Professional VMS User Manual

Total Page:16

File Type:pdf, Size:1020Kb

Professional VMS User Manual R Professional VMS User Manual R The File Transfer Authority ©2001 by BLAST, Inc. 49 Salisbury Street West Pittsboro, NC 27312 All Rights Reserved Manual #2MNPVMS 10/01 The information in this manual has been compiled with care, but BLAST, Inc,. makes no warranties as to accurateness or completeness, as the software described herein may be changed or enhanced from time to time. This information does not constitute com- mitments or representations by BLAST, Inc., and is subject to change without notice. BLAST® is a registered trademark, and BLAST Professional™, BLAST Professional VMS™ and TrueTerm™ are trademarks of BLAST, Inc. Any trademarks, trade- names, service marks, service names owned or registered by any other company and used in this manual are proprietary to that company. Restricted Rights Legend Use, duplication, or disclosure by the Government is subject to restrictions as set forth in subdivision (b) (3) (ii) of the Rights in Technical Data and Computer Software clause at 52.227-7013. BLAST, Inc. 49 Salisbury Street West P.O. Box 818 Pittsboro, North Carolina 27312 SALES: (800) 242 - 5278 FAX: (919) 542 - 0161 Technical Support: (919) 542 - 3007 E-mail: [email protected] World Wide Web: http://www.blast.com © Copyright 2001 by BLAST, Inc. Table of Contents 1 Introduction 1 BLAST Software Registration . 1 The BLAST Package . 2 BLAST Professional Features. 2 How to Use This Manual . 3 Comments and Suggestions . 4 BLAST Technical Support . 5 2 The BLAST Environment 7 Introduction. 7 Assigning Symbol Values. 7 Command Line Switches . 10 Communications Ports . 14 Flow Control . 19 3 BLAST Quickstart 23 Starting BLAST . 23 The BLAST Screen. 24 Three Keys to Remember . 26 The BLAST Menus. 27 A Quickstart File Transfer . 28 4 The Menus 35 Moving Through the Menus . 35 Frequently Used Keys. 36 The Offline Menu . 37 The Online Menu . 39 The Filetransfer Menu. 40 The Local Menu . 41 The Remote Menu. 43 Automation with BLASTscript. 44 5 The Setup 45 What is a Setup? . 45 Setup Fields. 48 BLAST Protocol Subwindow . 58 Kermit Protocol Subwindow. 63 Xmodem and Ymodem Protocol Subwindow . 67 Zmodem Protocol Subwindow . 69 File Attributes Subwindow . 73 6 BLAST Session Protocol 77 What is a Protocol? . 77 The BLAST Session Protocol. 78 BLAST Protocol Design. 79 Starting a BLAST Session . 81 Ending a BLAST Session . 84 Performing Filetransfer Commands . 85 Transfer Command File . 94 BLAST Protocol Remote Menu . 97 Automating the BLAST Session Protocol . 98 Fine-Tuning the BLAST Session Protocol . 98 Filetransfer Security with BLAST Protocol . 100 7 Kermit Protocol 103 Kermit Filetransfer Menu . 103 Sending and Receiving Files with Kermit . 104 Kermit Remote Menu . 109 8 Xmodem, Ymodem, and Zmodem Protocols 111 Command Line Features. 112 Xmodem Protocol . 112 Ymodem Protocol . 116 Zmodem Protocol . 118 9 Text Transfers 121 Introduction. 121 Uploading Text to a Remote Computer . 121 Downloading Text from a Remote Computer . 123 10 Secure BLAST 125 Securing Your System . 125 VMS Tools . 125 Using Secure BLAST . 127 BLPASSWD . 128 BLSECURE . 135 SECURE . 139 Using the Password. 140 11 Introduction To Scripting 143 Starting Out. 143 Learn Mode. 148 12 BLASTscript Topics 153 Scripting Basics . 153 Manipulating Text. 158 Managing the Screen Display . 162 Communicating with Other Programs . 164 File Transfers with BLAST Protocol . 165 File Transfers with Kermit . 168 File Transfers with Xmodem and Xmodem1K. 171 File Transfers with Ymodem and Ymodem G . 172 File Transfers with Zmodem. 174 BLAST Operation as a Pseudohost. 176 Using Log Files for Error Checking . 177 Text Transfers . 178 13 Connecting and Disconnecting 181 Introduction. 181 BLASTscript Libraries . 181 The Index Utility. 186 14 BLASTscript Command Reference 189 Introduction. 189 Data Types . 189 Syntax Rules . 192 Commands That Set @STATUS . 193 Manipulation of Binary Data . 193 BLASTscript Commands . 194 15 BLASTscript Reserved Variables 233 16 Data Stream Control 273 Introduction. 273 Data Stream Filtering and Alteration . 273 Standard BLAST Terminals . 277 17 Limited Control of a Remote PC 281 Connecting to the Host PC . 281 Transferring Files to and from the Host PC . 283 Disconnecting from the Host PC . 284 Using Terminal Mode. 284 Modifying BHOST Settings . 285 Appendix A Error Messages 293 Introduction. 293 BLAST Protocol Functions. 293 Transfer File Management . 294 Utility File Management. 295 Scripting . 295 Command File Processing . 296 Initialization . 296 Script Processor . 297 Network. 297 Appendix B Key Definition Charts 299 Setup Keys . 299 Attention Key Sequences . 300 Hot Keys . ..
