PARALLEL OPERATION in the CONTROL DATA 6600 James E

Total Page:16

File Type:pdf, Size:1020Kb

PARALLEL OPERATION in the CONTROL DATA 6600 James E PARALLEL OPERATION IN THE CONTROL DATA 6600 James E. Thornton Control Data Corporation Minneapolis, Minnesota HISTORY survived early difficulties to become the basis for a nice jump in circuit performance. About four years ago, in the summer of 1960, Control Data began a project which cul­ SYSTEM ORGANIZATION minated last month in the delivery of the first 6600 Computer. In 1960 it was apparent that The computing system envisioned in that brute force circuit performance and parallel project, and now called the 6600, paid special operation were the two main approaches to attention to two kinds of use, the very large any advanced computer. scientific problem and the time sharing of This paper presents some of the consid­ smaller problems. For the large problem, a erations having to do with the parallel opera­ high-speed floating point central processor with tions in the 6600. A most important and access to a large central memory was obvious. fortunate event coincided with the beginning Not so obvious, but important to the 6600 of the 6600 project. This was the appearance system idea, was the isolation of this central of the high-speed silicon transistor, which arithmetic from any peripheral activity. 4096 WORD 4096 WORD 4096 WORD 4096 WORD CORE MEMORY CORE MEMORY ~ ~ CORE MEMORY CORE MEMORY PERIPHERAL PERIPHERAL PERIPHERAL PERIPHERAL & CONTROL & CONTROL & CONTROL & CONTROL PROCESSOR PROCESSOR PROCESSOR PROCESSOR 6600 CENTRAL MEMORY 4096 WORD 4096 WORD CORE MEMORY CORE MEMORY PERIPHERAL 6600 CENTRAL PROCESSOR PERIPHERAL & CONTROL & CONTROL PROCESSOR PROCESSOR 6600 CENTRAL MEMORY 4096 WORD 4096 WORD 4096 WORD 4096 WORD ~ CORE MEMORY - CORE MEMORY +- CORE MEMORY CORE MEMORY PHERIPHERAl PERIPHERAL PERIPHERAL PERIPHERAL & CONTROL & CONTROl. & CONTROL & CONTROL PROCESSOR PROCESSOR PROCESSOR PROCESSOR Figure 1. Control Data 6600. 33 From the collection of the Computer History Museum (www.computerhistory.org) 34 PROCEEDINGS-SPRING JOINT COMPUTER CONFERENCE, 1964 It was from this general line of reasoning instruction formats to provide for direct, in­ that the idea Of a multiplicity of peripheral direct, and relative addressing. Instructions processors was formed (FIg. 1). Ten such provide logical, addition, subtraction, shift, and peripheral processors have access to the central conditional branching. Instructions also pro­ memory on one side and the peripheral channels vide single word or block transfers to and from on the other. The executive control of the any of twelve peripheral channels, and single system is always in one of these peripheral word or block transfers to and from central processors, with the others operating on as­ memory. Central memory words of 60 bits signed peripheral or control tasks. All ten length are assembled from five consecutive processors have access to twelve input-output peripheral words. Each processor has instruc­ channels and may "change hands," monitor tions to interrupt the central processor and to channel activity, and perform other related monitor the central program address. jobs. These processors have access to central To get this much processing power with memory, and may pursue independent transfers reasonable economy and space, a time-sharing to and from this memory. design was adopted (Fig. 2). This design Each of the ten peripheral processors contains a register "barrel" around which is contains its own memory for program and moving the dynamic information for all ten buffer areas, thereby isolating and protecting processors. Such things as program address, the more critical system control operations in accumulator contents, and other pieces of in­ the separate processors. The central processor formation totalling 52 bits are shifted around operates from the central memory with relocat­ the barrel. Each complete trip around requires ing register and file protection for each program one major cycle or one thousand nanoseconds. in central memory. A "slot" in the barrel contains adders, assembly networks, distribution network, and intercon­ PERIPHERAL AND CONTROL PROCESSORS nections to perform one step of any peripheral The peripheral and control processors instruction. The time, to perform this step or, are housed in one chassis of the main frame. in other words, the time through the slot, is Each processor contains 4096 memory words / one minor cycle o:!'" one hundred nanoseconds. of 12 bits length. There are 12- and 24-bit Each of the ten processors, therefore, is allowed PROCESSOR TIME-SHARED PROCESSOR REGISTERS INSTRUCTION MEMORIES CONTROL READ PYRAM 10 CENTRAL CENTRAL MEMORY MEMORY (60) (60) (12) REAL TIME 1/0 CHANNELS EXTERNAL EQUIPMENT Figure 2. 