Link-Layer Protocol Lab the Kermit File Transfer Protocol

Total Page:16

File Type:pdf, Size:1020Kb

Link-Layer Protocol Lab the Kermit File Transfer Protocol Link-Layer Protocol Lab The Kermit File Transfer Protocol Name: ________________________________________ Date Experiment Performed: ______________________ Group Members: ______________________ ______________________ ______________________ Kermit/Link-Layer Lab – VER 1.2 January 2004 (1.2.0) 1 Introduction The study of the operation of Kermit, a simple character-oriented file-transfer protocol, in this laboratory will provide you with the opportunity to observe and understand several basic communication protocol fundamentals including error control, flow control, framing and data transparency. Understanding why they are important, how they operate, and how they impact protocol performance is an essential prerequisite for a complete understanding of more complex internetworking protocols. By studying Kermit file transfers, you will enhance your understanding of link-layer protocols and their role in reliable data transport. You should give careful consideration to the tradeoffs being made and to the effect that the environment and the application may have on the design and implementation of communication protocols. The first part of this laboratory will require you to: 1) transfer an ASCII-text file using Kermit, 2) monitor the transfer using the FELINE protocol analyzer, 3) decode the contents of several packets 4) analyze the exchange of packets. Your goal should be to understand what elements a protocol must have to accomplish reliable file transfers and achieve data transparency. In the second half of this lab, you will analyze the performance of Kermit by repeatedly transferring an ASCII-text file and a binary file. For each transfer, you will vary both the maximum size of the Kermit packets and the use of Kermit's sliding window extension. You will measure the transfer delays and observe how the data is packetized, encoded and transmitted. You will also observe a Kermit file transfer at extremely high serial-port rates, which will provide an opportunity to judge the Kermit protocol's ability to operate in a high speed environment. While performing the steps of this lab, you should consider why the Kermit protocol behaves in the manner you observe. In so doing, you will gain insight into the tradeoffs that protocol designers and users must make when they design and use communications protocols. Kermit/Link-Layer Lab – VER 1.2 January 2004 (1.2.0) 2 Overview of Kermit Block Diagram of a Kermit File Transfer Begin Send INIT Packet Get Receiver’s INIT Packet Send File Header Send Data Packet No File Done? Yes Send EOF Packet Yes More Files? No Send EOT Packet End Kermit/Link-Layer Lab – VER 1.2 January 2004 (1.2.0) 3 Kermit Packet Format Mark Char (LEN) Char (SEQ) Type Data Check NP Excess-32 Excess-32 Literal varies Excess-32 MARK SOH Identifies start of packet LEN The number of ASCII characters following this field within the packet, i.e. packet length minus two SEQ Packet sequence number, modulo-64 TYPE Packet type, for example: D Data Y Acknowledgment (ACK) S Send Initiate (Send-Init) R Receive Initiate F File Header Z End of File (EOF) B Break Transmission (EOT) A File Attributes DATA Content varies by packet type: D packet contains file contents F packet contains name of file S packet contains parameter values CHK Checksum can be 1, 2, or 3 characters Kermit/Link-Layer Lab – VER 1.2 January 2004 (1.2.0) 4 Data-Link Encoding To achieve data transparency, Kermit transmits only printable ASCII characters, except the SOH. Three techniques are used to convert control characters into printable ASCII depending upon where the character is located in the packet. Control Fields: Characterization Data Fields: “Controlified” Prefix Encoding High-Order Bit: HOB Prefix Encoding Control Characters in Control Fields Control characters are promoted to printable form prior to transmission, and demoted at the receiver using the following functions: At the sender: char(x) = x + 20h At the receiver: unchar(x) = x - 20h Example: 1. Packet sequence number 0 (zero). 2. SEQ = 0 is not printable, it must be promoted. 3. char(0h) = 20h which is the SP character. 4. A space (SP) is transmitted in the SEQ field. 