Recommended publications
  • Macwise Version 19 User's Manual
    [email protected] www.CarnationSoftware.com www.MacWise.com MacWise Version 19 User's Manual You can use Command F to find what you are looking for in this document. Introduction Terminal Emulation MacWise emulates ADDS Viewpoint, Wyse 50, Wyse 60, Wyse 370, Televideo TV 925, DEC VT100, VT220 and Prism terminals. Supports ANSI color. Esprit III color is also supported in Wyse 370 mode. MacWise allows a Macintosh to be used as a terminal -- connected to a host computer directly, by modem, or over the Internet. The emulators support video attributes such as dim, reverse, underline, 132-column modes, protected fields and graphic characters sent from the host computer, as well as enhanced Viewpoint mode. Features include phone list and dialer for modems, on-screen programmable function keys, connection scripts and more. Connectivity 1. Built in Modem 2. Telnet / TCP/IP 3. SSH Secure Shell 4. Serial ports via USB to Serial adaptor . 5. Also communicates directly with the Mac unix shell Telnet Telnet settings are under the Connection Menu. Select "Telnet" to enable telnet. Select "Telnet Connection..." to enter your Host IP address, port number and terminal type. =============================== KERMIT ================================ NOTE: If you are running Mac OS 10.13 or later, you need to also use Kermit. (There should be a check mark on "Kermit" under the Connection Menu.) Kermit is installed automatically when Mac OS 10.13 or later is detected. You can re-install kermit any time by selecting Kermit Installer from the Help Menu in MacWise. Echo Kermit Characters ( under the Connection Menu ) This is normally enabled when Kermit is enabled.
    [Show full text]
  • A Kermit File Transfer Protocol for the Apple II Series Personal Computers : John Patrick Francisco Lehigh University
    Lehigh University Lehigh Preserve Theses and Dissertations 1986 A Kermit file transfer protocol for the Apple II series personal computers : John Patrick Francisco Lehigh University Follow this and additional works at: https://preserve.lehigh.edu/etd Part of the Electrical and Computer Engineering Commons Recommended Citation Francisco, John Patrick, "A Kermit file transfer protocol for the Apple II series personal computers :" (1986). Theses and Dissertations. 4628. https://preserve.lehigh.edu/etd/4628 This Thesis is brought to you for free and open access by Lehigh Preserve. It has been accepted for inclusion in Theses and Dissertations by an authorized administrator of Lehigh Preserve. For more information, please contact [email protected]. A KERMIT FILE TRANSFER PROTOCOL FOR THE APPLE II SERIES PERSONAL COMPUTERS (Using the Apple Pascal Operating system) by John Patrick Francisco A Thesis Presented to the Graduate Committee of Lehigh University in Candidacy for the Degree of Master of Science 1n• Computer Science Lehigh University March 1986 This thesis is accepted and approved in partial fulfillment of the requirements for the degree of Master of science.• (date) Professor in Charge -------------- --------------- Chairman of the Division Chairman of the Department • • -11- ACKNOWLEDGEMENTS It would be somewhat of an understatement to say this project was broad in scope as the disciplines involved ranged from Phychology to Electrical Engineering. Since the project required an extensive amount of detailed in­ formation in all fields, I was impelled to seek the help, advice and opinion of many. There were also numerous t friends and relatives upon whom I relied for both moral and financial support.