6600 Peripheral and Control Processors. From the collection of the Computer History Museum (www.computerhistory.org) PARALLEL OPERATION IN THE CONTROL DATA 6600 35 one minor cycle of every ten to perform one of five references to be "nested" in each network its steps. A peripheral instruction may require during any major cycle. The central memory one or more of these steps, depending on the is organized in independent banks with the abil­ kind of instruction. ity to transfer central words every minor cycle. In effect, the single arithmetic and the The peripheral processors, therefore, introduce single' distribution and assembly network are at most about 2 % interference at the central made to appear as ten. Only the memories are memory address control. kept truly independent. Incidentally, the A. single real time clock, continuously memory read-write cycle time is equal to one running, is available to all peripheral proces­ complete trip around the barrel, or one thousand sors. nanoseconds. Input-output channels are bi-directional, CENTRAL PROCESSOR 12-bit paths. One 12-bit word may move in one direction every major cycle, or 1000 nano­ The 6600 central processor may be con­ seconds, on each channel. Therefore, a maxi­ sidered the high-speed arithmetic unit of the mum burst rate of 120 million bits per second system (Fig. 3). Its program, operands, and is possible using all ten peripheral processors. results are held in the central memory. It has A sustained rate of about 50 million bits per no connection to the peripheral processors ex­ second can be maintained in a practical operat­ cept through memory and except for two single ing system. Each channel may service several controls. These are the exchange jump, which peripheral devices and may interface to other starts or interrupts the central processor from systems, such as satellite computers. a peripheral processor, and the central program Peripheral and control processors access address which can be monitored by a peripheral central memory through an assembly network processor. and a dis-assembly network. Since five periph­ A key description of the 6600 central eral memory references are required to make processor, as you will see in later discussion, is up one central memory word, a natural assem­ "parallel by function." This means that a num­ bly network of five levels is used. This allows ber of arithmetic functions may be performed PERIPHERAL AND CENTRAL PROCESSOR CONTROL PROCESSORS 24 OPERATING REGISTERS 12 INPUT OUTPUT CHANNELS Figure 3. Block Diagram of 6600. From the collection of the Computer History Museum (www.computerhistory.org) 36 PROCEEDINGS-SPRING JOINT COMPUTER CONFERENCE, 1964 concurrently. To this end, there are ten func­ As an example,· a 15-bit instruction may call tional units within the central processor. These for an ADD, designated by the f and m octal are the two increment units, floating add unit, digits, from registers designated by the j and k fixed add unit, shift unit, two multiply units, octal digits, the result going to the register divide unit, boolean unit, and branch unit. In designated by the i octal digit. In this example, a general way, each of these units is a three the addresses of the three-address, floating add address unit. As an example, the floating add unit are only three bits in length, each address unit obtains two 60-bit operands from the cen­ referring to one of the eight floating point regis­ tral registers and produces a 60-bit result which ters. The 30-bit format follows this same form is returned to a register. Information to and but substitutes for the k octal digit an 18-bit from these units is held in the central registers, constant K which serves as one of the input of which there are twenty-four. Eight of these operands. These two formats provide a highly are considered index registers, are of 18 bits efficient control of concurrent operations. length, and one of which always contains zero. As a background, consider the essential Eight are considered address registers, are of difference between a general purpose device and 18 bits length, and serve to address the five read a special device in which high speeds are re­ central memory trunks and the two store cen­ quired. The designer of the special device can tral memory trunks. Eight are considered float­ generally improve on the traditional general ing point registers, are of 60 bits length, and purpose device by introducing some form of are the only central registers to access central concurrency. For example, some activities of memory during a central prograrn. a housekeeping nature may be performed sepa­ In a sense, just as the whole central proc­ rate from the main sequence of operations in essor is hidden behind central memory from separate hardware. The to,tal time to complete the peripheral processors, so, too, the ten func­ a job is then optimized to the main sequence tional units are hidden behind the central regis­ and excludes the housekeeping. The two cate­ ters from central memory. As a consequence, gories operate concurrently. a considerable instruction efficiency is obtained It would be, of course, most attractive to and an interesting form of concurrency is feasi­ provide in a general purpose device some gen­ ble and practical. The fact that a small number eralized scheme to do the same kind of thing.