5. At the receiver unchar(20h) yields 0 (zero) Kermit/Link-Layer Lab – VER 1.2 January 2004 (1.2.0) 5 Control Character Encoding in Data Fields char(x) limits the values to the range 0 - 94. Anything above 94 will promote to a non- printable character. Kermit cannot limit the range of values within the data field as it can with control fields. The solution: Convert the control character to printable form by flipping the 7th bit (XOR with 40h), and prefix this converted character with a special character, typically “# ”. At the sender: ctl(x) = x XOR 40h At the receiver: ctl(ctl(x)) = x Example: 1. Sender wants to send ctrl-A : 0000 0001 2. ctl(ctrl-A) yields “A”: 0100 0001 3. Transmit #A 4. Receiver drops the # and 5. ctl(A) yields ctrl-A again: 0000 0001 Example: The following is a sample Kermit packet. ^AE&D of#M#Jconstructing a theory conta5 Kermit/Link-Layer Lab – VER 1.2 January 2004 (1.2.0) 6 High-Order Bit Encoding For Sending Binary Files Many asynchronous communications channels do not provide an 8-bit wide path for data. With binary files data often contains bytes with the high-order bit (8th) set. To accommodate 8-bit transfer on 7-bit channels Kermit uses a prefix encoding technique as follows: At the sender: If the 8th bit is set, send the prefix character, typically &, followed by the 7-bit printable character. At the receiver: If you detect the prefix character, drop it and set the 8th bit high on the next character. Parameter Initialization Send-Init Packet Prior to transferring any files, two peer Kermits must negotiate several parameters which govern both ends for the duration of a file transfer session. Kermit does this by exchanging Send-Init packets at the start of each session. The session initiator requests values for parameters including: Maximum packet length Send time-out End-of-packet delimiter Prefix encoding character HOB prefix encoding character Type of checksum Window size ... and more The receiver responds with the values it is willing to accept. Kermit/Link-Layer Lab – VER 1.2 January 2004 (1.2.0) 7 Parameter Initialization Send-Init Packet Format MAXL TIME NPAD PADC EOL QCTL QBIN CHKT REPT CAPA… RSV The data field of the ‘S' packet contains parameters as illustrated above: Each parameter is encoded using one printable ASCII character. The encoding used varies per parameter and is described below: 1. MAXL Maximum packet length characterized 2. TIME Receive time-out characterized 3. NPAD Number of padding characters characterized 4. PADC Control character for padding controlified 5. EOL End of packet delimiter characterized 6. QCTL Prefix encoding character literal 7. QBIN High-order prefix encoding literal, ‘Y', or ‘N' 8. CHKT Type of checksum used ‘1','2' or ‘3' 9. REPT Repeat count prefix character literal Extensions to Kermit have allowed for sliding windows, large packets and the use of an optional attributes packet to exchange additional information about files. The CAPA field consists of a bit mask that indicates which of these advanced features the sender is willing to use. Setting a bit in the appropriate position indicates a willingness to use a feature, and determines the processing of the final three fields. 10. CAPA Advanced capability field (for options like sliding window) 11. WINDOW Indicates window size if window bit is set in CAPA 12. MAXL1 Used in conjunction with MAXL2 to determine the max 13. MAXL2 packet length if bits are set CAPA. Kermit/Link-Layer Lab – VER 1.2 January 2004 (1.2.0) 8 Equipment and Setup Two Kermit setups will be available for you to use. You may work in groups of no more than two persons. A sign-up sheet for the lab equipment will be posted outside the lab. Estimated Time: One to Two Hours. Table 1 is a list of the equipment required for this lab. The equipment should be pre-configured for you before coming to the lab. Consult with the on-duty TA if you have any difficulty identifying or operating the correct equipment. Table 1: Hardware and Software required for the Kermit/Link-Layer lab. Qty Equipment Description Setting up Kermit, Feline, and PCs running Windows XP, as detailed the ParaScope MP Pod: below: 1 PC serving as a Kermit server. The outer PCs are configured with 3 Kermit software to transfer files over the serial 1 PC serving as a Kermit client. cable, and the center PC is configured with the 1 PC serving as the FELINE FELINE WinXL software and the ParaScope Protocol Analyzer. Pod to monitor and examine the transfer. A 2 Kermit v3.16 Software for MS-DOS standard serial cable is connected between the 9-pin RS-232 port on one of the Kermit PCs and 1 FELINE/ParaScope MP Pod one of the 25-pin RS-232 ports on the FELINE WinXL Protocol Analysis ParaScope Pod. A standard serial cable is then 1 Software. connected from the other 25-pin RS-232 port on Files to be Transferred using Kermit: the ParaScope Pod and the 9-pin RS-232 port on the other Kermit PC. The PCMCIA Adaptor DECODE.TXT, an ascii-text file attached to the ParaScope pod is connected to used to decode packets. the FELINE PC's card reader. Check to make 3 ASCII.TXT, an ascii-text file used to sure that the AC-adapter is plugged into the test performance. ParaScope Pod and into the 110-volt AC outlet. BINARY.EXE, a binary-executable Finally, check that the power switch on the file used to test performance.
