use any window structure in their retransmissions. Also, it always has a high delay amount with less performance compared to the selective repeat and go back N techniques.
    [Show full text]
  • The Kermit File Transfer Protocol
    THE KERMIT FILE TRANSFER PROTOCOL Frank da Cruz February 1985 This is the original manuscript of the Digital Press book Kermit, A File Transfer Protocol, ISBN 0-932976-88-6, Copyright 1987, written in 1985 and in print from 1986 until 2001. This PDF file was produced by running the original Scribe markup-language source files through the Scribe publishing package, which still existed on an old Sun Solaris computer that was about to be shut off at the end of February 2016, and then converting the resulting PostScript version to PDF. Neither PostScript nor PDF existed in 1985, so this result is a near miracle, especially since the last time this book was "scribed" was on a DECSYSTEM-20 for a Xerox 9700 laser printer (one of the first). Some of the tables are messed up, some of the source code comes out in the wrong font; there's not much I can do about that. Also (unavoidably) the page numbering is different from the printed book and of couse the artwork is missing. Bear in mind Kermit protocol and software have seen over 30 years of progress and development since this book was written. All information herein regarding the Kermit Project, how to get Kermit software, or its license or status, etc, is no longer valid. The Kermit Project at Columbia University survived until 2011 but now it's gone and all Kermit software was converted to Open Source at that time. For current information, please visit the New Open Source Kermit Project website at http://www.kermitproject.org (as long as it lasts).
    [Show full text]
  • Download, Including1 17N REU, Ramlink Partition, Jimymon-64 (ML Monitor)
    C 0 T E T S ISSUE Published June 1996 COMMODORE WORLD 6 Wheels-Laying More Than A Patch THE NEWS MAGAZINE FOR COMMODORE 64 » 1'■ I 1J',[ K1. Bruce Thonuu 14 GOFA-A Modulap- Pcogpamming System Fob The Coeimodore 64 http://wviw.cmiweb.am/cwhtme.hlml George Flanagan General Manager Chinks ft Christiansen ♦ Editor Review; Doug Cot Ion ♦ 24 Software: Centipede 126 E>r Gaelwe R. Gasson Advegtisinq Sales A Look ai ihe Newesi Commodore I2S BBS Program Charles A. Christiansen (413) 525-0023 ♦ Graphic Acts Doug Cotton .UMN! '♦ 26 Jusr Fob Starters by Jason Compton Electronic Pre-Press & Pointing Maiuir/Holden Helpful Hints for Handling Disk Drives ♦ 30 Graphic Interpretation by Bruce Thomas Cover Design by Doug Cotton GEOS: For ti Good lime... 32 Carrier Detect by Gaelyne B. Gasson Tclecommunicationi News & Updates 36 S16 Beat by Mark Fellows Things to Look Out For When Program/Hint- the 65X16 Commodore1" and [he respective Commodore producl names are trademarks or registered trademarks of Commodore, a 38 Over The Edge by Jeffrey L. Jones division of Tulip Compulers. Commodore World is in no way aftiliated wilrtthe owner n! ".he Commodore logo ana technology. Commodore Programming in a SuperCPU World Commodore Worla (ISSN 1078-2515) is published 8 limos annually by Creative Micro Designs. Inc.. 15 Benton Drive, Easl Longrneadow MA 01028-0646. Secono-Class Postage Paid at EasL Longmeaflow MA. (USPS «)n-801| Annual subscnpiion rale is USS29.95 fci U.S. addresses. USS35.95(orC3nada0'Maiico.USSJS.95!orallECCounlnB5. Department paymanlsmusl be provided in U S. Dollars. Mail subscriptions 2 From the Editor to CW Subscriptions, do Crestiva Micro Designs.
    [Show full text]
  • Courier V.Everything External Modem: Getting Started
    Courier V.Everything External Modem: Getting Started FINAL 4/96 p/n 1.024.492 1996 U.S. Robotics Access Corp. 8100 North McCormick Blvd. Skokie, IL 60076-2999 All Rights Reserved U.S. Robotics and the U.S. Robotics logo are registered trademarks of U.S. Robotics Access Corp. V.Fast Class and V.FC are trademarks of Rockwell International. Any trademarks, tradenames, service marks or service names owned or registered by any other company and used in this manual are the property of their respective companies. 1996 U.S. Robotics Access Corp. 8100 N. McCormick Blvd. Skokie, IL 60076-2999 USA Table of Contents About This Manual iii We Welcome Your Suggestions.............................................................iii Chapter 1 The Courier 1-1 Courier Controls, Displays, and Connectors.....................................1-3 Status Indicators ....................................................................................1-4 Features...................................................................................................1-5 Chapter 2 Installing the Courier 2-1 What You Need......................................................................................2-1 Package Contents...................................................................................2-3 Installing the Courier ............................................................................2-4 Setting the DIP Switches.......................................................................2-4 Powering On the Courier .....................................................................2-6
    [Show full text]
  • Configuration Parameters
    Good news, everyone! User Documentation Version: 2020-01-01 M. Brutman ([email protected]) http://www.brutman.com/mTCP/ Table of Contents Introduction and Setup Introduction..............................................................................................................................................................8 What is mTCP?...................................................................................................................................................8 Features...............................................................................................................................................................8 Tested machines/environments...........................................................................................................................9 Licensing...........................................................................................................................................................10 Packaging..........................................................................................................................................................10 Binaries.....................................................................................................................................................................10 Documentation..........................................................................................................................................................11 Support and contact information.......................................................................................................................11
    [Show full text]
  • Imperial College of Science and Technology, University of London, Department of Computing
    Imperial College of Science and Technology, University of London, Department of Computing. HIGH EFFICIENCY, CHARACTER-ORIENTED, LOCAL AREA NETWORKS by Martin Cripps This thesis is submitted in partial fulfilment of the requirements for the degree of Doctor of Philosophy and the Diploma of Imperial College of Science and Technology, January 1988. For Clare Attempt the end His reasons are as two grains of wheat but never stand to doubt hid in two bushels of chaff. nothing's so hard You shall seek all day ere you find them but search and when you have found them will find it out they are not worth the search. Robert Herrick (1591-1674) William Shakespeare (1564-1616) 1 ABSTRACT This thesis explores the problem of interconnecting character-oriented devices over local area networks by investigating significant aspects of hardware, software, protocol and operational factors. It proposes effective and efficient solutions which were tested during a full-scale experiment The results of that experiment demonstrate convenient, cost-effective and reliable operation. The novelty of this investigation arises from its character-oriented approach. Much work has been carried out by others on local area networks which transfer blocks of data efficiently, however, a large majority of installed devices operate on a character-by-character basis and will continue so to do for some considerable time. This study is approached through analysis of the low efficiency of international standard networks for this class of device which defines the scope of this work. An original analysis of the potential mechanisms which can be used to give high efficiency and low delay for this class of transfer is then derived.
    [Show full text]