Recommended publications
  • Magnetic Peripherals Inc Storage Module Drive Vintage: C.1975 Synopsis: 14-Inch Cartridge Disk Drive
    AccessionIndex: TCD-SCSS-T.20121208.028 Accession Date: 8-Dec-2012 Accession By: Tom Kearney Object name: Magnetic Peripherals Inc Storage Module Drive Vintage: c.1975 Synopsis: 14-inch cartridge disk drive. S/N: 652128. Description: Magnetic Peripherals Inc (MPI), of Minneapolis, Minnesota , was a joint venture formed by Control Data Corporation (CDC) and Honeywell Bull in 1975. CDC contributed their disk drive facilities at Normandale and Omaha, USA. Honeywell contributed its ex-GE disk plant at Oklahoma City and CII-Honeywell Bull’s plant at Heppenheim, Germany. Its early products were IBM-3330-like third generation disk drives, superceded by IBM-3340/3350/3370-like drives, all with IBM interfaces or Storage Module Device (SMD) interfaces. It became a major player in the hard disk drive market. It was the world wide leader in 14-inch disk drive technology in the OEM marketplace in the 1970s and early 1980s, especially with its SMD and CMD (Cartridge Module Drive) interfaces, and with its 24-hour/7-days-a-week plant at Brynmawr in South Wales, which celebrated the production of 1 million disks and 3 million magnetic tapes in Oct-1979. MPI was renamed Imprimus in 1988 and was bought by Seagate in 1989. The drive in this collection looks almost identical to a CDC9762 80MB disk drive, introduced in 1974 by CDC, see Figures 21 and 22. However, the drive in this collection was made in Portugal by Magnetic Peripherals Inc, and from the rear can be seen to have a different interface, which looks very like an SMD interface.
    [Show full text]
  • Sperry Corporation, UNIVAC Division Photographs and Audiovisual Materials 1985.261
    Sperry Corporation, UNIVAC Division photographs and audiovisual materials 1985.261 This finding aid was produced using ArchivesSpace on September 14, 2021. Description is written in: English. Describing Archives: A Content Standard Audiovisual Collections PO Box 3630 Wilmington, Delaware 19807 [email protected] URL: http://www.hagley.org/library Sperry Corporation, UNIVAC Division photographs and audiovisual materials 1985.261 Table of Contents Summary Information .................................................................................................................................... 3 Historical Note ............................................................................................................................................... 4 Scope and Content ......................................................................................................................................... 5 Arrangement ................................................................................................................................................... 6 Administrative Information ............................................................................................................................ 6 Related Materials ........................................................................................................................................... 7 Controlled Access Headings .......................................................................................................................... 8 Bibliography
    [Show full text]
  • (U) NSA's Key Role in Major Developments in Computer Science
    .............. -· ,.. , __ .,,...... ___ , _.,.._ ~ __ ....:" -..... .. Doc ID: 6586785 _ __ I 5 SSRFI;';'?Et U 'f'; !! i; I llJ l!llft, I dL& (U) NSA's Key Role in Major Developments in Computer Science PART ONE (U) Cryptology has historically entailed an intensive application of labor. But since the middle of the last century, automation has been used as a way to greatly ease the making and breaking of codes. The formation and maturation of the National Security Agency (NSA) and the evolution of its missions paralleled in large part the advent of the computer age. A!J a consequence, the NSA and its predecessor agencies have historically been at the forefront of computer development in the United States. {U) But the use of computational machines in American cryptology long predated the official birth ofNSA. During World War I, the military incorporated use of encryption equipment. During the 1930s, both the Army and Navy cryptologic components acquired devices from International Business Machines {IBM), which allowed them to sort large amounts of data. By the time World War II had broken out, all of the major combatants possessed sophisticated cipher machines for most of their communications generation and security programs. {U) As the war progressed, the U.S. military services placed many electronic accounting machines into the field in order to process a wide array of enemy signals. The services developed relationships with industry -- Bell Laboratories and Teletype Corporation in the case of the Army, and IBM, Eastman Kodak, and National Cash Register (NCR) in the case of the Navy. A prime example of the benefits of such relationships was the construction of the Navy's cryptanalytic "Bombe," a machine built by NCR to decipher messages from the German ENIGMA machine.