Recommended publications
  • Macwise Version 19 User's Manual
    [email protected] www.CarnationSoftware.com www.MacWise.com MacWise Version 19 User's Manual You can use Command F to find what you are looking for in this document. Introduction Terminal Emulation MacWise emulates ADDS Viewpoint, Wyse 50, Wyse 60, Wyse 370, Televideo TV 925, DEC VT100, VT220 and Prism terminals. Supports ANSI color. Esprit III color is also supported in Wyse 370 mode. MacWise allows a Macintosh to be used as a terminal -- connected to a host computer directly, by modem, or over the Internet. The emulators support video attributes such as dim, reverse, underline, 132-column modes, protected fields and graphic characters sent from the host computer, as well as enhanced Viewpoint mode. Features include phone list and dialer for modems, on-screen programmable function keys, connection scripts and more. Connectivity 1. Built in Modem 2. Telnet / TCP/IP 3. SSH Secure Shell 4. Serial ports via USB to Serial adaptor . 5. Also communicates directly with the Mac unix shell Telnet Telnet settings are under the Connection Menu. Select "Telnet" to enable telnet. Select "Telnet Connection..." to enter your Host IP address, port number and terminal type. =============================== KERMIT ================================ NOTE: If you are running Mac OS 10.13 or later, you need to also use Kermit. (There should be a check mark on "Kermit" under the Connection Menu.) Kermit is installed automatically when Mac OS 10.13 or later is detected. You can re-install kermit any time by selecting Kermit Installer from the Help Menu in MacWise. Echo Kermit Characters ( under the Connection Menu ) This is normally enabled when Kermit is enabled.
    [Show full text]
  • A Kermit File Transfer Protocol for the Apple II Series Personal Computers : John Patrick Francisco Lehigh University
    Lehigh University Lehigh Preserve Theses and Dissertations 1986 A Kermit file transfer protocol for the Apple II series personal computers : John Patrick Francisco Lehigh University Follow this and additional works at: https://preserve.lehigh.edu/etd Part of the Electrical and Computer Engineering Commons Recommended Citation Francisco, John Patrick, "A Kermit file transfer protocol for the Apple II series personal computers :" (1986). Theses and Dissertations. 4628. https://preserve.lehigh.edu/etd/4628 This Thesis is brought to you for free and open access by Lehigh Preserve. It has been accepted for inclusion in Theses and Dissertations by an authorized administrator of Lehigh Preserve. For more information, please contact [email protected]. A KERMIT FILE TRANSFER PROTOCOL FOR THE APPLE II SERIES PERSONAL COMPUTERS (Using the Apple Pascal Operating system) by John Patrick Francisco A Thesis Presented to the Graduate Committee of Lehigh University in Candidacy for the Degree of Master of Science 1n• Computer Science Lehigh University March 1986 This thesis is accepted and approved in partial fulfillment of the requirements for the degree of Master of science.• (date) Professor in Charge -------------- --------------- Chairman of the Division Chairman of the Department • • -11- ACKNOWLEDGEMENTS It would be somewhat of an understatement to say this project was broad in scope as the disciplines involved ranged from Phychology to Electrical Engineering. Since the project required an extensive amount of detailed in­ formation in all fields, I was impelled to seek the help, advice and opinion of many. There were also numerous t friends and relatives upon whom I relied for both moral and financial support.
    [Show full text]
  • Altair CP/M 2.2AT Ver 1.1 IOBYTE Implementation
    Altair CP/M 2.2AT Ver 1.1 CP/M 2.2AT supports an Altair 8800 computer with both an Altair and Tarbell floppy controller installed. Drives A & B are Altair drives 0 & 1. Drives C & D are Tarbell drives 0 & 1. The boot drive is always Altair drive 0. The Altair controller can be either the 8" or the 5.25" (mini-disk) controller as selected by conditional assembly. The BIOS uses track buffering to improve disk performance. Compared to a non-buffered BIOS, perfor- mance of program with substantial disk I/O improves by 25% to 75%. For the Altair drives, the same disk layout used by the original versions of Altair CP/M 1.4 and 2.2 is used. For the Tarbell controller, the standard IBM SSSD soft-sectored format is used. This BIOS provides full IOBYTE support to allow use of a variety of standard Altair I/O boards. See IOBYTE below. During cold boot, the BIOS looks for a Teletype on the console port and if detected (based on baud rate), subsequently follows any CR to the console device with a NULL to give the Teletype carriage time to reach the left margin. The send null flag (SNDNULL) is located immediately following the MODE and IOBYTE in memory so it can be over-ridden if needed. This BIOS adds a disk select timeout for the Altair 8" floppy so if a non-present or empty drive is select- ed, it will eventually timeout. To still allow the operator time to insert a disk, close the door, and wait for the drive enable one-shot to expire, the default timeout is set to seven seconds.
