RSTS/E Documentation Directory
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
BASIC-PLUS-2 User's Guide
BASIC-PLUS-2 User's Guide Order Number : AA-JP35B-TK May 1991 This manual provides tutorial information on BASIC-PLUS-2 language features . It also contains information on advanced program development techniques . Revision/Update Information : This manual is a revision . Operating System and Version : RSX-11M Version 4 .6 or higher RSX-11M-PLUS Version 4 .3 or higher Micro/RSX Version 4 .3 or higher RSTS/E Version 9.7 or higher Software Version : BASIC-PLUS-2 Version 2 .7 Digital Equipment Corporation Maynard, Massachusetts The information in this document is subject to change without notice and should not be construed as a commitment by Digital Equipment Corporation . Digital Equipment Corporation assumes no responsibility for any errors that may appear in this document . The software described in this document is furnished under a license and may be used or copied only in accordance with the terms of such license. No responsibility is assumed for the use or reliability of software on equipment that is not supplied by Digital Equipment Corporation or its affiliated companies . Restricted Rights : Use, duplication, or disclosure by the U .S. Government is subject to restrictions as set forth in subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252 .227-7013 . © Digital Equipment Corporation 1987, 1991 . All Rights Reserved . Printed in U .S.A. The postpaid Reader's Comments forms at the end of this document request your critical evaluation to assist in preparing future documentation . The following are trademarks of Digital Equipment Corporation : BASIC-PLUS, BASIC-PLUS-2, DEC, DECnet, DECUS, Digital, DOCUMENT, Micro/RSX, PDP, PDP-11, RMS, RMS-11, RSTS, RSTS/E, RSX, RSX-11M, RSX-11M-PLUS, RX50, TK50, UNIBUS, VAX, VAXcluster, VAXinfo, VMS, and the Digital logo . -
Br-Asi01 Br-Asx01
BR-ASI01 BR-ASX01 Data Comm for Business, Inc. 807 Pioneer Street Champaign, IL 61820 217-352-3207 Rev. Date: October 17, 1996 This manual applies to both the “I” and “X” router models. The “I” model (BR-ASI01) is single protocol TCP/IP only. The “X” model (BR-ASX01) is a multi-protocol router that routes TCP/IP, IPX, DECnet, and Appletalk. When using this manual with “I” model router, ignore the manual sections pertaining to protocols other than TCP/IP. CHAPTER 1 - INTRODUCTION 7 ABOUT THE BR ROUTER 7 Getting Started 7 Hardware Installation 7 RouterView Software Installation 8 Command Line Preparation 8 Quickstart Configuration 8 Appendices and Index 8 CHAPTER 2 - GETTING STARTED 9 A FEW NOTES 9 Please Read The Manuals 9 Warranty and Service 9 Getting Help With the BR Router 9 WHAT YOU WILL NEED TO GET STARTED 9 Supplied with the BR Router 9 Needed For Installation 10 Ethernet Connection Requirements 10 Thick Ethernet 10 Thin Ethernet 10 10Base-T Twisted-Pair Ethernet 10 Telco Line Connection Requirements 11 RS-232 Port 11 CHAPTER 3 - HARDWARE INSTALLATION 13 Mounting the Router 13 Connecting the Router to the Ethernet 14 Connecting to Thick Ethernet 14 Connecting to Thin Ethernet 14 Connecting to Twisted-Pair Ethernet 14 Connecting a Line Device to the BR Router 14 Connecting Devices to the RS-232C Port 15 Connecting an Out-of-Band Management Console 15 Powering Up the Router 15 CHAPTER 4 - ROUTERVIEW SOFTWARE INSTALLATION 17 RouterView for Windows 17 System Requirements 17 Installing and Running RouterView for Windows 17 RouterView -
Getting Started Computing at the Al Lab by Christopher C. Stacy Abstract
MASSACHUSETTS INSTITUTE OF TECHNOLOGY ARTIFICIAL INTELLI..IGENCE LABORATORY WORKING PAPER 235 7 September 1982 Getting Started Computing at the Al Lab by Christopher C. Stacy Abstract This document describes the computing facilities at the M.I.T. Artificial Intelligence Laboratory, and explains how to get started using them. It is intended as an orientation document for newcomers to the lab, and will be updated by the author from time to time. A.I. Laboratory Working Papers are produced for internal circulation. and may contain information that is, for example, too preliminary or too detailed for formal publication. It is not intended that they should be considered papers to which reference can be made in the literature. a MASACHUSETS INSTITUTE OF TECHNOLOGY 1982 Getting Started Table of Contents Page i Table of Contents 1. Introduction 1 1.1. Lisp Machines 2 1.2. Timesharing 3 1.3. Other Computers 3 1.3.1. Field Engineering 3 1.3.2. Vision and Robotics 3 1.3.3. Music 4 1,3.4. Altos 4 1.4. Output Peripherals 4 1.5. Other Machines 5 1.6. Terminals 5 2. Networks 7 2.1. The ARPAnet 7 2.2. The Chaosnet 7 2.3. Services 8 2.3.1. TELNET/SUPDUP 8 2.3.2. FTP 8 2.4. Mail 9 2.4.1. Processing Mail 9 2.4.2. Ettiquette 9 2.5. Mailing Lists 10 2.5.1. BBoards 11 2.6. Finger/Inquire 11 2.7. TIPs and TACs 12 2.7.1. ARPAnet TAC 12 2.7.2. Chaosnet TIP 13 3. -
Openvms: an Introduction