    [Show full text]
  • Sperry Corporation, Univac Division Records 1825.I
    Sperry Corporation, Univac Division records 1825.I This finding aid was produced using ArchivesSpace on September 14, 2021. Description is written in: English. Describing Archives: A Content Standard Manuscripts and Archives PO Box 3630 Wilmington, Delaware 19807 [email protected] URL: http://www.hagley.org/library Sperry Corporation, Univac Division records 1825.I Table of Contents Summary Information .................................................................................................................................... 4 Historical Note ............................................................................................................................................... 4 Scope and Content ......................................................................................................................................... 5 Administrative Information ............................................................................................................................ 7 Related Materials ........................................................................................................................................... 8 Controlled Access Headings .......................................................................................................................... 9 Appendices ..................................................................................................................................................... 9 Bibliography ................................................................................................................................................
    [Show full text]
  • VHSIC and ETA10
    VHSIC and The First CMOS and Only Cryogenically Cooled Super Computer David Bondurant Former Honeywell Solid State Electronics Division VHSIC System Applications Manager ETA10 Supercomputer at MET Office - UK’s National Weather Forecasting Service Sources • “Very High Speed Integrated Circuits (VHSIC) Final Program Report 1980-1990, VHSIC Program Office”, Office of the Under Secretary of Defense for Acquisition, Deputy Director, Defense Research and Engineering for Research and Advanced Technology, September 30, 1990 • Carlson, Sullivan, Bach, and Resnick, “The ETA10 Liquid-Nitrogen-Cooled Supercomputer System”, IEEE Transactions on Electron Devices, Vol. 36, No. 8, August 1989. • Cummings and Chase, “High Density Packaging for Supercomputers” • Tony Vacca, “First Hand: The First CMOS And The Only Cryogenically Cooled Supercomputer”, ethw.org • Robert Peglar, “The ETA Era or How to (Mis-)Manage a Company According to Control Data Corp.”, April 17, 1990 Background • I graduated from Missouri S&T in May 1971 • My first job was at Control Data Corporation, the leading Supercomputer Company • I worked in Memory Development • CDC 7600 was in production, 8600 (Cray 1) was in development by Seymour Cray in Chippewa Falls, WI • Star 100 Vector Processor was in Development in Arden Hills • I was assigned to the development of the first DRAM Memory Module for a CDC Supercomputer • I designed the DRAM Module Tester Using ECL Logic Control Data Corporation Arden Hills • First DRAM Module was 4Kx32 using 128 1K DRAM Development Center - June 1971 Chips
    [Show full text]
  • TIME-SHARING CONTROL DATA® 3300/3500 Computer Systems
    TIME-SHARING CONTROL DATA® 3300/3500 Computer Systems Equipment Bulletin Pub. No. 60156000 © 1965, Control Data Corporation November, 1965 Printed in United States of America CONTENTS 1. Introduction Relocation 4-2 Page Structure 4-2 2. Modular Description Address Relocation 4-4 3. Software Systems Program Address and MASTER 3-1 Program Address Group 4-4 Real-Time SCOPE 3-1 ISR and OSR 4-4 MSIO 3-2 Page Index File 4-8 File Manager 3-3 Page Index 4-9 Disk SCOPE 3-3 Partial Page Adder 4-12 Relocated Address 4-13 4. Multiprogramming Concepts Page Zero Considerations 4-13 Executive Mode 4-1 Instructions 4-13 Monitor State 4-1 3300 and 3500 Instruction List 4-14 Program