    [Show full text]
  • CS5865 Laboratory #1 Notes File Transfer Protocols
    1 CS5865 Laboratory #1 Notes File Transfer Protocols - An Overview Dr. B.J. Kurz XMODEM (Ward Christensen, 1970), one of the earliest ‘industry standard’ file transfer protocols in the public domain. HDX operation, character (byte)-oriented, fixed-length 128-byte blocks, 8-bit characters (bytes), 8-bit BCC = sum-mod256, stop-wait ARQ, block counts, binary data capability. Poor error detection capability, typically 95%. data block format: SOH/count/1’s compl. count/ user data/BCC control block format: ACK or NAK (or C), EOT Several later versions of XMODEM are in use: XMODEM-CRC same as regular XMODEM above except uses 8-bit BCC = CRC-8 (some implementations use 16-bit BCC = CRC-16). Better error detection capability, typically 99.97% (for CRC-8). Some versions negotiate the error character generation method: the sender first tries sum- mod256 BCC, then switches to CRC-8 BCC after three unsuccessful attempts indicated by NAKs from the receiver. XMODEM-1K same as XMODEM-CRC except uses 1024-byte blocks for better throughput (fewer line- turn-arounds), but slightly degraded error detection performance. WXMODEM a sliding-window version of XMODEM. Group size is fixed as 4 blocks. Much improved throughput. FDX capable lines needed if continous-ARQ error recovery used. YMODEM (Chuck Forsberg) a variation of XMODEM-1K. Supports two block lengths of 128 bytes and 1024 bytes, uses 2-byte CRC-16, excellent error detection capability, typically 99.99%. KERMIT (Frank de Cruz, Columbia Univ. Comp. Center, N.Y), most popular file transfer protocol, copyrighted, over 200 implementations for various systems. This is a comprehensive 2 remote communications package including terminal emulators, storage-to-storage transfer, not only a file transfer protocol.
    [Show full text]
  • Altair CP/M 2.2AT Ver 1.1 IOBYTE Implementation
    Altair CP/M 2.2AT Ver 1.1 CP/M 2.2AT supports an Altair 8800 computer with both an Altair and Tarbell floppy controller installed. Drives A & B are Altair drives 0 & 1. Drives C & D are Tarbell drives 0 & 1. The boot drive is always Altair drive 0. The Altair controller can be either the 8" or the 5.25" (mini-disk) controller as selected by conditional assembly. The BIOS uses track buffering to improve disk performance. Compared to a non-buffered BIOS, perfor- mance of program with substantial disk I/O improves by 25% to 75%. For the Altair drives, the same disk layout used by the original versions of Altair CP/M 1.4 and 2.2 is used. For the Tarbell controller, the standard IBM SSSD soft-sectored format is used. This BIOS provides full IOBYTE support to allow use of a variety of standard Altair I/O boards. See IOBYTE below. During cold boot, the BIOS looks for a Teletype on the console port and if detected (based on baud rate), subsequently follows any CR to the console device with a NULL to give the Teletype carriage time to reach the left margin. The send null flag (SNDNULL) is located immediately following the MODE and IOBYTE in memory so it can be over-ridden if needed. This BIOS adds a disk select timeout for the Altair 8" floppy so if a non-present or empty drive is select- ed, it will eventually timeout. To still allow the operator time to insert a disk, close the door, and wait for the drive enable one-shot to expire, the default timeout is set to seven seconds.