The Operating System Handbook or, Fake Your Way Through Minis and Mainframes by Bob DuCharme VMS Table of Contents Chapter 7 OpenVMS: An Introduction.............................................................................. 7.1 History..........................................................................................................................2 7.1.1 Today........................................................................................................................3 7.1.1.1 Popular VMS Software..........................................................................................4 7.1.2 VMS, DCL................................................................................................................4 Chapter 8 Getting Started with OpenVMS........................................................................ 8.1 Starting Up...................................................................................................................7 8.1.1 Finishing Your VMS Session...................................................................................7 8.1.1.1 Reconnecting..........................................................................................................7 8.1.2 Entering Commands..................................................................................................8 8.1.2.1 Retrieving Previous Commands............................................................................9 8.1.2.2 Aborting Screen Output.........................................................................................9 -
Networking Standards Mark Davies, Digital Equipment Corporation
N92-12499 Networking Standards Mark Davies, Digital Equipment Corporation ABSTRACT The enterprise network is currently a multivendor environment consisting of many defacto and proprietary standards. During the 1990s, these networks will evolve towards networks which are based on international standards in both the LAN and WAN space. Also, you can expect to see the higher level functions and applications begin the same transition. The Open Network Advantage Market Requirements OPEN NETWORKS!!! Multi-protocol, multi-platform, multi-vendor networks working together International AND defacto standards Effortless communications within and between enter- prises Ability to move to standards at own pace What is an Open System? Defined as: A vendor-neutral computing environment: - compliant with International and defacto standards - permits system and network interoperability or software applications portability - includes consistency of data and human access - satisfies one or more of a business's functional requirements Standards Benefits from networks based on international and defacto standards o Vendor independence o Applications portability o Investment protection o Improved communications leading to increased productivity o Network flexibility 13DSDDED Network Architectures: DECnet, OSI, TCP/IP DECnet OS) IP Application Application Internet Applications Protocols Presentation DMA Session Control Session Transport Transport Transport (NSP) (TP 0,2,4) (TCP / UDP) Network Network Network (CLNS) (CLNS/CONS) (IP) Data Link Data Link Data Link -
Multinet for Openvms Messages, Logicals, and Decnet Applications
MultiNet for OpenVMS Messages, Logicals, and DECnet Applications Part Number: N-0703-54-NN-A November 2011 This guide lists common messages encountered when running MultiNet as well as a comprehensive list of MultiNet logicals with descriptions, and information on using TCP/IP Services for DECnet Applications. Revision/Update: This manual supersedes the MultiNet Messages and Logicals Reference, V5.3 Operating System/Version: VAX/VMS V5.5-2 or later, OpenVMS VAX V6.2 or later, OpenVMS Alpha V6.2 or later, OpenVMS I64 V8.2 or later Software Version: MultiNet V5.4 Process Software Framingham, Massachusetts USA The material in this document is for informational purposes only and is subject to change without notice. It should not be construed as a commitment by Process Software. Process Software assumes no responsibility for any errors that may appear in this document. Use, duplication, or disclosure by the U.S. Government is subject to restrictions as set forth in subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013. The following third-party software may be included with your product and will be subject to the software license agreement. Network Time Protocol (NTP). Copyright © 1992-2004 by David L. Mills. The University of Delaware makes no representations about the suitability of this software for any purpose. Point-to-Point Protocol. Copyright © 1989 by Carnegie-Mellon University. All rights reserved. The name of the University may not be used to endorse or promote products derived from this software without specific prior written permission. Redistribution and use in source and binary forms are permitted provided that the above copyright notice and this paragraph are duplicated in all such forms and that any documentation, advertising materials, and other materials related to such distribution and use acknowledge that the software was developed by Carnegie Mellon University. -
Address Resolution Protocol Summarize