State 4-1 FIGURES 2-1 3300 Computer System Console 2-2 4-7 Example of Page Index Refer- encing 4-8 4-1 Address Relocation Process 4-3 4-8 Page Index Format 4-9 4-2 Word Addressing 4-4 4-9 Relocation Chassis Display Panel 4-9 4-3 Character Addressing 4-4 4-10 Storage Address Buses 4-10 4-4 Program Address Group 4-5 4-11 Page Length Subdivisions 4'-10 4-5 Page Index File Address and Hardware Structure 4-6 4-12 Quarter Page in Relation to PP Designator 4-11 4-6 Relocation System illustrating Memory Protection with Fully 4-13 Starting Quarters versus Relative Expanded Memory (262K) 4-7 Quarters 4-12 iii BUSINESS AND INDUSTRY: ... .•• ... · .• ·• •. ·• • SPACE ... ... .. •• .. ..• TIME -SHARI NG SYSTEMS •• FOR BUSINESS, SCIENTIFIC • .. & REAL -TIME APPLICATIONS ..•• .• 1.
    [Show full text]
  • Cray Supercomputers Past, Present, and Future
    Cray Supercomputers Past, Present, and Future Hewdy Pena Mercedes, Ryan Toukatly Advanced Comp. Arch. 0306-722 November 2011 Cray Companies z Cray Research, Inc. (CRI) 1972. Seymour Cray. z Cray Computer Corporation (CCC) 1989. Spin-off. Bankrupt in 1995. z Cray Research, Inc. bought by Silicon Graphics, Inc (SGI) in 1996. z Cray Inc. Formed when Tera Computer Company (pioneer in multi-threading technology) bought Cray Research, Inc. in 2000 from SGI. Seymour Cray z Joined Engineering Research Associates (ERA) in 1950 and helped create the ERA 1103 (1953), also known as UNIVAC 1103. z Joined the Control Data Corporation (CDC) in 1960 and collaborated in the design of the CDC 6600 and 7600. z Formed Cray Research Inc. in 1972 when CDC ran into financial difficulties. z First product was the Cray-1 supercomputer z Faster than all other computers at the time. z The first system was sold within a month for US$8.8 million. z Not the first system to use a vector processor but was the first to operate on data on a register instead of memory Vector Processor z CPU that implements an instruction set that operates on one- dimensional arrays of data called vectors. z Appeared in the 1970s, formed the basis of most supercomputers through the 80s and 90s. z In the 60s the Solomon project of Westinghouse wanted to increase math performance by using a large number of simple math co- processors under the control of a single master CPU. z The University of Illinois used the principle on the ILLIAC IV.
    [Show full text]
  • The CRAY- 1 Computer System
    We believe the key to the 10's longevity is its basically simple, clean structure with adequately large (one Mbyte) address space that allows users to get work done. In this way, it has evolved easily with use and with technology. An equally significant factor in Computer G. Bell, S. H. Fuller, and its success is a single operating system environment Systems D. Siewiorek, Editors enabling user program sharing among all machines. The machine has thus attracted users who have built significant languages and applications in a variety of The CRAY- 1 environments. These user-developers are thus the dominant system architects-implementors. Computer System In retrospect, the machine turned out to be larger Richard M. Russell and further from a minicomputer than we expected. Cray Research, Inc. As such it could easily have died or destroyed the tiny DEC organization that started it. We hope that this paper has provided insight into the interactions of its development. This paper describes the CRAY,1, discusses the evolution of its architecture, and gives an account of Acknowledgments. Dan Siewiorek deserves our some of the problems that were overcome during its greatest thanks for helping with a complete editing of manufacture. the text. The referees and editors have been especially The CRAY-1 is the only computer to have been helpful. The important program contributions by users built to date that satisfies ERDA's Class VI are too numerous for us to give by name but here are requirement (a computer capable of processing from most of them: APL, Basic, BLISS, DDT, LISP, Pascal, 20 to 60 million floating point operations per second) Simula, sos, TECO, and Tenex.