    [Show full text]
  • The Kermit File Transfer Protocol
    THE KERMIT FILE TRANSFER PROTOCOL Frank da Cruz February 1985 This is the original manuscript of the Digital Press book Kermit, A File Transfer Protocol, ISBN 0-932976-88-6, Copyright 1987, written in 1985 and in print from 1986 until 2001. This PDF file was produced by running the original Scribe markup-language source files through the Scribe publishing package, which still existed on an old Sun Solaris computer that was about to be shut off at the end of February 2016, and then converting the resulting PostScript version to PDF. Neither PostScript nor PDF existed in 1985, so this result is a near miracle, especially since the last time this book was "scribed" was on a DECSYSTEM-20 for a Xerox 9700 laser printer (one of the first). Some of the tables are messed up, some of the source code comes out in the wrong font; there's not much I can do about that. Also (unavoidably) the page numbering is different from the printed book and of couse the artwork is missing. Bear in mind Kermit protocol and software have seen over 30 years of progress and development since this book was written. All information herein regarding the Kermit Project, how to get Kermit software, or its license or status, etc, is no longer valid. The Kermit Project at Columbia University survived until 2011 but now it's gone and all Kermit software was converted to Open Source at that time. For current information, please visit the New Open Source Kermit Project website at http://www.kermitproject.org (as long as it lasts).
    [Show full text]
  • March-April 1992 23 Lsi
    HE NSIDE TORIES Breaking the rules Teamwork, including a "Vulcan mind-meld," produced amazing results on a new family of HP computers. Passing the test Ned Barnholt, vice president and general manager of the Test and Measurement Organization, talks about the unfolding T&M revolution, page 6 Three parts, one whole 11 Chinese people in Hong Kong, Taipei and Bejing talk openly about a day when they'll be part of one vast, reunited country. Ifyou print them, they will come 14 We asked for your photos and (whew!) did you send them-more than 100 in all. Some of the best are included in this photo feature. Play it again, Len 18 HP Labs' Len Cutler gave up a promising musical career to be<.:ome the father ofthe world-famous HP atomic clock. Your Turn 21 page 22 It's another world 22 What has 75 countries, 60 currencies and is one of the most volatile parts of the world? HP's International Sales Branch. Letter from John Young 26 , .~ . .... ~ . ~ ExtraMeasure 28 ,. M.~.- .. r··'. m~ MEASURE ; lS ~ .' \\; . :'! Editor: Associa1e edilOfs: Graphic designer: Circulation: ., ." ... ., \. .' • Jay Coleman' Cornelio Bayley Thorncs J Brown Tricia Neal Chan On the cover: Jianhua Qi,- a BeHy Gerord' personnel rep In China Hewlett­ Packard's Beijing office, captures Measure is published six times a year for employees and associates of Hewlett-Packard Company. 11 is produced the beauty and majesty of the by Caporate Communications. Employee Communicalions Depanment. Mary Anne Easley. rncnager. Address Chinese Opera in Beijing with this correspondence 10 Measure. Hewlett-Packard Company, 2OBR.
    [Show full text]
  • Imperial College of Science and Technology, University of London, Department of Computing
    Imperial College of Science and Technology, University of London, Department of Computing. HIGH EFFICIENCY, CHARACTER-ORIENTED, LOCAL AREA NETWORKS by Martin Cripps This thesis is submitted in partial fulfilment of the requirements for the degree of Doctor of Philosophy and the Diploma of Imperial College of Science and Technology, January 1988. For Clare Attempt the end His reasons are as two grains of wheat but never stand to doubt hid in two bushels of chaff. nothing's so hard You shall seek all day ere you find them but search and when you have found them will find it out they are not worth the search. Robert Herrick (1591-1674) William Shakespeare (1564-1616) 1 ABSTRACT This thesis explores the problem of interconnecting character-oriented devices over local area networks by investigating significant aspects of hardware, software, protocol and operational factors. It proposes effective and efficient solutions which were tested during a full-scale experiment The results of that experiment demonstrate convenient, cost-effective and reliable operation. The novelty of this investigation arises from its character-oriented approach. Much work has been carried out by others on local area networks which transfer blocks of data efficiently, however, a large majority of installed devices operate on a character-by-character basis and will continue so to do for some considerable time. This study is approached through analysis of the low efficiency of international standard networks for this class of device which defines the scope of this work. An original analysis of the potential mechanisms which can be used to give high efficiency and low delay for this class of transfer is then derived.