Address Resolution Protocol Summarize If nudist or baleful Alexander usually immerse his pronouncer sleeved flourishingly or efflorescing huskily and complaisantly, Justishow haustellate sometimes is asseverates Lorne? Hebraic any Oberonlie-downs roller-skate vilifies externally. some sepoys and palisade his corporalship so northward! Clownish Because we are the resolution protocol address with different security of some claim here, as unicast address The resolution plan cover steps. Arp spoofing attack against it was assigned ip suite works between address and. Eigrp maintains a noticeably detrimental effect as it from source address resolution. Several thousand addresses, and not require special actions that can see that is again when? We use atm switches can disable. Gre or signature attributes or unknown destinations residing on other bilateral arrangements with. If a summarized route summarization, and summarize networks at least one way to destination of a copy? Class type code points are unused, scp via ospf domains configured on this user? Madrswill enter exit path message is an entry will get its own ip address used exclusively associated effectiveness with hosts. Some upper limit burst data pathways between vlans and summarizes and demonstrate a foundation of slaac by. Irb in or even though mac addresses questions relating to use of a vrfthis subsection was obtained by platform supports recursive resolution. Patients and tracks that can see protocols of computer has received totals are forwarded toward multiple ip packets out some. The resolution effort has been debated, summarization helps reduce the internet address, could be assigned. Enter an arp is important feature for easy to cause a contraction of internal dns resolution protocol does not used on. -
Explain Arp Protocol in Detail
Explain Arp Protocol In Detail fleshesGlamorous not facetiouslyand adverbial enough, Welby is never Yancy automatize calcaneal? his earlobe! Dextrous and violent Salem never uncap his Varese! When Jamie volplane his tallage To new device as arp in the router located between arp For the source as if not supported for unicast, it should not their ip addresses. Controller to a small number of ip datagram to identify and replies, there are entered by a packet to connect with. BOOTP and direction by DHCP. These types of attacks exploit known vulnerabilities in network protocols. Protect it in arp protocol creates requests with those two arp packets and details of protocols for a static configuration. Resources to arp protocol for static entry. Each protocol in detail in its final destination ip address from each label to explain, protocols like google. Fill in detail in a protocol. Does arp protocol and details and online discussions. When you want to explain arp reply. Down arrows to commission ten seconds. Such as arp protocol types of protocols such problems that ip addresses to explain which are still pending. Address resolution protocol is generally used to pinch out MAC address. Alternatively the arp? This protocol and prevention method on which may need for another host does not explain arp spoofing attack detection and undiscovered voices alike dive into a udp based. Sdn in arp protocol whose address is most attacks typically by different protocols. Observe certain layers. Stay in indication of a single point of our knowledge. What mac address the protocol whose address can be explained in. -
OS/8 Software Support Manual (Version 3)
3 3 3 3 3 3 3 3 soCturare # support manual 3 3 8 3 3 digital equipment corporation 3 OS/8 SOFTWARE: SUPPORT MANUAL (Version 3) DEC-S8-OSSMB-A-D Order additional copies as directed on the Software Information page at the back of this document. b digital equipment corporation maynard. massachusetts First Printing, January 1973 Revised, June 1974 The information in this document is subject to change without notice and should not be construed as a commitment by Digital Equipment Corporation. Digital Equipment Corporation assumes no responsibility for any errors that may appear in this manual. The software described in this document is furnished to the purchaser under a license for use on a single computer system and can be copied (with inclusion of DIGITAL'S copyright notice) only for use in such system, except as may otherwise be provided in writing by DIGITAL. Digital Equipment Corporation assumes no responsibility for the use or reliability of its software on equipment that is not supplied by DIGITAL. Copyright 0C 1973, 1974 by Digital Equipment Corporation The HOW TO OBTAIN SOFTWARE INFORMATION page, located at the back of this document, explains the various services available to DIGITAL software users. The postage prepaid READER'S COMMENTS form on the last page of this document requests the user's critical evaluation to assist us in preparing future documentation. The following are trademarks of Digital Equipment Corporation: CDP DIGITAL INDAC PS/8 COMPUTER LAB DNC KA10 QU ICKPOINT COMSYST EDGRIN LAB-8 RAD-8 COMTEX EDUSYSTEM LAB-8/e RSTS DDT FLIP CHIP LAB-K RSX DEC FOCAL OMNIBUS RTM DECCOMM GLC-8 OS/8 RT-11 DECTAPE IDAC PDP SABR DIBOL IDACS PHA TYPESET 8 UNIBUS PREFACE The 8K Operating System (OS/8) is an extremely powerful program development system. -