    [Show full text]
  • The Kermit File Transfer Protocol
    THE KERMIT FILE TRANSFER PROTOCOL Frank da Cruz February 1985 This is the original manuscript of the Digital Press book Kermit, A File Transfer Protocol, ISBN 0-932976-88-6, Copyright 1987, written in 1985 and in print from 1986 until 2001. This PDF file was produced by running the original Scribe markup-language source files through the Scribe publishing package, which still existed on an old Sun Solaris computer that was about to be shut off at the end of February 2016, and then converting the resulting PostScript version to PDF. Neither PostScript nor PDF existed in 1985, so this result is a near miracle, especially since the last time this book was "scribed" was on a DECSYSTEM-20 for a Xerox 9700 laser printer (one of the first). Some of the tables are messed up, some of the source code comes out in the wrong font; there's not much I can do about that. Also (unavoidably) the page numbering is different from the printed book and of couse the artwork is missing. Bear in mind Kermit protocol and software have seen over 30 years of progress and development since this book was written. All information herein regarding the Kermit Project, how to get Kermit software, or its license or status, etc, is no longer valid. The Kermit Project at Columbia University survived until 2011 but now it's gone and all Kermit software was converted to Open Source at that time. For current information, please visit the New Open Source Kermit Project website at http://www.kermitproject.org (as long as it lasts).
    [Show full text]
  • Download, Including1 17N REU, Ramlink Partition, Jimymon-64 (ML Monitor)
    C 0 T E T S ISSUE Published June 1996 COMMODORE WORLD 6 Wheels-Laying More Than A Patch THE NEWS MAGAZINE FOR COMMODORE 64 » 1'■ I 1J',[ K1. Bruce Thonuu 14 GOFA-A Modulap- Pcogpamming System Fob The Coeimodore 64 http://wviw.cmiweb.am/cwhtme.hlml George Flanagan General Manager Chinks ft Christiansen ♦ Editor Review; Doug Cot Ion ♦ 24 Software: Centipede 126 E>r Gaelwe R. Gasson Advegtisinq Sales A Look ai ihe Newesi Commodore I2S BBS Program Charles A. Christiansen (413) 525-0023 ♦ Graphic Acts Doug Cotton .UMN! '♦ 26 Jusr Fob Starters by Jason Compton Electronic Pre-Press & Pointing Maiuir/Holden Helpful Hints for Handling Disk Drives ♦ 30 Graphic Interpretation by Bruce Thomas Cover Design by Doug Cotton GEOS: For ti Good lime... 32 Carrier Detect by Gaelyne B. Gasson Tclecommunicationi News & Updates 36 S16 Beat by Mark Fellows Things to Look Out For When Program/Hint- the 65X16 Commodore1" and [he respective Commodore producl names are trademarks or registered trademarks of Commodore, a 38 Over The Edge by Jeffrey L. Jones division of Tulip Compulers. Commodore World is in no way aftiliated wilrtthe owner n! ".he Commodore logo ana technology. Commodore Programming in a SuperCPU World Commodore Worla (ISSN 1078-2515) is published 8 limos annually by Creative Micro Designs. Inc.. 15 Benton Drive, Easl Longrneadow MA 01028-0646. Secono-Class Postage Paid at EasL Longmeaflow MA. (USPS «)n-801| Annual subscnpiion rale is USS29.95 fci U.S. addresses. USS35.95(orC3nada0'Maiico.USSJS.95!orallECCounlnB5. Department paymanlsmusl be provided in U S. Dollars. Mail subscriptions 2 From the Editor to CW Subscriptions, do Crestiva Micro Designs.