    [Show full text]
  • Serial-HOWTO.Pdf
    Serial HOWTO Serial HOWTO Table of Contents Serial HOWTO...................................................................................................................................................1 David S.Lawyer [email protected] original by Greg Hankins.....................................................................1 1. Introduction..........................................................................................................................................1 2. Quick Help...........................................................................................................................................1 3. How the Hardware Transfers Bytes.....................................................................................................1 4. Serial Port Basics.................................................................................................................................1 5. Multiport Serial Boards/Cards/Adapters..............................................................................................2 6. Servers for Serial Ports........................................................................................................................2 7. Configuring Overview.........................................................................................................................2 8. Locating the Serial Port: IO address, IRQs..........................................................................................2 9. Configuring the Serial Driver (high-level) "stty"................................................................................2
    [Show full text]
  • The Computer History Simulation Project
    The Computer History Simulation Project The Computer History Simulation Project The Computer History Simulation Project is a loose Internet-based collective of people interested in restoring historically significant computer hardware and software systems by simulation. The goal of the project is to create highly portable system simulators and to publish them as freeware on the Internet, with freely available copies of significant or representative software. Simulators SIMH is a highly portable, multi-system simulator. ● Download the latest sources for SIMH (V3.5-1 updated 15-Oct-2005 - see change log). ● Download a zip file containing Windows executables for all the SIMH simulators. The VAX and PDP-11 are compiled without Ethernet support. Versions with Ethernet support are available here. If you download the executables, you should download the source archive as well, as it contains the documentation and other supporting files. ● If your host system is Alpha/VMS, and you want Ethernet support, you need to download the VMS Pcap library and execlet here. SIMH implements simulators for: ● Data General Nova, Eclipse ● Digital Equipment Corporation PDP-1, PDP-4, PDP-7, PDP-8, PDP-9, PDP-10, PDP-11, PDP- 15, VAX ● GRI Corporation GRI-909 ● IBM 1401, 1620, 1130, System 3 ● Interdata (Perkin-Elmer) 16b and 32b systems ● Hewlett-Packard 2116, 2100, 21MX ● Honeywell H316/H516 ● MITS Altair 8800, with both 8080 and Z80 ● Royal-Mcbee LGP-30, LGP-21 ● Scientific Data Systems SDS 940 Also available is a collection of tools for manipulating simulator file formats and for cross- assembling code for the PDP-1, PDP-7, PDP-8, and PDP-11.
    [Show full text]
  • Data Entry, Transfer and Conversion for Husky Hunter Field Computer, MS-DOS PC and PR0-350
    DATA ENTRY, TRANSFER_AND CONVERSION FOR HUSKY HUNTER FIELD COMPUTER, MS-DOS PC AND PR0-350 W S McDonald and D J Giltrap Laboratory Report SS14 Scientific Services Section NZ Soil Bureau, DSIR LOWER HUTT August 1987 ISSN 0112-7241 NZ Soil Bureau Laboratory Report SS14 Department of Scientific and Industrial Research, New Zealand, 1987 NZ Soil Bureau Laboratory Reports are produced as a means of making available information of restricted interest or provisional in nature. They are not subject to scientific refereeing or editorial scrutiny, and should not be regarded as formal publications of the New Zealand Soil Bureau. Information in this report should not be cited without permission from the Director, New Zealand Soil Bureau, DSIR, Private Bag, Lower Hutt. Contents 1;. Introduction 5 2. Husky Hunter Field Computer 5 Husky hardware 5 Operating system and system software 6 3. SPG1 data entry for Husky Hunter and MS-DOS PC 6 Program features 7 4. Data entry for PR0-350 8 5. Transferring standard 'text' files using KERMIT 8 Husky/MS-DOS PC/PR0-350 to VAX 8 Husky to MS-DOS/PR0-350 9 6. PR0-350 Datatrieve SPG1 files to VAX using KERMIT-11 9 Conversion of PRO Datatrieve files 9 Transferring converted PRO-DTR files 9 7. Data Conversion to SPG1 format on the VAX 10 Standard 'text' files from Husky/MS-DOS PC 10 8. Writing transferred data into a Database 11 Husky/ MS-DOS derived data 11 PR0-350 derived data files 11 9. Appendix - ENTER.BAS Source program 12 10. Appendix 2 - Input file for ENTER.BAS 16 .