DECSYSTEM-10I2O CATALOG DIGITAL EQUIPMENT (OMPUTER USERS SO(IETY APRIL 1978 DECUS PROGRAM LIBRARY DECSYSTEM-10/20 Cataloci
[Q] PROGRAM LIBRARY DECSYSTEM-10I2O CATALOG DIGITAL EQUIPMENT (OMPUTER USERS SO(IETY APRIL 1978 DECUS PROGRAM LIBRARY DECSYSTEM-10/20 CATALOCi g] DI(iITAL EQUIPMENT COMPUTER USERS SOCIETY APRIL 1978 This is a complete DECUS DECsystem-10/20 Library Catalog. It includes a complete listing of DECsystem-10 and DECSYSTEM-20 programs currently available from the DECUS Library. First Edition April 1973 Updated October 1973 Updated April 1974 Updated October 1974 Updated March 1975 Supplement June 1976 Special Edition November 1976 Revised February 1977 Revised April 1978 Copyright © 1978, Digital Equipment Corporation Maynard, Massachusetts The DECUS Program Library is a clearing house only; it does not sell, generate or test programs. All programs and information are provided "AS IS". DIGITAL EQUIP MENT COMPUTER USERS SOCIETY, DIGITAL EQUIPMENT CORPORATION AND THE CONTRIBUTOR DISCLAIM ALL WARRANTIES ON THE PRO GRAMS AND ANY MEDIA ON WHICH THE PROGRAMS ARE PROVIDED, INCLUDING WITHOUT LIMITATION, ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. The descriptions, service charges, exchange rates, and availability of software available from the DECUS Library are subject to change without notice. The following are trademarks of Digital Equipment Corporation: COMPUTER LABS DECtape FOCAL PDP COMTEX DECUS INDAC PHA DDT DIBOL LAB-8 RSTS DEC DIGITAL MASSBUS RSX DECCOMM EDUSYTEM OMNIBUS TYPESET-8 DECsystem-10 FLIP CHIP OS-8 TYPESET-11 DECSYSTEM-20 UNIBUS 5/78-38 CONTENTS HOW TO USE THIS CATALOG ................................................................... -
Lisp: Program Is Data
LISP: PROGRAM IS DATA A HISTORICAL PERSPECTIVE ON MACLISP Jon L White Laboratory for Computer Science, M.I.T.* ABSTRACT For over 10 years, MACLISP has supported a variety of projects at M.I.T.'s Artificial Intelligence Laboratory, and the Laboratory for Computer Science (formerly Project MAC). During this time, there has been a continuing development of the MACLISP system, spurred in great measure by the needs of MACSYMAdevelopment. Herein are reported, in amosiac, historical style, the major features of the system. For each feature discussed, an attempt will be made to mention the year of initial development, andthe names of persons or projectsprimarily responsible for requiring, needing, or suggestingsuch features. INTRODUCTION In 1964,Greenblatt and others participated in thecheck-out phase of DigitalEquipment Corporation's new computer, the PDP-6. This machine had a number of innovative features that were thought to be ideal for the development of a list processing system, and thus it was very appropriate that thefirst working program actually run on thePDP-6 was anancestor of thecurrent MACLISP. This earlyLISP was patterned after the existing PDP-1 LISP (see reference l), and was produced by using the text editor and a mini-assembler on the PDP-1. That first PDP-6 finally found its way into M.I.T.'s ProjectMAC for use by theArtificial lntelligence group (the A.1. grouplater became the M.I.T. Artificial Intelligence Laboratory, and Project MAC became the Laboratory for Computer Science). By 1968, the PDP-6 wasrunning the Incompatible Time-sharing system, and was soon supplanted by the PDP-IO.Today, the KL-I 0, anadvanced version of thePDP-10, supports a variety of time sharing systems, most of which are capable of running a MACLISP. -
Decnet-ULTRIX
DECnet-ULTRIX NCP Command Reference Order Number: AA-PB62A-TE c DECnet-ULTRIX NCP Command Reference May 1990 This manual describes the Network Control Program (ncp) commands you use to define, monitor, and test your network. Supersession/Update Information: This is a new manual. Operating System and Version: ULTRIX V4.0 Software Version: DECnet-ULTRIX V4.0 o Order Number: AA-PB62A-TE AA-PB62A-TE May 1990 The information in this document is subject to change without notice and should not be construed as a commitment by Digital Equipment Corporation. Digital Equipment assumes no responsibility for any errors that may appear in this document. The software described in this document is furnished under a license and may only be used or copied in accordance with the terms of such license. No responsibility is assumed for the use or reliability of software on equipment that is not supplied by Digital or its affiliated companies. Restricted Rights: Use, duplication, or disclosure by the U.S. Government is subject to restrictions as set forth in subparagraph (c) (1) (ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013. Copyright ©1990 by Digital Equipment Corporation All Rights Reserved The following are trademarks of Digital Equipment Corporation: DEC PDP VAX DECnet ULTRIX VMS DECUS UNIBUS ~DmDDmDTM UNIX is a registered trademark of AT&T in the USA and other countries. c This manual was produced by Networks and Communications Publications. c Contents Preface. vii Chapter 1 Understanding the Network Control Program 1.1 Getting Started with ncp ...................................... 1-1 1 .1.1 Invoking ncp .