    [Show full text]
  • Courier V.Everything External Modem: Getting Started
    Courier V.Everything External Modem: Getting Started FINAL 4/96 p/n 1.024.492 1996 U.S. Robotics Access Corp. 8100 North McCormick Blvd. Skokie, IL 60076-2999 All Rights Reserved U.S. Robotics and the U.S. Robotics logo are registered trademarks of U.S. Robotics Access Corp. V.Fast Class and V.FC are trademarks of Rockwell International. Any trademarks, tradenames, service marks or service names owned or registered by any other company and used in this manual are the property of their respective companies. 1996 U.S. Robotics Access Corp. 8100 N. McCormick Blvd. Skokie, IL 60076-2999 USA Table of Contents About This Manual iii We Welcome Your Suggestions.............................................................iii Chapter 1 The Courier 1-1 Courier Controls, Displays, and Connectors.....................................1-3 Status Indicators ....................................................................................1-4 Features...................................................................................................1-5 Chapter 2 Installing the Courier 2-1 What You Need......................................................................................2-1 Package Contents...................................................................................2-3 Installing the Courier ............................................................................2-4 Setting the DIP Switches.......................................................................2-4 Powering On the Courier .....................................................................2-6
    [Show full text]
  • Configuration Parameters
    Good news, everyone! User Documentation Version: 2020-01-01 M. Brutman ([email protected]) http://www.brutman.com/mTCP/ Table of Contents Introduction and Setup Introduction..............................................................................................................................................................8 What is mTCP?...................................................................................................................................................8 Features...............................................................................................................................................................8 Tested machines/environments...........................................................................................................................9 Licensing...........................................................................................................................................................10 Packaging..........................................................................................................................................................10 Binaries.....................................................................................................................................................................10 Documentation..........................................................................................................................................................11 Support and contact information.......................................................................................................................11
    [Show full text]
  • Imperial College of Science and Technology, University of London, Department of Computing
    Imperial College of Science and Technology, University of London, Department of Computing. HIGH EFFICIENCY, CHARACTER-ORIENTED, LOCAL AREA NETWORKS by Martin Cripps This thesis is submitted in partial fulfilment of the requirements for the degree of Doctor of Philosophy and the Diploma of Imperial College of Science and Technology, January 1988. For Clare Attempt the end His reasons are as two grains of wheat but never stand to doubt hid in two bushels of chaff. nothing's so hard You shall seek all day ere you find them but search and when you have found them will find it out they are not worth the search. Robert Herrick (1591-1674) William Shakespeare (1564-1616) 1 ABSTRACT This thesis explores the problem of interconnecting character-oriented devices over local area networks by investigating significant aspects of hardware, software, protocol and operational factors. It proposes effective and efficient solutions which were tested during a full-scale experiment The results of that experiment demonstrate convenient, cost-effective and reliable operation. The novelty of this investigation arises from its character-oriented approach. Much work has been carried out by others on local area networks which transfer blocks of data efficiently, however, a large majority of installed devices operate on a character-by-character basis and will continue so to do for some considerable time. This study is approached through analysis of the low efficiency of international standard networks for this class of device which defines the scope of this work. An original analysis of the potential mechanisms which can be used to give high efficiency and low delay for this class of transfer is then derived.