    [Show full text]
  • (Is!!I%Losalamos Scientific Laboratory
    LA-8689-MS Los Alamos Scientific Laboratory Computer Benchmark Performance 1979 Y I I i PERMANENT RETENTION i i I REQUIRED BY CONTRACT ~- i _...._. -.. .— - .. ———--J (IS!!I%LOS ALAMOS SCIENTIFIC LABORATORY Post Office Box 1663 Los Alamos. New Mexico 87545 An AffKmtitive Action/I!qual Opportunity Employer t- Editedby MargeryMcCormick GroupC-2 I)lSCLAIM1.R Thh rqwtl was prtpued as an ‘mount or work sponwrcd by m aguncy or !he UnllcdSIws Gown. mcnt. Nclthcr the Unltcd Stales Govw,lmcnt nor any agency thcr.wf, nor any of lheif cmpluyws, mtkci my warranty, cipre!> or Impllcd, or assumes any Iqd USIWY or rc$ponslbdlty for the Iccur. ncv, mmplclcness, or u~cfulnc$s of any information, appm’’luq product, or process disclosed, oc r+ re$enh thit Its use would not Infrlngc privntcly owned r~hts. Rcfcrcncc hercln 10 my $I!CCUSCcorn. mercltl product, PIOCC$S,or SCNICCby trtdc name, Imdcmtrk, manufaL!urer, or o!hmwisc, does not necenarily mmtitute or imply its cndorscmcnt, retommcndation, or favoring by lhc United Stttcs Government or any agency thereof. The views and opinions of authors expressed herein do not ncc. c:mrily ttmtc or reflect those of the Unltcd Statct Government 01 my s;ency thcceof. UNITED STATES DEPARTMENT OF ENERGY CONTRACT W-7405 -ENG. 36 LA-8689-MS UC-32 Issued: February 1981 Los Alamos Scientific Laboratory Computer Benchmark Performance 1979 Ann H. Hayes Ingrid Y. Bucher — ----- . J E- -“ ““- ”’”-” .- ------- r- ------ . ..- . .. — ,.. LOS ALAMOS SCIENTIFIC LABORATORY COMPUTER BENCHMARK PERFOWCE 1979 by Ann H. Hayes and Ingrid Y. Bucher ABSTRACT Benchmarking of computers for performance evalua- tion and procurement purposes is an ongoing activity of the Research and Applications Group (Group C-3) at the Los Alamos Scientific Laboratory (LASL).