    [Show full text]
  • Kermit File Transfer Protocol Pick
    Kermit File Transfer Protocol Quintus accredit her desensitizations copiously, squally and momentous. Nonverbal Owen always objurgated his slue if Urbain is khaki or foreseen snakily. Murdock is infinitely woven after eutherian Lawson scroll his heirlooms pugilistically. Subscribe to exchange a kermit transfer with the host running kermit runs in addition to subscribe to just clipped your reviewing publisher Batch transfer a kermit file transfer and the files to succeed under which took too late now; data that the subject field is the communications and management. Application and works with a file transfer with unix is available as many types of a variety of. Names and kermit file transfer the grease, the maximum number of files from server using the host. Way to terminate the following sections and file transfers to subscribe to be a plain file. Processing power of file transfer capabilities to header file sending and software programs? Variables from server and kermit transfer protocol and port does not much ram for more complex program be disabled, and more information for more details for user with zmodem. Full functionality and kermit protocol and software and runs completely in use it can be disabled public domain that was devastated to a directory. Check whether to obtain kermit protocol between pcs and paste this information for xmodem to draw an illustration of convenience. education policy in sri lanka light Intact for that help provide the file transfer files from server upon accepting cookies on revenue from the zmodem. Causes the kermit file transfer dialog box to select ok if the user or existing list with a window as a new or client.
    [Show full text]
  • Altair CP/M 2.2B Ver 2.3
    Altair CP/M 2.2b ver 2.3 Two versions of CP/M 2.2 were available for the Altair 8800 back in the early 1980’s – a version released by the Burcon computer store out of Houston, Texas, and a version from Lifeboat Associates. The Burcon version appears to be Lifeboat CP/M 1.4 with the minimal set of patches required to make the BIOS work with CP/M 2.2. The Lifeboat CP/M 2.2 version is a full featured release typical of Lifeboat CP/M distri- butions. CP/M 2.2b is a modern release of CP/M 2.2 that uses track buffering to provide substantial speed im- provement versus the Burcon and Lifeboat releases, and also adds a few additional features: 1) Compared to original CP/M, version 2.2b loads CP/M programs in less than half the time. Any pro- gram with substantial disk I/O will run 20%-75% faster. No changes were made to the sector skew used with Burcon and Lifeboat CP/M disks, so version 2.2b can interchangeably read and write Burcon and Lifeboat disks. 2) Version 2.2b provides a full implementation of CP/M’s IOBYTE feature which allows redirection of logical CP/M devices to a variety of physical devices. This allows use of ports in addition to just the first 2SIO port and allows programs like Kermit, which requires IOBYTE, to run properly. 3) To better support a Teletype as the console, version 2.2b automatically transmits a null after C/R when it detects a Teletype as the console during cold boot.
    [Show full text]
  • Don Maslin CP/M Collection
    http://oac.cdlib.org/findaid/ark:/13030/c8ws90bd No online items Guide to the Don Maslin CP/M collection Finding aid prepared by Rita Wang and Sydney Gulbronson Olson, 2017. Elena Colón-Marrero, and Pennington Ahlstrand, 2020. Processing of this collection was made possible through generous funding from the National Archives' National Historical Publications & Records Commission: Access to Historical Records grant. Computer History Museum 1401 N. Shoreline Blvd. Mountain View, CA, 94043 (650) 810-1010 [email protected] August 2020 Guide to the Don Maslin CP/M X6817.2013 1 collection Title: Don Maslin CP/M collection Identifier/Call Number: X6817.2013 Contributing Institution: Computer History Museum Language of Material: English Physical Description: 29.5 Linear feet,19 record carts, 6 software boxes, and 1 periodical box Date (bulk): Bulk, 1977-1984 Date (inclusive): 1973-1996 Abstract: The Don Maslin CP/M collection consists of software and published documentation ranging from 1973 to 1996, with the bulk being from 1977 to 1984. About half of the collection consists of software in floppy disk and cassette formats. Most of this portion of the collection pertains to CP/M and applications that were written for the CP/M operating system. The other half of the collection contains text documentation such as reference manuals and user guides for a variety of software and hardware. A significant portion of the text is related to hardware, some of which was donated with this collection and is cataloged separately. Notable companies in this collection include Advanced Computer Design, Advanced Digital Corporation, Epson, Hewlett-Packard, IBM, MicroPro, and Tektronix.
    [Show full text]