    [Show full text]
  • Index Images Download 2006 News Crack Serial Warez Full 12 Contact
    index images download 2006 news crack serial warez full 12 contact about search spacer privacy 11 logo blog new 10 cgi-bin faq rss home img default 2005 products sitemap archives 1 09 links 01 08 06 2 07 login articles support 05 keygen article 04 03 help events archive 02 register en forum software downloads 3 security 13 category 4 content 14 main 15 press media templates services icons resources info profile 16 2004 18 docs contactus files features html 20 21 5 22 page 6 misc 19 partners 24 terms 2007 23 17 i 27 top 26 9 legal 30 banners xml 29 28 7 tools projects 25 0 user feed themes linux forums jobs business 8 video email books banner reviews view graphics research feedback pdf print ads modules 2003 company blank pub games copyright common site comments people aboutus product sports logos buttons english story image uploads 31 subscribe blogs atom gallery newsletter stats careers music pages publications technology calendar stories photos papers community data history arrow submit www s web library wiki header education go internet b in advertise spam a nav mail users Images members topics disclaimer store clear feeds c awards 2002 Default general pics dir signup solutions map News public doc de weblog index2 shop contacts fr homepage travel button pixel list viewtopic documents overview tips adclick contact_us movies wp-content catalog us p staff hardware wireless global screenshots apps online version directory mobile other advertising tech welcome admin t policy faqs link 2001 training releases space member static join health
    [Show full text]
  • Electronic Bulletin Board System for the Federal Depository Library Program
    GP 3.2:E1 2 Electronic Bulletin Board System for the Federal Depository Library Program: A Study Library Programs Service U.S. Government Printing Office Superintendent of Documents Washington, D.C. 1991 tr Electronic Bulletin Board System for the Federal Depository Library Program A Study Written by: Marian W. MacGilvray Joseph P. Paskoski John M. Walters Project Director: Joseph C. McClane February 1, 1991 Library Programs Service U.S. Government Printing Office Washington, D.C. U.S. Government Printing Office Robert W. Houk, Public Printer Superintendent of Documents (Vacant) Library Programs Service Bonnie B. Trivizas, Director Library Division Gil Baldwin, Chief Depository Services Staff Joseph C. McClane, Chief Any use of trade, product, or firm names in this publication is for descriptive purposes only and does not imply endorsement by the U.S. Government. Table of Contents Preface , iv I. Executive Summary and Recommendations 1 II. Introduction A. Federal Depository Library Program 2 B. Basis of the Study 2 C. Scope of the System 2 D. Study Methodology 2 III. Bulletin Board Systems - General Characteristics 3 IV. FDLP Bulletin Board System - System Description A. File Characteristics and Size 4 B. Usage Characteristics 7 C. Staffing 7 D. Telecommunications . 7 E. System Configuration Options and Costs 8 F. Implementation Schedule 11 Bibliography 13 Appendix A. Recommendations, Depository Library Council 14 Appendix B. List of Consultants 15 Appendix C. Suggestions for File Content 18 Appendix D. Alternate Technologies 20 Appendix E. Hardware and Software 25 iii Preface A preliminary draft of "Electronic Bulletin Board • the system will be beta tested with the 54 System for the Federal Depository Library Program: A regional depositories before being made Study" was completed on October 15, 1990 and available to all depository libraries.
    [Show full text]
  • Chapter 5: Data Link Layer
    Chapter 5: Data Link Layer Answers to End-of-Chapter Questions 1. What does the data link layer do? 2. What is media access control and why is it important? 3. Under what conditions is media access control unimportant? 4. Compare and contrast roll call polling, hub polling (or token passing), and contention. 5. Which is better, hub polling or contention? Explain. 6. Define two fundamental types of errors. 7. Errors normally appear in ______________________________, which is when more than one data bit is changed by the error-causing condition. 8. Is there any difference in the error rates of lower speed lines and of higher speed lines? 9. Briefly define noise. 10. Describe five types of noise. Which is likely to pose the greatest problem to network managers? 11. How do amplifiers differ from repeaters? 12. What are three ways of reducing errors and the types of noise they affect? 13. Describe three approaches to detecting errors, including how they work, the probability of detecting an error, and any other benefits or limitations. 14. Briefly describe how even parity and odd parity work. 15. Briefly describe how polynomial checking works. 16. How does cyclical redundancy checking work? 17. How does forward error correction work? How is it different from other error correction methods? 18. Under what circumstances is forward error correction desirable? 1 Data Link Layer 19. Compare and contrast stop-and-wait ARQ and continuous ARQ. 20. Which is the simplest (least sophisticated) protocol described in this chapter? 21. How do the various types of XMODEM differ from YMODEM and ZMODEM? 22.
    [Show full text]