    [Show full text]
  • Oral History Interview with Control Data Corporation Engineers (1975)
    Reminiscences of computer architecture and computer design at Control Data Corporation CBI OH 321 Interviewee: Toth, Dolan Interviewee: Steiner, Kent Interviewee: Specker, Wayne Interviewee: Rowan, Tom Interviewee: Resnick, Dave Interviewee: Pavlov, Mike Interviewee: Pagelkopf, Don Interviewee: Moe, Robert Interviewee: Lincoln, Neil R. Interviewee: Krueger, Larry Interviewee: Krohn, Howard Interviewee: Kort, Raymon Interviewee: Hutson, Maurice Interviewee: Hawley, Charles L. Interviewee: Grinna, Dennis Interviewee: Control Data Corporation Interviewee: Bhend, Bill Interviewee: Bergmanis, Maris Interviewee: Alexander, Curt Interviewer: Neil R. Lincoln Repository: Charles Babbage Institute, University of Minnesota, Minneapolis Description: Transcript, 210 pp. Abstract: Organized discussion moderated by Neil R. Lincoln with eighteen Control Data Corporation (CDC) engineers on computer architecture and design at CDC. Engineers include: Robert Moe, Wayne Specker, Dennis Grinna, Tom Rowan, Maurice Hutson, Curt Alexander, Don Pagelkopf, Maris Bergmanis, Dolan Toth, Chuck Hawley, Larry Krueger, Mike Pavlov, Dave Resnick, Howard Krohn, Bill Bhend, Kent Steiner, Raymon Kort, and Lincoln. Citation: Reminiscences of computer architecture and computer design at Control Data Corporation, OH 321. Oral history interview moderated by Neil R. Lincoln, May and September 1975. Charles Babbage Institute, University of Minnesota, Minneapolis. Copyright: Copyright to this oral history is held by the Charles Babbage Institute. Distribution in any format of the
    [Show full text]
  • Proceedings, ITC/USA
    Real-Time Storage for Modern Telemetry Processing Systems Item Type text; Proceedings Authors Hollstien, Dave Publisher International Foundation for Telemetering Journal International Telemetering Conference Proceedings Rights Copyright © International Foundation for Telemetering Download date 01/10/2021 14:49:06 Link to Item http://hdl.handle.net/10150/615728 Real-Time Storage for Modern Telemetry Processing Systems Dave Hollstien Loral Instrumentation San Diego California ABSTRACT With the ever increasing demands for higher data volumes and faster data rates, the real-time storage of data is consuming a vast majority of the conventional Telemetry system’s processing bandwidths. General purpose computers have traditionally shared the real-time functions of data storage and operator data and graphic displays. Although the power of the general purpose computer is increasing year-by-year, the telemetry data storage and display requirements are increasing at a far greater pace. Even the fastest host processors have proven incapable of keeping pace with these requirements. This paper will address an architectural approach to real-time storage that will relieve the host processor of this burden. Introduction Real-time telemetry data is often recorded to allow playback at either higher or lower than real-time rates. Recording the telemetry data also allows remote acquisition of the test data, preserves the test data in a repository, and provides a means of transferring data to a host processor for large and complex computations. Telemetry recording requires unique capabilities of both the storage device and the storage medium. Among these required capabilities are high fidelity, long term stability, standard data formats, and maximum storage bandwidth and storage capacity.
    [Show full text]
  • Univac and Control Data Operating Systems Risos
    A COMPARATIVE STUDY OF IBM. HONEYWELL. UNIVAC AND CONTROL DATA OPERATING SYSTEMS January i913 RISOS ltESEARCH IN SECURED OPERATING SYSTEMS University of California Lawrence LivermOre Labora.tory Livermore. Ca.lifornia . 94550 Sponsored by Advanced Research Projects Agency . , ARPA Order No. 2166 2 INTRODUCTION This study has a twofold purpose. The first is topr~sent a.n . overview of the large scale computers installed at 'DOD a.nd AECfa.cilities. Many of these computers are operated under various types of security requirem~nts and have operating system~ des~gned to resist unauthorized use or control. " The second pur~~se of this study is' to supply as many, facts as possible about the operating systems that predominate at DOD and AEC installations, with special reference to those aspects that particularly bear on operating system security. It can be seen from Table 1, a census of computers and their locations, that computers at DOD and AEC installations mainly come from four main sources: IBM, Univac, Control Data Corporation, and Honeywell Iftformation Systems. In Tables 2, 3, and 4 operating systems of these four manufacturers are broken down and listed so tha.t their cha.racteristics' can be canpa.red • .... Specifically, the,folloving four operating systems vl11 be looked at in detail: a. IBM's OS/MVT for the 360/370 series' b. Honeywell GCOS III c. "UNIVAC EXEC-8 d. .Control Data. Corporation' B SCOPE 3.4 In Table·2 the basic parameters of these operating systems such as word length, size, SYSGEN times, etc. are listed and, vhere applicable, their derivation is explained.
    [Show full text]